Add support for Fushia OS.
[deliverable/binutils-gdb.git] / bfd / elf.c
CommitLineData
252b5132 1/* ELF executable support for BFD.
340b6d91 2
6f2750fe 3 Copyright (C) 1993-2016 Free Software Foundation, Inc.
252b5132 4
5e8d7549 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
5e8d7549
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
5e8d7549 10 (at your option) any later version.
252b5132 11
5e8d7549
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
5e8d7549 17 You should have received a copy of the GNU General Public License
b34976b6 18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
252b5132 22
1b74d094
BW
23/*
24SECTION
252b5132
RH
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
661a3fd4 33 haven't bothered yet. */
252b5132 34
7ee38065
MS
35/* For sparc64-cross-sparc32. */
36#define _SYSCALL32
252b5132 37#include "sysdep.h"
3db64b00 38#include "bfd.h"
252b5132
RH
39#include "bfdlink.h"
40#include "libbfd.h"
41#define ARCH_SIZE 0
42#include "elf-bfd.h"
e0e8c97f 43#include "libiberty.h"
ff59fc36 44#include "safe-ctype.h"
de64ce13 45#include "elf-linux-core.h"
252b5132 46
8bc7f138
L
47#ifdef CORE_HEADER
48#include CORE_HEADER
49#endif
50
217aa764 51static int elf_sort_sections (const void *, const void *);
c84fca4d 52static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
217aa764 53static bfd_boolean prep_headers (bfd *);
ef10c3ac 54static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
718175fa
JK
55static bfd_boolean elf_read_notes (bfd *, file_ptr, bfd_size_type) ;
56static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset);
50b2bdb7 58
252b5132
RH
59/* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63/* Swap in a Verdef structure. */
64
65void
217aa764
AM
66_bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
252b5132 69{
dc810e39
AM
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
252b5132
RH
77}
78
79/* Swap out a Verdef structure. */
80
81void
217aa764
AM
82_bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
252b5132 85{
dc810e39
AM
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
252b5132
RH
93}
94
95/* Swap in a Verdaux structure. */
96
97void
217aa764
AM
98_bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
252b5132 101{
dc810e39
AM
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
252b5132
RH
104}
105
106/* Swap out a Verdaux structure. */
107
108void
217aa764
AM
109_bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
252b5132 112{
dc810e39
AM
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
252b5132
RH
115}
116
117/* Swap in a Verneed structure. */
118
119void
217aa764
AM
120_bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
252b5132 123{
dc810e39
AM
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
252b5132
RH
129}
130
131/* Swap out a Verneed structure. */
132
133void
217aa764
AM
134_bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
252b5132 137{
dc810e39
AM
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
252b5132
RH
143}
144
145/* Swap in a Vernaux structure. */
146
147void
217aa764
AM
148_bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
252b5132 151{
dc810e39
AM
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
252b5132
RH
157}
158
159/* Swap out a Vernaux structure. */
160
161void
217aa764
AM
162_bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
252b5132 165{
dc810e39
AM
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
252b5132
RH
171}
172
173/* Swap in a Versym structure. */
174
175void
217aa764
AM
176_bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
252b5132 179{
dc810e39 180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
252b5132
RH
181}
182
183/* Swap out a Versym structure. */
184
185void
217aa764
AM
186_bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
252b5132 189{
dc810e39 190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
252b5132
RH
191}
192
193/* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
3a99b017 195
252b5132 196unsigned long
217aa764 197bfd_elf_hash (const char *namearg)
252b5132 198{
3a99b017 199 const unsigned char *name = (const unsigned char *) namearg;
252b5132
RH
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
32dfa85d 215 return h & 0xffffffff;
252b5132
RH
216}
217
fdc90cb4
JJ
218/* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221unsigned long
222bfd_elf_gnu_hash (const char *namearg)
223{
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231}
232
0c8d6e5c
AM
233/* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
b34976b6 235bfd_boolean
0c8d6e5c 236bfd_elf_allocate_object (bfd *abfd,
0ffa91dd 237 size_t object_size,
4dfe6ac6 238 enum elf_target_id object_id)
252b5132 239{
0ffa91dd
NC
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
252b5132 244
0ffa91dd 245 elf_object_id (abfd) = object_id;
c0355132
AM
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
b34976b6 254 return TRUE;
252b5132
RH
255}
256
0ffa91dd
NC
257
258bfd_boolean
ae95ffa6 259bfd_elf_make_object (bfd *abfd)
0ffa91dd 260{
ae95ffa6 261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
0ffa91dd 262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
ae95ffa6 263 bed->target_id);
0ffa91dd
NC
264}
265
b34976b6 266bfd_boolean
217aa764 267bfd_elf_mkcorefile (bfd *abfd)
252b5132 268{
c044fabd 269 /* I think this can be done just like an object file. */
228e534f
AM
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
252b5132
RH
274}
275
72a80a16 276static char *
217aa764 277bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
252b5132
RH
278{
279 Elf_Internal_Shdr **i_shdrp;
f075ee0c 280 bfd_byte *shstrtab = NULL;
dc810e39
AM
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
252b5132
RH
283
284 i_shdrp = elf_elfsections (abfd);
74f2e02b
AM
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
f075ee0c 288 return NULL;
252b5132 289
f075ee0c 290 shstrtab = i_shdrp[shindex]->contents;
252b5132
RH
291 if (shstrtab == NULL)
292 {
c044fabd 293 /* No cached one, attempt to read, and cache what we read. */
252b5132
RH
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
c6c60d09
JJ
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
3471d59d 299 if (shstrtabsize + 1 <= 1
06614111
NC
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = (bfd_byte *) bfd_alloc (abfd, shstrtabsize + 1)) == NULL)
c6c60d09
JJ
302 shstrtab = NULL;
303 else if (bfd_bread (shstrtab, shstrtabsize, abfd) != shstrtabsize)
304 {
305 if (bfd_get_error () != bfd_error_system_call)
306 bfd_set_error (bfd_error_file_truncated);
06614111 307 bfd_release (abfd, shstrtab);
c6c60d09 308 shstrtab = NULL;
3471d59d
CC
309 /* Once we've failed to read it, make sure we don't keep
310 trying. Otherwise, we'll keep allocating space for
311 the string table over and over. */
312 i_shdrp[shindex]->sh_size = 0;
c6c60d09
JJ
313 }
314 else
315 shstrtab[shstrtabsize] = '\0';
217aa764 316 i_shdrp[shindex]->contents = shstrtab;
252b5132 317 }
f075ee0c 318 return (char *) shstrtab;
252b5132
RH
319}
320
321char *
217aa764
AM
322bfd_elf_string_from_elf_section (bfd *abfd,
323 unsigned int shindex,
324 unsigned int strindex)
252b5132
RH
325{
326 Elf_Internal_Shdr *hdr;
327
328 if (strindex == 0)
329 return "";
330
74f2e02b
AM
331 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
332 return NULL;
333
252b5132
RH
334 hdr = elf_elfsections (abfd)[shindex];
335
06614111
NC
336 if (hdr->contents == NULL)
337 {
338 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
339 {
340 /* PR 17512: file: f057ec89. */
695344c0 341 /* xgettext:c-format */
06614111
NC
342 _bfd_error_handler (_("%B: attempt to load strings from a non-string section (number %d)"),
343 abfd, shindex);
344 return NULL;
345 }
b1fa9dd6 346
06614111
NC
347 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
348 return NULL;
349 }
252b5132
RH
350
351 if (strindex >= hdr->sh_size)
352 {
1b3a8575 353 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
4eca0228 354 _bfd_error_handler
695344c0 355 /* xgettext:c-format */
d003868e
AM
356 (_("%B: invalid string offset %u >= %lu for section `%s'"),
357 abfd, strindex, (unsigned long) hdr->sh_size,
1b3a8575 358 (shindex == shstrndx && strindex == hdr->sh_name
252b5132 359 ? ".shstrtab"
1b3a8575 360 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
45b222d6 361 return NULL;
252b5132
RH
362 }
363
364 return ((char *) hdr->contents) + strindex;
365}
366
6cdc0ccc
AM
367/* Read and convert symbols to internal format.
368 SYMCOUNT specifies the number of symbols to read, starting from
369 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
370 are non-NULL, they are used to store the internal symbols, external
b7c368d0
NC
371 symbols, and symbol section index extensions, respectively.
372 Returns a pointer to the internal symbol buffer (malloced if necessary)
373 or NULL if there were no symbols or some kind of problem. */
6cdc0ccc
AM
374
375Elf_Internal_Sym *
217aa764
AM
376bfd_elf_get_elf_syms (bfd *ibfd,
377 Elf_Internal_Shdr *symtab_hdr,
378 size_t symcount,
379 size_t symoffset,
380 Elf_Internal_Sym *intsym_buf,
381 void *extsym_buf,
382 Elf_External_Sym_Shndx *extshndx_buf)
6cdc0ccc
AM
383{
384 Elf_Internal_Shdr *shndx_hdr;
217aa764 385 void *alloc_ext;
df622259 386 const bfd_byte *esym;
6cdc0ccc
AM
387 Elf_External_Sym_Shndx *alloc_extshndx;
388 Elf_External_Sym_Shndx *shndx;
4dd07732 389 Elf_Internal_Sym *alloc_intsym;
6cdc0ccc
AM
390 Elf_Internal_Sym *isym;
391 Elf_Internal_Sym *isymend;
9c5bfbb7 392 const struct elf_backend_data *bed;
6cdc0ccc
AM
393 size_t extsym_size;
394 bfd_size_type amt;
395 file_ptr pos;
396
e44a2c9c
AM
397 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
398 abort ();
399
6cdc0ccc
AM
400 if (symcount == 0)
401 return intsym_buf;
402
403 /* Normal syms might have section extension entries. */
404 shndx_hdr = NULL;
6a40cf0c
NC
405 if (elf_symtab_shndx_list (ibfd) != NULL)
406 {
407 elf_section_list * entry;
408 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
409
410 /* Find an index section that is linked to this symtab section. */
411 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
315350be
NC
412 {
413 /* PR 20063. */
414 if (entry->hdr.sh_link >= elf_numsections (ibfd))
415 continue;
416
417 if (sections[entry->hdr.sh_link] == symtab_hdr)
418 {
419 shndx_hdr = & entry->hdr;
420 break;
421 };
422 }
6a40cf0c
NC
423
424 if (shndx_hdr == NULL)
425 {
426 if (symtab_hdr == & elf_symtab_hdr (ibfd))
427 /* Not really accurate, but this was how the old code used to work. */
428 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
429 /* Otherwise we do nothing. The assumption is that
430 the index table will not be needed. */
431 }
432 }
6cdc0ccc
AM
433
434 /* Read the symbols. */
435 alloc_ext = NULL;
436 alloc_extshndx = NULL;
4dd07732 437 alloc_intsym = NULL;
6cdc0ccc
AM
438 bed = get_elf_backend_data (ibfd);
439 extsym_size = bed->s->sizeof_sym;
ef53be89 440 amt = (bfd_size_type) symcount * extsym_size;
6cdc0ccc
AM
441 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
442 if (extsym_buf == NULL)
443 {
d0fb9a8d 444 alloc_ext = bfd_malloc2 (symcount, extsym_size);
6cdc0ccc
AM
445 extsym_buf = alloc_ext;
446 }
447 if (extsym_buf == NULL
448 || bfd_seek (ibfd, pos, SEEK_SET) != 0
449 || bfd_bread (extsym_buf, amt, ibfd) != amt)
450 {
451 intsym_buf = NULL;
452 goto out;
453 }
454
455 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
456 extshndx_buf = NULL;
457 else
458 {
ef53be89 459 amt = (bfd_size_type) symcount * sizeof (Elf_External_Sym_Shndx);
6cdc0ccc
AM
460 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
461 if (extshndx_buf == NULL)
462 {
a50b1753
NC
463 alloc_extshndx = (Elf_External_Sym_Shndx *)
464 bfd_malloc2 (symcount, sizeof (Elf_External_Sym_Shndx));
6cdc0ccc
AM
465 extshndx_buf = alloc_extshndx;
466 }
467 if (extshndx_buf == NULL
468 || bfd_seek (ibfd, pos, SEEK_SET) != 0
469 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
470 {
471 intsym_buf = NULL;
472 goto out;
473 }
474 }
475
476 if (intsym_buf == NULL)
477 {
a50b1753
NC
478 alloc_intsym = (Elf_Internal_Sym *)
479 bfd_malloc2 (symcount, sizeof (Elf_Internal_Sym));
4dd07732 480 intsym_buf = alloc_intsym;
6cdc0ccc
AM
481 if (intsym_buf == NULL)
482 goto out;
483 }
484
485 /* Convert the symbols to internal form. */
486 isymend = intsym_buf + symcount;
a50b1753
NC
487 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
488 shndx = extshndx_buf;
6cdc0ccc
AM
489 isym < isymend;
490 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
8384fb8f
AM
491 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
492 {
493 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
695344c0 494 /* xgettext:c-format */
4eca0228
AM
495 _bfd_error_handler (_("%B symbol number %lu references "
496 "nonexistent SHT_SYMTAB_SHNDX section"),
497 ibfd, (unsigned long) symoffset);
4dd07732
AM
498 if (alloc_intsym != NULL)
499 free (alloc_intsym);
8384fb8f
AM
500 intsym_buf = NULL;
501 goto out;
502 }
6cdc0ccc
AM
503
504 out:
505 if (alloc_ext != NULL)
506 free (alloc_ext);
507 if (alloc_extshndx != NULL)
508 free (alloc_extshndx);
509
510 return intsym_buf;
511}
512
5cab59f6
AM
513/* Look up a symbol name. */
514const char *
be8dd2ca
AM
515bfd_elf_sym_name (bfd *abfd,
516 Elf_Internal_Shdr *symtab_hdr,
26c61ae5
L
517 Elf_Internal_Sym *isym,
518 asection *sym_sec)
5cab59f6 519{
26c61ae5 520 const char *name;
5cab59f6 521 unsigned int iname = isym->st_name;
be8dd2ca 522 unsigned int shindex = symtab_hdr->sh_link;
26c61ae5 523
138f35cc
JJ
524 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
525 /* Check for a bogus st_shndx to avoid crashing. */
4fbb74a6 526 && isym->st_shndx < elf_numsections (abfd))
5cab59f6
AM
527 {
528 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
529 shindex = elf_elfheader (abfd)->e_shstrndx;
530 }
531
26c61ae5
L
532 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
533 if (name == NULL)
534 name = "(null)";
535 else if (sym_sec && *name == '\0')
536 name = bfd_section_name (abfd, sym_sec);
537
538 return name;
5cab59f6
AM
539}
540
dbb410c3
AM
541/* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
542 sections. The first element is the flags, the rest are section
543 pointers. */
544
545typedef union elf_internal_group {
546 Elf_Internal_Shdr *shdr;
547 unsigned int flags;
548} Elf_Internal_Group;
549
b885599b
AM
550/* Return the name of the group signature symbol. Why isn't the
551 signature just a string? */
552
553static const char *
217aa764 554group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
b885599b 555{
9dce4196 556 Elf_Internal_Shdr *hdr;
9dce4196
AM
557 unsigned char esym[sizeof (Elf64_External_Sym)];
558 Elf_External_Sym_Shndx eshndx;
559 Elf_Internal_Sym isym;
b885599b 560
13792e9d
L
561 /* First we need to ensure the symbol table is available. Make sure
562 that it is a symbol table section. */
4fbb74a6
AM
563 if (ghdr->sh_link >= elf_numsections (abfd))
564 return NULL;
13792e9d
L
565 hdr = elf_elfsections (abfd) [ghdr->sh_link];
566 if (hdr->sh_type != SHT_SYMTAB
567 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
b885599b
AM
568 return NULL;
569
9dce4196
AM
570 /* Go read the symbol. */
571 hdr = &elf_tdata (abfd)->symtab_hdr;
6cdc0ccc
AM
572 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
573 &isym, esym, &eshndx) == NULL)
b885599b 574 return NULL;
9dce4196 575
26c61ae5 576 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
b885599b
AM
577}
578
dbb410c3
AM
579/* Set next_in_group list pointer, and group name for NEWSECT. */
580
b34976b6 581static bfd_boolean
217aa764 582setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
dbb410c3
AM
583{
584 unsigned int num_group = elf_tdata (abfd)->num_group;
585
586 /* If num_group is zero, read in all SHT_GROUP sections. The count
587 is set to -1 if there are no SHT_GROUP sections. */
588 if (num_group == 0)
589 {
590 unsigned int i, shnum;
591
592 /* First count the number of groups. If we have a SHT_GROUP
593 section with just a flag word (ie. sh_size is 4), ignore it. */
9ad5cbcf 594 shnum = elf_numsections (abfd);
dbb410c3 595 num_group = 0;
08a40648 596
44534af3 597#define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
1783205a 598 ( (shdr)->sh_type == SHT_GROUP \
44534af3 599 && (shdr)->sh_size >= minsize \
1783205a
NC
600 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
601 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
08a40648 602
dbb410c3
AM
603 for (i = 0; i < shnum; i++)
604 {
605 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 606
44534af3 607 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3
AM
608 num_group += 1;
609 }
610
611 if (num_group == 0)
20dbb49d
L
612 {
613 num_group = (unsigned) -1;
614 elf_tdata (abfd)->num_group = num_group;
615 }
616 else
dbb410c3
AM
617 {
618 /* We keep a list of elf section headers for group sections,
619 so we can find them quickly. */
20dbb49d 620 bfd_size_type amt;
d0fb9a8d 621
20dbb49d 622 elf_tdata (abfd)->num_group = num_group;
a50b1753
NC
623 elf_tdata (abfd)->group_sect_ptr = (Elf_Internal_Shdr **)
624 bfd_alloc2 (abfd, num_group, sizeof (Elf_Internal_Shdr *));
dbb410c3 625 if (elf_tdata (abfd)->group_sect_ptr == NULL)
b34976b6 626 return FALSE;
dbb410c3
AM
627
628 num_group = 0;
629 for (i = 0; i < shnum; i++)
630 {
631 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
1783205a 632
44534af3 633 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
dbb410c3 634 {
973ffd63 635 unsigned char *src;
dbb410c3
AM
636 Elf_Internal_Group *dest;
637
638 /* Add to list of sections. */
639 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
640 num_group += 1;
641
642 /* Read the raw contents. */
643 BFD_ASSERT (sizeof (*dest) >= 4);
644 amt = shdr->sh_size * sizeof (*dest) / 4;
a50b1753
NC
645 shdr->contents = (unsigned char *)
646 bfd_alloc2 (abfd, shdr->sh_size, sizeof (*dest) / 4);
1783205a
NC
647 /* PR binutils/4110: Handle corrupt group headers. */
648 if (shdr->contents == NULL)
649 {
650 _bfd_error_handler
695344c0 651 /* xgettext:c-format */
493a3386 652 (_("%B: corrupt size field in group section header: 0x%lx"), abfd, shdr->sh_size);
1783205a 653 bfd_set_error (bfd_error_bad_value);
493a3386
NC
654 -- num_group;
655 continue;
1783205a
NC
656 }
657
658 memset (shdr->contents, 0, amt);
659
660 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
dbb410c3
AM
661 || (bfd_bread (shdr->contents, shdr->sh_size, abfd)
662 != shdr->sh_size))
493a3386
NC
663 {
664 _bfd_error_handler
695344c0 665 /* xgettext:c-format */
493a3386
NC
666 (_("%B: invalid size field in group section header: 0x%lx"), abfd, shdr->sh_size);
667 bfd_set_error (bfd_error_bad_value);
668 -- num_group;
669 /* PR 17510: If the group contents are even partially
670 corrupt, do not allow any of the contents to be used. */
671 memset (shdr->contents, 0, amt);
672 continue;
673 }
708d7d0d 674
dbb410c3
AM
675 /* Translate raw contents, a flag word followed by an
676 array of elf section indices all in target byte order,
677 to the flag word followed by an array of elf section
678 pointers. */
679 src = shdr->contents + shdr->sh_size;
680 dest = (Elf_Internal_Group *) (shdr->contents + amt);
06614111 681
dbb410c3
AM
682 while (1)
683 {
684 unsigned int idx;
685
686 src -= 4;
687 --dest;
688 idx = H_GET_32 (abfd, src);
689 if (src == shdr->contents)
690 {
691 dest->flags = idx;
b885599b
AM
692 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
693 shdr->bfd_section->flags
694 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
dbb410c3
AM
695 break;
696 }
697 if (idx >= shnum)
698 {
4eca0228
AM
699 _bfd_error_handler
700 (_("%B: invalid SHT_GROUP entry"), abfd);
dbb410c3
AM
701 idx = 0;
702 }
703 dest->shdr = elf_elfsections (abfd)[idx];
704 }
705 }
706 }
493a3386
NC
707
708 /* PR 17510: Corrupt binaries might contain invalid groups. */
709 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
710 {
711 elf_tdata (abfd)->num_group = num_group;
712
713 /* If all groups are invalid then fail. */
714 if (num_group == 0)
715 {
716 elf_tdata (abfd)->group_sect_ptr = NULL;
717 elf_tdata (abfd)->num_group = num_group = -1;
4eca0228
AM
718 _bfd_error_handler
719 (_("%B: no valid group sections found"), abfd);
493a3386
NC
720 bfd_set_error (bfd_error_bad_value);
721 }
722 }
dbb410c3
AM
723 }
724 }
725
726 if (num_group != (unsigned) -1)
727 {
728 unsigned int i;
729
730 for (i = 0; i < num_group; i++)
731 {
732 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
733 Elf_Internal_Group *idx = (Elf_Internal_Group *) shdr->contents;
734 unsigned int n_elt = shdr->sh_size / 4;
735
736 /* Look through this group's sections to see if current
737 section is a member. */
738 while (--n_elt != 0)
739 if ((++idx)->shdr == hdr)
740 {
e0e8c97f 741 asection *s = NULL;
dbb410c3
AM
742
743 /* We are a member of this group. Go looking through
744 other members to see if any others are linked via
745 next_in_group. */
746 idx = (Elf_Internal_Group *) shdr->contents;
747 n_elt = shdr->sh_size / 4;
748 while (--n_elt != 0)
749 if ((s = (++idx)->shdr->bfd_section) != NULL
945906ff 750 && elf_next_in_group (s) != NULL)
dbb410c3
AM
751 break;
752 if (n_elt != 0)
753 {
dbb410c3
AM
754 /* Snarf the group name from other member, and
755 insert current section in circular list. */
945906ff
AM
756 elf_group_name (newsect) = elf_group_name (s);
757 elf_next_in_group (newsect) = elf_next_in_group (s);
758 elf_next_in_group (s) = newsect;
dbb410c3
AM
759 }
760 else
761 {
dbb410c3
AM
762 const char *gname;
763
b885599b
AM
764 gname = group_signature (abfd, shdr);
765 if (gname == NULL)
b34976b6 766 return FALSE;
945906ff 767 elf_group_name (newsect) = gname;
dbb410c3
AM
768
769 /* Start a circular list with one element. */
945906ff 770 elf_next_in_group (newsect) = newsect;
dbb410c3 771 }
b885599b 772
9dce4196
AM
773 /* If the group section has been created, point to the
774 new member. */
dbb410c3 775 if (shdr->bfd_section != NULL)
945906ff 776 elf_next_in_group (shdr->bfd_section) = newsect;
b885599b 777
dbb410c3
AM
778 i = num_group - 1;
779 break;
780 }
781 }
782 }
783
945906ff 784 if (elf_group_name (newsect) == NULL)
dbb410c3 785 {
695344c0 786 /* xgettext:c-format */
4eca0228
AM
787 _bfd_error_handler (_("%B: no group info for section %A"),
788 abfd, newsect);
493a3386 789 return FALSE;
dbb410c3 790 }
b34976b6 791 return TRUE;
dbb410c3
AM
792}
793
3d7f7666 794bfd_boolean
dd863624 795_bfd_elf_setup_sections (bfd *abfd)
3d7f7666
L
796{
797 unsigned int i;
798 unsigned int num_group = elf_tdata (abfd)->num_group;
799 bfd_boolean result = TRUE;
dd863624
L
800 asection *s;
801
802 /* Process SHF_LINK_ORDER. */
803 for (s = abfd->sections; s != NULL; s = s->next)
804 {
805 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
806 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
807 {
808 unsigned int elfsec = this_hdr->sh_link;
809 /* FIXME: The old Intel compiler and old strip/objcopy may
810 not set the sh_link or sh_info fields. Hence we could
811 get the situation where elfsec is 0. */
812 if (elfsec == 0)
813 {
4fbb74a6 814 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
dd863624
L
815 if (bed->link_order_error_handler)
816 bed->link_order_error_handler
695344c0 817 /* xgettext:c-format */
dd863624
L
818 (_("%B: warning: sh_link not set for section `%A'"),
819 abfd, s);
820 }
821 else
822 {
91d6fa6a 823 asection *linksec = NULL;
25bbc984 824
4fbb74a6
AM
825 if (elfsec < elf_numsections (abfd))
826 {
827 this_hdr = elf_elfsections (abfd)[elfsec];
91d6fa6a 828 linksec = this_hdr->bfd_section;
4fbb74a6 829 }
25bbc984
L
830
831 /* PR 1991, 2008:
832 Some strip/objcopy may leave an incorrect value in
833 sh_link. We don't want to proceed. */
91d6fa6a 834 if (linksec == NULL)
25bbc984 835 {
4eca0228 836 _bfd_error_handler
695344c0 837 /* xgettext:c-format */
25bbc984
L
838 (_("%B: sh_link [%d] in section `%A' is incorrect"),
839 s->owner, s, elfsec);
840 result = FALSE;
841 }
842
91d6fa6a 843 elf_linked_to_section (s) = linksec;
dd863624
L
844 }
845 }
53720c49
AM
846 else if (this_hdr->sh_type == SHT_GROUP
847 && elf_next_in_group (s) == NULL)
848 {
4eca0228 849 _bfd_error_handler
695344c0 850 /* xgettext:c-format */
53720c49
AM
851 (_("%B: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
852 abfd, elf_section_data (s)->this_idx);
853 result = FALSE;
854 }
dd863624 855 }
3d7f7666 856
dd863624 857 /* Process section groups. */
3d7f7666
L
858 if (num_group == (unsigned) -1)
859 return result;
860
861 for (i = 0; i < num_group; i++)
862 {
863 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
4b0e8a5f
NC
864 Elf_Internal_Group *idx;
865 unsigned int n_elt;
3d7f7666 866
4b0e8a5f
NC
867 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
868 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
869 {
4eca0228 870 _bfd_error_handler
695344c0 871 /* xgettext:c-format */
4b0e8a5f
NC
872 (_("%B: section group entry number %u is corrupt"),
873 abfd, i);
874 result = FALSE;
875 continue;
876 }
877
878 idx = (Elf_Internal_Group *) shdr->contents;
879 n_elt = shdr->sh_size / 4;
1b786873 880
3d7f7666
L
881 while (--n_elt != 0)
882 if ((++idx)->shdr->bfd_section)
883 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
884 else if (idx->shdr->sh_type == SHT_RELA
885 || idx->shdr->sh_type == SHT_REL)
886 /* We won't include relocation sections in section groups in
887 output object files. We adjust the group section size here
888 so that relocatable link will work correctly when
889 relocation sections are in section group in input object
890 files. */
891 shdr->bfd_section->size -= 4;
892 else
893 {
894 /* There are some unknown sections in the group. */
4eca0228 895 _bfd_error_handler
695344c0 896 /* xgettext:c-format */
d003868e
AM
897 (_("%B: unknown [%d] section `%s' in group [%s]"),
898 abfd,
3d7f7666 899 (unsigned int) idx->shdr->sh_type,
1b3a8575
AM
900 bfd_elf_string_from_elf_section (abfd,
901 (elf_elfheader (abfd)
902 ->e_shstrndx),
903 idx->shdr->sh_name),
3d7f7666
L
904 shdr->bfd_section->name);
905 result = FALSE;
906 }
907 }
908 return result;
909}
910
72adc230
AM
911bfd_boolean
912bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
913{
914 return elf_next_in_group (sec) != NULL;
915}
916
f6fe1ccd
L
917static char *
918convert_debug_to_zdebug (bfd *abfd, const char *name)
919{
920 unsigned int len = strlen (name);
921 char *new_name = bfd_alloc (abfd, len + 2);
922 if (new_name == NULL)
923 return NULL;
924 new_name[0] = '.';
925 new_name[1] = 'z';
926 memcpy (new_name + 2, name + 1, len);
927 return new_name;
928}
929
930static char *
931convert_zdebug_to_debug (bfd *abfd, const char *name)
932{
933 unsigned int len = strlen (name);
934 char *new_name = bfd_alloc (abfd, len);
935 if (new_name == NULL)
936 return NULL;
937 new_name[0] = '.';
938 memcpy (new_name + 1, name + 2, len - 1);
939 return new_name;
940}
941
252b5132
RH
942/* Make a BFD section from an ELF section. We store a pointer to the
943 BFD section in the bfd_section field of the header. */
944
b34976b6 945bfd_boolean
217aa764
AM
946_bfd_elf_make_section_from_shdr (bfd *abfd,
947 Elf_Internal_Shdr *hdr,
6dc132d9
L
948 const char *name,
949 int shindex)
252b5132
RH
950{
951 asection *newsect;
952 flagword flags;
9c5bfbb7 953 const struct elf_backend_data *bed;
252b5132
RH
954
955 if (hdr->bfd_section != NULL)
4e011fb5 956 return TRUE;
252b5132
RH
957
958 newsect = bfd_make_section_anyway (abfd, name);
959 if (newsect == NULL)
b34976b6 960 return FALSE;
252b5132 961
1829f4b2
AM
962 hdr->bfd_section = newsect;
963 elf_section_data (newsect)->this_hdr = *hdr;
6dc132d9 964 elf_section_data (newsect)->this_idx = shindex;
1829f4b2 965
2f89ff8d
L
966 /* Always use the real type/flags. */
967 elf_section_type (newsect) = hdr->sh_type;
968 elf_section_flags (newsect) = hdr->sh_flags;
969
252b5132
RH
970 newsect->filepos = hdr->sh_offset;
971
972 if (! bfd_set_section_vma (abfd, newsect, hdr->sh_addr)
973 || ! bfd_set_section_size (abfd, newsect, hdr->sh_size)
974 || ! bfd_set_section_alignment (abfd, newsect,
72de5009 975 bfd_log2 (hdr->sh_addralign)))
b34976b6 976 return FALSE;
252b5132
RH
977
978 flags = SEC_NO_FLAGS;
979 if (hdr->sh_type != SHT_NOBITS)
980 flags |= SEC_HAS_CONTENTS;
dbb410c3 981 if (hdr->sh_type == SHT_GROUP)
b3096250 982 flags |= SEC_GROUP | SEC_EXCLUDE;
252b5132
RH
983 if ((hdr->sh_flags & SHF_ALLOC) != 0)
984 {
985 flags |= SEC_ALLOC;
986 if (hdr->sh_type != SHT_NOBITS)
987 flags |= SEC_LOAD;
988 }
989 if ((hdr->sh_flags & SHF_WRITE) == 0)
990 flags |= SEC_READONLY;
991 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
992 flags |= SEC_CODE;
993 else if ((flags & SEC_LOAD) != 0)
994 flags |= SEC_DATA;
f5fa8ca2
JJ
995 if ((hdr->sh_flags & SHF_MERGE) != 0)
996 {
997 flags |= SEC_MERGE;
998 newsect->entsize = hdr->sh_entsize;
f5fa8ca2 999 }
84865015
NC
1000 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1001 flags |= SEC_STRINGS;
dbb410c3
AM
1002 if (hdr->sh_flags & SHF_GROUP)
1003 if (!setup_group (abfd, hdr, newsect))
b34976b6 1004 return FALSE;
13ae64f3
JJ
1005 if ((hdr->sh_flags & SHF_TLS) != 0)
1006 flags |= SEC_THREAD_LOCAL;
18ae9cc1
L
1007 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1008 flags |= SEC_EXCLUDE;
252b5132 1009
3d2b39cf 1010 if ((flags & SEC_ALLOC) == 0)
7a6cc5fb 1011 {
3d2b39cf
L
1012 /* The debugging sections appear to be recognized only by name,
1013 not any sort of flag. Their SEC_ALLOC bits are cleared. */
3d2b39cf
L
1014 if (name [0] == '.')
1015 {
f073ced3
AM
1016 const char *p;
1017 int n;
1018 if (name[1] == 'd')
1019 p = ".debug", n = 6;
1020 else if (name[1] == 'g' && name[2] == 'n')
1021 p = ".gnu.linkonce.wi.", n = 17;
1022 else if (name[1] == 'g' && name[2] == 'd')
1023 p = ".gdb_index", n = 11; /* yes we really do mean 11. */
1024 else if (name[1] == 'l')
1025 p = ".line", n = 5;
1026 else if (name[1] == 's')
1027 p = ".stab", n = 5;
1028 else if (name[1] == 'z')
1029 p = ".zdebug", n = 7;
1030 else
1031 p = NULL, n = 0;
1032 if (p != NULL && strncmp (name, p, n) == 0)
3d2b39cf
L
1033 flags |= SEC_DEBUGGING;
1034 }
1035 }
252b5132
RH
1036
1037 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1038 only link a single copy of the section. This is used to support
1039 g++. g++ will emit each template expansion in its own section.
1040 The symbols will be defined as weak, so that multiple definitions
1041 are permitted. The GNU linker extension is to actually discard
1042 all but one of the sections. */
0112cd26 1043 if (CONST_STRNEQ (name, ".gnu.linkonce")
b885599b 1044 && elf_next_in_group (newsect) == NULL)
252b5132
RH
1045 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1046
fa152c49
JW
1047 bed = get_elf_backend_data (abfd);
1048 if (bed->elf_backend_section_flags)
1049 if (! bed->elf_backend_section_flags (&flags, hdr))
b34976b6 1050 return FALSE;
fa152c49 1051
252b5132 1052 if (! bfd_set_section_flags (abfd, newsect, flags))
b34976b6 1053 return FALSE;
252b5132 1054
718175fa
JK
1055 /* We do not parse the PT_NOTE segments as we are interested even in the
1056 separate debug info files which may have the segments offsets corrupted.
1057 PT_NOTEs from the core files are currently not parsed using BFD. */
1058 if (hdr->sh_type == SHT_NOTE)
1059 {
baea7ef1 1060 bfd_byte *contents;
718175fa 1061
baea7ef1 1062 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
718175fa
JK
1063 return FALSE;
1064
baea7ef1 1065 elf_parse_notes (abfd, (char *) contents, hdr->sh_size, -1);
718175fa
JK
1066 free (contents);
1067 }
1068
252b5132
RH
1069 if ((flags & SEC_ALLOC) != 0)
1070 {
1071 Elf_Internal_Phdr *phdr;
6ffd7900
AM
1072 unsigned int i, nload;
1073
1074 /* Some ELF linkers produce binaries with all the program header
1075 p_paddr fields zero. If we have such a binary with more than
1076 one PT_LOAD header, then leave the section lma equal to vma
1077 so that we don't create sections with overlapping lma. */
1078 phdr = elf_tdata (abfd)->phdr;
1079 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1080 if (phdr->p_paddr != 0)
1081 break;
1082 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1083 ++nload;
1084 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1085 return TRUE;
252b5132 1086
252b5132
RH
1087 phdr = elf_tdata (abfd)->phdr;
1088 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1089 {
86b2281f
AM
1090 if (((phdr->p_type == PT_LOAD
1091 && (hdr->sh_flags & SHF_TLS) == 0)
1092 || phdr->p_type == PT_TLS)
9a83a553 1093 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
252b5132 1094 {
88967714
AM
1095 if ((flags & SEC_LOAD) == 0)
1096 newsect->lma = (phdr->p_paddr
1097 + hdr->sh_addr - phdr->p_vaddr);
1098 else
1099 /* We used to use the same adjustment for SEC_LOAD
1100 sections, but that doesn't work if the segment
1101 is packed with code from multiple VMAs.
1102 Instead we calculate the section LMA based on
1103 the segment LMA. It is assumed that the
1104 segment will contain sections with contiguous
1105 LMAs, even if the VMAs are not. */
1106 newsect->lma = (phdr->p_paddr
1107 + hdr->sh_offset - phdr->p_offset);
1108
1109 /* With contiguous segments, we can't tell from file
1110 offsets whether a section with zero size should
1111 be placed at the end of one segment or the
1112 beginning of the next. Decide based on vaddr. */
1113 if (hdr->sh_addr >= phdr->p_vaddr
1114 && (hdr->sh_addr + hdr->sh_size
1115 <= phdr->p_vaddr + phdr->p_memsz))
1116 break;
252b5132
RH
1117 }
1118 }
1119 }
1120
4a114e3e
L
1121 /* Compress/decompress DWARF debug sections with names: .debug_* and
1122 .zdebug_*, after the section flags is set. */
1123 if ((flags & SEC_DEBUGGING)
1124 && ((name[1] == 'd' && name[6] == '_')
1125 || (name[1] == 'z' && name[7] == '_')))
1126 {
1127 enum { nothing, compress, decompress } action = nothing;
151411f8 1128 int compression_header_size;
dab394de 1129 bfd_size_type uncompressed_size;
151411f8
L
1130 bfd_boolean compressed
1131 = bfd_is_section_compressed_with_header (abfd, newsect,
dab394de
L
1132 &compression_header_size,
1133 &uncompressed_size);
4a114e3e 1134
151411f8 1135 if (compressed)
4a114e3e
L
1136 {
1137 /* Compressed section. Check if we should decompress. */
1138 if ((abfd->flags & BFD_DECOMPRESS))
1139 action = decompress;
1140 }
151411f8
L
1141
1142 /* Compress the uncompressed section or convert from/to .zdebug*
1143 section. Check if we should compress. */
1144 if (action == nothing)
4a114e3e 1145 {
151411f8
L
1146 if (newsect->size != 0
1147 && (abfd->flags & BFD_COMPRESS)
1148 && compression_header_size >= 0
dab394de 1149 && uncompressed_size > 0
151411f8
L
1150 && (!compressed
1151 || ((compression_header_size > 0)
1152 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
4a114e3e 1153 action = compress;
151411f8
L
1154 else
1155 return TRUE;
4a114e3e
L
1156 }
1157
151411f8 1158 if (action == compress)
4a114e3e 1159 {
4a114e3e
L
1160 if (!bfd_init_section_compress_status (abfd, newsect))
1161 {
4eca0228 1162 _bfd_error_handler
695344c0 1163 /* xgettext:c-format */
bc823199 1164 (_("%B: unable to initialize compress status for section %s"),
4a114e3e
L
1165 abfd, name);
1166 return FALSE;
1167 }
151411f8
L
1168 }
1169 else
1170 {
4a114e3e
L
1171 if (!bfd_init_section_decompress_status (abfd, newsect))
1172 {
4eca0228 1173 _bfd_error_handler
695344c0 1174 /* xgettext:c-format */
bc823199 1175 (_("%B: unable to initialize decompress status for section %s"),
4a114e3e
L
1176 abfd, name);
1177 return FALSE;
1178 }
151411f8
L
1179 }
1180
f6fe1ccd 1181 if (abfd->is_linker_input)
151411f8 1182 {
f6fe1ccd
L
1183 if (name[1] == 'z'
1184 && (action == decompress
1185 || (action == compress
1186 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
4e011fb5 1187 {
f6fe1ccd
L
1188 /* Convert section name from .zdebug_* to .debug_* so
1189 that linker will consider this section as a debug
1190 section. */
1191 char *new_name = convert_zdebug_to_debug (abfd, name);
151411f8
L
1192 if (new_name == NULL)
1193 return FALSE;
f6fe1ccd 1194 bfd_rename_section (abfd, newsect, new_name);
151411f8 1195 }
4a114e3e 1196 }
f6fe1ccd
L
1197 else
1198 /* For objdump, don't rename the section. For objcopy, delay
1199 section rename to elf_fake_sections. */
1200 newsect->flags |= SEC_ELF_RENAME;
4a114e3e
L
1201 }
1202
b34976b6 1203 return TRUE;
252b5132
RH
1204}
1205
84865015
NC
1206const char *const bfd_elf_section_type_names[] =
1207{
252b5132
RH
1208 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1209 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1210 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1211};
1212
1049f94e 1213/* ELF relocs are against symbols. If we are producing relocatable
252b5132
RH
1214 output, and the reloc is against an external symbol, and nothing
1215 has given us any additional addend, the resulting reloc will also
1216 be against the same symbol. In such a case, we don't want to
1217 change anything about the way the reloc is handled, since it will
1218 all be done at final link time. Rather than put special case code
1219 into bfd_perform_relocation, all the reloc types use this howto
1220 function. It just short circuits the reloc if producing
1049f94e 1221 relocatable output against an external symbol. */
252b5132 1222
252b5132 1223bfd_reloc_status_type
217aa764
AM
1224bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1225 arelent *reloc_entry,
1226 asymbol *symbol,
1227 void *data ATTRIBUTE_UNUSED,
1228 asection *input_section,
1229 bfd *output_bfd,
1230 char **error_message ATTRIBUTE_UNUSED)
1231{
1232 if (output_bfd != NULL
252b5132
RH
1233 && (symbol->flags & BSF_SECTION_SYM) == 0
1234 && (! reloc_entry->howto->partial_inplace
1235 || reloc_entry->addend == 0))
1236 {
1237 reloc_entry->address += input_section->output_offset;
1238 return bfd_reloc_ok;
1239 }
1240
1241 return bfd_reloc_continue;
1242}
1243\f
84865015
NC
1244/* Returns TRUE if section A matches section B.
1245 Names, addresses and links may be different, but everything else
1246 should be the same. */
1247
1248static bfd_boolean
5522f910
NC
1249section_match (const Elf_Internal_Shdr * a,
1250 const Elf_Internal_Shdr * b)
84865015
NC
1251{
1252 return
1253 a->sh_type == b->sh_type
5522f910
NC
1254 && (a->sh_flags & ~ SHF_INFO_LINK)
1255 == (b->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1256 && a->sh_addralign == b->sh_addralign
1257 && a->sh_size == b->sh_size
1258 && a->sh_entsize == b->sh_entsize
1259 /* FIXME: Check sh_addr ? */
1260 ;
1261}
1262
1263/* Find a section in OBFD that has the same characteristics
1264 as IHEADER. Return the index of this section or SHN_UNDEF if
1265 none can be found. Check's section HINT first, as this is likely
1266 to be the correct section. */
1267
1268static unsigned int
5522f910 1269find_link (const bfd * obfd, const Elf_Internal_Shdr * iheader, const unsigned int hint)
84865015
NC
1270{
1271 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1272 unsigned int i;
1273
1274 if (section_match (oheaders[hint], iheader))
1275 return hint;
1276
1277 for (i = 1; i < elf_numsections (obfd); i++)
1278 {
1279 Elf_Internal_Shdr * oheader = oheaders[i];
1280
1281 if (section_match (oheader, iheader))
1282 /* FIXME: Do we care if there is a potential for
1283 multiple matches ? */
1284 return i;
1285 }
1286
1287 return SHN_UNDEF;
1288}
1289
5522f910
NC
1290/* PR 19938: Attempt to set the ELF section header fields of an OS or
1291 Processor specific section, based upon a matching input section.
1292 Returns TRUE upon success, FALSE otherwise. */
1293
1294static bfd_boolean
1295copy_special_section_fields (const bfd *ibfd,
1296 bfd *obfd,
1297 const Elf_Internal_Shdr *iheader,
1298 Elf_Internal_Shdr *oheader,
1299 const unsigned int secnum)
1300{
1301 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1302 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1303 bfd_boolean changed = FALSE;
1304 unsigned int sh_link;
1305
1306 if (oheader->sh_type == SHT_NOBITS)
1307 {
1308 /* This is a feature for objcopy --only-keep-debug:
1309 When a section's type is changed to NOBITS, we preserve
1310 the sh_link and sh_info fields so that they can be
1311 matched up with the original.
1312
1313 Note: Strictly speaking these assignments are wrong.
1314 The sh_link and sh_info fields should point to the
1315 relevent sections in the output BFD, which may not be in
1316 the same location as they were in the input BFD. But
1317 the whole point of this action is to preserve the
1318 original values of the sh_link and sh_info fields, so
1319 that they can be matched up with the section headers in
1320 the original file. So strictly speaking we may be
1321 creating an invalid ELF file, but it is only for a file
1322 that just contains debug info and only for sections
1323 without any contents. */
1324 if (oheader->sh_link == 0)
1325 oheader->sh_link = iheader->sh_link;
1326 if (oheader->sh_info == 0)
1327 oheader->sh_info = iheader->sh_info;
1328 return TRUE;
1329 }
1330
1331 /* Allow the target a chance to decide how these fields should be set. */
1332 if (bed->elf_backend_copy_special_section_fields != NULL
1333 && bed->elf_backend_copy_special_section_fields
1334 (ibfd, obfd, iheader, oheader))
1335 return TRUE;
1336
1337 /* We have an iheader which might match oheader, and which has non-zero
1338 sh_info and/or sh_link fields. Attempt to follow those links and find
1339 the section in the output bfd which corresponds to the linked section
1340 in the input bfd. */
1341 if (iheader->sh_link != SHN_UNDEF)
1342 {
1343 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1344 if (sh_link != SHN_UNDEF)
1345 {
1346 oheader->sh_link = sh_link;
1347 changed = TRUE;
1348 }
1349 else
1350 /* FIXME: Should we install iheader->sh_link
1351 if we could not find a match ? */
1352 (* _bfd_error_handler)
695344c0 1353 /* xgettext:c-format */
5522f910
NC
1354 (_("%B: Failed to find link section for section %d"), obfd, secnum);
1355 }
1356
1357 if (iheader->sh_info)
1358 {
1359 /* The sh_info field can hold arbitrary information, but if the
1360 SHF_LINK_INFO flag is set then it should be interpreted as a
1361 section index. */
1362 if (iheader->sh_flags & SHF_INFO_LINK)
1363 {
1364 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1365 iheader->sh_info);
1366 if (sh_link != SHN_UNDEF)
1367 oheader->sh_flags |= SHF_INFO_LINK;
1368 }
1369 else
1370 /* No idea what it means - just copy it. */
1371 sh_link = iheader->sh_info;
1372
1373 if (sh_link != SHN_UNDEF)
1374 {
1375 oheader->sh_info = sh_link;
1376 changed = TRUE;
1377 }
1378 else
1379 (* _bfd_error_handler)
695344c0 1380 /* xgettext:c-format */
5522f910
NC
1381 (_("%B: Failed to find info section for section %d"), obfd, secnum);
1382 }
1383
1384 return changed;
1385}
1386
0ac4564e
L
1387/* Copy the program header and other data from one object module to
1388 another. */
252b5132 1389
b34976b6 1390bfd_boolean
217aa764 1391_bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
2d502050 1392{
5522f910
NC
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1395 const struct elf_backend_data *bed;
84865015
NC
1396 unsigned int i;
1397
2d502050 1398 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
84865015 1399 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 1400 return TRUE;
2d502050 1401
57b828ef
L
1402 if (!elf_flags_init (obfd))
1403 {
1404 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1405 elf_flags_init (obfd) = TRUE;
1406 }
2d502050 1407
0ac4564e 1408 elf_gp (obfd) = elf_gp (ibfd);
57b828ef
L
1409
1410 /* Also copy the EI_OSABI field. */
1411 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1412 elf_elfheader (ibfd)->e_ident[EI_OSABI];
104d59d1 1413
5522f910
NC
1414 /* If set, copy the EI_ABIVERSION field. */
1415 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1416 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1417 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1418
104d59d1
JM
1419 /* Copy object attributes. */
1420 _bfd_elf_copy_obj_attributes (ibfd, obfd);
63b9bbb7 1421
84865015
NC
1422 if (iheaders == NULL || oheaders == NULL)
1423 return TRUE;
63b9bbb7 1424
5522f910
NC
1425 bed = get_elf_backend_data (obfd);
1426
1427 /* Possibly copy other fields in the section header. */
84865015 1428 for (i = 1; i < elf_numsections (obfd); i++)
63b9bbb7 1429 {
84865015
NC
1430 unsigned int j;
1431 Elf_Internal_Shdr * oheader = oheaders[i];
63b9bbb7 1432
5522f910
NC
1433 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1434 because of a special case need for generating separate debug info
1435 files. See below for more details. */
84865015
NC
1436 if (oheader == NULL
1437 || (oheader->sh_type != SHT_NOBITS
5522f910
NC
1438 && oheader->sh_type < SHT_LOOS))
1439 continue;
1440
1441 /* Ignore empty sections, and sections whose
1442 fields have already been initialised. */
1443 if (oheader->sh_size == 0
84865015
NC
1444 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1445 continue;
63b9bbb7 1446
84865015 1447 /* Scan for the matching section in the input bfd.
5522f910
NC
1448 First we try for a direct mapping between the input and output sections. */
1449 for (j = 1; j < elf_numsections (ibfd); j++)
1450 {
1451 const Elf_Internal_Shdr * iheader = iheaders[j];
1452
1453 if (iheader == NULL)
1454 continue;
1455
1456 if (oheader->bfd_section != NULL
1457 && iheader->bfd_section != NULL
1458 && iheader->bfd_section->output_section != NULL
1459 && iheader->bfd_section->output_section == oheader->bfd_section)
1460 {
1461 /* We have found a connection from the input section to the
1462 output section. Attempt to copy the header fields. If
1463 this fails then do not try any further sections - there
1464 should only be a one-to-one mapping between input and output. */
1465 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1466 j = elf_numsections (ibfd);
1467 break;
1468 }
1469 }
1470
1471 if (j < elf_numsections (ibfd))
1472 continue;
1473
1474 /* That failed. So try to deduce the corresponding input section.
84865015
NC
1475 Unfortunately we cannot compare names as the output string table
1476 is empty, so instead we check size, address and type. */
1477 for (j = 1; j < elf_numsections (ibfd); j++)
1478 {
5522f910 1479 const Elf_Internal_Shdr * iheader = iheaders[j];
84865015 1480
5522f910
NC
1481 if (iheader == NULL)
1482 continue;
1483
1484 /* Try matching fields in the input section's header.
1485 Since --only-keep-debug turns all non-debug sections into
84865015
NC
1486 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1487 input type. */
1488 if ((oheader->sh_type == SHT_NOBITS
1489 || iheader->sh_type == oheader->sh_type)
5522f910
NC
1490 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1491 == (oheader->sh_flags & ~ SHF_INFO_LINK)
84865015
NC
1492 && iheader->sh_addralign == oheader->sh_addralign
1493 && iheader->sh_entsize == oheader->sh_entsize
1494 && iheader->sh_size == oheader->sh_size
1495 && iheader->sh_addr == oheader->sh_addr
1496 && (iheader->sh_info != oheader->sh_info
1497 || iheader->sh_link != oheader->sh_link))
63b9bbb7 1498 {
5522f910
NC
1499 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1500 break;
63b9bbb7
NC
1501 }
1502 }
5522f910
NC
1503
1504 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1505 {
1506 /* Final attempt. Call the backend copy function
1507 with a NULL input section. */
1508 if (bed->elf_backend_copy_special_section_fields != NULL)
1509 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1510 }
63b9bbb7
NC
1511 }
1512
b34976b6 1513 return TRUE;
2d502050
L
1514}
1515
cedc298e
L
1516static const char *
1517get_segment_type (unsigned int p_type)
1518{
1519 const char *pt;
1520 switch (p_type)
1521 {
1522 case PT_NULL: pt = "NULL"; break;
1523 case PT_LOAD: pt = "LOAD"; break;
1524 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1525 case PT_INTERP: pt = "INTERP"; break;
1526 case PT_NOTE: pt = "NOTE"; break;
1527 case PT_SHLIB: pt = "SHLIB"; break;
1528 case PT_PHDR: pt = "PHDR"; break;
1529 case PT_TLS: pt = "TLS"; break;
1530 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
2b05f1b7 1531 case PT_GNU_STACK: pt = "STACK"; break;
cedc298e
L
1532 case PT_GNU_RELRO: pt = "RELRO"; break;
1533 default: pt = NULL; break;
1534 }
1535 return pt;
1536}
1537
f0b79d91
L
1538/* Print out the program headers. */
1539
b34976b6 1540bfd_boolean
217aa764 1541_bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
252b5132 1542{
a50b1753 1543 FILE *f = (FILE *) farg;
252b5132
RH
1544 Elf_Internal_Phdr *p;
1545 asection *s;
1546 bfd_byte *dynbuf = NULL;
1547
1548 p = elf_tdata (abfd)->phdr;
1549 if (p != NULL)
1550 {
1551 unsigned int i, c;
1552
1553 fprintf (f, _("\nProgram Header:\n"));
1554 c = elf_elfheader (abfd)->e_phnum;
1555 for (i = 0; i < c; i++, p++)
1556 {
cedc298e 1557 const char *pt = get_segment_type (p->p_type);
252b5132
RH
1558 char buf[20];
1559
cedc298e 1560 if (pt == NULL)
252b5132 1561 {
cedc298e
L
1562 sprintf (buf, "0x%lx", p->p_type);
1563 pt = buf;
252b5132 1564 }
dc810e39 1565 fprintf (f, "%8s off 0x", pt);
60b89a18 1566 bfd_fprintf_vma (abfd, f, p->p_offset);
252b5132 1567 fprintf (f, " vaddr 0x");
60b89a18 1568 bfd_fprintf_vma (abfd, f, p->p_vaddr);
252b5132 1569 fprintf (f, " paddr 0x");
60b89a18 1570 bfd_fprintf_vma (abfd, f, p->p_paddr);
252b5132
RH
1571 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1572 fprintf (f, " filesz 0x");
60b89a18 1573 bfd_fprintf_vma (abfd, f, p->p_filesz);
252b5132 1574 fprintf (f, " memsz 0x");
60b89a18 1575 bfd_fprintf_vma (abfd, f, p->p_memsz);
252b5132
RH
1576 fprintf (f, " flags %c%c%c",
1577 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1578 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1579 (p->p_flags & PF_X) != 0 ? 'x' : '-');
dc810e39
AM
1580 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1581 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
252b5132
RH
1582 fprintf (f, "\n");
1583 }
1584 }
1585
1586 s = bfd_get_section_by_name (abfd, ".dynamic");
1587 if (s != NULL)
1588 {
cb33740c 1589 unsigned int elfsec;
dc810e39 1590 unsigned long shlink;
252b5132
RH
1591 bfd_byte *extdyn, *extdynend;
1592 size_t extdynsize;
217aa764 1593 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
252b5132
RH
1594
1595 fprintf (f, _("\nDynamic Section:\n"));
1596
eea6121a 1597 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
252b5132
RH
1598 goto error_return;
1599
1600 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
cb33740c 1601 if (elfsec == SHN_BAD)
252b5132 1602 goto error_return;
dc810e39 1603 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1604
1605 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1606 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1607
1608 extdyn = dynbuf;
06614111
NC
1609 /* PR 17512: file: 6f427532. */
1610 if (s->size < extdynsize)
1611 goto error_return;
eea6121a 1612 extdynend = extdyn + s->size;
1036838a
NC
1613 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1614 Fix range check. */
1615 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
252b5132
RH
1616 {
1617 Elf_Internal_Dyn dyn;
ad9563d6 1618 const char *name = "";
252b5132 1619 char ab[20];
b34976b6 1620 bfd_boolean stringp;
ad9563d6 1621 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 1622
217aa764 1623 (*swap_dyn_in) (abfd, extdyn, &dyn);
252b5132
RH
1624
1625 if (dyn.d_tag == DT_NULL)
1626 break;
1627
b34976b6 1628 stringp = FALSE;
252b5132
RH
1629 switch (dyn.d_tag)
1630 {
1631 default:
ad9563d6
CM
1632 if (bed->elf_backend_get_target_dtag)
1633 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1634
1635 if (!strcmp (name, ""))
1636 {
1637 sprintf (ab, "0x%lx", (unsigned long) dyn.d_tag);
1638 name = ab;
1639 }
252b5132
RH
1640 break;
1641
b34976b6 1642 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
252b5132
RH
1643 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1644 case DT_PLTGOT: name = "PLTGOT"; break;
1645 case DT_HASH: name = "HASH"; break;
1646 case DT_STRTAB: name = "STRTAB"; break;
1647 case DT_SYMTAB: name = "SYMTAB"; break;
1648 case DT_RELA: name = "RELA"; break;
1649 case DT_RELASZ: name = "RELASZ"; break;
1650 case DT_RELAENT: name = "RELAENT"; break;
1651 case DT_STRSZ: name = "STRSZ"; break;
1652 case DT_SYMENT: name = "SYMENT"; break;
1653 case DT_INIT: name = "INIT"; break;
1654 case DT_FINI: name = "FINI"; break;
b34976b6
AM
1655 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1656 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
252b5132
RH
1657 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1658 case DT_REL: name = "REL"; break;
1659 case DT_RELSZ: name = "RELSZ"; break;
1660 case DT_RELENT: name = "RELENT"; break;
1661 case DT_PLTREL: name = "PLTREL"; break;
1662 case DT_DEBUG: name = "DEBUG"; break;
1663 case DT_TEXTREL: name = "TEXTREL"; break;
1664 case DT_JMPREL: name = "JMPREL"; break;
94558834
L
1665 case DT_BIND_NOW: name = "BIND_NOW"; break;
1666 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1667 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1668 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1669 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
b34976b6 1670 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
94558834
L
1671 case DT_FLAGS: name = "FLAGS"; break;
1672 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1673 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
d48188b9 1674 case DT_CHECKSUM: name = "CHECKSUM"; break;
94558834
L
1675 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1676 case DT_MOVEENT: name = "MOVEENT"; break;
1677 case DT_MOVESZ: name = "MOVESZ"; break;
1678 case DT_FEATURE: name = "FEATURE"; break;
1679 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1680 case DT_SYMINSZ: name = "SYMINSZ"; break;
1681 case DT_SYMINENT: name = "SYMINENT"; break;
b34976b6
AM
1682 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1683 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1684 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
94558834
L
1685 case DT_PLTPAD: name = "PLTPAD"; break;
1686 case DT_MOVETAB: name = "MOVETAB"; break;
1687 case DT_SYMINFO: name = "SYMINFO"; break;
1688 case DT_RELACOUNT: name = "RELACOUNT"; break;
1689 case DT_RELCOUNT: name = "RELCOUNT"; break;
1690 case DT_FLAGS_1: name = "FLAGS_1"; break;
252b5132
RH
1691 case DT_VERSYM: name = "VERSYM"; break;
1692 case DT_VERDEF: name = "VERDEF"; break;
1693 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1694 case DT_VERNEED: name = "VERNEED"; break;
1695 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
b34976b6 1696 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
94558834 1697 case DT_USED: name = "USED"; break;
b34976b6 1698 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
fdc90cb4 1699 case DT_GNU_HASH: name = "GNU_HASH"; break;
252b5132
RH
1700 }
1701
ad9563d6 1702 fprintf (f, " %-20s ", name);
252b5132 1703 if (! stringp)
a1f3c56e
AN
1704 {
1705 fprintf (f, "0x");
1706 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1707 }
252b5132
RH
1708 else
1709 {
1710 const char *string;
dc810e39 1711 unsigned int tagv = dyn.d_un.d_val;
252b5132 1712
dc810e39 1713 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132
RH
1714 if (string == NULL)
1715 goto error_return;
1716 fprintf (f, "%s", string);
1717 }
1718 fprintf (f, "\n");
1719 }
1720
1721 free (dynbuf);
1722 dynbuf = NULL;
1723 }
1724
1725 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1726 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1727 {
fc0e6df6 1728 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
b34976b6 1729 return FALSE;
252b5132
RH
1730 }
1731
1732 if (elf_dynverdef (abfd) != 0)
1733 {
1734 Elf_Internal_Verdef *t;
1735
1736 fprintf (f, _("\nVersion definitions:\n"));
1737 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1738 {
1739 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
d0fb9a8d
JJ
1740 t->vd_flags, t->vd_hash,
1741 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1742 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
252b5132
RH
1743 {
1744 Elf_Internal_Verdaux *a;
1745
1746 fprintf (f, "\t");
1747 for (a = t->vd_auxptr->vda_nextptr;
1748 a != NULL;
1749 a = a->vda_nextptr)
d0fb9a8d
JJ
1750 fprintf (f, "%s ",
1751 a->vda_nodename ? a->vda_nodename : "<corrupt>");
252b5132
RH
1752 fprintf (f, "\n");
1753 }
1754 }
1755 }
1756
1757 if (elf_dynverref (abfd) != 0)
1758 {
1759 Elf_Internal_Verneed *t;
1760
1761 fprintf (f, _("\nVersion References:\n"));
1762 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1763 {
1764 Elf_Internal_Vernaux *a;
1765
d0fb9a8d
JJ
1766 fprintf (f, _(" required from %s:\n"),
1767 t->vn_filename ? t->vn_filename : "<corrupt>");
252b5132
RH
1768 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1769 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
d0fb9a8d
JJ
1770 a->vna_flags, a->vna_other,
1771 a->vna_nodename ? a->vna_nodename : "<corrupt>");
252b5132
RH
1772 }
1773 }
1774
b34976b6 1775 return TRUE;
252b5132
RH
1776
1777 error_return:
1778 if (dynbuf != NULL)
1779 free (dynbuf);
b34976b6 1780 return FALSE;
252b5132
RH
1781}
1782
bb4d2ac2
L
1783/* Get version string. */
1784
1785const char *
60bb06bc
L
1786_bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1787 bfd_boolean *hidden)
bb4d2ac2
L
1788{
1789 const char *version_string = NULL;
1790 if (elf_dynversym (abfd) != 0
1791 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1792 {
1793 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1794
1795 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1796 vernum &= VERSYM_VERSION;
1797
1798 if (vernum == 0)
1799 version_string = "";
1800 else if (vernum == 1)
1801 version_string = "Base";
1802 else if (vernum <= elf_tdata (abfd)->cverdefs)
1803 version_string =
1804 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1805 else
1806 {
1807 Elf_Internal_Verneed *t;
1808
1809 version_string = "";
1810 for (t = elf_tdata (abfd)->verref;
1811 t != NULL;
1812 t = t->vn_nextref)
1813 {
1814 Elf_Internal_Vernaux *a;
1815
1816 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1817 {
1818 if (a->vna_other == vernum)
1819 {
1820 version_string = a->vna_nodename;
1821 break;
1822 }
1823 }
1824 }
1825 }
1826 }
1827 return version_string;
1828}
1829
252b5132
RH
1830/* Display ELF-specific fields of a symbol. */
1831
1832void
217aa764
AM
1833bfd_elf_print_symbol (bfd *abfd,
1834 void *filep,
1835 asymbol *symbol,
1836 bfd_print_symbol_type how)
252b5132 1837{
a50b1753 1838 FILE *file = (FILE *) filep;
252b5132
RH
1839 switch (how)
1840 {
1841 case bfd_print_symbol_name:
1842 fprintf (file, "%s", symbol->name);
1843 break;
1844 case bfd_print_symbol_more:
1845 fprintf (file, "elf ");
60b89a18 1846 bfd_fprintf_vma (abfd, file, symbol->value);
0af1713e 1847 fprintf (file, " %lx", (unsigned long) symbol->flags);
252b5132
RH
1848 break;
1849 case bfd_print_symbol_all:
1850 {
4e8a9624
AM
1851 const char *section_name;
1852 const char *name = NULL;
9c5bfbb7 1853 const struct elf_backend_data *bed;
7a13edea 1854 unsigned char st_other;
dbb410c3 1855 bfd_vma val;
bb4d2ac2
L
1856 const char *version_string;
1857 bfd_boolean hidden;
c044fabd 1858
252b5132 1859 section_name = symbol->section ? symbol->section->name : "(*none*)";
587ff49e
RH
1860
1861 bed = get_elf_backend_data (abfd);
1862 if (bed->elf_backend_print_symbol_all)
c044fabd 1863 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
587ff49e
RH
1864
1865 if (name == NULL)
1866 {
7ee38065 1867 name = symbol->name;
217aa764 1868 bfd_print_symbol_vandf (abfd, file, symbol);
587ff49e
RH
1869 }
1870
252b5132
RH
1871 fprintf (file, " %s\t", section_name);
1872 /* Print the "other" value for a symbol. For common symbols,
1873 we've already printed the size; now print the alignment.
1874 For other symbols, we have no specified alignment, and
1875 we've printed the address; now print the size. */
dcf6c779 1876 if (symbol->section && bfd_is_com_section (symbol->section))
dbb410c3
AM
1877 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1878 else
1879 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1880 bfd_fprintf_vma (abfd, file, val);
252b5132
RH
1881
1882 /* If we have version information, print it. */
60bb06bc
L
1883 version_string = _bfd_elf_get_symbol_version_string (abfd,
1884 symbol,
1885 &hidden);
bb4d2ac2 1886 if (version_string)
252b5132 1887 {
bb4d2ac2 1888 if (!hidden)
252b5132
RH
1889 fprintf (file, " %-11s", version_string);
1890 else
1891 {
1892 int i;
1893
1894 fprintf (file, " (%s)", version_string);
1895 for (i = 10 - strlen (version_string); i > 0; --i)
1896 putc (' ', file);
1897 }
1898 }
1899
1900 /* If the st_other field is not zero, print it. */
7a13edea 1901 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
c044fabd 1902
7a13edea
NC
1903 switch (st_other)
1904 {
1905 case 0: break;
1906 case STV_INTERNAL: fprintf (file, " .internal"); break;
1907 case STV_HIDDEN: fprintf (file, " .hidden"); break;
1908 case STV_PROTECTED: fprintf (file, " .protected"); break;
1909 default:
1910 /* Some other non-defined flags are also present, so print
1911 everything hex. */
1912 fprintf (file, " 0x%02x", (unsigned int) st_other);
1913 }
252b5132 1914
587ff49e 1915 fprintf (file, " %s", name);
252b5132
RH
1916 }
1917 break;
1918 }
1919}
252b5132
RH
1920\f
1921/* ELF .o/exec file reading */
1922
c044fabd 1923/* Create a new bfd section from an ELF section header. */
252b5132 1924
b34976b6 1925bfd_boolean
217aa764 1926bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
252b5132 1927{
4fbb74a6
AM
1928 Elf_Internal_Shdr *hdr;
1929 Elf_Internal_Ehdr *ehdr;
1930 const struct elf_backend_data *bed;
90937f86 1931 const char *name;
bf67003b
NC
1932 bfd_boolean ret = TRUE;
1933 static bfd_boolean * sections_being_created = NULL;
5a4b0ccc 1934 static bfd * sections_being_created_abfd = NULL;
bf67003b 1935 static unsigned int nesting = 0;
252b5132 1936
4fbb74a6
AM
1937 if (shindex >= elf_numsections (abfd))
1938 return FALSE;
1939
bf67003b
NC
1940 if (++ nesting > 3)
1941 {
1942 /* PR17512: A corrupt ELF binary might contain a recursive group of
06614111 1943 sections, with each the string indicies pointing to the next in the
bf67003b
NC
1944 loop. Detect this here, by refusing to load a section that we are
1945 already in the process of loading. We only trigger this test if
1946 we have nested at least three sections deep as normal ELF binaries
5a4b0ccc
NC
1947 can expect to recurse at least once.
1948
1949 FIXME: It would be better if this array was attached to the bfd,
1950 rather than being held in a static pointer. */
1951
1952 if (sections_being_created_abfd != abfd)
1953 sections_being_created = NULL;
bf67003b
NC
1954 if (sections_being_created == NULL)
1955 {
1956 /* FIXME: It would be more efficient to attach this array to the bfd somehow. */
1957 sections_being_created = (bfd_boolean *)
1958 bfd_zalloc (abfd, elf_numsections (abfd) * sizeof (bfd_boolean));
5a4b0ccc 1959 sections_being_created_abfd = abfd;
bf67003b
NC
1960 }
1961 if (sections_being_created [shindex])
1962 {
4eca0228 1963 _bfd_error_handler
bf67003b
NC
1964 (_("%B: warning: loop in section dependencies detected"), abfd);
1965 return FALSE;
1966 }
1967 sections_being_created [shindex] = TRUE;
1968 }
1969
4fbb74a6
AM
1970 hdr = elf_elfsections (abfd)[shindex];
1971 ehdr = elf_elfheader (abfd);
1972 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
1b3a8575 1973 hdr->sh_name);
933d961a 1974 if (name == NULL)
bf67003b 1975 goto fail;
252b5132 1976
4fbb74a6 1977 bed = get_elf_backend_data (abfd);
252b5132
RH
1978 switch (hdr->sh_type)
1979 {
1980 case SHT_NULL:
1981 /* Inactive section. Throw it away. */
bf67003b 1982 goto success;
252b5132 1983
bf67003b
NC
1984 case SHT_PROGBITS: /* Normal section with contents. */
1985 case SHT_NOBITS: /* .bss section. */
1986 case SHT_HASH: /* .hash section. */
1987 case SHT_NOTE: /* .note section. */
25e27870
L
1988 case SHT_INIT_ARRAY: /* .init_array section. */
1989 case SHT_FINI_ARRAY: /* .fini_array section. */
1990 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
7f1204bb 1991 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
fdc90cb4 1992 case SHT_GNU_HASH: /* .gnu.hash section. */
bf67003b
NC
1993 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
1994 goto success;
252b5132 1995
797fc050 1996 case SHT_DYNAMIC: /* Dynamic linking information. */
6dc132d9 1997 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
1998 goto fail;
1999
cfcac11d
NC
2000 if (hdr->sh_link > elf_numsections (abfd))
2001 {
caa83f8b 2002 /* PR 10478: Accept Solaris binaries with a sh_link
cfcac11d
NC
2003 field set to SHN_BEFORE or SHN_AFTER. */
2004 switch (bfd_get_arch (abfd))
2005 {
caa83f8b 2006 case bfd_arch_i386:
cfcac11d
NC
2007 case bfd_arch_sparc:
2008 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2009 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2010 break;
2011 /* Otherwise fall through. */
2012 default:
bf67003b 2013 goto fail;
cfcac11d
NC
2014 }
2015 }
2016 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
bf67003b 2017 goto fail;
cfcac11d 2018 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
797fc050
AM
2019 {
2020 Elf_Internal_Shdr *dynsymhdr;
2021
2022 /* The shared libraries distributed with hpux11 have a bogus
2023 sh_link field for the ".dynamic" section. Find the
2024 string table for the ".dynsym" section instead. */
2025 if (elf_dynsymtab (abfd) != 0)
2026 {
2027 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2028 hdr->sh_link = dynsymhdr->sh_link;
2029 }
2030 else
2031 {
2032 unsigned int i, num_sec;
2033
2034 num_sec = elf_numsections (abfd);
2035 for (i = 1; i < num_sec; i++)
2036 {
2037 dynsymhdr = elf_elfsections (abfd)[i];
2038 if (dynsymhdr->sh_type == SHT_DYNSYM)
2039 {
2040 hdr->sh_link = dynsymhdr->sh_link;
2041 break;
2042 }
2043 }
2044 }
2045 }
bf67003b 2046 goto success;
797fc050 2047
bf67003b 2048 case SHT_SYMTAB: /* A symbol table. */
252b5132 2049 if (elf_onesymtab (abfd) == shindex)
bf67003b 2050 goto success;
252b5132 2051
a50b2160 2052 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2053 goto fail;
2054
3337c1e5 2055 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
eee3b786
AM
2056 {
2057 if (hdr->sh_size != 0)
bf67003b 2058 goto fail;
eee3b786
AM
2059 /* Some assemblers erroneously set sh_info to one with a
2060 zero sh_size. ld sees this as a global symbol count
2061 of (unsigned) -1. Fix it here. */
2062 hdr->sh_info = 0;
bf67003b 2063 goto success;
eee3b786 2064 }
bf67003b 2065
16ad13ec
NC
2066 /* PR 18854: A binary might contain more than one symbol table.
2067 Unusual, but possible. Warn, but continue. */
2068 if (elf_onesymtab (abfd) != 0)
2069 {
4eca0228 2070 _bfd_error_handler
695344c0 2071 /* xgettext:c-format */
16ad13ec
NC
2072 (_("%B: warning: multiple symbol tables detected - ignoring the table in section %u"),
2073 abfd, shindex);
2074 goto success;
2075 }
252b5132 2076 elf_onesymtab (abfd) = shindex;
6a40cf0c
NC
2077 elf_symtab_hdr (abfd) = *hdr;
2078 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
252b5132
RH
2079 abfd->flags |= HAS_SYMS;
2080
2081 /* Sometimes a shared object will map in the symbol table. If
08a40648
AM
2082 SHF_ALLOC is set, and this is a shared object, then we also
2083 treat this section as a BFD section. We can not base the
2084 decision purely on SHF_ALLOC, because that flag is sometimes
2085 set in a relocatable object file, which would confuse the
2086 linker. */
252b5132
RH
2087 if ((hdr->sh_flags & SHF_ALLOC) != 0
2088 && (abfd->flags & DYNAMIC) != 0
6dc132d9
L
2089 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2090 shindex))
bf67003b 2091 goto fail;
252b5132 2092
1b3a8575
AM
2093 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2094 can't read symbols without that section loaded as well. It
2095 is most likely specified by the next section header. */
6a40cf0c
NC
2096 {
2097 elf_section_list * entry;
2098 unsigned int i, num_sec;
1b3a8575 2099
6a40cf0c
NC
2100 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2101 if (entry->hdr.sh_link == shindex)
2102 goto success;
2103
2104 num_sec = elf_numsections (abfd);
2105 for (i = shindex + 1; i < num_sec; i++)
2106 {
2107 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2108
2109 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2110 && hdr2->sh_link == shindex)
2111 break;
2112 }
2113
2114 if (i == num_sec)
2115 for (i = 1; i < shindex; i++)
1b3a8575
AM
2116 {
2117 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
6a40cf0c 2118
1b3a8575
AM
2119 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2120 && hdr2->sh_link == shindex)
2121 break;
2122 }
6a40cf0c
NC
2123
2124 if (i != shindex)
2125 ret = bfd_section_from_shdr (abfd, i);
2126 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2127 goto success;
2128 }
252b5132 2129
bf67003b 2130 case SHT_DYNSYM: /* A dynamic symbol table. */
252b5132 2131 if (elf_dynsymtab (abfd) == shindex)
bf67003b 2132 goto success;
252b5132 2133
a50b2160 2134 if (hdr->sh_entsize != bed->s->sizeof_sym)
bf67003b
NC
2135 goto fail;
2136
eee3b786
AM
2137 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2138 {
2139 if (hdr->sh_size != 0)
bf67003b
NC
2140 goto fail;
2141
eee3b786
AM
2142 /* Some linkers erroneously set sh_info to one with a
2143 zero sh_size. ld sees this as a global symbol count
2144 of (unsigned) -1. Fix it here. */
2145 hdr->sh_info = 0;
bf67003b 2146 goto success;
eee3b786 2147 }
bf67003b 2148
16ad13ec
NC
2149 /* PR 18854: A binary might contain more than one dynamic symbol table.
2150 Unusual, but possible. Warn, but continue. */
2151 if (elf_dynsymtab (abfd) != 0)
2152 {
4eca0228 2153 _bfd_error_handler
695344c0 2154 /* xgettext:c-format */
16ad13ec
NC
2155 (_("%B: warning: multiple dynamic symbol tables detected - ignoring the table in section %u"),
2156 abfd, shindex);
2157 goto success;
2158 }
252b5132
RH
2159 elf_dynsymtab (abfd) = shindex;
2160 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2161 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2162 abfd->flags |= HAS_SYMS;
2163
2164 /* Besides being a symbol table, we also treat this as a regular
2165 section, so that objcopy can handle it. */
bf67003b
NC
2166 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2167 goto success;
252b5132 2168
bf67003b 2169 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
6a40cf0c
NC
2170 {
2171 elf_section_list * entry;
9ad5cbcf 2172
6a40cf0c
NC
2173 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2174 if (entry->ndx == shindex)
2175 goto success;
2176
2177 entry = bfd_alloc (abfd, sizeof * entry);
2178 if (entry == NULL)
2179 goto fail;
2180 entry->ndx = shindex;
2181 entry->hdr = * hdr;
2182 entry->next = elf_symtab_shndx_list (abfd);
2183 elf_symtab_shndx_list (abfd) = entry;
2184 elf_elfsections (abfd)[shindex] = & entry->hdr;
2185 goto success;
2186 }
9ad5cbcf 2187
bf67003b 2188 case SHT_STRTAB: /* A string table. */
252b5132 2189 if (hdr->bfd_section != NULL)
bf67003b
NC
2190 goto success;
2191
252b5132
RH
2192 if (ehdr->e_shstrndx == shindex)
2193 {
2194 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2195 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
bf67003b 2196 goto success;
252b5132 2197 }
bf67003b 2198
1b3a8575
AM
2199 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2200 {
2201 symtab_strtab:
2202 elf_tdata (abfd)->strtab_hdr = *hdr;
2203 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
bf67003b 2204 goto success;
1b3a8575 2205 }
bf67003b 2206
1b3a8575
AM
2207 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2208 {
2209 dynsymtab_strtab:
2210 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2211 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2212 elf_elfsections (abfd)[shindex] = hdr;
2213 /* We also treat this as a regular section, so that objcopy
2214 can handle it. */
bf67003b
NC
2215 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2216 shindex);
2217 goto success;
1b3a8575 2218 }
252b5132 2219
1b3a8575
AM
2220 /* If the string table isn't one of the above, then treat it as a
2221 regular section. We need to scan all the headers to be sure,
2222 just in case this strtab section appeared before the above. */
2223 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2224 {
2225 unsigned int i, num_sec;
252b5132 2226
1b3a8575
AM
2227 num_sec = elf_numsections (abfd);
2228 for (i = 1; i < num_sec; i++)
2229 {
2230 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2231 if (hdr2->sh_link == shindex)
2232 {
933d961a
JJ
2233 /* Prevent endless recursion on broken objects. */
2234 if (i == shindex)
bf67003b 2235 goto fail;
1b3a8575 2236 if (! bfd_section_from_shdr (abfd, i))
bf67003b 2237 goto fail;
1b3a8575
AM
2238 if (elf_onesymtab (abfd) == i)
2239 goto symtab_strtab;
2240 if (elf_dynsymtab (abfd) == i)
2241 goto dynsymtab_strtab;
2242 }
2243 }
2244 }
bf67003b
NC
2245 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2246 goto success;
252b5132
RH
2247
2248 case SHT_REL:
2249 case SHT_RELA:
2250 /* *These* do a lot of work -- but build no sections! */
2251 {
2252 asection *target_sect;
d4730f92 2253 Elf_Internal_Shdr *hdr2, **p_hdr;
9ad5cbcf 2254 unsigned int num_sec = elf_numsections (abfd);
d4730f92 2255 struct bfd_elf_section_data *esdt;
252b5132 2256
aa2ca951
JJ
2257 if (hdr->sh_entsize
2258 != (bfd_size_type) (hdr->sh_type == SHT_REL
a50b2160 2259 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
bf67003b 2260 goto fail;
a50b2160 2261
03ae5f59 2262 /* Check for a bogus link to avoid crashing. */
4fbb74a6 2263 if (hdr->sh_link >= num_sec)
03ae5f59 2264 {
4eca0228 2265 _bfd_error_handler
695344c0 2266 /* xgettext:c-format */
4eca0228
AM
2267 (_("%B: invalid link %lu for reloc section %s (index %u)"),
2268 abfd, hdr->sh_link, name, shindex);
bf67003b
NC
2269 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2270 shindex);
2271 goto success;
03ae5f59
ILT
2272 }
2273
252b5132
RH
2274 /* For some incomprehensible reason Oracle distributes
2275 libraries for Solaris in which some of the objects have
2276 bogus sh_link fields. It would be nice if we could just
2277 reject them, but, unfortunately, some people need to use
2278 them. We scan through the section headers; if we find only
2279 one suitable symbol table, we clobber the sh_link to point
83b89087
L
2280 to it. I hope this doesn't break anything.
2281
2282 Don't do it on executable nor shared library. */
2283 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2284 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
252b5132
RH
2285 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2286 {
9ad5cbcf 2287 unsigned int scan;
252b5132
RH
2288 int found;
2289
2290 found = 0;
9ad5cbcf 2291 for (scan = 1; scan < num_sec; scan++)
252b5132
RH
2292 {
2293 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2294 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2295 {
2296 if (found != 0)
2297 {
2298 found = 0;
2299 break;
2300 }
2301 found = scan;
2302 }
2303 }
2304 if (found != 0)
2305 hdr->sh_link = found;
2306 }
2307
2308 /* Get the symbol table. */
1b3a8575
AM
2309 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2310 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
252b5132 2311 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
bf67003b 2312 goto fail;
252b5132
RH
2313
2314 /* If this reloc section does not use the main symbol table we
2315 don't treat it as a reloc section. BFD can't adequately
2316 represent such a section, so at least for now, we don't
c044fabd 2317 try. We just present it as a normal section. We also
60bcf0fa 2318 can't use it as a reloc section if it points to the null
83b89087
L
2319 section, an invalid section, another reloc section, or its
2320 sh_link points to the null section. */
185ef66d 2321 if (hdr->sh_link != elf_onesymtab (abfd)
83b89087 2322 || hdr->sh_link == SHN_UNDEF
185ef66d 2323 || hdr->sh_info == SHN_UNDEF
185ef66d
AM
2324 || hdr->sh_info >= num_sec
2325 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2326 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
bf67003b
NC
2327 {
2328 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2329 shindex);
2330 goto success;
2331 }
252b5132
RH
2332
2333 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
bf67003b
NC
2334 goto fail;
2335
252b5132
RH
2336 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2337 if (target_sect == NULL)
bf67003b 2338 goto fail;
252b5132 2339
d4730f92
BS
2340 esdt = elf_section_data (target_sect);
2341 if (hdr->sh_type == SHT_RELA)
2342 p_hdr = &esdt->rela.hdr;
252b5132 2343 else
d4730f92
BS
2344 p_hdr = &esdt->rel.hdr;
2345
06614111
NC
2346 /* PR 17512: file: 0b4f81b7. */
2347 if (*p_hdr != NULL)
2348 goto fail;
ef53be89 2349 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
d4730f92 2350 if (hdr2 == NULL)
bf67003b 2351 goto fail;
252b5132 2352 *hdr2 = *hdr;
d4730f92 2353 *p_hdr = hdr2;
252b5132 2354 elf_elfsections (abfd)[shindex] = hdr2;
d9bc7a44 2355 target_sect->reloc_count += NUM_SHDR_ENTRIES (hdr);
252b5132
RH
2356 target_sect->flags |= SEC_RELOC;
2357 target_sect->relocation = NULL;
2358 target_sect->rel_filepos = hdr->sh_offset;
bf572ba0
MM
2359 /* In the section to which the relocations apply, mark whether
2360 its relocations are of the REL or RELA variety. */
72730e0c 2361 if (hdr->sh_size != 0)
d4730f92
BS
2362 {
2363 if (hdr->sh_type == SHT_RELA)
2364 target_sect->use_rela_p = 1;
2365 }
252b5132 2366 abfd->flags |= HAS_RELOC;
bf67003b 2367 goto success;
252b5132 2368 }
252b5132
RH
2369
2370 case SHT_GNU_verdef:
2371 elf_dynverdef (abfd) = shindex;
2372 elf_tdata (abfd)->dynverdef_hdr = *hdr;
bf67003b
NC
2373 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2374 goto success;
252b5132
RH
2375
2376 case SHT_GNU_versym:
a50b2160 2377 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
bf67003b
NC
2378 goto fail;
2379
252b5132
RH
2380 elf_dynversym (abfd) = shindex;
2381 elf_tdata (abfd)->dynversym_hdr = *hdr;
bf67003b
NC
2382 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2383 goto success;
252b5132
RH
2384
2385 case SHT_GNU_verneed:
2386 elf_dynverref (abfd) = shindex;
2387 elf_tdata (abfd)->dynverref_hdr = *hdr;
bf67003b
NC
2388 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2389 goto success;
252b5132
RH
2390
2391 case SHT_SHLIB:
bf67003b 2392 goto success;
252b5132 2393
dbb410c3 2394 case SHT_GROUP:
44534af3 2395 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
bf67003b
NC
2396 goto fail;
2397
6dc132d9 2398 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b
NC
2399 goto fail;
2400
dbb410c3
AM
2401 if (hdr->contents != NULL)
2402 {
2403 Elf_Internal_Group *idx = (Elf_Internal_Group *) hdr->contents;
06614111 2404 unsigned int n_elt = hdr->sh_size / sizeof (* idx);
dbb410c3
AM
2405 asection *s;
2406
06614111
NC
2407 if (n_elt == 0)
2408 goto fail;
b885599b
AM
2409 if (idx->flags & GRP_COMDAT)
2410 hdr->bfd_section->flags
2411 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
2412
45c5e9ed
L
2413 /* We try to keep the same section order as it comes in. */
2414 idx += n_elt;
06614111 2415
dbb410c3 2416 while (--n_elt != 0)
1783205a
NC
2417 {
2418 --idx;
2419
2420 if (idx->shdr != NULL
2421 && (s = idx->shdr->bfd_section) != NULL
2422 && elf_next_in_group (s) != NULL)
2423 {
2424 elf_next_in_group (hdr->bfd_section) = s;
2425 break;
2426 }
2427 }
dbb410c3 2428 }
bf67003b 2429 goto success;
dbb410c3 2430
252b5132 2431 default:
104d59d1
JM
2432 /* Possibly an attributes section. */
2433 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2434 || hdr->sh_type == bed->obj_attrs_section_type)
2435 {
2436 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2437 goto fail;
104d59d1 2438 _bfd_elf_parse_attributes (abfd, hdr);
bf67003b 2439 goto success;
104d59d1
JM
2440 }
2441
252b5132 2442 /* Check for any processor-specific section types. */
3eb70a79 2443 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
bf67003b 2444 goto success;
3eb70a79
L
2445
2446 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2447 {
2448 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2449 /* FIXME: How to properly handle allocated section reserved
2450 for applications? */
4eca0228 2451 _bfd_error_handler
695344c0 2452 /* xgettext:c-format */
3eb70a79
L
2453 (_("%B: don't know how to handle allocated, application "
2454 "specific section `%s' [0x%8x]"),
2455 abfd, name, hdr->sh_type);
2456 else
bf67003b
NC
2457 {
2458 /* Allow sections reserved for applications. */
2459 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2460 shindex);
2461 goto success;
2462 }
3eb70a79
L
2463 }
2464 else if (hdr->sh_type >= SHT_LOPROC
2465 && hdr->sh_type <= SHT_HIPROC)
2466 /* FIXME: We should handle this section. */
4eca0228 2467 _bfd_error_handler
695344c0 2468 /* xgettext:c-format */
3eb70a79
L
2469 (_("%B: don't know how to handle processor specific section "
2470 "`%s' [0x%8x]"),
2471 abfd, name, hdr->sh_type);
2472 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
ff15b240
NC
2473 {
2474 /* Unrecognised OS-specific sections. */
2475 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2476 /* SHF_OS_NONCONFORMING indicates that special knowledge is
08a40648 2477 required to correctly process the section and the file should
ff15b240 2478 be rejected with an error message. */
4eca0228 2479 _bfd_error_handler
695344c0 2480 /* xgettext:c-format */
ff15b240
NC
2481 (_("%B: don't know how to handle OS specific section "
2482 "`%s' [0x%8x]"),
2483 abfd, name, hdr->sh_type);
2484 else
bf67003b
NC
2485 {
2486 /* Otherwise it should be processed. */
2487 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2488 goto success;
2489 }
ff15b240 2490 }
3eb70a79
L
2491 else
2492 /* FIXME: We should handle this section. */
4eca0228 2493 _bfd_error_handler
695344c0 2494 /* xgettext:c-format */
3eb70a79
L
2495 (_("%B: don't know how to handle section `%s' [0x%8x]"),
2496 abfd, name, hdr->sh_type);
2497
bf67003b 2498 goto fail;
252b5132
RH
2499 }
2500
bf67003b
NC
2501 fail:
2502 ret = FALSE;
2503 success:
e5b470e2 2504 if (sections_being_created && sections_being_created_abfd == abfd)
bf67003b
NC
2505 sections_being_created [shindex] = FALSE;
2506 if (-- nesting == 0)
5a4b0ccc
NC
2507 {
2508 sections_being_created = NULL;
2509 sections_being_created_abfd = abfd;
2510 }
bf67003b 2511 return ret;
252b5132
RH
2512}
2513
87d72d41 2514/* Return the local symbol specified by ABFD, R_SYMNDX. */
ec338859 2515
87d72d41
AM
2516Elf_Internal_Sym *
2517bfd_sym_from_r_symndx (struct sym_cache *cache,
2518 bfd *abfd,
2519 unsigned long r_symndx)
ec338859 2520{
ec338859
AM
2521 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2522
a5d1b3b5
AM
2523 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2524 {
2525 Elf_Internal_Shdr *symtab_hdr;
2526 unsigned char esym[sizeof (Elf64_External_Sym)];
2527 Elf_External_Sym_Shndx eshndx;
ec338859 2528
a5d1b3b5
AM
2529 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2530 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
87d72d41 2531 &cache->sym[ent], esym, &eshndx) == NULL)
a5d1b3b5 2532 return NULL;
9ad5cbcf 2533
a5d1b3b5
AM
2534 if (cache->abfd != abfd)
2535 {
2536 memset (cache->indx, -1, sizeof (cache->indx));
2537 cache->abfd = abfd;
2538 }
2539 cache->indx[ent] = r_symndx;
ec338859 2540 }
a5d1b3b5 2541
87d72d41 2542 return &cache->sym[ent];
ec338859
AM
2543}
2544
252b5132
RH
2545/* Given an ELF section number, retrieve the corresponding BFD
2546 section. */
2547
2548asection *
91d6fa6a 2549bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
252b5132 2550{
91d6fa6a 2551 if (sec_index >= elf_numsections (abfd))
252b5132 2552 return NULL;
91d6fa6a 2553 return elf_elfsections (abfd)[sec_index]->bfd_section;
252b5132
RH
2554}
2555
b35d266b 2556static const struct bfd_elf_special_section special_sections_b[] =
2f89ff8d 2557{
0112cd26
NC
2558 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2559 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2560};
2561
b35d266b 2562static const struct bfd_elf_special_section special_sections_c[] =
7f4d3958 2563{
0112cd26
NC
2564 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2565 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2566};
2567
b35d266b 2568static const struct bfd_elf_special_section special_sections_d[] =
7f4d3958 2569{
0112cd26
NC
2570 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2571 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
a9a72a65
DE
2572 /* There are more DWARF sections than these, but they needn't be added here
2573 unless you have to cope with broken compilers that don't emit section
2574 attributes or you want to help the user writing assembler. */
0112cd26
NC
2575 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2576 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2577 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2578 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2579 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2580 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2581 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2582 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2583 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2584};
2585
b35d266b 2586static const struct bfd_elf_special_section special_sections_f[] =
7f4d3958 2587{
0112cd26
NC
2588 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2589 { STRING_COMMA_LEN (".fini_array"), 0, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2590 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2591};
2592
b35d266b 2593static const struct bfd_elf_special_section special_sections_g[] =
7f4d3958 2594{
0112cd26 2595 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
68efed41 2596 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
0112cd26
NC
2597 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2598 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2599 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2600 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2601 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2602 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2603 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2604 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2605};
2606
b35d266b 2607static const struct bfd_elf_special_section special_sections_h[] =
7f4d3958 2608{
0112cd26
NC
2609 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2610 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2611};
2612
b35d266b 2613static const struct bfd_elf_special_section special_sections_i[] =
7f4d3958 2614{
0112cd26
NC
2615 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2616 { STRING_COMMA_LEN (".init_array"), 0, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2617 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2618 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2619};
2620
b35d266b 2621static const struct bfd_elf_special_section special_sections_l[] =
7f4d3958 2622{
0112cd26
NC
2623 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2624 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2625};
2626
b35d266b 2627static const struct bfd_elf_special_section special_sections_n[] =
7f4d3958 2628{
0112cd26
NC
2629 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2630 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2631 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2632};
2633
b35d266b 2634static const struct bfd_elf_special_section special_sections_p[] =
7f4d3958 2635{
0112cd26
NC
2636 { STRING_COMMA_LEN (".preinit_array"), 0, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2637 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2638 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2639};
2640
b35d266b 2641static const struct bfd_elf_special_section special_sections_r[] =
7f4d3958 2642{
0112cd26
NC
2643 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2644 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2645 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2646 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2647 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2648};
2649
b35d266b 2650static const struct bfd_elf_special_section special_sections_s[] =
7f4d3958 2651{
0112cd26
NC
2652 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2653 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2654 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
60ff4dc4
HPN
2655 /* See struct bfd_elf_special_section declaration for the semantics of
2656 this special case where .prefix_length != strlen (.prefix). */
2657 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
0112cd26 2658 { NULL, 0, 0, 0, 0 }
2f89ff8d
L
2659};
2660
b35d266b 2661static const struct bfd_elf_special_section special_sections_t[] =
7f4d3958 2662{
0112cd26
NC
2663 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2664 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2665 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2666 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2667};
2668
1b315056
CS
2669static const struct bfd_elf_special_section special_sections_z[] =
2670{
2671 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2672 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2673 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2674 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2675 { NULL, 0, 0, 0, 0 }
2676};
2677
e4c93b56 2678static const struct bfd_elf_special_section * const special_sections[] =
7f4d3958 2679{
7f4d3958 2680 special_sections_b, /* 'b' */
98ece1b3 2681 special_sections_c, /* 'c' */
7f4d3958
L
2682 special_sections_d, /* 'd' */
2683 NULL, /* 'e' */
2684 special_sections_f, /* 'f' */
2685 special_sections_g, /* 'g' */
2686 special_sections_h, /* 'h' */
2687 special_sections_i, /* 'i' */
2688 NULL, /* 'j' */
2689 NULL, /* 'k' */
2690 special_sections_l, /* 'l' */
2691 NULL, /* 'm' */
2692 special_sections_n, /* 'n' */
2693 NULL, /* 'o' */
2694 special_sections_p, /* 'p' */
2695 NULL, /* 'q' */
2696 special_sections_r, /* 'r' */
2697 special_sections_s, /* 's' */
2698 special_sections_t, /* 't' */
1b315056
CS
2699 NULL, /* 'u' */
2700 NULL, /* 'v' */
2701 NULL, /* 'w' */
2702 NULL, /* 'x' */
2703 NULL, /* 'y' */
2704 special_sections_z /* 'z' */
7f4d3958
L
2705};
2706
551b43fd
AM
2707const struct bfd_elf_special_section *
2708_bfd_elf_get_special_section (const char *name,
2709 const struct bfd_elf_special_section *spec,
2710 unsigned int rela)
2f89ff8d
L
2711{
2712 int i;
7f4d3958 2713 int len;
7f4d3958 2714
551b43fd 2715 len = strlen (name);
7f4d3958 2716
551b43fd 2717 for (i = 0; spec[i].prefix != NULL; i++)
7dcb9820
AM
2718 {
2719 int suffix_len;
551b43fd 2720 int prefix_len = spec[i].prefix_length;
7dcb9820
AM
2721
2722 if (len < prefix_len)
2723 continue;
551b43fd 2724 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
7dcb9820
AM
2725 continue;
2726
551b43fd 2727 suffix_len = spec[i].suffix_length;
7dcb9820
AM
2728 if (suffix_len <= 0)
2729 {
2730 if (name[prefix_len] != 0)
2731 {
2732 if (suffix_len == 0)
2733 continue;
2734 if (name[prefix_len] != '.'
2735 && (suffix_len == -2
551b43fd 2736 || (rela && spec[i].type == SHT_REL)))
7dcb9820
AM
2737 continue;
2738 }
2739 }
2740 else
2741 {
2742 if (len < prefix_len + suffix_len)
2743 continue;
2744 if (memcmp (name + len - suffix_len,
551b43fd 2745 spec[i].prefix + prefix_len,
7dcb9820
AM
2746 suffix_len) != 0)
2747 continue;
2748 }
551b43fd 2749 return &spec[i];
7dcb9820 2750 }
2f89ff8d
L
2751
2752 return NULL;
2753}
2754
7dcb9820 2755const struct bfd_elf_special_section *
29ef7005 2756_bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2f89ff8d 2757{
551b43fd
AM
2758 int i;
2759 const struct bfd_elf_special_section *spec;
29ef7005 2760 const struct elf_backend_data *bed;
2f89ff8d
L
2761
2762 /* See if this is one of the special sections. */
551b43fd
AM
2763 if (sec->name == NULL)
2764 return NULL;
2f89ff8d 2765
29ef7005
L
2766 bed = get_elf_backend_data (abfd);
2767 spec = bed->special_sections;
2768 if (spec)
2769 {
2770 spec = _bfd_elf_get_special_section (sec->name,
2771 bed->special_sections,
2772 sec->use_rela_p);
2773 if (spec != NULL)
2774 return spec;
2775 }
2776
551b43fd
AM
2777 if (sec->name[0] != '.')
2778 return NULL;
2f89ff8d 2779
551b43fd 2780 i = sec->name[1] - 'b';
1b315056 2781 if (i < 0 || i > 'z' - 'b')
551b43fd
AM
2782 return NULL;
2783
2784 spec = special_sections[i];
2f89ff8d 2785
551b43fd
AM
2786 if (spec == NULL)
2787 return NULL;
2788
2789 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2f89ff8d
L
2790}
2791
b34976b6 2792bfd_boolean
217aa764 2793_bfd_elf_new_section_hook (bfd *abfd, asection *sec)
252b5132
RH
2794{
2795 struct bfd_elf_section_data *sdata;
551b43fd 2796 const struct elf_backend_data *bed;
7dcb9820 2797 const struct bfd_elf_special_section *ssect;
252b5132 2798
f0abc2a1
AM
2799 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2800 if (sdata == NULL)
2801 {
a50b1753
NC
2802 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2803 sizeof (*sdata));
f0abc2a1
AM
2804 if (sdata == NULL)
2805 return FALSE;
217aa764 2806 sec->used_by_bfd = sdata;
f0abc2a1 2807 }
bf572ba0 2808
551b43fd
AM
2809 /* Indicate whether or not this section should use RELA relocations. */
2810 bed = get_elf_backend_data (abfd);
2811 sec->use_rela_p = bed->default_use_rela_p;
2812
e843e0f8
L
2813 /* When we read a file, we don't need to set ELF section type and
2814 flags. They will be overridden in _bfd_elf_make_section_from_shdr
2815 anyway. We will set ELF section type and flags for all linker
2816 created sections. If user specifies BFD section flags, we will
2817 set ELF section type and flags based on BFD section flags in
02ecc8e9
L
2818 elf_fake_sections. Special handling for .init_array/.fini_array
2819 output sections since they may contain .ctors/.dtors input
2820 sections. We don't want _bfd_elf_init_private_section_data to
2821 copy ELF section type from .ctors/.dtors input sections. */
2822 if (abfd->direction != read_direction
3496cb2a 2823 || (sec->flags & SEC_LINKER_CREATED) != 0)
2f89ff8d 2824 {
551b43fd 2825 ssect = (*bed->get_sec_type_attr) (abfd, sec);
02ecc8e9
L
2826 if (ssect != NULL
2827 && (!sec->flags
2828 || (sec->flags & SEC_LINKER_CREATED) != 0
2829 || ssect->type == SHT_INIT_ARRAY
2830 || ssect->type == SHT_FINI_ARRAY))
a31501e9
L
2831 {
2832 elf_section_type (sec) = ssect->type;
2833 elf_section_flags (sec) = ssect->attr;
2834 }
2f89ff8d
L
2835 }
2836
f592407e 2837 return _bfd_generic_new_section_hook (abfd, sec);
252b5132
RH
2838}
2839
2840/* Create a new bfd section from an ELF program header.
2841
2842 Since program segments have no names, we generate a synthetic name
2843 of the form segment<NUM>, where NUM is generally the index in the
2844 program header table. For segments that are split (see below) we
2845 generate the names segment<NUM>a and segment<NUM>b.
2846
2847 Note that some program segments may have a file size that is different than
2848 (less than) the memory size. All this means is that at execution the
2849 system must allocate the amount of memory specified by the memory size,
2850 but only initialize it with the first "file size" bytes read from the
2851 file. This would occur for example, with program segments consisting
2852 of combined data+bss.
2853
2854 To handle the above situation, this routine generates TWO bfd sections
2855 for the single program segment. The first has the length specified by
2856 the file size of the segment, and the second has the length specified
2857 by the difference between the two sizes. In effect, the segment is split
d5191d0c 2858 into its initialized and uninitialized parts.
252b5132
RH
2859
2860 */
2861
b34976b6 2862bfd_boolean
217aa764
AM
2863_bfd_elf_make_section_from_phdr (bfd *abfd,
2864 Elf_Internal_Phdr *hdr,
91d6fa6a 2865 int hdr_index,
a50b1753 2866 const char *type_name)
252b5132
RH
2867{
2868 asection *newsect;
2869 char *name;
2870 char namebuf[64];
d4c88bbb 2871 size_t len;
252b5132
RH
2872 int split;
2873
2874 split = ((hdr->p_memsz > 0)
2875 && (hdr->p_filesz > 0)
2876 && (hdr->p_memsz > hdr->p_filesz));
d5191d0c
AM
2877
2878 if (hdr->p_filesz > 0)
252b5132 2879 {
91d6fa6a 2880 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
d5191d0c 2881 len = strlen (namebuf) + 1;
a50b1753 2882 name = (char *) bfd_alloc (abfd, len);
d5191d0c
AM
2883 if (!name)
2884 return FALSE;
2885 memcpy (name, namebuf, len);
2886 newsect = bfd_make_section (abfd, name);
2887 if (newsect == NULL)
2888 return FALSE;
2889 newsect->vma = hdr->p_vaddr;
2890 newsect->lma = hdr->p_paddr;
2891 newsect->size = hdr->p_filesz;
2892 newsect->filepos = hdr->p_offset;
2893 newsect->flags |= SEC_HAS_CONTENTS;
2894 newsect->alignment_power = bfd_log2 (hdr->p_align);
2895 if (hdr->p_type == PT_LOAD)
252b5132 2896 {
d5191d0c
AM
2897 newsect->flags |= SEC_ALLOC;
2898 newsect->flags |= SEC_LOAD;
2899 if (hdr->p_flags & PF_X)
2900 {
2901 /* FIXME: all we known is that it has execute PERMISSION,
2902 may be data. */
2903 newsect->flags |= SEC_CODE;
2904 }
2905 }
2906 if (!(hdr->p_flags & PF_W))
2907 {
2908 newsect->flags |= SEC_READONLY;
252b5132 2909 }
252b5132
RH
2910 }
2911
d5191d0c 2912 if (hdr->p_memsz > hdr->p_filesz)
252b5132 2913 {
d5191d0c
AM
2914 bfd_vma align;
2915
91d6fa6a 2916 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
d4c88bbb 2917 len = strlen (namebuf) + 1;
a50b1753 2918 name = (char *) bfd_alloc (abfd, len);
252b5132 2919 if (!name)
b34976b6 2920 return FALSE;
d4c88bbb 2921 memcpy (name, namebuf, len);
252b5132
RH
2922 newsect = bfd_make_section (abfd, name);
2923 if (newsect == NULL)
b34976b6 2924 return FALSE;
252b5132
RH
2925 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
2926 newsect->lma = hdr->p_paddr + hdr->p_filesz;
eea6121a 2927 newsect->size = hdr->p_memsz - hdr->p_filesz;
d5191d0c
AM
2928 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2929 align = newsect->vma & -newsect->vma;
2930 if (align == 0 || align > hdr->p_align)
2931 align = hdr->p_align;
2932 newsect->alignment_power = bfd_log2 (align);
252b5132
RH
2933 if (hdr->p_type == PT_LOAD)
2934 {
d5191d0c
AM
2935 /* Hack for gdb. Segments that have not been modified do
2936 not have their contents written to a core file, on the
2937 assumption that a debugger can find the contents in the
2938 executable. We flag this case by setting the fake
2939 section size to zero. Note that "real" bss sections will
2940 always have their contents dumped to the core file. */
2941 if (bfd_get_format (abfd) == bfd_core)
2942 newsect->size = 0;
252b5132
RH
2943 newsect->flags |= SEC_ALLOC;
2944 if (hdr->p_flags & PF_X)
2945 newsect->flags |= SEC_CODE;
2946 }
2947 if (!(hdr->p_flags & PF_W))
2948 newsect->flags |= SEC_READONLY;
2949 }
2950
b34976b6 2951 return TRUE;
252b5132
RH
2952}
2953
b34976b6 2954bfd_boolean
91d6fa6a 2955bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
20cfcaae 2956{
9c5bfbb7 2957 const struct elf_backend_data *bed;
20cfcaae
NC
2958
2959 switch (hdr->p_type)
2960 {
2961 case PT_NULL:
91d6fa6a 2962 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
20cfcaae
NC
2963
2964 case PT_LOAD:
91d6fa6a 2965 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load");
20cfcaae
NC
2966
2967 case PT_DYNAMIC:
91d6fa6a 2968 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
20cfcaae
NC
2969
2970 case PT_INTERP:
91d6fa6a 2971 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
20cfcaae
NC
2972
2973 case PT_NOTE:
91d6fa6a 2974 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
b34976b6 2975 return FALSE;
718175fa 2976 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz))
b34976b6
AM
2977 return FALSE;
2978 return TRUE;
20cfcaae
NC
2979
2980 case PT_SHLIB:
91d6fa6a 2981 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
20cfcaae
NC
2982
2983 case PT_PHDR:
91d6fa6a 2984 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
20cfcaae 2985
811072d8 2986 case PT_GNU_EH_FRAME:
91d6fa6a 2987 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
811072d8
RM
2988 "eh_frame_hdr");
2989
2b05f1b7 2990 case PT_GNU_STACK:
91d6fa6a 2991 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
9ee5e499 2992
8c37241b 2993 case PT_GNU_RELRO:
91d6fa6a 2994 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
8c37241b 2995
20cfcaae 2996 default:
8c1acd09 2997 /* Check for any processor-specific program segment types. */
20cfcaae 2998 bed = get_elf_backend_data (abfd);
91d6fa6a 2999 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
20cfcaae
NC
3000 }
3001}
3002
d4730f92
BS
3003/* Return the REL_HDR for SEC, assuming there is only a single one, either
3004 REL or RELA. */
3005
3006Elf_Internal_Shdr *
3007_bfd_elf_single_rel_hdr (asection *sec)
3008{
3009 if (elf_section_data (sec)->rel.hdr)
3010 {
3011 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3012 return elf_section_data (sec)->rel.hdr;
3013 }
3014 else
3015 return elf_section_data (sec)->rela.hdr;
3016}
3017
3e19fb8f
L
3018static bfd_boolean
3019_bfd_elf_set_reloc_sh_name (bfd *abfd,
3020 Elf_Internal_Shdr *rel_hdr,
3021 const char *sec_name,
3022 bfd_boolean use_rela_p)
3023{
3024 char *name = (char *) bfd_alloc (abfd,
3025 sizeof ".rela" + strlen (sec_name));
3026 if (name == NULL)
3027 return FALSE;
3028
3029 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3030 rel_hdr->sh_name =
3031 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3032 FALSE);
3033 if (rel_hdr->sh_name == (unsigned int) -1)
3034 return FALSE;
3035
3036 return TRUE;
3037}
3038
d4730f92
BS
3039/* Allocate and initialize a section-header for a new reloc section,
3040 containing relocations against ASECT. It is stored in RELDATA. If
3041 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3042 relocations. */
23bc299b 3043
5d13b3b3 3044static bfd_boolean
217aa764 3045_bfd_elf_init_reloc_shdr (bfd *abfd,
d4730f92 3046 struct bfd_elf_section_reloc_data *reldata,
f6fe1ccd 3047 const char *sec_name,
3e19fb8f
L
3048 bfd_boolean use_rela_p,
3049 bfd_boolean delay_st_name_p)
23bc299b 3050{
d4730f92 3051 Elf_Internal_Shdr *rel_hdr;
9c5bfbb7 3052 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3053
d4730f92 3054 BFD_ASSERT (reldata->hdr == NULL);
ef53be89 3055 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
d4730f92 3056 reldata->hdr = rel_hdr;
23bc299b 3057
3e19fb8f
L
3058 if (delay_st_name_p)
3059 rel_hdr->sh_name = (unsigned int) -1;
3060 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3061 use_rela_p))
b34976b6 3062 return FALSE;
23bc299b
MM
3063 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3064 rel_hdr->sh_entsize = (use_rela_p
3065 ? bed->s->sizeof_rela
3066 : bed->s->sizeof_rel);
72de5009 3067 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
23bc299b
MM
3068 rel_hdr->sh_flags = 0;
3069 rel_hdr->sh_addr = 0;
3070 rel_hdr->sh_size = 0;
3071 rel_hdr->sh_offset = 0;
3072
b34976b6 3073 return TRUE;
23bc299b
MM
3074}
3075
94be91de
JB
3076/* Return the default section type based on the passed in section flags. */
3077
3078int
3079bfd_elf_get_default_section_type (flagword flags)
3080{
3081 if ((flags & SEC_ALLOC) != 0
2e76e85a 3082 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
94be91de
JB
3083 return SHT_NOBITS;
3084 return SHT_PROGBITS;
3085}
3086
d4730f92
BS
3087struct fake_section_arg
3088{
3089 struct bfd_link_info *link_info;
3090 bfd_boolean failed;
3091};
3092
252b5132
RH
3093/* Set up an ELF internal section header for a section. */
3094
252b5132 3095static void
d4730f92 3096elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
252b5132 3097{
d4730f92 3098 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
9c5bfbb7 3099 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 3100 struct bfd_elf_section_data *esd = elf_section_data (asect);
252b5132 3101 Elf_Internal_Shdr *this_hdr;
0414f35b 3102 unsigned int sh_type;
0ce398f1 3103 const char *name = asect->name;
3e19fb8f 3104 bfd_boolean delay_st_name_p = FALSE;
252b5132 3105
d4730f92 3106 if (arg->failed)
252b5132
RH
3107 {
3108 /* We already failed; just get out of the bfd_map_over_sections
08a40648 3109 loop. */
252b5132
RH
3110 return;
3111 }
3112
d4730f92 3113 this_hdr = &esd->this_hdr;
252b5132 3114
f6fe1ccd 3115 if (arg->link_info)
0ce398f1 3116 {
f6fe1ccd
L
3117 /* ld: compress DWARF debug sections with names: .debug_*. */
3118 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3119 && (asect->flags & SEC_DEBUGGING)
3120 && name[1] == 'd'
3121 && name[6] == '_')
3122 {
3123 /* Set SEC_ELF_COMPRESS to indicate this section should be
3124 compressed. */
3125 asect->flags |= SEC_ELF_COMPRESS;
0ce398f1 3126
dd905818 3127 /* If this section will be compressed, delay adding section
3e19fb8f
L
3128 name to section name section after it is compressed in
3129 _bfd_elf_assign_file_positions_for_non_load. */
3130 delay_st_name_p = TRUE;
f6fe1ccd
L
3131 }
3132 }
3133 else if ((asect->flags & SEC_ELF_RENAME))
3134 {
3135 /* objcopy: rename output DWARF debug section. */
3136 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3137 {
3138 /* When we decompress or compress with SHF_COMPRESSED,
3139 convert section name from .zdebug_* to .debug_* if
3140 needed. */
3141 if (name[1] == 'z')
3142 {
3143 char *new_name = convert_zdebug_to_debug (abfd, name);
3144 if (new_name == NULL)
3145 {
3146 arg->failed = TRUE;
3147 return;
3148 }
3149 name = new_name;
3150 }
3151 }
3152 else if (asect->compress_status == COMPRESS_SECTION_DONE)
0ce398f1 3153 {
f6fe1ccd
L
3154 /* PR binutils/18087: Compression does not always make a
3155 section smaller. So only rename the section when
3156 compression has actually taken place. If input section
3157 name is .zdebug_*, we should never compress it again. */
3158 char *new_name = convert_debug_to_zdebug (abfd, name);
0ce398f1
L
3159 if (new_name == NULL)
3160 {
3161 arg->failed = TRUE;
3162 return;
3163 }
f6fe1ccd
L
3164 BFD_ASSERT (name[1] != 'z');
3165 name = new_name;
0ce398f1
L
3166 }
3167 }
3168
3e19fb8f
L
3169 if (delay_st_name_p)
3170 this_hdr->sh_name = (unsigned int) -1;
3171 else
252b5132 3172 {
3e19fb8f
L
3173 this_hdr->sh_name
3174 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3175 name, FALSE);
3176 if (this_hdr->sh_name == (unsigned int) -1)
3177 {
3178 arg->failed = TRUE;
3179 return;
3180 }
252b5132
RH
3181 }
3182
a4d8e49b 3183 /* Don't clear sh_flags. Assembler may set additional bits. */
252b5132
RH
3184
3185 if ((asect->flags & SEC_ALLOC) != 0
3186 || asect->user_set_vma)
3187 this_hdr->sh_addr = asect->vma;
3188 else
3189 this_hdr->sh_addr = 0;
3190
3191 this_hdr->sh_offset = 0;
eea6121a 3192 this_hdr->sh_size = asect->size;
252b5132 3193 this_hdr->sh_link = 0;
c86934ce
NC
3194 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3195 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3196 {
4eca0228 3197 _bfd_error_handler
695344c0 3198 /* xgettext:c-format */
c86934ce
NC
3199 (_("%B: error: Alignment power %d of section `%A' is too big"),
3200 abfd, asect, asect->alignment_power);
3201 arg->failed = TRUE;
3202 return;
3203 }
72de5009 3204 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
252b5132
RH
3205 /* The sh_entsize and sh_info fields may have been set already by
3206 copy_private_section_data. */
3207
3208 this_hdr->bfd_section = asect;
3209 this_hdr->contents = NULL;
3210
3cddba1e
L
3211 /* If the section type is unspecified, we set it based on
3212 asect->flags. */
98ece1b3
AM
3213 if ((asect->flags & SEC_GROUP) != 0)
3214 sh_type = SHT_GROUP;
98ece1b3 3215 else
94be91de 3216 sh_type = bfd_elf_get_default_section_type (asect->flags);
98ece1b3 3217
3cddba1e 3218 if (this_hdr->sh_type == SHT_NULL)
98ece1b3
AM
3219 this_hdr->sh_type = sh_type;
3220 else if (this_hdr->sh_type == SHT_NOBITS
3221 && sh_type == SHT_PROGBITS
3222 && (asect->flags & SEC_ALLOC) != 0)
3cddba1e 3223 {
98ece1b3
AM
3224 /* Warn if we are changing a NOBITS section to PROGBITS, but
3225 allow the link to proceed. This can happen when users link
3226 non-bss input sections to bss output sections, or emit data
3227 to a bss output section via a linker script. */
4eca0228 3228 _bfd_error_handler
58f0869b 3229 (_("warning: section `%A' type changed to PROGBITS"), asect);
98ece1b3 3230 this_hdr->sh_type = sh_type;
3cddba1e
L
3231 }
3232
2f89ff8d 3233 switch (this_hdr->sh_type)
252b5132 3234 {
2f89ff8d 3235 default:
2f89ff8d
L
3236 break;
3237
3238 case SHT_STRTAB:
2f89ff8d
L
3239 case SHT_NOTE:
3240 case SHT_NOBITS:
3241 case SHT_PROGBITS:
3242 break;
606851fb
AM
3243
3244 case SHT_INIT_ARRAY:
3245 case SHT_FINI_ARRAY:
3246 case SHT_PREINIT_ARRAY:
3247 this_hdr->sh_entsize = bed->s->arch_size / 8;
3248 break;
2f89ff8d
L
3249
3250 case SHT_HASH:
c7ac6ff8 3251 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
2f89ff8d 3252 break;
5de3bf90 3253
2f89ff8d 3254 case SHT_DYNSYM:
252b5132 3255 this_hdr->sh_entsize = bed->s->sizeof_sym;
2f89ff8d
L
3256 break;
3257
3258 case SHT_DYNAMIC:
252b5132 3259 this_hdr->sh_entsize = bed->s->sizeof_dyn;
2f89ff8d
L
3260 break;
3261
3262 case SHT_RELA:
3263 if (get_elf_backend_data (abfd)->may_use_rela_p)
3264 this_hdr->sh_entsize = bed->s->sizeof_rela;
3265 break;
3266
3267 case SHT_REL:
3268 if (get_elf_backend_data (abfd)->may_use_rel_p)
3269 this_hdr->sh_entsize = bed->s->sizeof_rel;
3270 break;
3271
3272 case SHT_GNU_versym:
252b5132 3273 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
2f89ff8d
L
3274 break;
3275
3276 case SHT_GNU_verdef:
252b5132
RH
3277 this_hdr->sh_entsize = 0;
3278 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3279 cverdefs. The linker will set cverdefs, but sh_info will be
3280 zero. */
252b5132
RH
3281 if (this_hdr->sh_info == 0)
3282 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3283 else
3284 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3285 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
2f89ff8d
L
3286 break;
3287
3288 case SHT_GNU_verneed:
252b5132
RH
3289 this_hdr->sh_entsize = 0;
3290 /* objcopy or strip will copy over sh_info, but may not set
08a40648
AM
3291 cverrefs. The linker will set cverrefs, but sh_info will be
3292 zero. */
252b5132
RH
3293 if (this_hdr->sh_info == 0)
3294 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3295 else
3296 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3297 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
2f89ff8d
L
3298 break;
3299
3300 case SHT_GROUP:
1783205a 3301 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
2f89ff8d 3302 break;
fdc90cb4
JJ
3303
3304 case SHT_GNU_HASH:
3305 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3306 break;
dbb410c3 3307 }
252b5132
RH
3308
3309 if ((asect->flags & SEC_ALLOC) != 0)
3310 this_hdr->sh_flags |= SHF_ALLOC;
3311 if ((asect->flags & SEC_READONLY) == 0)
3312 this_hdr->sh_flags |= SHF_WRITE;
3313 if ((asect->flags & SEC_CODE) != 0)
3314 this_hdr->sh_flags |= SHF_EXECINSTR;
f5fa8ca2
JJ
3315 if ((asect->flags & SEC_MERGE) != 0)
3316 {
3317 this_hdr->sh_flags |= SHF_MERGE;
3318 this_hdr->sh_entsize = asect->entsize;
f5fa8ca2 3319 }
84865015
NC
3320 if ((asect->flags & SEC_STRINGS) != 0)
3321 this_hdr->sh_flags |= SHF_STRINGS;
1126897b 3322 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
dbb410c3 3323 this_hdr->sh_flags |= SHF_GROUP;
13ae64f3 3324 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
704afa60
JJ
3325 {
3326 this_hdr->sh_flags |= SHF_TLS;
3a800eb9
AM
3327 if (asect->size == 0
3328 && (asect->flags & SEC_HAS_CONTENTS) == 0)
704afa60 3329 {
3a800eb9 3330 struct bfd_link_order *o = asect->map_tail.link_order;
b34976b6 3331
704afa60 3332 this_hdr->sh_size = 0;
3a800eb9
AM
3333 if (o != NULL)
3334 {
704afa60 3335 this_hdr->sh_size = o->offset + o->size;
3a800eb9
AM
3336 if (this_hdr->sh_size != 0)
3337 this_hdr->sh_type = SHT_NOBITS;
3338 }
704afa60
JJ
3339 }
3340 }
18ae9cc1
L
3341 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3342 this_hdr->sh_flags |= SHF_EXCLUDE;
252b5132 3343
d4730f92
BS
3344 /* If the section has relocs, set up a section header for the
3345 SHT_REL[A] section. If two relocation sections are required for
3346 this section, it is up to the processor-specific back-end to
3347 create the other. */
3348 if ((asect->flags & SEC_RELOC) != 0)
3349 {
3350 /* When doing a relocatable link, create both REL and RELA sections if
3351 needed. */
3352 if (arg->link_info
3353 /* Do the normal setup if we wouldn't create any sections here. */
3354 && esd->rel.count + esd->rela.count > 0
0e1862bb
L
3355 && (bfd_link_relocatable (arg->link_info)
3356 || arg->link_info->emitrelocations))
d4730f92
BS
3357 {
3358 if (esd->rel.count && esd->rel.hdr == NULL
3e19fb8f
L
3359 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name, FALSE,
3360 delay_st_name_p))
d4730f92
BS
3361 {
3362 arg->failed = TRUE;
3363 return;
3364 }
3365 if (esd->rela.count && esd->rela.hdr == NULL
3e19fb8f
L
3366 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name, TRUE,
3367 delay_st_name_p))
d4730f92
BS
3368 {
3369 arg->failed = TRUE;
3370 return;
3371 }
3372 }
3373 else if (!_bfd_elf_init_reloc_shdr (abfd,
3374 (asect->use_rela_p
3375 ? &esd->rela : &esd->rel),
f6fe1ccd 3376 name,
3e19fb8f
L
3377 asect->use_rela_p,
3378 delay_st_name_p))
d4730f92
BS
3379 arg->failed = TRUE;
3380 }
3381
252b5132 3382 /* Check for processor-specific section types. */
0414f35b 3383 sh_type = this_hdr->sh_type;
e1fddb6b
AO
3384 if (bed->elf_backend_fake_sections
3385 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
d4730f92 3386 arg->failed = TRUE;
252b5132 3387
42bb2e33 3388 if (sh_type == SHT_NOBITS && asect->size != 0)
0414f35b
AM
3389 {
3390 /* Don't change the header type from NOBITS if we are being
42bb2e33 3391 called for objcopy --only-keep-debug. */
0414f35b
AM
3392 this_hdr->sh_type = sh_type;
3393 }
252b5132
RH
3394}
3395
bcacc0f5
AM
3396/* Fill in the contents of a SHT_GROUP section. Called from
3397 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3398 when ELF targets use the generic linker, ld. Called for ld -r
3399 from bfd_elf_final_link. */
dbb410c3 3400
1126897b 3401void
217aa764 3402bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
dbb410c3 3403{
a50b1753 3404 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
9dce4196 3405 asection *elt, *first;
dbb410c3 3406 unsigned char *loc;
b34976b6 3407 bfd_boolean gas;
dbb410c3 3408
7e4111ad
L
3409 /* Ignore linker created group section. See elfNN_ia64_object_p in
3410 elfxx-ia64.c. */
3411 if (((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP)
dbb410c3
AM
3412 || *failedptr)
3413 return;
3414
bcacc0f5
AM
3415 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3416 {
3417 unsigned long symindx = 0;
3418
3419 /* elf_group_id will have been set up by objcopy and the
3420 generic linker. */
3421 if (elf_group_id (sec) != NULL)
3422 symindx = elf_group_id (sec)->udata.i;
1126897b 3423
bcacc0f5
AM
3424 if (symindx == 0)
3425 {
3426 /* If called from the assembler, swap_out_syms will have set up
3427 elf_section_syms. */
3428 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3429 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3430 }
3431 elf_section_data (sec)->this_hdr.sh_info = symindx;
3432 }
3433 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
1126897b 3434 {
bcacc0f5
AM
3435 /* The ELF backend linker sets sh_info to -2 when the group
3436 signature symbol is global, and thus the index can't be
3437 set until all local symbols are output. */
53720c49
AM
3438 asection *igroup;
3439 struct bfd_elf_section_data *sec_data;
3440 unsigned long symndx;
3441 unsigned long extsymoff;
bcacc0f5
AM
3442 struct elf_link_hash_entry *h;
3443
53720c49
AM
3444 /* The point of this little dance to the first SHF_GROUP section
3445 then back to the SHT_GROUP section is that this gets us to
3446 the SHT_GROUP in the input object. */
3447 igroup = elf_sec_group (elf_next_in_group (sec));
3448 sec_data = elf_section_data (igroup);
3449 symndx = sec_data->this_hdr.sh_info;
3450 extsymoff = 0;
bcacc0f5
AM
3451 if (!elf_bad_symtab (igroup->owner))
3452 {
3453 Elf_Internal_Shdr *symtab_hdr;
3454
3455 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3456 extsymoff = symtab_hdr->sh_info;
3457 }
3458 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3459 while (h->root.type == bfd_link_hash_indirect
3460 || h->root.type == bfd_link_hash_warning)
3461 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3462
3463 elf_section_data (sec)->this_hdr.sh_info = h->indx;
1126897b 3464 }
dbb410c3 3465
1126897b 3466 /* The contents won't be allocated for "ld -r" or objcopy. */
b34976b6 3467 gas = TRUE;
dbb410c3
AM
3468 if (sec->contents == NULL)
3469 {
b34976b6 3470 gas = FALSE;
a50b1753 3471 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
9dce4196
AM
3472
3473 /* Arrange for the section to be written out. */
3474 elf_section_data (sec)->this_hdr.contents = sec->contents;
dbb410c3
AM
3475 if (sec->contents == NULL)
3476 {
b34976b6 3477 *failedptr = TRUE;
dbb410c3
AM
3478 return;
3479 }
3480 }
3481
eea6121a 3482 loc = sec->contents + sec->size;
dbb410c3 3483
9dce4196
AM
3484 /* Get the pointer to the first section in the group that gas
3485 squirreled away here. objcopy arranges for this to be set to the
3486 start of the input section group. */
3487 first = elt = elf_next_in_group (sec);
dbb410c3
AM
3488
3489 /* First element is a flag word. Rest of section is elf section
3490 indices for all the sections of the group. Write them backwards
3491 just to keep the group in the same order as given in .section
3492 directives, not that it matters. */
3493 while (elt != NULL)
3494 {
9dce4196 3495 asection *s;
9dce4196 3496
9dce4196 3497 s = elt;
415f38a6
AM
3498 if (!gas)
3499 s = s->output_section;
3500 if (s != NULL
3501 && !bfd_is_abs_section (s))
01e1a5bc 3502 {
415f38a6
AM
3503 unsigned int idx = elf_section_data (s)->this_idx;
3504
01e1a5bc 3505 loc -= 4;
01e1a5bc
NC
3506 H_PUT_32 (abfd, idx, loc);
3507 }
945906ff 3508 elt = elf_next_in_group (elt);
9dce4196
AM
3509 if (elt == first)
3510 break;
dbb410c3
AM
3511 }
3512
3d7f7666 3513 if ((loc -= 4) != sec->contents)
9dce4196 3514 abort ();
dbb410c3 3515
9dce4196 3516 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
dbb410c3
AM
3517}
3518
bd53a53a
L
3519/* Return the section which RELOC_SEC applies to. */
3520
3521asection *
3522_bfd_elf_get_reloc_section (asection *reloc_sec)
3523{
3524 const char *name;
3525 unsigned int type;
3526 bfd *abfd;
3527
3528 if (reloc_sec == NULL)
3529 return NULL;
3530
3531 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3532 if (type != SHT_REL && type != SHT_RELA)
3533 return NULL;
3534
3535 /* We look up the section the relocs apply to by name. */
3536 name = reloc_sec->name;
3537 if (type == SHT_REL)
3538 name += 4;
3539 else
3540 name += 5;
3541
3542 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3543 section apply to .got.plt section. */
3544 abfd = reloc_sec->owner;
3545 if (get_elf_backend_data (abfd)->want_got_plt
3546 && strcmp (name, ".plt") == 0)
87070c08
AM
3547 {
3548 /* .got.plt is a linker created input section. It may be mapped
3549 to some other output section. Try two likely sections. */
3550 name = ".got.plt";
3551 reloc_sec = bfd_get_section_by_name (abfd, name);
3552 if (reloc_sec != NULL)
3553 return reloc_sec;
3554 name = ".got";
3555 }
bd53a53a
L
3556
3557 reloc_sec = bfd_get_section_by_name (abfd, name);
3558 return reloc_sec;
3559}
3560
252b5132
RH
3561/* Assign all ELF section numbers. The dummy first section is handled here
3562 too. The link/info pointers for the standard section types are filled
3563 in here too, while we're at it. */
3564
b34976b6 3565static bfd_boolean
da9f89d4 3566assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
252b5132
RH
3567{
3568 struct elf_obj_tdata *t = elf_tdata (abfd);
3569 asection *sec;
3e19fb8f 3570 unsigned int section_number;
252b5132 3571 Elf_Internal_Shdr **i_shdrp;
47cc2cf5 3572 struct bfd_elf_section_data *d;
3516e984 3573 bfd_boolean need_symtab;
252b5132
RH
3574
3575 section_number = 1;
3576
2b0f7ef9
JJ
3577 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3578
da9f89d4 3579 /* SHT_GROUP sections are in relocatable files only. */
0e1862bb 3580 if (link_info == NULL || bfd_link_relocatable (link_info))
252b5132 3581 {
ef53be89 3582 size_t reloc_count = 0;
14f2c699 3583
da9f89d4 3584 /* Put SHT_GROUP sections first. */
04dd1667 3585 for (sec = abfd->sections; sec != NULL; sec = sec->next)
47cc2cf5 3586 {
5daa8fe7 3587 d = elf_section_data (sec);
da9f89d4
L
3588
3589 if (d->this_hdr.sh_type == SHT_GROUP)
08a40648 3590 {
5daa8fe7 3591 if (sec->flags & SEC_LINKER_CREATED)
da9f89d4
L
3592 {
3593 /* Remove the linker created SHT_GROUP sections. */
5daa8fe7 3594 bfd_section_list_remove (abfd, sec);
da9f89d4 3595 abfd->section_count--;
da9f89d4 3596 }
08a40648 3597 else
4fbb74a6 3598 d->this_idx = section_number++;
da9f89d4 3599 }
14f2c699
L
3600
3601 /* Count relocations. */
3602 reloc_count += sec->reloc_count;
47cc2cf5 3603 }
14f2c699
L
3604
3605 /* Clear HAS_RELOC if there are no relocations. */
3606 if (reloc_count == 0)
3607 abfd->flags &= ~HAS_RELOC;
47cc2cf5
PB
3608 }
3609
3610 for (sec = abfd->sections; sec; sec = sec->next)
3611 {
3612 d = elf_section_data (sec);
3613
3614 if (d->this_hdr.sh_type != SHT_GROUP)
4fbb74a6 3615 d->this_idx = section_number++;
3e19fb8f
L
3616 if (d->this_hdr.sh_name != (unsigned int) -1)
3617 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
d4730f92 3618 if (d->rel.hdr)
2b0f7ef9 3619 {
d4730f92 3620 d->rel.idx = section_number++;
3e19fb8f
L
3621 if (d->rel.hdr->sh_name != (unsigned int) -1)
3622 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
2b0f7ef9 3623 }
d4730f92
BS
3624 else
3625 d->rel.idx = 0;
23bc299b 3626
d4730f92 3627 if (d->rela.hdr)
2b0f7ef9 3628 {
d4730f92 3629 d->rela.idx = section_number++;
3e19fb8f
L
3630 if (d->rela.hdr->sh_name != (unsigned int) -1)
3631 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
2b0f7ef9 3632 }
23bc299b 3633 else
d4730f92 3634 d->rela.idx = 0;
252b5132
RH
3635 }
3636
3516e984
L
3637 need_symtab = (bfd_get_symcount (abfd) > 0
3638 || (link_info == NULL
3639 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3640 == HAS_RELOC)));
3641 if (need_symtab)
252b5132 3642 {
12bd6957 3643 elf_onesymtab (abfd) = section_number++;
2b0f7ef9 3644 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
4fbb74a6 3645 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
9ad5cbcf 3646 {
6a40cf0c
NC
3647 elf_section_list * entry;
3648
3649 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3650
3651 entry = bfd_zalloc (abfd, sizeof * entry);
3652 entry->ndx = section_number++;
3653 elf_symtab_shndx_list (abfd) = entry;
3654 entry->hdr.sh_name
9ad5cbcf 3655 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
b34976b6 3656 ".symtab_shndx", FALSE);
6a40cf0c 3657 if (entry->hdr.sh_name == (unsigned int) -1)
b34976b6 3658 return FALSE;
9ad5cbcf 3659 }
12bd6957 3660 elf_strtab_sec (abfd) = section_number++;
2b0f7ef9 3661 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
252b5132
RH
3662 }
3663
dd905818
NC
3664 elf_shstrtab_sec (abfd) = section_number++;
3665 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3666 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3667
1c52a645
L
3668 if (section_number >= SHN_LORESERVE)
3669 {
695344c0 3670 /* xgettext:c-format */
1c52a645
L
3671 _bfd_error_handler (_("%B: too many sections: %u"),
3672 abfd, section_number);
3673 return FALSE;
3674 }
3675
9ad5cbcf 3676 elf_numsections (abfd) = section_number;
252b5132
RH
3677 elf_elfheader (abfd)->e_shnum = section_number;
3678
3679 /* Set up the list of section header pointers, in agreement with the
3680 indices. */
a50b1753
NC
3681 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc2 (abfd, section_number,
3682 sizeof (Elf_Internal_Shdr *));
252b5132 3683 if (i_shdrp == NULL)
b34976b6 3684 return FALSE;
252b5132 3685
a50b1753
NC
3686 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3687 sizeof (Elf_Internal_Shdr));
252b5132
RH
3688 if (i_shdrp[0] == NULL)
3689 {
3690 bfd_release (abfd, i_shdrp);
b34976b6 3691 return FALSE;
252b5132 3692 }
252b5132
RH
3693
3694 elf_elfsections (abfd) = i_shdrp;
3695
12bd6957 3696 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3516e984 3697 if (need_symtab)
252b5132 3698 {
12bd6957 3699 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
4fbb74a6 3700 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
9ad5cbcf 3701 {
6a40cf0c
NC
3702 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3703 BFD_ASSERT (entry != NULL);
3704 i_shdrp[entry->ndx] = & entry->hdr;
3705 entry->hdr.sh_link = elf_onesymtab (abfd);
9ad5cbcf 3706 }
12bd6957
AM
3707 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3708 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
252b5132 3709 }
38ce5b11 3710
252b5132
RH
3711 for (sec = abfd->sections; sec; sec = sec->next)
3712 {
252b5132 3713 asection *s;
252b5132 3714
91d6fa6a
NC
3715 d = elf_section_data (sec);
3716
252b5132 3717 i_shdrp[d->this_idx] = &d->this_hdr;
d4730f92
BS
3718 if (d->rel.idx != 0)
3719 i_shdrp[d->rel.idx] = d->rel.hdr;
3720 if (d->rela.idx != 0)
3721 i_shdrp[d->rela.idx] = d->rela.hdr;
252b5132
RH
3722
3723 /* Fill in the sh_link and sh_info fields while we're at it. */
3724
3725 /* sh_link of a reloc section is the section index of the symbol
3726 table. sh_info is the section index of the section to which
3727 the relocation entries apply. */
d4730f92 3728 if (d->rel.idx != 0)
252b5132 3729 {
12bd6957 3730 d->rel.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3731 d->rel.hdr->sh_info = d->this_idx;
9ef5d938 3732 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
252b5132 3733 }
d4730f92 3734 if (d->rela.idx != 0)
23bc299b 3735 {
12bd6957 3736 d->rela.hdr->sh_link = elf_onesymtab (abfd);
d4730f92 3737 d->rela.hdr->sh_info = d->this_idx;
9ef5d938 3738 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
23bc299b 3739 }
252b5132 3740
38ce5b11
L
3741 /* We need to set up sh_link for SHF_LINK_ORDER. */
3742 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3743 {
3744 s = elf_linked_to_section (sec);
3745 if (s)
38ce5b11 3746 {
f2876037 3747 /* elf_linked_to_section points to the input section. */
ccd2ec6a 3748 if (link_info != NULL)
38ce5b11 3749 {
f2876037 3750 /* Check discarded linkonce section. */
dbaa2011 3751 if (discarded_section (s))
38ce5b11 3752 {
ccd2ec6a 3753 asection *kept;
4eca0228 3754 _bfd_error_handler
695344c0 3755 /* xgettext:c-format */
ccd2ec6a
L
3756 (_("%B: sh_link of section `%A' points to discarded section `%A' of `%B'"),
3757 abfd, d->this_hdr.bfd_section,
3758 s, s->owner);
3759 /* Point to the kept section if it has the same
3760 size as the discarded one. */
c0f00686 3761 kept = _bfd_elf_check_kept_section (s, link_info);
ccd2ec6a 3762 if (kept == NULL)
185d09ad 3763 {
ccd2ec6a
L
3764 bfd_set_error (bfd_error_bad_value);
3765 return FALSE;
185d09ad 3766 }
ccd2ec6a 3767 s = kept;
38ce5b11 3768 }
e424ecc8 3769
ccd2ec6a
L
3770 s = s->output_section;
3771 BFD_ASSERT (s != NULL);
38ce5b11 3772 }
f2876037
L
3773 else
3774 {
3775 /* Handle objcopy. */
3776 if (s->output_section == NULL)
3777 {
4eca0228 3778 _bfd_error_handler
695344c0 3779 /* xgettext:c-format */
f2876037
L
3780 (_("%B: sh_link of section `%A' points to removed section `%A' of `%B'"),
3781 abfd, d->this_hdr.bfd_section, s, s->owner);
3782 bfd_set_error (bfd_error_bad_value);
3783 return FALSE;
3784 }
3785 s = s->output_section;
3786 }
ccd2ec6a
L
3787 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3788 }
3789 else
3790 {
3791 /* PR 290:
3792 The Intel C compiler generates SHT_IA_64_UNWIND with
3793 SHF_LINK_ORDER. But it doesn't set the sh_link or
3794 sh_info fields. Hence we could get the situation
08a40648 3795 where s is NULL. */
ccd2ec6a
L
3796 const struct elf_backend_data *bed
3797 = get_elf_backend_data (abfd);
3798 if (bed->link_order_error_handler)
3799 bed->link_order_error_handler
695344c0 3800 /* xgettext:c-format */
ccd2ec6a
L
3801 (_("%B: warning: sh_link not set for section `%A'"),
3802 abfd, sec);
38ce5b11
L
3803 }
3804 }
3805
252b5132
RH
3806 switch (d->this_hdr.sh_type)
3807 {
3808 case SHT_REL:
3809 case SHT_RELA:
3810 /* A reloc section which we are treating as a normal BFD
3811 section. sh_link is the section index of the symbol
3812 table. sh_info is the section index of the section to
3813 which the relocation entries apply. We assume that an
3814 allocated reloc section uses the dynamic symbol table.
3815 FIXME: How can we be sure? */
3816 s = bfd_get_section_by_name (abfd, ".dynsym");
3817 if (s != NULL)
3818 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3819
bd53a53a 3820 s = get_elf_backend_data (abfd)->get_reloc_section (sec);
252b5132 3821 if (s != NULL)
9ef5d938
L
3822 {
3823 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3824 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3825 }
252b5132
RH
3826 break;
3827
3828 case SHT_STRTAB:
3829 /* We assume that a section named .stab*str is a stabs
3830 string section. We look for a section with the same name
3831 but without the trailing ``str'', and set its sh_link
3832 field to point to this section. */
0112cd26 3833 if (CONST_STRNEQ (sec->name, ".stab")
252b5132
RH
3834 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3835 {
3836 size_t len;
3837 char *alc;
3838
3839 len = strlen (sec->name);
a50b1753 3840 alc = (char *) bfd_malloc (len - 2);
252b5132 3841 if (alc == NULL)
b34976b6 3842 return FALSE;
d4c88bbb 3843 memcpy (alc, sec->name, len - 3);
252b5132
RH
3844 alc[len - 3] = '\0';
3845 s = bfd_get_section_by_name (abfd, alc);
3846 free (alc);
3847 if (s != NULL)
3848 {
3849 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3850
3851 /* This is a .stab section. */
0594c12d
AM
3852 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3853 elf_section_data (s)->this_hdr.sh_entsize
3854 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
252b5132
RH
3855 }
3856 }
3857 break;
3858
3859 case SHT_DYNAMIC:
3860 case SHT_DYNSYM:
3861 case SHT_GNU_verneed:
3862 case SHT_GNU_verdef:
3863 /* sh_link is the section header index of the string table
3864 used for the dynamic entries, or the symbol table, or the
3865 version strings. */
3866 s = bfd_get_section_by_name (abfd, ".dynstr");
3867 if (s != NULL)
3868 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3869 break;
3870
7f1204bb
JJ
3871 case SHT_GNU_LIBLIST:
3872 /* sh_link is the section header index of the prelink library
08a40648
AM
3873 list used for the dynamic entries, or the symbol table, or
3874 the version strings. */
7f1204bb
JJ
3875 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3876 ? ".dynstr" : ".gnu.libstr");
3877 if (s != NULL)
3878 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3879 break;
3880
252b5132 3881 case SHT_HASH:
fdc90cb4 3882 case SHT_GNU_HASH:
252b5132
RH
3883 case SHT_GNU_versym:
3884 /* sh_link is the section header index of the symbol table
3885 this hash table or version table is for. */
3886 s = bfd_get_section_by_name (abfd, ".dynsym");
3887 if (s != NULL)
3888 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3889 break;
dbb410c3
AM
3890
3891 case SHT_GROUP:
12bd6957 3892 d->this_hdr.sh_link = elf_onesymtab (abfd);
252b5132
RH
3893 }
3894 }
3895
3e19fb8f
L
3896 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3897 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3898 debug section name from .debug_* to .zdebug_* if needed. */
3899
b34976b6 3900 return TRUE;
252b5132
RH
3901}
3902
5372391b 3903static bfd_boolean
217aa764 3904sym_is_global (bfd *abfd, asymbol *sym)
252b5132
RH
3905{
3906 /* If the backend has a special mapping, use it. */
9c5bfbb7 3907 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764
AM
3908 if (bed->elf_backend_sym_is_global)
3909 return (*bed->elf_backend_sym_is_global) (abfd, sym);
252b5132 3910
e47bf690 3911 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
252b5132
RH
3912 || bfd_is_und_section (bfd_get_section (sym))
3913 || bfd_is_com_section (bfd_get_section (sym)));
3914}
3915
76359541
TP
3916/* Filter global symbols of ABFD to include in the import library. All
3917 SYMCOUNT symbols of ABFD can be examined from their pointers in
3918 SYMS. Pointers of symbols to keep should be stored contiguously at
3919 the beginning of that array.
3920
3921 Returns the number of symbols to keep. */
3922
3923unsigned int
3924_bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3925 asymbol **syms, long symcount)
3926{
3927 long src_count, dst_count = 0;
3928
3929 for (src_count = 0; src_count < symcount; src_count++)
3930 {
3931 asymbol *sym = syms[src_count];
3932 char *name = (char *) bfd_asymbol_name (sym);
3933 struct bfd_link_hash_entry *h;
3934
3935 if (!sym_is_global (abfd, sym))
3936 continue;
3937
3938 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
5df1bc57
AM
3939 if (h == NULL)
3940 continue;
76359541
TP
3941 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
3942 continue;
76359541
TP
3943 if (h->linker_def || h->ldscript_def)
3944 continue;
3945
3946 syms[dst_count++] = sym;
3947 }
3948
3949 syms[dst_count] = NULL;
3950
3951 return dst_count;
3952}
3953
5372391b 3954/* Don't output section symbols for sections that are not going to be
c6d8cab4 3955 output, that are duplicates or there is no BFD section. */
5372391b
AM
3956
3957static bfd_boolean
3958ignore_section_sym (bfd *abfd, asymbol *sym)
3959{
c6d8cab4
L
3960 elf_symbol_type *type_ptr;
3961
3962 if ((sym->flags & BSF_SECTION_SYM) == 0)
3963 return FALSE;
3964
3965 type_ptr = elf_symbol_from (abfd, sym);
3966 return ((type_ptr != NULL
3967 && type_ptr->internal_elf_sym.st_shndx != 0
3968 && bfd_is_abs_section (sym->section))
3969 || !(sym->section->owner == abfd
0f0a5e58 3970 || (sym->section->output_section->owner == abfd
2633a79c
AM
3971 && sym->section->output_offset == 0)
3972 || bfd_is_abs_section (sym->section)));
5372391b
AM
3973}
3974
2633a79c
AM
3975/* Map symbol from it's internal number to the external number, moving
3976 all local symbols to be at the head of the list. */
3977
b34976b6 3978static bfd_boolean
12bd6957 3979elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
252b5132 3980{
dc810e39 3981 unsigned int symcount = bfd_get_symcount (abfd);
252b5132
RH
3982 asymbol **syms = bfd_get_outsymbols (abfd);
3983 asymbol **sect_syms;
dc810e39
AM
3984 unsigned int num_locals = 0;
3985 unsigned int num_globals = 0;
3986 unsigned int num_locals2 = 0;
3987 unsigned int num_globals2 = 0;
7292b3ac 3988 unsigned int max_index = 0;
dc810e39 3989 unsigned int idx;
252b5132
RH
3990 asection *asect;
3991 asymbol **new_syms;
252b5132
RH
3992
3993#ifdef DEBUG
3994 fprintf (stderr, "elf_map_symbols\n");
3995 fflush (stderr);
3996#endif
3997
252b5132
RH
3998 for (asect = abfd->sections; asect; asect = asect->next)
3999 {
4000 if (max_index < asect->index)
4001 max_index = asect->index;
4002 }
4003
4004 max_index++;
a50b1753 4005 sect_syms = (asymbol **) bfd_zalloc2 (abfd, max_index, sizeof (asymbol *));
252b5132 4006 if (sect_syms == NULL)
b34976b6 4007 return FALSE;
252b5132 4008 elf_section_syms (abfd) = sect_syms;
4e89ac30 4009 elf_num_section_syms (abfd) = max_index;
252b5132 4010
079e9a2f
AM
4011 /* Init sect_syms entries for any section symbols we have already
4012 decided to output. */
252b5132
RH
4013 for (idx = 0; idx < symcount; idx++)
4014 {
dc810e39 4015 asymbol *sym = syms[idx];
c044fabd 4016
252b5132 4017 if ((sym->flags & BSF_SECTION_SYM) != 0
0f0a5e58 4018 && sym->value == 0
2633a79c
AM
4019 && !ignore_section_sym (abfd, sym)
4020 && !bfd_is_abs_section (sym->section))
252b5132 4021 {
5372391b 4022 asection *sec = sym->section;
252b5132 4023
5372391b
AM
4024 if (sec->owner != abfd)
4025 sec = sec->output_section;
252b5132 4026
5372391b 4027 sect_syms[sec->index] = syms[idx];
252b5132
RH
4028 }
4029 }
4030
252b5132
RH
4031 /* Classify all of the symbols. */
4032 for (idx = 0; idx < symcount; idx++)
4033 {
2633a79c 4034 if (sym_is_global (abfd, syms[idx]))
252b5132 4035 num_globals++;
2633a79c
AM
4036 else if (!ignore_section_sym (abfd, syms[idx]))
4037 num_locals++;
252b5132 4038 }
079e9a2f 4039
5372391b 4040 /* We will be adding a section symbol for each normal BFD section. Most
079e9a2f
AM
4041 sections will already have a section symbol in outsymbols, but
4042 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4043 at least in that case. */
252b5132
RH
4044 for (asect = abfd->sections; asect; asect = asect->next)
4045 {
079e9a2f 4046 if (sect_syms[asect->index] == NULL)
252b5132 4047 {
079e9a2f 4048 if (!sym_is_global (abfd, asect->symbol))
252b5132
RH
4049 num_locals++;
4050 else
4051 num_globals++;
252b5132
RH
4052 }
4053 }
4054
4055 /* Now sort the symbols so the local symbols are first. */
a50b1753
NC
4056 new_syms = (asymbol **) bfd_alloc2 (abfd, num_locals + num_globals,
4057 sizeof (asymbol *));
dc810e39 4058
252b5132 4059 if (new_syms == NULL)
b34976b6 4060 return FALSE;
252b5132
RH
4061
4062 for (idx = 0; idx < symcount; idx++)
4063 {
4064 asymbol *sym = syms[idx];
dc810e39 4065 unsigned int i;
252b5132 4066
2633a79c
AM
4067 if (sym_is_global (abfd, sym))
4068 i = num_locals + num_globals2++;
4069 else if (!ignore_section_sym (abfd, sym))
252b5132
RH
4070 i = num_locals2++;
4071 else
2633a79c 4072 continue;
252b5132
RH
4073 new_syms[i] = sym;
4074 sym->udata.i = i + 1;
4075 }
4076 for (asect = abfd->sections; asect; asect = asect->next)
4077 {
079e9a2f 4078 if (sect_syms[asect->index] == NULL)
252b5132 4079 {
079e9a2f 4080 asymbol *sym = asect->symbol;
dc810e39 4081 unsigned int i;
252b5132 4082
079e9a2f 4083 sect_syms[asect->index] = sym;
252b5132
RH
4084 if (!sym_is_global (abfd, sym))
4085 i = num_locals2++;
4086 else
4087 i = num_locals + num_globals2++;
4088 new_syms[i] = sym;
4089 sym->udata.i = i + 1;
4090 }
4091 }
4092
4093 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4094
12bd6957 4095 *pnum_locals = num_locals;
b34976b6 4096 return TRUE;
252b5132
RH
4097}
4098
4099/* Align to the maximum file alignment that could be required for any
4100 ELF data structure. */
4101
268b6b39 4102static inline file_ptr
217aa764 4103align_file_position (file_ptr off, int align)
252b5132
RH
4104{
4105 return (off + align - 1) & ~(align - 1);
4106}
4107
4108/* Assign a file position to a section, optionally aligning to the
4109 required section alignment. */
4110
217aa764
AM
4111file_ptr
4112_bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4113 file_ptr offset,
4114 bfd_boolean align)
252b5132 4115{
72de5009
AM
4116 if (align && i_shdrp->sh_addralign > 1)
4117 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
252b5132
RH
4118 i_shdrp->sh_offset = offset;
4119 if (i_shdrp->bfd_section != NULL)
4120 i_shdrp->bfd_section->filepos = offset;
4121 if (i_shdrp->sh_type != SHT_NOBITS)
4122 offset += i_shdrp->sh_size;
4123 return offset;
4124}
4125
4126/* Compute the file positions we are going to put the sections at, and
4127 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4128 is not NULL, this is being called by the ELF backend linker. */
4129
b34976b6 4130bfd_boolean
217aa764
AM
4131_bfd_elf_compute_section_file_positions (bfd *abfd,
4132 struct bfd_link_info *link_info)
252b5132 4133{
9c5bfbb7 4134 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
d4730f92 4135 struct fake_section_arg fsargs;
b34976b6 4136 bfd_boolean failed;
ef10c3ac 4137 struct elf_strtab_hash *strtab = NULL;
252b5132 4138 Elf_Internal_Shdr *shstrtab_hdr;
3516e984 4139 bfd_boolean need_symtab;
252b5132
RH
4140
4141 if (abfd->output_has_begun)
b34976b6 4142 return TRUE;
252b5132
RH
4143
4144 /* Do any elf backend specific processing first. */
4145 if (bed->elf_backend_begin_write_processing)
4146 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4147
4148 if (! prep_headers (abfd))
b34976b6 4149 return FALSE;
252b5132 4150
e6c51ed4 4151 /* Post process the headers if necessary. */
78245035 4152 (*bed->elf_backend_post_process_headers) (abfd, link_info);
e6c51ed4 4153
d4730f92
BS
4154 fsargs.failed = FALSE;
4155 fsargs.link_info = link_info;
4156 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4157 if (fsargs.failed)
b34976b6 4158 return FALSE;
252b5132 4159
da9f89d4 4160 if (!assign_section_numbers (abfd, link_info))
b34976b6 4161 return FALSE;
252b5132
RH
4162
4163 /* The backend linker builds symbol table information itself. */
3516e984
L
4164 need_symtab = (link_info == NULL
4165 && (bfd_get_symcount (abfd) > 0
4166 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4167 == HAS_RELOC)));
4168 if (need_symtab)
252b5132
RH
4169 {
4170 /* Non-zero if doing a relocatable link. */
4171 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4172
4173 if (! swap_out_syms (abfd, &strtab, relocatable_p))
b34976b6 4174 return FALSE;
252b5132
RH
4175 }
4176
d4730f92 4177 failed = FALSE;
1126897b 4178 if (link_info == NULL)
dbb410c3 4179 {
1126897b 4180 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
dbb410c3 4181 if (failed)
b34976b6 4182 return FALSE;
dbb410c3
AM
4183 }
4184
252b5132
RH
4185 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4186 /* sh_name was set in prep_headers. */
4187 shstrtab_hdr->sh_type = SHT_STRTAB;
84865015 4188 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
252b5132 4189 shstrtab_hdr->sh_addr = 0;
946748d5 4190 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4191 shstrtab_hdr->sh_entsize = 0;
4192 shstrtab_hdr->sh_link = 0;
4193 shstrtab_hdr->sh_info = 0;
3e19fb8f 4194 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
252b5132
RH
4195 shstrtab_hdr->sh_addralign = 1;
4196
c84fca4d 4197 if (!assign_file_positions_except_relocs (abfd, link_info))
b34976b6 4198 return FALSE;
252b5132 4199
3516e984 4200 if (need_symtab)
252b5132
RH
4201 {
4202 file_ptr off;
4203 Elf_Internal_Shdr *hdr;
4204
12bd6957 4205 off = elf_next_file_pos (abfd);
252b5132 4206
6a40cf0c 4207 hdr = & elf_symtab_hdr (abfd);
b34976b6 4208 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4209
6a40cf0c
NC
4210 if (elf_symtab_shndx_list (abfd) != NULL)
4211 {
4212 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4213 if (hdr->sh_size != 0)
4214 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4215 /* FIXME: What about other symtab_shndx sections in the list ? */
4216 }
9ad5cbcf 4217
252b5132 4218 hdr = &elf_tdata (abfd)->strtab_hdr;
b34976b6 4219 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 4220
12bd6957 4221 elf_next_file_pos (abfd) = off;
252b5132
RH
4222
4223 /* Now that we know where the .strtab section goes, write it
08a40648 4224 out. */
252b5132 4225 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
ef10c3ac 4226 || ! _bfd_elf_strtab_emit (abfd, strtab))
b34976b6 4227 return FALSE;
ef10c3ac 4228 _bfd_elf_strtab_free (strtab);
252b5132
RH
4229 }
4230
b34976b6 4231 abfd->output_has_begun = TRUE;
252b5132 4232
b34976b6 4233 return TRUE;
252b5132
RH
4234}
4235
8ded5a0f
AM
4236/* Make an initial estimate of the size of the program header. If we
4237 get the number wrong here, we'll redo section placement. */
4238
4239static bfd_size_type
4240get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4241{
4242 size_t segs;
4243 asection *s;
2b05f1b7 4244 const struct elf_backend_data *bed;
8ded5a0f
AM
4245
4246 /* Assume we will need exactly two PT_LOAD segments: one for text
4247 and one for data. */
4248 segs = 2;
4249
4250 s = bfd_get_section_by_name (abfd, ".interp");
4251 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4252 {
4253 /* If we have a loadable interpreter section, we need a
4254 PT_INTERP segment. In this case, assume we also need a
4255 PT_PHDR segment, although that may not be true for all
4256 targets. */
e9a38e0f 4257 segs += 2;
8ded5a0f
AM
4258 }
4259
4260 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4261 {
4262 /* We need a PT_DYNAMIC segment. */
4263 ++segs;
f210dcff 4264 }
08a40648 4265
ceae84aa 4266 if (info != NULL && info->relro)
f210dcff
L
4267 {
4268 /* We need a PT_GNU_RELRO segment. */
4269 ++segs;
8ded5a0f
AM
4270 }
4271
12bd6957 4272 if (elf_eh_frame_hdr (abfd))
8ded5a0f
AM
4273 {
4274 /* We need a PT_GNU_EH_FRAME segment. */
4275 ++segs;
4276 }
4277
12bd6957 4278 if (elf_stack_flags (abfd))
8ded5a0f 4279 {
2b05f1b7
L
4280 /* We need a PT_GNU_STACK segment. */
4281 ++segs;
4282 }
94b11780 4283
2b05f1b7
L
4284 for (s = abfd->sections; s != NULL; s = s->next)
4285 {
8ded5a0f 4286 if ((s->flags & SEC_LOAD) != 0
0112cd26 4287 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f
AM
4288 {
4289 /* We need a PT_NOTE segment. */
4290 ++segs;
1c5265b5
JJ
4291 /* Try to create just one PT_NOTE segment
4292 for all adjacent loadable .note* sections.
4293 gABI requires that within a PT_NOTE segment
4294 (and also inside of each SHT_NOTE section)
4295 each note is padded to a multiple of 4 size,
4296 so we check whether the sections are correctly
4297 aligned. */
4298 if (s->alignment_power == 2)
4299 while (s->next != NULL
4300 && s->next->alignment_power == 2
4301 && (s->next->flags & SEC_LOAD) != 0
4302 && CONST_STRNEQ (s->next->name, ".note"))
4303 s = s->next;
8ded5a0f
AM
4304 }
4305 }
4306
4307 for (s = abfd->sections; s != NULL; s = s->next)
4308 {
4309 if (s->flags & SEC_THREAD_LOCAL)
4310 {
4311 /* We need a PT_TLS segment. */
4312 ++segs;
4313 break;
4314 }
4315 }
4316
4317 /* Let the backend count up any program headers it might need. */
2b05f1b7 4318 bed = get_elf_backend_data (abfd);
8ded5a0f
AM
4319 if (bed->elf_backend_additional_program_headers)
4320 {
4321 int a;
4322
4323 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4324 if (a == -1)
4325 abort ();
4326 segs += a;
4327 }
4328
4329 return segs * bed->s->sizeof_phdr;
4330}
4331
2ea37f1c
NC
4332/* Find the segment that contains the output_section of section. */
4333
4334Elf_Internal_Phdr *
4335_bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4336{
4337 struct elf_segment_map *m;
4338 Elf_Internal_Phdr *p;
4339
12bd6957 4340 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
2ea37f1c
NC
4341 m != NULL;
4342 m = m->next, p++)
4343 {
4344 int i;
4345
4346 for (i = m->count - 1; i >= 0; i--)
4347 if (m->sections[i] == section)
4348 return p;
4349 }
4350
4351 return NULL;
4352}
4353
252b5132
RH
4354/* Create a mapping from a set of sections to a program segment. */
4355
217aa764
AM
4356static struct elf_segment_map *
4357make_mapping (bfd *abfd,
4358 asection **sections,
4359 unsigned int from,
4360 unsigned int to,
4361 bfd_boolean phdr)
252b5132
RH
4362{
4363 struct elf_segment_map *m;
4364 unsigned int i;
4365 asection **hdrpp;
dc810e39 4366 bfd_size_type amt;
252b5132 4367
dc810e39
AM
4368 amt = sizeof (struct elf_segment_map);
4369 amt += (to - from - 1) * sizeof (asection *);
a50b1753 4370 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4371 if (m == NULL)
4372 return NULL;
4373 m->next = NULL;
4374 m->p_type = PT_LOAD;
4375 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4376 m->sections[i - from] = *hdrpp;
4377 m->count = to - from;
4378
4379 if (from == 0 && phdr)
4380 {
4381 /* Include the headers in the first PT_LOAD segment. */
4382 m->includes_filehdr = 1;
4383 m->includes_phdrs = 1;
4384 }
4385
4386 return m;
4387}
4388
229fcec5
MM
4389/* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4390 on failure. */
4391
4392struct elf_segment_map *
4393_bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4394{
4395 struct elf_segment_map *m;
4396
a50b1753
NC
4397 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4398 sizeof (struct elf_segment_map));
229fcec5
MM
4399 if (m == NULL)
4400 return NULL;
4401 m->next = NULL;
4402 m->p_type = PT_DYNAMIC;
4403 m->count = 1;
4404 m->sections[0] = dynsec;
08a40648 4405
229fcec5
MM
4406 return m;
4407}
4408
8ded5a0f 4409/* Possibly add or remove segments from the segment map. */
252b5132 4410
b34976b6 4411static bfd_boolean
3dea8fca
AM
4412elf_modify_segment_map (bfd *abfd,
4413 struct bfd_link_info *info,
4414 bfd_boolean remove_empty_load)
252b5132 4415{
252e386e 4416 struct elf_segment_map **m;
8ded5a0f 4417 const struct elf_backend_data *bed;
252b5132 4418
8ded5a0f
AM
4419 /* The placement algorithm assumes that non allocated sections are
4420 not in PT_LOAD segments. We ensure this here by removing such
4421 sections from the segment map. We also remove excluded
252e386e
AM
4422 sections. Finally, any PT_LOAD segment without sections is
4423 removed. */
12bd6957 4424 m = &elf_seg_map (abfd);
252e386e 4425 while (*m)
8ded5a0f
AM
4426 {
4427 unsigned int i, new_count;
252b5132 4428
252e386e 4429 for (new_count = 0, i = 0; i < (*m)->count; i++)
8ded5a0f 4430 {
252e386e
AM
4431 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4432 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4433 || (*m)->p_type != PT_LOAD))
8ded5a0f 4434 {
252e386e
AM
4435 (*m)->sections[new_count] = (*m)->sections[i];
4436 new_count++;
8ded5a0f
AM
4437 }
4438 }
252e386e 4439 (*m)->count = new_count;
252b5132 4440
1a9ccd70
NC
4441 if (remove_empty_load
4442 && (*m)->p_type == PT_LOAD
4443 && (*m)->count == 0
4444 && !(*m)->includes_phdrs)
252e386e
AM
4445 *m = (*m)->next;
4446 else
4447 m = &(*m)->next;
8ded5a0f 4448 }
252b5132 4449
8ded5a0f
AM
4450 bed = get_elf_backend_data (abfd);
4451 if (bed->elf_backend_modify_segment_map != NULL)
252b5132 4452 {
252e386e 4453 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
8ded5a0f 4454 return FALSE;
252b5132 4455 }
252b5132 4456
8ded5a0f
AM
4457 return TRUE;
4458}
252b5132 4459
8ded5a0f 4460/* Set up a mapping from BFD sections to program segments. */
252b5132 4461
8ded5a0f
AM
4462bfd_boolean
4463_bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4464{
4465 unsigned int count;
4466 struct elf_segment_map *m;
4467 asection **sections = NULL;
4468 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3dea8fca 4469 bfd_boolean no_user_phdrs;
252b5132 4470
12bd6957 4471 no_user_phdrs = elf_seg_map (abfd) == NULL;
d324f6d6
RM
4472
4473 if (info != NULL)
4474 info->user_phdrs = !no_user_phdrs;
4475
3dea8fca 4476 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
252b5132 4477 {
8ded5a0f
AM
4478 asection *s;
4479 unsigned int i;
4480 struct elf_segment_map *mfirst;
4481 struct elf_segment_map **pm;
4482 asection *last_hdr;
4483 bfd_vma last_size;
4484 unsigned int phdr_index;
4485 bfd_vma maxpagesize;
4486 asection **hdrpp;
4487 bfd_boolean phdr_in_segment = TRUE;
4488 bfd_boolean writable;
4489 int tls_count = 0;
4490 asection *first_tls = NULL;
4491 asection *dynsec, *eh_frame_hdr;
4492 bfd_size_type amt;
8d06853e 4493 bfd_vma addr_mask, wrap_to = 0;
1a9ccd70 4494 bfd_boolean linker_created_pt_phdr_segment = FALSE;
252b5132 4495
8ded5a0f 4496 /* Select the allocated sections, and sort them. */
252b5132 4497
a50b1753
NC
4498 sections = (asection **) bfd_malloc2 (bfd_count_sections (abfd),
4499 sizeof (asection *));
8ded5a0f 4500 if (sections == NULL)
252b5132 4501 goto error_return;
252b5132 4502
8d06853e
AM
4503 /* Calculate top address, avoiding undefined behaviour of shift
4504 left operator when shift count is equal to size of type
4505 being shifted. */
4506 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4507 addr_mask = (addr_mask << 1) + 1;
4508
8ded5a0f
AM
4509 i = 0;
4510 for (s = abfd->sections; s != NULL; s = s->next)
4511 {
4512 if ((s->flags & SEC_ALLOC) != 0)
4513 {
4514 sections[i] = s;
4515 ++i;
8d06853e
AM
4516 /* A wrapping section potentially clashes with header. */
4517 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4518 wrap_to = (s->lma + s->size) & addr_mask;
8ded5a0f
AM
4519 }
4520 }
4521 BFD_ASSERT (i <= bfd_count_sections (abfd));
4522 count = i;
252b5132 4523
8ded5a0f 4524 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
252b5132 4525
8ded5a0f 4526 /* Build the mapping. */
252b5132 4527
8ded5a0f
AM
4528 mfirst = NULL;
4529 pm = &mfirst;
252b5132 4530
8ded5a0f
AM
4531 /* If we have a .interp section, then create a PT_PHDR segment for
4532 the program headers and a PT_INTERP segment for the .interp
4533 section. */
4534 s = bfd_get_section_by_name (abfd, ".interp");
4535 if (s != NULL && (s->flags & SEC_LOAD) != 0)
4536 {
4537 amt = sizeof (struct elf_segment_map);
a50b1753 4538 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4539 if (m == NULL)
4540 goto error_return;
4541 m->next = NULL;
4542 m->p_type = PT_PHDR;
4543 /* FIXME: UnixWare and Solaris set PF_X, Irix 5 does not. */
4544 m->p_flags = PF_R | PF_X;
4545 m->p_flags_valid = 1;
4546 m->includes_phdrs = 1;
1a9ccd70 4547 linker_created_pt_phdr_segment = TRUE;
8ded5a0f
AM
4548 *pm = m;
4549 pm = &m->next;
252b5132 4550
8ded5a0f 4551 amt = sizeof (struct elf_segment_map);
a50b1753 4552 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4553 if (m == NULL)
4554 goto error_return;
4555 m->next = NULL;
4556 m->p_type = PT_INTERP;
4557 m->count = 1;
4558 m->sections[0] = s;
4559
4560 *pm = m;
4561 pm = &m->next;
252b5132 4562 }
8ded5a0f
AM
4563
4564 /* Look through the sections. We put sections in the same program
4565 segment when the start of the second section can be placed within
4566 a few bytes of the end of the first section. */
4567 last_hdr = NULL;
4568 last_size = 0;
4569 phdr_index = 0;
4570 maxpagesize = bed->maxpagesize;
063bb025
NC
4571 /* PR 17512: file: c8455299.
4572 Avoid divide-by-zero errors later on.
4573 FIXME: Should we abort if the maxpagesize is zero ? */
4574 if (maxpagesize == 0)
4575 maxpagesize = 1;
8ded5a0f
AM
4576 writable = FALSE;
4577 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4578 if (dynsec != NULL
4579 && (dynsec->flags & SEC_LOAD) == 0)
4580 dynsec = NULL;
4581
4582 /* Deal with -Ttext or something similar such that the first section
4583 is not adjacent to the program headers. This is an
4584 approximation, since at this point we don't know exactly how many
4585 program headers we will need. */
4586 if (count > 0)
252b5132 4587 {
12bd6957 4588 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 4589
62d7a5f6 4590 if (phdr_size == (bfd_size_type) -1)
8ded5a0f 4591 phdr_size = get_program_header_size (abfd, info);
d2bcb0d1 4592 phdr_size += bed->s->sizeof_ehdr;
8ded5a0f 4593 if ((abfd->flags & D_PAGED) == 0
8d06853e
AM
4594 || (sections[0]->lma & addr_mask) < phdr_size
4595 || ((sections[0]->lma & addr_mask) % maxpagesize
4596 < phdr_size % maxpagesize)
4597 || (sections[0]->lma & addr_mask & -maxpagesize) < wrap_to)
1a9ccd70
NC
4598 {
4599 /* PR 20815: The ELF standard says that a PT_PHDR segment, if
4600 present, must be included as part of the memory image of the
4601 program. Ie it must be part of a PT_LOAD segment as well.
4602 If we have had to create our own PT_PHDR segment, but it is
4603 not going to be covered by the first PT_LOAD segment, then
4604 force the inclusion if we can... */
4605 if ((abfd->flags & D_PAGED) != 0
4606 && linker_created_pt_phdr_segment)
4607 phdr_in_segment = TRUE;
4608 else
4609 phdr_in_segment = FALSE;
4610 }
252b5132
RH
4611 }
4612
8ded5a0f 4613 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
252b5132 4614 {
8ded5a0f
AM
4615 asection *hdr;
4616 bfd_boolean new_segment;
4617
4618 hdr = *hdrpp;
4619
4620 /* See if this section and the last one will fit in the same
4621 segment. */
4622
4623 if (last_hdr == NULL)
4624 {
4625 /* If we don't have a segment yet, then we don't need a new
4626 one (we build the last one after this loop). */
4627 new_segment = FALSE;
4628 }
4629 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4630 {
4631 /* If this section has a different relation between the
4632 virtual address and the load address, then we need a new
4633 segment. */
4634 new_segment = TRUE;
4635 }
b5599592
AM
4636 else if (hdr->lma < last_hdr->lma + last_size
4637 || last_hdr->lma + last_size < last_hdr->lma)
4638 {
4639 /* If this section has a load address that makes it overlap
4640 the previous section, then we need a new segment. */
4641 new_segment = TRUE;
4642 }
39948a60
NC
4643 /* In the next test we have to be careful when last_hdr->lma is close
4644 to the end of the address space. If the aligned address wraps
4645 around to the start of the address space, then there are no more
4646 pages left in memory and it is OK to assume that the current
4647 section can be included in the current segment. */
4648 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4649 > last_hdr->lma)
4650 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize) + maxpagesize
4ff73856 4651 <= hdr->lma))
8ded5a0f
AM
4652 {
4653 /* If putting this section in this segment would force us to
4654 skip a page in the segment, then we need a new segment. */
4655 new_segment = TRUE;
4656 }
4657 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
e5654c0f
AM
4658 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0
4659 && ((abfd->flags & D_PAGED) == 0
4660 || (((last_hdr->lma + last_size - 1) & -maxpagesize)
4661 != (hdr->lma & -maxpagesize))))
8ded5a0f 4662 {
e5654c0f
AM
4663 /* We don't want to put a loaded section after a
4664 nonloaded (ie. bss style) section in the same segment
4665 as that will force the non-loaded section to be loaded.
4666 Consider .tbss sections as loaded for this purpose.
4667 However, like the writable/non-writable case below,
4668 if they are on the same page then they must be put
4669 in the same segment. */
8ded5a0f
AM
4670 new_segment = TRUE;
4671 }
4672 else if ((abfd->flags & D_PAGED) == 0)
4673 {
4674 /* If the file is not demand paged, which means that we
4675 don't require the sections to be correctly aligned in the
4676 file, then there is no other reason for a new segment. */
4677 new_segment = FALSE;
4678 }
4679 else if (! writable
4680 && (hdr->flags & SEC_READONLY) == 0
8d06853e
AM
4681 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4682 != (hdr->lma & -maxpagesize)))
8ded5a0f
AM
4683 {
4684 /* We don't want to put a writable section in a read only
4685 segment, unless they are on the same page in memory
4686 anyhow. We already know that the last section does not
4687 bring us past the current section on the page, so the
4688 only case in which the new section is not on the same
4689 page as the previous section is when the previous section
4690 ends precisely on a page boundary. */
4691 new_segment = TRUE;
4692 }
4693 else
4694 {
4695 /* Otherwise, we can use the same segment. */
4696 new_segment = FALSE;
4697 }
4698
2889e75b 4699 /* Allow interested parties a chance to override our decision. */
ceae84aa
AM
4700 if (last_hdr != NULL
4701 && info != NULL
4702 && info->callbacks->override_segment_assignment != NULL)
4703 new_segment
4704 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4705 last_hdr,
4706 new_segment);
2889e75b 4707
8ded5a0f
AM
4708 if (! new_segment)
4709 {
4710 if ((hdr->flags & SEC_READONLY) == 0)
4711 writable = TRUE;
4712 last_hdr = hdr;
4713 /* .tbss sections effectively have zero size. */
4714 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4715 != SEC_THREAD_LOCAL)
4716 last_size = hdr->size;
4717 else
4718 last_size = 0;
4719 continue;
4720 }
4721
4722 /* We need a new program segment. We must create a new program
4723 header holding all the sections from phdr_index until hdr. */
4724
4725 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4726 if (m == NULL)
4727 goto error_return;
4728
4729 *pm = m;
4730 pm = &m->next;
4731
252b5132 4732 if ((hdr->flags & SEC_READONLY) == 0)
b34976b6 4733 writable = TRUE;
8ded5a0f
AM
4734 else
4735 writable = FALSE;
4736
baaff79e
JJ
4737 last_hdr = hdr;
4738 /* .tbss sections effectively have zero size. */
e5caec89 4739 if ((hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) != SEC_THREAD_LOCAL)
eea6121a 4740 last_size = hdr->size;
baaff79e
JJ
4741 else
4742 last_size = 0;
8ded5a0f
AM
4743 phdr_index = i;
4744 phdr_in_segment = FALSE;
252b5132
RH
4745 }
4746
86b2281f
AM
4747 /* Create a final PT_LOAD program segment, but not if it's just
4748 for .tbss. */
4749 if (last_hdr != NULL
4750 && (i - phdr_index != 1
4751 || ((last_hdr->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
4752 != SEC_THREAD_LOCAL)))
8ded5a0f
AM
4753 {
4754 m = make_mapping (abfd, sections, phdr_index, i, phdr_in_segment);
4755 if (m == NULL)
4756 goto error_return;
252b5132 4757
8ded5a0f
AM
4758 *pm = m;
4759 pm = &m->next;
4760 }
252b5132 4761
8ded5a0f
AM
4762 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4763 if (dynsec != NULL)
4764 {
4765 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4766 if (m == NULL)
4767 goto error_return;
4768 *pm = m;
4769 pm = &m->next;
4770 }
252b5132 4771
1c5265b5
JJ
4772 /* For each batch of consecutive loadable .note sections,
4773 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4774 because if we link together nonloadable .note sections and
4775 loadable .note sections, we will generate two .note sections
4776 in the output file. FIXME: Using names for section types is
4777 bogus anyhow. */
8ded5a0f
AM
4778 for (s = abfd->sections; s != NULL; s = s->next)
4779 {
4780 if ((s->flags & SEC_LOAD) != 0
0112cd26 4781 && CONST_STRNEQ (s->name, ".note"))
8ded5a0f 4782 {
1c5265b5 4783 asection *s2;
91d6fa6a
NC
4784
4785 count = 1;
8ded5a0f 4786 amt = sizeof (struct elf_segment_map);
1c5265b5
JJ
4787 if (s->alignment_power == 2)
4788 for (s2 = s; s2->next != NULL; s2 = s2->next)
55b581a6
JJ
4789 {
4790 if (s2->next->alignment_power == 2
4791 && (s2->next->flags & SEC_LOAD) != 0
4792 && CONST_STRNEQ (s2->next->name, ".note")
8d06853e
AM
4793 && align_power (s2->lma + s2->size, 2)
4794 == s2->next->lma)
55b581a6
JJ
4795 count++;
4796 else
4797 break;
4798 }
1c5265b5 4799 amt += (count - 1) * sizeof (asection *);
a50b1753 4800 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4801 if (m == NULL)
4802 goto error_return;
4803 m->next = NULL;
4804 m->p_type = PT_NOTE;
1c5265b5
JJ
4805 m->count = count;
4806 while (count > 1)
4807 {
4808 m->sections[m->count - count--] = s;
4809 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4810 s = s->next;
4811 }
4812 m->sections[m->count - 1] = s;
4813 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
8ded5a0f
AM
4814 *pm = m;
4815 pm = &m->next;
4816 }
4817 if (s->flags & SEC_THREAD_LOCAL)
4818 {
4819 if (! tls_count)
4820 first_tls = s;
4821 tls_count++;
4822 }
4823 }
252b5132 4824
8ded5a0f
AM
4825 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
4826 if (tls_count > 0)
4827 {
8ded5a0f
AM
4828 amt = sizeof (struct elf_segment_map);
4829 amt += (tls_count - 1) * sizeof (asection *);
a50b1753 4830 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4831 if (m == NULL)
4832 goto error_return;
4833 m->next = NULL;
4834 m->p_type = PT_TLS;
4835 m->count = tls_count;
4836 /* Mandated PF_R. */
4837 m->p_flags = PF_R;
4838 m->p_flags_valid = 1;
d923cae0 4839 s = first_tls;
91d6fa6a 4840 for (i = 0; i < (unsigned int) tls_count; ++i)
8ded5a0f 4841 {
d923cae0
L
4842 if ((s->flags & SEC_THREAD_LOCAL) == 0)
4843 {
4844 _bfd_error_handler
4845 (_("%B: TLS sections are not adjacent:"), abfd);
4846 s = first_tls;
4847 i = 0;
4848 while (i < (unsigned int) tls_count)
4849 {
4850 if ((s->flags & SEC_THREAD_LOCAL) != 0)
4851 {
4852 _bfd_error_handler (_(" TLS: %A"), s);
4853 i++;
4854 }
4855 else
4856 _bfd_error_handler (_(" non-TLS: %A"), s);
4857 s = s->next;
4858 }
4859 bfd_set_error (bfd_error_bad_value);
4860 goto error_return;
4861 }
4862 m->sections[i] = s;
4863 s = s->next;
8ded5a0f 4864 }
252b5132 4865
8ded5a0f
AM
4866 *pm = m;
4867 pm = &m->next;
4868 }
252b5132 4869
8ded5a0f
AM
4870 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
4871 segment. */
12bd6957 4872 eh_frame_hdr = elf_eh_frame_hdr (abfd);
8ded5a0f
AM
4873 if (eh_frame_hdr != NULL
4874 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
252b5132 4875 {
dc810e39 4876 amt = sizeof (struct elf_segment_map);
a50b1753 4877 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
252b5132
RH
4878 if (m == NULL)
4879 goto error_return;
4880 m->next = NULL;
8ded5a0f 4881 m->p_type = PT_GNU_EH_FRAME;
252b5132 4882 m->count = 1;
8ded5a0f 4883 m->sections[0] = eh_frame_hdr->output_section;
252b5132
RH
4884
4885 *pm = m;
4886 pm = &m->next;
4887 }
13ae64f3 4888
12bd6957 4889 if (elf_stack_flags (abfd))
13ae64f3 4890 {
8ded5a0f 4891 amt = sizeof (struct elf_segment_map);
a50b1753 4892 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
8ded5a0f
AM
4893 if (m == NULL)
4894 goto error_return;
4895 m->next = NULL;
2b05f1b7 4896 m->p_type = PT_GNU_STACK;
12bd6957 4897 m->p_flags = elf_stack_flags (abfd);
04c3a755 4898 m->p_align = bed->stack_align;
8ded5a0f 4899 m->p_flags_valid = 1;
04c3a755
NS
4900 m->p_align_valid = m->p_align != 0;
4901 if (info->stacksize > 0)
4902 {
4903 m->p_size = info->stacksize;
4904 m->p_size_valid = 1;
4905 }
252b5132 4906
8ded5a0f
AM
4907 *pm = m;
4908 pm = &m->next;
4909 }
65765700 4910
ceae84aa 4911 if (info != NULL && info->relro)
8ded5a0f 4912 {
f210dcff
L
4913 for (m = mfirst; m != NULL; m = m->next)
4914 {
3832a4d8
AM
4915 if (m->p_type == PT_LOAD
4916 && m->count != 0
4917 && m->sections[0]->vma >= info->relro_start
4918 && m->sections[0]->vma < info->relro_end)
f210dcff 4919 {
3832a4d8
AM
4920 i = m->count;
4921 while (--i != (unsigned) -1)
4922 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
4923 == (SEC_LOAD | SEC_HAS_CONTENTS))
4924 break;
4925
43a8475c 4926 if (i != (unsigned) -1)
f210dcff
L
4927 break;
4928 }
be01b344 4929 }
f210dcff
L
4930
4931 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
4932 if (m != NULL)
4933 {
4934 amt = sizeof (struct elf_segment_map);
a50b1753 4935 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
f210dcff
L
4936 if (m == NULL)
4937 goto error_return;
4938 m->next = NULL;
4939 m->p_type = PT_GNU_RELRO;
f210dcff
L
4940 *pm = m;
4941 pm = &m->next;
4942 }
8ded5a0f 4943 }
9ee5e499 4944
8ded5a0f 4945 free (sections);
12bd6957 4946 elf_seg_map (abfd) = mfirst;
9ee5e499
JJ
4947 }
4948
3dea8fca 4949 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
8ded5a0f 4950 return FALSE;
8c37241b 4951
12bd6957 4952 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
8ded5a0f 4953 ++count;
12bd6957 4954 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
252b5132 4955
b34976b6 4956 return TRUE;
252b5132
RH
4957
4958 error_return:
4959 if (sections != NULL)
4960 free (sections);
b34976b6 4961 return FALSE;
252b5132
RH
4962}
4963
4964/* Sort sections by address. */
4965
4966static int
217aa764 4967elf_sort_sections (const void *arg1, const void *arg2)
252b5132
RH
4968{
4969 const asection *sec1 = *(const asection **) arg1;
4970 const asection *sec2 = *(const asection **) arg2;
eecdbe52 4971 bfd_size_type size1, size2;
252b5132
RH
4972
4973 /* Sort by LMA first, since this is the address used to
4974 place the section into a segment. */
4975 if (sec1->lma < sec2->lma)
4976 return -1;
4977 else if (sec1->lma > sec2->lma)
4978 return 1;
4979
4980 /* Then sort by VMA. Normally the LMA and the VMA will be
4981 the same, and this will do nothing. */
4982 if (sec1->vma < sec2->vma)
4983 return -1;
4984 else if (sec1->vma > sec2->vma)
4985 return 1;
4986
4987 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
4988
07c6e936 4989#define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
252b5132
RH
4990
4991 if (TOEND (sec1))
4992 {
4993 if (TOEND (sec2))
00a7cdc5
NC
4994 {
4995 /* If the indicies are the same, do not return 0
4996 here, but continue to try the next comparison. */
4997 if (sec1->target_index - sec2->target_index != 0)
4998 return sec1->target_index - sec2->target_index;
4999 }
252b5132
RH
5000 else
5001 return 1;
5002 }
00a7cdc5 5003 else if (TOEND (sec2))
252b5132
RH
5004 return -1;
5005
5006#undef TOEND
5007
00a7cdc5
NC
5008 /* Sort by size, to put zero sized sections
5009 before others at the same address. */
252b5132 5010
eea6121a
AM
5011 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5012 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
eecdbe52
JJ
5013
5014 if (size1 < size2)
252b5132 5015 return -1;
eecdbe52 5016 if (size1 > size2)
252b5132
RH
5017 return 1;
5018
5019 return sec1->target_index - sec2->target_index;
5020}
5021
340b6d91
AC
5022/* Ian Lance Taylor writes:
5023
5024 We shouldn't be using % with a negative signed number. That's just
5025 not good. We have to make sure either that the number is not
5026 negative, or that the number has an unsigned type. When the types
5027 are all the same size they wind up as unsigned. When file_ptr is a
5028 larger signed type, the arithmetic winds up as signed long long,
5029 which is wrong.
5030
5031 What we're trying to say here is something like ``increase OFF by
5032 the least amount that will cause it to be equal to the VMA modulo
5033 the page size.'' */
5034/* In other words, something like:
5035
5036 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5037 off_offset = off % bed->maxpagesize;
5038 if (vma_offset < off_offset)
5039 adjustment = vma_offset + bed->maxpagesize - off_offset;
5040 else
5041 adjustment = vma_offset - off_offset;
08a40648 5042
340b6d91
AC
5043 which can can be collapsed into the expression below. */
5044
5045static file_ptr
5046vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5047{
dc9155b2
NC
5048 /* PR binutils/16199: Handle an alignment of zero. */
5049 if (maxpagesize == 0)
5050 maxpagesize = 1;
340b6d91
AC
5051 return ((vma - off) % maxpagesize);
5052}
5053
6d33f217
L
5054static void
5055print_segment_map (const struct elf_segment_map *m)
5056{
5057 unsigned int j;
5058 const char *pt = get_segment_type (m->p_type);
5059 char buf[32];
5060
5061 if (pt == NULL)
5062 {
5063 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5064 sprintf (buf, "LOPROC+%7.7x",
5065 (unsigned int) (m->p_type - PT_LOPROC));
5066 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5067 sprintf (buf, "LOOS+%7.7x",
5068 (unsigned int) (m->p_type - PT_LOOS));
5069 else
5070 snprintf (buf, sizeof (buf), "%8.8x",
5071 (unsigned int) m->p_type);
5072 pt = buf;
5073 }
4a97a0e5 5074 fflush (stdout);
6d33f217
L
5075 fprintf (stderr, "%s:", pt);
5076 for (j = 0; j < m->count; j++)
5077 fprintf (stderr, " %s", m->sections [j]->name);
5078 putc ('\n',stderr);
4a97a0e5 5079 fflush (stderr);
6d33f217
L
5080}
5081
32812159
AM
5082static bfd_boolean
5083write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5084{
5085 void *buf;
5086 bfd_boolean ret;
5087
5088 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5089 return FALSE;
5090 buf = bfd_zmalloc (len);
5091 if (buf == NULL)
5092 return FALSE;
5093 ret = bfd_bwrite (buf, len, abfd) == len;
5094 free (buf);
5095 return ret;
5096}
5097
252b5132
RH
5098/* Assign file positions to the sections based on the mapping from
5099 sections to segments. This function also sets up some fields in
f3520d2f 5100 the file header. */
252b5132 5101
b34976b6 5102static bfd_boolean
f3520d2f
AM
5103assign_file_positions_for_load_sections (bfd *abfd,
5104 struct bfd_link_info *link_info)
252b5132
RH
5105{
5106 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 5107 struct elf_segment_map *m;
252b5132 5108 Elf_Internal_Phdr *phdrs;
252b5132 5109 Elf_Internal_Phdr *p;
02bf8d82 5110 file_ptr off;
3f570048 5111 bfd_size_type maxpagesize;
f3520d2f 5112 unsigned int alloc;
0920dee7 5113 unsigned int i, j;
2b0bc088 5114 bfd_vma header_pad = 0;
252b5132 5115
e36284ab 5116 if (link_info == NULL
ceae84aa 5117 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
8ded5a0f 5118 return FALSE;
252b5132 5119
8ded5a0f 5120 alloc = 0;
12bd6957 5121 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2b0bc088
NC
5122 {
5123 ++alloc;
5124 if (m->header_size)
5125 header_pad = m->header_size;
5126 }
252b5132 5127
82f2dbf7
NC
5128 if (alloc)
5129 {
5130 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5131 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5132 }
5133 else
5134 {
5135 /* PR binutils/12467. */
5136 elf_elfheader (abfd)->e_phoff = 0;
5137 elf_elfheader (abfd)->e_phentsize = 0;
5138 }
d324f6d6 5139
8ded5a0f 5140 elf_elfheader (abfd)->e_phnum = alloc;
252b5132 5141
12bd6957
AM
5142 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5143 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
8ded5a0f 5144 else
12bd6957 5145 BFD_ASSERT (elf_program_header_size (abfd)
59e0647f 5146 >= alloc * bed->s->sizeof_phdr);
252b5132
RH
5147
5148 if (alloc == 0)
f3520d2f 5149 {
12bd6957 5150 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
8ded5a0f 5151 return TRUE;
f3520d2f 5152 }
252b5132 5153
12bd6957 5154 /* We're writing the size in elf_program_header_size (abfd),
57268894
HPN
5155 see assign_file_positions_except_relocs, so make sure we have
5156 that amount allocated, with trailing space cleared.
12bd6957
AM
5157 The variable alloc contains the computed need, while
5158 elf_program_header_size (abfd) contains the size used for the
57268894
HPN
5159 layout.
5160 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5161 where the layout is forced to according to a larger size in the
5162 last iterations for the testcase ld-elf/header. */
12bd6957 5163 BFD_ASSERT (elf_program_header_size (abfd) % bed->s->sizeof_phdr
57268894 5164 == 0);
a50b1753
NC
5165 phdrs = (Elf_Internal_Phdr *)
5166 bfd_zalloc2 (abfd,
12bd6957 5167 (elf_program_header_size (abfd) / bed->s->sizeof_phdr),
a50b1753 5168 sizeof (Elf_Internal_Phdr));
f3520d2f 5169 elf_tdata (abfd)->phdr = phdrs;
252b5132 5170 if (phdrs == NULL)
b34976b6 5171 return FALSE;
252b5132 5172
3f570048
AM
5173 maxpagesize = 1;
5174 if ((abfd->flags & D_PAGED) != 0)
5175 maxpagesize = bed->maxpagesize;
5176
252b5132
RH
5177 off = bed->s->sizeof_ehdr;
5178 off += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5179 if (header_pad < (bfd_vma) off)
5180 header_pad = 0;
5181 else
5182 header_pad -= off;
5183 off += header_pad;
252b5132 5184
12bd6957 5185 for (m = elf_seg_map (abfd), p = phdrs, j = 0;
252b5132 5186 m != NULL;
0920dee7 5187 m = m->next, p++, j++)
252b5132 5188 {
252b5132 5189 asection **secpp;
bf988460
AM
5190 bfd_vma off_adjust;
5191 bfd_boolean no_contents;
252b5132
RH
5192
5193 /* If elf_segment_map is not from map_sections_to_segments, the
08a40648 5194 sections may not be correctly ordered. NOTE: sorting should
52e9b619
MS
5195 not be done to the PT_NOTE section of a corefile, which may
5196 contain several pseudo-sections artificially created by bfd.
5197 Sorting these pseudo-sections breaks things badly. */
47d9a591
AM
5198 if (m->count > 1
5199 && !(elf_elfheader (abfd)->e_type == ET_CORE
52e9b619 5200 && m->p_type == PT_NOTE))
252b5132
RH
5201 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5202 elf_sort_sections);
5203
b301b248
AM
5204 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5205 number of sections with contents contributing to both p_filesz
5206 and p_memsz, followed by a number of sections with no contents
5207 that just contribute to p_memsz. In this loop, OFF tracks next
02bf8d82 5208 available file offset for PT_LOAD and PT_NOTE segments. */
252b5132 5209 p->p_type = m->p_type;
28a7f3e7 5210 p->p_flags = m->p_flags;
252b5132 5211
3f570048
AM
5212 if (m->count == 0)
5213 p->p_vaddr = 0;
5214 else
3271a814 5215 p->p_vaddr = m->sections[0]->vma - m->p_vaddr_offset;
3f570048
AM
5216
5217 if (m->p_paddr_valid)
5218 p->p_paddr = m->p_paddr;
5219 else if (m->count == 0)
5220 p->p_paddr = 0;
5221 else
08a40648 5222 p->p_paddr = m->sections[0]->lma - m->p_vaddr_offset;
3f570048
AM
5223
5224 if (p->p_type == PT_LOAD
5225 && (abfd->flags & D_PAGED) != 0)
5226 {
5227 /* p_align in demand paged PT_LOAD segments effectively stores
5228 the maximum page size. When copying an executable with
5229 objcopy, we set m->p_align from the input file. Use this
5230 value for maxpagesize rather than bed->maxpagesize, which
5231 may be different. Note that we use maxpagesize for PT_TLS
5232 segment alignment later in this function, so we are relying
5233 on at least one PT_LOAD segment appearing before a PT_TLS
5234 segment. */
5235 if (m->p_align_valid)
5236 maxpagesize = m->p_align;
5237
5238 p->p_align = maxpagesize;
5239 }
3271a814
NS
5240 else if (m->p_align_valid)
5241 p->p_align = m->p_align;
e970b90a
DJ
5242 else if (m->count == 0)
5243 p->p_align = 1 << bed->s->log_file_align;
3f570048
AM
5244 else
5245 p->p_align = 0;
5246
bf988460
AM
5247 no_contents = FALSE;
5248 off_adjust = 0;
252b5132 5249 if (p->p_type == PT_LOAD
b301b248 5250 && m->count > 0)
252b5132 5251 {
b301b248 5252 bfd_size_type align;
a49e53ed 5253 unsigned int align_power = 0;
b301b248 5254
3271a814
NS
5255 if (m->p_align_valid)
5256 align = p->p_align;
5257 else
252b5132 5258 {
3271a814
NS
5259 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5260 {
5261 unsigned int secalign;
08a40648 5262
3271a814
NS
5263 secalign = bfd_get_section_alignment (abfd, *secpp);
5264 if (secalign > align_power)
5265 align_power = secalign;
5266 }
5267 align = (bfd_size_type) 1 << align_power;
5268 if (align < maxpagesize)
5269 align = maxpagesize;
b301b248 5270 }
252b5132 5271
02bf8d82
AM
5272 for (i = 0; i < m->count; i++)
5273 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5274 /* If we aren't making room for this section, then
5275 it must be SHT_NOBITS regardless of what we've
5276 set via struct bfd_elf_special_section. */
5277 elf_section_type (m->sections[i]) = SHT_NOBITS;
5278
bf988460 5279 /* Find out whether this segment contains any loadable
aea274d3
AM
5280 sections. */
5281 no_contents = TRUE;
5282 for (i = 0; i < m->count; i++)
5283 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5284 {
5285 no_contents = FALSE;
5286 break;
5287 }
bf988460 5288
85cfcbfb 5289 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
bf988460
AM
5290 off += off_adjust;
5291 if (no_contents)
5292 {
5293 /* We shouldn't need to align the segment on disk since
5294 the segment doesn't need file space, but the gABI
5295 arguably requires the alignment and glibc ld.so
5296 checks it. So to comply with the alignment
5297 requirement but not waste file space, we adjust
5298 p_offset for just this segment. (OFF_ADJUST is
5299 subtracted from OFF later.) This may put p_offset
5300 past the end of file, but that shouldn't matter. */
5301 }
5302 else
5303 off_adjust = 0;
252b5132 5304 }
b1a6d0b1
NC
5305 /* Make sure the .dynamic section is the first section in the
5306 PT_DYNAMIC segment. */
5307 else if (p->p_type == PT_DYNAMIC
5308 && m->count > 1
5309 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5310 {
5311 _bfd_error_handler
b301b248
AM
5312 (_("%B: The first section in the PT_DYNAMIC segment is not the .dynamic section"),
5313 abfd);
b1a6d0b1
NC
5314 bfd_set_error (bfd_error_bad_value);
5315 return FALSE;
5316 }
3f001e84
JK
5317 /* Set the note section type to SHT_NOTE. */
5318 else if (p->p_type == PT_NOTE)
5319 for (i = 0; i < m->count; i++)
5320 elf_section_type (m->sections[i]) = SHT_NOTE;
252b5132 5321
252b5132
RH
5322 p->p_offset = 0;
5323 p->p_filesz = 0;
5324 p->p_memsz = 0;
5325
5326 if (m->includes_filehdr)
5327 {
bf988460 5328 if (!m->p_flags_valid)
252b5132 5329 p->p_flags |= PF_R;
252b5132
RH
5330 p->p_filesz = bed->s->sizeof_ehdr;
5331 p->p_memsz = bed->s->sizeof_ehdr;
5332 if (m->count > 0)
5333 {
9ab82472
L
5334 if (p->p_vaddr < (bfd_vma) off
5335 || (!m->p_paddr_valid
5336 && p->p_paddr < (bfd_vma) off))
252b5132 5337 {
4eca0228 5338 _bfd_error_handler
b301b248
AM
5339 (_("%B: Not enough room for program headers, try linking with -N"),
5340 abfd);
252b5132 5341 bfd_set_error (bfd_error_bad_value);
b34976b6 5342 return FALSE;
252b5132
RH
5343 }
5344
5345 p->p_vaddr -= off;
bf988460 5346 if (!m->p_paddr_valid)
252b5132
RH
5347 p->p_paddr -= off;
5348 }
252b5132
RH
5349 }
5350
5351 if (m->includes_phdrs)
5352 {
bf988460 5353 if (!m->p_flags_valid)
252b5132
RH
5354 p->p_flags |= PF_R;
5355
f3520d2f 5356 if (!m->includes_filehdr)
252b5132
RH
5357 {
5358 p->p_offset = bed->s->sizeof_ehdr;
5359
5360 if (m->count > 0)
5361 {
252b5132 5362 p->p_vaddr -= off - p->p_offset;
bf988460 5363 if (!m->p_paddr_valid)
252b5132
RH
5364 p->p_paddr -= off - p->p_offset;
5365 }
252b5132
RH
5366 }
5367
5368 p->p_filesz += alloc * bed->s->sizeof_phdr;
5369 p->p_memsz += alloc * bed->s->sizeof_phdr;
2b0bc088
NC
5370 if (m->count)
5371 {
5372 p->p_filesz += header_pad;
5373 p->p_memsz += header_pad;
5374 }
252b5132
RH
5375 }
5376
5377 if (p->p_type == PT_LOAD
5378 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5379 {
bf988460 5380 if (!m->includes_filehdr && !m->includes_phdrs)
02bf8d82 5381 p->p_offset = off;
252b5132
RH
5382 else
5383 {
5384 file_ptr adjust;
5385
5386 adjust = off - (p->p_offset + p->p_filesz);
bf988460
AM
5387 if (!no_contents)
5388 p->p_filesz += adjust;
252b5132
RH
5389 p->p_memsz += adjust;
5390 }
5391 }
5392
1ea63fd2
AM
5393 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5394 maps. Set filepos for sections in PT_LOAD segments, and in
5395 core files, for sections in PT_NOTE segments.
5396 assign_file_positions_for_non_load_sections will set filepos
5397 for other sections and update p_filesz for other segments. */
252b5132
RH
5398 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5399 {
5400 asection *sec;
252b5132 5401 bfd_size_type align;
627b32bc 5402 Elf_Internal_Shdr *this_hdr;
252b5132
RH
5403
5404 sec = *secpp;
02bf8d82 5405 this_hdr = &elf_section_data (sec)->this_hdr;
3f570048 5406 align = (bfd_size_type) 1 << bfd_get_section_alignment (abfd, sec);
252b5132 5407
88967714
AM
5408 if ((p->p_type == PT_LOAD
5409 || p->p_type == PT_TLS)
5410 && (this_hdr->sh_type != SHT_NOBITS
5411 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5412 && ((this_hdr->sh_flags & SHF_TLS) == 0
5413 || p->p_type == PT_TLS))))
252b5132 5414 {
b5599592
AM
5415 bfd_vma p_start = p->p_paddr;
5416 bfd_vma p_end = p_start + p->p_memsz;
5417 bfd_vma s_start = sec->lma;
5418 bfd_vma adjust = s_start - p_end;
252b5132 5419
a2d1e028
L
5420 if (adjust != 0
5421 && (s_start < p_end
5422 || p_end < p_start))
252b5132 5423 {
4eca0228 5424 _bfd_error_handler
695344c0 5425 /* xgettext:c-format */
b5599592
AM
5426 (_("%B: section %A lma %#lx adjusted to %#lx"), abfd, sec,
5427 (unsigned long) s_start, (unsigned long) p_end);
88967714 5428 adjust = 0;
b5599592 5429 sec->lma = p_end;
1cfb7d1e 5430 }
3ac9b6c9 5431 p->p_memsz += adjust;
1cfb7d1e 5432
88967714
AM
5433 if (this_hdr->sh_type != SHT_NOBITS)
5434 {
32812159
AM
5435 if (p->p_filesz + adjust < p->p_memsz)
5436 {
5437 /* We have a PROGBITS section following NOBITS ones.
5438 Allocate file space for the NOBITS section(s) and
5439 zero it. */
5440 adjust = p->p_memsz - p->p_filesz;
5441 if (!write_zeros (abfd, off, adjust))
5442 return FALSE;
5443 }
88967714
AM
5444 off += adjust;
5445 p->p_filesz += adjust;
252b5132 5446 }
252b5132
RH
5447 }
5448
5449 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5450 {
b301b248
AM
5451 /* The section at i == 0 is the one that actually contains
5452 everything. */
4a938328
MS
5453 if (i == 0)
5454 {
627b32bc 5455 this_hdr->sh_offset = sec->filepos = off;
6a3cd2b4
AM
5456 off += this_hdr->sh_size;
5457 p->p_filesz = this_hdr->sh_size;
b301b248
AM
5458 p->p_memsz = 0;
5459 p->p_align = 1;
252b5132 5460 }
4a938328 5461 else
252b5132 5462 {
b301b248 5463 /* The rest are fake sections that shouldn't be written. */
252b5132 5464 sec->filepos = 0;
eea6121a 5465 sec->size = 0;
b301b248
AM
5466 sec->flags = 0;
5467 continue;
252b5132 5468 }
252b5132
RH
5469 }
5470 else
5471 {
1e951488 5472 if (p->p_type == PT_LOAD)
b301b248 5473 {
1e951488
AM
5474 this_hdr->sh_offset = sec->filepos = off;
5475 if (this_hdr->sh_type != SHT_NOBITS)
5476 off += this_hdr->sh_size;
5477 }
5478 else if (this_hdr->sh_type == SHT_NOBITS
5479 && (this_hdr->sh_flags & SHF_TLS) != 0
5480 && this_hdr->sh_offset == 0)
5481 {
5482 /* This is a .tbss section that didn't get a PT_LOAD.
5483 (See _bfd_elf_map_sections_to_segments "Create a
5484 final PT_LOAD".) Set sh_offset to the value it
5485 would have if we had created a zero p_filesz and
5486 p_memsz PT_LOAD header for the section. This
5487 also makes the PT_TLS header have the same
5488 p_offset value. */
5489 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5490 off, align);
5491 this_hdr->sh_offset = sec->filepos = off + adjust;
b301b248 5492 }
252b5132 5493
02bf8d82 5494 if (this_hdr->sh_type != SHT_NOBITS)
b301b248 5495 {
6a3cd2b4 5496 p->p_filesz += this_hdr->sh_size;
02bf8d82
AM
5497 /* A load section without SHF_ALLOC is something like
5498 a note section in a PT_NOTE segment. These take
5499 file space but are not loaded into memory. */
5500 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
6a3cd2b4 5501 p->p_memsz += this_hdr->sh_size;
b301b248 5502 }
6a3cd2b4 5503 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
13ae64f3 5504 {
6a3cd2b4
AM
5505 if (p->p_type == PT_TLS)
5506 p->p_memsz += this_hdr->sh_size;
5507
5508 /* .tbss is special. It doesn't contribute to p_memsz of
5509 normal segments. */
5510 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5511 p->p_memsz += this_hdr->sh_size;
13ae64f3
JJ
5512 }
5513
b10a8ae0
L
5514 if (align > p->p_align
5515 && !m->p_align_valid
5516 && (p->p_type != PT_LOAD
5517 || (abfd->flags & D_PAGED) == 0))
252b5132
RH
5518 p->p_align = align;
5519 }
5520
bf988460 5521 if (!m->p_flags_valid)
252b5132
RH
5522 {
5523 p->p_flags |= PF_R;
02bf8d82 5524 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
252b5132 5525 p->p_flags |= PF_X;
02bf8d82 5526 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
252b5132
RH
5527 p->p_flags |= PF_W;
5528 }
5529 }
43a8475c 5530
bf988460 5531 off -= off_adjust;
0920dee7 5532
7c928300
AM
5533 /* Check that all sections are in a PT_LOAD segment.
5534 Don't check funky gdb generated core files. */
5535 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
9a83a553
AM
5536 {
5537 bfd_boolean check_vma = TRUE;
5538
5539 for (i = 1; i < m->count; i++)
5540 if (m->sections[i]->vma == m->sections[i - 1]->vma
5541 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5542 ->this_hdr), p) != 0
5543 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5544 ->this_hdr), p) != 0)
0920dee7 5545 {
9a83a553
AM
5546 /* Looks like we have overlays packed into the segment. */
5547 check_vma = FALSE;
5548 break;
0920dee7 5549 }
9a83a553
AM
5550
5551 for (i = 0; i < m->count; i++)
5552 {
5553 Elf_Internal_Shdr *this_hdr;
5554 asection *sec;
5555
5556 sec = m->sections[i];
5557 this_hdr = &(elf_section_data(sec)->this_hdr);
86b2281f
AM
5558 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5559 && !ELF_TBSS_SPECIAL (this_hdr, p))
9a83a553 5560 {
4eca0228 5561 _bfd_error_handler
695344c0 5562 /* xgettext:c-format */
9a83a553
AM
5563 (_("%B: section `%A' can't be allocated in segment %d"),
5564 abfd, sec, j);
5565 print_segment_map (m);
5566 }
5567 }
5568 }
252b5132
RH
5569 }
5570
12bd6957 5571 elf_next_file_pos (abfd) = off;
f3520d2f
AM
5572 return TRUE;
5573}
5574
5575/* Assign file positions for the other sections. */
5576
5577static bfd_boolean
5578assign_file_positions_for_non_load_sections (bfd *abfd,
5579 struct bfd_link_info *link_info)
5580{
5581 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5582 Elf_Internal_Shdr **i_shdrpp;
e06efbf1 5583 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
f3520d2f
AM
5584 Elf_Internal_Phdr *phdrs;
5585 Elf_Internal_Phdr *p;
5586 struct elf_segment_map *m;
62655c7b 5587 struct elf_segment_map *hdrs_segment;
f3520d2f
AM
5588 bfd_vma filehdr_vaddr, filehdr_paddr;
5589 bfd_vma phdrs_vaddr, phdrs_paddr;
5590 file_ptr off;
f3520d2f
AM
5591 unsigned int count;
5592
5c182d5f 5593 i_shdrpp = elf_elfsections (abfd);
e06efbf1 5594 end_hdrpp = i_shdrpp + elf_numsections (abfd);
12bd6957 5595 off = elf_next_file_pos (abfd);
e06efbf1 5596 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
5c182d5f 5597 {
5c182d5f
AM
5598 Elf_Internal_Shdr *hdr;
5599
5600 hdr = *hdrpp;
5601 if (hdr->bfd_section != NULL
252e386e
AM
5602 && (hdr->bfd_section->filepos != 0
5603 || (hdr->sh_type == SHT_NOBITS
5604 && hdr->contents == NULL)))
627b32bc 5605 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
5c182d5f
AM
5606 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
5607 {
e8d2ba53 5608 if (hdr->sh_size != 0)
4eca0228 5609 _bfd_error_handler
695344c0 5610 /* xgettext:c-format */
e8d2ba53
AM
5611 (_("%B: warning: allocated section `%s' not in segment"),
5612 abfd,
5613 (hdr->bfd_section == NULL
5614 ? "*unknown*"
5615 : hdr->bfd_section->name));
3ba71138
L
5616 /* We don't need to page align empty sections. */
5617 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
5c182d5f
AM
5618 off += vma_page_aligned_bias (hdr->sh_addr, off,
5619 bed->maxpagesize);
5620 else
5621 off += vma_page_aligned_bias (hdr->sh_addr, off,
5622 hdr->sh_addralign);
5623 off = _bfd_elf_assign_file_position_for_section (hdr, off,
5624 FALSE);
5625 }
5626 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5627 && hdr->bfd_section == NULL)
0ce398f1
L
5628 || (hdr->bfd_section != NULL
5629 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5630 /* Compress DWARF debug sections. */
12bd6957 5631 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6a40cf0c
NC
5632 || (elf_symtab_shndx_list (abfd) != NULL
5633 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5634 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
5635 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
5c182d5f
AM
5636 hdr->sh_offset = -1;
5637 else
5638 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
5c182d5f
AM
5639 }
5640
252b5132
RH
5641 /* Now that we have set the section file positions, we can set up
5642 the file positions for the non PT_LOAD segments. */
f3520d2f
AM
5643 count = 0;
5644 filehdr_vaddr = 0;
5645 filehdr_paddr = 0;
5646 phdrs_vaddr = bed->maxpagesize + bed->s->sizeof_ehdr;
5647 phdrs_paddr = 0;
62655c7b 5648 hdrs_segment = NULL;
f3520d2f 5649 phdrs = elf_tdata (abfd)->phdr;
12bd6957 5650 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
f3520d2f
AM
5651 {
5652 ++count;
5653 if (p->p_type != PT_LOAD)
5654 continue;
5655
5656 if (m->includes_filehdr)
5657 {
5658 filehdr_vaddr = p->p_vaddr;
5659 filehdr_paddr = p->p_paddr;
5660 }
5661 if (m->includes_phdrs)
5662 {
5663 phdrs_vaddr = p->p_vaddr;
5664 phdrs_paddr = p->p_paddr;
5665 if (m->includes_filehdr)
5666 {
62655c7b 5667 hdrs_segment = m;
f3520d2f
AM
5668 phdrs_vaddr += bed->s->sizeof_ehdr;
5669 phdrs_paddr += bed->s->sizeof_ehdr;
5670 }
5671 }
5672 }
5673
62655c7b
RM
5674 if (hdrs_segment != NULL && link_info != NULL)
5675 {
5676 /* There is a segment that contains both the file headers and the
5677 program headers, so provide a symbol __ehdr_start pointing there.
5678 A program can use this to examine itself robustly. */
5679
5680 struct elf_link_hash_entry *hash
5681 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5682 FALSE, FALSE, TRUE);
5683 /* If the symbol was referenced and not defined, define it. */
5684 if (hash != NULL
5685 && (hash->root.type == bfd_link_hash_new
5686 || hash->root.type == bfd_link_hash_undefined
5687 || hash->root.type == bfd_link_hash_undefweak
5688 || hash->root.type == bfd_link_hash_common))
5689 {
5690 asection *s = NULL;
5691 if (hdrs_segment->count != 0)
5692 /* The segment contains sections, so use the first one. */
5693 s = hdrs_segment->sections[0];
5694 else
5695 /* Use the first (i.e. lowest-addressed) section in any segment. */
12bd6957 5696 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62655c7b
RM
5697 if (m->count != 0)
5698 {
5699 s = m->sections[0];
5700 break;
5701 }
5702
5703 if (s != NULL)
5704 {
5705 hash->root.u.def.value = filehdr_vaddr - s->vma;
5706 hash->root.u.def.section = s;
5707 }
5708 else
5709 {
5710 hash->root.u.def.value = filehdr_vaddr;
5711 hash->root.u.def.section = bfd_abs_section_ptr;
5712 }
5713
5714 hash->root.type = bfd_link_hash_defined;
5715 hash->def_regular = 1;
5716 hash->non_elf = 0;
5717 }
5718 }
5719
12bd6957 5720 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
252b5132 5721 {
129af99f 5722 if (p->p_type == PT_GNU_RELRO)
252b5132 5723 {
b84a33b5 5724 const Elf_Internal_Phdr *lp;
3146fac4 5725 struct elf_segment_map *lm;
1ea63fd2 5726
129af99f 5727 if (link_info != NULL)
8c37241b 5728 {
129af99f
AS
5729 /* During linking the range of the RELRO segment is passed
5730 in link_info. */
12bd6957 5731 for (lm = elf_seg_map (abfd), lp = phdrs;
3146fac4
AM
5732 lm != NULL;
5733 lm = lm->next, lp++)
8c37241b
JJ
5734 {
5735 if (lp->p_type == PT_LOAD
b84a33b5 5736 && lp->p_vaddr < link_info->relro_end
3146fac4
AM
5737 && lm->count != 0
5738 && lm->sections[0]->vma >= link_info->relro_start)
8c37241b
JJ
5739 break;
5740 }
8981c88a 5741
3146fac4 5742 BFD_ASSERT (lm != NULL);
8c37241b 5743 }
129af99f
AS
5744 else
5745 {
5746 /* Otherwise we are copying an executable or shared
b84a33b5 5747 library, but we need to use the same linker logic. */
129af99f
AS
5748 for (lp = phdrs; lp < phdrs + count; ++lp)
5749 {
5750 if (lp->p_type == PT_LOAD
5751 && lp->p_paddr == p->p_paddr)
5752 break;
5753 }
b84a33b5
AM
5754 }
5755
5756 if (lp < phdrs + count)
5757 {
5758 p->p_vaddr = lp->p_vaddr;
5759 p->p_paddr = lp->p_paddr;
5760 p->p_offset = lp->p_offset;
5761 if (link_info != NULL)
5762 p->p_filesz = link_info->relro_end - lp->p_vaddr;
5763 else if (m->p_size_valid)
5764 p->p_filesz = m->p_size;
129af99f
AS
5765 else
5766 abort ();
b84a33b5 5767 p->p_memsz = p->p_filesz;
f3944f72
L
5768 /* Preserve the alignment and flags if they are valid. The
5769 gold linker generates RW/4 for the PT_GNU_RELRO section.
5770 It is better for objcopy/strip to honor these attributes
5771 otherwise gdb will choke when using separate debug files.
5772 */
5773 if (!m->p_align_valid)
5774 p->p_align = 1;
5775 if (!m->p_flags_valid)
341b8ee7 5776 p->p_flags = PF_R;
129af99f 5777 }
9433b9b1 5778 else
b84a33b5
AM
5779 {
5780 memset (p, 0, sizeof *p);
5781 p->p_type = PT_NULL;
5782 }
129af99f 5783 }
04c3a755
NS
5784 else if (p->p_type == PT_GNU_STACK)
5785 {
5786 if (m->p_size_valid)
5787 p->p_memsz = m->p_size;
5788 }
129af99f
AS
5789 else if (m->count != 0)
5790 {
e06efbf1 5791 unsigned int i;
1a9ccd70 5792
129af99f
AS
5793 if (p->p_type != PT_LOAD
5794 && (p->p_type != PT_NOTE
5795 || bfd_get_format (abfd) != bfd_core))
5796 {
1a9ccd70
NC
5797 /* A user specified segment layout may include a PHDR
5798 segment that overlaps with a LOAD segment... */
5799 if (p->p_type == PT_PHDR)
5800 {
5801 m->count = 0;
5802 continue;
5803 }
5804
c86934ce
NC
5805 if (m->includes_filehdr || m->includes_phdrs)
5806 {
b1fa9dd6 5807 /* PR 17512: file: 2195325e. */
4eca0228 5808 _bfd_error_handler
1a9ccd70
NC
5809 (_("%B: error: non-load segment %d includes file header and/or program header"),
5810 abfd, (int)(p - phdrs));
c86934ce
NC
5811 return FALSE;
5812 }
129af99f 5813
86b2281f 5814 p->p_filesz = 0;
129af99f 5815 p->p_offset = m->sections[0]->filepos;
86b2281f
AM
5816 for (i = m->count; i-- != 0;)
5817 {
5818 asection *sect = m->sections[i];
5819 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
5820 if (hdr->sh_type != SHT_NOBITS)
5821 {
5822 p->p_filesz = (sect->filepos - m->sections[0]->filepos
5823 + hdr->sh_size);
5824 break;
5825 }
5826 }
129af99f
AS
5827 }
5828 }
5829 else if (m->includes_filehdr)
5830 {
5831 p->p_vaddr = filehdr_vaddr;
5832 if (! m->p_paddr_valid)
5833 p->p_paddr = filehdr_paddr;
5834 }
5835 else if (m->includes_phdrs)
5836 {
5837 p->p_vaddr = phdrs_vaddr;
5838 if (! m->p_paddr_valid)
5839 p->p_paddr = phdrs_paddr;
252b5132
RH
5840 }
5841 }
5842
12bd6957 5843 elf_next_file_pos (abfd) = off;
252b5132 5844
b34976b6 5845 return TRUE;
252b5132
RH
5846}
5847
6a40cf0c
NC
5848static elf_section_list *
5849find_section_in_list (unsigned int i, elf_section_list * list)
5850{
5851 for (;list != NULL; list = list->next)
5852 if (list->ndx == i)
5853 break;
5854 return list;
5855}
5856
252b5132
RH
5857/* Work out the file positions of all the sections. This is called by
5858 _bfd_elf_compute_section_file_positions. All the section sizes and
5859 VMAs must be known before this is called.
5860
e0638f70
AM
5861 Reloc sections come in two flavours: Those processed specially as
5862 "side-channel" data attached to a section to which they apply, and
5863 those that bfd doesn't process as relocations. The latter sort are
5864 stored in a normal bfd section by bfd_section_from_shdr. We don't
5865 consider the former sort here, unless they form part of the loadable
5866 image. Reloc sections not assigned here will be handled later by
5867 assign_file_positions_for_relocs.
252b5132
RH
5868
5869 We also don't set the positions of the .symtab and .strtab here. */
5870
b34976b6 5871static bfd_boolean
c84fca4d
AO
5872assign_file_positions_except_relocs (bfd *abfd,
5873 struct bfd_link_info *link_info)
252b5132 5874{
5c182d5f
AM
5875 struct elf_obj_tdata *tdata = elf_tdata (abfd);
5876 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
9c5bfbb7 5877 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
5878
5879 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
5880 && bfd_get_format (abfd) != bfd_core)
5881 {
5c182d5f
AM
5882 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
5883 unsigned int num_sec = elf_numsections (abfd);
252b5132
RH
5884 Elf_Internal_Shdr **hdrpp;
5885 unsigned int i;
a485e98e 5886 file_ptr off;
252b5132
RH
5887
5888 /* Start after the ELF header. */
5889 off = i_ehdrp->e_ehsize;
5890
5891 /* We are not creating an executable, which means that we are
5892 not creating a program header, and that the actual order of
5893 the sections in the file is unimportant. */
9ad5cbcf 5894 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
252b5132
RH
5895 {
5896 Elf_Internal_Shdr *hdr;
5897
5898 hdr = *hdrpp;
e0638f70
AM
5899 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
5900 && hdr->bfd_section == NULL)
0ce398f1
L
5901 || (hdr->bfd_section != NULL
5902 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS))
5903 /* Compress DWARF debug sections. */
12bd6957 5904 || i == elf_onesymtab (abfd)
6a40cf0c
NC
5905 || (elf_symtab_shndx_list (abfd) != NULL
5906 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
3e19fb8f
L
5907 || i == elf_strtab_sec (abfd)
5908 || i == elf_shstrtab_sec (abfd))
252b5132
RH
5909 {
5910 hdr->sh_offset = -1;
252b5132 5911 }
9ad5cbcf 5912 else
b34976b6 5913 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
252b5132 5914 }
a485e98e
AM
5915
5916 elf_next_file_pos (abfd) = off;
252b5132
RH
5917 }
5918 else
5919 {
f3520d2f
AM
5920 unsigned int alloc;
5921
252b5132 5922 /* Assign file positions for the loaded sections based on the
08a40648 5923 assignment of sections to segments. */
f3520d2f
AM
5924 if (!assign_file_positions_for_load_sections (abfd, link_info))
5925 return FALSE;
5926
5927 /* And for non-load sections. */
5928 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
5929 return FALSE;
5930
e36284ab
AM
5931 if (bed->elf_backend_modify_program_headers != NULL)
5932 {
5933 if (!(*bed->elf_backend_modify_program_headers) (abfd, link_info))
5934 return FALSE;
5935 }
5936
58e7ebac 5937 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=. */
0e1862bb 5938 if (link_info != NULL && bfd_link_pie (link_info))
58e7ebac
L
5939 {
5940 unsigned int num_segments = elf_elfheader (abfd)->e_phnum;
5941 Elf_Internal_Phdr *segment = elf_tdata (abfd)->phdr;
5942 Elf_Internal_Phdr *end_segment = &segment[num_segments];
5943
5944 /* Find the lowest p_vaddr in PT_LOAD segments. */
5945 bfd_vma p_vaddr = (bfd_vma) -1;
5946 for (; segment < end_segment; segment++)
5947 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
5948 p_vaddr = segment->p_vaddr;
5949
5950 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
5951 segments is non-zero. */
5952 if (p_vaddr)
5953 i_ehdrp->e_type = ET_EXEC;
5954 }
5955
f3520d2f 5956 /* Write out the program headers. */
12bd6957 5957 alloc = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
1a9ccd70
NC
5958
5959 /* Sort the program headers into the ordering required by the ELF standard. */
5960 if (alloc == 0)
5961 return TRUE;
5962
1a9ccd70
NC
5963 /* PR ld/20815 - Check that the program header segment, if present, will
5964 be loaded into memory. FIXME: The check below is not sufficient as
5965 really all PT_LOAD segments should be checked before issuing an error
5966 message. Plus the PHDR segment does not have to be the first segment
5967 in the program header table. But this version of the check should
cd584857
NC
5968 catch all real world use cases.
5969
5970 FIXME: We used to have code here to sort the PT_LOAD segments into
5971 ascending order, as per the ELF spec. But this breaks some programs,
5972 including the Linux kernel. But really either the spec should be
5973 changed or the programs updated. */
1a9ccd70 5974 if (alloc > 1
cd584857
NC
5975 && tdata->phdr[0].p_type == PT_PHDR
5976 && ! bed->elf_backend_allow_non_load_phdr (abfd, tdata->phdr, alloc)
5977 && tdata->phdr[1].p_type == PT_LOAD
5978 && (tdata->phdr[1].p_vaddr > tdata->phdr[0].p_vaddr
5979 || (tdata->phdr[1].p_vaddr + tdata->phdr[1].p_memsz)
5980 < (tdata->phdr[0].p_vaddr + tdata->phdr[0].p_memsz)))
1a9ccd70
NC
5981 {
5982 /* The fix for this error is usually to edit the linker script being
5983 used and set up the program headers manually. Either that or
5984 leave room for the headers at the start of the SECTIONS. */
5985 _bfd_error_handler (_("\
5986%B: error: PHDR segment not covered by LOAD segment"),
5987 abfd);
1a9ccd70
NC
5988 return FALSE;
5989 }
5990
f3520d2f 5991 if (bfd_seek (abfd, (bfd_signed_vma) bed->s->sizeof_ehdr, SEEK_SET) != 0
cd584857
NC
5992 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
5993 return FALSE;
252b5132
RH
5994 }
5995
b34976b6 5996 return TRUE;
252b5132
RH
5997}
5998
b34976b6 5999static bfd_boolean
217aa764 6000prep_headers (bfd *abfd)
252b5132 6001{
3d540e93 6002 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
2b0f7ef9 6003 struct elf_strtab_hash *shstrtab;
9c5bfbb7 6004 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
6005
6006 i_ehdrp = elf_elfheader (abfd);
252b5132 6007
2b0f7ef9 6008 shstrtab = _bfd_elf_strtab_init ();
252b5132 6009 if (shstrtab == NULL)
b34976b6 6010 return FALSE;
252b5132
RH
6011
6012 elf_shstrtab (abfd) = shstrtab;
6013
6014 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6015 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6016 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6017 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6018
6019 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6020 i_ehdrp->e_ident[EI_DATA] =
6021 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6022 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6023
252b5132
RH
6024 if ((abfd->flags & DYNAMIC) != 0)
6025 i_ehdrp->e_type = ET_DYN;
6026 else if ((abfd->flags & EXEC_P) != 0)
6027 i_ehdrp->e_type = ET_EXEC;
6028 else if (bfd_get_format (abfd) == bfd_core)
6029 i_ehdrp->e_type = ET_CORE;
6030 else
6031 i_ehdrp->e_type = ET_REL;
6032
6033 switch (bfd_get_arch (abfd))
6034 {
6035 case bfd_arch_unknown:
6036 i_ehdrp->e_machine = EM_NONE;
6037 break;
aa4f99bb
AO
6038
6039 /* There used to be a long list of cases here, each one setting
6040 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6041 in the corresponding bfd definition. To avoid duplication,
6042 the switch was removed. Machines that need special handling
6043 can generally do it in elf_backend_final_write_processing(),
6044 unless they need the information earlier than the final write.
6045 Such need can generally be supplied by replacing the tests for
6046 e_machine with the conditions used to determine it. */
252b5132 6047 default:
9c5bfbb7
AM
6048 i_ehdrp->e_machine = bed->elf_machine_code;
6049 }
aa4f99bb 6050
252b5132
RH
6051 i_ehdrp->e_version = bed->s->ev_current;
6052 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6053
c044fabd 6054 /* No program header, for now. */
252b5132
RH
6055 i_ehdrp->e_phoff = 0;
6056 i_ehdrp->e_phentsize = 0;
6057 i_ehdrp->e_phnum = 0;
6058
c044fabd 6059 /* Each bfd section is section header entry. */
252b5132
RH
6060 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6061 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6062
c044fabd 6063 /* If we're building an executable, we'll need a program header table. */
252b5132 6064 if (abfd->flags & EXEC_P)
0e71e495
BE
6065 /* It all happens later. */
6066 ;
252b5132
RH
6067 else
6068 {
6069 i_ehdrp->e_phentsize = 0;
252b5132
RH
6070 i_ehdrp->e_phoff = 0;
6071 }
6072
6073 elf_tdata (abfd)->symtab_hdr.sh_name =
b34976b6 6074 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
252b5132 6075 elf_tdata (abfd)->strtab_hdr.sh_name =
b34976b6 6076 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
252b5132 6077 elf_tdata (abfd)->shstrtab_hdr.sh_name =
b34976b6 6078 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
252b5132 6079 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
17ca87fc 6080 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
252b5132 6081 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
b34976b6 6082 return FALSE;
252b5132 6083
b34976b6 6084 return TRUE;
252b5132
RH
6085}
6086
6087/* Assign file positions for all the reloc sections which are not part
a485e98e 6088 of the loadable file image, and the file position of section headers. */
252b5132 6089
0ce398f1
L
6090static bfd_boolean
6091_bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
252b5132
RH
6092{
6093 file_ptr off;
e06efbf1 6094 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
3e19fb8f 6095 Elf_Internal_Shdr *shdrp;
a485e98e
AM
6096 Elf_Internal_Ehdr *i_ehdrp;
6097 const struct elf_backend_data *bed;
252b5132 6098
12bd6957 6099 off = elf_next_file_pos (abfd);
252b5132 6100
e06efbf1
L
6101 shdrpp = elf_elfsections (abfd);
6102 end_shdrpp = shdrpp + elf_numsections (abfd);
6103 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
252b5132 6104 {
252b5132 6105 shdrp = *shdrpp;
0ce398f1
L
6106 if (shdrp->sh_offset == -1)
6107 {
3e19fb8f 6108 asection *sec = shdrp->bfd_section;
0ce398f1
L
6109 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6110 || shdrp->sh_type == SHT_RELA);
6111 if (is_rel
3e19fb8f 6112 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
0ce398f1
L
6113 {
6114 if (!is_rel)
6115 {
3e19fb8f
L
6116 const char *name = sec->name;
6117 struct bfd_elf_section_data *d;
6118
0ce398f1 6119 /* Compress DWARF debug sections. */
3e19fb8f 6120 if (!bfd_compress_section (abfd, sec,
0ce398f1
L
6121 shdrp->contents))
6122 return FALSE;
3e19fb8f
L
6123
6124 if (sec->compress_status == COMPRESS_SECTION_DONE
6125 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6126 {
6127 /* If section is compressed with zlib-gnu, convert
6128 section name from .debug_* to .zdebug_*. */
6129 char *new_name
6130 = convert_debug_to_zdebug (abfd, name);
6131 if (new_name == NULL)
6132 return FALSE;
6133 name = new_name;
6134 }
dd905818 6135 /* Add section name to section name section. */
3e19fb8f
L
6136 if (shdrp->sh_name != (unsigned int) -1)
6137 abort ();
6138 shdrp->sh_name
6139 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6140 name, FALSE);
6141 d = elf_section_data (sec);
6142
dd905818 6143 /* Add reloc section name to section name section. */
3e19fb8f
L
6144 if (d->rel.hdr
6145 && !_bfd_elf_set_reloc_sh_name (abfd,
6146 d->rel.hdr,
6147 name, FALSE))
6148 return FALSE;
6149 if (d->rela.hdr
6150 && !_bfd_elf_set_reloc_sh_name (abfd,
6151 d->rela.hdr,
91cb26da 6152 name, TRUE))
3e19fb8f
L
6153 return FALSE;
6154
0ce398f1 6155 /* Update section size and contents. */
3e19fb8f
L
6156 shdrp->sh_size = sec->size;
6157 shdrp->contents = sec->contents;
0ce398f1
L
6158 shdrp->bfd_section->contents = NULL;
6159 }
6160 off = _bfd_elf_assign_file_position_for_section (shdrp,
6161 off,
6162 TRUE);
6163 }
6164 }
252b5132
RH
6165 }
6166
3e19fb8f
L
6167 /* Place section name section after DWARF debug sections have been
6168 compressed. */
6169 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6170 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6171 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6172 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6173
6174 /* Place the section headers. */
a485e98e
AM
6175 i_ehdrp = elf_elfheader (abfd);
6176 bed = get_elf_backend_data (abfd);
6177 off = align_file_position (off, 1 << bed->s->log_file_align);
6178 i_ehdrp->e_shoff = off;
6179 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
12bd6957 6180 elf_next_file_pos (abfd) = off;
0ce398f1
L
6181
6182 return TRUE;
252b5132
RH
6183}
6184
b34976b6 6185bfd_boolean
217aa764 6186_bfd_elf_write_object_contents (bfd *abfd)
252b5132 6187{
9c5bfbb7 6188 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 6189 Elf_Internal_Shdr **i_shdrp;
b34976b6 6190 bfd_boolean failed;
9ad5cbcf 6191 unsigned int count, num_sec;
30e8ee25 6192 struct elf_obj_tdata *t;
252b5132
RH
6193
6194 if (! abfd->output_has_begun
217aa764 6195 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 6196 return FALSE;
252b5132
RH
6197
6198 i_shdrp = elf_elfsections (abfd);
252b5132 6199
b34976b6 6200 failed = FALSE;
252b5132
RH
6201 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6202 if (failed)
b34976b6 6203 return FALSE;
252b5132 6204
0ce398f1
L
6205 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6206 return FALSE;
252b5132 6207
c044fabd 6208 /* After writing the headers, we need to write the sections too... */
9ad5cbcf
AM
6209 num_sec = elf_numsections (abfd);
6210 for (count = 1; count < num_sec; count++)
252b5132 6211 {
3e19fb8f
L
6212 i_shdrp[count]->sh_name
6213 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6214 i_shdrp[count]->sh_name);
252b5132
RH
6215 if (bed->elf_backend_section_processing)
6216 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
6217 if (i_shdrp[count]->contents)
6218 {
dc810e39
AM
6219 bfd_size_type amt = i_shdrp[count]->sh_size;
6220
252b5132 6221 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
dc810e39 6222 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
b34976b6 6223 return FALSE;
252b5132
RH
6224 }
6225 }
6226
6227 /* Write out the section header names. */
30e8ee25 6228 t = elf_tdata (abfd);
26ae6d5e 6229 if (elf_shstrtab (abfd) != NULL
30e8ee25 6230 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
08a40648 6231 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
b34976b6 6232 return FALSE;
252b5132
RH
6233
6234 if (bed->elf_backend_final_write_processing)
12bd6957 6235 (*bed->elf_backend_final_write_processing) (abfd, elf_linker (abfd));
252b5132 6236
ff59fc36
RM
6237 if (!bed->s->write_shdrs_and_ehdr (abfd))
6238 return FALSE;
6239
6240 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
c0355132
AM
6241 if (t->o->build_id.after_write_object_contents != NULL)
6242 return (*t->o->build_id.after_write_object_contents) (abfd);
ff59fc36
RM
6243
6244 return TRUE;
252b5132
RH
6245}
6246
b34976b6 6247bfd_boolean
217aa764 6248_bfd_elf_write_corefile_contents (bfd *abfd)
252b5132 6249{
c044fabd 6250 /* Hopefully this can be done just like an object file. */
252b5132
RH
6251 return _bfd_elf_write_object_contents (abfd);
6252}
c044fabd
KH
6253
6254/* Given a section, search the header to find them. */
6255
cb33740c 6256unsigned int
198beae2 6257_bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
252b5132 6258{
9c5bfbb7 6259 const struct elf_backend_data *bed;
91d6fa6a 6260 unsigned int sec_index;
252b5132 6261
9ad5cbcf
AM
6262 if (elf_section_data (asect) != NULL
6263 && elf_section_data (asect)->this_idx != 0)
6264 return elf_section_data (asect)->this_idx;
6265
6266 if (bfd_is_abs_section (asect))
91d6fa6a 6267 sec_index = SHN_ABS;
af746e92 6268 else if (bfd_is_com_section (asect))
91d6fa6a 6269 sec_index = SHN_COMMON;
af746e92 6270 else if (bfd_is_und_section (asect))
91d6fa6a 6271 sec_index = SHN_UNDEF;
af746e92 6272 else
91d6fa6a 6273 sec_index = SHN_BAD;
252b5132 6274
af746e92 6275 bed = get_elf_backend_data (abfd);
252b5132
RH
6276 if (bed->elf_backend_section_from_bfd_section)
6277 {
91d6fa6a 6278 int retval = sec_index;
9ad5cbcf 6279
af746e92
AM
6280 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6281 return retval;
252b5132
RH
6282 }
6283
91d6fa6a 6284 if (sec_index == SHN_BAD)
af746e92 6285 bfd_set_error (bfd_error_nonrepresentable_section);
252b5132 6286
91d6fa6a 6287 return sec_index;
252b5132
RH
6288}
6289
6290/* Given a BFD symbol, return the index in the ELF symbol table, or -1
6291 on error. */
6292
6293int
217aa764 6294_bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
252b5132
RH
6295{
6296 asymbol *asym_ptr = *asym_ptr_ptr;
6297 int idx;
6298 flagword flags = asym_ptr->flags;
6299
6300 /* When gas creates relocations against local labels, it creates its
6301 own symbol for the section, but does put the symbol into the
6302 symbol chain, so udata is 0. When the linker is generating
6303 relocatable output, this section symbol may be for one of the
6304 input sections rather than the output section. */
6305 if (asym_ptr->udata.i == 0
6306 && (flags & BSF_SECTION_SYM)
6307 && asym_ptr->section)
6308 {
5372391b 6309 asection *sec;
252b5132
RH
6310 int indx;
6311
5372391b
AM
6312 sec = asym_ptr->section;
6313 if (sec->owner != abfd && sec->output_section != NULL)
6314 sec = sec->output_section;
6315 if (sec->owner == abfd
6316 && (indx = sec->index) < elf_num_section_syms (abfd)
4e89ac30 6317 && elf_section_syms (abfd)[indx] != NULL)
252b5132
RH
6318 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6319 }
6320
6321 idx = asym_ptr->udata.i;
6322
6323 if (idx == 0)
6324 {
6325 /* This case can occur when using --strip-symbol on a symbol
08a40648 6326 which is used in a relocation entry. */
4eca0228 6327 _bfd_error_handler
695344c0 6328 /* xgettext:c-format */
d003868e
AM
6329 (_("%B: symbol `%s' required but not present"),
6330 abfd, bfd_asymbol_name (asym_ptr));
252b5132
RH
6331 bfd_set_error (bfd_error_no_symbols);
6332 return -1;
6333 }
6334
6335#if DEBUG & 4
6336 {
6337 fprintf (stderr,
9ccb8af9
AM
6338 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx\n",
6339 (long) asym_ptr, asym_ptr->name, idx, (long) flags);
252b5132
RH
6340 fflush (stderr);
6341 }
6342#endif
6343
6344 return idx;
6345}
6346
84d1d650 6347/* Rewrite program header information. */
252b5132 6348
b34976b6 6349static bfd_boolean
84d1d650 6350rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
252b5132 6351{
b34976b6
AM
6352 Elf_Internal_Ehdr *iehdr;
6353 struct elf_segment_map *map;
6354 struct elf_segment_map *map_first;
6355 struct elf_segment_map **pointer_to_map;
6356 Elf_Internal_Phdr *segment;
6357 asection *section;
6358 unsigned int i;
6359 unsigned int num_segments;
6360 bfd_boolean phdr_included = FALSE;
5c44b38e 6361 bfd_boolean p_paddr_valid;
b34976b6
AM
6362 bfd_vma maxpagesize;
6363 struct elf_segment_map *phdr_adjust_seg = NULL;
6364 unsigned int phdr_adjust_num = 0;
9c5bfbb7 6365 const struct elf_backend_data *bed;
bc67d8a6 6366
caf47ea6 6367 bed = get_elf_backend_data (ibfd);
252b5132
RH
6368 iehdr = elf_elfheader (ibfd);
6369
bc67d8a6 6370 map_first = NULL;
c044fabd 6371 pointer_to_map = &map_first;
252b5132
RH
6372
6373 num_segments = elf_elfheader (ibfd)->e_phnum;
bc67d8a6
NC
6374 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6375
6376 /* Returns the end address of the segment + 1. */
aecc8f8a
AM
6377#define SEGMENT_END(segment, start) \
6378 (start + (segment->p_memsz > segment->p_filesz \
6379 ? segment->p_memsz : segment->p_filesz))
bc67d8a6 6380
eecdbe52
JJ
6381#define SECTION_SIZE(section, segment) \
6382 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6383 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
eea6121a 6384 ? section->size : 0)
eecdbe52 6385
b34976b6 6386 /* Returns TRUE if the given section is contained within
bc67d8a6 6387 the given segment. VMA addresses are compared. */
aecc8f8a
AM
6388#define IS_CONTAINED_BY_VMA(section, segment) \
6389 (section->vma >= segment->p_vaddr \
eecdbe52 6390 && (section->vma + SECTION_SIZE (section, segment) \
aecc8f8a 6391 <= (SEGMENT_END (segment, segment->p_vaddr))))
c044fabd 6392
b34976b6 6393 /* Returns TRUE if the given section is contained within
bc67d8a6 6394 the given segment. LMA addresses are compared. */
aecc8f8a
AM
6395#define IS_CONTAINED_BY_LMA(section, segment, base) \
6396 (section->lma >= base \
eecdbe52 6397 && (section->lma + SECTION_SIZE (section, segment) \
aecc8f8a 6398 <= SEGMENT_END (segment, base)))
252b5132 6399
0efc80c8
L
6400 /* Handle PT_NOTE segment. */
6401#define IS_NOTE(p, s) \
aecc8f8a 6402 (p->p_type == PT_NOTE \
0efc80c8 6403 && elf_section_type (s) == SHT_NOTE \
aecc8f8a 6404 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6405 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6406 <= p->p_offset + p->p_filesz))
252b5132 6407
0efc80c8
L
6408 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6409 etc. */
6410#define IS_COREFILE_NOTE(p, s) \
6411 (IS_NOTE (p, s) \
6412 && bfd_get_format (ibfd) == bfd_core \
6413 && s->vma == 0 \
6414 && s->lma == 0)
6415
252b5132
RH
6416 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6417 linker, which generates a PT_INTERP section with p_vaddr and
6418 p_memsz set to 0. */
aecc8f8a
AM
6419#define IS_SOLARIS_PT_INTERP(p, s) \
6420 (p->p_vaddr == 0 \
6421 && p->p_paddr == 0 \
6422 && p->p_memsz == 0 \
6423 && p->p_filesz > 0 \
6424 && (s->flags & SEC_HAS_CONTENTS) != 0 \
eea6121a 6425 && s->size > 0 \
aecc8f8a 6426 && (bfd_vma) s->filepos >= p->p_offset \
cb3ff1e5 6427 && ((bfd_vma) s->filepos + s->size \
aecc8f8a 6428 <= p->p_offset + p->p_filesz))
5c440b1e 6429
bc67d8a6
NC
6430 /* Decide if the given section should be included in the given segment.
6431 A section will be included if:
f5ffc919 6432 1. It is within the address space of the segment -- we use the LMA
08a40648 6433 if that is set for the segment and the VMA otherwise,
0efc80c8 6434 2. It is an allocated section or a NOTE section in a PT_NOTE
d324f6d6 6435 segment.
bc67d8a6 6436 3. There is an output section associated with it,
eecdbe52 6437 4. The section has not already been allocated to a previous segment.
2b05f1b7 6438 5. PT_GNU_STACK segments do not include any sections.
03394ac9 6439 6. PT_TLS segment includes only SHF_TLS sections.
6f79b219
JJ
6440 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6441 8. PT_DYNAMIC should not contain empty sections at the beginning
08a40648 6442 (with the possible exception of .dynamic). */
9f17e2a6 6443#define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
2b05f1b7
L
6444 ((((segment->p_paddr \
6445 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6446 : IS_CONTAINED_BY_VMA (section, segment)) \
6447 && (section->flags & SEC_ALLOC) != 0) \
0efc80c8 6448 || IS_NOTE (segment, section)) \
2b05f1b7
L
6449 && segment->p_type != PT_GNU_STACK \
6450 && (segment->p_type != PT_TLS \
6451 || (section->flags & SEC_THREAD_LOCAL)) \
6452 && (segment->p_type == PT_LOAD \
6453 || segment->p_type == PT_TLS \
6454 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6455 && (segment->p_type != PT_DYNAMIC \
6456 || SECTION_SIZE (section, segment) > 0 \
6457 || (segment->p_paddr \
6458 ? segment->p_paddr != section->lma \
6459 : segment->p_vaddr != section->vma) \
6460 || (strcmp (bfd_get_section_name (ibfd, section), ".dynamic") \
6461 == 0)) \
0067a569 6462 && !section->segment_mark)
bc67d8a6 6463
9f17e2a6
L
6464/* If the output section of a section in the input segment is NULL,
6465 it is removed from the corresponding output segment. */
6466#define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6467 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6468 && section->output_section != NULL)
6469
b34976b6 6470 /* Returns TRUE iff seg1 starts after the end of seg2. */
b5f852ea
NC
6471#define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6472 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6473
6474 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6475 their VMA address ranges and their LMA address ranges overlap.
6476 It is possible to have overlapping VMA ranges without overlapping LMA
6477 ranges. RedBoot images for example can have both .data and .bss mapped
6478 to the same VMA range, but with the .data section mapped to a different
6479 LMA. */
aecc8f8a 6480#define SEGMENT_OVERLAPS(seg1, seg2) \
b5f852ea 6481 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
08a40648 6482 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
b5f852ea 6483 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
08a40648 6484 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
bc67d8a6
NC
6485
6486 /* Initialise the segment mark field. */
6487 for (section = ibfd->sections; section != NULL; section = section->next)
b34976b6 6488 section->segment_mark = FALSE;
bc67d8a6 6489
5c44b38e
AM
6490 /* The Solaris linker creates program headers in which all the
6491 p_paddr fields are zero. When we try to objcopy or strip such a
6492 file, we get confused. Check for this case, and if we find it
6493 don't set the p_paddr_valid fields. */
6494 p_paddr_valid = FALSE;
6495 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6496 i < num_segments;
6497 i++, segment++)
6498 if (segment->p_paddr != 0)
6499 {
6500 p_paddr_valid = TRUE;
6501 break;
6502 }
6503
252b5132 6504 /* Scan through the segments specified in the program header
bc67d8a6 6505 of the input BFD. For this first scan we look for overlaps
9ad5cbcf 6506 in the loadable segments. These can be created by weird
aecc8f8a 6507 parameters to objcopy. Also, fix some solaris weirdness. */
bc67d8a6
NC
6508 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6509 i < num_segments;
c044fabd 6510 i++, segment++)
252b5132 6511 {
252b5132 6512 unsigned int j;
c044fabd 6513 Elf_Internal_Phdr *segment2;
252b5132 6514
aecc8f8a
AM
6515 if (segment->p_type == PT_INTERP)
6516 for (section = ibfd->sections; section; section = section->next)
6517 if (IS_SOLARIS_PT_INTERP (segment, section))
6518 {
6519 /* Mininal change so that the normal section to segment
4cc11e76 6520 assignment code will work. */
aecc8f8a
AM
6521 segment->p_vaddr = section->vma;
6522 break;
6523 }
6524
bc67d8a6 6525 if (segment->p_type != PT_LOAD)
b10a8ae0
L
6526 {
6527 /* Remove PT_GNU_RELRO segment. */
6528 if (segment->p_type == PT_GNU_RELRO)
6529 segment->p_type = PT_NULL;
6530 continue;
6531 }
c044fabd 6532
bc67d8a6 6533 /* Determine if this segment overlaps any previous segments. */
0067a569 6534 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
bc67d8a6
NC
6535 {
6536 bfd_signed_vma extra_length;
c044fabd 6537
bc67d8a6 6538 if (segment2->p_type != PT_LOAD
0067a569 6539 || !SEGMENT_OVERLAPS (segment, segment2))
bc67d8a6 6540 continue;
c044fabd 6541
bc67d8a6
NC
6542 /* Merge the two segments together. */
6543 if (segment2->p_vaddr < segment->p_vaddr)
6544 {
c044fabd 6545 /* Extend SEGMENT2 to include SEGMENT and then delete
08a40648 6546 SEGMENT. */
0067a569
AM
6547 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6548 - SEGMENT_END (segment2, segment2->p_vaddr));
c044fabd 6549
bc67d8a6
NC
6550 if (extra_length > 0)
6551 {
0067a569 6552 segment2->p_memsz += extra_length;
bc67d8a6
NC
6553 segment2->p_filesz += extra_length;
6554 }
c044fabd 6555
bc67d8a6 6556 segment->p_type = PT_NULL;
c044fabd 6557
bc67d8a6
NC
6558 /* Since we have deleted P we must restart the outer loop. */
6559 i = 0;
6560 segment = elf_tdata (ibfd)->phdr;
6561 break;
6562 }
6563 else
6564 {
c044fabd 6565 /* Extend SEGMENT to include SEGMENT2 and then delete
08a40648 6566 SEGMENT2. */
0067a569
AM
6567 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6568 - SEGMENT_END (segment, segment->p_vaddr));
c044fabd 6569
bc67d8a6
NC
6570 if (extra_length > 0)
6571 {
0067a569 6572 segment->p_memsz += extra_length;
bc67d8a6
NC
6573 segment->p_filesz += extra_length;
6574 }
c044fabd 6575
bc67d8a6
NC
6576 segment2->p_type = PT_NULL;
6577 }
6578 }
6579 }
c044fabd 6580
bc67d8a6
NC
6581 /* The second scan attempts to assign sections to segments. */
6582 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6583 i < num_segments;
0067a569 6584 i++, segment++)
bc67d8a6 6585 {
0067a569
AM
6586 unsigned int section_count;
6587 asection **sections;
6588 asection *output_section;
6589 unsigned int isec;
6590 bfd_vma matching_lma;
6591 bfd_vma suggested_lma;
6592 unsigned int j;
dc810e39 6593 bfd_size_type amt;
0067a569
AM
6594 asection *first_section;
6595 bfd_boolean first_matching_lma;
6596 bfd_boolean first_suggested_lma;
bc67d8a6
NC
6597
6598 if (segment->p_type == PT_NULL)
6599 continue;
c044fabd 6600
9f17e2a6 6601 first_section = NULL;
bc67d8a6 6602 /* Compute how many sections might be placed into this segment. */
b5f852ea
NC
6603 for (section = ibfd->sections, section_count = 0;
6604 section != NULL;
6605 section = section->next)
9f17e2a6
L
6606 {
6607 /* Find the first section in the input segment, which may be
6608 removed from the corresponding output segment. */
6609 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
6610 {
6611 if (first_section == NULL)
6612 first_section = section;
6613 if (section->output_section != NULL)
6614 ++section_count;
6615 }
6616 }
811072d8 6617
b5f852ea
NC
6618 /* Allocate a segment map big enough to contain
6619 all of the sections we have selected. */
dc810e39
AM
6620 amt = sizeof (struct elf_segment_map);
6621 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 6622 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6623 if (map == NULL)
b34976b6 6624 return FALSE;
252b5132
RH
6625
6626 /* Initialise the fields of the segment map. Default to
6627 using the physical address of the segment in the input BFD. */
0067a569
AM
6628 map->next = NULL;
6629 map->p_type = segment->p_type;
6630 map->p_flags = segment->p_flags;
bc67d8a6 6631 map->p_flags_valid = 1;
55d55ac7 6632
9f17e2a6
L
6633 /* If the first section in the input segment is removed, there is
6634 no need to preserve segment physical address in the corresponding
6635 output segment. */
945c025a 6636 if (!first_section || first_section->output_section != NULL)
9f17e2a6
L
6637 {
6638 map->p_paddr = segment->p_paddr;
5c44b38e 6639 map->p_paddr_valid = p_paddr_valid;
9f17e2a6 6640 }
252b5132
RH
6641
6642 /* Determine if this segment contains the ELF file header
6643 and if it contains the program headers themselves. */
bc67d8a6
NC
6644 map->includes_filehdr = (segment->p_offset == 0
6645 && segment->p_filesz >= iehdr->e_ehsize);
bc67d8a6 6646 map->includes_phdrs = 0;
252b5132 6647
0067a569 6648 if (!phdr_included || segment->p_type != PT_LOAD)
252b5132 6649 {
bc67d8a6
NC
6650 map->includes_phdrs =
6651 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
6652 && (segment->p_offset + segment->p_filesz
252b5132
RH
6653 >= ((bfd_vma) iehdr->e_phoff
6654 + iehdr->e_phnum * iehdr->e_phentsize)));
c044fabd 6655
bc67d8a6 6656 if (segment->p_type == PT_LOAD && map->includes_phdrs)
b34976b6 6657 phdr_included = TRUE;
252b5132
RH
6658 }
6659
bc67d8a6 6660 if (section_count == 0)
252b5132
RH
6661 {
6662 /* Special segments, such as the PT_PHDR segment, may contain
6663 no sections, but ordinary, loadable segments should contain
1ed89aa9
NC
6664 something. They are allowed by the ELF spec however, so only
6665 a warning is produced. */
bc67d8a6 6666 if (segment->p_type == PT_LOAD)
4eca0228 6667 _bfd_error_handler (_("\
c86934ce 6668%B: warning: Empty loadable segment detected, is this intentional ?"),
4eca0228 6669 ibfd);
252b5132 6670
bc67d8a6 6671 map->count = 0;
c044fabd
KH
6672 *pointer_to_map = map;
6673 pointer_to_map = &map->next;
252b5132
RH
6674
6675 continue;
6676 }
6677
6678 /* Now scan the sections in the input BFD again and attempt
6679 to add their corresponding output sections to the segment map.
6680 The problem here is how to handle an output section which has
6681 been moved (ie had its LMA changed). There are four possibilities:
6682
6683 1. None of the sections have been moved.
6684 In this case we can continue to use the segment LMA from the
6685 input BFD.
6686
6687 2. All of the sections have been moved by the same amount.
6688 In this case we can change the segment's LMA to match the LMA
6689 of the first section.
6690
6691 3. Some of the sections have been moved, others have not.
6692 In this case those sections which have not been moved can be
6693 placed in the current segment which will have to have its size,
6694 and possibly its LMA changed, and a new segment or segments will
6695 have to be created to contain the other sections.
6696
b5f852ea 6697 4. The sections have been moved, but not by the same amount.
252b5132
RH
6698 In this case we can change the segment's LMA to match the LMA
6699 of the first section and we will have to create a new segment
6700 or segments to contain the other sections.
6701
6702 In order to save time, we allocate an array to hold the section
6703 pointers that we are interested in. As these sections get assigned
6704 to a segment, they are removed from this array. */
6705
a50b1753 6706 sections = (asection **) bfd_malloc2 (section_count, sizeof (asection *));
252b5132 6707 if (sections == NULL)
b34976b6 6708 return FALSE;
252b5132
RH
6709
6710 /* Step One: Scan for segment vs section LMA conflicts.
6711 Also add the sections to the section array allocated above.
6712 Also add the sections to the current segment. In the common
6713 case, where the sections have not been moved, this means that
6714 we have completely filled the segment, and there is nothing
6715 more to do. */
252b5132 6716 isec = 0;
72730e0c 6717 matching_lma = 0;
252b5132 6718 suggested_lma = 0;
0067a569
AM
6719 first_matching_lma = TRUE;
6720 first_suggested_lma = TRUE;
252b5132 6721
461c4b2e 6722 for (section = first_section, j = 0;
bc67d8a6
NC
6723 section != NULL;
6724 section = section->next)
252b5132 6725 {
caf47ea6 6726 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
c0f7859b 6727 {
bc67d8a6
NC
6728 output_section = section->output_section;
6729
0067a569 6730 sections[j++] = section;
252b5132
RH
6731
6732 /* The Solaris native linker always sets p_paddr to 0.
6733 We try to catch that case here, and set it to the
5e8d7549
NC
6734 correct value. Note - some backends require that
6735 p_paddr be left as zero. */
5c44b38e 6736 if (!p_paddr_valid
4455705d 6737 && segment->p_vaddr != 0
0067a569 6738 && !bed->want_p_paddr_set_to_zero
252b5132 6739 && isec == 0
bc67d8a6 6740 && output_section->lma != 0
0067a569
AM
6741 && output_section->vma == (segment->p_vaddr
6742 + (map->includes_filehdr
6743 ? iehdr->e_ehsize
6744 : 0)
6745 + (map->includes_phdrs
6746 ? (iehdr->e_phnum
6747 * iehdr->e_phentsize)
6748 : 0)))
bc67d8a6 6749 map->p_paddr = segment->p_vaddr;
252b5132
RH
6750
6751 /* Match up the physical address of the segment with the
6752 LMA address of the output section. */
bc67d8a6 6753 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
5e8d7549 6754 || IS_COREFILE_NOTE (segment, section)
0067a569
AM
6755 || (bed->want_p_paddr_set_to_zero
6756 && IS_CONTAINED_BY_VMA (output_section, segment)))
252b5132 6757 {
0067a569
AM
6758 if (first_matching_lma || output_section->lma < matching_lma)
6759 {
6760 matching_lma = output_section->lma;
6761 first_matching_lma = FALSE;
6762 }
252b5132
RH
6763
6764 /* We assume that if the section fits within the segment
bc67d8a6 6765 then it does not overlap any other section within that
252b5132 6766 segment. */
0067a569
AM
6767 map->sections[isec++] = output_section;
6768 }
6769 else if (first_suggested_lma)
6770 {
6771 suggested_lma = output_section->lma;
6772 first_suggested_lma = FALSE;
252b5132 6773 }
147d51c2
L
6774
6775 if (j == section_count)
6776 break;
252b5132
RH
6777 }
6778 }
6779
bc67d8a6 6780 BFD_ASSERT (j == section_count);
252b5132
RH
6781
6782 /* Step Two: Adjust the physical address of the current segment,
6783 if necessary. */
bc67d8a6 6784 if (isec == section_count)
252b5132
RH
6785 {
6786 /* All of the sections fitted within the segment as currently
6787 specified. This is the default case. Add the segment to
6788 the list of built segments and carry on to process the next
6789 program header in the input BFD. */
bc67d8a6 6790 map->count = section_count;
c044fabd
KH
6791 *pointer_to_map = map;
6792 pointer_to_map = &map->next;
08a40648 6793
5c44b38e
AM
6794 if (p_paddr_valid
6795 && !bed->want_p_paddr_set_to_zero
147d51c2 6796 && matching_lma != map->p_paddr
5c44b38e
AM
6797 && !map->includes_filehdr
6798 && !map->includes_phdrs)
3271a814
NS
6799 /* There is some padding before the first section in the
6800 segment. So, we must account for that in the output
6801 segment's vma. */
6802 map->p_vaddr_offset = matching_lma - map->p_paddr;
08a40648 6803
252b5132
RH
6804 free (sections);
6805 continue;
6806 }
252b5132
RH
6807 else
6808 {
0067a569 6809 if (!first_matching_lma)
72730e0c
AM
6810 {
6811 /* At least one section fits inside the current segment.
6812 Keep it, but modify its physical address to match the
6813 LMA of the first section that fitted. */
bc67d8a6 6814 map->p_paddr = matching_lma;
72730e0c
AM
6815 }
6816 else
6817 {
6818 /* None of the sections fitted inside the current segment.
6819 Change the current segment's physical address to match
6820 the LMA of the first section. */
bc67d8a6 6821 map->p_paddr = suggested_lma;
72730e0c
AM
6822 }
6823
bc67d8a6
NC
6824 /* Offset the segment physical address from the lma
6825 to allow for space taken up by elf headers. */
6826 if (map->includes_filehdr)
010c8431
AM
6827 {
6828 if (map->p_paddr >= iehdr->e_ehsize)
6829 map->p_paddr -= iehdr->e_ehsize;
6830 else
6831 {
6832 map->includes_filehdr = FALSE;
6833 map->includes_phdrs = FALSE;
6834 }
6835 }
252b5132 6836
bc67d8a6
NC
6837 if (map->includes_phdrs)
6838 {
010c8431
AM
6839 if (map->p_paddr >= iehdr->e_phnum * iehdr->e_phentsize)
6840 {
6841 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
6842
6843 /* iehdr->e_phnum is just an estimate of the number
6844 of program headers that we will need. Make a note
6845 here of the number we used and the segment we chose
6846 to hold these headers, so that we can adjust the
6847 offset when we know the correct value. */
6848 phdr_adjust_num = iehdr->e_phnum;
6849 phdr_adjust_seg = map;
6850 }
6851 else
6852 map->includes_phdrs = FALSE;
bc67d8a6 6853 }
252b5132
RH
6854 }
6855
6856 /* Step Three: Loop over the sections again, this time assigning
caf47ea6 6857 those that fit to the current segment and removing them from the
252b5132
RH
6858 sections array; but making sure not to leave large gaps. Once all
6859 possible sections have been assigned to the current segment it is
6860 added to the list of built segments and if sections still remain
6861 to be assigned, a new segment is constructed before repeating
6862 the loop. */
6863 isec = 0;
6864 do
6865 {
bc67d8a6 6866 map->count = 0;
252b5132 6867 suggested_lma = 0;
0067a569 6868 first_suggested_lma = TRUE;
252b5132
RH
6869
6870 /* Fill the current segment with sections that fit. */
bc67d8a6 6871 for (j = 0; j < section_count; j++)
252b5132 6872 {
bc67d8a6 6873 section = sections[j];
252b5132 6874
bc67d8a6 6875 if (section == NULL)
252b5132
RH
6876 continue;
6877
bc67d8a6 6878 output_section = section->output_section;
252b5132 6879
bc67d8a6 6880 BFD_ASSERT (output_section != NULL);
c044fabd 6881
bc67d8a6
NC
6882 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
6883 || IS_COREFILE_NOTE (segment, section))
252b5132 6884 {
bc67d8a6 6885 if (map->count == 0)
252b5132
RH
6886 {
6887 /* If the first section in a segment does not start at
bc67d8a6
NC
6888 the beginning of the segment, then something is
6889 wrong. */
0067a569
AM
6890 if (output_section->lma
6891 != (map->p_paddr
6892 + (map->includes_filehdr ? iehdr->e_ehsize : 0)
6893 + (map->includes_phdrs
6894 ? iehdr->e_phnum * iehdr->e_phentsize
6895 : 0)))
252b5132
RH
6896 abort ();
6897 }
6898 else
6899 {
0067a569 6900 asection *prev_sec;
252b5132 6901
bc67d8a6 6902 prev_sec = map->sections[map->count - 1];
252b5132
RH
6903
6904 /* If the gap between the end of the previous section
bc67d8a6
NC
6905 and the start of this section is more than
6906 maxpagesize then we need to start a new segment. */
eea6121a 6907 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
079e9a2f 6908 maxpagesize)
caf47ea6 6909 < BFD_ALIGN (output_section->lma, maxpagesize))
0067a569 6910 || (prev_sec->lma + prev_sec->size
079e9a2f 6911 > output_section->lma))
252b5132 6912 {
0067a569
AM
6913 if (first_suggested_lma)
6914 {
6915 suggested_lma = output_section->lma;
6916 first_suggested_lma = FALSE;
6917 }
252b5132
RH
6918
6919 continue;
6920 }
6921 }
6922
bc67d8a6 6923 map->sections[map->count++] = output_section;
252b5132
RH
6924 ++isec;
6925 sections[j] = NULL;
b34976b6 6926 section->segment_mark = TRUE;
252b5132 6927 }
0067a569
AM
6928 else if (first_suggested_lma)
6929 {
6930 suggested_lma = output_section->lma;
6931 first_suggested_lma = FALSE;
6932 }
252b5132
RH
6933 }
6934
bc67d8a6 6935 BFD_ASSERT (map->count > 0);
252b5132
RH
6936
6937 /* Add the current segment to the list of built segments. */
c044fabd
KH
6938 *pointer_to_map = map;
6939 pointer_to_map = &map->next;
252b5132 6940
bc67d8a6 6941 if (isec < section_count)
252b5132
RH
6942 {
6943 /* We still have not allocated all of the sections to
6944 segments. Create a new segment here, initialise it
6945 and carry on looping. */
dc810e39
AM
6946 amt = sizeof (struct elf_segment_map);
6947 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
5964fc3a 6948 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
bc67d8a6 6949 if (map == NULL)
5ed6aba4
NC
6950 {
6951 free (sections);
6952 return FALSE;
6953 }
252b5132
RH
6954
6955 /* Initialise the fields of the segment map. Set the physical
6956 physical address to the LMA of the first section that has
6957 not yet been assigned. */
0067a569
AM
6958 map->next = NULL;
6959 map->p_type = segment->p_type;
6960 map->p_flags = segment->p_flags;
6961 map->p_flags_valid = 1;
6962 map->p_paddr = suggested_lma;
5c44b38e 6963 map->p_paddr_valid = p_paddr_valid;
bc67d8a6 6964 map->includes_filehdr = 0;
0067a569 6965 map->includes_phdrs = 0;
252b5132
RH
6966 }
6967 }
bc67d8a6 6968 while (isec < section_count);
252b5132
RH
6969
6970 free (sections);
6971 }
6972
12bd6957 6973 elf_seg_map (obfd) = map_first;
bc67d8a6
NC
6974
6975 /* If we had to estimate the number of program headers that were
9ad5cbcf 6976 going to be needed, then check our estimate now and adjust
bc67d8a6
NC
6977 the offset if necessary. */
6978 if (phdr_adjust_seg != NULL)
6979 {
6980 unsigned int count;
c044fabd 6981
bc67d8a6 6982 for (count = 0, map = map_first; map != NULL; map = map->next)
c044fabd 6983 count++;
252b5132 6984
bc67d8a6
NC
6985 if (count > phdr_adjust_num)
6986 phdr_adjust_seg->p_paddr
6987 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
6988 }
c044fabd 6989
bc67d8a6 6990#undef SEGMENT_END
eecdbe52 6991#undef SECTION_SIZE
bc67d8a6
NC
6992#undef IS_CONTAINED_BY_VMA
6993#undef IS_CONTAINED_BY_LMA
0efc80c8 6994#undef IS_NOTE
252b5132 6995#undef IS_COREFILE_NOTE
bc67d8a6 6996#undef IS_SOLARIS_PT_INTERP
9f17e2a6 6997#undef IS_SECTION_IN_INPUT_SEGMENT
bc67d8a6
NC
6998#undef INCLUDE_SECTION_IN_SEGMENT
6999#undef SEGMENT_AFTER_SEGMENT
7000#undef SEGMENT_OVERLAPS
b34976b6 7001 return TRUE;
252b5132
RH
7002}
7003
84d1d650
L
7004/* Copy ELF program header information. */
7005
7006static bfd_boolean
7007copy_elf_program_header (bfd *ibfd, bfd *obfd)
7008{
7009 Elf_Internal_Ehdr *iehdr;
7010 struct elf_segment_map *map;
7011 struct elf_segment_map *map_first;
7012 struct elf_segment_map **pointer_to_map;
7013 Elf_Internal_Phdr *segment;
7014 unsigned int i;
7015 unsigned int num_segments;
7016 bfd_boolean phdr_included = FALSE;
88967714 7017 bfd_boolean p_paddr_valid;
84d1d650
L
7018
7019 iehdr = elf_elfheader (ibfd);
7020
7021 map_first = NULL;
7022 pointer_to_map = &map_first;
7023
88967714
AM
7024 /* If all the segment p_paddr fields are zero, don't set
7025 map->p_paddr_valid. */
7026 p_paddr_valid = FALSE;
84d1d650 7027 num_segments = elf_elfheader (ibfd)->e_phnum;
88967714
AM
7028 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7029 i < num_segments;
7030 i++, segment++)
7031 if (segment->p_paddr != 0)
7032 {
7033 p_paddr_valid = TRUE;
7034 break;
7035 }
7036
84d1d650
L
7037 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7038 i < num_segments;
7039 i++, segment++)
7040 {
7041 asection *section;
7042 unsigned int section_count;
7043 bfd_size_type amt;
7044 Elf_Internal_Shdr *this_hdr;
53020534 7045 asection *first_section = NULL;
a76e6f2f 7046 asection *lowest_section;
84d1d650 7047
84d1d650
L
7048 /* Compute how many sections are in this segment. */
7049 for (section = ibfd->sections, section_count = 0;
7050 section != NULL;
7051 section = section->next)
7052 {
7053 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7054 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
3271a814 7055 {
a76e6f2f
AM
7056 if (first_section == NULL)
7057 first_section = section;
3271a814
NS
7058 section_count++;
7059 }
84d1d650
L
7060 }
7061
7062 /* Allocate a segment map big enough to contain
7063 all of the sections we have selected. */
7064 amt = sizeof (struct elf_segment_map);
7065 if (section_count != 0)
7066 amt += ((bfd_size_type) section_count - 1) * sizeof (asection *);
a50b1753 7067 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
84d1d650
L
7068 if (map == NULL)
7069 return FALSE;
7070
7071 /* Initialize the fields of the output segment map with the
7072 input segment. */
7073 map->next = NULL;
7074 map->p_type = segment->p_type;
7075 map->p_flags = segment->p_flags;
7076 map->p_flags_valid = 1;
7077 map->p_paddr = segment->p_paddr;
88967714 7078 map->p_paddr_valid = p_paddr_valid;
3f570048
AM
7079 map->p_align = segment->p_align;
7080 map->p_align_valid = 1;
3271a814 7081 map->p_vaddr_offset = 0;
84d1d650 7082
04c3a755
NS
7083 if (map->p_type == PT_GNU_RELRO
7084 || map->p_type == PT_GNU_STACK)
b10a8ae0
L
7085 {
7086 /* The PT_GNU_RELRO segment may contain the first a few
7087 bytes in the .got.plt section even if the whole .got.plt
7088 section isn't in the PT_GNU_RELRO segment. We won't
04c3a755
NS
7089 change the size of the PT_GNU_RELRO segment.
7090 Similarly, PT_GNU_STACK size is significant on uclinux
7091 systems. */
9433b9b1 7092 map->p_size = segment->p_memsz;
b10a8ae0
L
7093 map->p_size_valid = 1;
7094 }
7095
84d1d650
L
7096 /* Determine if this segment contains the ELF file header
7097 and if it contains the program headers themselves. */
7098 map->includes_filehdr = (segment->p_offset == 0
7099 && segment->p_filesz >= iehdr->e_ehsize);
7100
7101 map->includes_phdrs = 0;
7102 if (! phdr_included || segment->p_type != PT_LOAD)
7103 {
7104 map->includes_phdrs =
7105 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7106 && (segment->p_offset + segment->p_filesz
7107 >= ((bfd_vma) iehdr->e_phoff
7108 + iehdr->e_phnum * iehdr->e_phentsize)));
7109
7110 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7111 phdr_included = TRUE;
7112 }
7113
bbefd0a9 7114 lowest_section = NULL;
84d1d650
L
7115 if (section_count != 0)
7116 {
7117 unsigned int isec = 0;
7118
53020534 7119 for (section = first_section;
84d1d650
L
7120 section != NULL;
7121 section = section->next)
7122 {
7123 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7124 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
53020534
L
7125 {
7126 map->sections[isec++] = section->output_section;
a76e6f2f
AM
7127 if ((section->flags & SEC_ALLOC) != 0)
7128 {
7129 bfd_vma seg_off;
7130
bbefd0a9
AM
7131 if (lowest_section == NULL
7132 || section->lma < lowest_section->lma)
fb8a5684
AM
7133 lowest_section = section;
7134
a76e6f2f
AM
7135 /* Section lmas are set up from PT_LOAD header
7136 p_paddr in _bfd_elf_make_section_from_shdr.
7137 If this header has a p_paddr that disagrees
7138 with the section lma, flag the p_paddr as
7139 invalid. */
7140 if ((section->flags & SEC_LOAD) != 0)
7141 seg_off = this_hdr->sh_offset - segment->p_offset;
7142 else
7143 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7144 if (section->lma - segment->p_paddr != seg_off)
7145 map->p_paddr_valid = FALSE;
7146 }
53020534
L
7147 if (isec == section_count)
7148 break;
7149 }
84d1d650
L
7150 }
7151 }
7152
a76e6f2f
AM
7153 if (map->includes_filehdr && lowest_section != NULL)
7154 /* We need to keep the space used by the headers fixed. */
7155 map->header_size = lowest_section->vma - segment->p_vaddr;
d324f6d6 7156
a76e6f2f
AM
7157 if (!map->includes_phdrs
7158 && !map->includes_filehdr
7159 && map->p_paddr_valid)
7160 /* There is some other padding before the first section. */
7161 map->p_vaddr_offset = ((lowest_section ? lowest_section->lma : 0)
7162 - segment->p_paddr);
7163
84d1d650
L
7164 map->count = section_count;
7165 *pointer_to_map = map;
7166 pointer_to_map = &map->next;
7167 }
7168
12bd6957 7169 elf_seg_map (obfd) = map_first;
84d1d650
L
7170 return TRUE;
7171}
7172
7173/* Copy private BFD data. This copies or rewrites ELF program header
7174 information. */
7175
7176static bfd_boolean
7177copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7178{
84d1d650
L
7179 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7180 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7181 return TRUE;
7182
7183 if (elf_tdata (ibfd)->phdr == NULL)
7184 return TRUE;
7185
7186 if (ibfd->xvec == obfd->xvec)
7187 {
cb3ff1e5
NC
7188 /* Check to see if any sections in the input BFD
7189 covered by ELF program header have changed. */
d55ce4e2 7190 Elf_Internal_Phdr *segment;
84d1d650
L
7191 asection *section, *osec;
7192 unsigned int i, num_segments;
7193 Elf_Internal_Shdr *this_hdr;
147d51c2
L
7194 const struct elf_backend_data *bed;
7195
7196 bed = get_elf_backend_data (ibfd);
7197
7198 /* Regenerate the segment map if p_paddr is set to 0. */
7199 if (bed->want_p_paddr_set_to_zero)
7200 goto rewrite;
84d1d650
L
7201
7202 /* Initialize the segment mark field. */
7203 for (section = obfd->sections; section != NULL;
7204 section = section->next)
7205 section->segment_mark = FALSE;
7206
7207 num_segments = elf_elfheader (ibfd)->e_phnum;
7208 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7209 i < num_segments;
7210 i++, segment++)
7211 {
5f6999aa
NC
7212 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7213 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7214 which severly confuses things, so always regenerate the segment
7215 map in this case. */
7216 if (segment->p_paddr == 0
7217 && segment->p_memsz == 0
7218 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
cb3ff1e5 7219 goto rewrite;
5f6999aa 7220
84d1d650
L
7221 for (section = ibfd->sections;
7222 section != NULL; section = section->next)
7223 {
7224 /* We mark the output section so that we know it comes
7225 from the input BFD. */
7226 osec = section->output_section;
7227 if (osec)
7228 osec->segment_mark = TRUE;
7229
7230 /* Check if this section is covered by the segment. */
7231 this_hdr = &(elf_section_data(section)->this_hdr);
f4638467 7232 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
84d1d650
L
7233 {
7234 /* FIXME: Check if its output section is changed or
7235 removed. What else do we need to check? */
7236 if (osec == NULL
7237 || section->flags != osec->flags
7238 || section->lma != osec->lma
7239 || section->vma != osec->vma
7240 || section->size != osec->size
7241 || section->rawsize != osec->rawsize
7242 || section->alignment_power != osec->alignment_power)
7243 goto rewrite;
7244 }
7245 }
7246 }
7247
cb3ff1e5 7248 /* Check to see if any output section do not come from the
84d1d650
L
7249 input BFD. */
7250 for (section = obfd->sections; section != NULL;
7251 section = section->next)
7252 {
7253 if (section->segment_mark == FALSE)
7254 goto rewrite;
7255 else
7256 section->segment_mark = FALSE;
7257 }
7258
7259 return copy_elf_program_header (ibfd, obfd);
7260 }
7261
7262rewrite:
f1d85785
L
7263 if (ibfd->xvec == obfd->xvec)
7264 {
7265 /* When rewriting program header, set the output maxpagesize to
7266 the maximum alignment of input PT_LOAD segments. */
7267 Elf_Internal_Phdr *segment;
7268 unsigned int i;
7269 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7270 bfd_vma maxpagesize = 0;
7271
7272 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7273 i < num_segments;
7274 i++, segment++)
7275 if (segment->p_type == PT_LOAD
7276 && maxpagesize < segment->p_align)
c86934ce
NC
7277 {
7278 /* PR 17512: file: f17299af. */
7279 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
695344c0 7280 /* xgettext:c-format */
4eca0228 7281 _bfd_error_handler (_("\
c86934ce 7282%B: warning: segment alignment of 0x%llx is too large"),
4eca0228 7283 ibfd, (long long) segment->p_align);
c86934ce
NC
7284 else
7285 maxpagesize = segment->p_align;
7286 }
f1d85785
L
7287
7288 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7289 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7290 }
7291
84d1d650
L
7292 return rewrite_elf_program_header (ibfd, obfd);
7293}
7294
ccd2ec6a
L
7295/* Initialize private output section information from input section. */
7296
7297bfd_boolean
7298_bfd_elf_init_private_section_data (bfd *ibfd,
7299 asection *isec,
7300 bfd *obfd,
7301 asection *osec,
7302 struct bfd_link_info *link_info)
7303
7304{
7305 Elf_Internal_Shdr *ihdr, *ohdr;
0e1862bb
L
7306 bfd_boolean final_link = (link_info != NULL
7307 && !bfd_link_relocatable (link_info));
ccd2ec6a
L
7308
7309 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7310 || obfd->xvec->flavour != bfd_target_elf_flavour)
7311 return TRUE;
7312
ba85c43e
NC
7313 BFD_ASSERT (elf_section_data (osec) != NULL);
7314
dfa7b0b8
AM
7315 /* For objcopy and relocatable link, don't copy the output ELF
7316 section type from input if the output BFD section flags have been
7317 set to something different. For a final link allow some flags
7318 that the linker clears to differ. */
42bb2e33 7319 if (elf_section_type (osec) == SHT_NULL
dfa7b0b8
AM
7320 && (osec->flags == isec->flags
7321 || (final_link
7322 && ((osec->flags ^ isec->flags)
0814be7d 7323 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
42bb2e33 7324 elf_section_type (osec) = elf_section_type (isec);
d270463e
L
7325
7326 /* FIXME: Is this correct for all OS/PROC specific flags? */
7327 elf_section_flags (osec) |= (elf_section_flags (isec)
7328 & (SHF_MASKOS | SHF_MASKPROC));
ccd2ec6a
L
7329
7330 /* Set things up for objcopy and relocatable link. The output
7331 SHT_GROUP section will have its elf_next_in_group pointing back
7332 to the input group members. Ignore linker created group section.
7333 See elfNN_ia64_object_p in elfxx-ia64.c. */
dfa7b0b8 7334 if (!final_link)
ccd2ec6a
L
7335 {
7336 if (elf_sec_group (isec) == NULL
7337 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0)
7338 {
7339 if (elf_section_flags (isec) & SHF_GROUP)
7340 elf_section_flags (osec) |= SHF_GROUP;
7341 elf_next_in_group (osec) = elf_next_in_group (isec);
9659de1c 7342 elf_section_data (osec)->group = elf_section_data (isec)->group;
ccd2ec6a 7343 }
68f5ff89
L
7344
7345 /* If not decompress, preserve SHF_COMPRESSED. */
7346 if ((ibfd->flags & BFD_DECOMPRESS) == 0)
7347 elf_section_flags (osec) |= (elf_section_flags (isec)
7348 & SHF_COMPRESSED);
ccd2ec6a
L
7349 }
7350
7351 ihdr = &elf_section_data (isec)->this_hdr;
7352
7353 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7354 don't use the output section of the linked-to section since it
7355 may be NULL at this point. */
7356 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7357 {
7358 ohdr = &elf_section_data (osec)->this_hdr;
7359 ohdr->sh_flags |= SHF_LINK_ORDER;
7360 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7361 }
7362
7363 osec->use_rela_p = isec->use_rela_p;
7364
7365 return TRUE;
7366}
7367
252b5132
RH
7368/* Copy private section information. This copies over the entsize
7369 field, and sometimes the info field. */
7370
b34976b6 7371bfd_boolean
217aa764
AM
7372_bfd_elf_copy_private_section_data (bfd *ibfd,
7373 asection *isec,
7374 bfd *obfd,
7375 asection *osec)
252b5132
RH
7376{
7377 Elf_Internal_Shdr *ihdr, *ohdr;
7378
7379 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7380 || obfd->xvec->flavour != bfd_target_elf_flavour)
b34976b6 7381 return TRUE;
252b5132 7382
252b5132
RH
7383 ihdr = &elf_section_data (isec)->this_hdr;
7384 ohdr = &elf_section_data (osec)->this_hdr;
7385
7386 ohdr->sh_entsize = ihdr->sh_entsize;
7387
7388 if (ihdr->sh_type == SHT_SYMTAB
7389 || ihdr->sh_type == SHT_DYNSYM
7390 || ihdr->sh_type == SHT_GNU_verneed
7391 || ihdr->sh_type == SHT_GNU_verdef)
7392 ohdr->sh_info = ihdr->sh_info;
7393
ccd2ec6a
L
7394 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7395 NULL);
252b5132
RH
7396}
7397
d0bf826b
AM
7398/* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7399 necessary if we are removing either the SHT_GROUP section or any of
7400 the group member sections. DISCARDED is the value that a section's
7401 output_section has if the section will be discarded, NULL when this
7402 function is called from objcopy, bfd_abs_section_ptr when called
7403 from the linker. */
80fccad2
BW
7404
7405bfd_boolean
d0bf826b 7406_bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
80fccad2 7407{
30288845
AM
7408 asection *isec;
7409
30288845 7410 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
415f38a6 7411 if (elf_section_type (isec) == SHT_GROUP)
30288845
AM
7412 {
7413 asection *first = elf_next_in_group (isec);
7414 asection *s = first;
d0bf826b
AM
7415 bfd_size_type removed = 0;
7416
30288845
AM
7417 while (s != NULL)
7418 {
415f38a6
AM
7419 /* If this member section is being output but the
7420 SHT_GROUP section is not, then clear the group info
7421 set up by _bfd_elf_copy_private_section_data. */
d0bf826b
AM
7422 if (s->output_section != discarded
7423 && isec->output_section == discarded)
30288845
AM
7424 {
7425 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7426 elf_group_name (s->output_section) = NULL;
7427 }
415f38a6
AM
7428 /* Conversely, if the member section is not being output
7429 but the SHT_GROUP section is, then adjust its size. */
d0bf826b
AM
7430 else if (s->output_section == discarded
7431 && isec->output_section != discarded)
7432 removed += 4;
30288845
AM
7433 s = elf_next_in_group (s);
7434 if (s == first)
7435 break;
7436 }
d0bf826b
AM
7437 if (removed != 0)
7438 {
7439 if (discarded != NULL)
7440 {
7441 /* If we've been called for ld -r, then we need to
7442 adjust the input section size. This function may
7443 be called multiple times, so save the original
7444 size. */
7445 if (isec->rawsize == 0)
7446 isec->rawsize = isec->size;
7447 isec->size = isec->rawsize - removed;
7448 }
7449 else
7450 {
7451 /* Adjust the output section size when called from
7452 objcopy. */
7453 isec->output_section->size -= removed;
7454 }
7455 }
30288845
AM
7456 }
7457
80fccad2
BW
7458 return TRUE;
7459}
7460
d0bf826b
AM
7461/* Copy private header information. */
7462
7463bfd_boolean
7464_bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7465{
7466 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7467 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7468 return TRUE;
7469
7470 /* Copy over private BFD data if it has not already been copied.
7471 This must be done here, rather than in the copy_private_bfd_data
7472 entry point, because the latter is called after the section
7473 contents have been set, which means that the program headers have
7474 already been worked out. */
12bd6957 7475 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
d0bf826b
AM
7476 {
7477 if (! copy_private_bfd_data (ibfd, obfd))
7478 return FALSE;
7479 }
7480
7481 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7482}
7483
252b5132
RH
7484/* Copy private symbol information. If this symbol is in a section
7485 which we did not map into a BFD section, try to map the section
7486 index correctly. We use special macro definitions for the mapped
7487 section indices; these definitions are interpreted by the
7488 swap_out_syms function. */
7489
9ad5cbcf
AM
7490#define MAP_ONESYMTAB (SHN_HIOS + 1)
7491#define MAP_DYNSYMTAB (SHN_HIOS + 2)
7492#define MAP_STRTAB (SHN_HIOS + 3)
7493#define MAP_SHSTRTAB (SHN_HIOS + 4)
7494#define MAP_SYM_SHNDX (SHN_HIOS + 5)
252b5132 7495
b34976b6 7496bfd_boolean
217aa764
AM
7497_bfd_elf_copy_private_symbol_data (bfd *ibfd,
7498 asymbol *isymarg,
7499 bfd *obfd,
7500 asymbol *osymarg)
252b5132
RH
7501{
7502 elf_symbol_type *isym, *osym;
7503
7504 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7505 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 7506 return TRUE;
252b5132
RH
7507
7508 isym = elf_symbol_from (ibfd, isymarg);
7509 osym = elf_symbol_from (obfd, osymarg);
7510
7511 if (isym != NULL
8424d8f5 7512 && isym->internal_elf_sym.st_shndx != 0
252b5132
RH
7513 && osym != NULL
7514 && bfd_is_abs_section (isym->symbol.section))
7515 {
7516 unsigned int shndx;
7517
7518 shndx = isym->internal_elf_sym.st_shndx;
7519 if (shndx == elf_onesymtab (ibfd))
7520 shndx = MAP_ONESYMTAB;
7521 else if (shndx == elf_dynsymtab (ibfd))
7522 shndx = MAP_DYNSYMTAB;
12bd6957 7523 else if (shndx == elf_strtab_sec (ibfd))
252b5132 7524 shndx = MAP_STRTAB;
12bd6957 7525 else if (shndx == elf_shstrtab_sec (ibfd))
252b5132 7526 shndx = MAP_SHSTRTAB;
6a40cf0c 7527 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
9ad5cbcf 7528 shndx = MAP_SYM_SHNDX;
252b5132
RH
7529 osym->internal_elf_sym.st_shndx = shndx;
7530 }
7531
b34976b6 7532 return TRUE;
252b5132
RH
7533}
7534
7535/* Swap out the symbols. */
7536
b34976b6 7537static bfd_boolean
217aa764 7538swap_out_syms (bfd *abfd,
ef10c3ac 7539 struct elf_strtab_hash **sttp,
217aa764 7540 int relocatable_p)
252b5132 7541{
9c5bfbb7 7542 const struct elf_backend_data *bed;
079e9a2f
AM
7543 int symcount;
7544 asymbol **syms;
ef10c3ac 7545 struct elf_strtab_hash *stt;
079e9a2f 7546 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 7547 Elf_Internal_Shdr *symtab_shndx_hdr;
079e9a2f 7548 Elf_Internal_Shdr *symstrtab_hdr;
ef10c3ac 7549 struct elf_sym_strtab *symstrtab;
f075ee0c
AM
7550 bfd_byte *outbound_syms;
7551 bfd_byte *outbound_shndx;
ef10c3ac
L
7552 unsigned long outbound_syms_index;
7553 unsigned long outbound_shndx_index;
079e9a2f 7554 int idx;
12bd6957 7555 unsigned int num_locals;
079e9a2f 7556 bfd_size_type amt;
174fd7f9 7557 bfd_boolean name_local_sections;
252b5132 7558
12bd6957 7559 if (!elf_map_symbols (abfd, &num_locals))
b34976b6 7560 return FALSE;
252b5132 7561
c044fabd 7562 /* Dump out the symtabs. */
ef10c3ac 7563 stt = _bfd_elf_strtab_init ();
079e9a2f 7564 if (stt == NULL)
b34976b6 7565 return FALSE;
252b5132 7566
079e9a2f
AM
7567 bed = get_elf_backend_data (abfd);
7568 symcount = bfd_get_symcount (abfd);
7569 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7570 symtab_hdr->sh_type = SHT_SYMTAB;
7571 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7572 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
12bd6957 7573 symtab_hdr->sh_info = num_locals + 1;
72de5009 7574 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
079e9a2f
AM
7575
7576 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
7577 symstrtab_hdr->sh_type = SHT_STRTAB;
7578
ef10c3ac
L
7579 /* Allocate buffer to swap out the .strtab section. */
7580 symstrtab = (struct elf_sym_strtab *) bfd_malloc ((symcount + 1)
7581 * sizeof (*symstrtab));
7582 if (symstrtab == NULL)
7583 {
7584 _bfd_elf_strtab_free (stt);
7585 return FALSE;
7586 }
7587
a50b1753
NC
7588 outbound_syms = (bfd_byte *) bfd_alloc2 (abfd, 1 + symcount,
7589 bed->s->sizeof_sym);
079e9a2f 7590 if (outbound_syms == NULL)
5ed6aba4 7591 {
ef10c3ac
L
7592error_return:
7593 _bfd_elf_strtab_free (stt);
7594 free (symstrtab);
5ed6aba4
NC
7595 return FALSE;
7596 }
217aa764 7597 symtab_hdr->contents = outbound_syms;
ef10c3ac 7598 outbound_syms_index = 0;
252b5132 7599
9ad5cbcf 7600 outbound_shndx = NULL;
ef10c3ac 7601 outbound_shndx_index = 0;
6a40cf0c
NC
7602
7603 if (elf_symtab_shndx_list (abfd))
9ad5cbcf 7604 {
6a40cf0c
NC
7605 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
7606 if (symtab_shndx_hdr->sh_name != 0)
7607 {
7608 amt = (bfd_size_type) (1 + symcount) * sizeof (Elf_External_Sym_Shndx);
7609 outbound_shndx = (bfd_byte *)
7610 bfd_zalloc2 (abfd, 1 + symcount, sizeof (Elf_External_Sym_Shndx));
7611 if (outbound_shndx == NULL)
7612 goto error_return;
5ed6aba4 7613
6a40cf0c
NC
7614 symtab_shndx_hdr->contents = outbound_shndx;
7615 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
7616 symtab_shndx_hdr->sh_size = amt;
7617 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
7618 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
7619 }
7620 /* FIXME: What about any other headers in the list ? */
9ad5cbcf
AM
7621 }
7622
589e6347 7623 /* Now generate the data (for "contents"). */
079e9a2f
AM
7624 {
7625 /* Fill in zeroth symbol and swap it out. */
7626 Elf_Internal_Sym sym;
7627 sym.st_name = 0;
7628 sym.st_value = 0;
7629 sym.st_size = 0;
7630 sym.st_info = 0;
7631 sym.st_other = 0;
7632 sym.st_shndx = SHN_UNDEF;
35fc36a8 7633 sym.st_target_internal = 0;
ef10c3ac
L
7634 symstrtab[0].sym = sym;
7635 symstrtab[0].dest_index = outbound_syms_index;
7636 symstrtab[0].destshndx_index = outbound_shndx_index;
7637 outbound_syms_index++;
9ad5cbcf 7638 if (outbound_shndx != NULL)
ef10c3ac 7639 outbound_shndx_index++;
079e9a2f 7640 }
252b5132 7641
174fd7f9
RS
7642 name_local_sections
7643 = (bed->elf_backend_name_local_section_symbols
7644 && bed->elf_backend_name_local_section_symbols (abfd));
7645
079e9a2f 7646 syms = bfd_get_outsymbols (abfd);
ef10c3ac 7647 for (idx = 0; idx < symcount;)
252b5132 7648 {
252b5132 7649 Elf_Internal_Sym sym;
079e9a2f
AM
7650 bfd_vma value = syms[idx]->value;
7651 elf_symbol_type *type_ptr;
7652 flagword flags = syms[idx]->flags;
7653 int type;
252b5132 7654
174fd7f9
RS
7655 if (!name_local_sections
7656 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
079e9a2f
AM
7657 {
7658 /* Local section symbols have no name. */
ef10c3ac 7659 sym.st_name = (unsigned long) -1;
079e9a2f
AM
7660 }
7661 else
7662 {
ef10c3ac
L
7663 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
7664 to get the final offset for st_name. */
7665 sym.st_name
7666 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
7667 FALSE);
079e9a2f 7668 if (sym.st_name == (unsigned long) -1)
ef10c3ac 7669 goto error_return;
079e9a2f 7670 }
252b5132 7671
079e9a2f 7672 type_ptr = elf_symbol_from (abfd, syms[idx]);
252b5132 7673
079e9a2f
AM
7674 if ((flags & BSF_SECTION_SYM) == 0
7675 && bfd_is_com_section (syms[idx]->section))
7676 {
7677 /* ELF common symbols put the alignment into the `value' field,
7678 and the size into the `size' field. This is backwards from
7679 how BFD handles it, so reverse it here. */
7680 sym.st_size = value;
7681 if (type_ptr == NULL
7682 || type_ptr->internal_elf_sym.st_value == 0)
7683 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
7684 else
7685 sym.st_value = type_ptr->internal_elf_sym.st_value;
7686 sym.st_shndx = _bfd_elf_section_from_bfd_section
7687 (abfd, syms[idx]->section);
7688 }
7689 else
7690 {
7691 asection *sec = syms[idx]->section;
cb33740c 7692 unsigned int shndx;
252b5132 7693
079e9a2f
AM
7694 if (sec->output_section)
7695 {
7696 value += sec->output_offset;
7697 sec = sec->output_section;
7698 }
589e6347 7699
079e9a2f
AM
7700 /* Don't add in the section vma for relocatable output. */
7701 if (! relocatable_p)
7702 value += sec->vma;
7703 sym.st_value = value;
7704 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
7705
7706 if (bfd_is_abs_section (sec)
7707 && type_ptr != NULL
7708 && type_ptr->internal_elf_sym.st_shndx != 0)
7709 {
7710 /* This symbol is in a real ELF section which we did
7711 not create as a BFD section. Undo the mapping done
7712 by copy_private_symbol_data. */
7713 shndx = type_ptr->internal_elf_sym.st_shndx;
7714 switch (shndx)
7715 {
7716 case MAP_ONESYMTAB:
7717 shndx = elf_onesymtab (abfd);
7718 break;
7719 case MAP_DYNSYMTAB:
7720 shndx = elf_dynsymtab (abfd);
7721 break;
7722 case MAP_STRTAB:
12bd6957 7723 shndx = elf_strtab_sec (abfd);
079e9a2f
AM
7724 break;
7725 case MAP_SHSTRTAB:
12bd6957 7726 shndx = elf_shstrtab_sec (abfd);
079e9a2f 7727 break;
9ad5cbcf 7728 case MAP_SYM_SHNDX:
6a40cf0c
NC
7729 if (elf_symtab_shndx_list (abfd))
7730 shndx = elf_symtab_shndx_list (abfd)->ndx;
9ad5cbcf 7731 break;
079e9a2f 7732 default:
15bc576a 7733 shndx = SHN_ABS;
079e9a2f
AM
7734 break;
7735 }
7736 }
7737 else
7738 {
7739 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
252b5132 7740
cb33740c 7741 if (shndx == SHN_BAD)
079e9a2f
AM
7742 {
7743 asection *sec2;
7744
7745 /* Writing this would be a hell of a lot easier if
7746 we had some decent documentation on bfd, and
7747 knew what to expect of the library, and what to
7748 demand of applications. For example, it
7749 appears that `objcopy' might not set the
7750 section of a symbol to be a section that is
7751 actually in the output file. */
7752 sec2 = bfd_get_section_by_name (abfd, sec->name);
5df1bc57
AM
7753 if (sec2 != NULL)
7754 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
7755 if (shndx == SHN_BAD)
589e6347 7756 {
695344c0 7757 /* xgettext:c-format */
589e6347
NC
7758 _bfd_error_handler (_("\
7759Unable to find equivalent output section for symbol '%s' from section '%s'"),
7760 syms[idx]->name ? syms[idx]->name : "<Local sym>",
7761 sec->name);
811072d8 7762 bfd_set_error (bfd_error_invalid_operation);
ef10c3ac 7763 goto error_return;
589e6347 7764 }
079e9a2f
AM
7765 }
7766 }
252b5132 7767
079e9a2f
AM
7768 sym.st_shndx = shndx;
7769 }
252b5132 7770
13ae64f3
JJ
7771 if ((flags & BSF_THREAD_LOCAL) != 0)
7772 type = STT_TLS;
d8045f23
NC
7773 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
7774 type = STT_GNU_IFUNC;
13ae64f3 7775 else if ((flags & BSF_FUNCTION) != 0)
079e9a2f
AM
7776 type = STT_FUNC;
7777 else if ((flags & BSF_OBJECT) != 0)
7778 type = STT_OBJECT;
d9352518
DB
7779 else if ((flags & BSF_RELC) != 0)
7780 type = STT_RELC;
7781 else if ((flags & BSF_SRELC) != 0)
7782 type = STT_SRELC;
079e9a2f
AM
7783 else
7784 type = STT_NOTYPE;
252b5132 7785
13ae64f3
JJ
7786 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
7787 type = STT_TLS;
7788
589e6347 7789 /* Processor-specific types. */
079e9a2f
AM
7790 if (type_ptr != NULL
7791 && bed->elf_backend_get_symbol_type)
7792 type = ((*bed->elf_backend_get_symbol_type)
7793 (&type_ptr->internal_elf_sym, type));
252b5132 7794
079e9a2f
AM
7795 if (flags & BSF_SECTION_SYM)
7796 {
7797 if (flags & BSF_GLOBAL)
7798 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
7799 else
7800 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
7801 }
7802 else if (bfd_is_com_section (syms[idx]->section))
0a40daed 7803 {
b8871f35
L
7804 if (type != STT_TLS)
7805 {
7806 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
7807 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
7808 ? STT_COMMON : STT_OBJECT);
7809 else
7810 type = ((flags & BSF_ELF_COMMON) != 0
7811 ? STT_COMMON : STT_OBJECT);
7812 }
7813 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
0a40daed 7814 }
079e9a2f
AM
7815 else if (bfd_is_und_section (syms[idx]->section))
7816 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
7817 ? STB_WEAK
7818 : STB_GLOBAL),
7819 type);
7820 else if (flags & BSF_FILE)
7821 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
7822 else
7823 {
7824 int bind = STB_LOCAL;
252b5132 7825
079e9a2f
AM
7826 if (flags & BSF_LOCAL)
7827 bind = STB_LOCAL;
3e7a7d11
NC
7828 else if (flags & BSF_GNU_UNIQUE)
7829 bind = STB_GNU_UNIQUE;
079e9a2f
AM
7830 else if (flags & BSF_WEAK)
7831 bind = STB_WEAK;
7832 else if (flags & BSF_GLOBAL)
7833 bind = STB_GLOBAL;
252b5132 7834
079e9a2f
AM
7835 sym.st_info = ELF_ST_INFO (bind, type);
7836 }
252b5132 7837
079e9a2f 7838 if (type_ptr != NULL)
35fc36a8
RS
7839 {
7840 sym.st_other = type_ptr->internal_elf_sym.st_other;
7841 sym.st_target_internal
7842 = type_ptr->internal_elf_sym.st_target_internal;
7843 }
079e9a2f 7844 else
35fc36a8
RS
7845 {
7846 sym.st_other = 0;
7847 sym.st_target_internal = 0;
7848 }
252b5132 7849
ef10c3ac
L
7850 idx++;
7851 symstrtab[idx].sym = sym;
7852 symstrtab[idx].dest_index = outbound_syms_index;
7853 symstrtab[idx].destshndx_index = outbound_shndx_index;
7854
7855 outbound_syms_index++;
9ad5cbcf 7856 if (outbound_shndx != NULL)
ef10c3ac
L
7857 outbound_shndx_index++;
7858 }
7859
7860 /* Finalize the .strtab section. */
7861 _bfd_elf_strtab_finalize (stt);
7862
7863 /* Swap out the .strtab section. */
7864 for (idx = 0; idx <= symcount; idx++)
7865 {
7866 struct elf_sym_strtab *elfsym = &symstrtab[idx];
7867 if (elfsym->sym.st_name == (unsigned long) -1)
7868 elfsym->sym.st_name = 0;
7869 else
7870 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
7871 elfsym->sym.st_name);
7872 bed->s->swap_symbol_out (abfd, &elfsym->sym,
7873 (outbound_syms
7874 + (elfsym->dest_index
7875 * bed->s->sizeof_sym)),
7876 (outbound_shndx
7877 + (elfsym->destshndx_index
7878 * sizeof (Elf_External_Sym_Shndx))));
079e9a2f 7879 }
ef10c3ac 7880 free (symstrtab);
252b5132 7881
079e9a2f 7882 *sttp = stt;
ef10c3ac 7883 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
079e9a2f 7884 symstrtab_hdr->sh_type = SHT_STRTAB;
84865015 7885 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
079e9a2f
AM
7886 symstrtab_hdr->sh_addr = 0;
7887 symstrtab_hdr->sh_entsize = 0;
7888 symstrtab_hdr->sh_link = 0;
7889 symstrtab_hdr->sh_info = 0;
7890 symstrtab_hdr->sh_addralign = 1;
252b5132 7891
b34976b6 7892 return TRUE;
252b5132
RH
7893}
7894
7895/* Return the number of bytes required to hold the symtab vector.
7896
7897 Note that we base it on the count plus 1, since we will null terminate
7898 the vector allocated based on this size. However, the ELF symbol table
7899 always has a dummy entry as symbol #0, so it ends up even. */
7900
7901long
217aa764 7902_bfd_elf_get_symtab_upper_bound (bfd *abfd)
252b5132
RH
7903{
7904 long symcount;
7905 long symtab_size;
7906 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7907
7908 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7909 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7910 if (symcount > 0)
7911 symtab_size -= sizeof (asymbol *);
252b5132
RH
7912
7913 return symtab_size;
7914}
7915
7916long
217aa764 7917_bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
252b5132
RH
7918{
7919 long symcount;
7920 long symtab_size;
7921 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
7922
7923 if (elf_dynsymtab (abfd) == 0)
7924 {
7925 bfd_set_error (bfd_error_invalid_operation);
7926 return -1;
7927 }
7928
7929 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
b99d1833
AM
7930 symtab_size = (symcount + 1) * (sizeof (asymbol *));
7931 if (symcount > 0)
7932 symtab_size -= sizeof (asymbol *);
252b5132
RH
7933
7934 return symtab_size;
7935}
7936
7937long
217aa764
AM
7938_bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
7939 sec_ptr asect)
252b5132
RH
7940{
7941 return (asect->reloc_count + 1) * sizeof (arelent *);
7942}
7943
7944/* Canonicalize the relocs. */
7945
7946long
217aa764
AM
7947_bfd_elf_canonicalize_reloc (bfd *abfd,
7948 sec_ptr section,
7949 arelent **relptr,
7950 asymbol **symbols)
252b5132
RH
7951{
7952 arelent *tblptr;
7953 unsigned int i;
9c5bfbb7 7954 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132 7955
b34976b6 7956 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
252b5132
RH
7957 return -1;
7958
7959 tblptr = section->relocation;
7960 for (i = 0; i < section->reloc_count; i++)
7961 *relptr++ = tblptr++;
7962
7963 *relptr = NULL;
7964
7965 return section->reloc_count;
7966}
7967
7968long
6cee3f79 7969_bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
252b5132 7970{
9c5bfbb7 7971 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7972 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
252b5132
RH
7973
7974 if (symcount >= 0)
7975 bfd_get_symcount (abfd) = symcount;
7976 return symcount;
7977}
7978
7979long
217aa764
AM
7980_bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
7981 asymbol **allocation)
252b5132 7982{
9c5bfbb7 7983 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
217aa764 7984 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
1f70368c
DJ
7985
7986 if (symcount >= 0)
7987 bfd_get_dynamic_symcount (abfd) = symcount;
7988 return symcount;
252b5132
RH
7989}
7990
8615f3f2
AM
7991/* Return the size required for the dynamic reloc entries. Any loadable
7992 section that was actually installed in the BFD, and has type SHT_REL
7993 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
7994 dynamic reloc section. */
252b5132
RH
7995
7996long
217aa764 7997_bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
252b5132
RH
7998{
7999 long ret;
8000 asection *s;
8001
8002 if (elf_dynsymtab (abfd) == 0)
8003 {
8004 bfd_set_error (bfd_error_invalid_operation);
8005 return -1;
8006 }
8007
8008 ret = sizeof (arelent *);
8009 for (s = abfd->sections; s != NULL; s = s->next)
266b05cf 8010 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8011 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8012 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
eea6121a 8013 ret += ((s->size / elf_section_data (s)->this_hdr.sh_entsize)
252b5132
RH
8014 * sizeof (arelent *));
8015
8016 return ret;
8017}
8018
8615f3f2
AM
8019/* Canonicalize the dynamic relocation entries. Note that we return the
8020 dynamic relocations as a single block, although they are actually
8021 associated with particular sections; the interface, which was
8022 designed for SunOS style shared libraries, expects that there is only
8023 one set of dynamic relocs. Any loadable section that was actually
8024 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8025 dynamic symbol table, is considered to be a dynamic reloc section. */
252b5132
RH
8026
8027long
217aa764
AM
8028_bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8029 arelent **storage,
8030 asymbol **syms)
252b5132 8031{
217aa764 8032 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
252b5132
RH
8033 asection *s;
8034 long ret;
8035
8036 if (elf_dynsymtab (abfd) == 0)
8037 {
8038 bfd_set_error (bfd_error_invalid_operation);
8039 return -1;
8040 }
8041
8042 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8043 ret = 0;
8044 for (s = abfd->sections; s != NULL; s = s->next)
8045 {
266b05cf 8046 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
252b5132
RH
8047 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8048 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8049 {
8050 arelent *p;
8051 long count, i;
8052
b34976b6 8053 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
252b5132 8054 return -1;
eea6121a 8055 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
252b5132
RH
8056 p = s->relocation;
8057 for (i = 0; i < count; i++)
8058 *storage++ = p++;
8059 ret += count;
8060 }
8061 }
8062
8063 *storage = NULL;
8064
8065 return ret;
8066}
8067\f
8068/* Read in the version information. */
8069
b34976b6 8070bfd_boolean
fc0e6df6 8071_bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
252b5132
RH
8072{
8073 bfd_byte *contents = NULL;
fc0e6df6
PB
8074 unsigned int freeidx = 0;
8075
8076 if (elf_dynverref (abfd) != 0)
8077 {
8078 Elf_Internal_Shdr *hdr;
8079 Elf_External_Verneed *everneed;
8080 Elf_Internal_Verneed *iverneed;
8081 unsigned int i;
d0fb9a8d 8082 bfd_byte *contents_end;
fc0e6df6
PB
8083
8084 hdr = &elf_tdata (abfd)->dynverref_hdr;
8085
601a03ba 8086 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verneed))
d0fb9a8d 8087 {
601a03ba 8088error_return_bad_verref:
4eca0228 8089 _bfd_error_handler
601a03ba
AM
8090 (_("%B: .gnu.version_r invalid entry"), abfd);
8091 bfd_set_error (bfd_error_bad_value);
d0fb9a8d
JJ
8092error_return_verref:
8093 elf_tdata (abfd)->verref = NULL;
8094 elf_tdata (abfd)->cverrefs = 0;
8095 goto error_return;
8096 }
601a03ba
AM
8097
8098 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
8099 if (contents == NULL)
8100 goto error_return_verref;
8101
fc0e6df6
PB
8102 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
8103 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
d0fb9a8d 8104 goto error_return_verref;
fc0e6df6 8105
601a03ba
AM
8106 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *)
8107 bfd_zalloc2 (abfd, hdr->sh_info, sizeof (Elf_Internal_Verneed));
8108
8109 if (elf_tdata (abfd)->verref == NULL)
d0fb9a8d
JJ
8110 goto error_return_verref;
8111
8112 BFD_ASSERT (sizeof (Elf_External_Verneed)
8113 == sizeof (Elf_External_Vernaux));
8114 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
fc0e6df6
PB
8115 everneed = (Elf_External_Verneed *) contents;
8116 iverneed = elf_tdata (abfd)->verref;
8117 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8118 {
8119 Elf_External_Vernaux *evernaux;
8120 Elf_Internal_Vernaux *ivernaux;
8121 unsigned int j;
8122
8123 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8124
8125 iverneed->vn_bfd = abfd;
8126
8127 iverneed->vn_filename =
8128 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8129 iverneed->vn_file);
8130 if (iverneed->vn_filename == NULL)
601a03ba 8131 goto error_return_bad_verref;
fc0e6df6 8132
d0fb9a8d
JJ
8133 if (iverneed->vn_cnt == 0)
8134 iverneed->vn_auxptr = NULL;
8135 else
8136 {
a50b1753
NC
8137 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8138 bfd_alloc2 (abfd, iverneed->vn_cnt,
8139 sizeof (Elf_Internal_Vernaux));
d0fb9a8d
JJ
8140 if (iverneed->vn_auxptr == NULL)
8141 goto error_return_verref;
8142 }
8143
8144 if (iverneed->vn_aux
8145 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8146 goto error_return_bad_verref;
fc0e6df6
PB
8147
8148 evernaux = ((Elf_External_Vernaux *)
8149 ((bfd_byte *) everneed + iverneed->vn_aux));
8150 ivernaux = iverneed->vn_auxptr;
8151 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8152 {
8153 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8154
8155 ivernaux->vna_nodename =
8156 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8157 ivernaux->vna_name);
8158 if (ivernaux->vna_nodename == NULL)
601a03ba 8159 goto error_return_bad_verref;
fc0e6df6 8160
25ff461f
AM
8161 if (ivernaux->vna_other > freeidx)
8162 freeidx = ivernaux->vna_other;
8163
8164 ivernaux->vna_nextptr = NULL;
8165 if (ivernaux->vna_next == 0)
8166 {
8167 iverneed->vn_cnt = j + 1;
8168 break;
8169 }
fc0e6df6
PB
8170 if (j + 1 < iverneed->vn_cnt)
8171 ivernaux->vna_nextptr = ivernaux + 1;
fc0e6df6 8172
d0fb9a8d
JJ
8173 if (ivernaux->vna_next
8174 > (size_t) (contents_end - (bfd_byte *) evernaux))
601a03ba 8175 goto error_return_bad_verref;
d0fb9a8d 8176
fc0e6df6
PB
8177 evernaux = ((Elf_External_Vernaux *)
8178 ((bfd_byte *) evernaux + ivernaux->vna_next));
fc0e6df6
PB
8179 }
8180
25ff461f
AM
8181 iverneed->vn_nextref = NULL;
8182 if (iverneed->vn_next == 0)
8183 break;
fc0e6df6
PB
8184 if (i + 1 < hdr->sh_info)
8185 iverneed->vn_nextref = iverneed + 1;
fc0e6df6 8186
d0fb9a8d
JJ
8187 if (iverneed->vn_next
8188 > (size_t) (contents_end - (bfd_byte *) everneed))
601a03ba 8189 goto error_return_bad_verref;
d0fb9a8d 8190
fc0e6df6
PB
8191 everneed = ((Elf_External_Verneed *)
8192 ((bfd_byte *) everneed + iverneed->vn_next));
8193 }
25ff461f 8194 elf_tdata (abfd)->cverrefs = i;
fc0e6df6
PB
8195
8196 free (contents);
8197 contents = NULL;
8198 }
252b5132
RH
8199
8200 if (elf_dynverdef (abfd) != 0)
8201 {
8202 Elf_Internal_Shdr *hdr;
8203 Elf_External_Verdef *everdef;
8204 Elf_Internal_Verdef *iverdef;
f631889e
UD
8205 Elf_Internal_Verdef *iverdefarr;
8206 Elf_Internal_Verdef iverdefmem;
252b5132 8207 unsigned int i;
062e2358 8208 unsigned int maxidx;
d0fb9a8d 8209 bfd_byte *contents_end_def, *contents_end_aux;
252b5132
RH
8210
8211 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8212
601a03ba
AM
8213 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8214 {
8215 error_return_bad_verdef:
4eca0228 8216 _bfd_error_handler
601a03ba
AM
8217 (_("%B: .gnu.version_d invalid entry"), abfd);
8218 bfd_set_error (bfd_error_bad_value);
8219 error_return_verdef:
8220 elf_tdata (abfd)->verdef = NULL;
8221 elf_tdata (abfd)->cverdefs = 0;
8222 goto error_return;
8223 }
8224
a50b1753 8225 contents = (bfd_byte *) bfd_malloc (hdr->sh_size);
252b5132 8226 if (contents == NULL)
601a03ba 8227 goto error_return_verdef;
252b5132 8228 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
217aa764 8229 || bfd_bread (contents, hdr->sh_size, abfd) != hdr->sh_size)
601a03ba 8230 goto error_return_verdef;
d0fb9a8d
JJ
8231
8232 BFD_ASSERT (sizeof (Elf_External_Verdef)
8233 >= sizeof (Elf_External_Verdaux));
8234 contents_end_def = contents + hdr->sh_size
8235 - sizeof (Elf_External_Verdef);
8236 contents_end_aux = contents + hdr->sh_size
8237 - sizeof (Elf_External_Verdaux);
8238
f631889e
UD
8239 /* We know the number of entries in the section but not the maximum
8240 index. Therefore we have to run through all entries and find
8241 the maximum. */
252b5132 8242 everdef = (Elf_External_Verdef *) contents;
f631889e
UD
8243 maxidx = 0;
8244 for (i = 0; i < hdr->sh_info; ++i)
8245 {
8246 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8247
601a03ba
AM
8248 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8249 goto error_return_bad_verdef;
062e2358
AM
8250 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8251 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
f631889e 8252
25ff461f
AM
8253 if (iverdefmem.vd_next == 0)
8254 break;
8255
d0fb9a8d
JJ
8256 if (iverdefmem.vd_next
8257 > (size_t) (contents_end_def - (bfd_byte *) everdef))
601a03ba 8258 goto error_return_bad_verdef;
d0fb9a8d 8259
f631889e
UD
8260 everdef = ((Elf_External_Verdef *)
8261 ((bfd_byte *) everdef + iverdefmem.vd_next));
8262 }
8263
fc0e6df6
PB
8264 if (default_imported_symver)
8265 {
8266 if (freeidx > maxidx)
8267 maxidx = ++freeidx;
8268 else
8269 freeidx = ++maxidx;
8270 }
201159ec 8271
601a03ba
AM
8272 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8273 bfd_zalloc2 (abfd, maxidx, sizeof (Elf_Internal_Verdef));
f631889e 8274 if (elf_tdata (abfd)->verdef == NULL)
601a03ba 8275 goto error_return_verdef;
f631889e
UD
8276
8277 elf_tdata (abfd)->cverdefs = maxidx;
8278
8279 everdef = (Elf_External_Verdef *) contents;
8280 iverdefarr = elf_tdata (abfd)->verdef;
8281 for (i = 0; i < hdr->sh_info; i++)
252b5132
RH
8282 {
8283 Elf_External_Verdaux *everdaux;
8284 Elf_Internal_Verdaux *iverdaux;
8285 unsigned int j;
8286
f631889e
UD
8287 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8288
d0fb9a8d 8289 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
601a03ba 8290 goto error_return_bad_verdef;
d0fb9a8d 8291
f631889e 8292 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
595bce75 8293 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
252b5132
RH
8294
8295 iverdef->vd_bfd = abfd;
8296
d0fb9a8d
JJ
8297 if (iverdef->vd_cnt == 0)
8298 iverdef->vd_auxptr = NULL;
8299 else
8300 {
a50b1753
NC
8301 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8302 bfd_alloc2 (abfd, iverdef->vd_cnt,
8303 sizeof (Elf_Internal_Verdaux));
d0fb9a8d
JJ
8304 if (iverdef->vd_auxptr == NULL)
8305 goto error_return_verdef;
8306 }
8307
8308 if (iverdef->vd_aux
8309 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
601a03ba 8310 goto error_return_bad_verdef;
252b5132
RH
8311
8312 everdaux = ((Elf_External_Verdaux *)
8313 ((bfd_byte *) everdef + iverdef->vd_aux));
8314 iverdaux = iverdef->vd_auxptr;
8315 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8316 {
8317 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8318
8319 iverdaux->vda_nodename =
8320 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8321 iverdaux->vda_name);
8322 if (iverdaux->vda_nodename == NULL)
601a03ba 8323 goto error_return_bad_verdef;
252b5132 8324
25ff461f
AM
8325 iverdaux->vda_nextptr = NULL;
8326 if (iverdaux->vda_next == 0)
8327 {
8328 iverdef->vd_cnt = j + 1;
8329 break;
8330 }
252b5132
RH
8331 if (j + 1 < iverdef->vd_cnt)
8332 iverdaux->vda_nextptr = iverdaux + 1;
252b5132 8333
d0fb9a8d
JJ
8334 if (iverdaux->vda_next
8335 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
601a03ba 8336 goto error_return_bad_verdef;
d0fb9a8d 8337
252b5132
RH
8338 everdaux = ((Elf_External_Verdaux *)
8339 ((bfd_byte *) everdaux + iverdaux->vda_next));
8340 }
8341
595bce75 8342 iverdef->vd_nodename = NULL;
d0fb9a8d
JJ
8343 if (iverdef->vd_cnt)
8344 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
252b5132 8345
25ff461f
AM
8346 iverdef->vd_nextdef = NULL;
8347 if (iverdef->vd_next == 0)
8348 break;
d0fb9a8d 8349 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
252b5132 8350 iverdef->vd_nextdef = iverdef + 1;
252b5132
RH
8351
8352 everdef = ((Elf_External_Verdef *)
8353 ((bfd_byte *) everdef + iverdef->vd_next));
8354 }
8355
8356 free (contents);
8357 contents = NULL;
8358 }
fc0e6df6 8359 else if (default_imported_symver)
252b5132 8360 {
fc0e6df6
PB
8361 if (freeidx < 3)
8362 freeidx = 3;
8363 else
8364 freeidx++;
252b5132 8365
a50b1753
NC
8366 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *)
8367 bfd_zalloc2 (abfd, freeidx, sizeof (Elf_Internal_Verdef));
fc0e6df6 8368 if (elf_tdata (abfd)->verdef == NULL)
252b5132
RH
8369 goto error_return;
8370
fc0e6df6
PB
8371 elf_tdata (abfd)->cverdefs = freeidx;
8372 }
252b5132 8373
fc0e6df6
PB
8374 /* Create a default version based on the soname. */
8375 if (default_imported_symver)
8376 {
8377 Elf_Internal_Verdef *iverdef;
8378 Elf_Internal_Verdaux *iverdaux;
252b5132 8379
5bb3703f 8380 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
252b5132 8381
fc0e6df6
PB
8382 iverdef->vd_version = VER_DEF_CURRENT;
8383 iverdef->vd_flags = 0;
8384 iverdef->vd_ndx = freeidx;
8385 iverdef->vd_cnt = 1;
252b5132 8386
fc0e6df6 8387 iverdef->vd_bfd = abfd;
252b5132 8388
fc0e6df6
PB
8389 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8390 if (iverdef->vd_nodename == NULL)
d0fb9a8d 8391 goto error_return_verdef;
fc0e6df6 8392 iverdef->vd_nextdef = NULL;
601a03ba
AM
8393 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8394 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
d0fb9a8d
JJ
8395 if (iverdef->vd_auxptr == NULL)
8396 goto error_return_verdef;
252b5132 8397
fc0e6df6
PB
8398 iverdaux = iverdef->vd_auxptr;
8399 iverdaux->vda_nodename = iverdef->vd_nodename;
252b5132
RH
8400 }
8401
b34976b6 8402 return TRUE;
252b5132
RH
8403
8404 error_return:
5ed6aba4 8405 if (contents != NULL)
252b5132 8406 free (contents);
b34976b6 8407 return FALSE;
252b5132
RH
8408}
8409\f
8410asymbol *
217aa764 8411_bfd_elf_make_empty_symbol (bfd *abfd)
252b5132
RH
8412{
8413 elf_symbol_type *newsym;
8414
201159ec 8415 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof * newsym);
252b5132
RH
8416 if (!newsym)
8417 return NULL;
201159ec
NC
8418 newsym->symbol.the_bfd = abfd;
8419 return &newsym->symbol;
252b5132
RH
8420}
8421
8422void
217aa764
AM
8423_bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8424 asymbol *symbol,
8425 symbol_info *ret)
252b5132
RH
8426{
8427 bfd_symbol_info (symbol, ret);
8428}
8429
8430/* Return whether a symbol name implies a local symbol. Most targets
8431 use this function for the is_local_label_name entry point, but some
8432 override it. */
8433
b34976b6 8434bfd_boolean
217aa764
AM
8435_bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8436 const char *name)
252b5132
RH
8437{
8438 /* Normal local symbols start with ``.L''. */
8439 if (name[0] == '.' && name[1] == 'L')
b34976b6 8440 return TRUE;
252b5132
RH
8441
8442 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8443 DWARF debugging symbols starting with ``..''. */
8444 if (name[0] == '.' && name[1] == '.')
b34976b6 8445 return TRUE;
252b5132
RH
8446
8447 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8448 emitting DWARF debugging output. I suspect this is actually a
8449 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8450 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8451 underscore to be emitted on some ELF targets). For ease of use,
8452 we treat such symbols as local. */
8453 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
b34976b6 8454 return TRUE;
252b5132 8455
b1fa9dd6
NC
8456 /* Treat assembler generated fake symbols, dollar local labels and
8457 forward-backward labels (aka local labels) as locals.
8458 These labels have the form:
8459
8460 L0^A.* (fake symbols)
8461
8462 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8463
8464 Versions which start with .L will have already been matched above,
8465 so we only need to match the rest. */
8466 if (name[0] == 'L' && ISDIGIT (name[1]))
8467 {
8468 bfd_boolean ret = FALSE;
8469 const char * p;
8470 char c;
8471
8472 for (p = name + 2; (c = *p); p++)
8473 {
8474 if (c == 1 || c == 2)
8475 {
8476 if (c == 1 && p == name + 2)
8477 /* A fake symbol. */
8478 return TRUE;
8479
8480 /* FIXME: We are being paranoid here and treating symbols like
8481 L0^Bfoo as if there were non-local, on the grounds that the
8482 assembler will never generate them. But can any symbol
8483 containing an ASCII value in the range 1-31 ever be anything
8484 other than some kind of local ? */
8485 ret = TRUE;
8486 }
8487
8488 if (! ISDIGIT (c))
8489 {
8490 ret = FALSE;
8491 break;
8492 }
8493 }
8494 return ret;
8495 }
ffa54770 8496
b34976b6 8497 return FALSE;
252b5132
RH
8498}
8499
8500alent *
217aa764
AM
8501_bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
8502 asymbol *symbol ATTRIBUTE_UNUSED)
252b5132
RH
8503{
8504 abort ();
8505 return NULL;
8506}
8507
b34976b6 8508bfd_boolean
217aa764
AM
8509_bfd_elf_set_arch_mach (bfd *abfd,
8510 enum bfd_architecture arch,
8511 unsigned long machine)
252b5132
RH
8512{
8513 /* If this isn't the right architecture for this backend, and this
8514 isn't the generic backend, fail. */
8515 if (arch != get_elf_backend_data (abfd)->arch
8516 && arch != bfd_arch_unknown
8517 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
b34976b6 8518 return FALSE;
252b5132
RH
8519
8520 return bfd_default_set_arch_mach (abfd, arch, machine);
8521}
8522
d1fad7c6
NC
8523/* Find the nearest line to a particular section and offset,
8524 for error reporting. */
8525
b34976b6 8526bfd_boolean
217aa764 8527_bfd_elf_find_nearest_line (bfd *abfd,
217aa764 8528 asymbol **symbols,
fb167eb2 8529 asection *section,
217aa764
AM
8530 bfd_vma offset,
8531 const char **filename_ptr,
8532 const char **functionname_ptr,
fb167eb2
AM
8533 unsigned int *line_ptr,
8534 unsigned int *discriminator_ptr)
d1fad7c6 8535{
b34976b6 8536 bfd_boolean found;
d1fad7c6 8537
fb167eb2 8538 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
4e8a9624 8539 filename_ptr, functionname_ptr,
fb167eb2
AM
8540 line_ptr, discriminator_ptr,
8541 dwarf_debug_sections, 0,
e00e8198
AM
8542 &elf_tdata (abfd)->dwarf2_find_line_info)
8543 || _bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
8544 filename_ptr, functionname_ptr,
8545 line_ptr))
d1fad7c6
NC
8546 {
8547 if (!*functionname_ptr)
e00e8198
AM
8548 _bfd_elf_find_function (abfd, symbols, section, offset,
8549 *filename_ptr ? NULL : filename_ptr,
8550 functionname_ptr);
b34976b6 8551 return TRUE;
d1fad7c6
NC
8552 }
8553
8554 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
4e8a9624
AM
8555 &found, filename_ptr,
8556 functionname_ptr, line_ptr,
8557 &elf_tdata (abfd)->line_info))
b34976b6 8558 return FALSE;
dc43ada5 8559 if (found && (*functionname_ptr || *line_ptr))
b34976b6 8560 return TRUE;
d1fad7c6
NC
8561
8562 if (symbols == NULL)
b34976b6 8563 return FALSE;
d1fad7c6 8564
e00e8198
AM
8565 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
8566 filename_ptr, functionname_ptr))
b34976b6 8567 return FALSE;
d1fad7c6 8568
252b5132 8569 *line_ptr = 0;
b34976b6 8570 return TRUE;
252b5132
RH
8571}
8572
5420f73d
L
8573/* Find the line for a symbol. */
8574
8575bfd_boolean
8576_bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
8577 const char **filename_ptr, unsigned int *line_ptr)
9b8d1a36 8578{
fb167eb2
AM
8579 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
8580 filename_ptr, NULL, line_ptr, NULL,
8581 dwarf_debug_sections, 0,
8582 &elf_tdata (abfd)->dwarf2_find_line_info);
5420f73d
L
8583}
8584
4ab527b0
FF
8585/* After a call to bfd_find_nearest_line, successive calls to
8586 bfd_find_inliner_info can be used to get source information about
8587 each level of function inlining that terminated at the address
8588 passed to bfd_find_nearest_line. Currently this is only supported
8589 for DWARF2 with appropriate DWARF3 extensions. */
8590
8591bfd_boolean
8592_bfd_elf_find_inliner_info (bfd *abfd,
8593 const char **filename_ptr,
8594 const char **functionname_ptr,
8595 unsigned int *line_ptr)
8596{
8597 bfd_boolean found;
8598 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
8599 functionname_ptr, line_ptr,
8600 & elf_tdata (abfd)->dwarf2_find_line_info);
8601 return found;
8602}
8603
252b5132 8604int
a6b96beb 8605_bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
252b5132 8606{
8ded5a0f
AM
8607 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8608 int ret = bed->s->sizeof_ehdr;
252b5132 8609
0e1862bb 8610 if (!bfd_link_relocatable (info))
8ded5a0f 8611 {
12bd6957 8612 bfd_size_type phdr_size = elf_program_header_size (abfd);
8ded5a0f 8613
62d7a5f6
AM
8614 if (phdr_size == (bfd_size_type) -1)
8615 {
8616 struct elf_segment_map *m;
8617
8618 phdr_size = 0;
12bd6957 8619 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
62d7a5f6 8620 phdr_size += bed->s->sizeof_phdr;
8ded5a0f 8621
62d7a5f6
AM
8622 if (phdr_size == 0)
8623 phdr_size = get_program_header_size (abfd, info);
8624 }
8ded5a0f 8625
12bd6957 8626 elf_program_header_size (abfd) = phdr_size;
8ded5a0f
AM
8627 ret += phdr_size;
8628 }
8629
252b5132
RH
8630 return ret;
8631}
8632
b34976b6 8633bfd_boolean
217aa764
AM
8634_bfd_elf_set_section_contents (bfd *abfd,
8635 sec_ptr section,
0f867abe 8636 const void *location,
217aa764
AM
8637 file_ptr offset,
8638 bfd_size_type count)
252b5132
RH
8639{
8640 Elf_Internal_Shdr *hdr;
1b6aeedb 8641 file_ptr pos;
252b5132
RH
8642
8643 if (! abfd->output_has_begun
217aa764 8644 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
b34976b6 8645 return FALSE;
252b5132 8646
0ce398f1
L
8647 if (!count)
8648 return TRUE;
8649
252b5132 8650 hdr = &elf_section_data (section)->this_hdr;
0ce398f1
L
8651 if (hdr->sh_offset == (file_ptr) -1)
8652 {
8653 /* We must compress this section. Write output to the buffer. */
8654 unsigned char *contents = hdr->contents;
8655 if ((offset + count) > hdr->sh_size
8656 || (section->flags & SEC_ELF_COMPRESS) == 0
8657 || contents == NULL)
8658 abort ();
8659 memcpy (contents + offset, location, count);
8660 return TRUE;
8661 }
dc810e39
AM
8662 pos = hdr->sh_offset + offset;
8663 if (bfd_seek (abfd, pos, SEEK_SET) != 0
8664 || bfd_bwrite (location, count, abfd) != count)
b34976b6 8665 return FALSE;
252b5132 8666
b34976b6 8667 return TRUE;
252b5132
RH
8668}
8669
8670void
217aa764
AM
8671_bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
8672 arelent *cache_ptr ATTRIBUTE_UNUSED,
8673 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
252b5132
RH
8674{
8675 abort ();
8676}
8677
252b5132
RH
8678/* Try to convert a non-ELF reloc into an ELF one. */
8679
b34976b6 8680bfd_boolean
217aa764 8681_bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
252b5132 8682{
c044fabd 8683 /* Check whether we really have an ELF howto. */
252b5132
RH
8684
8685 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
8686 {
8687 bfd_reloc_code_real_type code;
8688 reloc_howto_type *howto;
8689
8690 /* Alien reloc: Try to determine its type to replace it with an
c044fabd 8691 equivalent ELF reloc. */
252b5132
RH
8692
8693 if (areloc->howto->pc_relative)
8694 {
8695 switch (areloc->howto->bitsize)
8696 {
8697 case 8:
8698 code = BFD_RELOC_8_PCREL;
8699 break;
8700 case 12:
8701 code = BFD_RELOC_12_PCREL;
8702 break;
8703 case 16:
8704 code = BFD_RELOC_16_PCREL;
8705 break;
8706 case 24:
8707 code = BFD_RELOC_24_PCREL;
8708 break;
8709 case 32:
8710 code = BFD_RELOC_32_PCREL;
8711 break;
8712 case 64:
8713 code = BFD_RELOC_64_PCREL;
8714 break;
8715 default:
8716 goto fail;
8717 }
8718
8719 howto = bfd_reloc_type_lookup (abfd, code);
8720
8721 if (areloc->howto->pcrel_offset != howto->pcrel_offset)
8722 {
8723 if (howto->pcrel_offset)
8724 areloc->addend += areloc->address;
8725 else
8726 areloc->addend -= areloc->address; /* addend is unsigned!! */
8727 }
8728 }
8729 else
8730 {
8731 switch (areloc->howto->bitsize)
8732 {
8733 case 8:
8734 code = BFD_RELOC_8;
8735 break;
8736 case 14:
8737 code = BFD_RELOC_14;
8738 break;
8739 case 16:
8740 code = BFD_RELOC_16;
8741 break;
8742 case 26:
8743 code = BFD_RELOC_26;
8744 break;
8745 case 32:
8746 code = BFD_RELOC_32;
8747 break;
8748 case 64:
8749 code = BFD_RELOC_64;
8750 break;
8751 default:
8752 goto fail;
8753 }
8754
8755 howto = bfd_reloc_type_lookup (abfd, code);
8756 }
8757
8758 if (howto)
8759 areloc->howto = howto;
8760 else
8761 goto fail;
8762 }
8763
b34976b6 8764 return TRUE;
252b5132
RH
8765
8766 fail:
4eca0228 8767 _bfd_error_handler
695344c0 8768 /* xgettext:c-format */
d003868e
AM
8769 (_("%B: unsupported relocation type %s"),
8770 abfd, areloc->howto->name);
252b5132 8771 bfd_set_error (bfd_error_bad_value);
b34976b6 8772 return FALSE;
252b5132
RH
8773}
8774
b34976b6 8775bfd_boolean
217aa764 8776_bfd_elf_close_and_cleanup (bfd *abfd)
252b5132 8777{
d9071b0c
TG
8778 struct elf_obj_tdata *tdata = elf_tdata (abfd);
8779 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
252b5132 8780 {
c0355132 8781 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
2b0f7ef9 8782 _bfd_elf_strtab_free (elf_shstrtab (abfd));
d9071b0c 8783 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
252b5132
RH
8784 }
8785
8786 return _bfd_generic_close_and_cleanup (abfd);
8787}
8788
8789/* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
8790 in the relocation's offset. Thus we cannot allow any sort of sanity
8791 range-checking to interfere. There is nothing else to do in processing
8792 this reloc. */
8793
8794bfd_reloc_status_type
217aa764
AM
8795_bfd_elf_rel_vtable_reloc_fn
8796 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
fc0a2244 8797 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
217aa764
AM
8798 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
8799 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
252b5132
RH
8800{
8801 return bfd_reloc_ok;
8802}
252b5132
RH
8803\f
8804/* Elf core file support. Much of this only works on native
8805 toolchains, since we rely on knowing the
8806 machine-dependent procfs structure in order to pick
c044fabd 8807 out details about the corefile. */
252b5132
RH
8808
8809#ifdef HAVE_SYS_PROCFS_H
16231b7b
DG
8810/* Needed for new procfs interface on sparc-solaris. */
8811# define _STRUCTURED_PROC 1
252b5132
RH
8812# include <sys/procfs.h>
8813#endif
8814
261b8d08
PA
8815/* Return a PID that identifies a "thread" for threaded cores, or the
8816 PID of the main process for non-threaded cores. */
252b5132
RH
8817
8818static int
217aa764 8819elfcore_make_pid (bfd *abfd)
252b5132 8820{
261b8d08
PA
8821 int pid;
8822
228e534f 8823 pid = elf_tdata (abfd)->core->lwpid;
261b8d08 8824 if (pid == 0)
228e534f 8825 pid = elf_tdata (abfd)->core->pid;
261b8d08
PA
8826
8827 return pid;
252b5132
RH
8828}
8829
252b5132
RH
8830/* If there isn't a section called NAME, make one, using
8831 data from SECT. Note, this function will generate a
8832 reference to NAME, so you shouldn't deallocate or
c044fabd 8833 overwrite it. */
252b5132 8834
b34976b6 8835static bfd_boolean
217aa764 8836elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
252b5132 8837{
c044fabd 8838 asection *sect2;
252b5132
RH
8839
8840 if (bfd_get_section_by_name (abfd, name) != NULL)
b34976b6 8841 return TRUE;
252b5132 8842
117ed4f8 8843 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
252b5132 8844 if (sect2 == NULL)
b34976b6 8845 return FALSE;
252b5132 8846
eea6121a 8847 sect2->size = sect->size;
252b5132 8848 sect2->filepos = sect->filepos;
252b5132 8849 sect2->alignment_power = sect->alignment_power;
b34976b6 8850 return TRUE;
252b5132
RH
8851}
8852
bb0082d6
AM
8853/* Create a pseudosection containing SIZE bytes at FILEPOS. This
8854 actually creates up to two pseudosections:
8855 - For the single-threaded case, a section named NAME, unless
8856 such a section already exists.
8857 - For the multi-threaded case, a section named "NAME/PID", where
8858 PID is elfcore_make_pid (abfd).
8859 Both pseudosections have identical contents. */
b34976b6 8860bfd_boolean
217aa764
AM
8861_bfd_elfcore_make_pseudosection (bfd *abfd,
8862 char *name,
8863 size_t size,
8864 ufile_ptr filepos)
bb0082d6
AM
8865{
8866 char buf[100];
8867 char *threaded_name;
d4c88bbb 8868 size_t len;
bb0082d6
AM
8869 asection *sect;
8870
8871 /* Build the section name. */
8872
8873 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
d4c88bbb 8874 len = strlen (buf) + 1;
a50b1753 8875 threaded_name = (char *) bfd_alloc (abfd, len);
bb0082d6 8876 if (threaded_name == NULL)
b34976b6 8877 return FALSE;
d4c88bbb 8878 memcpy (threaded_name, buf, len);
bb0082d6 8879
117ed4f8
AM
8880 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
8881 SEC_HAS_CONTENTS);
bb0082d6 8882 if (sect == NULL)
b34976b6 8883 return FALSE;
eea6121a 8884 sect->size = size;
bb0082d6 8885 sect->filepos = filepos;
bb0082d6
AM
8886 sect->alignment_power = 2;
8887
936e320b 8888 return elfcore_maybe_make_sect (abfd, name, sect);
bb0082d6
AM
8889}
8890
252b5132 8891/* prstatus_t exists on:
4a938328 8892 solaris 2.5+
252b5132
RH
8893 linux 2.[01] + glibc
8894 unixware 4.2
8895*/
8896
8897#if defined (HAVE_PRSTATUS_T)
a7b97311 8898
b34976b6 8899static bfd_boolean
217aa764 8900elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 8901{
eea6121a 8902 size_t size;
7ee38065 8903 int offset;
252b5132 8904
4a938328
MS
8905 if (note->descsz == sizeof (prstatus_t))
8906 {
8907 prstatus_t prstat;
252b5132 8908
eea6121a 8909 size = sizeof (prstat.pr_reg);
7ee38065 8910 offset = offsetof (prstatus_t, pr_reg);
4a938328 8911 memcpy (&prstat, note->descdata, sizeof (prstat));
252b5132 8912
fa49d224
NC
8913 /* Do not overwrite the core signal if it
8914 has already been set by another thread. */
228e534f
AM
8915 if (elf_tdata (abfd)->core->signal == 0)
8916 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8917 if (elf_tdata (abfd)->core->pid == 0)
8918 elf_tdata (abfd)->core->pid = prstat.pr_pid;
252b5132 8919
4a938328
MS
8920 /* pr_who exists on:
8921 solaris 2.5+
8922 unixware 4.2
8923 pr_who doesn't exist on:
8924 linux 2.[01]
8925 */
252b5132 8926#if defined (HAVE_PRSTATUS_T_PR_WHO)
228e534f 8927 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8928#else
228e534f 8929 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
252b5132 8930#endif
4a938328 8931 }
7ee38065 8932#if defined (HAVE_PRSTATUS32_T)
4a938328
MS
8933 else if (note->descsz == sizeof (prstatus32_t))
8934 {
8935 /* 64-bit host, 32-bit corefile */
8936 prstatus32_t prstat;
8937
eea6121a 8938 size = sizeof (prstat.pr_reg);
7ee38065 8939 offset = offsetof (prstatus32_t, pr_reg);
4a938328
MS
8940 memcpy (&prstat, note->descdata, sizeof (prstat));
8941
fa49d224
NC
8942 /* Do not overwrite the core signal if it
8943 has already been set by another thread. */
228e534f
AM
8944 if (elf_tdata (abfd)->core->signal == 0)
8945 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
8946 if (elf_tdata (abfd)->core->pid == 0)
8947 elf_tdata (abfd)->core->pid = prstat.pr_pid;
4a938328
MS
8948
8949 /* pr_who exists on:
8950 solaris 2.5+
8951 unixware 4.2
8952 pr_who doesn't exist on:
8953 linux 2.[01]
8954 */
7ee38065 8955#if defined (HAVE_PRSTATUS32_T_PR_WHO)
228e534f 8956 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
261b8d08 8957#else
228e534f 8958 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
4a938328
MS
8959#endif
8960 }
7ee38065 8961#endif /* HAVE_PRSTATUS32_T */
4a938328
MS
8962 else
8963 {
8964 /* Fail - we don't know how to handle any other
8965 note size (ie. data object type). */
b34976b6 8966 return TRUE;
4a938328 8967 }
252b5132 8968
bb0082d6 8969 /* Make a ".reg/999" section and a ".reg" section. */
936e320b 8970 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 8971 size, note->descpos + offset);
252b5132
RH
8972}
8973#endif /* defined (HAVE_PRSTATUS_T) */
8974
bb0082d6 8975/* Create a pseudosection containing the exact contents of NOTE. */
b34976b6 8976static bfd_boolean
217aa764
AM
8977elfcore_make_note_pseudosection (bfd *abfd,
8978 char *name,
8979 Elf_Internal_Note *note)
252b5132 8980{
936e320b
AM
8981 return _bfd_elfcore_make_pseudosection (abfd, name,
8982 note->descsz, note->descpos);
252b5132
RH
8983}
8984
ff08c6bb
JB
8985/* There isn't a consistent prfpregset_t across platforms,
8986 but it doesn't matter, because we don't have to pick this
c044fabd
KH
8987 data structure apart. */
8988
b34976b6 8989static bfd_boolean
217aa764 8990elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
8991{
8992 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
8993}
8994
ff08c6bb 8995/* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
971d4640 8996 type of NT_PRXFPREG. Just include the whole note's contents
ff08c6bb 8997 literally. */
c044fabd 8998
b34976b6 8999static bfd_boolean
217aa764 9000elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
ff08c6bb
JB
9001{
9002 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9003}
9004
4339cae0
L
9005/* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9006 with a note type of NT_X86_XSTATE. Just include the whole note's
9007 contents literally. */
9008
9009static bfd_boolean
9010elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9011{
9012 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9013}
9014
97753bd5
AM
9015static bfd_boolean
9016elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9017{
9018 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9019}
9020
89eeb0bc
LM
9021static bfd_boolean
9022elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9023{
9024 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9025}
97753bd5 9026
0675e188
UW
9027static bfd_boolean
9028elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9029{
9030 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9031}
9032
d7eeb400
MS
9033static bfd_boolean
9034elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9035{
9036 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9037}
9038
9039static bfd_boolean
9040elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9041{
9042 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9043}
9044
9045static bfd_boolean
9046elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9047{
9048 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9049}
9050
9051static bfd_boolean
9052elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9053{
9054 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9055}
9056
9057static bfd_boolean
9058elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9059{
9060 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9061}
9062
355b81d9
UW
9063static bfd_boolean
9064elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9065{
9066 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9067}
9068
9069static bfd_boolean
9070elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9071{
9072 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9073}
9074
abb3f6cc
NC
9075static bfd_boolean
9076elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9077{
9078 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9079}
9080
4ef9f41a
AA
9081static bfd_boolean
9082elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9083{
9084 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9085}
9086
9087static bfd_boolean
9088elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9089{
9090 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9091}
9092
faa9a424
UW
9093static bfd_boolean
9094elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9095{
9096 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9097}
9098
652451f8
YZ
9099static bfd_boolean
9100elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9101{
9102 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9103}
9104
9105static bfd_boolean
9106elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9107{
9108 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9109}
9110
9111static bfd_boolean
9112elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9113{
9114 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9115}
9116
252b5132 9117#if defined (HAVE_PRPSINFO_T)
4a938328 9118typedef prpsinfo_t elfcore_psinfo_t;
7ee38065 9119#if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9120typedef prpsinfo32_t elfcore_psinfo32_t;
9121#endif
252b5132
RH
9122#endif
9123
9124#if defined (HAVE_PSINFO_T)
4a938328 9125typedef psinfo_t elfcore_psinfo_t;
7ee38065 9126#if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
4a938328
MS
9127typedef psinfo32_t elfcore_psinfo32_t;
9128#endif
252b5132
RH
9129#endif
9130
252b5132
RH
9131/* return a malloc'ed copy of a string at START which is at
9132 most MAX bytes long, possibly without a terminating '\0'.
c044fabd 9133 the copy will always have a terminating '\0'. */
252b5132 9134
936e320b 9135char *
217aa764 9136_bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
252b5132 9137{
dc810e39 9138 char *dups;
a50b1753 9139 char *end = (char *) memchr (start, '\0', max);
dc810e39 9140 size_t len;
252b5132
RH
9141
9142 if (end == NULL)
9143 len = max;
9144 else
9145 len = end - start;
9146
a50b1753 9147 dups = (char *) bfd_alloc (abfd, len + 1);
dc810e39 9148 if (dups == NULL)
252b5132
RH
9149 return NULL;
9150
dc810e39
AM
9151 memcpy (dups, start, len);
9152 dups[len] = '\0';
252b5132 9153
dc810e39 9154 return dups;
252b5132
RH
9155}
9156
bb0082d6 9157#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
b34976b6 9158static bfd_boolean
217aa764 9159elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
252b5132 9160{
4a938328
MS
9161 if (note->descsz == sizeof (elfcore_psinfo_t))
9162 {
9163 elfcore_psinfo_t psinfo;
252b5132 9164
7ee38065 9165 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9166
335e41d4 9167#if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
228e534f 9168 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9169#endif
228e534f 9170 elf_tdata (abfd)->core->program
936e320b
AM
9171 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9172 sizeof (psinfo.pr_fname));
252b5132 9173
228e534f 9174 elf_tdata (abfd)->core->command
936e320b
AM
9175 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9176 sizeof (psinfo.pr_psargs));
4a938328 9177 }
7ee38065 9178#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
4a938328
MS
9179 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9180 {
9181 /* 64-bit host, 32-bit corefile */
9182 elfcore_psinfo32_t psinfo;
9183
7ee38065 9184 memcpy (&psinfo, note->descdata, sizeof (psinfo));
252b5132 9185
335e41d4 9186#if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
228e534f 9187 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
335e41d4 9188#endif
228e534f 9189 elf_tdata (abfd)->core->program
936e320b
AM
9190 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9191 sizeof (psinfo.pr_fname));
4a938328 9192
228e534f 9193 elf_tdata (abfd)->core->command
936e320b
AM
9194 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9195 sizeof (psinfo.pr_psargs));
4a938328
MS
9196 }
9197#endif
9198
9199 else
9200 {
9201 /* Fail - we don't know how to handle any other
9202 note size (ie. data object type). */
b34976b6 9203 return TRUE;
4a938328 9204 }
252b5132
RH
9205
9206 /* Note that for some reason, a spurious space is tacked
9207 onto the end of the args in some (at least one anyway)
c044fabd 9208 implementations, so strip it off if it exists. */
252b5132
RH
9209
9210 {
228e534f 9211 char *command = elf_tdata (abfd)->core->command;
252b5132
RH
9212 int n = strlen (command);
9213
9214 if (0 < n && command[n - 1] == ' ')
9215 command[n - 1] = '\0';
9216 }
9217
b34976b6 9218 return TRUE;
252b5132
RH
9219}
9220#endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9221
252b5132 9222#if defined (HAVE_PSTATUS_T)
b34976b6 9223static bfd_boolean
217aa764 9224elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 9225{
f572a39d
AM
9226 if (note->descsz == sizeof (pstatus_t)
9227#if defined (HAVE_PXSTATUS_T)
9228 || note->descsz == sizeof (pxstatus_t)
9229#endif
9230 )
4a938328
MS
9231 {
9232 pstatus_t pstat;
252b5132 9233
4a938328 9234 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9235
228e534f 9236 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328 9237 }
7ee38065 9238#if defined (HAVE_PSTATUS32_T)
4a938328
MS
9239 else if (note->descsz == sizeof (pstatus32_t))
9240 {
9241 /* 64-bit host, 32-bit corefile */
9242 pstatus32_t pstat;
252b5132 9243
4a938328 9244 memcpy (&pstat, note->descdata, sizeof (pstat));
252b5132 9245
228e534f 9246 elf_tdata (abfd)->core->pid = pstat.pr_pid;
4a938328
MS
9247 }
9248#endif
252b5132
RH
9249 /* Could grab some more details from the "representative"
9250 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
c044fabd 9251 NT_LWPSTATUS note, presumably. */
252b5132 9252
b34976b6 9253 return TRUE;
252b5132
RH
9254}
9255#endif /* defined (HAVE_PSTATUS_T) */
9256
252b5132 9257#if defined (HAVE_LWPSTATUS_T)
b34976b6 9258static bfd_boolean
217aa764 9259elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132
RH
9260{
9261 lwpstatus_t lwpstat;
9262 char buf[100];
c044fabd 9263 char *name;
d4c88bbb 9264 size_t len;
c044fabd 9265 asection *sect;
252b5132 9266
f572a39d
AM
9267 if (note->descsz != sizeof (lwpstat)
9268#if defined (HAVE_LWPXSTATUS_T)
9269 && note->descsz != sizeof (lwpxstatus_t)
9270#endif
9271 )
b34976b6 9272 return TRUE;
252b5132
RH
9273
9274 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9275
228e534f 9276 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
a1504221
JB
9277 /* Do not overwrite the core signal if it has already been set by
9278 another thread. */
228e534f
AM
9279 if (elf_tdata (abfd)->core->signal == 0)
9280 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
252b5132 9281
c044fabd 9282 /* Make a ".reg/999" section. */
252b5132
RH
9283
9284 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
d4c88bbb 9285 len = strlen (buf) + 1;
217aa764 9286 name = bfd_alloc (abfd, len);
252b5132 9287 if (name == NULL)
b34976b6 9288 return FALSE;
d4c88bbb 9289 memcpy (name, buf, len);
252b5132 9290
117ed4f8 9291 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9292 if (sect == NULL)
b34976b6 9293 return FALSE;
252b5132
RH
9294
9295#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9296 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
252b5132
RH
9297 sect->filepos = note->descpos
9298 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9299#endif
9300
9301#if defined (HAVE_LWPSTATUS_T_PR_REG)
eea6121a 9302 sect->size = sizeof (lwpstat.pr_reg);
252b5132
RH
9303 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9304#endif
9305
252b5132
RH
9306 sect->alignment_power = 2;
9307
9308 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9309 return FALSE;
252b5132
RH
9310
9311 /* Make a ".reg2/999" section */
9312
9313 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
d4c88bbb 9314 len = strlen (buf) + 1;
217aa764 9315 name = bfd_alloc (abfd, len);
252b5132 9316 if (name == NULL)
b34976b6 9317 return FALSE;
d4c88bbb 9318 memcpy (name, buf, len);
252b5132 9319
117ed4f8 9320 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
252b5132 9321 if (sect == NULL)
b34976b6 9322 return FALSE;
252b5132
RH
9323
9324#if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
eea6121a 9325 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
252b5132
RH
9326 sect->filepos = note->descpos
9327 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9328#endif
9329
9330#if defined (HAVE_LWPSTATUS_T_PR_FPREG)
eea6121a 9331 sect->size = sizeof (lwpstat.pr_fpreg);
252b5132
RH
9332 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9333#endif
9334
252b5132
RH
9335 sect->alignment_power = 2;
9336
936e320b 9337 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
252b5132
RH
9338}
9339#endif /* defined (HAVE_LWPSTATUS_T) */
9340
b34976b6 9341static bfd_boolean
217aa764 9342elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
16e9c715
NC
9343{
9344 char buf[30];
c044fabd 9345 char *name;
d4c88bbb 9346 size_t len;
c044fabd 9347 asection *sect;
4a6636fb
PA
9348 int type;
9349 int is_active_thread;
9350 bfd_vma base_addr;
16e9c715 9351
4a6636fb 9352 if (note->descsz < 728)
b34976b6 9353 return TRUE;
16e9c715 9354
4a6636fb
PA
9355 if (! CONST_STRNEQ (note->namedata, "win32"))
9356 return TRUE;
9357
9358 type = bfd_get_32 (abfd, note->descdata);
c044fabd 9359
4a6636fb 9360 switch (type)
16e9c715 9361 {
4a6636fb 9362 case 1 /* NOTE_INFO_PROCESS */:
228e534f 9363 /* FIXME: need to add ->core->command. */
4a6636fb 9364 /* process_info.pid */
228e534f 9365 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
4a6636fb 9366 /* process_info.signal */
228e534f 9367 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
c044fabd 9368 break;
16e9c715 9369
4a6636fb 9370 case 2 /* NOTE_INFO_THREAD */:
16e9c715 9371 /* Make a ".reg/999" section. */
4a6636fb
PA
9372 /* thread_info.tid */
9373 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
c044fabd 9374
d4c88bbb 9375 len = strlen (buf) + 1;
a50b1753 9376 name = (char *) bfd_alloc (abfd, len);
16e9c715 9377 if (name == NULL)
b34976b6 9378 return FALSE;
c044fabd 9379
d4c88bbb 9380 memcpy (name, buf, len);
16e9c715 9381
117ed4f8 9382 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
16e9c715 9383 if (sect == NULL)
b34976b6 9384 return FALSE;
c044fabd 9385
4a6636fb
PA
9386 /* sizeof (thread_info.thread_context) */
9387 sect->size = 716;
9388 /* offsetof (thread_info.thread_context) */
9389 sect->filepos = note->descpos + 12;
16e9c715
NC
9390 sect->alignment_power = 2;
9391
4a6636fb
PA
9392 /* thread_info.is_active_thread */
9393 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
9394
9395 if (is_active_thread)
16e9c715 9396 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
b34976b6 9397 return FALSE;
16e9c715
NC
9398 break;
9399
4a6636fb 9400 case 3 /* NOTE_INFO_MODULE */:
16e9c715 9401 /* Make a ".module/xxxxxxxx" section. */
4a6636fb
PA
9402 /* module_info.base_address */
9403 base_addr = bfd_get_32 (abfd, note->descdata + 4);
0af1713e 9404 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
c044fabd 9405
d4c88bbb 9406 len = strlen (buf) + 1;
a50b1753 9407 name = (char *) bfd_alloc (abfd, len);
16e9c715 9408 if (name == NULL)
b34976b6 9409 return FALSE;
c044fabd 9410
d4c88bbb 9411 memcpy (name, buf, len);
252b5132 9412
117ed4f8 9413 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
c044fabd 9414
16e9c715 9415 if (sect == NULL)
b34976b6 9416 return FALSE;
c044fabd 9417
eea6121a 9418 sect->size = note->descsz;
16e9c715 9419 sect->filepos = note->descpos;
16e9c715
NC
9420 sect->alignment_power = 2;
9421 break;
9422
9423 default:
b34976b6 9424 return TRUE;
16e9c715
NC
9425 }
9426
b34976b6 9427 return TRUE;
16e9c715 9428}
252b5132 9429
b34976b6 9430static bfd_boolean
217aa764 9431elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
252b5132 9432{
9c5bfbb7 9433 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
bb0082d6 9434
252b5132
RH
9435 switch (note->type)
9436 {
9437 default:
b34976b6 9438 return TRUE;
252b5132 9439
252b5132 9440 case NT_PRSTATUS:
bb0082d6
AM
9441 if (bed->elf_backend_grok_prstatus)
9442 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
b34976b6 9443 return TRUE;
bb0082d6 9444#if defined (HAVE_PRSTATUS_T)
252b5132 9445 return elfcore_grok_prstatus (abfd, note);
bb0082d6 9446#else
b34976b6 9447 return TRUE;
252b5132
RH
9448#endif
9449
9450#if defined (HAVE_PSTATUS_T)
9451 case NT_PSTATUS:
9452 return elfcore_grok_pstatus (abfd, note);
9453#endif
9454
9455#if defined (HAVE_LWPSTATUS_T)
9456 case NT_LWPSTATUS:
9457 return elfcore_grok_lwpstatus (abfd, note);
9458#endif
9459
9460 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
9461 return elfcore_grok_prfpreg (abfd, note);
9462
c044fabd 9463 case NT_WIN32PSTATUS:
16e9c715 9464 return elfcore_grok_win32pstatus (abfd, note);
16e9c715 9465
c044fabd 9466 case NT_PRXFPREG: /* Linux SSE extension */
e377ab71
MK
9467 if (note->namesz == 6
9468 && strcmp (note->namedata, "LINUX") == 0)
ff08c6bb
JB
9469 return elfcore_grok_prxfpreg (abfd, note);
9470 else
b34976b6 9471 return TRUE;
ff08c6bb 9472
4339cae0
L
9473 case NT_X86_XSTATE: /* Linux XSAVE extension */
9474 if (note->namesz == 6
9475 && strcmp (note->namedata, "LINUX") == 0)
9476 return elfcore_grok_xstatereg (abfd, note);
9477 else
9478 return TRUE;
9479
97753bd5
AM
9480 case NT_PPC_VMX:
9481 if (note->namesz == 6
9482 && strcmp (note->namedata, "LINUX") == 0)
9483 return elfcore_grok_ppc_vmx (abfd, note);
9484 else
9485 return TRUE;
9486
89eeb0bc
LM
9487 case NT_PPC_VSX:
9488 if (note->namesz == 6
9489 && strcmp (note->namedata, "LINUX") == 0)
9490 return elfcore_grok_ppc_vsx (abfd, note);
9491 else
9492 return TRUE;
9493
0675e188
UW
9494 case NT_S390_HIGH_GPRS:
9495 if (note->namesz == 6
9496 && strcmp (note->namedata, "LINUX") == 0)
9497 return elfcore_grok_s390_high_gprs (abfd, note);
9498 else
9499 return TRUE;
9500
d7eeb400
MS
9501 case NT_S390_TIMER:
9502 if (note->namesz == 6
9503 && strcmp (note->namedata, "LINUX") == 0)
9504 return elfcore_grok_s390_timer (abfd, note);
9505 else
9506 return TRUE;
9507
9508 case NT_S390_TODCMP:
9509 if (note->namesz == 6
9510 && strcmp (note->namedata, "LINUX") == 0)
9511 return elfcore_grok_s390_todcmp (abfd, note);
9512 else
9513 return TRUE;
9514
9515 case NT_S390_TODPREG:
9516 if (note->namesz == 6
9517 && strcmp (note->namedata, "LINUX") == 0)
9518 return elfcore_grok_s390_todpreg (abfd, note);
9519 else
9520 return TRUE;
9521
9522 case NT_S390_CTRS:
9523 if (note->namesz == 6
9524 && strcmp (note->namedata, "LINUX") == 0)
9525 return elfcore_grok_s390_ctrs (abfd, note);
9526 else
9527 return TRUE;
9528
9529 case NT_S390_PREFIX:
9530 if (note->namesz == 6
9531 && strcmp (note->namedata, "LINUX") == 0)
9532 return elfcore_grok_s390_prefix (abfd, note);
9533 else
9534 return TRUE;
9535
355b81d9
UW
9536 case NT_S390_LAST_BREAK:
9537 if (note->namesz == 6
9538 && strcmp (note->namedata, "LINUX") == 0)
9539 return elfcore_grok_s390_last_break (abfd, note);
9540 else
9541 return TRUE;
9542
9543 case NT_S390_SYSTEM_CALL:
9544 if (note->namesz == 6
9545 && strcmp (note->namedata, "LINUX") == 0)
9546 return elfcore_grok_s390_system_call (abfd, note);
9547 else
9548 return TRUE;
9549
abb3f6cc
NC
9550 case NT_S390_TDB:
9551 if (note->namesz == 6
9552 && strcmp (note->namedata, "LINUX") == 0)
9553 return elfcore_grok_s390_tdb (abfd, note);
9554 else
9555 return TRUE;
9556
4ef9f41a
AA
9557 case NT_S390_VXRS_LOW:
9558 if (note->namesz == 6
9559 && strcmp (note->namedata, "LINUX") == 0)
9560 return elfcore_grok_s390_vxrs_low (abfd, note);
9561 else
9562 return TRUE;
9563
9564 case NT_S390_VXRS_HIGH:
9565 if (note->namesz == 6
9566 && strcmp (note->namedata, "LINUX") == 0)
9567 return elfcore_grok_s390_vxrs_high (abfd, note);
9568 else
9569 return TRUE;
9570
faa9a424
UW
9571 case NT_ARM_VFP:
9572 if (note->namesz == 6
9573 && strcmp (note->namedata, "LINUX") == 0)
9574 return elfcore_grok_arm_vfp (abfd, note);
9575 else
9576 return TRUE;
9577
652451f8
YZ
9578 case NT_ARM_TLS:
9579 if (note->namesz == 6
9580 && strcmp (note->namedata, "LINUX") == 0)
9581 return elfcore_grok_aarch_tls (abfd, note);
9582 else
9583 return TRUE;
9584
9585 case NT_ARM_HW_BREAK:
9586 if (note->namesz == 6
9587 && strcmp (note->namedata, "LINUX") == 0)
9588 return elfcore_grok_aarch_hw_break (abfd, note);
9589 else
9590 return TRUE;
9591
9592 case NT_ARM_HW_WATCH:
9593 if (note->namesz == 6
9594 && strcmp (note->namedata, "LINUX") == 0)
9595 return elfcore_grok_aarch_hw_watch (abfd, note);
9596 else
9597 return TRUE;
9598
252b5132
RH
9599 case NT_PRPSINFO:
9600 case NT_PSINFO:
bb0082d6
AM
9601 if (bed->elf_backend_grok_psinfo)
9602 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
b34976b6 9603 return TRUE;
bb0082d6 9604#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
252b5132 9605 return elfcore_grok_psinfo (abfd, note);
bb0082d6 9606#else
b34976b6 9607 return TRUE;
252b5132 9608#endif
3333a7c3
RM
9609
9610 case NT_AUXV:
9611 {
117ed4f8
AM
9612 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9613 SEC_HAS_CONTENTS);
3333a7c3
RM
9614
9615 if (sect == NULL)
9616 return FALSE;
eea6121a 9617 sect->size = note->descsz;
3333a7c3 9618 sect->filepos = note->descpos;
3333a7c3
RM
9619 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9620
9621 return TRUE;
9622 }
9015683b 9623
451b7c33
TT
9624 case NT_FILE:
9625 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
9626 note);
9627
9015683b
TT
9628 case NT_SIGINFO:
9629 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
9630 note);
5b2c414d 9631
252b5132
RH
9632 }
9633}
9634
718175fa
JK
9635static bfd_boolean
9636elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
9637{
c74f7d1c 9638 struct bfd_build_id* build_id;
30e8ee25
AM
9639
9640 if (note->descsz == 0)
9641 return FALSE;
9642
c74f7d1c
JT
9643 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
9644 if (build_id == NULL)
718175fa
JK
9645 return FALSE;
9646
c74f7d1c
JT
9647 build_id->size = note->descsz;
9648 memcpy (build_id->data, note->descdata, note->descsz);
9649 abfd->build_id = build_id;
718175fa
JK
9650
9651 return TRUE;
9652}
9653
9654static bfd_boolean
9655elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
9656{
9657 switch (note->type)
9658 {
9659 default:
9660 return TRUE;
9661
9662 case NT_GNU_BUILD_ID:
9663 return elfobj_grok_gnu_build_id (abfd, note);
9664 }
9665}
9666
e21e5835
NC
9667static bfd_boolean
9668elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
9669{
9670 struct sdt_note *cur =
9671 (struct sdt_note *) bfd_alloc (abfd, sizeof (struct sdt_note)
9672 + note->descsz);
9673
9674 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
9675 cur->size = (bfd_size_type) note->descsz;
9676 memcpy (cur->data, note->descdata, note->descsz);
9677
9678 elf_tdata (abfd)->sdt_note_head = cur;
9679
9680 return TRUE;
9681}
9682
9683static bfd_boolean
9684elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
9685{
9686 switch (note->type)
9687 {
9688 case NT_STAPSDT:
9689 return elfobj_grok_stapsdt_note_1 (abfd, note);
9690
9691 default:
9692 return TRUE;
9693 }
9694}
9695
aa1ed4a9
JB
9696static bfd_boolean
9697elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
9698{
9699 size_t offset;
9700
aa1ed4a9
JB
9701 switch (abfd->arch_info->bits_per_word)
9702 {
9703 case 32:
0064d223
JB
9704 if (note->descsz < 108)
9705 return FALSE;
aa1ed4a9
JB
9706 break;
9707
9708 case 64:
0064d223
JB
9709 if (note->descsz < 120)
9710 return FALSE;
aa1ed4a9
JB
9711 break;
9712
9713 default:
9714 return FALSE;
9715 }
9716
0064d223
JB
9717 /* Check for version 1 in pr_version. */
9718 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9719 return FALSE;
9720 offset = 4;
9721
9722 /* Skip over pr_psinfosz. */
9723 if (abfd->arch_info->bits_per_word == 32)
9724 offset += 4;
9725 else
9726 {
9727 offset += 4; /* Padding before pr_psinfosz. */
9728 offset += 8;
9729 }
9730
aa1ed4a9
JB
9731 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
9732 elf_tdata (abfd)->core->program
9733 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
9734 offset += 17;
9735
9736 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
9737 elf_tdata (abfd)->core->command
9738 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
0064d223
JB
9739 offset += 81;
9740
9741 /* Padding before pr_pid. */
9742 offset += 2;
9743
9744 /* The pr_pid field was added in version "1a". */
9745 if (note->descsz < offset + 4)
9746 return TRUE;
9747
9748 elf_tdata (abfd)->core->pid
9749 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
aa1ed4a9
JB
9750
9751 return TRUE;
9752}
9753
9754static bfd_boolean
9755elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
9756{
9757 size_t offset;
9758 size_t size;
9759
9760 /* Check for version 1 in pr_version. */
9761 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
9762 return FALSE;
9763 offset = 4;
9764
9765 /* Skip over pr_statussz. */
9766 switch (abfd->arch_info->bits_per_word)
9767 {
9768 case 32:
9769 offset += 4;
9770 break;
9771
9772 case 64:
9773 offset += 4; /* Padding before pr_statussz. */
9774 offset += 8;
9775 break;
9776
9777 default:
9778 return FALSE;
9779 }
9780
9781 /* Extract size of pr_reg from pr_gregsetsz. */
9782 if (abfd->arch_info->bits_per_word == 32)
9783 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9784 else
9785 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
9786
9787 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
9788 offset += (abfd->arch_info->bits_per_word / 8) * 2;
9789
9790 /* Skip over pr_osreldate. */
9791 offset += 4;
9792
9793 /* Read signal from pr_cursig. */
9794 if (elf_tdata (abfd)->core->signal == 0)
9795 elf_tdata (abfd)->core->signal
9796 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9797 offset += 4;
9798
9799 /* Read TID from pr_pid. */
9800 elf_tdata (abfd)->core->lwpid
9801 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
9802 offset += 4;
9803
9804 /* Padding before pr_reg. */
9805 if (abfd->arch_info->bits_per_word == 64)
9806 offset += 4;
9807
9808 /* Make a ".reg/999" section and a ".reg" section. */
9809 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9810 size, note->descpos + offset);
9811}
9812
9813static bfd_boolean
9814elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
9815{
9816 switch (note->type)
9817 {
9818 case NT_PRSTATUS:
9819 return elfcore_grok_freebsd_prstatus (abfd, note);
9820
9821 case NT_FPREGSET:
9822 return elfcore_grok_prfpreg (abfd, note);
9823
9824 case NT_PRPSINFO:
9825 return elfcore_grok_freebsd_psinfo (abfd, note);
9826
9827 case NT_FREEBSD_THRMISC:
9828 if (note->namesz == 8)
9829 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
9830 else
9831 return TRUE;
9832
3350c5f5
JB
9833 case NT_FREEBSD_PROCSTAT_AUXV:
9834 {
9835 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9836 SEC_HAS_CONTENTS);
9837
9838 if (sect == NULL)
9839 return FALSE;
9840 sect->size = note->descsz - 4;
9841 sect->filepos = note->descpos + 4;
9842 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9843
9844 return TRUE;
9845 }
9846
aa1ed4a9
JB
9847 case NT_X86_XSTATE:
9848 if (note->namesz == 8)
9849 return elfcore_grok_xstatereg (abfd, note);
9850 else
9851 return TRUE;
9852
9853 default:
9854 return TRUE;
9855 }
9856}
9857
b34976b6 9858static bfd_boolean
217aa764 9859elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
50b2bdb7
AM
9860{
9861 char *cp;
9862
9863 cp = strchr (note->namedata, '@');
9864 if (cp != NULL)
9865 {
d2b64500 9866 *lwpidp = atoi(cp + 1);
b34976b6 9867 return TRUE;
50b2bdb7 9868 }
b34976b6 9869 return FALSE;
50b2bdb7
AM
9870}
9871
b34976b6 9872static bfd_boolean
217aa764 9873elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7 9874{
50b2bdb7 9875 /* Signal number at offset 0x08. */
228e534f 9876 elf_tdata (abfd)->core->signal
50b2bdb7
AM
9877 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9878
9879 /* Process ID at offset 0x50. */
228e534f 9880 elf_tdata (abfd)->core->pid
50b2bdb7
AM
9881 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
9882
9883 /* Command name at 0x7c (max 32 bytes, including nul). */
228e534f 9884 elf_tdata (abfd)->core->command
50b2bdb7
AM
9885 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
9886
7720ba9f
MK
9887 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
9888 note);
50b2bdb7
AM
9889}
9890
b34976b6 9891static bfd_boolean
217aa764 9892elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
50b2bdb7
AM
9893{
9894 int lwp;
9895
9896 if (elfcore_netbsd_get_lwpid (note, &lwp))
228e534f 9897 elf_tdata (abfd)->core->lwpid = lwp;
50b2bdb7 9898
b4db1224 9899 if (note->type == NT_NETBSDCORE_PROCINFO)
50b2bdb7
AM
9900 {
9901 /* NetBSD-specific core "procinfo". Note that we expect to
08a40648
AM
9902 find this note before any of the others, which is fine,
9903 since the kernel writes this note out first when it
9904 creates a core file. */
47d9a591 9905
50b2bdb7
AM
9906 return elfcore_grok_netbsd_procinfo (abfd, note);
9907 }
9908
b4db1224
JT
9909 /* As of Jan 2002 there are no other machine-independent notes
9910 defined for NetBSD core files. If the note type is less
9911 than the start of the machine-dependent note types, we don't
9912 understand it. */
47d9a591 9913
b4db1224 9914 if (note->type < NT_NETBSDCORE_FIRSTMACH)
b34976b6 9915 return TRUE;
50b2bdb7
AM
9916
9917
9918 switch (bfd_get_arch (abfd))
9919 {
08a40648
AM
9920 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
9921 PT_GETFPREGS == mach+2. */
50b2bdb7
AM
9922
9923 case bfd_arch_alpha:
9924 case bfd_arch_sparc:
9925 switch (note->type)
08a40648
AM
9926 {
9927 case NT_NETBSDCORE_FIRSTMACH+0:
9928 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9929
08a40648
AM
9930 case NT_NETBSDCORE_FIRSTMACH+2:
9931 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9932
08a40648
AM
9933 default:
9934 return TRUE;
9935 }
50b2bdb7 9936
08a40648
AM
9937 /* On all other arch's, PT_GETREGS == mach+1 and
9938 PT_GETFPREGS == mach+3. */
50b2bdb7
AM
9939
9940 default:
9941 switch (note->type)
08a40648
AM
9942 {
9943 case NT_NETBSDCORE_FIRSTMACH+1:
9944 return elfcore_make_note_pseudosection (abfd, ".reg", note);
50b2bdb7 9945
08a40648
AM
9946 case NT_NETBSDCORE_FIRSTMACH+3:
9947 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
50b2bdb7 9948
08a40648
AM
9949 default:
9950 return TRUE;
9951 }
50b2bdb7
AM
9952 }
9953 /* NOTREACHED */
9954}
9955
67cc5033
MK
9956static bfd_boolean
9957elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
9958{
9959 /* Signal number at offset 0x08. */
228e534f 9960 elf_tdata (abfd)->core->signal
67cc5033
MK
9961 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
9962
9963 /* Process ID at offset 0x20. */
228e534f 9964 elf_tdata (abfd)->core->pid
67cc5033
MK
9965 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
9966
9967 /* Command name at 0x48 (max 32 bytes, including nul). */
228e534f 9968 elf_tdata (abfd)->core->command
67cc5033
MK
9969 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
9970
9971 return TRUE;
9972}
9973
9974static bfd_boolean
9975elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
9976{
9977 if (note->type == NT_OPENBSD_PROCINFO)
9978 return elfcore_grok_openbsd_procinfo (abfd, note);
9979
9980 if (note->type == NT_OPENBSD_REGS)
9981 return elfcore_make_note_pseudosection (abfd, ".reg", note);
9982
9983 if (note->type == NT_OPENBSD_FPREGS)
9984 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9985
9986 if (note->type == NT_OPENBSD_XFPREGS)
9987 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9988
9989 if (note->type == NT_OPENBSD_AUXV)
9990 {
9991 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9992 SEC_HAS_CONTENTS);
9993
9994 if (sect == NULL)
9995 return FALSE;
9996 sect->size = note->descsz;
9997 sect->filepos = note->descpos;
9998 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9999
10000 return TRUE;
10001 }
10002
10003 if (note->type == NT_OPENBSD_WCOOKIE)
10004 {
10005 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10006 SEC_HAS_CONTENTS);
10007
10008 if (sect == NULL)
10009 return FALSE;
10010 sect->size = note->descsz;
10011 sect->filepos = note->descpos;
10012 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10013
10014 return TRUE;
10015 }
10016
10017 return TRUE;
10018}
10019
07c6e936 10020static bfd_boolean
d3fd4074 10021elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
07c6e936
NC
10022{
10023 void *ddata = note->descdata;
10024 char buf[100];
10025 char *name;
10026 asection *sect;
f8843e87
AM
10027 short sig;
10028 unsigned flags;
07c6e936
NC
10029
10030 /* nto_procfs_status 'pid' field is at offset 0. */
228e534f 10031 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
07c6e936 10032
f8843e87
AM
10033 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10034 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10035
10036 /* nto_procfs_status 'flags' field is at offset 8. */
10037 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
07c6e936
NC
10038
10039 /* nto_procfs_status 'what' field is at offset 14. */
f8843e87
AM
10040 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10041 {
228e534f
AM
10042 elf_tdata (abfd)->core->signal = sig;
10043 elf_tdata (abfd)->core->lwpid = *tid;
f8843e87 10044 }
07c6e936 10045
f8843e87
AM
10046 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10047 do not come from signals so we make sure we set the current
10048 thread just in case. */
10049 if (flags & 0x00000080)
228e534f 10050 elf_tdata (abfd)->core->lwpid = *tid;
07c6e936
NC
10051
10052 /* Make a ".qnx_core_status/%d" section. */
d3fd4074 10053 sprintf (buf, ".qnx_core_status/%ld", *tid);
07c6e936 10054
a50b1753 10055 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10056 if (name == NULL)
10057 return FALSE;
10058 strcpy (name, buf);
10059
117ed4f8 10060 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10061 if (sect == NULL)
10062 return FALSE;
10063
eea6121a 10064 sect->size = note->descsz;
07c6e936 10065 sect->filepos = note->descpos;
07c6e936
NC
10066 sect->alignment_power = 2;
10067
10068 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10069}
10070
10071static bfd_boolean
d69f560c
KW
10072elfcore_grok_nto_regs (bfd *abfd,
10073 Elf_Internal_Note *note,
d3fd4074 10074 long tid,
d69f560c 10075 char *base)
07c6e936
NC
10076{
10077 char buf[100];
10078 char *name;
10079 asection *sect;
10080
d69f560c 10081 /* Make a "(base)/%d" section. */
d3fd4074 10082 sprintf (buf, "%s/%ld", base, tid);
07c6e936 10083
a50b1753 10084 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
07c6e936
NC
10085 if (name == NULL)
10086 return FALSE;
10087 strcpy (name, buf);
10088
117ed4f8 10089 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
07c6e936
NC
10090 if (sect == NULL)
10091 return FALSE;
10092
eea6121a 10093 sect->size = note->descsz;
07c6e936 10094 sect->filepos = note->descpos;
07c6e936
NC
10095 sect->alignment_power = 2;
10096
f8843e87 10097 /* This is the current thread. */
228e534f 10098 if (elf_tdata (abfd)->core->lwpid == tid)
d69f560c 10099 return elfcore_maybe_make_sect (abfd, base, sect);
f8843e87
AM
10100
10101 return TRUE;
07c6e936
NC
10102}
10103
10104#define BFD_QNT_CORE_INFO 7
10105#define BFD_QNT_CORE_STATUS 8
10106#define BFD_QNT_CORE_GREG 9
10107#define BFD_QNT_CORE_FPREG 10
10108
10109static bfd_boolean
217aa764 10110elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
07c6e936
NC
10111{
10112 /* Every GREG section has a STATUS section before it. Store the
811072d8 10113 tid from the previous call to pass down to the next gregs
07c6e936 10114 function. */
d3fd4074 10115 static long tid = 1;
07c6e936
NC
10116
10117 switch (note->type)
10118 {
d69f560c
KW
10119 case BFD_QNT_CORE_INFO:
10120 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10121 case BFD_QNT_CORE_STATUS:
10122 return elfcore_grok_nto_status (abfd, note, &tid);
10123 case BFD_QNT_CORE_GREG:
10124 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10125 case BFD_QNT_CORE_FPREG:
10126 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10127 default:
10128 return TRUE;
07c6e936
NC
10129 }
10130}
10131
b15fa79e
AM
10132static bfd_boolean
10133elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10134{
10135 char *name;
10136 asection *sect;
10137 size_t len;
10138
10139 /* Use note name as section name. */
10140 len = note->namesz;
a50b1753 10141 name = (char *) bfd_alloc (abfd, len);
b15fa79e
AM
10142 if (name == NULL)
10143 return FALSE;
10144 memcpy (name, note->namedata, len);
10145 name[len - 1] = '\0';
10146
10147 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10148 if (sect == NULL)
10149 return FALSE;
10150
10151 sect->size = note->descsz;
10152 sect->filepos = note->descpos;
10153 sect->alignment_power = 1;
10154
10155 return TRUE;
10156}
10157
7c76fa91
MS
10158/* Function: elfcore_write_note
10159
47d9a591 10160 Inputs:
a39f3346 10161 buffer to hold note, and current size of buffer
7c76fa91
MS
10162 name of note
10163 type of note
10164 data for note
10165 size of data for note
10166
a39f3346
AM
10167 Writes note to end of buffer. ELF64 notes are written exactly as
10168 for ELF32, despite the current (as of 2006) ELF gabi specifying
10169 that they ought to have 8-byte namesz and descsz field, and have
10170 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10171
7c76fa91 10172 Return:
a39f3346 10173 Pointer to realloc'd buffer, *BUFSIZ updated. */
7c76fa91
MS
10174
10175char *
a39f3346 10176elfcore_write_note (bfd *abfd,
217aa764 10177 char *buf,
a39f3346 10178 int *bufsiz,
217aa764 10179 const char *name,
a39f3346 10180 int type,
217aa764 10181 const void *input,
a39f3346 10182 int size)
7c76fa91
MS
10183{
10184 Elf_External_Note *xnp;
d4c88bbb 10185 size_t namesz;
d4c88bbb 10186 size_t newspace;
a39f3346 10187 char *dest;
7c76fa91 10188
d4c88bbb 10189 namesz = 0;
d4c88bbb 10190 if (name != NULL)
a39f3346 10191 namesz = strlen (name) + 1;
d4c88bbb 10192
a39f3346 10193 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
d4c88bbb 10194
a50b1753 10195 buf = (char *) realloc (buf, *bufsiz + newspace);
14b1c01e
AM
10196 if (buf == NULL)
10197 return buf;
a39f3346 10198 dest = buf + *bufsiz;
7c76fa91
MS
10199 *bufsiz += newspace;
10200 xnp = (Elf_External_Note *) dest;
10201 H_PUT_32 (abfd, namesz, xnp->namesz);
10202 H_PUT_32 (abfd, size, xnp->descsz);
10203 H_PUT_32 (abfd, type, xnp->type);
d4c88bbb
AM
10204 dest = xnp->name;
10205 if (name != NULL)
10206 {
10207 memcpy (dest, name, namesz);
10208 dest += namesz;
a39f3346 10209 while (namesz & 3)
d4c88bbb
AM
10210 {
10211 *dest++ = '\0';
a39f3346 10212 ++namesz;
d4c88bbb
AM
10213 }
10214 }
10215 memcpy (dest, input, size);
a39f3346
AM
10216 dest += size;
10217 while (size & 3)
10218 {
10219 *dest++ = '\0';
10220 ++size;
10221 }
10222 return buf;
7c76fa91
MS
10223}
10224
7c76fa91 10225char *
217aa764
AM
10226elfcore_write_prpsinfo (bfd *abfd,
10227 char *buf,
10228 int *bufsiz,
10229 const char *fname,
10230 const char *psargs)
7c76fa91 10231{
183e98be
AM
10232 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10233
10234 if (bed->elf_backend_write_core_note != NULL)
10235 {
10236 char *ret;
10237 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10238 NT_PRPSINFO, fname, psargs);
10239 if (ret != NULL)
10240 return ret;
10241 }
7c76fa91 10242
1f20dca5 10243#if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
183e98be
AM
10244#if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10245 if (bed->s->elfclass == ELFCLASS32)
10246 {
10247#if defined (HAVE_PSINFO32_T)
10248 psinfo32_t data;
10249 int note_type = NT_PSINFO;
10250#else
10251 prpsinfo32_t data;
10252 int note_type = NT_PRPSINFO;
10253#endif
10254
10255 memset (&data, 0, sizeof (data));
10256 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10257 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10258 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10259 "CORE", note_type, &data, sizeof (data));
183e98be
AM
10260 }
10261 else
10262#endif
10263 {
7c76fa91 10264#if defined (HAVE_PSINFO_T)
183e98be
AM
10265 psinfo_t data;
10266 int note_type = NT_PSINFO;
7c76fa91 10267#else
183e98be
AM
10268 prpsinfo_t data;
10269 int note_type = NT_PRPSINFO;
7c76fa91
MS
10270#endif
10271
183e98be
AM
10272 memset (&data, 0, sizeof (data));
10273 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
10274 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
10275 return elfcore_write_note (abfd, buf, bufsiz,
1f20dca5 10276 "CORE", note_type, &data, sizeof (data));
183e98be 10277 }
7c76fa91
MS
10278#endif /* PSINFO_T or PRPSINFO_T */
10279
1f20dca5
UW
10280 free (buf);
10281 return NULL;
10282}
10283
70a38d42
SDJ
10284char *
10285elfcore_write_linux_prpsinfo32
10286 (bfd *abfd, char *buf, int *bufsiz,
10287 const struct elf_internal_linux_prpsinfo *prpsinfo)
10288{
10289 struct elf_external_linux_prpsinfo32 data;
10290
aeb70569 10291 swap_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10292 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
10293 &data, sizeof (data));
10294}
10295
10296char *
10297elfcore_write_linux_prpsinfo64
10298 (bfd *abfd, char *buf, int *bufsiz,
10299 const struct elf_internal_linux_prpsinfo *prpsinfo)
10300{
10301 struct elf_external_linux_prpsinfo64 data;
10302
aeb70569 10303 swap_linux_prpsinfo64_out (abfd, prpsinfo, &data);
70a38d42
SDJ
10304 return elfcore_write_note (abfd, buf, bufsiz,
10305 "CORE", NT_PRPSINFO, &data, sizeof (data));
10306}
10307
7c76fa91 10308char *
217aa764
AM
10309elfcore_write_prstatus (bfd *abfd,
10310 char *buf,
10311 int *bufsiz,
10312 long pid,
10313 int cursig,
10314 const void *gregs)
7c76fa91 10315{
183e98be 10316 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10317
183e98be
AM
10318 if (bed->elf_backend_write_core_note != NULL)
10319 {
10320 char *ret;
10321 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
10322 NT_PRSTATUS,
10323 pid, cursig, gregs);
10324 if (ret != NULL)
10325 return ret;
10326 }
10327
1f20dca5 10328#if defined (HAVE_PRSTATUS_T)
183e98be
AM
10329#if defined (HAVE_PRSTATUS32_T)
10330 if (bed->s->elfclass == ELFCLASS32)
10331 {
10332 prstatus32_t prstat;
10333
10334 memset (&prstat, 0, sizeof (prstat));
10335 prstat.pr_pid = pid;
10336 prstat.pr_cursig = cursig;
10337 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10338 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10339 NT_PRSTATUS, &prstat, sizeof (prstat));
10340 }
10341 else
10342#endif
10343 {
10344 prstatus_t prstat;
10345
10346 memset (&prstat, 0, sizeof (prstat));
10347 prstat.pr_pid = pid;
10348 prstat.pr_cursig = cursig;
10349 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
1f20dca5 10350 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
183e98be
AM
10351 NT_PRSTATUS, &prstat, sizeof (prstat));
10352 }
7c76fa91
MS
10353#endif /* HAVE_PRSTATUS_T */
10354
1f20dca5
UW
10355 free (buf);
10356 return NULL;
10357}
10358
51316059
MS
10359#if defined (HAVE_LWPSTATUS_T)
10360char *
217aa764
AM
10361elfcore_write_lwpstatus (bfd *abfd,
10362 char *buf,
10363 int *bufsiz,
10364 long pid,
10365 int cursig,
10366 const void *gregs)
51316059
MS
10367{
10368 lwpstatus_t lwpstat;
183e98be 10369 const char *note_name = "CORE";
51316059
MS
10370
10371 memset (&lwpstat, 0, sizeof (lwpstat));
10372 lwpstat.pr_lwpid = pid >> 16;
10373 lwpstat.pr_cursig = cursig;
10374#if defined (HAVE_LWPSTATUS_T_PR_REG)
d1e8523e 10375 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
51316059
MS
10376#elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10377#if !defined(gregs)
10378 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
10379 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
10380#else
10381 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
10382 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
10383#endif
10384#endif
47d9a591 10385 return elfcore_write_note (abfd, buf, bufsiz, note_name,
51316059
MS
10386 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
10387}
10388#endif /* HAVE_LWPSTATUS_T */
10389
7c76fa91
MS
10390#if defined (HAVE_PSTATUS_T)
10391char *
217aa764
AM
10392elfcore_write_pstatus (bfd *abfd,
10393 char *buf,
10394 int *bufsiz,
10395 long pid,
6c10990d
NC
10396 int cursig ATTRIBUTE_UNUSED,
10397 const void *gregs ATTRIBUTE_UNUSED)
7c76fa91 10398{
183e98be
AM
10399 const char *note_name = "CORE";
10400#if defined (HAVE_PSTATUS32_T)
10401 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7c76fa91 10402
183e98be
AM
10403 if (bed->s->elfclass == ELFCLASS32)
10404 {
10405 pstatus32_t pstat;
10406
10407 memset (&pstat, 0, sizeof (pstat));
10408 pstat.pr_pid = pid & 0xffff;
10409 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10410 NT_PSTATUS, &pstat, sizeof (pstat));
10411 return buf;
10412 }
10413 else
10414#endif
10415 {
10416 pstatus_t pstat;
10417
10418 memset (&pstat, 0, sizeof (pstat));
10419 pstat.pr_pid = pid & 0xffff;
10420 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
10421 NT_PSTATUS, &pstat, sizeof (pstat));
10422 return buf;
10423 }
7c76fa91
MS
10424}
10425#endif /* HAVE_PSTATUS_T */
10426
10427char *
217aa764
AM
10428elfcore_write_prfpreg (bfd *abfd,
10429 char *buf,
10430 int *bufsiz,
10431 const void *fpregs,
10432 int size)
7c76fa91 10433{
183e98be 10434 const char *note_name = "CORE";
47d9a591 10435 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10436 note_name, NT_FPREGSET, fpregs, size);
10437}
10438
10439char *
217aa764
AM
10440elfcore_write_prxfpreg (bfd *abfd,
10441 char *buf,
10442 int *bufsiz,
10443 const void *xfpregs,
10444 int size)
7c76fa91
MS
10445{
10446 char *note_name = "LINUX";
47d9a591 10447 return elfcore_write_note (abfd, buf, bufsiz,
7c76fa91
MS
10448 note_name, NT_PRXFPREG, xfpregs, size);
10449}
10450
4339cae0
L
10451char *
10452elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
10453 const void *xfpregs, int size)
10454{
97de3545
JB
10455 char *note_name;
10456 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
10457 note_name = "FreeBSD";
10458 else
10459 note_name = "LINUX";
4339cae0
L
10460 return elfcore_write_note (abfd, buf, bufsiz,
10461 note_name, NT_X86_XSTATE, xfpregs, size);
10462}
10463
97753bd5
AM
10464char *
10465elfcore_write_ppc_vmx (bfd *abfd,
10466 char *buf,
10467 int *bufsiz,
10468 const void *ppc_vmx,
10469 int size)
10470{
10471 char *note_name = "LINUX";
10472 return elfcore_write_note (abfd, buf, bufsiz,
10473 note_name, NT_PPC_VMX, ppc_vmx, size);
10474}
10475
89eeb0bc
LM
10476char *
10477elfcore_write_ppc_vsx (bfd *abfd,
10478 char *buf,
10479 int *bufsiz,
10480 const void *ppc_vsx,
10481 int size)
10482{
10483 char *note_name = "LINUX";
10484 return elfcore_write_note (abfd, buf, bufsiz,
10485 note_name, NT_PPC_VSX, ppc_vsx, size);
10486}
10487
0675e188
UW
10488static char *
10489elfcore_write_s390_high_gprs (bfd *abfd,
10490 char *buf,
10491 int *bufsiz,
10492 const void *s390_high_gprs,
10493 int size)
10494{
10495 char *note_name = "LINUX";
10496 return elfcore_write_note (abfd, buf, bufsiz,
10497 note_name, NT_S390_HIGH_GPRS,
10498 s390_high_gprs, size);
10499}
10500
d7eeb400
MS
10501char *
10502elfcore_write_s390_timer (bfd *abfd,
10503 char *buf,
10504 int *bufsiz,
10505 const void *s390_timer,
10506 int size)
10507{
10508 char *note_name = "LINUX";
10509 return elfcore_write_note (abfd, buf, bufsiz,
10510 note_name, NT_S390_TIMER, s390_timer, size);
10511}
10512
10513char *
10514elfcore_write_s390_todcmp (bfd *abfd,
10515 char *buf,
10516 int *bufsiz,
10517 const void *s390_todcmp,
10518 int size)
10519{
10520 char *note_name = "LINUX";
10521 return elfcore_write_note (abfd, buf, bufsiz,
10522 note_name, NT_S390_TODCMP, s390_todcmp, size);
10523}
10524
10525char *
10526elfcore_write_s390_todpreg (bfd *abfd,
10527 char *buf,
10528 int *bufsiz,
10529 const void *s390_todpreg,
10530 int size)
10531{
10532 char *note_name = "LINUX";
10533 return elfcore_write_note (abfd, buf, bufsiz,
10534 note_name, NT_S390_TODPREG, s390_todpreg, size);
10535}
10536
10537char *
10538elfcore_write_s390_ctrs (bfd *abfd,
10539 char *buf,
10540 int *bufsiz,
10541 const void *s390_ctrs,
10542 int size)
10543{
10544 char *note_name = "LINUX";
10545 return elfcore_write_note (abfd, buf, bufsiz,
10546 note_name, NT_S390_CTRS, s390_ctrs, size);
10547}
10548
10549char *
10550elfcore_write_s390_prefix (bfd *abfd,
10551 char *buf,
10552 int *bufsiz,
10553 const void *s390_prefix,
10554 int size)
10555{
10556 char *note_name = "LINUX";
10557 return elfcore_write_note (abfd, buf, bufsiz,
10558 note_name, NT_S390_PREFIX, s390_prefix, size);
10559}
10560
355b81d9
UW
10561char *
10562elfcore_write_s390_last_break (bfd *abfd,
10563 char *buf,
10564 int *bufsiz,
10565 const void *s390_last_break,
10566 int size)
10567{
10568 char *note_name = "LINUX";
10569 return elfcore_write_note (abfd, buf, bufsiz,
10570 note_name, NT_S390_LAST_BREAK,
10571 s390_last_break, size);
10572}
10573
10574char *
10575elfcore_write_s390_system_call (bfd *abfd,
10576 char *buf,
10577 int *bufsiz,
10578 const void *s390_system_call,
10579 int size)
10580{
10581 char *note_name = "LINUX";
10582 return elfcore_write_note (abfd, buf, bufsiz,
10583 note_name, NT_S390_SYSTEM_CALL,
10584 s390_system_call, size);
10585}
10586
abb3f6cc
NC
10587char *
10588elfcore_write_s390_tdb (bfd *abfd,
10589 char *buf,
10590 int *bufsiz,
10591 const void *s390_tdb,
10592 int size)
10593{
10594 char *note_name = "LINUX";
10595 return elfcore_write_note (abfd, buf, bufsiz,
10596 note_name, NT_S390_TDB, s390_tdb, size);
10597}
10598
4ef9f41a
AA
10599char *
10600elfcore_write_s390_vxrs_low (bfd *abfd,
10601 char *buf,
10602 int *bufsiz,
10603 const void *s390_vxrs_low,
10604 int size)
10605{
10606 char *note_name = "LINUX";
10607 return elfcore_write_note (abfd, buf, bufsiz,
10608 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
10609}
10610
10611char *
10612elfcore_write_s390_vxrs_high (bfd *abfd,
10613 char *buf,
10614 int *bufsiz,
10615 const void *s390_vxrs_high,
10616 int size)
10617{
10618 char *note_name = "LINUX";
10619 return elfcore_write_note (abfd, buf, bufsiz,
10620 note_name, NT_S390_VXRS_HIGH,
10621 s390_vxrs_high, size);
10622}
10623
faa9a424
UW
10624char *
10625elfcore_write_arm_vfp (bfd *abfd,
10626 char *buf,
10627 int *bufsiz,
10628 const void *arm_vfp,
10629 int size)
10630{
10631 char *note_name = "LINUX";
10632 return elfcore_write_note (abfd, buf, bufsiz,
10633 note_name, NT_ARM_VFP, arm_vfp, size);
10634}
10635
652451f8
YZ
10636char *
10637elfcore_write_aarch_tls (bfd *abfd,
10638 char *buf,
10639 int *bufsiz,
10640 const void *aarch_tls,
10641 int size)
10642{
10643 char *note_name = "LINUX";
10644 return elfcore_write_note (abfd, buf, bufsiz,
10645 note_name, NT_ARM_TLS, aarch_tls, size);
10646}
10647
10648char *
10649elfcore_write_aarch_hw_break (bfd *abfd,
10650 char *buf,
10651 int *bufsiz,
10652 const void *aarch_hw_break,
10653 int size)
10654{
10655 char *note_name = "LINUX";
10656 return elfcore_write_note (abfd, buf, bufsiz,
10657 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
10658}
10659
10660char *
10661elfcore_write_aarch_hw_watch (bfd *abfd,
10662 char *buf,
10663 int *bufsiz,
10664 const void *aarch_hw_watch,
10665 int size)
10666{
10667 char *note_name = "LINUX";
10668 return elfcore_write_note (abfd, buf, bufsiz,
10669 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
10670}
10671
bb864ac1
CES
10672char *
10673elfcore_write_register_note (bfd *abfd,
10674 char *buf,
10675 int *bufsiz,
10676 const char *section,
10677 const void *data,
10678 int size)
10679{
10680 if (strcmp (section, ".reg2") == 0)
10681 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
10682 if (strcmp (section, ".reg-xfp") == 0)
10683 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
4339cae0
L
10684 if (strcmp (section, ".reg-xstate") == 0)
10685 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10686 if (strcmp (section, ".reg-ppc-vmx") == 0)
10687 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
89eeb0bc
LM
10688 if (strcmp (section, ".reg-ppc-vsx") == 0)
10689 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
0675e188
UW
10690 if (strcmp (section, ".reg-s390-high-gprs") == 0)
10691 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
d7eeb400
MS
10692 if (strcmp (section, ".reg-s390-timer") == 0)
10693 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
10694 if (strcmp (section, ".reg-s390-todcmp") == 0)
10695 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
10696 if (strcmp (section, ".reg-s390-todpreg") == 0)
10697 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
10698 if (strcmp (section, ".reg-s390-ctrs") == 0)
10699 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
10700 if (strcmp (section, ".reg-s390-prefix") == 0)
10701 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
355b81d9
UW
10702 if (strcmp (section, ".reg-s390-last-break") == 0)
10703 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
10704 if (strcmp (section, ".reg-s390-system-call") == 0)
10705 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
abb3f6cc
NC
10706 if (strcmp (section, ".reg-s390-tdb") == 0)
10707 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
4ef9f41a
AA
10708 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
10709 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
10710 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
10711 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
faa9a424
UW
10712 if (strcmp (section, ".reg-arm-vfp") == 0)
10713 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
652451f8
YZ
10714 if (strcmp (section, ".reg-aarch-tls") == 0)
10715 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
10716 if (strcmp (section, ".reg-aarch-hw-break") == 0)
10717 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
10718 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
10719 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
bb864ac1
CES
10720 return NULL;
10721}
10722
b34976b6 10723static bfd_boolean
718175fa 10724elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset)
252b5132 10725{
c044fabd 10726 char *p;
252b5132 10727
252b5132
RH
10728 p = buf;
10729 while (p < buf + size)
10730 {
c044fabd
KH
10731 /* FIXME: bad alignment assumption. */
10732 Elf_External_Note *xnp = (Elf_External_Note *) p;
252b5132
RH
10733 Elf_Internal_Note in;
10734
baea7ef1
AM
10735 if (offsetof (Elf_External_Note, name) > buf - p + size)
10736 return FALSE;
10737
dc810e39 10738 in.type = H_GET_32 (abfd, xnp->type);
252b5132 10739
dc810e39 10740 in.namesz = H_GET_32 (abfd, xnp->namesz);
252b5132 10741 in.namedata = xnp->name;
baea7ef1
AM
10742 if (in.namesz > buf - in.namedata + size)
10743 return FALSE;
252b5132 10744
dc810e39 10745 in.descsz = H_GET_32 (abfd, xnp->descsz);
252b5132
RH
10746 in.descdata = in.namedata + BFD_ALIGN (in.namesz, 4);
10747 in.descpos = offset + (in.descdata - buf);
baea7ef1
AM
10748 if (in.descsz != 0
10749 && (in.descdata >= buf + size
10750 || in.descsz > buf - in.descdata + size))
10751 return FALSE;
252b5132 10752
718175fa
JK
10753 switch (bfd_get_format (abfd))
10754 {
10755 default:
10756 return TRUE;
10757
10758 case bfd_core:
f64e188b 10759 {
8acbedd6 10760#define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
f64e188b 10761 struct
718175fa 10762 {
f64e188b 10763 const char * string;
8acbedd6 10764 size_t len;
f64e188b 10765 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
718175fa 10766 }
f64e188b 10767 grokers[] =
b15fa79e 10768 {
8acbedd6 10769 GROKER_ELEMENT ("", elfcore_grok_note),
aa1ed4a9 10770 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
8acbedd6
KS
10771 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
10772 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
10773 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
10774 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note)
f64e188b 10775 };
8acbedd6 10776#undef GROKER_ELEMENT
f64e188b
NC
10777 int i;
10778
10779 for (i = ARRAY_SIZE (grokers); i--;)
8acbedd6
KS
10780 {
10781 if (in.namesz >= grokers[i].len
10782 && strncmp (in.namedata, grokers[i].string,
10783 grokers[i].len) == 0)
10784 {
10785 if (! grokers[i].func (abfd, & in))
10786 return FALSE;
10787 break;
10788 }
10789 }
f64e188b
NC
10790 break;
10791 }
718175fa
JK
10792
10793 case bfd_object:
10794 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
10795 {
10796 if (! elfobj_grok_gnu_note (abfd, &in))
10797 return FALSE;
10798 }
e21e5835
NC
10799 else if (in.namesz == sizeof "stapsdt"
10800 && strcmp (in.namedata, "stapsdt") == 0)
10801 {
10802 if (! elfobj_grok_stapsdt_note (abfd, &in))
10803 return FALSE;
10804 }
718175fa 10805 break;
08a40648 10806 }
252b5132
RH
10807
10808 p = in.descdata + BFD_ALIGN (in.descsz, 4);
10809 }
10810
718175fa
JK
10811 return TRUE;
10812}
10813
10814static bfd_boolean
10815elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size)
10816{
10817 char *buf;
10818
10819 if (size <= 0)
10820 return TRUE;
10821
10822 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
10823 return FALSE;
10824
f64e188b 10825 buf = (char *) bfd_malloc (size + 1);
718175fa
JK
10826 if (buf == NULL)
10827 return FALSE;
10828
f64e188b
NC
10829 /* PR 17512: file: ec08f814
10830 0-termintate the buffer so that string searches will not overflow. */
10831 buf[size] = 0;
10832
718175fa
JK
10833 if (bfd_bread (buf, size, abfd) != size
10834 || !elf_parse_notes (abfd, buf, size, offset))
10835 {
10836 free (buf);
10837 return FALSE;
10838 }
10839
252b5132 10840 free (buf);
b34976b6 10841 return TRUE;
252b5132 10842}
98d8431c
JB
10843\f
10844/* Providing external access to the ELF program header table. */
10845
10846/* Return an upper bound on the number of bytes required to store a
10847 copy of ABFD's program header table entries. Return -1 if an error
10848 occurs; bfd_get_error will return an appropriate code. */
c044fabd 10849
98d8431c 10850long
217aa764 10851bfd_get_elf_phdr_upper_bound (bfd *abfd)
98d8431c
JB
10852{
10853 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10854 {
10855 bfd_set_error (bfd_error_wrong_format);
10856 return -1;
10857 }
10858
936e320b 10859 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
98d8431c
JB
10860}
10861
98d8431c
JB
10862/* Copy ABFD's program header table entries to *PHDRS. The entries
10863 will be stored as an array of Elf_Internal_Phdr structures, as
10864 defined in include/elf/internal.h. To find out how large the
10865 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
10866
10867 Return the number of program header table entries read, or -1 if an
10868 error occurs; bfd_get_error will return an appropriate code. */
c044fabd 10869
98d8431c 10870int
217aa764 10871bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
98d8431c
JB
10872{
10873 int num_phdrs;
10874
10875 if (abfd->xvec->flavour != bfd_target_elf_flavour)
10876 {
10877 bfd_set_error (bfd_error_wrong_format);
10878 return -1;
10879 }
10880
10881 num_phdrs = elf_elfheader (abfd)->e_phnum;
c044fabd 10882 memcpy (phdrs, elf_tdata (abfd)->phdr,
98d8431c
JB
10883 num_phdrs * sizeof (Elf_Internal_Phdr));
10884
10885 return num_phdrs;
10886}
ae4221d7 10887
db6751f2 10888enum elf_reloc_type_class
7e612e98
AM
10889_bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
10890 const asection *rel_sec ATTRIBUTE_UNUSED,
10891 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
db6751f2
JJ
10892{
10893 return reloc_class_normal;
10894}
f8df10f4 10895
47d9a591 10896/* For RELA architectures, return the relocation value for a
f8df10f4
JJ
10897 relocation against a local symbol. */
10898
10899bfd_vma
217aa764
AM
10900_bfd_elf_rela_local_sym (bfd *abfd,
10901 Elf_Internal_Sym *sym,
8517fae7 10902 asection **psec,
217aa764 10903 Elf_Internal_Rela *rel)
f8df10f4 10904{
8517fae7 10905 asection *sec = *psec;
f8df10f4
JJ
10906 bfd_vma relocation;
10907
10908 relocation = (sec->output_section->vma
10909 + sec->output_offset
10910 + sym->st_value);
10911 if ((sec->flags & SEC_MERGE)
c629eae0 10912 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
dbaa2011 10913 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
f8df10f4 10914 {
f8df10f4 10915 rel->r_addend =
8517fae7 10916 _bfd_merged_section_offset (abfd, psec,
65765700 10917 elf_section_data (sec)->sec_info,
753731ee
AM
10918 sym->st_value + rel->r_addend);
10919 if (sec != *psec)
10920 {
10921 /* If we have changed the section, and our original section is
10922 marked with SEC_EXCLUDE, it means that the original
10923 SEC_MERGE section has been completely subsumed in some
10924 other SEC_MERGE section. In this case, we need to leave
10925 some info around for --emit-relocs. */
10926 if ((sec->flags & SEC_EXCLUDE) != 0)
10927 sec->kept_section = *psec;
10928 sec = *psec;
10929 }
8517fae7
AM
10930 rel->r_addend -= relocation;
10931 rel->r_addend += sec->output_section->vma + sec->output_offset;
f8df10f4
JJ
10932 }
10933 return relocation;
10934}
c629eae0
JJ
10935
10936bfd_vma
217aa764
AM
10937_bfd_elf_rel_local_sym (bfd *abfd,
10938 Elf_Internal_Sym *sym,
10939 asection **psec,
10940 bfd_vma addend)
47d9a591 10941{
c629eae0
JJ
10942 asection *sec = *psec;
10943
dbaa2011 10944 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
c629eae0
JJ
10945 return sym->st_value + addend;
10946
10947 return _bfd_merged_section_offset (abfd, psec,
65765700 10948 elf_section_data (sec)->sec_info,
753731ee 10949 sym->st_value + addend);
c629eae0
JJ
10950}
10951
37b01f6a
DG
10952/* Adjust an address within a section. Given OFFSET within SEC, return
10953 the new offset within the section, based upon changes made to the
10954 section. Returns -1 if the offset is now invalid.
10955 The offset (in abnd out) is in target sized bytes, however big a
10956 byte may be. */
10957
c629eae0 10958bfd_vma
217aa764 10959_bfd_elf_section_offset (bfd *abfd,
92e4ec35 10960 struct bfd_link_info *info,
217aa764
AM
10961 asection *sec,
10962 bfd_vma offset)
c629eae0 10963{
68bfbfcc 10964 switch (sec->sec_info_type)
65765700 10965 {
dbaa2011 10966 case SEC_INFO_TYPE_STABS:
eea6121a
AM
10967 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
10968 offset);
dbaa2011 10969 case SEC_INFO_TYPE_EH_FRAME:
92e4ec35 10970 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
37b01f6a 10971
65765700 10972 default:
310fd250
L
10973 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
10974 {
37b01f6a 10975 /* Reverse the offset. */
310fd250
L
10976 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10977 bfd_size_type address_size = bed->s->arch_size / 8;
37b01f6a
DG
10978
10979 /* address_size and sec->size are in octets. Convert
10980 to bytes before subtracting the original offset. */
10981 offset = (sec->size - address_size) / bfd_octets_per_byte (abfd) - offset;
310fd250 10982 }
65765700
JJ
10983 return offset;
10984 }
c629eae0 10985}
3333a7c3
RM
10986\f
10987/* Create a new BFD as if by bfd_openr. Rather than opening a file,
10988 reconstruct an ELF file by reading the segments out of remote memory
10989 based on the ELF file header at EHDR_VMA and the ELF program headers it
10990 points to. If not null, *LOADBASEP is filled in with the difference
10991 between the VMAs from which the segments were read, and the VMAs the
10992 file headers (and hence BFD's idea of each section's VMA) put them at.
10993
10994 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
10995 remote memory at target address VMA into the local buffer at MYADDR; it
10996 should return zero on success or an `errno' code on failure. TEMPL must
10997 be a BFD for an ELF target with the word size and byte order found in
10998 the remote memory. */
10999
11000bfd *
217aa764
AM
11001bfd_elf_bfd_from_remote_memory
11002 (bfd *templ,
11003 bfd_vma ehdr_vma,
f0a5d95a 11004 bfd_size_type size,
217aa764 11005 bfd_vma *loadbasep,
fe78531d 11006 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
3333a7c3
RM
11007{
11008 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
5979d6b6 11009 (templ, ehdr_vma, size, loadbasep, target_read_memory);
3333a7c3 11010}
4c45e5c9
JJ
11011\f
11012long
c9727e01
AM
11013_bfd_elf_get_synthetic_symtab (bfd *abfd,
11014 long symcount ATTRIBUTE_UNUSED,
11015 asymbol **syms ATTRIBUTE_UNUSED,
8615f3f2 11016 long dynsymcount,
c9727e01
AM
11017 asymbol **dynsyms,
11018 asymbol **ret)
4c45e5c9
JJ
11019{
11020 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11021 asection *relplt;
11022 asymbol *s;
11023 const char *relplt_name;
11024 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
11025 arelent *p;
11026 long count, i, n;
11027 size_t size;
11028 Elf_Internal_Shdr *hdr;
11029 char *names;
11030 asection *plt;
11031
8615f3f2
AM
11032 *ret = NULL;
11033
90e3cdf2
JJ
11034 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
11035 return 0;
11036
8615f3f2
AM
11037 if (dynsymcount <= 0)
11038 return 0;
11039
4c45e5c9
JJ
11040 if (!bed->plt_sym_val)
11041 return 0;
11042
11043 relplt_name = bed->relplt_name;
11044 if (relplt_name == NULL)
d35fd659 11045 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
4c45e5c9
JJ
11046 relplt = bfd_get_section_by_name (abfd, relplt_name);
11047 if (relplt == NULL)
11048 return 0;
11049
11050 hdr = &elf_section_data (relplt)->this_hdr;
11051 if (hdr->sh_link != elf_dynsymtab (abfd)
11052 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
11053 return 0;
11054
11055 plt = bfd_get_section_by_name (abfd, ".plt");
11056 if (plt == NULL)
11057 return 0;
11058
11059 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
c9727e01 11060 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
4c45e5c9
JJ
11061 return -1;
11062
eea6121a 11063 count = relplt->size / hdr->sh_entsize;
4c45e5c9
JJ
11064 size = count * sizeof (asymbol);
11065 p = relplt->relocation;
cb53bf42 11066 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
041de40d
AM
11067 {
11068 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
11069 if (p->addend != 0)
11070 {
11071#ifdef BFD64
11072 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
11073#else
11074 size += sizeof ("+0x") - 1 + 8;
11075#endif
11076 }
11077 }
4c45e5c9 11078
a50b1753 11079 s = *ret = (asymbol *) bfd_malloc (size);
4c45e5c9
JJ
11080 if (s == NULL)
11081 return -1;
11082
11083 names = (char *) (s + count);
11084 p = relplt->relocation;
11085 n = 0;
cb53bf42 11086 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
4c45e5c9
JJ
11087 {
11088 size_t len;
11089 bfd_vma addr;
11090
11091 addr = bed->plt_sym_val (i, plt, p);
11092 if (addr == (bfd_vma) -1)
11093 continue;
11094
11095 *s = **p->sym_ptr_ptr;
65a7a66f
AM
11096 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
11097 we are defining a symbol, ensure one of them is set. */
11098 if ((s->flags & BSF_LOCAL) == 0)
11099 s->flags |= BSF_GLOBAL;
6ba2a415 11100 s->flags |= BSF_SYNTHETIC;
4c45e5c9
JJ
11101 s->section = plt;
11102 s->value = addr - plt->vma;
11103 s->name = names;
8f39ba8e 11104 s->udata.p = NULL;
4c45e5c9
JJ
11105 len = strlen ((*p->sym_ptr_ptr)->name);
11106 memcpy (names, (*p->sym_ptr_ptr)->name, len);
11107 names += len;
041de40d
AM
11108 if (p->addend != 0)
11109 {
1d770845 11110 char buf[30], *a;
d324f6d6 11111
041de40d
AM
11112 memcpy (names, "+0x", sizeof ("+0x") - 1);
11113 names += sizeof ("+0x") - 1;
1d770845
L
11114 bfd_sprintf_vma (abfd, buf, p->addend);
11115 for (a = buf; *a == '0'; ++a)
11116 ;
11117 len = strlen (a);
11118 memcpy (names, a, len);
11119 names += len;
041de40d 11120 }
4c45e5c9
JJ
11121 memcpy (names, "@plt", sizeof ("@plt"));
11122 names += sizeof ("@plt");
8f39ba8e 11123 ++s, ++n;
4c45e5c9
JJ
11124 }
11125
11126 return n;
11127}
3d7f7666 11128
821e6ff6
AM
11129/* It is only used by x86-64 so far.
11130 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
11131 but current usage would allow all of _bfd_std_section to be zero. t*/
3b22753a 11132asection _bfd_elf_large_com_section
821e6ff6
AM
11133 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, NULL,
11134 "LARGE_COMMON", 0, SEC_IS_COMMON);
ecca9871 11135
d1036acb 11136void
78245035
L
11137_bfd_elf_post_process_headers (bfd * abfd,
11138 struct bfd_link_info * link_info ATTRIBUTE_UNUSED)
d1036acb
L
11139{
11140 Elf_Internal_Ehdr * i_ehdrp; /* ELF file header, internal form. */
11141
11142 i_ehdrp = elf_elfheader (abfd);
11143
11144 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
d8045f23
NC
11145
11146 /* To make things simpler for the loader on Linux systems we set the
9c55345c 11147 osabi field to ELFOSABI_GNU if the binary contains symbols of
f64b2e8d 11148 the STT_GNU_IFUNC type or STB_GNU_UNIQUE binding. */
d8045f23 11149 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE
f64b2e8d 11150 && elf_tdata (abfd)->has_gnu_symbols)
9c55345c 11151 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
d1036acb 11152}
fcb93ecf
PB
11153
11154
11155/* Return TRUE for ELF symbol types that represent functions.
11156 This is the default version of this function, which is sufficient for
d8045f23 11157 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
fcb93ecf
PB
11158
11159bfd_boolean
11160_bfd_elf_is_function_type (unsigned int type)
11161{
d8045f23
NC
11162 return (type == STT_FUNC
11163 || type == STT_GNU_IFUNC);
fcb93ecf 11164}
9f296da3 11165
aef36ac1
AM
11166/* If the ELF symbol SYM might be a function in SEC, return the
11167 function size and set *CODE_OFF to the function's entry point,
11168 otherwise return zero. */
9f296da3 11169
aef36ac1
AM
11170bfd_size_type
11171_bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
11172 bfd_vma *code_off)
9f296da3 11173{
aef36ac1
AM
11174 bfd_size_type size;
11175
ff9e0f5b 11176 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
aef36ac1
AM
11177 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
11178 || sym->section != sec)
11179 return 0;
ff9e0f5b 11180
ff9e0f5b 11181 *code_off = sym->value;
aef36ac1
AM
11182 size = 0;
11183 if (!(sym->flags & BSF_SYNTHETIC))
11184 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
11185 if (size == 0)
11186 size = 1;
11187 return size;
9f296da3 11188}
This page took 3.10696 seconds and 4 git commands to generate.