elf_backend_section_flags and _bfd_elf_init_private_section_data
[deliverable/binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
55 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
56 file_ptr offset, size_t align);
57
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62 /* Swap in a Verdef structure. */
63
64 void
65 _bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
68 {
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
76 }
77
78 /* Swap out a Verdef structure. */
79
80 void
81 _bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
84 {
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
92 }
93
94 /* Swap in a Verdaux structure. */
95
96 void
97 _bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
100 {
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
103 }
104
105 /* Swap out a Verdaux structure. */
106
107 void
108 _bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
111 {
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
114 }
115
116 /* Swap in a Verneed structure. */
117
118 void
119 _bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
122 {
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
128 }
129
130 /* Swap out a Verneed structure. */
131
132 void
133 _bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
136 {
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
142 }
143
144 /* Swap in a Vernaux structure. */
145
146 void
147 _bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
150 {
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
156 }
157
158 /* Swap out a Vernaux structure. */
159
160 void
161 _bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
164 {
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
170 }
171
172 /* Swap in a Versym structure. */
173
174 void
175 _bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
178 {
179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
180 }
181
182 /* Swap out a Versym structure. */
183
184 void
185 _bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
188 {
189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
190 }
191
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
194
195 unsigned long
196 bfd_elf_hash (const char *namearg)
197 {
198 const unsigned char *name = (const unsigned char *) namearg;
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
214 return h & 0xffffffff;
215 }
216
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220 unsigned long
221 bfd_elf_gnu_hash (const char *namearg)
222 {
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230 }
231
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
234 bfd_boolean
235 bfd_elf_allocate_object (bfd *abfd,
236 size_t object_size,
237 enum elf_target_id object_id)
238 {
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
243
244 elf_object_id (abfd) = object_id;
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
253 return TRUE;
254 }
255
256
257 bfd_boolean
258 bfd_elf_make_object (bfd *abfd)
259 {
260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
262 bed->target_id);
263 }
264
265 bfd_boolean
266 bfd_elf_mkcorefile (bfd *abfd)
267 {
268 /* I think this can be done just like an object file. */
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
273 }
274
275 char *
276 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
277 {
278 Elf_Internal_Shdr **i_shdrp;
279 bfd_byte *shstrtab = NULL;
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
282
283 i_shdrp = elf_elfsections (abfd);
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
287 return NULL;
288
289 shstrtab = i_shdrp[shindex]->contents;
290 if (shstrtab == NULL)
291 {
292 /* No cached one, attempt to read, and cache what we read. */
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize + 1 <= 1
299 || bfd_seek (abfd, offset, SEEK_SET) != 0
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
310 i_shdrp[shindex]->contents = shstrtab;
311 }
312 return (char *) shstrtab;
313 }
314
315 char *
316 bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
319 {
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
328 hdr = elf_elfsections (abfd)[shindex];
329
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
338 abfd, shindex);
339 return NULL;
340 }
341
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
355
356 if (strindex >= hdr->sh_size)
357 {
358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
359 _bfd_error_handler
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
363 (shindex == shstrndx && strindex == hdr->sh_name
364 ? ".shstrtab"
365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
366 return NULL;
367 }
368
369 return ((char *) hdr->contents) + strindex;
370 }
371
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
379
380 Elf_Internal_Sym *
381 bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
388 {
389 Elf_Internal_Shdr *shndx_hdr;
390 void *alloc_ext;
391 const bfd_byte *esym;
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
394 Elf_Internal_Sym *alloc_intsym;
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
397 const struct elf_backend_data *bed;
398 size_t extsym_size;
399 size_t amt;
400 file_ptr pos;
401
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
442 alloc_intsym = NULL;
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
454 alloc_ext = bfd_malloc (amt);
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
498 intsym_buf = alloc_intsym;
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
506 shndx = extshndx_buf;
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd, (unsigned long) symoffset);
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529 }
530
531 /* Look up a symbol name. */
532 const char *
533 bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
537 {
538 const char *name;
539 unsigned int iname = isym->st_name;
540 unsigned int shindex = symtab_hdr->sh_link;
541
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym->st_shndx < elf_numsections (abfd))
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
554 name = bfd_section_name (sym_sec);
555
556 return name;
557 }
558
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563 typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566 } Elf_Internal_Group;
567
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571 static const char *
572 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 {
574 Elf_Internal_Shdr *hdr;
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
578
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
586 return NULL;
587
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
592 return NULL;
593
594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
595 }
596
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
598
599 static bfd_boolean
600 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 {
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum = elf_numsections (abfd);
613 num_group = 0;
614
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
626 num_group += 1;
627 }
628
629 if (num_group == 0)
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
633 elf_tdata (abfd)->group_sect_ptr = NULL;
634 }
635 else
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
639 size_t amt;
640
641 elf_tdata (abfd)->num_group = num_group;
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
646 return FALSE;
647 num_group = 0;
648
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 {
655 unsigned char *src;
656 Elf_Internal_Group *dest;
657
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 {
676 _bfd_error_handler
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
683 continue;
684 }
685
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->shdr = NULL;
703 dest->flags = idx;
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
707 break;
708 }
709 if (idx < shnum)
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
721 {
722 _bfd_error_handler
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
726 }
727 }
728 }
729 }
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
741 _bfd_error_handler
742 (_("%pB: no valid group sections found"), abfd);
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
753
754 for (j = 0; j < num_group; j++)
755 {
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
760 Elf_Internal_Group *idx;
761 bfd_size_type n_elt;
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
777 n_elt = shdr->sh_size / 4;
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
784 asection *s = NULL;
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
794 && elf_next_in_group (s) != NULL)
795 break;
796 if (n_elt != 0)
797 {
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
803 }
804 else
805 {
806 const char *gname;
807
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
810 return FALSE;
811 elf_group_name (newsect) = gname;
812
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect) = newsect;
815 }
816
817 /* If the group section has been created, point to the
818 new member. */
819 if (shdr->bfd_section != NULL)
820 elf_next_in_group (shdr->bfd_section) = newsect;
821
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
824 break;
825 }
826 }
827 }
828
829 if (elf_group_name (newsect) == NULL)
830 {
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
833 abfd, newsect);
834 return FALSE;
835 }
836 return TRUE;
837 }
838
839 bfd_boolean
840 _bfd_elf_setup_sections (bfd *abfd)
841 {
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
860 if (bed->link_order_error_handler)
861 bed->link_order_error_handler
862 /* xgettext:c-format */
863 (_("%pB: warning: sh_link not set for section `%pA'"),
864 abfd, s);
865 }
866 else
867 {
868 asection *linksec = NULL;
869
870 if (elfsec < elf_numsections (abfd))
871 {
872 this_hdr = elf_elfsections (abfd)[elfsec];
873 linksec = this_hdr->bfd_section;
874 }
875
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
879 if (linksec == NULL)
880 {
881 _bfd_error_handler
882 /* xgettext:c-format */
883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
884 s->owner, elfsec, s);
885 result = FALSE;
886 }
887
888 elf_linked_to_section (s) = linksec;
889 }
890 }
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
893 {
894 _bfd_error_handler
895 /* xgettext:c-format */
896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
897 abfd, elf_section_data (s)->this_idx);
898 result = FALSE;
899 }
900 }
901
902 /* Process section groups. */
903 if (num_group == (unsigned) -1)
904 return result;
905
906 for (i = 0; i < num_group; i++)
907 {
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
911
912 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
913 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
914 {
915 _bfd_error_handler
916 /* xgettext:c-format */
917 (_("%pB: section group entry number %u is corrupt"),
918 abfd, i);
919 result = FALSE;
920 continue;
921 }
922
923 idx = (Elf_Internal_Group *) shdr->contents;
924 n_elt = shdr->sh_size / 4;
925
926 while (--n_elt != 0)
927 {
928 ++ idx;
929
930 if (idx->shdr == NULL)
931 continue;
932 else if (idx->shdr->bfd_section)
933 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
934 else if (idx->shdr->sh_type != SHT_RELA
935 && idx->shdr->sh_type != SHT_REL)
936 {
937 /* There are some unknown sections in the group. */
938 _bfd_error_handler
939 /* xgettext:c-format */
940 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
941 abfd,
942 idx->shdr->sh_type,
943 bfd_elf_string_from_elf_section (abfd,
944 (elf_elfheader (abfd)
945 ->e_shstrndx),
946 idx->shdr->sh_name),
947 shdr->bfd_section);
948 result = FALSE;
949 }
950 }
951 }
952
953 return result;
954 }
955
956 bfd_boolean
957 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
958 {
959 return elf_next_in_group (sec) != NULL;
960 }
961
962 const char *
963 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
964 {
965 if (elf_sec_group (sec) != NULL)
966 return elf_group_name (sec);
967 return NULL;
968 }
969
970 static char *
971 convert_debug_to_zdebug (bfd *abfd, const char *name)
972 {
973 unsigned int len = strlen (name);
974 char *new_name = bfd_alloc (abfd, len + 2);
975 if (new_name == NULL)
976 return NULL;
977 new_name[0] = '.';
978 new_name[1] = 'z';
979 memcpy (new_name + 2, name + 1, len);
980 return new_name;
981 }
982
983 static char *
984 convert_zdebug_to_debug (bfd *abfd, const char *name)
985 {
986 unsigned int len = strlen (name);
987 char *new_name = bfd_alloc (abfd, len);
988 if (new_name == NULL)
989 return NULL;
990 new_name[0] = '.';
991 memcpy (new_name + 1, name + 2, len - 1);
992 return new_name;
993 }
994
995 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
996
997 struct lto_section
998 {
999 int16_t major_version;
1000 int16_t minor_version;
1001 unsigned char slim_object;
1002
1003 /* Flags is a private field that is not defined publicly. */
1004 uint16_t flags;
1005 };
1006
1007 /* Make a BFD section from an ELF section. We store a pointer to the
1008 BFD section in the bfd_section field of the header. */
1009
1010 bfd_boolean
1011 _bfd_elf_make_section_from_shdr (bfd *abfd,
1012 Elf_Internal_Shdr *hdr,
1013 const char *name,
1014 int shindex)
1015 {
1016 asection *newsect;
1017 flagword flags;
1018 const struct elf_backend_data *bed;
1019
1020 if (hdr->bfd_section != NULL)
1021 return TRUE;
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
1025 return FALSE;
1026
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
1029 elf_section_data (newsect)->this_idx = shindex;
1030
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
1035 newsect->filepos = hdr->sh_offset;
1036
1037 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1038 || !bfd_set_section_size (newsect, hdr->sh_size)
1039 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1040 return FALSE;
1041
1042 flags = SEC_NO_FLAGS;
1043 if (hdr->sh_type != SHT_NOBITS)
1044 flags |= SEC_HAS_CONTENTS;
1045 if (hdr->sh_type == SHT_GROUP)
1046 flags |= SEC_GROUP;
1047 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1048 {
1049 flags |= SEC_ALLOC;
1050 if (hdr->sh_type != SHT_NOBITS)
1051 flags |= SEC_LOAD;
1052 }
1053 if ((hdr->sh_flags & SHF_WRITE) == 0)
1054 flags |= SEC_READONLY;
1055 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1056 flags |= SEC_CODE;
1057 else if ((flags & SEC_LOAD) != 0)
1058 flags |= SEC_DATA;
1059 if ((hdr->sh_flags & SHF_MERGE) != 0)
1060 {
1061 flags |= SEC_MERGE;
1062 newsect->entsize = hdr->sh_entsize;
1063 }
1064 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1065 flags |= SEC_STRINGS;
1066 if (hdr->sh_flags & SHF_GROUP)
1067 if (!setup_group (abfd, hdr, newsect))
1068 return FALSE;
1069 if ((hdr->sh_flags & SHF_TLS) != 0)
1070 flags |= SEC_THREAD_LOCAL;
1071 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1072 flags |= SEC_EXCLUDE;
1073
1074 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1075 {
1076 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1077 but binutils as of 2019-07-23 did not set the EI_OSABI header
1078 byte. */
1079 case ELFOSABI_NONE:
1080 case ELFOSABI_GNU:
1081 case ELFOSABI_FREEBSD:
1082 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1083 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1084 break;
1085 }
1086
1087 if ((flags & SEC_ALLOC) == 0)
1088 {
1089 /* The debugging sections appear to be recognized only by name,
1090 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1091 if (name [0] == '.')
1092 {
1093 if (strncmp (name, ".debug", 6) == 0
1094 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1095 || strncmp (name, ".zdebug", 7) == 0)
1096 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1097 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1098 || strncmp (name, ".note.gnu", 9) == 0)
1099 flags |= SEC_ELF_OCTETS;
1100 else if (strncmp (name, ".line", 5) == 0
1101 || strncmp (name, ".stab", 5) == 0
1102 || strcmp (name, ".gdb_index") == 0)
1103 flags |= SEC_DEBUGGING;
1104 }
1105 }
1106
1107 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1108 only link a single copy of the section. This is used to support
1109 g++. g++ will emit each template expansion in its own section.
1110 The symbols will be defined as weak, so that multiple definitions
1111 are permitted. The GNU linker extension is to actually discard
1112 all but one of the sections. */
1113 if (CONST_STRNEQ (name, ".gnu.linkonce")
1114 && elf_next_in_group (newsect) == NULL)
1115 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1116
1117 if (!bfd_set_section_flags (newsect, flags))
1118 return FALSE;
1119
1120 bed = get_elf_backend_data (abfd);
1121 if (bed->elf_backend_section_flags)
1122 if (!bed->elf_backend_section_flags (hdr))
1123 return FALSE;
1124
1125 /* We do not parse the PT_NOTE segments as we are interested even in the
1126 separate debug info files which may have the segments offsets corrupted.
1127 PT_NOTEs from the core files are currently not parsed using BFD. */
1128 if (hdr->sh_type == SHT_NOTE)
1129 {
1130 bfd_byte *contents;
1131
1132 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1133 return FALSE;
1134
1135 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1136 hdr->sh_offset, hdr->sh_addralign);
1137 free (contents);
1138 }
1139
1140 if ((newsect->flags & SEC_ALLOC) != 0)
1141 {
1142 Elf_Internal_Phdr *phdr;
1143 unsigned int i, nload;
1144
1145 /* Some ELF linkers produce binaries with all the program header
1146 p_paddr fields zero. If we have such a binary with more than
1147 one PT_LOAD header, then leave the section lma equal to vma
1148 so that we don't create sections with overlapping lma. */
1149 phdr = elf_tdata (abfd)->phdr;
1150 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1151 if (phdr->p_paddr != 0)
1152 break;
1153 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1154 ++nload;
1155 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1156 return TRUE;
1157
1158 phdr = elf_tdata (abfd)->phdr;
1159 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1160 {
1161 if (((phdr->p_type == PT_LOAD
1162 && (hdr->sh_flags & SHF_TLS) == 0)
1163 || phdr->p_type == PT_TLS)
1164 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1165 {
1166 if ((newsect->flags & SEC_LOAD) == 0)
1167 newsect->lma = (phdr->p_paddr
1168 + hdr->sh_addr - phdr->p_vaddr);
1169 else
1170 /* We used to use the same adjustment for SEC_LOAD
1171 sections, but that doesn't work if the segment
1172 is packed with code from multiple VMAs.
1173 Instead we calculate the section LMA based on
1174 the segment LMA. It is assumed that the
1175 segment will contain sections with contiguous
1176 LMAs, even if the VMAs are not. */
1177 newsect->lma = (phdr->p_paddr
1178 + hdr->sh_offset - phdr->p_offset);
1179
1180 /* With contiguous segments, we can't tell from file
1181 offsets whether a section with zero size should
1182 be placed at the end of one segment or the
1183 beginning of the next. Decide based on vaddr. */
1184 if (hdr->sh_addr >= phdr->p_vaddr
1185 && (hdr->sh_addr + hdr->sh_size
1186 <= phdr->p_vaddr + phdr->p_memsz))
1187 break;
1188 }
1189 }
1190 }
1191
1192 /* Compress/decompress DWARF debug sections with names: .debug_* and
1193 .zdebug_*, after the section flags is set. */
1194 if ((newsect->flags & SEC_DEBUGGING)
1195 && ((name[1] == 'd' && name[6] == '_')
1196 || (name[1] == 'z' && name[7] == '_')))
1197 {
1198 enum { nothing, compress, decompress } action = nothing;
1199 int compression_header_size;
1200 bfd_size_type uncompressed_size;
1201 unsigned int uncompressed_align_power;
1202 bfd_boolean compressed
1203 = bfd_is_section_compressed_with_header (abfd, newsect,
1204 &compression_header_size,
1205 &uncompressed_size,
1206 &uncompressed_align_power);
1207 if (compressed)
1208 {
1209 /* Compressed section. Check if we should decompress. */
1210 if ((abfd->flags & BFD_DECOMPRESS))
1211 action = decompress;
1212 }
1213
1214 /* Compress the uncompressed section or convert from/to .zdebug*
1215 section. Check if we should compress. */
1216 if (action == nothing)
1217 {
1218 if (newsect->size != 0
1219 && (abfd->flags & BFD_COMPRESS)
1220 && compression_header_size >= 0
1221 && uncompressed_size > 0
1222 && (!compressed
1223 || ((compression_header_size > 0)
1224 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1225 action = compress;
1226 else
1227 return TRUE;
1228 }
1229
1230 if (action == compress)
1231 {
1232 if (!bfd_init_section_compress_status (abfd, newsect))
1233 {
1234 _bfd_error_handler
1235 /* xgettext:c-format */
1236 (_("%pB: unable to initialize compress status for section %s"),
1237 abfd, name);
1238 return FALSE;
1239 }
1240 }
1241 else
1242 {
1243 if (!bfd_init_section_decompress_status (abfd, newsect))
1244 {
1245 _bfd_error_handler
1246 /* xgettext:c-format */
1247 (_("%pB: unable to initialize decompress status for section %s"),
1248 abfd, name);
1249 return FALSE;
1250 }
1251 }
1252
1253 if (abfd->is_linker_input)
1254 {
1255 if (name[1] == 'z'
1256 && (action == decompress
1257 || (action == compress
1258 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1259 {
1260 /* Convert section name from .zdebug_* to .debug_* so
1261 that linker will consider this section as a debug
1262 section. */
1263 char *new_name = convert_zdebug_to_debug (abfd, name);
1264 if (new_name == NULL)
1265 return FALSE;
1266 bfd_rename_section (newsect, new_name);
1267 }
1268 }
1269 else
1270 /* For objdump, don't rename the section. For objcopy, delay
1271 section rename to elf_fake_sections. */
1272 newsect->flags |= SEC_ELF_RENAME;
1273 }
1274
1275 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1276 section. */
1277 const char *lto_section_name = ".gnu.lto_.lto.";
1278 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1279 {
1280 struct lto_section lsection;
1281 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1282 sizeof (struct lto_section)))
1283 abfd->lto_slim_object = lsection.slim_object;
1284 }
1285
1286 return TRUE;
1287 }
1288
1289 const char *const bfd_elf_section_type_names[] =
1290 {
1291 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1292 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1293 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1294 };
1295
1296 /* ELF relocs are against symbols. If we are producing relocatable
1297 output, and the reloc is against an external symbol, and nothing
1298 has given us any additional addend, the resulting reloc will also
1299 be against the same symbol. In such a case, we don't want to
1300 change anything about the way the reloc is handled, since it will
1301 all be done at final link time. Rather than put special case code
1302 into bfd_perform_relocation, all the reloc types use this howto
1303 function. It just short circuits the reloc if producing
1304 relocatable output against an external symbol. */
1305
1306 bfd_reloc_status_type
1307 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1308 arelent *reloc_entry,
1309 asymbol *symbol,
1310 void *data ATTRIBUTE_UNUSED,
1311 asection *input_section,
1312 bfd *output_bfd,
1313 char **error_message ATTRIBUTE_UNUSED)
1314 {
1315 if (output_bfd != NULL
1316 && (symbol->flags & BSF_SECTION_SYM) == 0
1317 && (! reloc_entry->howto->partial_inplace
1318 || reloc_entry->addend == 0))
1319 {
1320 reloc_entry->address += input_section->output_offset;
1321 return bfd_reloc_ok;
1322 }
1323
1324 return bfd_reloc_continue;
1325 }
1326 \f
1327 /* Returns TRUE if section A matches section B.
1328 Names, addresses and links may be different, but everything else
1329 should be the same. */
1330
1331 static bfd_boolean
1332 section_match (const Elf_Internal_Shdr * a,
1333 const Elf_Internal_Shdr * b)
1334 {
1335 if (a->sh_type != b->sh_type
1336 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1337 || a->sh_addralign != b->sh_addralign
1338 || a->sh_entsize != b->sh_entsize)
1339 return FALSE;
1340 if (a->sh_type == SHT_SYMTAB
1341 || a->sh_type == SHT_STRTAB)
1342 return TRUE;
1343 return a->sh_size == b->sh_size;
1344 }
1345
1346 /* Find a section in OBFD that has the same characteristics
1347 as IHEADER. Return the index of this section or SHN_UNDEF if
1348 none can be found. Check's section HINT first, as this is likely
1349 to be the correct section. */
1350
1351 static unsigned int
1352 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1353 const unsigned int hint)
1354 {
1355 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1356 unsigned int i;
1357
1358 BFD_ASSERT (iheader != NULL);
1359
1360 /* See PR 20922 for a reproducer of the NULL test. */
1361 if (hint < elf_numsections (obfd)
1362 && oheaders[hint] != NULL
1363 && section_match (oheaders[hint], iheader))
1364 return hint;
1365
1366 for (i = 1; i < elf_numsections (obfd); i++)
1367 {
1368 Elf_Internal_Shdr * oheader = oheaders[i];
1369
1370 if (oheader == NULL)
1371 continue;
1372 if (section_match (oheader, iheader))
1373 /* FIXME: Do we care if there is a potential for
1374 multiple matches ? */
1375 return i;
1376 }
1377
1378 return SHN_UNDEF;
1379 }
1380
1381 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1382 Processor specific section, based upon a matching input section.
1383 Returns TRUE upon success, FALSE otherwise. */
1384
1385 static bfd_boolean
1386 copy_special_section_fields (const bfd *ibfd,
1387 bfd *obfd,
1388 const Elf_Internal_Shdr *iheader,
1389 Elf_Internal_Shdr *oheader,
1390 const unsigned int secnum)
1391 {
1392 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bfd_boolean changed = FALSE;
1395 unsigned int sh_link;
1396
1397 if (oheader->sh_type == SHT_NOBITS)
1398 {
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1403
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return TRUE;
1420 }
1421
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields != NULL
1424 && bed->elf_backend_copy_special_section_fields
1425 (ibfd, obfd, iheader, oheader))
1426 return TRUE;
1427
1428 /* We have an iheader which might match oheader, and which has non-zero
1429 sh_info and/or sh_link fields. Attempt to follow those links and find
1430 the section in the output bfd which corresponds to the linked section
1431 in the input bfd. */
1432 if (iheader->sh_link != SHN_UNDEF)
1433 {
1434 /* See PR 20931 for a reproducer. */
1435 if (iheader->sh_link >= elf_numsections (ibfd))
1436 {
1437 _bfd_error_handler
1438 /* xgettext:c-format */
1439 (_("%pB: invalid sh_link field (%d) in section number %d"),
1440 ibfd, iheader->sh_link, secnum);
1441 return FALSE;
1442 }
1443
1444 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1445 if (sh_link != SHN_UNDEF)
1446 {
1447 oheader->sh_link = sh_link;
1448 changed = TRUE;
1449 }
1450 else
1451 /* FIXME: Should we install iheader->sh_link
1452 if we could not find a match ? */
1453 _bfd_error_handler
1454 /* xgettext:c-format */
1455 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1456 }
1457
1458 if (iheader->sh_info)
1459 {
1460 /* The sh_info field can hold arbitrary information, but if the
1461 SHF_LINK_INFO flag is set then it should be interpreted as a
1462 section index. */
1463 if (iheader->sh_flags & SHF_INFO_LINK)
1464 {
1465 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1466 iheader->sh_info);
1467 if (sh_link != SHN_UNDEF)
1468 oheader->sh_flags |= SHF_INFO_LINK;
1469 }
1470 else
1471 /* No idea what it means - just copy it. */
1472 sh_link = iheader->sh_info;
1473
1474 if (sh_link != SHN_UNDEF)
1475 {
1476 oheader->sh_info = sh_link;
1477 changed = TRUE;
1478 }
1479 else
1480 _bfd_error_handler
1481 /* xgettext:c-format */
1482 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1483 }
1484
1485 return changed;
1486 }
1487
1488 /* Copy the program header and other data from one object module to
1489 another. */
1490
1491 bfd_boolean
1492 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1493 {
1494 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
1497 unsigned int i;
1498
1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1501 return TRUE;
1502
1503 if (!elf_flags_init (obfd))
1504 {
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = TRUE;
1507 }
1508
1509 elf_gp (obfd) = elf_gp (ibfd);
1510
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1514
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1519
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1522
1523 if (iheaders == NULL || oheaders == NULL)
1524 return TRUE;
1525
1526 bed = get_elf_backend_data (obfd);
1527
1528 /* Possibly copy other fields in the section header. */
1529 for (i = 1; i < elf_numsections (obfd); i++)
1530 {
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
1533
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1541
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
1547
1548 /* Scan for the matching section in the input bfd.
1549 First we try for a direct mapping between the input and output sections. */
1550 for (j = 1; j < elf_numsections (ibfd); j++)
1551 {
1552 const Elf_Internal_Shdr * iheader = iheaders[j];
1553
1554 if (iheader == NULL)
1555 continue;
1556
1557 if (oheader->bfd_section != NULL
1558 && iheader->bfd_section != NULL
1559 && iheader->bfd_section->output_section != NULL
1560 && iheader->bfd_section->output_section == oheader->bfd_section)
1561 {
1562 /* We have found a connection from the input section to the
1563 output section. Attempt to copy the header fields. If
1564 this fails then do not try any further sections - there
1565 should only be a one-to-one mapping between input and output. */
1566 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1567 j = elf_numsections (ibfd);
1568 break;
1569 }
1570 }
1571
1572 if (j < elf_numsections (ibfd))
1573 continue;
1574
1575 /* That failed. So try to deduce the corresponding input section.
1576 Unfortunately we cannot compare names as the output string table
1577 is empty, so instead we check size, address and type. */
1578 for (j = 1; j < elf_numsections (ibfd); j++)
1579 {
1580 const Elf_Internal_Shdr * iheader = iheaders[j];
1581
1582 if (iheader == NULL)
1583 continue;
1584
1585 /* Try matching fields in the input section's header.
1586 Since --only-keep-debug turns all non-debug sections into
1587 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1588 input type. */
1589 if ((oheader->sh_type == SHT_NOBITS
1590 || iheader->sh_type == oheader->sh_type)
1591 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1592 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1593 && iheader->sh_addralign == oheader->sh_addralign
1594 && iheader->sh_entsize == oheader->sh_entsize
1595 && iheader->sh_size == oheader->sh_size
1596 && iheader->sh_addr == oheader->sh_addr
1597 && (iheader->sh_info != oheader->sh_info
1598 || iheader->sh_link != oheader->sh_link))
1599 {
1600 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1601 break;
1602 }
1603 }
1604
1605 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1606 {
1607 /* Final attempt. Call the backend copy function
1608 with a NULL input section. */
1609 if (bed->elf_backend_copy_special_section_fields != NULL)
1610 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1611 }
1612 }
1613
1614 return TRUE;
1615 }
1616
1617 static const char *
1618 get_segment_type (unsigned int p_type)
1619 {
1620 const char *pt;
1621 switch (p_type)
1622 {
1623 case PT_NULL: pt = "NULL"; break;
1624 case PT_LOAD: pt = "LOAD"; break;
1625 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1626 case PT_INTERP: pt = "INTERP"; break;
1627 case PT_NOTE: pt = "NOTE"; break;
1628 case PT_SHLIB: pt = "SHLIB"; break;
1629 case PT_PHDR: pt = "PHDR"; break;
1630 case PT_TLS: pt = "TLS"; break;
1631 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1632 case PT_GNU_STACK: pt = "STACK"; break;
1633 case PT_GNU_RELRO: pt = "RELRO"; break;
1634 default: pt = NULL; break;
1635 }
1636 return pt;
1637 }
1638
1639 /* Print out the program headers. */
1640
1641 bfd_boolean
1642 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1643 {
1644 FILE *f = (FILE *) farg;
1645 Elf_Internal_Phdr *p;
1646 asection *s;
1647 bfd_byte *dynbuf = NULL;
1648
1649 p = elf_tdata (abfd)->phdr;
1650 if (p != NULL)
1651 {
1652 unsigned int i, c;
1653
1654 fprintf (f, _("\nProgram Header:\n"));
1655 c = elf_elfheader (abfd)->e_phnum;
1656 for (i = 0; i < c; i++, p++)
1657 {
1658 const char *pt = get_segment_type (p->p_type);
1659 char buf[20];
1660
1661 if (pt == NULL)
1662 {
1663 sprintf (buf, "0x%lx", p->p_type);
1664 pt = buf;
1665 }
1666 fprintf (f, "%8s off 0x", pt);
1667 bfd_fprintf_vma (abfd, f, p->p_offset);
1668 fprintf (f, " vaddr 0x");
1669 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1670 fprintf (f, " paddr 0x");
1671 bfd_fprintf_vma (abfd, f, p->p_paddr);
1672 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1673 fprintf (f, " filesz 0x");
1674 bfd_fprintf_vma (abfd, f, p->p_filesz);
1675 fprintf (f, " memsz 0x");
1676 bfd_fprintf_vma (abfd, f, p->p_memsz);
1677 fprintf (f, " flags %c%c%c",
1678 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1679 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1680 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1681 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1682 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1683 fprintf (f, "\n");
1684 }
1685 }
1686
1687 s = bfd_get_section_by_name (abfd, ".dynamic");
1688 if (s != NULL)
1689 {
1690 unsigned int elfsec;
1691 unsigned long shlink;
1692 bfd_byte *extdyn, *extdynend;
1693 size_t extdynsize;
1694 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1695
1696 fprintf (f, _("\nDynamic Section:\n"));
1697
1698 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1699 goto error_return;
1700
1701 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1702 if (elfsec == SHN_BAD)
1703 goto error_return;
1704 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1705
1706 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1707 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1708
1709 extdyn = dynbuf;
1710 /* PR 17512: file: 6f427532. */
1711 if (s->size < extdynsize)
1712 goto error_return;
1713 extdynend = extdyn + s->size;
1714 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1715 Fix range check. */
1716 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1717 {
1718 Elf_Internal_Dyn dyn;
1719 const char *name = "";
1720 char ab[20];
1721 bfd_boolean stringp;
1722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1723
1724 (*swap_dyn_in) (abfd, extdyn, &dyn);
1725
1726 if (dyn.d_tag == DT_NULL)
1727 break;
1728
1729 stringp = FALSE;
1730 switch (dyn.d_tag)
1731 {
1732 default:
1733 if (bed->elf_backend_get_target_dtag)
1734 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735
1736 if (!strcmp (name, ""))
1737 {
1738 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1739 name = ab;
1740 }
1741 break;
1742
1743 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1744 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1745 case DT_PLTGOT: name = "PLTGOT"; break;
1746 case DT_HASH: name = "HASH"; break;
1747 case DT_STRTAB: name = "STRTAB"; break;
1748 case DT_SYMTAB: name = "SYMTAB"; break;
1749 case DT_RELA: name = "RELA"; break;
1750 case DT_RELASZ: name = "RELASZ"; break;
1751 case DT_RELAENT: name = "RELAENT"; break;
1752 case DT_STRSZ: name = "STRSZ"; break;
1753 case DT_SYMENT: name = "SYMENT"; break;
1754 case DT_INIT: name = "INIT"; break;
1755 case DT_FINI: name = "FINI"; break;
1756 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1757 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1758 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1759 case DT_REL: name = "REL"; break;
1760 case DT_RELSZ: name = "RELSZ"; break;
1761 case DT_RELENT: name = "RELENT"; break;
1762 case DT_PLTREL: name = "PLTREL"; break;
1763 case DT_DEBUG: name = "DEBUG"; break;
1764 case DT_TEXTREL: name = "TEXTREL"; break;
1765 case DT_JMPREL: name = "JMPREL"; break;
1766 case DT_BIND_NOW: name = "BIND_NOW"; break;
1767 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1768 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1769 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1770 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1771 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1772 case DT_FLAGS: name = "FLAGS"; break;
1773 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1774 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1775 case DT_CHECKSUM: name = "CHECKSUM"; break;
1776 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1777 case DT_MOVEENT: name = "MOVEENT"; break;
1778 case DT_MOVESZ: name = "MOVESZ"; break;
1779 case DT_FEATURE: name = "FEATURE"; break;
1780 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1781 case DT_SYMINSZ: name = "SYMINSZ"; break;
1782 case DT_SYMINENT: name = "SYMINENT"; break;
1783 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1784 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1785 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1786 case DT_PLTPAD: name = "PLTPAD"; break;
1787 case DT_MOVETAB: name = "MOVETAB"; break;
1788 case DT_SYMINFO: name = "SYMINFO"; break;
1789 case DT_RELACOUNT: name = "RELACOUNT"; break;
1790 case DT_RELCOUNT: name = "RELCOUNT"; break;
1791 case DT_FLAGS_1: name = "FLAGS_1"; break;
1792 case DT_VERSYM: name = "VERSYM"; break;
1793 case DT_VERDEF: name = "VERDEF"; break;
1794 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1795 case DT_VERNEED: name = "VERNEED"; break;
1796 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1797 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1798 case DT_USED: name = "USED"; break;
1799 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1800 case DT_GNU_HASH: name = "GNU_HASH"; break;
1801 }
1802
1803 fprintf (f, " %-20s ", name);
1804 if (! stringp)
1805 {
1806 fprintf (f, "0x");
1807 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1808 }
1809 else
1810 {
1811 const char *string;
1812 unsigned int tagv = dyn.d_un.d_val;
1813
1814 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1815 if (string == NULL)
1816 goto error_return;
1817 fprintf (f, "%s", string);
1818 }
1819 fprintf (f, "\n");
1820 }
1821
1822 free (dynbuf);
1823 dynbuf = NULL;
1824 }
1825
1826 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1827 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1828 {
1829 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1830 return FALSE;
1831 }
1832
1833 if (elf_dynverdef (abfd) != 0)
1834 {
1835 Elf_Internal_Verdef *t;
1836
1837 fprintf (f, _("\nVersion definitions:\n"));
1838 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1839 {
1840 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1841 t->vd_flags, t->vd_hash,
1842 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1843 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1844 {
1845 Elf_Internal_Verdaux *a;
1846
1847 fprintf (f, "\t");
1848 for (a = t->vd_auxptr->vda_nextptr;
1849 a != NULL;
1850 a = a->vda_nextptr)
1851 fprintf (f, "%s ",
1852 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1853 fprintf (f, "\n");
1854 }
1855 }
1856 }
1857
1858 if (elf_dynverref (abfd) != 0)
1859 {
1860 Elf_Internal_Verneed *t;
1861
1862 fprintf (f, _("\nVersion References:\n"));
1863 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1864 {
1865 Elf_Internal_Vernaux *a;
1866
1867 fprintf (f, _(" required from %s:\n"),
1868 t->vn_filename ? t->vn_filename : "<corrupt>");
1869 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1870 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1871 a->vna_flags, a->vna_other,
1872 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1873 }
1874 }
1875
1876 return TRUE;
1877
1878 error_return:
1879 if (dynbuf != NULL)
1880 free (dynbuf);
1881 return FALSE;
1882 }
1883
1884 /* Get version string. */
1885
1886 const char *
1887 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1888 bfd_boolean *hidden)
1889 {
1890 const char *version_string = NULL;
1891 if (elf_dynversym (abfd) != 0
1892 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1893 {
1894 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1895
1896 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1897 vernum &= VERSYM_VERSION;
1898
1899 if (vernum == 0)
1900 version_string = "";
1901 else if (vernum == 1
1902 && (vernum > elf_tdata (abfd)->cverdefs
1903 || (elf_tdata (abfd)->verdef[0].vd_flags
1904 == VER_FLG_BASE)))
1905 version_string = "Base";
1906 else if (vernum <= elf_tdata (abfd)->cverdefs)
1907 version_string =
1908 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1909 else
1910 {
1911 Elf_Internal_Verneed *t;
1912
1913 version_string = _("<corrupt>");
1914 for (t = elf_tdata (abfd)->verref;
1915 t != NULL;
1916 t = t->vn_nextref)
1917 {
1918 Elf_Internal_Vernaux *a;
1919
1920 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1921 {
1922 if (a->vna_other == vernum)
1923 {
1924 version_string = a->vna_nodename;
1925 break;
1926 }
1927 }
1928 }
1929 }
1930 }
1931 return version_string;
1932 }
1933
1934 /* Display ELF-specific fields of a symbol. */
1935
1936 void
1937 bfd_elf_print_symbol (bfd *abfd,
1938 void *filep,
1939 asymbol *symbol,
1940 bfd_print_symbol_type how)
1941 {
1942 FILE *file = (FILE *) filep;
1943 switch (how)
1944 {
1945 case bfd_print_symbol_name:
1946 fprintf (file, "%s", symbol->name);
1947 break;
1948 case bfd_print_symbol_more:
1949 fprintf (file, "elf ");
1950 bfd_fprintf_vma (abfd, file, symbol->value);
1951 fprintf (file, " %x", symbol->flags);
1952 break;
1953 case bfd_print_symbol_all:
1954 {
1955 const char *section_name;
1956 const char *name = NULL;
1957 const struct elf_backend_data *bed;
1958 unsigned char st_other;
1959 bfd_vma val;
1960 const char *version_string;
1961 bfd_boolean hidden;
1962
1963 section_name = symbol->section ? symbol->section->name : "(*none*)";
1964
1965 bed = get_elf_backend_data (abfd);
1966 if (bed->elf_backend_print_symbol_all)
1967 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1968
1969 if (name == NULL)
1970 {
1971 name = symbol->name;
1972 bfd_print_symbol_vandf (abfd, file, symbol);
1973 }
1974
1975 fprintf (file, " %s\t", section_name);
1976 /* Print the "other" value for a symbol. For common symbols,
1977 we've already printed the size; now print the alignment.
1978 For other symbols, we have no specified alignment, and
1979 we've printed the address; now print the size. */
1980 if (symbol->section && bfd_is_com_section (symbol->section))
1981 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1982 else
1983 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1984 bfd_fprintf_vma (abfd, file, val);
1985
1986 /* If we have version information, print it. */
1987 version_string = _bfd_elf_get_symbol_version_string (abfd,
1988 symbol,
1989 &hidden);
1990 if (version_string)
1991 {
1992 if (!hidden)
1993 fprintf (file, " %-11s", version_string);
1994 else
1995 {
1996 int i;
1997
1998 fprintf (file, " (%s)", version_string);
1999 for (i = 10 - strlen (version_string); i > 0; --i)
2000 putc (' ', file);
2001 }
2002 }
2003
2004 /* If the st_other field is not zero, print it. */
2005 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2006
2007 switch (st_other)
2008 {
2009 case 0: break;
2010 case STV_INTERNAL: fprintf (file, " .internal"); break;
2011 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2012 case STV_PROTECTED: fprintf (file, " .protected"); break;
2013 default:
2014 /* Some other non-defined flags are also present, so print
2015 everything hex. */
2016 fprintf (file, " 0x%02x", (unsigned int) st_other);
2017 }
2018
2019 fprintf (file, " %s", name);
2020 }
2021 break;
2022 }
2023 }
2024 \f
2025 /* ELF .o/exec file reading */
2026
2027 /* Create a new bfd section from an ELF section header. */
2028
2029 bfd_boolean
2030 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2031 {
2032 Elf_Internal_Shdr *hdr;
2033 Elf_Internal_Ehdr *ehdr;
2034 const struct elf_backend_data *bed;
2035 const char *name;
2036 bfd_boolean ret = TRUE;
2037 static bfd_boolean * sections_being_created = NULL;
2038 static bfd * sections_being_created_abfd = NULL;
2039 static unsigned int nesting = 0;
2040
2041 if (shindex >= elf_numsections (abfd))
2042 return FALSE;
2043
2044 if (++ nesting > 3)
2045 {
2046 /* PR17512: A corrupt ELF binary might contain a recursive group of
2047 sections, with each the string indices pointing to the next in the
2048 loop. Detect this here, by refusing to load a section that we are
2049 already in the process of loading. We only trigger this test if
2050 we have nested at least three sections deep as normal ELF binaries
2051 can expect to recurse at least once.
2052
2053 FIXME: It would be better if this array was attached to the bfd,
2054 rather than being held in a static pointer. */
2055
2056 if (sections_being_created_abfd != abfd)
2057 sections_being_created = NULL;
2058 if (sections_being_created == NULL)
2059 {
2060 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2061 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
2062 if (sections_being_created == NULL)
2063 return FALSE;
2064 sections_being_created_abfd = abfd;
2065 }
2066 if (sections_being_created [shindex])
2067 {
2068 _bfd_error_handler
2069 (_("%pB: warning: loop in section dependencies detected"), abfd);
2070 return FALSE;
2071 }
2072 sections_being_created [shindex] = TRUE;
2073 }
2074
2075 hdr = elf_elfsections (abfd)[shindex];
2076 ehdr = elf_elfheader (abfd);
2077 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2078 hdr->sh_name);
2079 if (name == NULL)
2080 goto fail;
2081
2082 bed = get_elf_backend_data (abfd);
2083 switch (hdr->sh_type)
2084 {
2085 case SHT_NULL:
2086 /* Inactive section. Throw it away. */
2087 goto success;
2088
2089 case SHT_PROGBITS: /* Normal section with contents. */
2090 case SHT_NOBITS: /* .bss section. */
2091 case SHT_HASH: /* .hash section. */
2092 case SHT_NOTE: /* .note section. */
2093 case SHT_INIT_ARRAY: /* .init_array section. */
2094 case SHT_FINI_ARRAY: /* .fini_array section. */
2095 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2096 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2097 case SHT_GNU_HASH: /* .gnu.hash section. */
2098 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2099 goto success;
2100
2101 case SHT_DYNAMIC: /* Dynamic linking information. */
2102 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2103 goto fail;
2104
2105 if (hdr->sh_link > elf_numsections (abfd))
2106 {
2107 /* PR 10478: Accept Solaris binaries with a sh_link
2108 field set to SHN_BEFORE or SHN_AFTER. */
2109 switch (bfd_get_arch (abfd))
2110 {
2111 case bfd_arch_i386:
2112 case bfd_arch_sparc:
2113 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2114 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2115 break;
2116 /* Otherwise fall through. */
2117 default:
2118 goto fail;
2119 }
2120 }
2121 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2122 goto fail;
2123 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2124 {
2125 Elf_Internal_Shdr *dynsymhdr;
2126
2127 /* The shared libraries distributed with hpux11 have a bogus
2128 sh_link field for the ".dynamic" section. Find the
2129 string table for the ".dynsym" section instead. */
2130 if (elf_dynsymtab (abfd) != 0)
2131 {
2132 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 }
2135 else
2136 {
2137 unsigned int i, num_sec;
2138
2139 num_sec = elf_numsections (abfd);
2140 for (i = 1; i < num_sec; i++)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[i];
2143 if (dynsymhdr->sh_type == SHT_DYNSYM)
2144 {
2145 hdr->sh_link = dynsymhdr->sh_link;
2146 break;
2147 }
2148 }
2149 }
2150 }
2151 goto success;
2152
2153 case SHT_SYMTAB: /* A symbol table. */
2154 if (elf_onesymtab (abfd) == shindex)
2155 goto success;
2156
2157 if (hdr->sh_entsize != bed->s->sizeof_sym)
2158 goto fail;
2159
2160 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2161 {
2162 if (hdr->sh_size != 0)
2163 goto fail;
2164 /* Some assemblers erroneously set sh_info to one with a
2165 zero sh_size. ld sees this as a global symbol count
2166 of (unsigned) -1. Fix it here. */
2167 hdr->sh_info = 0;
2168 goto success;
2169 }
2170
2171 /* PR 18854: A binary might contain more than one symbol table.
2172 Unusual, but possible. Warn, but continue. */
2173 if (elf_onesymtab (abfd) != 0)
2174 {
2175 _bfd_error_handler
2176 /* xgettext:c-format */
2177 (_("%pB: warning: multiple symbol tables detected"
2178 " - ignoring the table in section %u"),
2179 abfd, shindex);
2180 goto success;
2181 }
2182 elf_onesymtab (abfd) = shindex;
2183 elf_symtab_hdr (abfd) = *hdr;
2184 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2185 abfd->flags |= HAS_SYMS;
2186
2187 /* Sometimes a shared object will map in the symbol table. If
2188 SHF_ALLOC is set, and this is a shared object, then we also
2189 treat this section as a BFD section. We can not base the
2190 decision purely on SHF_ALLOC, because that flag is sometimes
2191 set in a relocatable object file, which would confuse the
2192 linker. */
2193 if ((hdr->sh_flags & SHF_ALLOC) != 0
2194 && (abfd->flags & DYNAMIC) != 0
2195 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2196 shindex))
2197 goto fail;
2198
2199 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2200 can't read symbols without that section loaded as well. It
2201 is most likely specified by the next section header. */
2202 {
2203 elf_section_list * entry;
2204 unsigned int i, num_sec;
2205
2206 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2207 if (entry->hdr.sh_link == shindex)
2208 goto success;
2209
2210 num_sec = elf_numsections (abfd);
2211 for (i = shindex + 1; i < num_sec; i++)
2212 {
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2214
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2218 }
2219
2220 if (i == num_sec)
2221 for (i = 1; i < shindex; i++)
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2224
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
2229
2230 if (i != shindex)
2231 ret = bfd_section_from_shdr (abfd, i);
2232 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2233 goto success;
2234 }
2235
2236 case SHT_DYNSYM: /* A dynamic symbol table. */
2237 if (elf_dynsymtab (abfd) == shindex)
2238 goto success;
2239
2240 if (hdr->sh_entsize != bed->s->sizeof_sym)
2241 goto fail;
2242
2243 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2244 {
2245 if (hdr->sh_size != 0)
2246 goto fail;
2247
2248 /* Some linkers erroneously set sh_info to one with a
2249 zero sh_size. ld sees this as a global symbol count
2250 of (unsigned) -1. Fix it here. */
2251 hdr->sh_info = 0;
2252 goto success;
2253 }
2254
2255 /* PR 18854: A binary might contain more than one dynamic symbol table.
2256 Unusual, but possible. Warn, but continue. */
2257 if (elf_dynsymtab (abfd) != 0)
2258 {
2259 _bfd_error_handler
2260 /* xgettext:c-format */
2261 (_("%pB: warning: multiple dynamic symbol tables detected"
2262 " - ignoring the table in section %u"),
2263 abfd, shindex);
2264 goto success;
2265 }
2266 elf_dynsymtab (abfd) = shindex;
2267 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2268 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2269 abfd->flags |= HAS_SYMS;
2270
2271 /* Besides being a symbol table, we also treat this as a regular
2272 section, so that objcopy can handle it. */
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
2275
2276 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2277 {
2278 elf_section_list * entry;
2279
2280 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2281 if (entry->ndx == shindex)
2282 goto success;
2283
2284 entry = bfd_alloc (abfd, sizeof (*entry));
2285 if (entry == NULL)
2286 goto fail;
2287 entry->ndx = shindex;
2288 entry->hdr = * hdr;
2289 entry->next = elf_symtab_shndx_list (abfd);
2290 elf_symtab_shndx_list (abfd) = entry;
2291 elf_elfsections (abfd)[shindex] = & entry->hdr;
2292 goto success;
2293 }
2294
2295 case SHT_STRTAB: /* A string table. */
2296 if (hdr->bfd_section != NULL)
2297 goto success;
2298
2299 if (ehdr->e_shstrndx == shindex)
2300 {
2301 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2302 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2303 goto success;
2304 }
2305
2306 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2307 {
2308 symtab_strtab:
2309 elf_tdata (abfd)->strtab_hdr = *hdr;
2310 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2311 goto success;
2312 }
2313
2314 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2315 {
2316 dynsymtab_strtab:
2317 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2318 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2319 elf_elfsections (abfd)[shindex] = hdr;
2320 /* We also treat this as a regular section, so that objcopy
2321 can handle it. */
2322 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2323 shindex);
2324 goto success;
2325 }
2326
2327 /* If the string table isn't one of the above, then treat it as a
2328 regular section. We need to scan all the headers to be sure,
2329 just in case this strtab section appeared before the above. */
2330 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2331 {
2332 unsigned int i, num_sec;
2333
2334 num_sec = elf_numsections (abfd);
2335 for (i = 1; i < num_sec; i++)
2336 {
2337 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2338 if (hdr2->sh_link == shindex)
2339 {
2340 /* Prevent endless recursion on broken objects. */
2341 if (i == shindex)
2342 goto fail;
2343 if (! bfd_section_from_shdr (abfd, i))
2344 goto fail;
2345 if (elf_onesymtab (abfd) == i)
2346 goto symtab_strtab;
2347 if (elf_dynsymtab (abfd) == i)
2348 goto dynsymtab_strtab;
2349 }
2350 }
2351 }
2352 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2353 goto success;
2354
2355 case SHT_REL:
2356 case SHT_RELA:
2357 /* *These* do a lot of work -- but build no sections! */
2358 {
2359 asection *target_sect;
2360 Elf_Internal_Shdr *hdr2, **p_hdr;
2361 unsigned int num_sec = elf_numsections (abfd);
2362 struct bfd_elf_section_data *esdt;
2363
2364 if (hdr->sh_entsize
2365 != (bfd_size_type) (hdr->sh_type == SHT_REL
2366 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2367 goto fail;
2368
2369 /* Check for a bogus link to avoid crashing. */
2370 if (hdr->sh_link >= num_sec)
2371 {
2372 _bfd_error_handler
2373 /* xgettext:c-format */
2374 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2375 abfd, hdr->sh_link, name, shindex);
2376 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2377 shindex);
2378 goto success;
2379 }
2380
2381 /* For some incomprehensible reason Oracle distributes
2382 libraries for Solaris in which some of the objects have
2383 bogus sh_link fields. It would be nice if we could just
2384 reject them, but, unfortunately, some people need to use
2385 them. We scan through the section headers; if we find only
2386 one suitable symbol table, we clobber the sh_link to point
2387 to it. I hope this doesn't break anything.
2388
2389 Don't do it on executable nor shared library. */
2390 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2391 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2392 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2393 {
2394 unsigned int scan;
2395 int found;
2396
2397 found = 0;
2398 for (scan = 1; scan < num_sec; scan++)
2399 {
2400 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2401 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2402 {
2403 if (found != 0)
2404 {
2405 found = 0;
2406 break;
2407 }
2408 found = scan;
2409 }
2410 }
2411 if (found != 0)
2412 hdr->sh_link = found;
2413 }
2414
2415 /* Get the symbol table. */
2416 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2417 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2418 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2419 goto fail;
2420
2421 /* If this is an alloc section in an executable or shared
2422 library, or the reloc section does not use the main symbol
2423 table we don't treat it as a reloc section. BFD can't
2424 adequately represent such a section, so at least for now,
2425 we don't try. We just present it as a normal section. We
2426 also can't use it as a reloc section if it points to the
2427 null section, an invalid section, another reloc section, or
2428 its sh_link points to the null section. */
2429 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2430 && (hdr->sh_flags & SHF_ALLOC) != 0)
2431 || hdr->sh_link == SHN_UNDEF
2432 || hdr->sh_link != elf_onesymtab (abfd)
2433 || hdr->sh_info == SHN_UNDEF
2434 || hdr->sh_info >= num_sec
2435 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2436 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2437 {
2438 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2439 shindex);
2440 goto success;
2441 }
2442
2443 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2444 goto fail;
2445
2446 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2447 if (target_sect == NULL)
2448 goto fail;
2449
2450 esdt = elf_section_data (target_sect);
2451 if (hdr->sh_type == SHT_RELA)
2452 p_hdr = &esdt->rela.hdr;
2453 else
2454 p_hdr = &esdt->rel.hdr;
2455
2456 /* PR 17512: file: 0b4f81b7.
2457 Also see PR 24456, for a file which deliberately has two reloc
2458 sections. */
2459 if (*p_hdr != NULL)
2460 {
2461 _bfd_error_handler
2462 /* xgettext:c-format */
2463 (_("%pB: warning: multiple relocation sections for section %pA \
2464 found - ignoring all but the first"),
2465 abfd, target_sect);
2466 goto success;
2467 }
2468 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2469 if (hdr2 == NULL)
2470 goto fail;
2471 *hdr2 = *hdr;
2472 *p_hdr = hdr2;
2473 elf_elfsections (abfd)[shindex] = hdr2;
2474 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2475 * bed->s->int_rels_per_ext_rel);
2476 target_sect->flags |= SEC_RELOC;
2477 target_sect->relocation = NULL;
2478 target_sect->rel_filepos = hdr->sh_offset;
2479 /* In the section to which the relocations apply, mark whether
2480 its relocations are of the REL or RELA variety. */
2481 if (hdr->sh_size != 0)
2482 {
2483 if (hdr->sh_type == SHT_RELA)
2484 target_sect->use_rela_p = 1;
2485 }
2486 abfd->flags |= HAS_RELOC;
2487 goto success;
2488 }
2489
2490 case SHT_GNU_verdef:
2491 elf_dynverdef (abfd) = shindex;
2492 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2493 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2494 goto success;
2495
2496 case SHT_GNU_versym:
2497 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2498 goto fail;
2499
2500 elf_dynversym (abfd) = shindex;
2501 elf_tdata (abfd)->dynversym_hdr = *hdr;
2502 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2503 goto success;
2504
2505 case SHT_GNU_verneed:
2506 elf_dynverref (abfd) = shindex;
2507 elf_tdata (abfd)->dynverref_hdr = *hdr;
2508 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2509 goto success;
2510
2511 case SHT_SHLIB:
2512 goto success;
2513
2514 case SHT_GROUP:
2515 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2516 goto fail;
2517
2518 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2519 goto fail;
2520
2521 goto success;
2522
2523 default:
2524 /* Possibly an attributes section. */
2525 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2526 || hdr->sh_type == bed->obj_attrs_section_type)
2527 {
2528 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2529 goto fail;
2530 _bfd_elf_parse_attributes (abfd, hdr);
2531 goto success;
2532 }
2533
2534 /* Check for any processor-specific section types. */
2535 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2536 goto success;
2537
2538 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2539 {
2540 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2541 /* FIXME: How to properly handle allocated section reserved
2542 for applications? */
2543 _bfd_error_handler
2544 /* xgettext:c-format */
2545 (_("%pB: unknown type [%#x] section `%s'"),
2546 abfd, hdr->sh_type, name);
2547 else
2548 {
2549 /* Allow sections reserved for applications. */
2550 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2551 shindex);
2552 goto success;
2553 }
2554 }
2555 else if (hdr->sh_type >= SHT_LOPROC
2556 && hdr->sh_type <= SHT_HIPROC)
2557 /* FIXME: We should handle this section. */
2558 _bfd_error_handler
2559 /* xgettext:c-format */
2560 (_("%pB: unknown type [%#x] section `%s'"),
2561 abfd, hdr->sh_type, name);
2562 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2563 {
2564 /* Unrecognised OS-specific sections. */
2565 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2566 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2567 required to correctly process the section and the file should
2568 be rejected with an error message. */
2569 _bfd_error_handler
2570 /* xgettext:c-format */
2571 (_("%pB: unknown type [%#x] section `%s'"),
2572 abfd, hdr->sh_type, name);
2573 else
2574 {
2575 /* Otherwise it should be processed. */
2576 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2577 goto success;
2578 }
2579 }
2580 else
2581 /* FIXME: We should handle this section. */
2582 _bfd_error_handler
2583 /* xgettext:c-format */
2584 (_("%pB: unknown type [%#x] section `%s'"),
2585 abfd, hdr->sh_type, name);
2586
2587 goto fail;
2588 }
2589
2590 fail:
2591 ret = FALSE;
2592 success:
2593 if (sections_being_created && sections_being_created_abfd == abfd)
2594 sections_being_created [shindex] = FALSE;
2595 if (-- nesting == 0)
2596 {
2597 sections_being_created = NULL;
2598 sections_being_created_abfd = abfd;
2599 }
2600 return ret;
2601 }
2602
2603 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2604
2605 Elf_Internal_Sym *
2606 bfd_sym_from_r_symndx (struct sym_cache *cache,
2607 bfd *abfd,
2608 unsigned long r_symndx)
2609 {
2610 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2611
2612 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2613 {
2614 Elf_Internal_Shdr *symtab_hdr;
2615 unsigned char esym[sizeof (Elf64_External_Sym)];
2616 Elf_External_Sym_Shndx eshndx;
2617
2618 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2619 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2620 &cache->sym[ent], esym, &eshndx) == NULL)
2621 return NULL;
2622
2623 if (cache->abfd != abfd)
2624 {
2625 memset (cache->indx, -1, sizeof (cache->indx));
2626 cache->abfd = abfd;
2627 }
2628 cache->indx[ent] = r_symndx;
2629 }
2630
2631 return &cache->sym[ent];
2632 }
2633
2634 /* Given an ELF section number, retrieve the corresponding BFD
2635 section. */
2636
2637 asection *
2638 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2639 {
2640 if (sec_index >= elf_numsections (abfd))
2641 return NULL;
2642 return elf_elfsections (abfd)[sec_index]->bfd_section;
2643 }
2644
2645 static const struct bfd_elf_special_section special_sections_b[] =
2646 {
2647 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2648 { NULL, 0, 0, 0, 0 }
2649 };
2650
2651 static const struct bfd_elf_special_section special_sections_c[] =
2652 {
2653 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2654 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2655 { NULL, 0, 0, 0, 0 }
2656 };
2657
2658 static const struct bfd_elf_special_section special_sections_d[] =
2659 {
2660 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2661 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2662 /* There are more DWARF sections than these, but they needn't be added here
2663 unless you have to cope with broken compilers that don't emit section
2664 attributes or you want to help the user writing assembler. */
2665 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2666 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2667 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2668 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2669 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2670 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2671 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2672 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2673 { NULL, 0, 0, 0, 0 }
2674 };
2675
2676 static const struct bfd_elf_special_section special_sections_f[] =
2677 {
2678 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2679 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2680 { NULL, 0 , 0, 0, 0 }
2681 };
2682
2683 static const struct bfd_elf_special_section special_sections_g[] =
2684 {
2685 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2686 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2687 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2688 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2689 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2690 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2691 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2692 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2694 { NULL, 0, 0, 0, 0 }
2695 };
2696
2697 static const struct bfd_elf_special_section special_sections_h[] =
2698 {
2699 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2700 { NULL, 0, 0, 0, 0 }
2701 };
2702
2703 static const struct bfd_elf_special_section special_sections_i[] =
2704 {
2705 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2706 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2707 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2708 { NULL, 0, 0, 0, 0 }
2709 };
2710
2711 static const struct bfd_elf_special_section special_sections_l[] =
2712 {
2713 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2714 { NULL, 0, 0, 0, 0 }
2715 };
2716
2717 static const struct bfd_elf_special_section special_sections_n[] =
2718 {
2719 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2720 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2721 { NULL, 0, 0, 0, 0 }
2722 };
2723
2724 static const struct bfd_elf_special_section special_sections_p[] =
2725 {
2726 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2727 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2728 { NULL, 0, 0, 0, 0 }
2729 };
2730
2731 static const struct bfd_elf_special_section special_sections_r[] =
2732 {
2733 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2734 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2735 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2736 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2737 { NULL, 0, 0, 0, 0 }
2738 };
2739
2740 static const struct bfd_elf_special_section special_sections_s[] =
2741 {
2742 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2743 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2744 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2745 /* See struct bfd_elf_special_section declaration for the semantics of
2746 this special case where .prefix_length != strlen (.prefix). */
2747 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2748 { NULL, 0, 0, 0, 0 }
2749 };
2750
2751 static const struct bfd_elf_special_section special_sections_t[] =
2752 {
2753 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2754 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2755 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2756 { NULL, 0, 0, 0, 0 }
2757 };
2758
2759 static const struct bfd_elf_special_section special_sections_z[] =
2760 {
2761 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2762 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2763 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2764 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2765 { NULL, 0, 0, 0, 0 }
2766 };
2767
2768 static const struct bfd_elf_special_section * const special_sections[] =
2769 {
2770 special_sections_b, /* 'b' */
2771 special_sections_c, /* 'c' */
2772 special_sections_d, /* 'd' */
2773 NULL, /* 'e' */
2774 special_sections_f, /* 'f' */
2775 special_sections_g, /* 'g' */
2776 special_sections_h, /* 'h' */
2777 special_sections_i, /* 'i' */
2778 NULL, /* 'j' */
2779 NULL, /* 'k' */
2780 special_sections_l, /* 'l' */
2781 NULL, /* 'm' */
2782 special_sections_n, /* 'n' */
2783 NULL, /* 'o' */
2784 special_sections_p, /* 'p' */
2785 NULL, /* 'q' */
2786 special_sections_r, /* 'r' */
2787 special_sections_s, /* 's' */
2788 special_sections_t, /* 't' */
2789 NULL, /* 'u' */
2790 NULL, /* 'v' */
2791 NULL, /* 'w' */
2792 NULL, /* 'x' */
2793 NULL, /* 'y' */
2794 special_sections_z /* 'z' */
2795 };
2796
2797 const struct bfd_elf_special_section *
2798 _bfd_elf_get_special_section (const char *name,
2799 const struct bfd_elf_special_section *spec,
2800 unsigned int rela)
2801 {
2802 int i;
2803 int len;
2804
2805 len = strlen (name);
2806
2807 for (i = 0; spec[i].prefix != NULL; i++)
2808 {
2809 int suffix_len;
2810 int prefix_len = spec[i].prefix_length;
2811
2812 if (len < prefix_len)
2813 continue;
2814 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2815 continue;
2816
2817 suffix_len = spec[i].suffix_length;
2818 if (suffix_len <= 0)
2819 {
2820 if (name[prefix_len] != 0)
2821 {
2822 if (suffix_len == 0)
2823 continue;
2824 if (name[prefix_len] != '.'
2825 && (suffix_len == -2
2826 || (rela && spec[i].type == SHT_REL)))
2827 continue;
2828 }
2829 }
2830 else
2831 {
2832 if (len < prefix_len + suffix_len)
2833 continue;
2834 if (memcmp (name + len - suffix_len,
2835 spec[i].prefix + prefix_len,
2836 suffix_len) != 0)
2837 continue;
2838 }
2839 return &spec[i];
2840 }
2841
2842 return NULL;
2843 }
2844
2845 const struct bfd_elf_special_section *
2846 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2847 {
2848 int i;
2849 const struct bfd_elf_special_section *spec;
2850 const struct elf_backend_data *bed;
2851
2852 /* See if this is one of the special sections. */
2853 if (sec->name == NULL)
2854 return NULL;
2855
2856 bed = get_elf_backend_data (abfd);
2857 spec = bed->special_sections;
2858 if (spec)
2859 {
2860 spec = _bfd_elf_get_special_section (sec->name,
2861 bed->special_sections,
2862 sec->use_rela_p);
2863 if (spec != NULL)
2864 return spec;
2865 }
2866
2867 if (sec->name[0] != '.')
2868 return NULL;
2869
2870 i = sec->name[1] - 'b';
2871 if (i < 0 || i > 'z' - 'b')
2872 return NULL;
2873
2874 spec = special_sections[i];
2875
2876 if (spec == NULL)
2877 return NULL;
2878
2879 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2880 }
2881
2882 bfd_boolean
2883 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2884 {
2885 struct bfd_elf_section_data *sdata;
2886 const struct elf_backend_data *bed;
2887 const struct bfd_elf_special_section *ssect;
2888
2889 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2890 if (sdata == NULL)
2891 {
2892 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2893 sizeof (*sdata));
2894 if (sdata == NULL)
2895 return FALSE;
2896 sec->used_by_bfd = sdata;
2897 }
2898
2899 /* Indicate whether or not this section should use RELA relocations. */
2900 bed = get_elf_backend_data (abfd);
2901 sec->use_rela_p = bed->default_use_rela_p;
2902
2903 /* Set up ELF section type and flags for newly created sections, if
2904 there is an ABI mandated section. */
2905 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2906 if (ssect != NULL)
2907 {
2908 elf_section_type (sec) = ssect->type;
2909 elf_section_flags (sec) = ssect->attr;
2910 }
2911
2912 return _bfd_generic_new_section_hook (abfd, sec);
2913 }
2914
2915 /* Create a new bfd section from an ELF program header.
2916
2917 Since program segments have no names, we generate a synthetic name
2918 of the form segment<NUM>, where NUM is generally the index in the
2919 program header table. For segments that are split (see below) we
2920 generate the names segment<NUM>a and segment<NUM>b.
2921
2922 Note that some program segments may have a file size that is different than
2923 (less than) the memory size. All this means is that at execution the
2924 system must allocate the amount of memory specified by the memory size,
2925 but only initialize it with the first "file size" bytes read from the
2926 file. This would occur for example, with program segments consisting
2927 of combined data+bss.
2928
2929 To handle the above situation, this routine generates TWO bfd sections
2930 for the single program segment. The first has the length specified by
2931 the file size of the segment, and the second has the length specified
2932 by the difference between the two sizes. In effect, the segment is split
2933 into its initialized and uninitialized parts.
2934
2935 */
2936
2937 bfd_boolean
2938 _bfd_elf_make_section_from_phdr (bfd *abfd,
2939 Elf_Internal_Phdr *hdr,
2940 int hdr_index,
2941 const char *type_name)
2942 {
2943 asection *newsect;
2944 char *name;
2945 char namebuf[64];
2946 size_t len;
2947 int split;
2948
2949 split = ((hdr->p_memsz > 0)
2950 && (hdr->p_filesz > 0)
2951 && (hdr->p_memsz > hdr->p_filesz));
2952
2953 if (hdr->p_filesz > 0)
2954 {
2955 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2956 len = strlen (namebuf) + 1;
2957 name = (char *) bfd_alloc (abfd, len);
2958 if (!name)
2959 return FALSE;
2960 memcpy (name, namebuf, len);
2961 newsect = bfd_make_section (abfd, name);
2962 if (newsect == NULL)
2963 return FALSE;
2964 newsect->vma = hdr->p_vaddr;
2965 newsect->lma = hdr->p_paddr;
2966 newsect->size = hdr->p_filesz;
2967 newsect->filepos = hdr->p_offset;
2968 newsect->flags |= SEC_HAS_CONTENTS;
2969 newsect->alignment_power = bfd_log2 (hdr->p_align);
2970 if (hdr->p_type == PT_LOAD)
2971 {
2972 newsect->flags |= SEC_ALLOC;
2973 newsect->flags |= SEC_LOAD;
2974 if (hdr->p_flags & PF_X)
2975 {
2976 /* FIXME: all we known is that it has execute PERMISSION,
2977 may be data. */
2978 newsect->flags |= SEC_CODE;
2979 }
2980 }
2981 if (!(hdr->p_flags & PF_W))
2982 {
2983 newsect->flags |= SEC_READONLY;
2984 }
2985 }
2986
2987 if (hdr->p_memsz > hdr->p_filesz)
2988 {
2989 bfd_vma align;
2990
2991 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
2992 len = strlen (namebuf) + 1;
2993 name = (char *) bfd_alloc (abfd, len);
2994 if (!name)
2995 return FALSE;
2996 memcpy (name, namebuf, len);
2997 newsect = bfd_make_section (abfd, name);
2998 if (newsect == NULL)
2999 return FALSE;
3000 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3001 newsect->lma = hdr->p_paddr + hdr->p_filesz;
3002 newsect->size = hdr->p_memsz - hdr->p_filesz;
3003 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3004 align = newsect->vma & -newsect->vma;
3005 if (align == 0 || align > hdr->p_align)
3006 align = hdr->p_align;
3007 newsect->alignment_power = bfd_log2 (align);
3008 if (hdr->p_type == PT_LOAD)
3009 {
3010 /* Hack for gdb. Segments that have not been modified do
3011 not have their contents written to a core file, on the
3012 assumption that a debugger can find the contents in the
3013 executable. We flag this case by setting the fake
3014 section size to zero. Note that "real" bss sections will
3015 always have their contents dumped to the core file. */
3016 if (bfd_get_format (abfd) == bfd_core)
3017 newsect->size = 0;
3018 newsect->flags |= SEC_ALLOC;
3019 if (hdr->p_flags & PF_X)
3020 newsect->flags |= SEC_CODE;
3021 }
3022 if (!(hdr->p_flags & PF_W))
3023 newsect->flags |= SEC_READONLY;
3024 }
3025
3026 return TRUE;
3027 }
3028
3029 static bfd_boolean
3030 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3031 {
3032 /* The return value is ignored. Build-ids are considered optional. */
3033 if (templ->xvec->flavour == bfd_target_elf_flavour)
3034 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3035 (templ, offset);
3036 return FALSE;
3037 }
3038
3039 bfd_boolean
3040 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3041 {
3042 const struct elf_backend_data *bed;
3043
3044 switch (hdr->p_type)
3045 {
3046 case PT_NULL:
3047 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3048
3049 case PT_LOAD:
3050 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3051 return FALSE;
3052 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3053 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3054 return TRUE;
3055
3056 case PT_DYNAMIC:
3057 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3058
3059 case PT_INTERP:
3060 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3061
3062 case PT_NOTE:
3063 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3064 return FALSE;
3065 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3066 hdr->p_align))
3067 return FALSE;
3068 return TRUE;
3069
3070 case PT_SHLIB:
3071 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3072
3073 case PT_PHDR:
3074 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3075
3076 case PT_GNU_EH_FRAME:
3077 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3078 "eh_frame_hdr");
3079
3080 case PT_GNU_STACK:
3081 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3082
3083 case PT_GNU_RELRO:
3084 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3085
3086 default:
3087 /* Check for any processor-specific program segment types. */
3088 bed = get_elf_backend_data (abfd);
3089 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3090 }
3091 }
3092
3093 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3094 REL or RELA. */
3095
3096 Elf_Internal_Shdr *
3097 _bfd_elf_single_rel_hdr (asection *sec)
3098 {
3099 if (elf_section_data (sec)->rel.hdr)
3100 {
3101 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3102 return elf_section_data (sec)->rel.hdr;
3103 }
3104 else
3105 return elf_section_data (sec)->rela.hdr;
3106 }
3107
3108 static bfd_boolean
3109 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3110 Elf_Internal_Shdr *rel_hdr,
3111 const char *sec_name,
3112 bfd_boolean use_rela_p)
3113 {
3114 char *name = (char *) bfd_alloc (abfd,
3115 sizeof ".rela" + strlen (sec_name));
3116 if (name == NULL)
3117 return FALSE;
3118
3119 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3120 rel_hdr->sh_name =
3121 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3122 FALSE);
3123 if (rel_hdr->sh_name == (unsigned int) -1)
3124 return FALSE;
3125
3126 return TRUE;
3127 }
3128
3129 /* Allocate and initialize a section-header for a new reloc section,
3130 containing relocations against ASECT. It is stored in RELDATA. If
3131 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3132 relocations. */
3133
3134 static bfd_boolean
3135 _bfd_elf_init_reloc_shdr (bfd *abfd,
3136 struct bfd_elf_section_reloc_data *reldata,
3137 const char *sec_name,
3138 bfd_boolean use_rela_p,
3139 bfd_boolean delay_st_name_p)
3140 {
3141 Elf_Internal_Shdr *rel_hdr;
3142 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3143
3144 BFD_ASSERT (reldata->hdr == NULL);
3145 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3146 reldata->hdr = rel_hdr;
3147
3148 if (delay_st_name_p)
3149 rel_hdr->sh_name = (unsigned int) -1;
3150 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3151 use_rela_p))
3152 return FALSE;
3153 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3154 rel_hdr->sh_entsize = (use_rela_p
3155 ? bed->s->sizeof_rela
3156 : bed->s->sizeof_rel);
3157 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3158 rel_hdr->sh_flags = 0;
3159 rel_hdr->sh_addr = 0;
3160 rel_hdr->sh_size = 0;
3161 rel_hdr->sh_offset = 0;
3162
3163 return TRUE;
3164 }
3165
3166 /* Return the default section type based on the passed in section flags. */
3167
3168 int
3169 bfd_elf_get_default_section_type (flagword flags)
3170 {
3171 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3172 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3173 return SHT_NOBITS;
3174 return SHT_PROGBITS;
3175 }
3176
3177 struct fake_section_arg
3178 {
3179 struct bfd_link_info *link_info;
3180 bfd_boolean failed;
3181 };
3182
3183 /* Set up an ELF internal section header for a section. */
3184
3185 static void
3186 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3187 {
3188 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3189 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3190 struct bfd_elf_section_data *esd = elf_section_data (asect);
3191 Elf_Internal_Shdr *this_hdr;
3192 unsigned int sh_type;
3193 const char *name = asect->name;
3194 bfd_boolean delay_st_name_p = FALSE;
3195
3196 if (arg->failed)
3197 {
3198 /* We already failed; just get out of the bfd_map_over_sections
3199 loop. */
3200 return;
3201 }
3202
3203 this_hdr = &esd->this_hdr;
3204
3205 if (arg->link_info)
3206 {
3207 /* ld: compress DWARF debug sections with names: .debug_*. */
3208 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3209 && (asect->flags & SEC_DEBUGGING)
3210 && name[1] == 'd'
3211 && name[6] == '_')
3212 {
3213 /* Set SEC_ELF_COMPRESS to indicate this section should be
3214 compressed. */
3215 asect->flags |= SEC_ELF_COMPRESS;
3216
3217 /* If this section will be compressed, delay adding section
3218 name to section name section after it is compressed in
3219 _bfd_elf_assign_file_positions_for_non_load. */
3220 delay_st_name_p = TRUE;
3221 }
3222 }
3223 else if ((asect->flags & SEC_ELF_RENAME))
3224 {
3225 /* objcopy: rename output DWARF debug section. */
3226 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3227 {
3228 /* When we decompress or compress with SHF_COMPRESSED,
3229 convert section name from .zdebug_* to .debug_* if
3230 needed. */
3231 if (name[1] == 'z')
3232 {
3233 char *new_name = convert_zdebug_to_debug (abfd, name);
3234 if (new_name == NULL)
3235 {
3236 arg->failed = TRUE;
3237 return;
3238 }
3239 name = new_name;
3240 }
3241 }
3242 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3243 {
3244 /* PR binutils/18087: Compression does not always make a
3245 section smaller. So only rename the section when
3246 compression has actually taken place. If input section
3247 name is .zdebug_*, we should never compress it again. */
3248 char *new_name = convert_debug_to_zdebug (abfd, name);
3249 if (new_name == NULL)
3250 {
3251 arg->failed = TRUE;
3252 return;
3253 }
3254 BFD_ASSERT (name[1] != 'z');
3255 name = new_name;
3256 }
3257 }
3258
3259 if (delay_st_name_p)
3260 this_hdr->sh_name = (unsigned int) -1;
3261 else
3262 {
3263 this_hdr->sh_name
3264 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3265 name, FALSE);
3266 if (this_hdr->sh_name == (unsigned int) -1)
3267 {
3268 arg->failed = TRUE;
3269 return;
3270 }
3271 }
3272
3273 /* Don't clear sh_flags. Assembler may set additional bits. */
3274
3275 if ((asect->flags & SEC_ALLOC) != 0
3276 || asect->user_set_vma)
3277 this_hdr->sh_addr = asect->vma;
3278 else
3279 this_hdr->sh_addr = 0;
3280
3281 this_hdr->sh_offset = 0;
3282 this_hdr->sh_size = asect->size;
3283 this_hdr->sh_link = 0;
3284 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3285 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3286 {
3287 _bfd_error_handler
3288 /* xgettext:c-format */
3289 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3290 abfd, asect->alignment_power, asect);
3291 arg->failed = TRUE;
3292 return;
3293 }
3294 this_hdr->sh_addralign = (bfd_vma) 1 << asect->alignment_power;
3295 /* The sh_entsize and sh_info fields may have been set already by
3296 copy_private_section_data. */
3297
3298 this_hdr->bfd_section = asect;
3299 this_hdr->contents = NULL;
3300
3301 /* If the section type is unspecified, we set it based on
3302 asect->flags. */
3303 if ((asect->flags & SEC_GROUP) != 0)
3304 sh_type = SHT_GROUP;
3305 else
3306 sh_type = bfd_elf_get_default_section_type (asect->flags);
3307
3308 if (this_hdr->sh_type == SHT_NULL)
3309 this_hdr->sh_type = sh_type;
3310 else if (this_hdr->sh_type == SHT_NOBITS
3311 && sh_type == SHT_PROGBITS
3312 && (asect->flags & SEC_ALLOC) != 0)
3313 {
3314 /* Warn if we are changing a NOBITS section to PROGBITS, but
3315 allow the link to proceed. This can happen when users link
3316 non-bss input sections to bss output sections, or emit data
3317 to a bss output section via a linker script. */
3318 _bfd_error_handler
3319 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3320 this_hdr->sh_type = sh_type;
3321 }
3322
3323 switch (this_hdr->sh_type)
3324 {
3325 default:
3326 break;
3327
3328 case SHT_STRTAB:
3329 case SHT_NOTE:
3330 case SHT_NOBITS:
3331 case SHT_PROGBITS:
3332 break;
3333
3334 case SHT_INIT_ARRAY:
3335 case SHT_FINI_ARRAY:
3336 case SHT_PREINIT_ARRAY:
3337 this_hdr->sh_entsize = bed->s->arch_size / 8;
3338 break;
3339
3340 case SHT_HASH:
3341 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3342 break;
3343
3344 case SHT_DYNSYM:
3345 this_hdr->sh_entsize = bed->s->sizeof_sym;
3346 break;
3347
3348 case SHT_DYNAMIC:
3349 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3350 break;
3351
3352 case SHT_RELA:
3353 if (get_elf_backend_data (abfd)->may_use_rela_p)
3354 this_hdr->sh_entsize = bed->s->sizeof_rela;
3355 break;
3356
3357 case SHT_REL:
3358 if (get_elf_backend_data (abfd)->may_use_rel_p)
3359 this_hdr->sh_entsize = bed->s->sizeof_rel;
3360 break;
3361
3362 case SHT_GNU_versym:
3363 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3364 break;
3365
3366 case SHT_GNU_verdef:
3367 this_hdr->sh_entsize = 0;
3368 /* objcopy or strip will copy over sh_info, but may not set
3369 cverdefs. The linker will set cverdefs, but sh_info will be
3370 zero. */
3371 if (this_hdr->sh_info == 0)
3372 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3373 else
3374 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3375 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3376 break;
3377
3378 case SHT_GNU_verneed:
3379 this_hdr->sh_entsize = 0;
3380 /* objcopy or strip will copy over sh_info, but may not set
3381 cverrefs. The linker will set cverrefs, but sh_info will be
3382 zero. */
3383 if (this_hdr->sh_info == 0)
3384 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3385 else
3386 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3387 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3388 break;
3389
3390 case SHT_GROUP:
3391 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3392 break;
3393
3394 case SHT_GNU_HASH:
3395 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3396 break;
3397 }
3398
3399 if ((asect->flags & SEC_ALLOC) != 0)
3400 this_hdr->sh_flags |= SHF_ALLOC;
3401 if ((asect->flags & SEC_READONLY) == 0)
3402 this_hdr->sh_flags |= SHF_WRITE;
3403 if ((asect->flags & SEC_CODE) != 0)
3404 this_hdr->sh_flags |= SHF_EXECINSTR;
3405 if ((asect->flags & SEC_MERGE) != 0)
3406 {
3407 this_hdr->sh_flags |= SHF_MERGE;
3408 this_hdr->sh_entsize = asect->entsize;
3409 }
3410 if ((asect->flags & SEC_STRINGS) != 0)
3411 this_hdr->sh_flags |= SHF_STRINGS;
3412 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3413 this_hdr->sh_flags |= SHF_GROUP;
3414 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3415 {
3416 this_hdr->sh_flags |= SHF_TLS;
3417 if (asect->size == 0
3418 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3419 {
3420 struct bfd_link_order *o = asect->map_tail.link_order;
3421
3422 this_hdr->sh_size = 0;
3423 if (o != NULL)
3424 {
3425 this_hdr->sh_size = o->offset + o->size;
3426 if (this_hdr->sh_size != 0)
3427 this_hdr->sh_type = SHT_NOBITS;
3428 }
3429 }
3430 }
3431 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3432 this_hdr->sh_flags |= SHF_EXCLUDE;
3433
3434 /* If the section has relocs, set up a section header for the
3435 SHT_REL[A] section. If two relocation sections are required for
3436 this section, it is up to the processor-specific back-end to
3437 create the other. */
3438 if ((asect->flags & SEC_RELOC) != 0)
3439 {
3440 /* When doing a relocatable link, create both REL and RELA sections if
3441 needed. */
3442 if (arg->link_info
3443 /* Do the normal setup if we wouldn't create any sections here. */
3444 && esd->rel.count + esd->rela.count > 0
3445 && (bfd_link_relocatable (arg->link_info)
3446 || arg->link_info->emitrelocations))
3447 {
3448 if (esd->rel.count && esd->rel.hdr == NULL
3449 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3450 FALSE, delay_st_name_p))
3451 {
3452 arg->failed = TRUE;
3453 return;
3454 }
3455 if (esd->rela.count && esd->rela.hdr == NULL
3456 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3457 TRUE, delay_st_name_p))
3458 {
3459 arg->failed = TRUE;
3460 return;
3461 }
3462 }
3463 else if (!_bfd_elf_init_reloc_shdr (abfd,
3464 (asect->use_rela_p
3465 ? &esd->rela : &esd->rel),
3466 name,
3467 asect->use_rela_p,
3468 delay_st_name_p))
3469 {
3470 arg->failed = TRUE;
3471 return;
3472 }
3473 }
3474
3475 /* Check for processor-specific section types. */
3476 sh_type = this_hdr->sh_type;
3477 if (bed->elf_backend_fake_sections
3478 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3479 {
3480 arg->failed = TRUE;
3481 return;
3482 }
3483
3484 if (sh_type == SHT_NOBITS && asect->size != 0)
3485 {
3486 /* Don't change the header type from NOBITS if we are being
3487 called for objcopy --only-keep-debug. */
3488 this_hdr->sh_type = sh_type;
3489 }
3490 }
3491
3492 /* Fill in the contents of a SHT_GROUP section. Called from
3493 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3494 when ELF targets use the generic linker, ld. Called for ld -r
3495 from bfd_elf_final_link. */
3496
3497 void
3498 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3499 {
3500 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3501 asection *elt, *first;
3502 unsigned char *loc;
3503 bfd_boolean gas;
3504
3505 /* Ignore linker created group section. See elfNN_ia64_object_p in
3506 elfxx-ia64.c. */
3507 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3508 || sec->size == 0
3509 || *failedptr)
3510 return;
3511
3512 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3513 {
3514 unsigned long symindx = 0;
3515
3516 /* elf_group_id will have been set up by objcopy and the
3517 generic linker. */
3518 if (elf_group_id (sec) != NULL)
3519 symindx = elf_group_id (sec)->udata.i;
3520
3521 if (symindx == 0)
3522 {
3523 /* If called from the assembler, swap_out_syms will have set up
3524 elf_section_syms. */
3525 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3526 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3527 }
3528 elf_section_data (sec)->this_hdr.sh_info = symindx;
3529 }
3530 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3531 {
3532 /* The ELF backend linker sets sh_info to -2 when the group
3533 signature symbol is global, and thus the index can't be
3534 set until all local symbols are output. */
3535 asection *igroup;
3536 struct bfd_elf_section_data *sec_data;
3537 unsigned long symndx;
3538 unsigned long extsymoff;
3539 struct elf_link_hash_entry *h;
3540
3541 /* The point of this little dance to the first SHF_GROUP section
3542 then back to the SHT_GROUP section is that this gets us to
3543 the SHT_GROUP in the input object. */
3544 igroup = elf_sec_group (elf_next_in_group (sec));
3545 sec_data = elf_section_data (igroup);
3546 symndx = sec_data->this_hdr.sh_info;
3547 extsymoff = 0;
3548 if (!elf_bad_symtab (igroup->owner))
3549 {
3550 Elf_Internal_Shdr *symtab_hdr;
3551
3552 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3553 extsymoff = symtab_hdr->sh_info;
3554 }
3555 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3556 while (h->root.type == bfd_link_hash_indirect
3557 || h->root.type == bfd_link_hash_warning)
3558 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3559
3560 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3561 }
3562
3563 /* The contents won't be allocated for "ld -r" or objcopy. */
3564 gas = TRUE;
3565 if (sec->contents == NULL)
3566 {
3567 gas = FALSE;
3568 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3569
3570 /* Arrange for the section to be written out. */
3571 elf_section_data (sec)->this_hdr.contents = sec->contents;
3572 if (sec->contents == NULL)
3573 {
3574 *failedptr = TRUE;
3575 return;
3576 }
3577 }
3578
3579 loc = sec->contents + sec->size;
3580
3581 /* Get the pointer to the first section in the group that gas
3582 squirreled away here. objcopy arranges for this to be set to the
3583 start of the input section group. */
3584 first = elt = elf_next_in_group (sec);
3585
3586 /* First element is a flag word. Rest of section is elf section
3587 indices for all the sections of the group. Write them backwards
3588 just to keep the group in the same order as given in .section
3589 directives, not that it matters. */
3590 while (elt != NULL)
3591 {
3592 asection *s;
3593
3594 s = elt;
3595 if (!gas)
3596 s = s->output_section;
3597 if (s != NULL
3598 && !bfd_is_abs_section (s))
3599 {
3600 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3601 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3602
3603 if (elf_sec->rel.hdr != NULL
3604 && (gas
3605 || (input_elf_sec->rel.hdr != NULL
3606 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3607 {
3608 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3609 loc -= 4;
3610 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3611 }
3612 if (elf_sec->rela.hdr != NULL
3613 && (gas
3614 || (input_elf_sec->rela.hdr != NULL
3615 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3616 {
3617 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3618 loc -= 4;
3619 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3620 }
3621 loc -= 4;
3622 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3623 }
3624 elt = elf_next_in_group (elt);
3625 if (elt == first)
3626 break;
3627 }
3628
3629 loc -= 4;
3630 BFD_ASSERT (loc == sec->contents);
3631
3632 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3633 }
3634
3635 /* Given NAME, the name of a relocation section stripped of its
3636 .rel/.rela prefix, return the section in ABFD to which the
3637 relocations apply. */
3638
3639 asection *
3640 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3641 {
3642 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3643 section likely apply to .got.plt or .got section. */
3644 if (get_elf_backend_data (abfd)->want_got_plt
3645 && strcmp (name, ".plt") == 0)
3646 {
3647 asection *sec;
3648
3649 name = ".got.plt";
3650 sec = bfd_get_section_by_name (abfd, name);
3651 if (sec != NULL)
3652 return sec;
3653 name = ".got";
3654 }
3655
3656 return bfd_get_section_by_name (abfd, name);
3657 }
3658
3659 /* Return the section to which RELOC_SEC applies. */
3660
3661 static asection *
3662 elf_get_reloc_section (asection *reloc_sec)
3663 {
3664 const char *name;
3665 unsigned int type;
3666 bfd *abfd;
3667 const struct elf_backend_data *bed;
3668
3669 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3670 if (type != SHT_REL && type != SHT_RELA)
3671 return NULL;
3672
3673 /* We look up the section the relocs apply to by name. */
3674 name = reloc_sec->name;
3675 if (strncmp (name, ".rel", 4) != 0)
3676 return NULL;
3677 name += 4;
3678 if (type == SHT_RELA && *name++ != 'a')
3679 return NULL;
3680
3681 abfd = reloc_sec->owner;
3682 bed = get_elf_backend_data (abfd);
3683 return bed->get_reloc_section (abfd, name);
3684 }
3685
3686 /* Assign all ELF section numbers. The dummy first section is handled here
3687 too. The link/info pointers for the standard section types are filled
3688 in here too, while we're at it. */
3689
3690 static bfd_boolean
3691 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3692 {
3693 struct elf_obj_tdata *t = elf_tdata (abfd);
3694 asection *sec;
3695 unsigned int section_number;
3696 Elf_Internal_Shdr **i_shdrp;
3697 struct bfd_elf_section_data *d;
3698 bfd_boolean need_symtab;
3699 size_t amt;
3700
3701 section_number = 1;
3702
3703 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3704
3705 /* SHT_GROUP sections are in relocatable files only. */
3706 if (link_info == NULL || !link_info->resolve_section_groups)
3707 {
3708 size_t reloc_count = 0;
3709
3710 /* Put SHT_GROUP sections first. */
3711 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3712 {
3713 d = elf_section_data (sec);
3714
3715 if (d->this_hdr.sh_type == SHT_GROUP)
3716 {
3717 if (sec->flags & SEC_LINKER_CREATED)
3718 {
3719 /* Remove the linker created SHT_GROUP sections. */
3720 bfd_section_list_remove (abfd, sec);
3721 abfd->section_count--;
3722 }
3723 else
3724 d->this_idx = section_number++;
3725 }
3726
3727 /* Count relocations. */
3728 reloc_count += sec->reloc_count;
3729 }
3730
3731 /* Clear HAS_RELOC if there are no relocations. */
3732 if (reloc_count == 0)
3733 abfd->flags &= ~HAS_RELOC;
3734 }
3735
3736 for (sec = abfd->sections; sec; sec = sec->next)
3737 {
3738 d = elf_section_data (sec);
3739
3740 if (d->this_hdr.sh_type != SHT_GROUP)
3741 d->this_idx = section_number++;
3742 if (d->this_hdr.sh_name != (unsigned int) -1)
3743 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3744 if (d->rel.hdr)
3745 {
3746 d->rel.idx = section_number++;
3747 if (d->rel.hdr->sh_name != (unsigned int) -1)
3748 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3749 }
3750 else
3751 d->rel.idx = 0;
3752
3753 if (d->rela.hdr)
3754 {
3755 d->rela.idx = section_number++;
3756 if (d->rela.hdr->sh_name != (unsigned int) -1)
3757 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3758 }
3759 else
3760 d->rela.idx = 0;
3761 }
3762
3763 need_symtab = (bfd_get_symcount (abfd) > 0
3764 || (link_info == NULL
3765 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3766 == HAS_RELOC)));
3767 if (need_symtab)
3768 {
3769 elf_onesymtab (abfd) = section_number++;
3770 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3771 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3772 {
3773 elf_section_list *entry;
3774
3775 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3776
3777 entry = bfd_zalloc (abfd, sizeof (*entry));
3778 entry->ndx = section_number++;
3779 elf_symtab_shndx_list (abfd) = entry;
3780 entry->hdr.sh_name
3781 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3782 ".symtab_shndx", FALSE);
3783 if (entry->hdr.sh_name == (unsigned int) -1)
3784 return FALSE;
3785 }
3786 elf_strtab_sec (abfd) = section_number++;
3787 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3788 }
3789
3790 elf_shstrtab_sec (abfd) = section_number++;
3791 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3792 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3793
3794 if (section_number >= SHN_LORESERVE)
3795 {
3796 /* xgettext:c-format */
3797 _bfd_error_handler (_("%pB: too many sections: %u"),
3798 abfd, section_number);
3799 return FALSE;
3800 }
3801
3802 elf_numsections (abfd) = section_number;
3803 elf_elfheader (abfd)->e_shnum = section_number;
3804
3805 /* Set up the list of section header pointers, in agreement with the
3806 indices. */
3807 amt = section_number * sizeof (Elf_Internal_Shdr *);
3808 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3809 if (i_shdrp == NULL)
3810 return FALSE;
3811
3812 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3813 sizeof (Elf_Internal_Shdr));
3814 if (i_shdrp[0] == NULL)
3815 {
3816 bfd_release (abfd, i_shdrp);
3817 return FALSE;
3818 }
3819
3820 elf_elfsections (abfd) = i_shdrp;
3821
3822 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3823 if (need_symtab)
3824 {
3825 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3826 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3827 {
3828 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3829 BFD_ASSERT (entry != NULL);
3830 i_shdrp[entry->ndx] = & entry->hdr;
3831 entry->hdr.sh_link = elf_onesymtab (abfd);
3832 }
3833 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3834 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3835 }
3836
3837 for (sec = abfd->sections; sec; sec = sec->next)
3838 {
3839 asection *s;
3840
3841 d = elf_section_data (sec);
3842
3843 i_shdrp[d->this_idx] = &d->this_hdr;
3844 if (d->rel.idx != 0)
3845 i_shdrp[d->rel.idx] = d->rel.hdr;
3846 if (d->rela.idx != 0)
3847 i_shdrp[d->rela.idx] = d->rela.hdr;
3848
3849 /* Fill in the sh_link and sh_info fields while we're at it. */
3850
3851 /* sh_link of a reloc section is the section index of the symbol
3852 table. sh_info is the section index of the section to which
3853 the relocation entries apply. */
3854 if (d->rel.idx != 0)
3855 {
3856 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3857 d->rel.hdr->sh_info = d->this_idx;
3858 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3859 }
3860 if (d->rela.idx != 0)
3861 {
3862 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3863 d->rela.hdr->sh_info = d->this_idx;
3864 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3865 }
3866
3867 /* We need to set up sh_link for SHF_LINK_ORDER. */
3868 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3869 {
3870 s = elf_linked_to_section (sec);
3871 if (s)
3872 {
3873 /* elf_linked_to_section points to the input section. */
3874 if (link_info != NULL)
3875 {
3876 /* Check discarded linkonce section. */
3877 if (discarded_section (s))
3878 {
3879 asection *kept;
3880 _bfd_error_handler
3881 /* xgettext:c-format */
3882 (_("%pB: sh_link of section `%pA' points to"
3883 " discarded section `%pA' of `%pB'"),
3884 abfd, d->this_hdr.bfd_section,
3885 s, s->owner);
3886 /* Point to the kept section if it has the same
3887 size as the discarded one. */
3888 kept = _bfd_elf_check_kept_section (s, link_info);
3889 if (kept == NULL)
3890 {
3891 bfd_set_error (bfd_error_bad_value);
3892 return FALSE;
3893 }
3894 s = kept;
3895 }
3896
3897 s = s->output_section;
3898 BFD_ASSERT (s != NULL);
3899 }
3900 else
3901 {
3902 /* Handle objcopy. */
3903 if (s->output_section == NULL)
3904 {
3905 _bfd_error_handler
3906 /* xgettext:c-format */
3907 (_("%pB: sh_link of section `%pA' points to"
3908 " removed section `%pA' of `%pB'"),
3909 abfd, d->this_hdr.bfd_section, s, s->owner);
3910 bfd_set_error (bfd_error_bad_value);
3911 return FALSE;
3912 }
3913 s = s->output_section;
3914 }
3915 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3916 }
3917 else
3918 {
3919 /* PR 290:
3920 The Intel C compiler generates SHT_IA_64_UNWIND with
3921 SHF_LINK_ORDER. But it doesn't set the sh_link or
3922 sh_info fields. Hence we could get the situation
3923 where s is NULL. */
3924 const struct elf_backend_data *bed
3925 = get_elf_backend_data (abfd);
3926 if (bed->link_order_error_handler)
3927 bed->link_order_error_handler
3928 /* xgettext:c-format */
3929 (_("%pB: warning: sh_link not set for section `%pA'"),
3930 abfd, sec);
3931 }
3932 }
3933
3934 switch (d->this_hdr.sh_type)
3935 {
3936 case SHT_REL:
3937 case SHT_RELA:
3938 /* A reloc section which we are treating as a normal BFD
3939 section. sh_link is the section index of the symbol
3940 table. sh_info is the section index of the section to
3941 which the relocation entries apply. We assume that an
3942 allocated reloc section uses the dynamic symbol table.
3943 FIXME: How can we be sure? */
3944 s = bfd_get_section_by_name (abfd, ".dynsym");
3945 if (s != NULL)
3946 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3947
3948 s = elf_get_reloc_section (sec);
3949 if (s != NULL)
3950 {
3951 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3952 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3953 }
3954 break;
3955
3956 case SHT_STRTAB:
3957 /* We assume that a section named .stab*str is a stabs
3958 string section. We look for a section with the same name
3959 but without the trailing ``str'', and set its sh_link
3960 field to point to this section. */
3961 if (CONST_STRNEQ (sec->name, ".stab")
3962 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3963 {
3964 size_t len;
3965 char *alc;
3966
3967 len = strlen (sec->name);
3968 alc = (char *) bfd_malloc (len - 2);
3969 if (alc == NULL)
3970 return FALSE;
3971 memcpy (alc, sec->name, len - 3);
3972 alc[len - 3] = '\0';
3973 s = bfd_get_section_by_name (abfd, alc);
3974 free (alc);
3975 if (s != NULL)
3976 {
3977 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3978
3979 /* This is a .stab section. */
3980 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3981 elf_section_data (s)->this_hdr.sh_entsize
3982 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
3983 }
3984 }
3985 break;
3986
3987 case SHT_DYNAMIC:
3988 case SHT_DYNSYM:
3989 case SHT_GNU_verneed:
3990 case SHT_GNU_verdef:
3991 /* sh_link is the section header index of the string table
3992 used for the dynamic entries, or the symbol table, or the
3993 version strings. */
3994 s = bfd_get_section_by_name (abfd, ".dynstr");
3995 if (s != NULL)
3996 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3997 break;
3998
3999 case SHT_GNU_LIBLIST:
4000 /* sh_link is the section header index of the prelink library
4001 list used for the dynamic entries, or the symbol table, or
4002 the version strings. */
4003 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4004 ? ".dynstr" : ".gnu.libstr");
4005 if (s != NULL)
4006 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4007 break;
4008
4009 case SHT_HASH:
4010 case SHT_GNU_HASH:
4011 case SHT_GNU_versym:
4012 /* sh_link is the section header index of the symbol table
4013 this hash table or version table is for. */
4014 s = bfd_get_section_by_name (abfd, ".dynsym");
4015 if (s != NULL)
4016 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4017 break;
4018
4019 case SHT_GROUP:
4020 d->this_hdr.sh_link = elf_onesymtab (abfd);
4021 }
4022 }
4023
4024 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4025 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4026 debug section name from .debug_* to .zdebug_* if needed. */
4027
4028 return TRUE;
4029 }
4030
4031 static bfd_boolean
4032 sym_is_global (bfd *abfd, asymbol *sym)
4033 {
4034 /* If the backend has a special mapping, use it. */
4035 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4036 if (bed->elf_backend_sym_is_global)
4037 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4038
4039 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4040 || bfd_is_und_section (bfd_asymbol_section (sym))
4041 || bfd_is_com_section (bfd_asymbol_section (sym)));
4042 }
4043
4044 /* Filter global symbols of ABFD to include in the import library. All
4045 SYMCOUNT symbols of ABFD can be examined from their pointers in
4046 SYMS. Pointers of symbols to keep should be stored contiguously at
4047 the beginning of that array.
4048
4049 Returns the number of symbols to keep. */
4050
4051 unsigned int
4052 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4053 asymbol **syms, long symcount)
4054 {
4055 long src_count, dst_count = 0;
4056
4057 for (src_count = 0; src_count < symcount; src_count++)
4058 {
4059 asymbol *sym = syms[src_count];
4060 char *name = (char *) bfd_asymbol_name (sym);
4061 struct bfd_link_hash_entry *h;
4062
4063 if (!sym_is_global (abfd, sym))
4064 continue;
4065
4066 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4067 if (h == NULL)
4068 continue;
4069 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4070 continue;
4071 if (h->linker_def || h->ldscript_def)
4072 continue;
4073
4074 syms[dst_count++] = sym;
4075 }
4076
4077 syms[dst_count] = NULL;
4078
4079 return dst_count;
4080 }
4081
4082 /* Don't output section symbols for sections that are not going to be
4083 output, that are duplicates or there is no BFD section. */
4084
4085 static bfd_boolean
4086 ignore_section_sym (bfd *abfd, asymbol *sym)
4087 {
4088 elf_symbol_type *type_ptr;
4089
4090 if (sym == NULL)
4091 return FALSE;
4092
4093 if ((sym->flags & BSF_SECTION_SYM) == 0)
4094 return FALSE;
4095
4096 if (sym->section == NULL)
4097 return TRUE;
4098
4099 type_ptr = elf_symbol_from (abfd, sym);
4100 return ((type_ptr != NULL
4101 && type_ptr->internal_elf_sym.st_shndx != 0
4102 && bfd_is_abs_section (sym->section))
4103 || !(sym->section->owner == abfd
4104 || (sym->section->output_section != NULL
4105 && sym->section->output_section->owner == abfd
4106 && sym->section->output_offset == 0)
4107 || bfd_is_abs_section (sym->section)));
4108 }
4109
4110 /* Map symbol from it's internal number to the external number, moving
4111 all local symbols to be at the head of the list. */
4112
4113 static bfd_boolean
4114 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4115 {
4116 unsigned int symcount = bfd_get_symcount (abfd);
4117 asymbol **syms = bfd_get_outsymbols (abfd);
4118 asymbol **sect_syms;
4119 unsigned int num_locals = 0;
4120 unsigned int num_globals = 0;
4121 unsigned int num_locals2 = 0;
4122 unsigned int num_globals2 = 0;
4123 unsigned int max_index = 0;
4124 unsigned int idx;
4125 asection *asect;
4126 asymbol **new_syms;
4127 size_t amt;
4128
4129 #ifdef DEBUG
4130 fprintf (stderr, "elf_map_symbols\n");
4131 fflush (stderr);
4132 #endif
4133
4134 for (asect = abfd->sections; asect; asect = asect->next)
4135 {
4136 if (max_index < asect->index)
4137 max_index = asect->index;
4138 }
4139
4140 max_index++;
4141 amt = max_index * sizeof (asymbol *);
4142 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4143 if (sect_syms == NULL)
4144 return FALSE;
4145 elf_section_syms (abfd) = sect_syms;
4146 elf_num_section_syms (abfd) = max_index;
4147
4148 /* Init sect_syms entries for any section symbols we have already
4149 decided to output. */
4150 for (idx = 0; idx < symcount; idx++)
4151 {
4152 asymbol *sym = syms[idx];
4153
4154 if ((sym->flags & BSF_SECTION_SYM) != 0
4155 && sym->value == 0
4156 && !ignore_section_sym (abfd, sym)
4157 && !bfd_is_abs_section (sym->section))
4158 {
4159 asection *sec = sym->section;
4160
4161 if (sec->owner != abfd)
4162 sec = sec->output_section;
4163
4164 sect_syms[sec->index] = syms[idx];
4165 }
4166 }
4167
4168 /* Classify all of the symbols. */
4169 for (idx = 0; idx < symcount; idx++)
4170 {
4171 if (sym_is_global (abfd, syms[idx]))
4172 num_globals++;
4173 else if (!ignore_section_sym (abfd, syms[idx]))
4174 num_locals++;
4175 }
4176
4177 /* We will be adding a section symbol for each normal BFD section. Most
4178 sections will already have a section symbol in outsymbols, but
4179 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4180 at least in that case. */
4181 for (asect = abfd->sections; asect; asect = asect->next)
4182 {
4183 if (sect_syms[asect->index] == NULL)
4184 {
4185 if (!sym_is_global (abfd, asect->symbol))
4186 num_locals++;
4187 else
4188 num_globals++;
4189 }
4190 }
4191
4192 /* Now sort the symbols so the local symbols are first. */
4193 amt = (num_locals + num_globals) * sizeof (asymbol *);
4194 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4195 if (new_syms == NULL)
4196 return FALSE;
4197
4198 for (idx = 0; idx < symcount; idx++)
4199 {
4200 asymbol *sym = syms[idx];
4201 unsigned int i;
4202
4203 if (sym_is_global (abfd, sym))
4204 i = num_locals + num_globals2++;
4205 else if (!ignore_section_sym (abfd, sym))
4206 i = num_locals2++;
4207 else
4208 continue;
4209 new_syms[i] = sym;
4210 sym->udata.i = i + 1;
4211 }
4212 for (asect = abfd->sections; asect; asect = asect->next)
4213 {
4214 if (sect_syms[asect->index] == NULL)
4215 {
4216 asymbol *sym = asect->symbol;
4217 unsigned int i;
4218
4219 sect_syms[asect->index] = sym;
4220 if (!sym_is_global (abfd, sym))
4221 i = num_locals2++;
4222 else
4223 i = num_locals + num_globals2++;
4224 new_syms[i] = sym;
4225 sym->udata.i = i + 1;
4226 }
4227 }
4228
4229 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4230
4231 *pnum_locals = num_locals;
4232 return TRUE;
4233 }
4234
4235 /* Align to the maximum file alignment that could be required for any
4236 ELF data structure. */
4237
4238 static inline file_ptr
4239 align_file_position (file_ptr off, int align)
4240 {
4241 return (off + align - 1) & ~(align - 1);
4242 }
4243
4244 /* Assign a file position to a section, optionally aligning to the
4245 required section alignment. */
4246
4247 file_ptr
4248 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4249 file_ptr offset,
4250 bfd_boolean align)
4251 {
4252 if (align && i_shdrp->sh_addralign > 1)
4253 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4254 i_shdrp->sh_offset = offset;
4255 if (i_shdrp->bfd_section != NULL)
4256 i_shdrp->bfd_section->filepos = offset;
4257 if (i_shdrp->sh_type != SHT_NOBITS)
4258 offset += i_shdrp->sh_size;
4259 return offset;
4260 }
4261
4262 /* Compute the file positions we are going to put the sections at, and
4263 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4264 is not NULL, this is being called by the ELF backend linker. */
4265
4266 bfd_boolean
4267 _bfd_elf_compute_section_file_positions (bfd *abfd,
4268 struct bfd_link_info *link_info)
4269 {
4270 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4271 struct fake_section_arg fsargs;
4272 bfd_boolean failed;
4273 struct elf_strtab_hash *strtab = NULL;
4274 Elf_Internal_Shdr *shstrtab_hdr;
4275 bfd_boolean need_symtab;
4276
4277 if (abfd->output_has_begun)
4278 return TRUE;
4279
4280 /* Do any elf backend specific processing first. */
4281 if (bed->elf_backend_begin_write_processing)
4282 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4283
4284 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4285 return FALSE;
4286
4287 fsargs.failed = FALSE;
4288 fsargs.link_info = link_info;
4289 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4290 if (fsargs.failed)
4291 return FALSE;
4292
4293 if (!assign_section_numbers (abfd, link_info))
4294 return FALSE;
4295
4296 /* The backend linker builds symbol table information itself. */
4297 need_symtab = (link_info == NULL
4298 && (bfd_get_symcount (abfd) > 0
4299 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4300 == HAS_RELOC)));
4301 if (need_symtab)
4302 {
4303 /* Non-zero if doing a relocatable link. */
4304 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4305
4306 if (! swap_out_syms (abfd, &strtab, relocatable_p))
4307 return FALSE;
4308 }
4309
4310 failed = FALSE;
4311 if (link_info == NULL)
4312 {
4313 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4314 if (failed)
4315 return FALSE;
4316 }
4317
4318 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4319 /* sh_name was set in init_file_header. */
4320 shstrtab_hdr->sh_type = SHT_STRTAB;
4321 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4322 shstrtab_hdr->sh_addr = 0;
4323 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4324 shstrtab_hdr->sh_entsize = 0;
4325 shstrtab_hdr->sh_link = 0;
4326 shstrtab_hdr->sh_info = 0;
4327 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4328 shstrtab_hdr->sh_addralign = 1;
4329
4330 if (!assign_file_positions_except_relocs (abfd, link_info))
4331 return FALSE;
4332
4333 if (need_symtab)
4334 {
4335 file_ptr off;
4336 Elf_Internal_Shdr *hdr;
4337
4338 off = elf_next_file_pos (abfd);
4339
4340 hdr = & elf_symtab_hdr (abfd);
4341 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4342
4343 if (elf_symtab_shndx_list (abfd) != NULL)
4344 {
4345 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4346 if (hdr->sh_size != 0)
4347 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4348 /* FIXME: What about other symtab_shndx sections in the list ? */
4349 }
4350
4351 hdr = &elf_tdata (abfd)->strtab_hdr;
4352 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4353
4354 elf_next_file_pos (abfd) = off;
4355
4356 /* Now that we know where the .strtab section goes, write it
4357 out. */
4358 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4359 || ! _bfd_elf_strtab_emit (abfd, strtab))
4360 return FALSE;
4361 _bfd_elf_strtab_free (strtab);
4362 }
4363
4364 abfd->output_has_begun = TRUE;
4365
4366 return TRUE;
4367 }
4368
4369 /* Make an initial estimate of the size of the program header. If we
4370 get the number wrong here, we'll redo section placement. */
4371
4372 static bfd_size_type
4373 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4374 {
4375 size_t segs;
4376 asection *s;
4377 const struct elf_backend_data *bed;
4378
4379 /* Assume we will need exactly two PT_LOAD segments: one for text
4380 and one for data. */
4381 segs = 2;
4382
4383 s = bfd_get_section_by_name (abfd, ".interp");
4384 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4385 {
4386 /* If we have a loadable interpreter section, we need a
4387 PT_INTERP segment. In this case, assume we also need a
4388 PT_PHDR segment, although that may not be true for all
4389 targets. */
4390 segs += 2;
4391 }
4392
4393 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4394 {
4395 /* We need a PT_DYNAMIC segment. */
4396 ++segs;
4397 }
4398
4399 if (info != NULL && info->relro)
4400 {
4401 /* We need a PT_GNU_RELRO segment. */
4402 ++segs;
4403 }
4404
4405 if (elf_eh_frame_hdr (abfd))
4406 {
4407 /* We need a PT_GNU_EH_FRAME segment. */
4408 ++segs;
4409 }
4410
4411 if (elf_stack_flags (abfd))
4412 {
4413 /* We need a PT_GNU_STACK segment. */
4414 ++segs;
4415 }
4416
4417 s = bfd_get_section_by_name (abfd,
4418 NOTE_GNU_PROPERTY_SECTION_NAME);
4419 if (s != NULL && s->size != 0)
4420 {
4421 /* We need a PT_GNU_PROPERTY segment. */
4422 ++segs;
4423 }
4424
4425 for (s = abfd->sections; s != NULL; s = s->next)
4426 {
4427 if ((s->flags & SEC_LOAD) != 0
4428 && elf_section_type (s) == SHT_NOTE)
4429 {
4430 unsigned int alignment_power;
4431 /* We need a PT_NOTE segment. */
4432 ++segs;
4433 /* Try to create just one PT_NOTE segment for all adjacent
4434 loadable SHT_NOTE sections. gABI requires that within a
4435 PT_NOTE segment (and also inside of each SHT_NOTE section)
4436 each note should have the same alignment. So we check
4437 whether the sections are correctly aligned. */
4438 alignment_power = s->alignment_power;
4439 while (s->next != NULL
4440 && s->next->alignment_power == alignment_power
4441 && (s->next->flags & SEC_LOAD) != 0
4442 && elf_section_type (s->next) == SHT_NOTE)
4443 s = s->next;
4444 }
4445 }
4446
4447 for (s = abfd->sections; s != NULL; s = s->next)
4448 {
4449 if (s->flags & SEC_THREAD_LOCAL)
4450 {
4451 /* We need a PT_TLS segment. */
4452 ++segs;
4453 break;
4454 }
4455 }
4456
4457 bed = get_elf_backend_data (abfd);
4458
4459 if ((abfd->flags & D_PAGED) != 0
4460 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4461 {
4462 /* Add a PT_GNU_MBIND segment for each mbind section. */
4463 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4464 for (s = abfd->sections; s != NULL; s = s->next)
4465 if (elf_section_flags (s) & SHF_GNU_MBIND)
4466 {
4467 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4468 {
4469 _bfd_error_handler
4470 /* xgettext:c-format */
4471 (_("%pB: GNU_MBIND section `%pA' has invalid "
4472 "sh_info field: %d"),
4473 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4474 continue;
4475 }
4476 /* Align mbind section to page size. */
4477 if (s->alignment_power < page_align_power)
4478 s->alignment_power = page_align_power;
4479 segs ++;
4480 }
4481 }
4482
4483 /* Let the backend count up any program headers it might need. */
4484 if (bed->elf_backend_additional_program_headers)
4485 {
4486 int a;
4487
4488 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4489 if (a == -1)
4490 abort ();
4491 segs += a;
4492 }
4493
4494 return segs * bed->s->sizeof_phdr;
4495 }
4496
4497 /* Find the segment that contains the output_section of section. */
4498
4499 Elf_Internal_Phdr *
4500 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4501 {
4502 struct elf_segment_map *m;
4503 Elf_Internal_Phdr *p;
4504
4505 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4506 m != NULL;
4507 m = m->next, p++)
4508 {
4509 int i;
4510
4511 for (i = m->count - 1; i >= 0; i--)
4512 if (m->sections[i] == section)
4513 return p;
4514 }
4515
4516 return NULL;
4517 }
4518
4519 /* Create a mapping from a set of sections to a program segment. */
4520
4521 static struct elf_segment_map *
4522 make_mapping (bfd *abfd,
4523 asection **sections,
4524 unsigned int from,
4525 unsigned int to,
4526 bfd_boolean phdr)
4527 {
4528 struct elf_segment_map *m;
4529 unsigned int i;
4530 asection **hdrpp;
4531 size_t amt;
4532
4533 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4534 amt += (to - from) * sizeof (asection *);
4535 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4536 if (m == NULL)
4537 return NULL;
4538 m->next = NULL;
4539 m->p_type = PT_LOAD;
4540 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4541 m->sections[i - from] = *hdrpp;
4542 m->count = to - from;
4543
4544 if (from == 0 && phdr)
4545 {
4546 /* Include the headers in the first PT_LOAD segment. */
4547 m->includes_filehdr = 1;
4548 m->includes_phdrs = 1;
4549 }
4550
4551 return m;
4552 }
4553
4554 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4555 on failure. */
4556
4557 struct elf_segment_map *
4558 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4559 {
4560 struct elf_segment_map *m;
4561
4562 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4563 sizeof (struct elf_segment_map));
4564 if (m == NULL)
4565 return NULL;
4566 m->next = NULL;
4567 m->p_type = PT_DYNAMIC;
4568 m->count = 1;
4569 m->sections[0] = dynsec;
4570
4571 return m;
4572 }
4573
4574 /* Possibly add or remove segments from the segment map. */
4575
4576 static bfd_boolean
4577 elf_modify_segment_map (bfd *abfd,
4578 struct bfd_link_info *info,
4579 bfd_boolean remove_empty_load)
4580 {
4581 struct elf_segment_map **m;
4582 const struct elf_backend_data *bed;
4583
4584 /* The placement algorithm assumes that non allocated sections are
4585 not in PT_LOAD segments. We ensure this here by removing such
4586 sections from the segment map. We also remove excluded
4587 sections. Finally, any PT_LOAD segment without sections is
4588 removed. */
4589 m = &elf_seg_map (abfd);
4590 while (*m)
4591 {
4592 unsigned int i, new_count;
4593
4594 for (new_count = 0, i = 0; i < (*m)->count; i++)
4595 {
4596 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4597 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4598 || (*m)->p_type != PT_LOAD))
4599 {
4600 (*m)->sections[new_count] = (*m)->sections[i];
4601 new_count++;
4602 }
4603 }
4604 (*m)->count = new_count;
4605
4606 if (remove_empty_load
4607 && (*m)->p_type == PT_LOAD
4608 && (*m)->count == 0
4609 && !(*m)->includes_phdrs)
4610 *m = (*m)->next;
4611 else
4612 m = &(*m)->next;
4613 }
4614
4615 bed = get_elf_backend_data (abfd);
4616 if (bed->elf_backend_modify_segment_map != NULL)
4617 {
4618 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4619 return FALSE;
4620 }
4621
4622 return TRUE;
4623 }
4624
4625 #define IS_TBSS(s) \
4626 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4627
4628 /* Set up a mapping from BFD sections to program segments. */
4629
4630 bfd_boolean
4631 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4632 {
4633 unsigned int count;
4634 struct elf_segment_map *m;
4635 asection **sections = NULL;
4636 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4637 bfd_boolean no_user_phdrs;
4638
4639 no_user_phdrs = elf_seg_map (abfd) == NULL;
4640
4641 if (info != NULL)
4642 info->user_phdrs = !no_user_phdrs;
4643
4644 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4645 {
4646 asection *s;
4647 unsigned int i;
4648 struct elf_segment_map *mfirst;
4649 struct elf_segment_map **pm;
4650 asection *last_hdr;
4651 bfd_vma last_size;
4652 unsigned int hdr_index;
4653 bfd_vma maxpagesize;
4654 asection **hdrpp;
4655 bfd_boolean phdr_in_segment;
4656 bfd_boolean writable;
4657 bfd_boolean executable;
4658 unsigned int tls_count = 0;
4659 asection *first_tls = NULL;
4660 asection *first_mbind = NULL;
4661 asection *dynsec, *eh_frame_hdr;
4662 size_t amt;
4663 bfd_vma addr_mask, wrap_to = 0;
4664 bfd_size_type phdr_size;
4665
4666 /* Select the allocated sections, and sort them. */
4667
4668 amt = bfd_count_sections (abfd) * sizeof (asection *);
4669 sections = (asection **) bfd_malloc (amt);
4670 if (sections == NULL)
4671 goto error_return;
4672
4673 /* Calculate top address, avoiding undefined behaviour of shift
4674 left operator when shift count is equal to size of type
4675 being shifted. */
4676 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4677 addr_mask = (addr_mask << 1) + 1;
4678
4679 i = 0;
4680 for (s = abfd->sections; s != NULL; s = s->next)
4681 {
4682 if ((s->flags & SEC_ALLOC) != 0)
4683 {
4684 /* target_index is unused until bfd_elf_final_link
4685 starts output of section symbols. Use it to make
4686 qsort stable. */
4687 s->target_index = i;
4688 sections[i] = s;
4689 ++i;
4690 /* A wrapping section potentially clashes with header. */
4691 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4692 wrap_to = (s->lma + s->size) & addr_mask;
4693 }
4694 }
4695 BFD_ASSERT (i <= bfd_count_sections (abfd));
4696 count = i;
4697
4698 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4699
4700 phdr_size = elf_program_header_size (abfd);
4701 if (phdr_size == (bfd_size_type) -1)
4702 phdr_size = get_program_header_size (abfd, info);
4703 phdr_size += bed->s->sizeof_ehdr;
4704 maxpagesize = bed->maxpagesize;
4705 if (maxpagesize == 0)
4706 maxpagesize = 1;
4707 phdr_in_segment = info != NULL && info->load_phdrs;
4708 if (count != 0
4709 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4710 >= (phdr_size & (maxpagesize - 1))))
4711 /* For compatibility with old scripts that may not be using
4712 SIZEOF_HEADERS, add headers when it looks like space has
4713 been left for them. */
4714 phdr_in_segment = TRUE;
4715
4716 /* Build the mapping. */
4717 mfirst = NULL;
4718 pm = &mfirst;
4719
4720 /* If we have a .interp section, then create a PT_PHDR segment for
4721 the program headers and a PT_INTERP segment for the .interp
4722 section. */
4723 s = bfd_get_section_by_name (abfd, ".interp");
4724 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4725 {
4726 amt = sizeof (struct elf_segment_map);
4727 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4728 if (m == NULL)
4729 goto error_return;
4730 m->next = NULL;
4731 m->p_type = PT_PHDR;
4732 m->p_flags = PF_R;
4733 m->p_flags_valid = 1;
4734 m->includes_phdrs = 1;
4735 phdr_in_segment = TRUE;
4736 *pm = m;
4737 pm = &m->next;
4738
4739 amt = sizeof (struct elf_segment_map);
4740 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4741 if (m == NULL)
4742 goto error_return;
4743 m->next = NULL;
4744 m->p_type = PT_INTERP;
4745 m->count = 1;
4746 m->sections[0] = s;
4747
4748 *pm = m;
4749 pm = &m->next;
4750 }
4751
4752 /* Look through the sections. We put sections in the same program
4753 segment when the start of the second section can be placed within
4754 a few bytes of the end of the first section. */
4755 last_hdr = NULL;
4756 last_size = 0;
4757 hdr_index = 0;
4758 writable = FALSE;
4759 executable = FALSE;
4760 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4761 if (dynsec != NULL
4762 && (dynsec->flags & SEC_LOAD) == 0)
4763 dynsec = NULL;
4764
4765 if ((abfd->flags & D_PAGED) == 0)
4766 phdr_in_segment = FALSE;
4767
4768 /* Deal with -Ttext or something similar such that the first section
4769 is not adjacent to the program headers. This is an
4770 approximation, since at this point we don't know exactly how many
4771 program headers we will need. */
4772 if (phdr_in_segment && count > 0)
4773 {
4774 bfd_vma phdr_lma;
4775 bfd_boolean separate_phdr = FALSE;
4776
4777 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4778 if (info != NULL
4779 && info->separate_code
4780 && (sections[0]->flags & SEC_CODE) != 0)
4781 {
4782 /* If data sections should be separate from code and
4783 thus not executable, and the first section is
4784 executable then put the file and program headers in
4785 their own PT_LOAD. */
4786 separate_phdr = TRUE;
4787 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4788 == (sections[0]->lma & addr_mask & -maxpagesize)))
4789 {
4790 /* The file and program headers are currently on the
4791 same page as the first section. Put them on the
4792 previous page if we can. */
4793 if (phdr_lma >= maxpagesize)
4794 phdr_lma -= maxpagesize;
4795 else
4796 separate_phdr = FALSE;
4797 }
4798 }
4799 if ((sections[0]->lma & addr_mask) < phdr_lma
4800 || (sections[0]->lma & addr_mask) < phdr_size)
4801 /* If file and program headers would be placed at the end
4802 of memory then it's probably better to omit them. */
4803 phdr_in_segment = FALSE;
4804 else if (phdr_lma < wrap_to)
4805 /* If a section wraps around to where we'll be placing
4806 file and program headers, then the headers will be
4807 overwritten. */
4808 phdr_in_segment = FALSE;
4809 else if (separate_phdr)
4810 {
4811 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4812 if (m == NULL)
4813 goto error_return;
4814 m->p_paddr = phdr_lma;
4815 m->p_vaddr_offset
4816 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4817 m->p_paddr_valid = 1;
4818 *pm = m;
4819 pm = &m->next;
4820 phdr_in_segment = FALSE;
4821 }
4822 }
4823
4824 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4825 {
4826 asection *hdr;
4827 bfd_boolean new_segment;
4828
4829 hdr = *hdrpp;
4830
4831 /* See if this section and the last one will fit in the same
4832 segment. */
4833
4834 if (last_hdr == NULL)
4835 {
4836 /* If we don't have a segment yet, then we don't need a new
4837 one (we build the last one after this loop). */
4838 new_segment = FALSE;
4839 }
4840 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4841 {
4842 /* If this section has a different relation between the
4843 virtual address and the load address, then we need a new
4844 segment. */
4845 new_segment = TRUE;
4846 }
4847 else if (hdr->lma < last_hdr->lma + last_size
4848 || last_hdr->lma + last_size < last_hdr->lma)
4849 {
4850 /* If this section has a load address that makes it overlap
4851 the previous section, then we need a new segment. */
4852 new_segment = TRUE;
4853 }
4854 else if ((abfd->flags & D_PAGED) != 0
4855 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4856 == (hdr->lma & -maxpagesize)))
4857 {
4858 /* If we are demand paged then we can't map two disk
4859 pages onto the same memory page. */
4860 new_segment = FALSE;
4861 }
4862 /* In the next test we have to be careful when last_hdr->lma is close
4863 to the end of the address space. If the aligned address wraps
4864 around to the start of the address space, then there are no more
4865 pages left in memory and it is OK to assume that the current
4866 section can be included in the current segment. */
4867 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4868 + maxpagesize > last_hdr->lma)
4869 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4870 + maxpagesize <= hdr->lma))
4871 {
4872 /* If putting this section in this segment would force us to
4873 skip a page in the segment, then we need a new segment. */
4874 new_segment = TRUE;
4875 }
4876 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4877 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4878 {
4879 /* We don't want to put a loaded section after a
4880 nonloaded (ie. bss style) section in the same segment
4881 as that will force the non-loaded section to be loaded.
4882 Consider .tbss sections as loaded for this purpose. */
4883 new_segment = TRUE;
4884 }
4885 else if ((abfd->flags & D_PAGED) == 0)
4886 {
4887 /* If the file is not demand paged, which means that we
4888 don't require the sections to be correctly aligned in the
4889 file, then there is no other reason for a new segment. */
4890 new_segment = FALSE;
4891 }
4892 else if (info != NULL
4893 && info->separate_code
4894 && executable != ((hdr->flags & SEC_CODE) != 0))
4895 {
4896 new_segment = TRUE;
4897 }
4898 else if (! writable
4899 && (hdr->flags & SEC_READONLY) == 0)
4900 {
4901 /* We don't want to put a writable section in a read only
4902 segment. */
4903 new_segment = TRUE;
4904 }
4905 else
4906 {
4907 /* Otherwise, we can use the same segment. */
4908 new_segment = FALSE;
4909 }
4910
4911 /* Allow interested parties a chance to override our decision. */
4912 if (last_hdr != NULL
4913 && info != NULL
4914 && info->callbacks->override_segment_assignment != NULL)
4915 new_segment
4916 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4917 last_hdr,
4918 new_segment);
4919
4920 if (! new_segment)
4921 {
4922 if ((hdr->flags & SEC_READONLY) == 0)
4923 writable = TRUE;
4924 if ((hdr->flags & SEC_CODE) != 0)
4925 executable = TRUE;
4926 last_hdr = hdr;
4927 /* .tbss sections effectively have zero size. */
4928 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4929 continue;
4930 }
4931
4932 /* We need a new program segment. We must create a new program
4933 header holding all the sections from hdr_index until hdr. */
4934
4935 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4936 if (m == NULL)
4937 goto error_return;
4938
4939 *pm = m;
4940 pm = &m->next;
4941
4942 if ((hdr->flags & SEC_READONLY) == 0)
4943 writable = TRUE;
4944 else
4945 writable = FALSE;
4946
4947 if ((hdr->flags & SEC_CODE) == 0)
4948 executable = FALSE;
4949 else
4950 executable = TRUE;
4951
4952 last_hdr = hdr;
4953 /* .tbss sections effectively have zero size. */
4954 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4955 hdr_index = i;
4956 phdr_in_segment = FALSE;
4957 }
4958
4959 /* Create a final PT_LOAD program segment, but not if it's just
4960 for .tbss. */
4961 if (last_hdr != NULL
4962 && (i - hdr_index != 1
4963 || !IS_TBSS (last_hdr)))
4964 {
4965 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4966 if (m == NULL)
4967 goto error_return;
4968
4969 *pm = m;
4970 pm = &m->next;
4971 }
4972
4973 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4974 if (dynsec != NULL)
4975 {
4976 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4977 if (m == NULL)
4978 goto error_return;
4979 *pm = m;
4980 pm = &m->next;
4981 }
4982
4983 /* For each batch of consecutive loadable SHT_NOTE sections,
4984 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4985 because if we link together nonloadable .note sections and
4986 loadable .note sections, we will generate two .note sections
4987 in the output file. */
4988 for (s = abfd->sections; s != NULL; s = s->next)
4989 {
4990 if ((s->flags & SEC_LOAD) != 0
4991 && elf_section_type (s) == SHT_NOTE)
4992 {
4993 asection *s2;
4994 unsigned int alignment_power = s->alignment_power;
4995
4996 count = 1;
4997 for (s2 = s; s2->next != NULL; s2 = s2->next)
4998 {
4999 if (s2->next->alignment_power == alignment_power
5000 && (s2->next->flags & SEC_LOAD) != 0
5001 && elf_section_type (s2->next) == SHT_NOTE
5002 && align_power (s2->lma + s2->size,
5003 alignment_power)
5004 == s2->next->lma)
5005 count++;
5006 else
5007 break;
5008 }
5009 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5010 amt += count * sizeof (asection *);
5011 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5012 if (m == NULL)
5013 goto error_return;
5014 m->next = NULL;
5015 m->p_type = PT_NOTE;
5016 m->count = count;
5017 while (count > 1)
5018 {
5019 m->sections[m->count - count--] = s;
5020 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5021 s = s->next;
5022 }
5023 m->sections[m->count - 1] = s;
5024 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5025 *pm = m;
5026 pm = &m->next;
5027 }
5028 if (s->flags & SEC_THREAD_LOCAL)
5029 {
5030 if (! tls_count)
5031 first_tls = s;
5032 tls_count++;
5033 }
5034 if (first_mbind == NULL
5035 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5036 first_mbind = s;
5037 }
5038
5039 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5040 if (tls_count > 0)
5041 {
5042 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5043 amt += tls_count * sizeof (asection *);
5044 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5045 if (m == NULL)
5046 goto error_return;
5047 m->next = NULL;
5048 m->p_type = PT_TLS;
5049 m->count = tls_count;
5050 /* Mandated PF_R. */
5051 m->p_flags = PF_R;
5052 m->p_flags_valid = 1;
5053 s = first_tls;
5054 for (i = 0; i < tls_count; ++i)
5055 {
5056 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5057 {
5058 _bfd_error_handler
5059 (_("%pB: TLS sections are not adjacent:"), abfd);
5060 s = first_tls;
5061 i = 0;
5062 while (i < tls_count)
5063 {
5064 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5065 {
5066 _bfd_error_handler (_(" TLS: %pA"), s);
5067 i++;
5068 }
5069 else
5070 _bfd_error_handler (_(" non-TLS: %pA"), s);
5071 s = s->next;
5072 }
5073 bfd_set_error (bfd_error_bad_value);
5074 goto error_return;
5075 }
5076 m->sections[i] = s;
5077 s = s->next;
5078 }
5079
5080 *pm = m;
5081 pm = &m->next;
5082 }
5083
5084 if (first_mbind
5085 && (abfd->flags & D_PAGED) != 0
5086 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5087 for (s = first_mbind; s != NULL; s = s->next)
5088 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5089 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5090 {
5091 /* Mandated PF_R. */
5092 unsigned long p_flags = PF_R;
5093 if ((s->flags & SEC_READONLY) == 0)
5094 p_flags |= PF_W;
5095 if ((s->flags & SEC_CODE) != 0)
5096 p_flags |= PF_X;
5097
5098 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5099 m = bfd_zalloc (abfd, amt);
5100 if (m == NULL)
5101 goto error_return;
5102 m->next = NULL;
5103 m->p_type = (PT_GNU_MBIND_LO
5104 + elf_section_data (s)->this_hdr.sh_info);
5105 m->count = 1;
5106 m->p_flags_valid = 1;
5107 m->sections[0] = s;
5108 m->p_flags = p_flags;
5109
5110 *pm = m;
5111 pm = &m->next;
5112 }
5113
5114 s = bfd_get_section_by_name (abfd,
5115 NOTE_GNU_PROPERTY_SECTION_NAME);
5116 if (s != NULL && s->size != 0)
5117 {
5118 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5119 m = bfd_zalloc (abfd, amt);
5120 if (m == NULL)
5121 goto error_return;
5122 m->next = NULL;
5123 m->p_type = PT_GNU_PROPERTY;
5124 m->count = 1;
5125 m->p_flags_valid = 1;
5126 m->sections[0] = s;
5127 m->p_flags = PF_R;
5128 *pm = m;
5129 pm = &m->next;
5130 }
5131
5132 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5133 segment. */
5134 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5135 if (eh_frame_hdr != NULL
5136 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5137 {
5138 amt = sizeof (struct elf_segment_map);
5139 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5140 if (m == NULL)
5141 goto error_return;
5142 m->next = NULL;
5143 m->p_type = PT_GNU_EH_FRAME;
5144 m->count = 1;
5145 m->sections[0] = eh_frame_hdr->output_section;
5146
5147 *pm = m;
5148 pm = &m->next;
5149 }
5150
5151 if (elf_stack_flags (abfd))
5152 {
5153 amt = sizeof (struct elf_segment_map);
5154 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5155 if (m == NULL)
5156 goto error_return;
5157 m->next = NULL;
5158 m->p_type = PT_GNU_STACK;
5159 m->p_flags = elf_stack_flags (abfd);
5160 m->p_align = bed->stack_align;
5161 m->p_flags_valid = 1;
5162 m->p_align_valid = m->p_align != 0;
5163 if (info->stacksize > 0)
5164 {
5165 m->p_size = info->stacksize;
5166 m->p_size_valid = 1;
5167 }
5168
5169 *pm = m;
5170 pm = &m->next;
5171 }
5172
5173 if (info != NULL && info->relro)
5174 {
5175 for (m = mfirst; m != NULL; m = m->next)
5176 {
5177 if (m->p_type == PT_LOAD
5178 && m->count != 0
5179 && m->sections[0]->vma >= info->relro_start
5180 && m->sections[0]->vma < info->relro_end)
5181 {
5182 i = m->count;
5183 while (--i != (unsigned) -1)
5184 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5185 == (SEC_LOAD | SEC_HAS_CONTENTS))
5186 break;
5187
5188 if (i != (unsigned) -1)
5189 break;
5190 }
5191 }
5192
5193 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5194 if (m != NULL)
5195 {
5196 amt = sizeof (struct elf_segment_map);
5197 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5198 if (m == NULL)
5199 goto error_return;
5200 m->next = NULL;
5201 m->p_type = PT_GNU_RELRO;
5202 *pm = m;
5203 pm = &m->next;
5204 }
5205 }
5206
5207 free (sections);
5208 elf_seg_map (abfd) = mfirst;
5209 }
5210
5211 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5212 return FALSE;
5213
5214 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5215 ++count;
5216 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5217
5218 return TRUE;
5219
5220 error_return:
5221 if (sections != NULL)
5222 free (sections);
5223 return FALSE;
5224 }
5225
5226 /* Sort sections by address. */
5227
5228 static int
5229 elf_sort_sections (const void *arg1, const void *arg2)
5230 {
5231 const asection *sec1 = *(const asection **) arg1;
5232 const asection *sec2 = *(const asection **) arg2;
5233 bfd_size_type size1, size2;
5234
5235 /* Sort by LMA first, since this is the address used to
5236 place the section into a segment. */
5237 if (sec1->lma < sec2->lma)
5238 return -1;
5239 else if (sec1->lma > sec2->lma)
5240 return 1;
5241
5242 /* Then sort by VMA. Normally the LMA and the VMA will be
5243 the same, and this will do nothing. */
5244 if (sec1->vma < sec2->vma)
5245 return -1;
5246 else if (sec1->vma > sec2->vma)
5247 return 1;
5248
5249 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5250
5251 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5252
5253 if (TOEND (sec1))
5254 {
5255 if (!TOEND (sec2))
5256 return 1;
5257 }
5258 else if (TOEND (sec2))
5259 return -1;
5260
5261 #undef TOEND
5262
5263 /* Sort by size, to put zero sized sections
5264 before others at the same address. */
5265
5266 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5267 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5268
5269 if (size1 < size2)
5270 return -1;
5271 if (size1 > size2)
5272 return 1;
5273
5274 return sec1->target_index - sec2->target_index;
5275 }
5276
5277 /* This qsort comparison functions sorts PT_LOAD segments first and
5278 by p_paddr, for assign_file_positions_for_load_sections. */
5279
5280 static int
5281 elf_sort_segments (const void *arg1, const void *arg2)
5282 {
5283 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5284 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5285
5286 if (m1->p_type != m2->p_type)
5287 {
5288 if (m1->p_type == PT_NULL)
5289 return 1;
5290 if (m2->p_type == PT_NULL)
5291 return -1;
5292 return m1->p_type < m2->p_type ? -1 : 1;
5293 }
5294 if (m1->includes_filehdr != m2->includes_filehdr)
5295 return m1->includes_filehdr ? -1 : 1;
5296 if (m1->no_sort_lma != m2->no_sort_lma)
5297 return m1->no_sort_lma ? -1 : 1;
5298 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5299 {
5300 bfd_vma lma1, lma2;
5301 lma1 = 0;
5302 if (m1->p_paddr_valid)
5303 lma1 = m1->p_paddr;
5304 else if (m1->count != 0)
5305 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5306 lma2 = 0;
5307 if (m2->p_paddr_valid)
5308 lma2 = m2->p_paddr;
5309 else if (m2->count != 0)
5310 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5311 if (lma1 != lma2)
5312 return lma1 < lma2 ? -1 : 1;
5313 }
5314 if (m1->idx != m2->idx)
5315 return m1->idx < m2->idx ? -1 : 1;
5316 return 0;
5317 }
5318
5319 /* Ian Lance Taylor writes:
5320
5321 We shouldn't be using % with a negative signed number. That's just
5322 not good. We have to make sure either that the number is not
5323 negative, or that the number has an unsigned type. When the types
5324 are all the same size they wind up as unsigned. When file_ptr is a
5325 larger signed type, the arithmetic winds up as signed long long,
5326 which is wrong.
5327
5328 What we're trying to say here is something like ``increase OFF by
5329 the least amount that will cause it to be equal to the VMA modulo
5330 the page size.'' */
5331 /* In other words, something like:
5332
5333 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5334 off_offset = off % bed->maxpagesize;
5335 if (vma_offset < off_offset)
5336 adjustment = vma_offset + bed->maxpagesize - off_offset;
5337 else
5338 adjustment = vma_offset - off_offset;
5339
5340 which can be collapsed into the expression below. */
5341
5342 static file_ptr
5343 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5344 {
5345 /* PR binutils/16199: Handle an alignment of zero. */
5346 if (maxpagesize == 0)
5347 maxpagesize = 1;
5348 return ((vma - off) % maxpagesize);
5349 }
5350
5351 static void
5352 print_segment_map (const struct elf_segment_map *m)
5353 {
5354 unsigned int j;
5355 const char *pt = get_segment_type (m->p_type);
5356 char buf[32];
5357
5358 if (pt == NULL)
5359 {
5360 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5361 sprintf (buf, "LOPROC+%7.7x",
5362 (unsigned int) (m->p_type - PT_LOPROC));
5363 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5364 sprintf (buf, "LOOS+%7.7x",
5365 (unsigned int) (m->p_type - PT_LOOS));
5366 else
5367 snprintf (buf, sizeof (buf), "%8.8x",
5368 (unsigned int) m->p_type);
5369 pt = buf;
5370 }
5371 fflush (stdout);
5372 fprintf (stderr, "%s:", pt);
5373 for (j = 0; j < m->count; j++)
5374 fprintf (stderr, " %s", m->sections [j]->name);
5375 putc ('\n',stderr);
5376 fflush (stderr);
5377 }
5378
5379 static bfd_boolean
5380 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5381 {
5382 void *buf;
5383 bfd_boolean ret;
5384
5385 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5386 return FALSE;
5387 buf = bfd_zmalloc (len);
5388 if (buf == NULL)
5389 return FALSE;
5390 ret = bfd_bwrite (buf, len, abfd) == len;
5391 free (buf);
5392 return ret;
5393 }
5394
5395 /* Assign file positions to the sections based on the mapping from
5396 sections to segments. This function also sets up some fields in
5397 the file header. */
5398
5399 static bfd_boolean
5400 assign_file_positions_for_load_sections (bfd *abfd,
5401 struct bfd_link_info *link_info)
5402 {
5403 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5404 struct elf_segment_map *m;
5405 struct elf_segment_map *phdr_load_seg;
5406 Elf_Internal_Phdr *phdrs;
5407 Elf_Internal_Phdr *p;
5408 file_ptr off;
5409 bfd_size_type maxpagesize;
5410 unsigned int alloc, actual;
5411 unsigned int i, j;
5412 struct elf_segment_map **sorted_seg_map;
5413
5414 if (link_info == NULL
5415 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5416 return FALSE;
5417
5418 alloc = 0;
5419 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5420 m->idx = alloc++;
5421
5422 if (alloc)
5423 {
5424 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5425 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5426 }
5427 else
5428 {
5429 /* PR binutils/12467. */
5430 elf_elfheader (abfd)->e_phoff = 0;
5431 elf_elfheader (abfd)->e_phentsize = 0;
5432 }
5433
5434 elf_elfheader (abfd)->e_phnum = alloc;
5435
5436 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5437 {
5438 actual = alloc;
5439 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5440 }
5441 else
5442 {
5443 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5444 BFD_ASSERT (elf_program_header_size (abfd)
5445 == actual * bed->s->sizeof_phdr);
5446 BFD_ASSERT (actual >= alloc);
5447 }
5448
5449 if (alloc == 0)
5450 {
5451 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5452 return TRUE;
5453 }
5454
5455 /* We're writing the size in elf_program_header_size (abfd),
5456 see assign_file_positions_except_relocs, so make sure we have
5457 that amount allocated, with trailing space cleared.
5458 The variable alloc contains the computed need, while
5459 elf_program_header_size (abfd) contains the size used for the
5460 layout.
5461 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5462 where the layout is forced to according to a larger size in the
5463 last iterations for the testcase ld-elf/header. */
5464 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5465 + alloc * sizeof (*sorted_seg_map)));
5466 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5467 elf_tdata (abfd)->phdr = phdrs;
5468 if (phdrs == NULL)
5469 return FALSE;
5470
5471 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5472 {
5473 sorted_seg_map[j] = m;
5474 /* If elf_segment_map is not from map_sections_to_segments, the
5475 sections may not be correctly ordered. NOTE: sorting should
5476 not be done to the PT_NOTE section of a corefile, which may
5477 contain several pseudo-sections artificially created by bfd.
5478 Sorting these pseudo-sections breaks things badly. */
5479 if (m->count > 1
5480 && !(elf_elfheader (abfd)->e_type == ET_CORE
5481 && m->p_type == PT_NOTE))
5482 {
5483 for (i = 0; i < m->count; i++)
5484 m->sections[i]->target_index = i;
5485 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5486 elf_sort_sections);
5487 }
5488 }
5489 if (alloc > 1)
5490 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5491 elf_sort_segments);
5492
5493 maxpagesize = 1;
5494 if ((abfd->flags & D_PAGED) != 0)
5495 maxpagesize = bed->maxpagesize;
5496
5497 /* Sections must map to file offsets past the ELF file header. */
5498 off = bed->s->sizeof_ehdr;
5499 /* And if one of the PT_LOAD headers doesn't include the program
5500 headers then we'll be mapping program headers in the usual
5501 position after the ELF file header. */
5502 phdr_load_seg = NULL;
5503 for (j = 0; j < alloc; j++)
5504 {
5505 m = sorted_seg_map[j];
5506 if (m->p_type != PT_LOAD)
5507 break;
5508 if (m->includes_phdrs)
5509 {
5510 phdr_load_seg = m;
5511 break;
5512 }
5513 }
5514 if (phdr_load_seg == NULL)
5515 off += actual * bed->s->sizeof_phdr;
5516
5517 for (j = 0; j < alloc; j++)
5518 {
5519 asection **secpp;
5520 bfd_vma off_adjust;
5521 bfd_boolean no_contents;
5522
5523 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5524 number of sections with contents contributing to both p_filesz
5525 and p_memsz, followed by a number of sections with no contents
5526 that just contribute to p_memsz. In this loop, OFF tracks next
5527 available file offset for PT_LOAD and PT_NOTE segments. */
5528 m = sorted_seg_map[j];
5529 p = phdrs + m->idx;
5530 p->p_type = m->p_type;
5531 p->p_flags = m->p_flags;
5532
5533 if (m->count == 0)
5534 p->p_vaddr = m->p_vaddr_offset;
5535 else
5536 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
5537
5538 if (m->p_paddr_valid)
5539 p->p_paddr = m->p_paddr;
5540 else if (m->count == 0)
5541 p->p_paddr = 0;
5542 else
5543 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
5544
5545 if (p->p_type == PT_LOAD
5546 && (abfd->flags & D_PAGED) != 0)
5547 {
5548 /* p_align in demand paged PT_LOAD segments effectively stores
5549 the maximum page size. When copying an executable with
5550 objcopy, we set m->p_align from the input file. Use this
5551 value for maxpagesize rather than bed->maxpagesize, which
5552 may be different. Note that we use maxpagesize for PT_TLS
5553 segment alignment later in this function, so we are relying
5554 on at least one PT_LOAD segment appearing before a PT_TLS
5555 segment. */
5556 if (m->p_align_valid)
5557 maxpagesize = m->p_align;
5558
5559 p->p_align = maxpagesize;
5560 }
5561 else if (m->p_align_valid)
5562 p->p_align = m->p_align;
5563 else if (m->count == 0)
5564 p->p_align = 1 << bed->s->log_file_align;
5565
5566 if (m == phdr_load_seg)
5567 {
5568 if (!m->includes_filehdr)
5569 p->p_offset = off;
5570 off += actual * bed->s->sizeof_phdr;
5571 }
5572
5573 no_contents = FALSE;
5574 off_adjust = 0;
5575 if (p->p_type == PT_LOAD
5576 && m->count > 0)
5577 {
5578 bfd_size_type align;
5579 unsigned int align_power = 0;
5580
5581 if (m->p_align_valid)
5582 align = p->p_align;
5583 else
5584 {
5585 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5586 {
5587 unsigned int secalign;
5588
5589 secalign = bfd_section_alignment (*secpp);
5590 if (secalign > align_power)
5591 align_power = secalign;
5592 }
5593 align = (bfd_size_type) 1 << align_power;
5594 if (align < maxpagesize)
5595 align = maxpagesize;
5596 }
5597
5598 for (i = 0; i < m->count; i++)
5599 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5600 /* If we aren't making room for this section, then
5601 it must be SHT_NOBITS regardless of what we've
5602 set via struct bfd_elf_special_section. */
5603 elf_section_type (m->sections[i]) = SHT_NOBITS;
5604
5605 /* Find out whether this segment contains any loadable
5606 sections. */
5607 no_contents = TRUE;
5608 for (i = 0; i < m->count; i++)
5609 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5610 {
5611 no_contents = FALSE;
5612 break;
5613 }
5614
5615 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
5616
5617 /* Broken hardware and/or kernel require that files do not
5618 map the same page with different permissions on some hppa
5619 processors. */
5620 if (j != 0
5621 && (abfd->flags & D_PAGED) != 0
5622 && bed->no_page_alias
5623 && (off & (maxpagesize - 1)) != 0
5624 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5625 off_adjust += maxpagesize;
5626 off += off_adjust;
5627 if (no_contents)
5628 {
5629 /* We shouldn't need to align the segment on disk since
5630 the segment doesn't need file space, but the gABI
5631 arguably requires the alignment and glibc ld.so
5632 checks it. So to comply with the alignment
5633 requirement but not waste file space, we adjust
5634 p_offset for just this segment. (OFF_ADJUST is
5635 subtracted from OFF later.) This may put p_offset
5636 past the end of file, but that shouldn't matter. */
5637 }
5638 else
5639 off_adjust = 0;
5640 }
5641 /* Make sure the .dynamic section is the first section in the
5642 PT_DYNAMIC segment. */
5643 else if (p->p_type == PT_DYNAMIC
5644 && m->count > 1
5645 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5646 {
5647 _bfd_error_handler
5648 (_("%pB: The first section in the PT_DYNAMIC segment"
5649 " is not the .dynamic section"),
5650 abfd);
5651 bfd_set_error (bfd_error_bad_value);
5652 return FALSE;
5653 }
5654 /* Set the note section type to SHT_NOTE. */
5655 else if (p->p_type == PT_NOTE)
5656 for (i = 0; i < m->count; i++)
5657 elf_section_type (m->sections[i]) = SHT_NOTE;
5658
5659 if (m->includes_filehdr)
5660 {
5661 if (!m->p_flags_valid)
5662 p->p_flags |= PF_R;
5663 p->p_filesz = bed->s->sizeof_ehdr;
5664 p->p_memsz = bed->s->sizeof_ehdr;
5665 if (p->p_type == PT_LOAD)
5666 {
5667 if (m->count > 0)
5668 {
5669 if (p->p_vaddr < (bfd_vma) off
5670 || (!m->p_paddr_valid
5671 && p->p_paddr < (bfd_vma) off))
5672 {
5673 _bfd_error_handler
5674 (_("%pB: not enough room for program headers,"
5675 " try linking with -N"),
5676 abfd);
5677 bfd_set_error (bfd_error_bad_value);
5678 return FALSE;
5679 }
5680 p->p_vaddr -= off;
5681 if (!m->p_paddr_valid)
5682 p->p_paddr -= off;
5683 }
5684 }
5685 else if (sorted_seg_map[0]->includes_filehdr)
5686 {
5687 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5688 p->p_vaddr = filehdr->p_vaddr;
5689 if (!m->p_paddr_valid)
5690 p->p_paddr = filehdr->p_paddr;
5691 }
5692 }
5693
5694 if (m->includes_phdrs)
5695 {
5696 if (!m->p_flags_valid)
5697 p->p_flags |= PF_R;
5698 p->p_filesz += actual * bed->s->sizeof_phdr;
5699 p->p_memsz += actual * bed->s->sizeof_phdr;
5700 if (!m->includes_filehdr)
5701 {
5702 if (p->p_type == PT_LOAD)
5703 {
5704 elf_elfheader (abfd)->e_phoff = p->p_offset;
5705 if (m->count > 0)
5706 {
5707 p->p_vaddr -= off - p->p_offset;
5708 if (!m->p_paddr_valid)
5709 p->p_paddr -= off - p->p_offset;
5710 }
5711 }
5712 else if (phdr_load_seg != NULL)
5713 {
5714 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5715 bfd_vma phdr_off = 0;
5716 if (phdr_load_seg->includes_filehdr)
5717 phdr_off = bed->s->sizeof_ehdr;
5718 p->p_vaddr = phdr->p_vaddr + phdr_off;
5719 if (!m->p_paddr_valid)
5720 p->p_paddr = phdr->p_paddr + phdr_off;
5721 p->p_offset = phdr->p_offset + phdr_off;
5722 }
5723 else
5724 p->p_offset = bed->s->sizeof_ehdr;
5725 }
5726 }
5727
5728 if (p->p_type == PT_LOAD
5729 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5730 {
5731 if (!m->includes_filehdr && !m->includes_phdrs)
5732 {
5733 p->p_offset = off;
5734 if (no_contents)
5735 {
5736 /* Put meaningless p_offset for PT_LOAD segments
5737 without file contents somewhere within the first
5738 page, in an attempt to not point past EOF. */
5739 bfd_size_type align = maxpagesize;
5740 if (align < p->p_align)
5741 align = p->p_align;
5742 if (align < 1)
5743 align = 1;
5744 p->p_offset = off % align;
5745 }
5746 }
5747 else
5748 {
5749 file_ptr adjust;
5750
5751 adjust = off - (p->p_offset + p->p_filesz);
5752 if (!no_contents)
5753 p->p_filesz += adjust;
5754 p->p_memsz += adjust;
5755 }
5756 }
5757
5758 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5759 maps. Set filepos for sections in PT_LOAD segments, and in
5760 core files, for sections in PT_NOTE segments.
5761 assign_file_positions_for_non_load_sections will set filepos
5762 for other sections and update p_filesz for other segments. */
5763 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5764 {
5765 asection *sec;
5766 bfd_size_type align;
5767 Elf_Internal_Shdr *this_hdr;
5768
5769 sec = *secpp;
5770 this_hdr = &elf_section_data (sec)->this_hdr;
5771 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5772
5773 if ((p->p_type == PT_LOAD
5774 || p->p_type == PT_TLS)
5775 && (this_hdr->sh_type != SHT_NOBITS
5776 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5777 && ((this_hdr->sh_flags & SHF_TLS) == 0
5778 || p->p_type == PT_TLS))))
5779 {
5780 bfd_vma p_start = p->p_paddr;
5781 bfd_vma p_end = p_start + p->p_memsz;
5782 bfd_vma s_start = sec->lma;
5783 bfd_vma adjust = s_start - p_end;
5784
5785 if (adjust != 0
5786 && (s_start < p_end
5787 || p_end < p_start))
5788 {
5789 _bfd_error_handler
5790 /* xgettext:c-format */
5791 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5792 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
5793 adjust = 0;
5794 sec->lma = p_end;
5795 }
5796 p->p_memsz += adjust;
5797
5798 if (this_hdr->sh_type != SHT_NOBITS)
5799 {
5800 if (p->p_type == PT_LOAD)
5801 {
5802 if (p->p_filesz + adjust < p->p_memsz)
5803 {
5804 /* We have a PROGBITS section following NOBITS ones.
5805 Allocate file space for the NOBITS section(s) and
5806 zero it. */
5807 adjust = p->p_memsz - p->p_filesz;
5808 if (!write_zeros (abfd, off, adjust))
5809 return FALSE;
5810 }
5811 off += adjust;
5812 }
5813 p->p_filesz += adjust;
5814 }
5815 }
5816
5817 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5818 {
5819 /* The section at i == 0 is the one that actually contains
5820 everything. */
5821 if (i == 0)
5822 {
5823 this_hdr->sh_offset = sec->filepos = off;
5824 off += this_hdr->sh_size;
5825 p->p_filesz = this_hdr->sh_size;
5826 p->p_memsz = 0;
5827 p->p_align = 1;
5828 }
5829 else
5830 {
5831 /* The rest are fake sections that shouldn't be written. */
5832 sec->filepos = 0;
5833 sec->size = 0;
5834 sec->flags = 0;
5835 continue;
5836 }
5837 }
5838 else
5839 {
5840 if (p->p_type == PT_LOAD)
5841 {
5842 this_hdr->sh_offset = sec->filepos = off;
5843 if (this_hdr->sh_type != SHT_NOBITS)
5844 off += this_hdr->sh_size;
5845 }
5846 else if (this_hdr->sh_type == SHT_NOBITS
5847 && (this_hdr->sh_flags & SHF_TLS) != 0
5848 && this_hdr->sh_offset == 0)
5849 {
5850 /* This is a .tbss section that didn't get a PT_LOAD.
5851 (See _bfd_elf_map_sections_to_segments "Create a
5852 final PT_LOAD".) Set sh_offset to the value it
5853 would have if we had created a zero p_filesz and
5854 p_memsz PT_LOAD header for the section. This
5855 also makes the PT_TLS header have the same
5856 p_offset value. */
5857 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5858 off, align);
5859 this_hdr->sh_offset = sec->filepos = off + adjust;
5860 }
5861
5862 if (this_hdr->sh_type != SHT_NOBITS)
5863 {
5864 p->p_filesz += this_hdr->sh_size;
5865 /* A load section without SHF_ALLOC is something like
5866 a note section in a PT_NOTE segment. These take
5867 file space but are not loaded into memory. */
5868 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5869 p->p_memsz += this_hdr->sh_size;
5870 }
5871 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5872 {
5873 if (p->p_type == PT_TLS)
5874 p->p_memsz += this_hdr->sh_size;
5875
5876 /* .tbss is special. It doesn't contribute to p_memsz of
5877 normal segments. */
5878 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5879 p->p_memsz += this_hdr->sh_size;
5880 }
5881
5882 if (align > p->p_align
5883 && !m->p_align_valid
5884 && (p->p_type != PT_LOAD
5885 || (abfd->flags & D_PAGED) == 0))
5886 p->p_align = align;
5887 }
5888
5889 if (!m->p_flags_valid)
5890 {
5891 p->p_flags |= PF_R;
5892 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5893 p->p_flags |= PF_X;
5894 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5895 p->p_flags |= PF_W;
5896 }
5897 }
5898
5899 off -= off_adjust;
5900
5901 /* PR ld/20815 - Check that the program header segment, if
5902 present, will be loaded into memory. */
5903 if (p->p_type == PT_PHDR
5904 && phdr_load_seg == NULL
5905 && !(bed->elf_backend_allow_non_load_phdr != NULL
5906 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5907 {
5908 /* The fix for this error is usually to edit the linker script being
5909 used and set up the program headers manually. Either that or
5910 leave room for the headers at the start of the SECTIONS. */
5911 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5912 " by LOAD segment"),
5913 abfd);
5914 if (link_info == NULL)
5915 return FALSE;
5916 /* Arrange for the linker to exit with an error, deleting
5917 the output file unless --noinhibit-exec is given. */
5918 link_info->callbacks->info ("%X");
5919 }
5920
5921 /* Check that all sections are in a PT_LOAD segment.
5922 Don't check funky gdb generated core files. */
5923 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5924 {
5925 bfd_boolean check_vma = TRUE;
5926
5927 for (i = 1; i < m->count; i++)
5928 if (m->sections[i]->vma == m->sections[i - 1]->vma
5929 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5930 ->this_hdr), p) != 0
5931 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5932 ->this_hdr), p) != 0)
5933 {
5934 /* Looks like we have overlays packed into the segment. */
5935 check_vma = FALSE;
5936 break;
5937 }
5938
5939 for (i = 0; i < m->count; i++)
5940 {
5941 Elf_Internal_Shdr *this_hdr;
5942 asection *sec;
5943
5944 sec = m->sections[i];
5945 this_hdr = &(elf_section_data(sec)->this_hdr);
5946 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5947 && !ELF_TBSS_SPECIAL (this_hdr, p))
5948 {
5949 _bfd_error_handler
5950 /* xgettext:c-format */
5951 (_("%pB: section `%pA' can't be allocated in segment %d"),
5952 abfd, sec, j);
5953 print_segment_map (m);
5954 }
5955 }
5956 }
5957 }
5958
5959 elf_next_file_pos (abfd) = off;
5960
5961 if (link_info != NULL
5962 && phdr_load_seg != NULL
5963 && phdr_load_seg->includes_filehdr)
5964 {
5965 /* There is a segment that contains both the file headers and the
5966 program headers, so provide a symbol __ehdr_start pointing there.
5967 A program can use this to examine itself robustly. */
5968
5969 struct elf_link_hash_entry *hash
5970 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5971 FALSE, FALSE, TRUE);
5972 /* If the symbol was referenced and not defined, define it. */
5973 if (hash != NULL
5974 && (hash->root.type == bfd_link_hash_new
5975 || hash->root.type == bfd_link_hash_undefined
5976 || hash->root.type == bfd_link_hash_undefweak
5977 || hash->root.type == bfd_link_hash_common))
5978 {
5979 asection *s = NULL;
5980 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5981
5982 if (phdr_load_seg->count != 0)
5983 /* The segment contains sections, so use the first one. */
5984 s = phdr_load_seg->sections[0];
5985 else
5986 /* Use the first (i.e. lowest-addressed) section in any segment. */
5987 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5988 if (m->p_type == PT_LOAD && m->count != 0)
5989 {
5990 s = m->sections[0];
5991 break;
5992 }
5993
5994 if (s != NULL)
5995 {
5996 hash->root.u.def.value = filehdr_vaddr - s->vma;
5997 hash->root.u.def.section = s;
5998 }
5999 else
6000 {
6001 hash->root.u.def.value = filehdr_vaddr;
6002 hash->root.u.def.section = bfd_abs_section_ptr;
6003 }
6004
6005 hash->root.type = bfd_link_hash_defined;
6006 hash->def_regular = 1;
6007 hash->non_elf = 0;
6008 }
6009 }
6010
6011 return TRUE;
6012 }
6013
6014 /* Determine if a bfd is a debuginfo file. Unfortunately there
6015 is no defined method for detecting such files, so we have to
6016 use heuristics instead. */
6017
6018 bfd_boolean
6019 is_debuginfo_file (bfd *abfd)
6020 {
6021 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6022 return FALSE;
6023
6024 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6025 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6026 Elf_Internal_Shdr **headerp;
6027
6028 for (headerp = start_headers; headerp < end_headers; headerp ++)
6029 {
6030 Elf_Internal_Shdr *header = * headerp;
6031
6032 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6033 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6034 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6035 && header->sh_type != SHT_NOBITS
6036 && header->sh_type != SHT_NOTE)
6037 return FALSE;
6038 }
6039
6040 return TRUE;
6041 }
6042
6043 /* Assign file positions for the other sections, except for compressed debugging
6044 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6045
6046 static bfd_boolean
6047 assign_file_positions_for_non_load_sections (bfd *abfd,
6048 struct bfd_link_info *link_info)
6049 {
6050 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6051 Elf_Internal_Shdr **i_shdrpp;
6052 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6053 Elf_Internal_Phdr *phdrs;
6054 Elf_Internal_Phdr *p;
6055 struct elf_segment_map *m;
6056 file_ptr off;
6057
6058 i_shdrpp = elf_elfsections (abfd);
6059 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6060 off = elf_next_file_pos (abfd);
6061 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6062 {
6063 Elf_Internal_Shdr *hdr;
6064
6065 hdr = *hdrpp;
6066 if (hdr->bfd_section != NULL
6067 && (hdr->bfd_section->filepos != 0
6068 || (hdr->sh_type == SHT_NOBITS
6069 && hdr->contents == NULL)))
6070 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6071 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6072 {
6073 if (hdr->sh_size != 0
6074 /* PR 24717 - debuginfo files are known to be not strictly
6075 compliant with the ELF standard. In particular they often
6076 have .note.gnu.property sections that are outside of any
6077 loadable segment. This is not a problem for such files,
6078 so do not warn about them. */
6079 && ! is_debuginfo_file (abfd))
6080 _bfd_error_handler
6081 /* xgettext:c-format */
6082 (_("%pB: warning: allocated section `%s' not in segment"),
6083 abfd,
6084 (hdr->bfd_section == NULL
6085 ? "*unknown*"
6086 : hdr->bfd_section->name));
6087 /* We don't need to page align empty sections. */
6088 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6089 off += vma_page_aligned_bias (hdr->sh_addr, off,
6090 bed->maxpagesize);
6091 else
6092 off += vma_page_aligned_bias (hdr->sh_addr, off,
6093 hdr->sh_addralign);
6094 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6095 FALSE);
6096 }
6097 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6098 && hdr->bfd_section == NULL)
6099 /* We don't know the offset of these sections yet: their size has
6100 not been decided. */
6101 || (hdr->bfd_section != NULL
6102 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6103 || (bfd_section_is_ctf (hdr->bfd_section)
6104 && abfd->is_linker_output)))
6105 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6106 || (elf_symtab_shndx_list (abfd) != NULL
6107 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6108 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6109 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6110 hdr->sh_offset = -1;
6111 else
6112 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6113 }
6114 elf_next_file_pos (abfd) = off;
6115
6116 /* Now that we have set the section file positions, we can set up
6117 the file positions for the non PT_LOAD segments. */
6118 phdrs = elf_tdata (abfd)->phdr;
6119 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6120 {
6121 if (p->p_type == PT_GNU_RELRO)
6122 {
6123 bfd_vma start, end;
6124 bfd_boolean ok;
6125
6126 if (link_info != NULL)
6127 {
6128 /* During linking the range of the RELRO segment is passed
6129 in link_info. Note that there may be padding between
6130 relro_start and the first RELRO section. */
6131 start = link_info->relro_start;
6132 end = link_info->relro_end;
6133 }
6134 else if (m->count != 0)
6135 {
6136 if (!m->p_size_valid)
6137 abort ();
6138 start = m->sections[0]->vma;
6139 end = start + m->p_size;
6140 }
6141 else
6142 {
6143 start = 0;
6144 end = 0;
6145 }
6146
6147 ok = FALSE;
6148 if (start < end)
6149 {
6150 struct elf_segment_map *lm;
6151 const Elf_Internal_Phdr *lp;
6152 unsigned int i;
6153
6154 /* Find a LOAD segment containing a section in the RELRO
6155 segment. */
6156 for (lm = elf_seg_map (abfd), lp = phdrs;
6157 lm != NULL;
6158 lm = lm->next, lp++)
6159 {
6160 if (lp->p_type == PT_LOAD
6161 && lm->count != 0
6162 && (lm->sections[lm->count - 1]->vma
6163 + (!IS_TBSS (lm->sections[lm->count - 1])
6164 ? lm->sections[lm->count - 1]->size
6165 : 0)) > start
6166 && lm->sections[0]->vma < end)
6167 break;
6168 }
6169
6170 if (lm != NULL)
6171 {
6172 /* Find the section starting the RELRO segment. */
6173 for (i = 0; i < lm->count; i++)
6174 {
6175 asection *s = lm->sections[i];
6176 if (s->vma >= start
6177 && s->vma < end
6178 && s->size != 0)
6179 break;
6180 }
6181
6182 if (i < lm->count)
6183 {
6184 p->p_vaddr = lm->sections[i]->vma;
6185 p->p_paddr = lm->sections[i]->lma;
6186 p->p_offset = lm->sections[i]->filepos;
6187 p->p_memsz = end - p->p_vaddr;
6188 p->p_filesz = p->p_memsz;
6189
6190 /* The RELRO segment typically ends a few bytes
6191 into .got.plt but other layouts are possible.
6192 In cases where the end does not match any
6193 loaded section (for instance is in file
6194 padding), trim p_filesz back to correspond to
6195 the end of loaded section contents. */
6196 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6197 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6198
6199 /* Preserve the alignment and flags if they are
6200 valid. The gold linker generates RW/4 for
6201 the PT_GNU_RELRO section. It is better for
6202 objcopy/strip to honor these attributes
6203 otherwise gdb will choke when using separate
6204 debug files. */
6205 if (!m->p_align_valid)
6206 p->p_align = 1;
6207 if (!m->p_flags_valid)
6208 p->p_flags = PF_R;
6209 ok = TRUE;
6210 }
6211 }
6212 }
6213 if (link_info != NULL)
6214 BFD_ASSERT (ok);
6215 if (!ok)
6216 memset (p, 0, sizeof *p);
6217 }
6218 else if (p->p_type == PT_GNU_STACK)
6219 {
6220 if (m->p_size_valid)
6221 p->p_memsz = m->p_size;
6222 }
6223 else if (m->count != 0)
6224 {
6225 unsigned int i;
6226
6227 if (p->p_type != PT_LOAD
6228 && (p->p_type != PT_NOTE
6229 || bfd_get_format (abfd) != bfd_core))
6230 {
6231 /* A user specified segment layout may include a PHDR
6232 segment that overlaps with a LOAD segment... */
6233 if (p->p_type == PT_PHDR)
6234 {
6235 m->count = 0;
6236 continue;
6237 }
6238
6239 if (m->includes_filehdr || m->includes_phdrs)
6240 {
6241 /* PR 17512: file: 2195325e. */
6242 _bfd_error_handler
6243 (_("%pB: error: non-load segment %d includes file header "
6244 "and/or program header"),
6245 abfd, (int) (p - phdrs));
6246 return FALSE;
6247 }
6248
6249 p->p_filesz = 0;
6250 p->p_offset = m->sections[0]->filepos;
6251 for (i = m->count; i-- != 0;)
6252 {
6253 asection *sect = m->sections[i];
6254 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6255 if (hdr->sh_type != SHT_NOBITS)
6256 {
6257 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6258 + hdr->sh_size);
6259 break;
6260 }
6261 }
6262 }
6263 }
6264 }
6265
6266 return TRUE;
6267 }
6268
6269 static elf_section_list *
6270 find_section_in_list (unsigned int i, elf_section_list * list)
6271 {
6272 for (;list != NULL; list = list->next)
6273 if (list->ndx == i)
6274 break;
6275 return list;
6276 }
6277
6278 /* Work out the file positions of all the sections. This is called by
6279 _bfd_elf_compute_section_file_positions. All the section sizes and
6280 VMAs must be known before this is called.
6281
6282 Reloc sections come in two flavours: Those processed specially as
6283 "side-channel" data attached to a section to which they apply, and those that
6284 bfd doesn't process as relocations. The latter sort are stored in a normal
6285 bfd section by bfd_section_from_shdr. We don't consider the former sort
6286 here, unless they form part of the loadable image. Reloc sections not
6287 assigned here (and compressed debugging sections and CTF sections which
6288 nothing else in the file can rely upon) will be handled later by
6289 assign_file_positions_for_relocs.
6290
6291 We also don't set the positions of the .symtab and .strtab here. */
6292
6293 static bfd_boolean
6294 assign_file_positions_except_relocs (bfd *abfd,
6295 struct bfd_link_info *link_info)
6296 {
6297 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6298 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6299 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6300 unsigned int alloc;
6301
6302 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6303 && bfd_get_format (abfd) != bfd_core)
6304 {
6305 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6306 unsigned int num_sec = elf_numsections (abfd);
6307 Elf_Internal_Shdr **hdrpp;
6308 unsigned int i;
6309 file_ptr off;
6310
6311 /* Start after the ELF header. */
6312 off = i_ehdrp->e_ehsize;
6313
6314 /* We are not creating an executable, which means that we are
6315 not creating a program header, and that the actual order of
6316 the sections in the file is unimportant. */
6317 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6318 {
6319 Elf_Internal_Shdr *hdr;
6320
6321 hdr = *hdrpp;
6322 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6323 && hdr->bfd_section == NULL)
6324 /* Do not assign offsets for these sections yet: we don't know
6325 their sizes. */
6326 || (hdr->bfd_section != NULL
6327 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6328 || (bfd_section_is_ctf (hdr->bfd_section)
6329 && abfd->is_linker_output)))
6330 || i == elf_onesymtab (abfd)
6331 || (elf_symtab_shndx_list (abfd) != NULL
6332 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6333 || i == elf_strtab_sec (abfd)
6334 || i == elf_shstrtab_sec (abfd))
6335 {
6336 hdr->sh_offset = -1;
6337 }
6338 else
6339 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6340 }
6341
6342 elf_next_file_pos (abfd) = off;
6343 elf_program_header_size (abfd) = 0;
6344 }
6345 else
6346 {
6347 /* Assign file positions for the loaded sections based on the
6348 assignment of sections to segments. */
6349 if (!assign_file_positions_for_load_sections (abfd, link_info))
6350 return FALSE;
6351
6352 /* And for non-load sections. */
6353 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6354 return FALSE;
6355 }
6356
6357 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6358 return FALSE;
6359
6360 /* Write out the program headers. */
6361 alloc = i_ehdrp->e_phnum;
6362 if (alloc != 0)
6363 {
6364 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6365 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6366 return FALSE;
6367 }
6368
6369 return TRUE;
6370 }
6371
6372 bfd_boolean
6373 _bfd_elf_init_file_header (bfd *abfd,
6374 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6375 {
6376 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6377 struct elf_strtab_hash *shstrtab;
6378 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6379
6380 i_ehdrp = elf_elfheader (abfd);
6381
6382 shstrtab = _bfd_elf_strtab_init ();
6383 if (shstrtab == NULL)
6384 return FALSE;
6385
6386 elf_shstrtab (abfd) = shstrtab;
6387
6388 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6389 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6390 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6391 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6392
6393 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6394 i_ehdrp->e_ident[EI_DATA] =
6395 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6396 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6397
6398 if ((abfd->flags & DYNAMIC) != 0)
6399 i_ehdrp->e_type = ET_DYN;
6400 else if ((abfd->flags & EXEC_P) != 0)
6401 i_ehdrp->e_type = ET_EXEC;
6402 else if (bfd_get_format (abfd) == bfd_core)
6403 i_ehdrp->e_type = ET_CORE;
6404 else
6405 i_ehdrp->e_type = ET_REL;
6406
6407 switch (bfd_get_arch (abfd))
6408 {
6409 case bfd_arch_unknown:
6410 i_ehdrp->e_machine = EM_NONE;
6411 break;
6412
6413 /* There used to be a long list of cases here, each one setting
6414 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6415 in the corresponding bfd definition. To avoid duplication,
6416 the switch was removed. Machines that need special handling
6417 can generally do it in elf_backend_final_write_processing(),
6418 unless they need the information earlier than the final write.
6419 Such need can generally be supplied by replacing the tests for
6420 e_machine with the conditions used to determine it. */
6421 default:
6422 i_ehdrp->e_machine = bed->elf_machine_code;
6423 }
6424
6425 i_ehdrp->e_version = bed->s->ev_current;
6426 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6427
6428 /* No program header, for now. */
6429 i_ehdrp->e_phoff = 0;
6430 i_ehdrp->e_phentsize = 0;
6431 i_ehdrp->e_phnum = 0;
6432
6433 /* Each bfd section is section header entry. */
6434 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6435 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6436
6437 elf_tdata (abfd)->symtab_hdr.sh_name =
6438 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6439 elf_tdata (abfd)->strtab_hdr.sh_name =
6440 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6441 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6442 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6443 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6444 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6445 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6446 return FALSE;
6447
6448 return TRUE;
6449 }
6450
6451 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6452
6453 FIXME: We used to have code here to sort the PT_LOAD segments into
6454 ascending order, as per the ELF spec. But this breaks some programs,
6455 including the Linux kernel. But really either the spec should be
6456 changed or the programs updated. */
6457
6458 bfd_boolean
6459 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6460 {
6461 if (link_info != NULL && bfd_link_pie (link_info))
6462 {
6463 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6464 unsigned int num_segments = i_ehdrp->e_phnum;
6465 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6466 Elf_Internal_Phdr *segment = tdata->phdr;
6467 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6468
6469 /* Find the lowest p_vaddr in PT_LOAD segments. */
6470 bfd_vma p_vaddr = (bfd_vma) -1;
6471 for (; segment < end_segment; segment++)
6472 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6473 p_vaddr = segment->p_vaddr;
6474
6475 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6476 segments is non-zero. */
6477 if (p_vaddr)
6478 i_ehdrp->e_type = ET_EXEC;
6479 }
6480 return TRUE;
6481 }
6482
6483 /* Assign file positions for all the reloc sections which are not part
6484 of the loadable file image, and the file position of section headers. */
6485
6486 static bfd_boolean
6487 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6488 {
6489 file_ptr off;
6490 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6491 Elf_Internal_Shdr *shdrp;
6492 Elf_Internal_Ehdr *i_ehdrp;
6493 const struct elf_backend_data *bed;
6494
6495 off = elf_next_file_pos (abfd);
6496
6497 shdrpp = elf_elfsections (abfd);
6498 end_shdrpp = shdrpp + elf_numsections (abfd);
6499 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6500 {
6501 shdrp = *shdrpp;
6502 if (shdrp->sh_offset == -1)
6503 {
6504 asection *sec = shdrp->bfd_section;
6505 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6506 || shdrp->sh_type == SHT_RELA);
6507 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6508 if (is_rel
6509 || is_ctf
6510 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6511 {
6512 if (!is_rel && !is_ctf)
6513 {
6514 const char *name = sec->name;
6515 struct bfd_elf_section_data *d;
6516
6517 /* Compress DWARF debug sections. */
6518 if (!bfd_compress_section (abfd, sec,
6519 shdrp->contents))
6520 return FALSE;
6521
6522 if (sec->compress_status == COMPRESS_SECTION_DONE
6523 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6524 {
6525 /* If section is compressed with zlib-gnu, convert
6526 section name from .debug_* to .zdebug_*. */
6527 char *new_name
6528 = convert_debug_to_zdebug (abfd, name);
6529 if (new_name == NULL)
6530 return FALSE;
6531 name = new_name;
6532 }
6533 /* Add section name to section name section. */
6534 if (shdrp->sh_name != (unsigned int) -1)
6535 abort ();
6536 shdrp->sh_name
6537 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6538 name, FALSE);
6539 d = elf_section_data (sec);
6540
6541 /* Add reloc section name to section name section. */
6542 if (d->rel.hdr
6543 && !_bfd_elf_set_reloc_sh_name (abfd,
6544 d->rel.hdr,
6545 name, FALSE))
6546 return FALSE;
6547 if (d->rela.hdr
6548 && !_bfd_elf_set_reloc_sh_name (abfd,
6549 d->rela.hdr,
6550 name, TRUE))
6551 return FALSE;
6552
6553 /* Update section size and contents. */
6554 shdrp->sh_size = sec->size;
6555 shdrp->contents = sec->contents;
6556 shdrp->bfd_section->contents = NULL;
6557 }
6558 else if (is_ctf)
6559 {
6560 /* Update section size and contents. */
6561 shdrp->sh_size = sec->size;
6562 shdrp->contents = sec->contents;
6563 }
6564
6565 off = _bfd_elf_assign_file_position_for_section (shdrp,
6566 off,
6567 TRUE);
6568 }
6569 }
6570 }
6571
6572 /* Place section name section after DWARF debug sections have been
6573 compressed. */
6574 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6575 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6576 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6577 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6578
6579 /* Place the section headers. */
6580 i_ehdrp = elf_elfheader (abfd);
6581 bed = get_elf_backend_data (abfd);
6582 off = align_file_position (off, 1 << bed->s->log_file_align);
6583 i_ehdrp->e_shoff = off;
6584 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6585 elf_next_file_pos (abfd) = off;
6586
6587 return TRUE;
6588 }
6589
6590 bfd_boolean
6591 _bfd_elf_write_object_contents (bfd *abfd)
6592 {
6593 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6594 Elf_Internal_Shdr **i_shdrp;
6595 bfd_boolean failed;
6596 unsigned int count, num_sec;
6597 struct elf_obj_tdata *t;
6598
6599 if (! abfd->output_has_begun
6600 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6601 return FALSE;
6602 /* Do not rewrite ELF data when the BFD has been opened for update.
6603 abfd->output_has_begun was set to TRUE on opening, so creation of new
6604 sections, and modification of existing section sizes was restricted.
6605 This means the ELF header, program headers and section headers can't have
6606 changed.
6607 If the contents of any sections has been modified, then those changes have
6608 already been written to the BFD. */
6609 else if (abfd->direction == both_direction)
6610 {
6611 BFD_ASSERT (abfd->output_has_begun);
6612 return TRUE;
6613 }
6614
6615 i_shdrp = elf_elfsections (abfd);
6616
6617 failed = FALSE;
6618 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6619 if (failed)
6620 return FALSE;
6621
6622 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6623 return FALSE;
6624
6625 /* After writing the headers, we need to write the sections too... */
6626 num_sec = elf_numsections (abfd);
6627 for (count = 1; count < num_sec; count++)
6628 {
6629 i_shdrp[count]->sh_name
6630 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6631 i_shdrp[count]->sh_name);
6632 if (bed->elf_backend_section_processing)
6633 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6634 return FALSE;
6635 if (i_shdrp[count]->contents)
6636 {
6637 bfd_size_type amt = i_shdrp[count]->sh_size;
6638
6639 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6640 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6641 return FALSE;
6642 }
6643 }
6644
6645 /* Write out the section header names. */
6646 t = elf_tdata (abfd);
6647 if (elf_shstrtab (abfd) != NULL
6648 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6649 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6650 return FALSE;
6651
6652 if (!(*bed->elf_backend_final_write_processing) (abfd))
6653 return FALSE;
6654
6655 if (!bed->s->write_shdrs_and_ehdr (abfd))
6656 return FALSE;
6657
6658 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6659 if (t->o->build_id.after_write_object_contents != NULL)
6660 return (*t->o->build_id.after_write_object_contents) (abfd);
6661
6662 return TRUE;
6663 }
6664
6665 bfd_boolean
6666 _bfd_elf_write_corefile_contents (bfd *abfd)
6667 {
6668 /* Hopefully this can be done just like an object file. */
6669 return _bfd_elf_write_object_contents (abfd);
6670 }
6671
6672 /* Given a section, search the header to find them. */
6673
6674 unsigned int
6675 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6676 {
6677 const struct elf_backend_data *bed;
6678 unsigned int sec_index;
6679
6680 if (elf_section_data (asect) != NULL
6681 && elf_section_data (asect)->this_idx != 0)
6682 return elf_section_data (asect)->this_idx;
6683
6684 if (bfd_is_abs_section (asect))
6685 sec_index = SHN_ABS;
6686 else if (bfd_is_com_section (asect))
6687 sec_index = SHN_COMMON;
6688 else if (bfd_is_und_section (asect))
6689 sec_index = SHN_UNDEF;
6690 else
6691 sec_index = SHN_BAD;
6692
6693 bed = get_elf_backend_data (abfd);
6694 if (bed->elf_backend_section_from_bfd_section)
6695 {
6696 int retval = sec_index;
6697
6698 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6699 return retval;
6700 }
6701
6702 if (sec_index == SHN_BAD)
6703 bfd_set_error (bfd_error_nonrepresentable_section);
6704
6705 return sec_index;
6706 }
6707
6708 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6709 on error. */
6710
6711 int
6712 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6713 {
6714 asymbol *asym_ptr = *asym_ptr_ptr;
6715 int idx;
6716 flagword flags = asym_ptr->flags;
6717
6718 /* When gas creates relocations against local labels, it creates its
6719 own symbol for the section, but does put the symbol into the
6720 symbol chain, so udata is 0. When the linker is generating
6721 relocatable output, this section symbol may be for one of the
6722 input sections rather than the output section. */
6723 if (asym_ptr->udata.i == 0
6724 && (flags & BSF_SECTION_SYM)
6725 && asym_ptr->section)
6726 {
6727 asection *sec;
6728 int indx;
6729
6730 sec = asym_ptr->section;
6731 if (sec->owner != abfd && sec->output_section != NULL)
6732 sec = sec->output_section;
6733 if (sec->owner == abfd
6734 && (indx = sec->index) < elf_num_section_syms (abfd)
6735 && elf_section_syms (abfd)[indx] != NULL)
6736 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6737 }
6738
6739 idx = asym_ptr->udata.i;
6740
6741 if (idx == 0)
6742 {
6743 /* This case can occur when using --strip-symbol on a symbol
6744 which is used in a relocation entry. */
6745 _bfd_error_handler
6746 /* xgettext:c-format */
6747 (_("%pB: symbol `%s' required but not present"),
6748 abfd, bfd_asymbol_name (asym_ptr));
6749 bfd_set_error (bfd_error_no_symbols);
6750 return -1;
6751 }
6752
6753 #if DEBUG & 4
6754 {
6755 fprintf (stderr,
6756 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6757 (long) asym_ptr, asym_ptr->name, idx, flags);
6758 fflush (stderr);
6759 }
6760 #endif
6761
6762 return idx;
6763 }
6764
6765 /* Rewrite program header information. */
6766
6767 static bfd_boolean
6768 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6769 {
6770 Elf_Internal_Ehdr *iehdr;
6771 struct elf_segment_map *map;
6772 struct elf_segment_map *map_first;
6773 struct elf_segment_map **pointer_to_map;
6774 Elf_Internal_Phdr *segment;
6775 asection *section;
6776 unsigned int i;
6777 unsigned int num_segments;
6778 bfd_boolean phdr_included = FALSE;
6779 bfd_boolean p_paddr_valid;
6780 bfd_vma maxpagesize;
6781 struct elf_segment_map *phdr_adjust_seg = NULL;
6782 unsigned int phdr_adjust_num = 0;
6783 const struct elf_backend_data *bed;
6784
6785 bed = get_elf_backend_data (ibfd);
6786 iehdr = elf_elfheader (ibfd);
6787
6788 map_first = NULL;
6789 pointer_to_map = &map_first;
6790
6791 num_segments = elf_elfheader (ibfd)->e_phnum;
6792 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6793
6794 /* Returns the end address of the segment + 1. */
6795 #define SEGMENT_END(segment, start) \
6796 (start + (segment->p_memsz > segment->p_filesz \
6797 ? segment->p_memsz : segment->p_filesz))
6798
6799 #define SECTION_SIZE(section, segment) \
6800 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6801 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6802 ? section->size : 0)
6803
6804 /* Returns TRUE if the given section is contained within
6805 the given segment. VMA addresses are compared. */
6806 #define IS_CONTAINED_BY_VMA(section, segment) \
6807 (section->vma >= segment->p_vaddr \
6808 && (section->vma + SECTION_SIZE (section, segment) \
6809 <= (SEGMENT_END (segment, segment->p_vaddr))))
6810
6811 /* Returns TRUE if the given section is contained within
6812 the given segment. LMA addresses are compared. */
6813 #define IS_CONTAINED_BY_LMA(section, segment, base) \
6814 (section->lma >= base \
6815 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
6816 && (section->lma + SECTION_SIZE (section, segment) \
6817 <= SEGMENT_END (segment, base)))
6818
6819 /* Handle PT_NOTE segment. */
6820 #define IS_NOTE(p, s) \
6821 (p->p_type == PT_NOTE \
6822 && elf_section_type (s) == SHT_NOTE \
6823 && (bfd_vma) s->filepos >= p->p_offset \
6824 && ((bfd_vma) s->filepos + s->size \
6825 <= p->p_offset + p->p_filesz))
6826
6827 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6828 etc. */
6829 #define IS_COREFILE_NOTE(p, s) \
6830 (IS_NOTE (p, s) \
6831 && bfd_get_format (ibfd) == bfd_core \
6832 && s->vma == 0 \
6833 && s->lma == 0)
6834
6835 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6836 linker, which generates a PT_INTERP section with p_vaddr and
6837 p_memsz set to 0. */
6838 #define IS_SOLARIS_PT_INTERP(p, s) \
6839 (p->p_vaddr == 0 \
6840 && p->p_paddr == 0 \
6841 && p->p_memsz == 0 \
6842 && p->p_filesz > 0 \
6843 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6844 && s->size > 0 \
6845 && (bfd_vma) s->filepos >= p->p_offset \
6846 && ((bfd_vma) s->filepos + s->size \
6847 <= p->p_offset + p->p_filesz))
6848
6849 /* Decide if the given section should be included in the given segment.
6850 A section will be included if:
6851 1. It is within the address space of the segment -- we use the LMA
6852 if that is set for the segment and the VMA otherwise,
6853 2. It is an allocated section or a NOTE section in a PT_NOTE
6854 segment.
6855 3. There is an output section associated with it,
6856 4. The section has not already been allocated to a previous segment.
6857 5. PT_GNU_STACK segments do not include any sections.
6858 6. PT_TLS segment includes only SHF_TLS sections.
6859 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6860 8. PT_DYNAMIC should not contain empty sections at the beginning
6861 (with the possible exception of .dynamic). */
6862 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
6863 ((((segment->p_paddr \
6864 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6865 : IS_CONTAINED_BY_VMA (section, segment)) \
6866 && (section->flags & SEC_ALLOC) != 0) \
6867 || IS_NOTE (segment, section)) \
6868 && segment->p_type != PT_GNU_STACK \
6869 && (segment->p_type != PT_TLS \
6870 || (section->flags & SEC_THREAD_LOCAL)) \
6871 && (segment->p_type == PT_LOAD \
6872 || segment->p_type == PT_TLS \
6873 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6874 && (segment->p_type != PT_DYNAMIC \
6875 || SECTION_SIZE (section, segment) > 0 \
6876 || (segment->p_paddr \
6877 ? segment->p_paddr != section->lma \
6878 : segment->p_vaddr != section->vma) \
6879 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6880 && (segment->p_type != PT_LOAD || !section->segment_mark))
6881
6882 /* If the output section of a section in the input segment is NULL,
6883 it is removed from the corresponding output segment. */
6884 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6885 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6886 && section->output_section != NULL)
6887
6888 /* Returns TRUE iff seg1 starts after the end of seg2. */
6889 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6890 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6891
6892 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6893 their VMA address ranges and their LMA address ranges overlap.
6894 It is possible to have overlapping VMA ranges without overlapping LMA
6895 ranges. RedBoot images for example can have both .data and .bss mapped
6896 to the same VMA range, but with the .data section mapped to a different
6897 LMA. */
6898 #define SEGMENT_OVERLAPS(seg1, seg2) \
6899 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6900 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6901 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6902 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6903
6904 /* Initialise the segment mark field. */
6905 for (section = ibfd->sections; section != NULL; section = section->next)
6906 section->segment_mark = FALSE;
6907
6908 /* The Solaris linker creates program headers in which all the
6909 p_paddr fields are zero. When we try to objcopy or strip such a
6910 file, we get confused. Check for this case, and if we find it
6911 don't set the p_paddr_valid fields. */
6912 p_paddr_valid = FALSE;
6913 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6914 i < num_segments;
6915 i++, segment++)
6916 if (segment->p_paddr != 0)
6917 {
6918 p_paddr_valid = TRUE;
6919 break;
6920 }
6921
6922 /* Scan through the segments specified in the program header
6923 of the input BFD. For this first scan we look for overlaps
6924 in the loadable segments. These can be created by weird
6925 parameters to objcopy. Also, fix some solaris weirdness. */
6926 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6927 i < num_segments;
6928 i++, segment++)
6929 {
6930 unsigned int j;
6931 Elf_Internal_Phdr *segment2;
6932
6933 if (segment->p_type == PT_INTERP)
6934 for (section = ibfd->sections; section; section = section->next)
6935 if (IS_SOLARIS_PT_INTERP (segment, section))
6936 {
6937 /* Mininal change so that the normal section to segment
6938 assignment code will work. */
6939 segment->p_vaddr = section->vma;
6940 break;
6941 }
6942
6943 if (segment->p_type != PT_LOAD)
6944 {
6945 /* Remove PT_GNU_RELRO segment. */
6946 if (segment->p_type == PT_GNU_RELRO)
6947 segment->p_type = PT_NULL;
6948 continue;
6949 }
6950
6951 /* Determine if this segment overlaps any previous segments. */
6952 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
6953 {
6954 bfd_signed_vma extra_length;
6955
6956 if (segment2->p_type != PT_LOAD
6957 || !SEGMENT_OVERLAPS (segment, segment2))
6958 continue;
6959
6960 /* Merge the two segments together. */
6961 if (segment2->p_vaddr < segment->p_vaddr)
6962 {
6963 /* Extend SEGMENT2 to include SEGMENT and then delete
6964 SEGMENT. */
6965 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6966 - SEGMENT_END (segment2, segment2->p_vaddr));
6967
6968 if (extra_length > 0)
6969 {
6970 segment2->p_memsz += extra_length;
6971 segment2->p_filesz += extra_length;
6972 }
6973
6974 segment->p_type = PT_NULL;
6975
6976 /* Since we have deleted P we must restart the outer loop. */
6977 i = 0;
6978 segment = elf_tdata (ibfd)->phdr;
6979 break;
6980 }
6981 else
6982 {
6983 /* Extend SEGMENT to include SEGMENT2 and then delete
6984 SEGMENT2. */
6985 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6986 - SEGMENT_END (segment, segment->p_vaddr));
6987
6988 if (extra_length > 0)
6989 {
6990 segment->p_memsz += extra_length;
6991 segment->p_filesz += extra_length;
6992 }
6993
6994 segment2->p_type = PT_NULL;
6995 }
6996 }
6997 }
6998
6999 /* The second scan attempts to assign sections to segments. */
7000 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7001 i < num_segments;
7002 i++, segment++)
7003 {
7004 unsigned int section_count;
7005 asection **sections;
7006 asection *output_section;
7007 unsigned int isec;
7008 asection *matching_lma;
7009 asection *suggested_lma;
7010 unsigned int j;
7011 size_t amt;
7012 asection *first_section;
7013
7014 if (segment->p_type == PT_NULL)
7015 continue;
7016
7017 first_section = NULL;
7018 /* Compute how many sections might be placed into this segment. */
7019 for (section = ibfd->sections, section_count = 0;
7020 section != NULL;
7021 section = section->next)
7022 {
7023 /* Find the first section in the input segment, which may be
7024 removed from the corresponding output segment. */
7025 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7026 {
7027 if (first_section == NULL)
7028 first_section = section;
7029 if (section->output_section != NULL)
7030 ++section_count;
7031 }
7032 }
7033
7034 /* Allocate a segment map big enough to contain
7035 all of the sections we have selected. */
7036 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7037 amt += section_count * sizeof (asection *);
7038 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7039 if (map == NULL)
7040 return FALSE;
7041
7042 /* Initialise the fields of the segment map. Default to
7043 using the physical address of the segment in the input BFD. */
7044 map->next = NULL;
7045 map->p_type = segment->p_type;
7046 map->p_flags = segment->p_flags;
7047 map->p_flags_valid = 1;
7048
7049 /* If the first section in the input segment is removed, there is
7050 no need to preserve segment physical address in the corresponding
7051 output segment. */
7052 if (!first_section || first_section->output_section != NULL)
7053 {
7054 map->p_paddr = segment->p_paddr;
7055 map->p_paddr_valid = p_paddr_valid;
7056 }
7057
7058 /* Determine if this segment contains the ELF file header
7059 and if it contains the program headers themselves. */
7060 map->includes_filehdr = (segment->p_offset == 0
7061 && segment->p_filesz >= iehdr->e_ehsize);
7062 map->includes_phdrs = 0;
7063
7064 if (!phdr_included || segment->p_type != PT_LOAD)
7065 {
7066 map->includes_phdrs =
7067 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7068 && (segment->p_offset + segment->p_filesz
7069 >= ((bfd_vma) iehdr->e_phoff
7070 + iehdr->e_phnum * iehdr->e_phentsize)));
7071
7072 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7073 phdr_included = TRUE;
7074 }
7075
7076 if (section_count == 0)
7077 {
7078 /* Special segments, such as the PT_PHDR segment, may contain
7079 no sections, but ordinary, loadable segments should contain
7080 something. They are allowed by the ELF spec however, so only
7081 a warning is produced.
7082 There is however the valid use case of embedded systems which
7083 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7084 flash memory with zeros. No warning is shown for that case. */
7085 if (segment->p_type == PT_LOAD
7086 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7087 /* xgettext:c-format */
7088 _bfd_error_handler
7089 (_("%pB: warning: empty loadable segment detected"
7090 " at vaddr=%#" PRIx64 ", is this intentional?"),
7091 ibfd, (uint64_t) segment->p_vaddr);
7092
7093 map->p_vaddr_offset = segment->p_vaddr;
7094 map->count = 0;
7095 *pointer_to_map = map;
7096 pointer_to_map = &map->next;
7097
7098 continue;
7099 }
7100
7101 /* Now scan the sections in the input BFD again and attempt
7102 to add their corresponding output sections to the segment map.
7103 The problem here is how to handle an output section which has
7104 been moved (ie had its LMA changed). There are four possibilities:
7105
7106 1. None of the sections have been moved.
7107 In this case we can continue to use the segment LMA from the
7108 input BFD.
7109
7110 2. All of the sections have been moved by the same amount.
7111 In this case we can change the segment's LMA to match the LMA
7112 of the first section.
7113
7114 3. Some of the sections have been moved, others have not.
7115 In this case those sections which have not been moved can be
7116 placed in the current segment which will have to have its size,
7117 and possibly its LMA changed, and a new segment or segments will
7118 have to be created to contain the other sections.
7119
7120 4. The sections have been moved, but not by the same amount.
7121 In this case we can change the segment's LMA to match the LMA
7122 of the first section and we will have to create a new segment
7123 or segments to contain the other sections.
7124
7125 In order to save time, we allocate an array to hold the section
7126 pointers that we are interested in. As these sections get assigned
7127 to a segment, they are removed from this array. */
7128
7129 amt = section_count * sizeof (asection *);
7130 sections = (asection **) bfd_malloc (amt);
7131 if (sections == NULL)
7132 return FALSE;
7133
7134 /* Step One: Scan for segment vs section LMA conflicts.
7135 Also add the sections to the section array allocated above.
7136 Also add the sections to the current segment. In the common
7137 case, where the sections have not been moved, this means that
7138 we have completely filled the segment, and there is nothing
7139 more to do. */
7140 isec = 0;
7141 matching_lma = NULL;
7142 suggested_lma = NULL;
7143
7144 for (section = first_section, j = 0;
7145 section != NULL;
7146 section = section->next)
7147 {
7148 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
7149 {
7150 output_section = section->output_section;
7151
7152 sections[j++] = section;
7153
7154 /* The Solaris native linker always sets p_paddr to 0.
7155 We try to catch that case here, and set it to the
7156 correct value. Note - some backends require that
7157 p_paddr be left as zero. */
7158 if (!p_paddr_valid
7159 && segment->p_vaddr != 0
7160 && !bed->want_p_paddr_set_to_zero
7161 && isec == 0
7162 && output_section->lma != 0
7163 && (align_power (segment->p_vaddr
7164 + (map->includes_filehdr
7165 ? iehdr->e_ehsize : 0)
7166 + (map->includes_phdrs
7167 ? iehdr->e_phnum * iehdr->e_phentsize
7168 : 0),
7169 output_section->alignment_power)
7170 == output_section->vma))
7171 map->p_paddr = segment->p_vaddr;
7172
7173 /* Match up the physical address of the segment with the
7174 LMA address of the output section. */
7175 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7176 || IS_COREFILE_NOTE (segment, section)
7177 || (bed->want_p_paddr_set_to_zero
7178 && IS_CONTAINED_BY_VMA (output_section, segment)))
7179 {
7180 if (matching_lma == NULL
7181 || output_section->lma < matching_lma->lma)
7182 matching_lma = output_section;
7183
7184 /* We assume that if the section fits within the segment
7185 then it does not overlap any other section within that
7186 segment. */
7187 map->sections[isec++] = output_section;
7188 }
7189 else if (suggested_lma == NULL)
7190 suggested_lma = output_section;
7191
7192 if (j == section_count)
7193 break;
7194 }
7195 }
7196
7197 BFD_ASSERT (j == section_count);
7198
7199 /* Step Two: Adjust the physical address of the current segment,
7200 if necessary. */
7201 if (isec == section_count)
7202 {
7203 /* All of the sections fitted within the segment as currently
7204 specified. This is the default case. Add the segment to
7205 the list of built segments and carry on to process the next
7206 program header in the input BFD. */
7207 map->count = section_count;
7208 *pointer_to_map = map;
7209 pointer_to_map = &map->next;
7210
7211 if (p_paddr_valid
7212 && !bed->want_p_paddr_set_to_zero)
7213 {
7214 bfd_vma hdr_size = 0;
7215 if (map->includes_filehdr)
7216 hdr_size = iehdr->e_ehsize;
7217 if (map->includes_phdrs)
7218 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7219
7220 /* Account for padding before the first section in the
7221 segment. */
7222 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7223 }
7224
7225 free (sections);
7226 continue;
7227 }
7228 else
7229 {
7230 /* Change the current segment's physical address to match
7231 the LMA of the first section that fitted, or if no
7232 section fitted, the first section. */
7233 if (matching_lma == NULL)
7234 matching_lma = suggested_lma;
7235
7236 map->p_paddr = matching_lma->lma;
7237
7238 /* Offset the segment physical address from the lma
7239 to allow for space taken up by elf headers. */
7240 if (map->includes_phdrs)
7241 {
7242 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7243
7244 /* iehdr->e_phnum is just an estimate of the number
7245 of program headers that we will need. Make a note
7246 here of the number we used and the segment we chose
7247 to hold these headers, so that we can adjust the
7248 offset when we know the correct value. */
7249 phdr_adjust_num = iehdr->e_phnum;
7250 phdr_adjust_seg = map;
7251 }
7252
7253 if (map->includes_filehdr)
7254 {
7255 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7256 map->p_paddr -= iehdr->e_ehsize;
7257 /* We've subtracted off the size of headers from the
7258 first section lma, but there may have been some
7259 alignment padding before that section too. Try to
7260 account for that by adjusting the segment lma down to
7261 the same alignment. */
7262 if (segment->p_align != 0 && segment->p_align < align)
7263 align = segment->p_align;
7264 map->p_paddr &= -align;
7265 }
7266 }
7267
7268 /* Step Three: Loop over the sections again, this time assigning
7269 those that fit to the current segment and removing them from the
7270 sections array; but making sure not to leave large gaps. Once all
7271 possible sections have been assigned to the current segment it is
7272 added to the list of built segments and if sections still remain
7273 to be assigned, a new segment is constructed before repeating
7274 the loop. */
7275 isec = 0;
7276 do
7277 {
7278 map->count = 0;
7279 suggested_lma = NULL;
7280
7281 /* Fill the current segment with sections that fit. */
7282 for (j = 0; j < section_count; j++)
7283 {
7284 section = sections[j];
7285
7286 if (section == NULL)
7287 continue;
7288
7289 output_section = section->output_section;
7290
7291 BFD_ASSERT (output_section != NULL);
7292
7293 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7294 || IS_COREFILE_NOTE (segment, section))
7295 {
7296 if (map->count == 0)
7297 {
7298 /* If the first section in a segment does not start at
7299 the beginning of the segment, then something is
7300 wrong. */
7301 if (align_power (map->p_paddr
7302 + (map->includes_filehdr
7303 ? iehdr->e_ehsize : 0)
7304 + (map->includes_phdrs
7305 ? iehdr->e_phnum * iehdr->e_phentsize
7306 : 0),
7307 output_section->alignment_power)
7308 != output_section->lma)
7309 goto sorry;
7310 }
7311 else
7312 {
7313 asection *prev_sec;
7314
7315 prev_sec = map->sections[map->count - 1];
7316
7317 /* If the gap between the end of the previous section
7318 and the start of this section is more than
7319 maxpagesize then we need to start a new segment. */
7320 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7321 maxpagesize)
7322 < BFD_ALIGN (output_section->lma, maxpagesize))
7323 || (prev_sec->lma + prev_sec->size
7324 > output_section->lma))
7325 {
7326 if (suggested_lma == NULL)
7327 suggested_lma = output_section;
7328
7329 continue;
7330 }
7331 }
7332
7333 map->sections[map->count++] = output_section;
7334 ++isec;
7335 sections[j] = NULL;
7336 if (segment->p_type == PT_LOAD)
7337 section->segment_mark = TRUE;
7338 }
7339 else if (suggested_lma == NULL)
7340 suggested_lma = output_section;
7341 }
7342
7343 /* PR 23932. A corrupt input file may contain sections that cannot
7344 be assigned to any segment - because for example they have a
7345 negative size - or segments that do not contain any sections.
7346 But there are also valid reasons why a segment can be empty.
7347 So allow a count of zero. */
7348
7349 /* Add the current segment to the list of built segments. */
7350 *pointer_to_map = map;
7351 pointer_to_map = &map->next;
7352
7353 if (isec < section_count)
7354 {
7355 /* We still have not allocated all of the sections to
7356 segments. Create a new segment here, initialise it
7357 and carry on looping. */
7358 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7359 amt += section_count * sizeof (asection *);
7360 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7361 if (map == NULL)
7362 {
7363 free (sections);
7364 return FALSE;
7365 }
7366
7367 /* Initialise the fields of the segment map. Set the physical
7368 physical address to the LMA of the first section that has
7369 not yet been assigned. */
7370 map->next = NULL;
7371 map->p_type = segment->p_type;
7372 map->p_flags = segment->p_flags;
7373 map->p_flags_valid = 1;
7374 map->p_paddr = suggested_lma->lma;
7375 map->p_paddr_valid = p_paddr_valid;
7376 map->includes_filehdr = 0;
7377 map->includes_phdrs = 0;
7378 }
7379
7380 continue;
7381 sorry:
7382 bfd_set_error (bfd_error_sorry);
7383 free (sections);
7384 return FALSE;
7385 }
7386 while (isec < section_count);
7387
7388 free (sections);
7389 }
7390
7391 elf_seg_map (obfd) = map_first;
7392
7393 /* If we had to estimate the number of program headers that were
7394 going to be needed, then check our estimate now and adjust
7395 the offset if necessary. */
7396 if (phdr_adjust_seg != NULL)
7397 {
7398 unsigned int count;
7399
7400 for (count = 0, map = map_first; map != NULL; map = map->next)
7401 count++;
7402
7403 if (count > phdr_adjust_num)
7404 phdr_adjust_seg->p_paddr
7405 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7406
7407 for (map = map_first; map != NULL; map = map->next)
7408 if (map->p_type == PT_PHDR)
7409 {
7410 bfd_vma adjust
7411 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7412 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7413 break;
7414 }
7415 }
7416
7417 #undef SEGMENT_END
7418 #undef SECTION_SIZE
7419 #undef IS_CONTAINED_BY_VMA
7420 #undef IS_CONTAINED_BY_LMA
7421 #undef IS_NOTE
7422 #undef IS_COREFILE_NOTE
7423 #undef IS_SOLARIS_PT_INTERP
7424 #undef IS_SECTION_IN_INPUT_SEGMENT
7425 #undef INCLUDE_SECTION_IN_SEGMENT
7426 #undef SEGMENT_AFTER_SEGMENT
7427 #undef SEGMENT_OVERLAPS
7428 return TRUE;
7429 }
7430
7431 /* Copy ELF program header information. */
7432
7433 static bfd_boolean
7434 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7435 {
7436 Elf_Internal_Ehdr *iehdr;
7437 struct elf_segment_map *map;
7438 struct elf_segment_map *map_first;
7439 struct elf_segment_map **pointer_to_map;
7440 Elf_Internal_Phdr *segment;
7441 unsigned int i;
7442 unsigned int num_segments;
7443 bfd_boolean phdr_included = FALSE;
7444 bfd_boolean p_paddr_valid;
7445
7446 iehdr = elf_elfheader (ibfd);
7447
7448 map_first = NULL;
7449 pointer_to_map = &map_first;
7450
7451 /* If all the segment p_paddr fields are zero, don't set
7452 map->p_paddr_valid. */
7453 p_paddr_valid = FALSE;
7454 num_segments = elf_elfheader (ibfd)->e_phnum;
7455 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7456 i < num_segments;
7457 i++, segment++)
7458 if (segment->p_paddr != 0)
7459 {
7460 p_paddr_valid = TRUE;
7461 break;
7462 }
7463
7464 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7465 i < num_segments;
7466 i++, segment++)
7467 {
7468 asection *section;
7469 unsigned int section_count;
7470 size_t amt;
7471 Elf_Internal_Shdr *this_hdr;
7472 asection *first_section = NULL;
7473 asection *lowest_section;
7474
7475 /* Compute how many sections are in this segment. */
7476 for (section = ibfd->sections, section_count = 0;
7477 section != NULL;
7478 section = section->next)
7479 {
7480 this_hdr = &(elf_section_data(section)->this_hdr);
7481 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7482 {
7483 if (first_section == NULL)
7484 first_section = section;
7485 section_count++;
7486 }
7487 }
7488
7489 /* Allocate a segment map big enough to contain
7490 all of the sections we have selected. */
7491 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7492 amt += section_count * sizeof (asection *);
7493 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7494 if (map == NULL)
7495 return FALSE;
7496
7497 /* Initialize the fields of the output segment map with the
7498 input segment. */
7499 map->next = NULL;
7500 map->p_type = segment->p_type;
7501 map->p_flags = segment->p_flags;
7502 map->p_flags_valid = 1;
7503 map->p_paddr = segment->p_paddr;
7504 map->p_paddr_valid = p_paddr_valid;
7505 map->p_align = segment->p_align;
7506 map->p_align_valid = 1;
7507 map->p_vaddr_offset = 0;
7508
7509 if (map->p_type == PT_GNU_RELRO
7510 || map->p_type == PT_GNU_STACK)
7511 {
7512 /* The PT_GNU_RELRO segment may contain the first a few
7513 bytes in the .got.plt section even if the whole .got.plt
7514 section isn't in the PT_GNU_RELRO segment. We won't
7515 change the size of the PT_GNU_RELRO segment.
7516 Similarly, PT_GNU_STACK size is significant on uclinux
7517 systems. */
7518 map->p_size = segment->p_memsz;
7519 map->p_size_valid = 1;
7520 }
7521
7522 /* Determine if this segment contains the ELF file header
7523 and if it contains the program headers themselves. */
7524 map->includes_filehdr = (segment->p_offset == 0
7525 && segment->p_filesz >= iehdr->e_ehsize);
7526
7527 map->includes_phdrs = 0;
7528 if (! phdr_included || segment->p_type != PT_LOAD)
7529 {
7530 map->includes_phdrs =
7531 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7532 && (segment->p_offset + segment->p_filesz
7533 >= ((bfd_vma) iehdr->e_phoff
7534 + iehdr->e_phnum * iehdr->e_phentsize)));
7535
7536 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7537 phdr_included = TRUE;
7538 }
7539
7540 lowest_section = NULL;
7541 if (section_count != 0)
7542 {
7543 unsigned int isec = 0;
7544
7545 for (section = first_section;
7546 section != NULL;
7547 section = section->next)
7548 {
7549 this_hdr = &(elf_section_data(section)->this_hdr);
7550 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7551 {
7552 map->sections[isec++] = section->output_section;
7553 if ((section->flags & SEC_ALLOC) != 0)
7554 {
7555 bfd_vma seg_off;
7556
7557 if (lowest_section == NULL
7558 || section->lma < lowest_section->lma)
7559 lowest_section = section;
7560
7561 /* Section lmas are set up from PT_LOAD header
7562 p_paddr in _bfd_elf_make_section_from_shdr.
7563 If this header has a p_paddr that disagrees
7564 with the section lma, flag the p_paddr as
7565 invalid. */
7566 if ((section->flags & SEC_LOAD) != 0)
7567 seg_off = this_hdr->sh_offset - segment->p_offset;
7568 else
7569 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7570 if (section->lma - segment->p_paddr != seg_off)
7571 map->p_paddr_valid = FALSE;
7572 }
7573 if (isec == section_count)
7574 break;
7575 }
7576 }
7577 }
7578
7579 if (section_count == 0)
7580 map->p_vaddr_offset = segment->p_vaddr;
7581 else if (map->p_paddr_valid)
7582 {
7583 /* Account for padding before the first section in the segment. */
7584 bfd_vma hdr_size = 0;
7585 if (map->includes_filehdr)
7586 hdr_size = iehdr->e_ehsize;
7587 if (map->includes_phdrs)
7588 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7589
7590 map->p_vaddr_offset = (map->p_paddr + hdr_size
7591 - (lowest_section ? lowest_section->lma : 0));
7592 }
7593
7594 map->count = section_count;
7595 *pointer_to_map = map;
7596 pointer_to_map = &map->next;
7597 }
7598
7599 elf_seg_map (obfd) = map_first;
7600 return TRUE;
7601 }
7602
7603 /* Copy private BFD data. This copies or rewrites ELF program header
7604 information. */
7605
7606 static bfd_boolean
7607 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7608 {
7609 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7610 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7611 return TRUE;
7612
7613 if (elf_tdata (ibfd)->phdr == NULL)
7614 return TRUE;
7615
7616 if (ibfd->xvec == obfd->xvec)
7617 {
7618 /* Check to see if any sections in the input BFD
7619 covered by ELF program header have changed. */
7620 Elf_Internal_Phdr *segment;
7621 asection *section, *osec;
7622 unsigned int i, num_segments;
7623 Elf_Internal_Shdr *this_hdr;
7624 const struct elf_backend_data *bed;
7625
7626 bed = get_elf_backend_data (ibfd);
7627
7628 /* Regenerate the segment map if p_paddr is set to 0. */
7629 if (bed->want_p_paddr_set_to_zero)
7630 goto rewrite;
7631
7632 /* Initialize the segment mark field. */
7633 for (section = obfd->sections; section != NULL;
7634 section = section->next)
7635 section->segment_mark = FALSE;
7636
7637 num_segments = elf_elfheader (ibfd)->e_phnum;
7638 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7639 i < num_segments;
7640 i++, segment++)
7641 {
7642 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7643 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7644 which severly confuses things, so always regenerate the segment
7645 map in this case. */
7646 if (segment->p_paddr == 0
7647 && segment->p_memsz == 0
7648 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7649 goto rewrite;
7650
7651 for (section = ibfd->sections;
7652 section != NULL; section = section->next)
7653 {
7654 /* We mark the output section so that we know it comes
7655 from the input BFD. */
7656 osec = section->output_section;
7657 if (osec)
7658 osec->segment_mark = TRUE;
7659
7660 /* Check if this section is covered by the segment. */
7661 this_hdr = &(elf_section_data(section)->this_hdr);
7662 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7663 {
7664 /* FIXME: Check if its output section is changed or
7665 removed. What else do we need to check? */
7666 if (osec == NULL
7667 || section->flags != osec->flags
7668 || section->lma != osec->lma
7669 || section->vma != osec->vma
7670 || section->size != osec->size
7671 || section->rawsize != osec->rawsize
7672 || section->alignment_power != osec->alignment_power)
7673 goto rewrite;
7674 }
7675 }
7676 }
7677
7678 /* Check to see if any output section do not come from the
7679 input BFD. */
7680 for (section = obfd->sections; section != NULL;
7681 section = section->next)
7682 {
7683 if (!section->segment_mark)
7684 goto rewrite;
7685 else
7686 section->segment_mark = FALSE;
7687 }
7688
7689 return copy_elf_program_header (ibfd, obfd);
7690 }
7691
7692 rewrite:
7693 if (ibfd->xvec == obfd->xvec)
7694 {
7695 /* When rewriting program header, set the output maxpagesize to
7696 the maximum alignment of input PT_LOAD segments. */
7697 Elf_Internal_Phdr *segment;
7698 unsigned int i;
7699 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7700 bfd_vma maxpagesize = 0;
7701
7702 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7703 i < num_segments;
7704 i++, segment++)
7705 if (segment->p_type == PT_LOAD
7706 && maxpagesize < segment->p_align)
7707 {
7708 /* PR 17512: file: f17299af. */
7709 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7710 /* xgettext:c-format */
7711 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7712 PRIx64 " is too large"),
7713 ibfd, (uint64_t) segment->p_align);
7714 else
7715 maxpagesize = segment->p_align;
7716 }
7717
7718 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7719 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7720 }
7721
7722 return rewrite_elf_program_header (ibfd, obfd);
7723 }
7724
7725 /* Initialize private output section information from input section. */
7726
7727 bfd_boolean
7728 _bfd_elf_init_private_section_data (bfd *ibfd,
7729 asection *isec,
7730 bfd *obfd,
7731 asection *osec,
7732 struct bfd_link_info *link_info)
7733
7734 {
7735 Elf_Internal_Shdr *ihdr, *ohdr;
7736 bfd_boolean final_link = (link_info != NULL
7737 && !bfd_link_relocatable (link_info));
7738
7739 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7740 || obfd->xvec->flavour != bfd_target_elf_flavour)
7741 return TRUE;
7742
7743 BFD_ASSERT (elf_section_data (osec) != NULL);
7744
7745 /* If this is a known ABI section, ELF section type and flags may
7746 have been set up when OSEC was created. For normal sections we
7747 allow the user to override the type and flags other than
7748 SHF_MASKOS and SHF_MASKPROC. */
7749 if (elf_section_type (osec) == SHT_PROGBITS
7750 || elf_section_type (osec) == SHT_NOTE
7751 || elf_section_type (osec) == SHT_NOBITS)
7752 elf_section_type (osec) = SHT_NULL;
7753 /* For objcopy and relocatable link, copy the ELF section type from
7754 the input file if the BFD section flags are the same. (If they
7755 are different the user may be doing something like
7756 "objcopy --set-section-flags .text=alloc,data".) For a final
7757 link allow some flags that the linker clears to differ. */
7758 if (elf_section_type (osec) == SHT_NULL
7759 && (osec->flags == isec->flags
7760 || (final_link
7761 && ((osec->flags ^ isec->flags)
7762 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7763 elf_section_type (osec) = elf_section_type (isec);
7764
7765 /* FIXME: Is this correct for all OS/PROC specific flags? */
7766 elf_section_flags (osec) = (elf_section_flags (isec)
7767 & (SHF_MASKOS | SHF_MASKPROC));
7768
7769 /* Copy sh_info from input for mbind section. */
7770 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7771 && elf_section_flags (isec) & SHF_GNU_MBIND)
7772 elf_section_data (osec)->this_hdr.sh_info
7773 = elf_section_data (isec)->this_hdr.sh_info;
7774
7775 /* Set things up for objcopy and relocatable link. The output
7776 SHT_GROUP section will have its elf_next_in_group pointing back
7777 to the input group members. Ignore linker created group section.
7778 See elfNN_ia64_object_p in elfxx-ia64.c. */
7779 if ((link_info == NULL
7780 || !link_info->resolve_section_groups)
7781 && (elf_sec_group (isec) == NULL
7782 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7783 {
7784 if (elf_section_flags (isec) & SHF_GROUP)
7785 elf_section_flags (osec) |= SHF_GROUP;
7786 elf_next_in_group (osec) = elf_next_in_group (isec);
7787 elf_section_data (osec)->group = elf_section_data (isec)->group;
7788 }
7789
7790 /* If not decompress, preserve SHF_COMPRESSED. */
7791 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7792 elf_section_flags (osec) |= (elf_section_flags (isec)
7793 & SHF_COMPRESSED);
7794
7795 ihdr = &elf_section_data (isec)->this_hdr;
7796
7797 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7798 don't use the output section of the linked-to section since it
7799 may be NULL at this point. */
7800 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7801 {
7802 ohdr = &elf_section_data (osec)->this_hdr;
7803 ohdr->sh_flags |= SHF_LINK_ORDER;
7804 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7805 }
7806
7807 osec->use_rela_p = isec->use_rela_p;
7808
7809 return TRUE;
7810 }
7811
7812 /* Copy private section information. This copies over the entsize
7813 field, and sometimes the info field. */
7814
7815 bfd_boolean
7816 _bfd_elf_copy_private_section_data (bfd *ibfd,
7817 asection *isec,
7818 bfd *obfd,
7819 asection *osec)
7820 {
7821 Elf_Internal_Shdr *ihdr, *ohdr;
7822
7823 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7824 || obfd->xvec->flavour != bfd_target_elf_flavour)
7825 return TRUE;
7826
7827 ihdr = &elf_section_data (isec)->this_hdr;
7828 ohdr = &elf_section_data (osec)->this_hdr;
7829
7830 ohdr->sh_entsize = ihdr->sh_entsize;
7831
7832 if (ihdr->sh_type == SHT_SYMTAB
7833 || ihdr->sh_type == SHT_DYNSYM
7834 || ihdr->sh_type == SHT_GNU_verneed
7835 || ihdr->sh_type == SHT_GNU_verdef)
7836 ohdr->sh_info = ihdr->sh_info;
7837
7838 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7839 NULL);
7840 }
7841
7842 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7843 necessary if we are removing either the SHT_GROUP section or any of
7844 the group member sections. DISCARDED is the value that a section's
7845 output_section has if the section will be discarded, NULL when this
7846 function is called from objcopy, bfd_abs_section_ptr when called
7847 from the linker. */
7848
7849 bfd_boolean
7850 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7851 {
7852 asection *isec;
7853
7854 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7855 if (elf_section_type (isec) == SHT_GROUP)
7856 {
7857 asection *first = elf_next_in_group (isec);
7858 asection *s = first;
7859 bfd_size_type removed = 0;
7860
7861 while (s != NULL)
7862 {
7863 /* If this member section is being output but the
7864 SHT_GROUP section is not, then clear the group info
7865 set up by _bfd_elf_copy_private_section_data. */
7866 if (s->output_section != discarded
7867 && isec->output_section == discarded)
7868 {
7869 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7870 elf_group_name (s->output_section) = NULL;
7871 }
7872 /* Conversely, if the member section is not being output
7873 but the SHT_GROUP section is, then adjust its size. */
7874 else if (s->output_section == discarded
7875 && isec->output_section != discarded)
7876 {
7877 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7878 removed += 4;
7879 if (elf_sec->rel.hdr != NULL
7880 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7881 removed += 4;
7882 if (elf_sec->rela.hdr != NULL
7883 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7884 removed += 4;
7885 }
7886 s = elf_next_in_group (s);
7887 if (s == first)
7888 break;
7889 }
7890 if (removed != 0)
7891 {
7892 if (discarded != NULL)
7893 {
7894 /* If we've been called for ld -r, then we need to
7895 adjust the input section size. */
7896 if (isec->rawsize == 0)
7897 isec->rawsize = isec->size;
7898 isec->size = isec->rawsize - removed;
7899 if (isec->size <= 4)
7900 {
7901 isec->size = 0;
7902 isec->flags |= SEC_EXCLUDE;
7903 }
7904 }
7905 else
7906 {
7907 /* Adjust the output section size when called from
7908 objcopy. */
7909 isec->output_section->size -= removed;
7910 if (isec->output_section->size <= 4)
7911 {
7912 isec->output_section->size = 0;
7913 isec->output_section->flags |= SEC_EXCLUDE;
7914 }
7915 }
7916 }
7917 }
7918
7919 return TRUE;
7920 }
7921
7922 /* Copy private header information. */
7923
7924 bfd_boolean
7925 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7926 {
7927 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7928 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7929 return TRUE;
7930
7931 /* Copy over private BFD data if it has not already been copied.
7932 This must be done here, rather than in the copy_private_bfd_data
7933 entry point, because the latter is called after the section
7934 contents have been set, which means that the program headers have
7935 already been worked out. */
7936 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
7937 {
7938 if (! copy_private_bfd_data (ibfd, obfd))
7939 return FALSE;
7940 }
7941
7942 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7943 }
7944
7945 /* Copy private symbol information. If this symbol is in a section
7946 which we did not map into a BFD section, try to map the section
7947 index correctly. We use special macro definitions for the mapped
7948 section indices; these definitions are interpreted by the
7949 swap_out_syms function. */
7950
7951 #define MAP_ONESYMTAB (SHN_HIOS + 1)
7952 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
7953 #define MAP_STRTAB (SHN_HIOS + 3)
7954 #define MAP_SHSTRTAB (SHN_HIOS + 4)
7955 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
7956
7957 bfd_boolean
7958 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
7959 asymbol *isymarg,
7960 bfd *obfd,
7961 asymbol *osymarg)
7962 {
7963 elf_symbol_type *isym, *osym;
7964
7965 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7966 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7967 return TRUE;
7968
7969 isym = elf_symbol_from (ibfd, isymarg);
7970 osym = elf_symbol_from (obfd, osymarg);
7971
7972 if (isym != NULL
7973 && isym->internal_elf_sym.st_shndx != 0
7974 && osym != NULL
7975 && bfd_is_abs_section (isym->symbol.section))
7976 {
7977 unsigned int shndx;
7978
7979 shndx = isym->internal_elf_sym.st_shndx;
7980 if (shndx == elf_onesymtab (ibfd))
7981 shndx = MAP_ONESYMTAB;
7982 else if (shndx == elf_dynsymtab (ibfd))
7983 shndx = MAP_DYNSYMTAB;
7984 else if (shndx == elf_strtab_sec (ibfd))
7985 shndx = MAP_STRTAB;
7986 else if (shndx == elf_shstrtab_sec (ibfd))
7987 shndx = MAP_SHSTRTAB;
7988 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
7989 shndx = MAP_SYM_SHNDX;
7990 osym->internal_elf_sym.st_shndx = shndx;
7991 }
7992
7993 return TRUE;
7994 }
7995
7996 /* Swap out the symbols. */
7997
7998 static bfd_boolean
7999 swap_out_syms (bfd *abfd,
8000 struct elf_strtab_hash **sttp,
8001 int relocatable_p)
8002 {
8003 const struct elf_backend_data *bed;
8004 unsigned int symcount;
8005 asymbol **syms;
8006 struct elf_strtab_hash *stt;
8007 Elf_Internal_Shdr *symtab_hdr;
8008 Elf_Internal_Shdr *symtab_shndx_hdr;
8009 Elf_Internal_Shdr *symstrtab_hdr;
8010 struct elf_sym_strtab *symstrtab;
8011 bfd_byte *outbound_syms;
8012 bfd_byte *outbound_shndx;
8013 unsigned long outbound_syms_index;
8014 unsigned long outbound_shndx_index;
8015 unsigned int idx;
8016 unsigned int num_locals;
8017 size_t amt;
8018 bfd_boolean name_local_sections;
8019
8020 if (!elf_map_symbols (abfd, &num_locals))
8021 return FALSE;
8022
8023 /* Dump out the symtabs. */
8024 stt = _bfd_elf_strtab_init ();
8025 if (stt == NULL)
8026 return FALSE;
8027
8028 bed = get_elf_backend_data (abfd);
8029 symcount = bfd_get_symcount (abfd);
8030 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8031 symtab_hdr->sh_type = SHT_SYMTAB;
8032 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8033 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8034 symtab_hdr->sh_info = num_locals + 1;
8035 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8036
8037 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8038 symstrtab_hdr->sh_type = SHT_STRTAB;
8039
8040 /* Allocate buffer to swap out the .strtab section. */
8041 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8042 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8043 {
8044 bfd_set_error (bfd_error_no_memory);
8045 _bfd_elf_strtab_free (stt);
8046 return FALSE;
8047 }
8048
8049 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8050 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8051 {
8052 error_no_mem:
8053 bfd_set_error (bfd_error_no_memory);
8054 error_return:
8055 free (symstrtab);
8056 _bfd_elf_strtab_free (stt);
8057 return FALSE;
8058 }
8059 symtab_hdr->contents = outbound_syms;
8060 outbound_syms_index = 0;
8061
8062 outbound_shndx = NULL;
8063 outbound_shndx_index = 0;
8064
8065 if (elf_symtab_shndx_list (abfd))
8066 {
8067 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8068 if (symtab_shndx_hdr->sh_name != 0)
8069 {
8070 if (_bfd_mul_overflow (symcount + 1,
8071 sizeof (Elf_External_Sym_Shndx), &amt))
8072 goto error_no_mem;
8073 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8074 if (outbound_shndx == NULL)
8075 goto error_return;
8076
8077 symtab_shndx_hdr->contents = outbound_shndx;
8078 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8079 symtab_shndx_hdr->sh_size = amt;
8080 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8081 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8082 }
8083 /* FIXME: What about any other headers in the list ? */
8084 }
8085
8086 /* Now generate the data (for "contents"). */
8087 {
8088 /* Fill in zeroth symbol and swap it out. */
8089 Elf_Internal_Sym sym;
8090 sym.st_name = 0;
8091 sym.st_value = 0;
8092 sym.st_size = 0;
8093 sym.st_info = 0;
8094 sym.st_other = 0;
8095 sym.st_shndx = SHN_UNDEF;
8096 sym.st_target_internal = 0;
8097 symstrtab[0].sym = sym;
8098 symstrtab[0].dest_index = outbound_syms_index;
8099 symstrtab[0].destshndx_index = outbound_shndx_index;
8100 outbound_syms_index++;
8101 if (outbound_shndx != NULL)
8102 outbound_shndx_index++;
8103 }
8104
8105 name_local_sections
8106 = (bed->elf_backend_name_local_section_symbols
8107 && bed->elf_backend_name_local_section_symbols (abfd));
8108
8109 syms = bfd_get_outsymbols (abfd);
8110 for (idx = 0; idx < symcount;)
8111 {
8112 Elf_Internal_Sym sym;
8113 bfd_vma value = syms[idx]->value;
8114 elf_symbol_type *type_ptr;
8115 flagword flags = syms[idx]->flags;
8116 int type;
8117
8118 if (!name_local_sections
8119 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8120 {
8121 /* Local section symbols have no name. */
8122 sym.st_name = (unsigned long) -1;
8123 }
8124 else
8125 {
8126 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8127 to get the final offset for st_name. */
8128 sym.st_name
8129 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8130 FALSE);
8131 if (sym.st_name == (unsigned long) -1)
8132 goto error_return;
8133 }
8134
8135 type_ptr = elf_symbol_from (abfd, syms[idx]);
8136
8137 if ((flags & BSF_SECTION_SYM) == 0
8138 && bfd_is_com_section (syms[idx]->section))
8139 {
8140 /* ELF common symbols put the alignment into the `value' field,
8141 and the size into the `size' field. This is backwards from
8142 how BFD handles it, so reverse it here. */
8143 sym.st_size = value;
8144 if (type_ptr == NULL
8145 || type_ptr->internal_elf_sym.st_value == 0)
8146 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8147 else
8148 sym.st_value = type_ptr->internal_elf_sym.st_value;
8149 sym.st_shndx = _bfd_elf_section_from_bfd_section
8150 (abfd, syms[idx]->section);
8151 }
8152 else
8153 {
8154 asection *sec = syms[idx]->section;
8155 unsigned int shndx;
8156
8157 if (sec->output_section)
8158 {
8159 value += sec->output_offset;
8160 sec = sec->output_section;
8161 }
8162
8163 /* Don't add in the section vma for relocatable output. */
8164 if (! relocatable_p)
8165 value += sec->vma;
8166 sym.st_value = value;
8167 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8168
8169 if (bfd_is_abs_section (sec)
8170 && type_ptr != NULL
8171 && type_ptr->internal_elf_sym.st_shndx != 0)
8172 {
8173 /* This symbol is in a real ELF section which we did
8174 not create as a BFD section. Undo the mapping done
8175 by copy_private_symbol_data. */
8176 shndx = type_ptr->internal_elf_sym.st_shndx;
8177 switch (shndx)
8178 {
8179 case MAP_ONESYMTAB:
8180 shndx = elf_onesymtab (abfd);
8181 break;
8182 case MAP_DYNSYMTAB:
8183 shndx = elf_dynsymtab (abfd);
8184 break;
8185 case MAP_STRTAB:
8186 shndx = elf_strtab_sec (abfd);
8187 break;
8188 case MAP_SHSTRTAB:
8189 shndx = elf_shstrtab_sec (abfd);
8190 break;
8191 case MAP_SYM_SHNDX:
8192 if (elf_symtab_shndx_list (abfd))
8193 shndx = elf_symtab_shndx_list (abfd)->ndx;
8194 break;
8195 case SHN_COMMON:
8196 case SHN_ABS:
8197 shndx = SHN_ABS;
8198 break;
8199 default:
8200 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8201 {
8202 if (bed->symbol_section_index)
8203 shndx = bed->symbol_section_index (abfd, type_ptr);
8204 /* Otherwise just leave the index alone. */
8205 }
8206 else
8207 {
8208 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8209 _bfd_error_handler (_("%pB: \
8210 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8211 abfd, shndx);
8212 shndx = SHN_ABS;
8213 }
8214 break;
8215 }
8216 }
8217 else
8218 {
8219 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8220
8221 if (shndx == SHN_BAD)
8222 {
8223 asection *sec2;
8224
8225 /* Writing this would be a hell of a lot easier if
8226 we had some decent documentation on bfd, and
8227 knew what to expect of the library, and what to
8228 demand of applications. For example, it
8229 appears that `objcopy' might not set the
8230 section of a symbol to be a section that is
8231 actually in the output file. */
8232 sec2 = bfd_get_section_by_name (abfd, sec->name);
8233 if (sec2 != NULL)
8234 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8235 if (shndx == SHN_BAD)
8236 {
8237 /* xgettext:c-format */
8238 _bfd_error_handler
8239 (_("unable to find equivalent output section"
8240 " for symbol '%s' from section '%s'"),
8241 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8242 sec->name);
8243 bfd_set_error (bfd_error_invalid_operation);
8244 goto error_return;
8245 }
8246 }
8247 }
8248
8249 sym.st_shndx = shndx;
8250 }
8251
8252 if ((flags & BSF_THREAD_LOCAL) != 0)
8253 type = STT_TLS;
8254 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8255 type = STT_GNU_IFUNC;
8256 else if ((flags & BSF_FUNCTION) != 0)
8257 type = STT_FUNC;
8258 else if ((flags & BSF_OBJECT) != 0)
8259 type = STT_OBJECT;
8260 else if ((flags & BSF_RELC) != 0)
8261 type = STT_RELC;
8262 else if ((flags & BSF_SRELC) != 0)
8263 type = STT_SRELC;
8264 else
8265 type = STT_NOTYPE;
8266
8267 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8268 type = STT_TLS;
8269
8270 /* Processor-specific types. */
8271 if (type_ptr != NULL
8272 && bed->elf_backend_get_symbol_type)
8273 type = ((*bed->elf_backend_get_symbol_type)
8274 (&type_ptr->internal_elf_sym, type));
8275
8276 if (flags & BSF_SECTION_SYM)
8277 {
8278 if (flags & BSF_GLOBAL)
8279 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8280 else
8281 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8282 }
8283 else if (bfd_is_com_section (syms[idx]->section))
8284 {
8285 if (type != STT_TLS)
8286 {
8287 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8288 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8289 ? STT_COMMON : STT_OBJECT);
8290 else
8291 type = ((flags & BSF_ELF_COMMON) != 0
8292 ? STT_COMMON : STT_OBJECT);
8293 }
8294 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8295 }
8296 else if (bfd_is_und_section (syms[idx]->section))
8297 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8298 ? STB_WEAK
8299 : STB_GLOBAL),
8300 type);
8301 else if (flags & BSF_FILE)
8302 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8303 else
8304 {
8305 int bind = STB_LOCAL;
8306
8307 if (flags & BSF_LOCAL)
8308 bind = STB_LOCAL;
8309 else if (flags & BSF_GNU_UNIQUE)
8310 bind = STB_GNU_UNIQUE;
8311 else if (flags & BSF_WEAK)
8312 bind = STB_WEAK;
8313 else if (flags & BSF_GLOBAL)
8314 bind = STB_GLOBAL;
8315
8316 sym.st_info = ELF_ST_INFO (bind, type);
8317 }
8318
8319 if (type_ptr != NULL)
8320 {
8321 sym.st_other = type_ptr->internal_elf_sym.st_other;
8322 sym.st_target_internal
8323 = type_ptr->internal_elf_sym.st_target_internal;
8324 }
8325 else
8326 {
8327 sym.st_other = 0;
8328 sym.st_target_internal = 0;
8329 }
8330
8331 idx++;
8332 symstrtab[idx].sym = sym;
8333 symstrtab[idx].dest_index = outbound_syms_index;
8334 symstrtab[idx].destshndx_index = outbound_shndx_index;
8335
8336 outbound_syms_index++;
8337 if (outbound_shndx != NULL)
8338 outbound_shndx_index++;
8339 }
8340
8341 /* Finalize the .strtab section. */
8342 _bfd_elf_strtab_finalize (stt);
8343
8344 /* Swap out the .strtab section. */
8345 for (idx = 0; idx <= symcount; idx++)
8346 {
8347 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8348 if (elfsym->sym.st_name == (unsigned long) -1)
8349 elfsym->sym.st_name = 0;
8350 else
8351 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8352 elfsym->sym.st_name);
8353 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8354 (outbound_syms
8355 + (elfsym->dest_index
8356 * bed->s->sizeof_sym)),
8357 (outbound_shndx
8358 + (elfsym->destshndx_index
8359 * sizeof (Elf_External_Sym_Shndx))));
8360 }
8361 free (symstrtab);
8362
8363 *sttp = stt;
8364 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8365 symstrtab_hdr->sh_type = SHT_STRTAB;
8366 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8367 symstrtab_hdr->sh_addr = 0;
8368 symstrtab_hdr->sh_entsize = 0;
8369 symstrtab_hdr->sh_link = 0;
8370 symstrtab_hdr->sh_info = 0;
8371 symstrtab_hdr->sh_addralign = 1;
8372
8373 return TRUE;
8374 }
8375
8376 /* Return the number of bytes required to hold the symtab vector.
8377
8378 Note that we base it on the count plus 1, since we will null terminate
8379 the vector allocated based on this size. However, the ELF symbol table
8380 always has a dummy entry as symbol #0, so it ends up even. */
8381
8382 long
8383 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8384 {
8385 bfd_size_type symcount;
8386 long symtab_size;
8387 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8388
8389 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8390 if (symcount >= LONG_MAX / sizeof (asymbol *))
8391 {
8392 bfd_set_error (bfd_error_file_too_big);
8393 return -1;
8394 }
8395 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8396 if (symcount > 0)
8397 symtab_size -= sizeof (asymbol *);
8398
8399 return symtab_size;
8400 }
8401
8402 long
8403 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8404 {
8405 bfd_size_type symcount;
8406 long symtab_size;
8407 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8408
8409 if (elf_dynsymtab (abfd) == 0)
8410 {
8411 bfd_set_error (bfd_error_invalid_operation);
8412 return -1;
8413 }
8414
8415 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8416 if (symcount >= LONG_MAX / sizeof (asymbol *))
8417 {
8418 bfd_set_error (bfd_error_file_too_big);
8419 return -1;
8420 }
8421 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8422 if (symcount > 0)
8423 symtab_size -= sizeof (asymbol *);
8424
8425 return symtab_size;
8426 }
8427
8428 long
8429 _bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8430 sec_ptr asect)
8431 {
8432 #if SIZEOF_LONG == SIZEOF_INT
8433 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8434 {
8435 bfd_set_error (bfd_error_file_too_big);
8436 return -1;
8437 }
8438 #endif
8439 return (asect->reloc_count + 1) * sizeof (arelent *);
8440 }
8441
8442 /* Canonicalize the relocs. */
8443
8444 long
8445 _bfd_elf_canonicalize_reloc (bfd *abfd,
8446 sec_ptr section,
8447 arelent **relptr,
8448 asymbol **symbols)
8449 {
8450 arelent *tblptr;
8451 unsigned int i;
8452 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8453
8454 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8455 return -1;
8456
8457 tblptr = section->relocation;
8458 for (i = 0; i < section->reloc_count; i++)
8459 *relptr++ = tblptr++;
8460
8461 *relptr = NULL;
8462
8463 return section->reloc_count;
8464 }
8465
8466 long
8467 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8468 {
8469 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8470 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8471
8472 if (symcount >= 0)
8473 abfd->symcount = symcount;
8474 return symcount;
8475 }
8476
8477 long
8478 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8479 asymbol **allocation)
8480 {
8481 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8482 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8483
8484 if (symcount >= 0)
8485 abfd->dynsymcount = symcount;
8486 return symcount;
8487 }
8488
8489 /* Return the size required for the dynamic reloc entries. Any loadable
8490 section that was actually installed in the BFD, and has type SHT_REL
8491 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8492 dynamic reloc section. */
8493
8494 long
8495 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8496 {
8497 bfd_size_type count;
8498 asection *s;
8499
8500 if (elf_dynsymtab (abfd) == 0)
8501 {
8502 bfd_set_error (bfd_error_invalid_operation);
8503 return -1;
8504 }
8505
8506 count = 1;
8507 for (s = abfd->sections; s != NULL; s = s->next)
8508 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8509 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8510 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8511 {
8512 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8513 if (count > LONG_MAX / sizeof (arelent *))
8514 {
8515 bfd_set_error (bfd_error_file_too_big);
8516 return -1;
8517 }
8518 }
8519 return count * sizeof (arelent *);
8520 }
8521
8522 /* Canonicalize the dynamic relocation entries. Note that we return the
8523 dynamic relocations as a single block, although they are actually
8524 associated with particular sections; the interface, which was
8525 designed for SunOS style shared libraries, expects that there is only
8526 one set of dynamic relocs. Any loadable section that was actually
8527 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8528 dynamic symbol table, is considered to be a dynamic reloc section. */
8529
8530 long
8531 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8532 arelent **storage,
8533 asymbol **syms)
8534 {
8535 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8536 asection *s;
8537 long ret;
8538
8539 if (elf_dynsymtab (abfd) == 0)
8540 {
8541 bfd_set_error (bfd_error_invalid_operation);
8542 return -1;
8543 }
8544
8545 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8546 ret = 0;
8547 for (s = abfd->sections; s != NULL; s = s->next)
8548 {
8549 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8550 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8551 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8552 {
8553 arelent *p;
8554 long count, i;
8555
8556 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8557 return -1;
8558 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8559 p = s->relocation;
8560 for (i = 0; i < count; i++)
8561 *storage++ = p++;
8562 ret += count;
8563 }
8564 }
8565
8566 *storage = NULL;
8567
8568 return ret;
8569 }
8570 \f
8571 /* Read in the version information. */
8572
8573 bfd_boolean
8574 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8575 {
8576 bfd_byte *contents = NULL;
8577 unsigned int freeidx = 0;
8578 size_t amt;
8579
8580 if (elf_dynverref (abfd) != 0)
8581 {
8582 Elf_Internal_Shdr *hdr;
8583 Elf_External_Verneed *everneed;
8584 Elf_Internal_Verneed *iverneed;
8585 unsigned int i;
8586 bfd_byte *contents_end;
8587
8588 hdr = &elf_tdata (abfd)->dynverref_hdr;
8589
8590 if (hdr->sh_info == 0
8591 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8592 {
8593 error_return_bad_verref:
8594 _bfd_error_handler
8595 (_("%pB: .gnu.version_r invalid entry"), abfd);
8596 bfd_set_error (bfd_error_bad_value);
8597 error_return_verref:
8598 elf_tdata (abfd)->verref = NULL;
8599 elf_tdata (abfd)->cverrefs = 0;
8600 goto error_return;
8601 }
8602
8603 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8604 goto error_return_verref;
8605 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8606 if (contents == NULL)
8607 goto error_return_verref;
8608
8609 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8610 {
8611 bfd_set_error (bfd_error_file_too_big);
8612 goto error_return_verref;
8613 }
8614 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8615 if (elf_tdata (abfd)->verref == NULL)
8616 goto error_return_verref;
8617
8618 BFD_ASSERT (sizeof (Elf_External_Verneed)
8619 == sizeof (Elf_External_Vernaux));
8620 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8621 everneed = (Elf_External_Verneed *) contents;
8622 iverneed = elf_tdata (abfd)->verref;
8623 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8624 {
8625 Elf_External_Vernaux *evernaux;
8626 Elf_Internal_Vernaux *ivernaux;
8627 unsigned int j;
8628
8629 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8630
8631 iverneed->vn_bfd = abfd;
8632
8633 iverneed->vn_filename =
8634 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8635 iverneed->vn_file);
8636 if (iverneed->vn_filename == NULL)
8637 goto error_return_bad_verref;
8638
8639 if (iverneed->vn_cnt == 0)
8640 iverneed->vn_auxptr = NULL;
8641 else
8642 {
8643 if (_bfd_mul_overflow (iverneed->vn_cnt,
8644 sizeof (Elf_Internal_Vernaux), &amt))
8645 {
8646 bfd_set_error (bfd_error_file_too_big);
8647 goto error_return_verref;
8648 }
8649 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8650 bfd_alloc (abfd, amt);
8651 if (iverneed->vn_auxptr == NULL)
8652 goto error_return_verref;
8653 }
8654
8655 if (iverneed->vn_aux
8656 > (size_t) (contents_end - (bfd_byte *) everneed))
8657 goto error_return_bad_verref;
8658
8659 evernaux = ((Elf_External_Vernaux *)
8660 ((bfd_byte *) everneed + iverneed->vn_aux));
8661 ivernaux = iverneed->vn_auxptr;
8662 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8663 {
8664 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8665
8666 ivernaux->vna_nodename =
8667 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8668 ivernaux->vna_name);
8669 if (ivernaux->vna_nodename == NULL)
8670 goto error_return_bad_verref;
8671
8672 if (ivernaux->vna_other > freeidx)
8673 freeidx = ivernaux->vna_other;
8674
8675 ivernaux->vna_nextptr = NULL;
8676 if (ivernaux->vna_next == 0)
8677 {
8678 iverneed->vn_cnt = j + 1;
8679 break;
8680 }
8681 if (j + 1 < iverneed->vn_cnt)
8682 ivernaux->vna_nextptr = ivernaux + 1;
8683
8684 if (ivernaux->vna_next
8685 > (size_t) (contents_end - (bfd_byte *) evernaux))
8686 goto error_return_bad_verref;
8687
8688 evernaux = ((Elf_External_Vernaux *)
8689 ((bfd_byte *) evernaux + ivernaux->vna_next));
8690 }
8691
8692 iverneed->vn_nextref = NULL;
8693 if (iverneed->vn_next == 0)
8694 break;
8695 if (i + 1 < hdr->sh_info)
8696 iverneed->vn_nextref = iverneed + 1;
8697
8698 if (iverneed->vn_next
8699 > (size_t) (contents_end - (bfd_byte *) everneed))
8700 goto error_return_bad_verref;
8701
8702 everneed = ((Elf_External_Verneed *)
8703 ((bfd_byte *) everneed + iverneed->vn_next));
8704 }
8705 elf_tdata (abfd)->cverrefs = i;
8706
8707 free (contents);
8708 contents = NULL;
8709 }
8710
8711 if (elf_dynverdef (abfd) != 0)
8712 {
8713 Elf_Internal_Shdr *hdr;
8714 Elf_External_Verdef *everdef;
8715 Elf_Internal_Verdef *iverdef;
8716 Elf_Internal_Verdef *iverdefarr;
8717 Elf_Internal_Verdef iverdefmem;
8718 unsigned int i;
8719 unsigned int maxidx;
8720 bfd_byte *contents_end_def, *contents_end_aux;
8721
8722 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8723
8724 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8725 {
8726 error_return_bad_verdef:
8727 _bfd_error_handler
8728 (_("%pB: .gnu.version_d invalid entry"), abfd);
8729 bfd_set_error (bfd_error_bad_value);
8730 error_return_verdef:
8731 elf_tdata (abfd)->verdef = NULL;
8732 elf_tdata (abfd)->cverdefs = 0;
8733 goto error_return;
8734 }
8735
8736 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8737 goto error_return_verdef;
8738 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8739 if (contents == NULL)
8740 goto error_return_verdef;
8741
8742 BFD_ASSERT (sizeof (Elf_External_Verdef)
8743 >= sizeof (Elf_External_Verdaux));
8744 contents_end_def = contents + hdr->sh_size
8745 - sizeof (Elf_External_Verdef);
8746 contents_end_aux = contents + hdr->sh_size
8747 - sizeof (Elf_External_Verdaux);
8748
8749 /* We know the number of entries in the section but not the maximum
8750 index. Therefore we have to run through all entries and find
8751 the maximum. */
8752 everdef = (Elf_External_Verdef *) contents;
8753 maxidx = 0;
8754 for (i = 0; i < hdr->sh_info; ++i)
8755 {
8756 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8757
8758 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8759 goto error_return_bad_verdef;
8760 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8761 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8762
8763 if (iverdefmem.vd_next == 0)
8764 break;
8765
8766 if (iverdefmem.vd_next
8767 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8768 goto error_return_bad_verdef;
8769
8770 everdef = ((Elf_External_Verdef *)
8771 ((bfd_byte *) everdef + iverdefmem.vd_next));
8772 }
8773
8774 if (default_imported_symver)
8775 {
8776 if (freeidx > maxidx)
8777 maxidx = ++freeidx;
8778 else
8779 freeidx = ++maxidx;
8780 }
8781 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8782 {
8783 bfd_set_error (bfd_error_file_too_big);
8784 goto error_return_verdef;
8785 }
8786 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8787 if (elf_tdata (abfd)->verdef == NULL)
8788 goto error_return_verdef;
8789
8790 elf_tdata (abfd)->cverdefs = maxidx;
8791
8792 everdef = (Elf_External_Verdef *) contents;
8793 iverdefarr = elf_tdata (abfd)->verdef;
8794 for (i = 0; i < hdr->sh_info; i++)
8795 {
8796 Elf_External_Verdaux *everdaux;
8797 Elf_Internal_Verdaux *iverdaux;
8798 unsigned int j;
8799
8800 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8801
8802 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8803 goto error_return_bad_verdef;
8804
8805 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8806 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8807
8808 iverdef->vd_bfd = abfd;
8809
8810 if (iverdef->vd_cnt == 0)
8811 iverdef->vd_auxptr = NULL;
8812 else
8813 {
8814 if (_bfd_mul_overflow (iverdef->vd_cnt,
8815 sizeof (Elf_Internal_Verdaux), &amt))
8816 {
8817 bfd_set_error (bfd_error_file_too_big);
8818 goto error_return_verdef;
8819 }
8820 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8821 bfd_alloc (abfd, amt);
8822 if (iverdef->vd_auxptr == NULL)
8823 goto error_return_verdef;
8824 }
8825
8826 if (iverdef->vd_aux
8827 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8828 goto error_return_bad_verdef;
8829
8830 everdaux = ((Elf_External_Verdaux *)
8831 ((bfd_byte *) everdef + iverdef->vd_aux));
8832 iverdaux = iverdef->vd_auxptr;
8833 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8834 {
8835 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8836
8837 iverdaux->vda_nodename =
8838 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8839 iverdaux->vda_name);
8840 if (iverdaux->vda_nodename == NULL)
8841 goto error_return_bad_verdef;
8842
8843 iverdaux->vda_nextptr = NULL;
8844 if (iverdaux->vda_next == 0)
8845 {
8846 iverdef->vd_cnt = j + 1;
8847 break;
8848 }
8849 if (j + 1 < iverdef->vd_cnt)
8850 iverdaux->vda_nextptr = iverdaux + 1;
8851
8852 if (iverdaux->vda_next
8853 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8854 goto error_return_bad_verdef;
8855
8856 everdaux = ((Elf_External_Verdaux *)
8857 ((bfd_byte *) everdaux + iverdaux->vda_next));
8858 }
8859
8860 iverdef->vd_nodename = NULL;
8861 if (iverdef->vd_cnt)
8862 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8863
8864 iverdef->vd_nextdef = NULL;
8865 if (iverdef->vd_next == 0)
8866 break;
8867 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8868 iverdef->vd_nextdef = iverdef + 1;
8869
8870 everdef = ((Elf_External_Verdef *)
8871 ((bfd_byte *) everdef + iverdef->vd_next));
8872 }
8873
8874 free (contents);
8875 contents = NULL;
8876 }
8877 else if (default_imported_symver)
8878 {
8879 if (freeidx < 3)
8880 freeidx = 3;
8881 else
8882 freeidx++;
8883
8884 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8885 {
8886 bfd_set_error (bfd_error_file_too_big);
8887 goto error_return;
8888 }
8889 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8890 if (elf_tdata (abfd)->verdef == NULL)
8891 goto error_return;
8892
8893 elf_tdata (abfd)->cverdefs = freeidx;
8894 }
8895
8896 /* Create a default version based on the soname. */
8897 if (default_imported_symver)
8898 {
8899 Elf_Internal_Verdef *iverdef;
8900 Elf_Internal_Verdaux *iverdaux;
8901
8902 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
8903
8904 iverdef->vd_version = VER_DEF_CURRENT;
8905 iverdef->vd_flags = 0;
8906 iverdef->vd_ndx = freeidx;
8907 iverdef->vd_cnt = 1;
8908
8909 iverdef->vd_bfd = abfd;
8910
8911 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8912 if (iverdef->vd_nodename == NULL)
8913 goto error_return_verdef;
8914 iverdef->vd_nextdef = NULL;
8915 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8916 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
8917 if (iverdef->vd_auxptr == NULL)
8918 goto error_return_verdef;
8919
8920 iverdaux = iverdef->vd_auxptr;
8921 iverdaux->vda_nodename = iverdef->vd_nodename;
8922 }
8923
8924 return TRUE;
8925
8926 error_return:
8927 if (contents != NULL)
8928 free (contents);
8929 return FALSE;
8930 }
8931 \f
8932 asymbol *
8933 _bfd_elf_make_empty_symbol (bfd *abfd)
8934 {
8935 elf_symbol_type *newsym;
8936
8937 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
8938 if (!newsym)
8939 return NULL;
8940 newsym->symbol.the_bfd = abfd;
8941 return &newsym->symbol;
8942 }
8943
8944 void
8945 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8946 asymbol *symbol,
8947 symbol_info *ret)
8948 {
8949 bfd_symbol_info (symbol, ret);
8950 }
8951
8952 /* Return whether a symbol name implies a local symbol. Most targets
8953 use this function for the is_local_label_name entry point, but some
8954 override it. */
8955
8956 bfd_boolean
8957 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8958 const char *name)
8959 {
8960 /* Normal local symbols start with ``.L''. */
8961 if (name[0] == '.' && name[1] == 'L')
8962 return TRUE;
8963
8964 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8965 DWARF debugging symbols starting with ``..''. */
8966 if (name[0] == '.' && name[1] == '.')
8967 return TRUE;
8968
8969 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8970 emitting DWARF debugging output. I suspect this is actually a
8971 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8972 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8973 underscore to be emitted on some ELF targets). For ease of use,
8974 we treat such symbols as local. */
8975 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
8976 return TRUE;
8977
8978 /* Treat assembler generated fake symbols, dollar local labels and
8979 forward-backward labels (aka local labels) as locals.
8980 These labels have the form:
8981
8982 L0^A.* (fake symbols)
8983
8984 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8985
8986 Versions which start with .L will have already been matched above,
8987 so we only need to match the rest. */
8988 if (name[0] == 'L' && ISDIGIT (name[1]))
8989 {
8990 bfd_boolean ret = FALSE;
8991 const char * p;
8992 char c;
8993
8994 for (p = name + 2; (c = *p); p++)
8995 {
8996 if (c == 1 || c == 2)
8997 {
8998 if (c == 1 && p == name + 2)
8999 /* A fake symbol. */
9000 return TRUE;
9001
9002 /* FIXME: We are being paranoid here and treating symbols like
9003 L0^Bfoo as if there were non-local, on the grounds that the
9004 assembler will never generate them. But can any symbol
9005 containing an ASCII value in the range 1-31 ever be anything
9006 other than some kind of local ? */
9007 ret = TRUE;
9008 }
9009
9010 if (! ISDIGIT (c))
9011 {
9012 ret = FALSE;
9013 break;
9014 }
9015 }
9016 return ret;
9017 }
9018
9019 return FALSE;
9020 }
9021
9022 alent *
9023 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9024 asymbol *symbol ATTRIBUTE_UNUSED)
9025 {
9026 abort ();
9027 return NULL;
9028 }
9029
9030 bfd_boolean
9031 _bfd_elf_set_arch_mach (bfd *abfd,
9032 enum bfd_architecture arch,
9033 unsigned long machine)
9034 {
9035 /* If this isn't the right architecture for this backend, and this
9036 isn't the generic backend, fail. */
9037 if (arch != get_elf_backend_data (abfd)->arch
9038 && arch != bfd_arch_unknown
9039 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9040 return FALSE;
9041
9042 return bfd_default_set_arch_mach (abfd, arch, machine);
9043 }
9044
9045 /* Find the nearest line to a particular section and offset,
9046 for error reporting. */
9047
9048 bfd_boolean
9049 _bfd_elf_find_nearest_line (bfd *abfd,
9050 asymbol **symbols,
9051 asection *section,
9052 bfd_vma offset,
9053 const char **filename_ptr,
9054 const char **functionname_ptr,
9055 unsigned int *line_ptr,
9056 unsigned int *discriminator_ptr)
9057 {
9058 bfd_boolean found;
9059
9060 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9061 filename_ptr, functionname_ptr,
9062 line_ptr, discriminator_ptr,
9063 dwarf_debug_sections,
9064 &elf_tdata (abfd)->dwarf2_find_line_info))
9065 return TRUE;
9066
9067 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9068 filename_ptr, functionname_ptr, line_ptr))
9069 {
9070 if (!*functionname_ptr)
9071 _bfd_elf_find_function (abfd, symbols, section, offset,
9072 *filename_ptr ? NULL : filename_ptr,
9073 functionname_ptr);
9074 return TRUE;
9075 }
9076
9077 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9078 &found, filename_ptr,
9079 functionname_ptr, line_ptr,
9080 &elf_tdata (abfd)->line_info))
9081 return FALSE;
9082 if (found && (*functionname_ptr || *line_ptr))
9083 return TRUE;
9084
9085 if (symbols == NULL)
9086 return FALSE;
9087
9088 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9089 filename_ptr, functionname_ptr))
9090 return FALSE;
9091
9092 *line_ptr = 0;
9093 return TRUE;
9094 }
9095
9096 /* Find the line for a symbol. */
9097
9098 bfd_boolean
9099 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9100 const char **filename_ptr, unsigned int *line_ptr)
9101 {
9102 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9103 filename_ptr, NULL, line_ptr, NULL,
9104 dwarf_debug_sections,
9105 &elf_tdata (abfd)->dwarf2_find_line_info);
9106 }
9107
9108 /* After a call to bfd_find_nearest_line, successive calls to
9109 bfd_find_inliner_info can be used to get source information about
9110 each level of function inlining that terminated at the address
9111 passed to bfd_find_nearest_line. Currently this is only supported
9112 for DWARF2 with appropriate DWARF3 extensions. */
9113
9114 bfd_boolean
9115 _bfd_elf_find_inliner_info (bfd *abfd,
9116 const char **filename_ptr,
9117 const char **functionname_ptr,
9118 unsigned int *line_ptr)
9119 {
9120 bfd_boolean found;
9121 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9122 functionname_ptr, line_ptr,
9123 & elf_tdata (abfd)->dwarf2_find_line_info);
9124 return found;
9125 }
9126
9127 int
9128 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9129 {
9130 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9131 int ret = bed->s->sizeof_ehdr;
9132
9133 if (!bfd_link_relocatable (info))
9134 {
9135 bfd_size_type phdr_size = elf_program_header_size (abfd);
9136
9137 if (phdr_size == (bfd_size_type) -1)
9138 {
9139 struct elf_segment_map *m;
9140
9141 phdr_size = 0;
9142 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9143 phdr_size += bed->s->sizeof_phdr;
9144
9145 if (phdr_size == 0)
9146 phdr_size = get_program_header_size (abfd, info);
9147 }
9148
9149 elf_program_header_size (abfd) = phdr_size;
9150 ret += phdr_size;
9151 }
9152
9153 return ret;
9154 }
9155
9156 bfd_boolean
9157 _bfd_elf_set_section_contents (bfd *abfd,
9158 sec_ptr section,
9159 const void *location,
9160 file_ptr offset,
9161 bfd_size_type count)
9162 {
9163 Elf_Internal_Shdr *hdr;
9164 file_ptr pos;
9165
9166 if (! abfd->output_has_begun
9167 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9168 return FALSE;
9169
9170 if (!count)
9171 return TRUE;
9172
9173 hdr = &elf_section_data (section)->this_hdr;
9174 if (hdr->sh_offset == (file_ptr) -1)
9175 {
9176 if (bfd_section_is_ctf (section))
9177 /* Nothing to do with this section: the contents are generated
9178 later. */
9179 return TRUE;
9180
9181 /* We must compress this section. Write output to the buffer. */
9182 unsigned char *contents = hdr->contents;
9183 if ((offset + count) > hdr->sh_size
9184 || (section->flags & SEC_ELF_COMPRESS) == 0
9185 || contents == NULL)
9186 abort ();
9187 memcpy (contents + offset, location, count);
9188 return TRUE;
9189 }
9190 pos = hdr->sh_offset + offset;
9191 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9192 || bfd_bwrite (location, count, abfd) != count)
9193 return FALSE;
9194
9195 return TRUE;
9196 }
9197
9198 bfd_boolean
9199 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9200 arelent *cache_ptr ATTRIBUTE_UNUSED,
9201 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9202 {
9203 abort ();
9204 return FALSE;
9205 }
9206
9207 /* Try to convert a non-ELF reloc into an ELF one. */
9208
9209 bfd_boolean
9210 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9211 {
9212 /* Check whether we really have an ELF howto. */
9213
9214 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9215 {
9216 bfd_reloc_code_real_type code;
9217 reloc_howto_type *howto;
9218
9219 /* Alien reloc: Try to determine its type to replace it with an
9220 equivalent ELF reloc. */
9221
9222 if (areloc->howto->pc_relative)
9223 {
9224 switch (areloc->howto->bitsize)
9225 {
9226 case 8:
9227 code = BFD_RELOC_8_PCREL;
9228 break;
9229 case 12:
9230 code = BFD_RELOC_12_PCREL;
9231 break;
9232 case 16:
9233 code = BFD_RELOC_16_PCREL;
9234 break;
9235 case 24:
9236 code = BFD_RELOC_24_PCREL;
9237 break;
9238 case 32:
9239 code = BFD_RELOC_32_PCREL;
9240 break;
9241 case 64:
9242 code = BFD_RELOC_64_PCREL;
9243 break;
9244 default:
9245 goto fail;
9246 }
9247
9248 howto = bfd_reloc_type_lookup (abfd, code);
9249
9250 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9251 {
9252 if (howto->pcrel_offset)
9253 areloc->addend += areloc->address;
9254 else
9255 areloc->addend -= areloc->address; /* addend is unsigned!! */
9256 }
9257 }
9258 else
9259 {
9260 switch (areloc->howto->bitsize)
9261 {
9262 case 8:
9263 code = BFD_RELOC_8;
9264 break;
9265 case 14:
9266 code = BFD_RELOC_14;
9267 break;
9268 case 16:
9269 code = BFD_RELOC_16;
9270 break;
9271 case 26:
9272 code = BFD_RELOC_26;
9273 break;
9274 case 32:
9275 code = BFD_RELOC_32;
9276 break;
9277 case 64:
9278 code = BFD_RELOC_64;
9279 break;
9280 default:
9281 goto fail;
9282 }
9283
9284 howto = bfd_reloc_type_lookup (abfd, code);
9285 }
9286
9287 if (howto)
9288 areloc->howto = howto;
9289 else
9290 goto fail;
9291 }
9292
9293 return TRUE;
9294
9295 fail:
9296 /* xgettext:c-format */
9297 _bfd_error_handler (_("%pB: %s unsupported"),
9298 abfd, areloc->howto->name);
9299 bfd_set_error (bfd_error_sorry);
9300 return FALSE;
9301 }
9302
9303 bfd_boolean
9304 _bfd_elf_close_and_cleanup (bfd *abfd)
9305 {
9306 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9307 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
9308 {
9309 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9310 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9311 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9312 }
9313
9314 return _bfd_generic_close_and_cleanup (abfd);
9315 }
9316
9317 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9318 in the relocation's offset. Thus we cannot allow any sort of sanity
9319 range-checking to interfere. There is nothing else to do in processing
9320 this reloc. */
9321
9322 bfd_reloc_status_type
9323 _bfd_elf_rel_vtable_reloc_fn
9324 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9325 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9326 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9327 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9328 {
9329 return bfd_reloc_ok;
9330 }
9331 \f
9332 /* Elf core file support. Much of this only works on native
9333 toolchains, since we rely on knowing the
9334 machine-dependent procfs structure in order to pick
9335 out details about the corefile. */
9336
9337 #ifdef HAVE_SYS_PROCFS_H
9338 /* Needed for new procfs interface on sparc-solaris. */
9339 # define _STRUCTURED_PROC 1
9340 # include <sys/procfs.h>
9341 #endif
9342
9343 /* Return a PID that identifies a "thread" for threaded cores, or the
9344 PID of the main process for non-threaded cores. */
9345
9346 static int
9347 elfcore_make_pid (bfd *abfd)
9348 {
9349 int pid;
9350
9351 pid = elf_tdata (abfd)->core->lwpid;
9352 if (pid == 0)
9353 pid = elf_tdata (abfd)->core->pid;
9354
9355 return pid;
9356 }
9357
9358 /* If there isn't a section called NAME, make one, using
9359 data from SECT. Note, this function will generate a
9360 reference to NAME, so you shouldn't deallocate or
9361 overwrite it. */
9362
9363 static bfd_boolean
9364 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9365 {
9366 asection *sect2;
9367
9368 if (bfd_get_section_by_name (abfd, name) != NULL)
9369 return TRUE;
9370
9371 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9372 if (sect2 == NULL)
9373 return FALSE;
9374
9375 sect2->size = sect->size;
9376 sect2->filepos = sect->filepos;
9377 sect2->alignment_power = sect->alignment_power;
9378 return TRUE;
9379 }
9380
9381 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9382 actually creates up to two pseudosections:
9383 - For the single-threaded case, a section named NAME, unless
9384 such a section already exists.
9385 - For the multi-threaded case, a section named "NAME/PID", where
9386 PID is elfcore_make_pid (abfd).
9387 Both pseudosections have identical contents. */
9388 bfd_boolean
9389 _bfd_elfcore_make_pseudosection (bfd *abfd,
9390 char *name,
9391 size_t size,
9392 ufile_ptr filepos)
9393 {
9394 char buf[100];
9395 char *threaded_name;
9396 size_t len;
9397 asection *sect;
9398
9399 /* Build the section name. */
9400
9401 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9402 len = strlen (buf) + 1;
9403 threaded_name = (char *) bfd_alloc (abfd, len);
9404 if (threaded_name == NULL)
9405 return FALSE;
9406 memcpy (threaded_name, buf, len);
9407
9408 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9409 SEC_HAS_CONTENTS);
9410 if (sect == NULL)
9411 return FALSE;
9412 sect->size = size;
9413 sect->filepos = filepos;
9414 sect->alignment_power = 2;
9415
9416 return elfcore_maybe_make_sect (abfd, name, sect);
9417 }
9418
9419 static bfd_boolean
9420 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9421 size_t offs)
9422 {
9423 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9424 SEC_HAS_CONTENTS);
9425
9426 if (sect == NULL)
9427 return FALSE;
9428
9429 sect->size = note->descsz - offs;
9430 sect->filepos = note->descpos + offs;
9431 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9432
9433 return TRUE;
9434 }
9435
9436 /* prstatus_t exists on:
9437 solaris 2.5+
9438 linux 2.[01] + glibc
9439 unixware 4.2
9440 */
9441
9442 #if defined (HAVE_PRSTATUS_T)
9443
9444 static bfd_boolean
9445 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9446 {
9447 size_t size;
9448 int offset;
9449
9450 if (note->descsz == sizeof (prstatus_t))
9451 {
9452 prstatus_t prstat;
9453
9454 size = sizeof (prstat.pr_reg);
9455 offset = offsetof (prstatus_t, pr_reg);
9456 memcpy (&prstat, note->descdata, sizeof (prstat));
9457
9458 /* Do not overwrite the core signal if it
9459 has already been set by another thread. */
9460 if (elf_tdata (abfd)->core->signal == 0)
9461 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9462 if (elf_tdata (abfd)->core->pid == 0)
9463 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9464
9465 /* pr_who exists on:
9466 solaris 2.5+
9467 unixware 4.2
9468 pr_who doesn't exist on:
9469 linux 2.[01]
9470 */
9471 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9472 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9473 #else
9474 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9475 #endif
9476 }
9477 #if defined (HAVE_PRSTATUS32_T)
9478 else if (note->descsz == sizeof (prstatus32_t))
9479 {
9480 /* 64-bit host, 32-bit corefile */
9481 prstatus32_t prstat;
9482
9483 size = sizeof (prstat.pr_reg);
9484 offset = offsetof (prstatus32_t, pr_reg);
9485 memcpy (&prstat, note->descdata, sizeof (prstat));
9486
9487 /* Do not overwrite the core signal if it
9488 has already been set by another thread. */
9489 if (elf_tdata (abfd)->core->signal == 0)
9490 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9491 if (elf_tdata (abfd)->core->pid == 0)
9492 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9493
9494 /* pr_who exists on:
9495 solaris 2.5+
9496 unixware 4.2
9497 pr_who doesn't exist on:
9498 linux 2.[01]
9499 */
9500 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9501 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9502 #else
9503 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9504 #endif
9505 }
9506 #endif /* HAVE_PRSTATUS32_T */
9507 else
9508 {
9509 /* Fail - we don't know how to handle any other
9510 note size (ie. data object type). */
9511 return TRUE;
9512 }
9513
9514 /* Make a ".reg/999" section and a ".reg" section. */
9515 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9516 size, note->descpos + offset);
9517 }
9518 #endif /* defined (HAVE_PRSTATUS_T) */
9519
9520 /* Create a pseudosection containing the exact contents of NOTE. */
9521 static bfd_boolean
9522 elfcore_make_note_pseudosection (bfd *abfd,
9523 char *name,
9524 Elf_Internal_Note *note)
9525 {
9526 return _bfd_elfcore_make_pseudosection (abfd, name,
9527 note->descsz, note->descpos);
9528 }
9529
9530 /* There isn't a consistent prfpregset_t across platforms,
9531 but it doesn't matter, because we don't have to pick this
9532 data structure apart. */
9533
9534 static bfd_boolean
9535 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9536 {
9537 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9538 }
9539
9540 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9541 type of NT_PRXFPREG. Just include the whole note's contents
9542 literally. */
9543
9544 static bfd_boolean
9545 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9546 {
9547 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9548 }
9549
9550 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9551 with a note type of NT_X86_XSTATE. Just include the whole note's
9552 contents literally. */
9553
9554 static bfd_boolean
9555 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9556 {
9557 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9558 }
9559
9560 static bfd_boolean
9561 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9562 {
9563 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9564 }
9565
9566 static bfd_boolean
9567 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9568 {
9569 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9570 }
9571
9572 static bfd_boolean
9573 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9574 {
9575 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9576 }
9577
9578 static bfd_boolean
9579 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9580 {
9581 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9582 }
9583
9584 static bfd_boolean
9585 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9586 {
9587 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9588 }
9589
9590 static bfd_boolean
9591 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9592 {
9593 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9594 }
9595
9596 static bfd_boolean
9597 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9598 {
9599 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9600 }
9601
9602 static bfd_boolean
9603 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9604 {
9605 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9606 }
9607
9608 static bfd_boolean
9609 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9610 {
9611 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9612 }
9613
9614 static bfd_boolean
9615 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9616 {
9617 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9618 }
9619
9620 static bfd_boolean
9621 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9622 {
9623 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9624 }
9625
9626 static bfd_boolean
9627 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9628 {
9629 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9630 }
9631
9632 static bfd_boolean
9633 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9634 {
9635 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9636 }
9637
9638 static bfd_boolean
9639 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9640 {
9641 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9642 }
9643
9644 static bfd_boolean
9645 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9646 {
9647 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9648 }
9649
9650 static bfd_boolean
9651 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9652 {
9653 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9654 }
9655
9656 static bfd_boolean
9657 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9658 {
9659 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9660 }
9661
9662 static bfd_boolean
9663 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9664 {
9665 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9666 }
9667
9668 static bfd_boolean
9669 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9670 {
9671 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9672 }
9673
9674 static bfd_boolean
9675 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9676 {
9677 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9678 }
9679
9680 static bfd_boolean
9681 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9682 {
9683 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9684 }
9685
9686 static bfd_boolean
9687 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9688 {
9689 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9690 }
9691
9692 static bfd_boolean
9693 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9694 {
9695 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9696 }
9697
9698 static bfd_boolean
9699 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9700 {
9701 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9702 }
9703
9704 static bfd_boolean
9705 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9706 {
9707 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9708 }
9709
9710 static bfd_boolean
9711 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9712 {
9713 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9714 }
9715
9716 static bfd_boolean
9717 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9718 {
9719 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9720 }
9721
9722 static bfd_boolean
9723 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9724 {
9725 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9726 }
9727
9728 static bfd_boolean
9729 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9730 {
9731 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9732 }
9733
9734 static bfd_boolean
9735 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9736 {
9737 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9738 }
9739
9740 static bfd_boolean
9741 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9742 {
9743 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9744 }
9745
9746 static bfd_boolean
9747 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9748 {
9749 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9750 }
9751
9752 static bfd_boolean
9753 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9754 {
9755 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9756 }
9757
9758 static bfd_boolean
9759 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9760 {
9761 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9762 }
9763
9764 #if defined (HAVE_PRPSINFO_T)
9765 typedef prpsinfo_t elfcore_psinfo_t;
9766 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9767 typedef prpsinfo32_t elfcore_psinfo32_t;
9768 #endif
9769 #endif
9770
9771 #if defined (HAVE_PSINFO_T)
9772 typedef psinfo_t elfcore_psinfo_t;
9773 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9774 typedef psinfo32_t elfcore_psinfo32_t;
9775 #endif
9776 #endif
9777
9778 /* return a malloc'ed copy of a string at START which is at
9779 most MAX bytes long, possibly without a terminating '\0'.
9780 the copy will always have a terminating '\0'. */
9781
9782 char *
9783 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9784 {
9785 char *dups;
9786 char *end = (char *) memchr (start, '\0', max);
9787 size_t len;
9788
9789 if (end == NULL)
9790 len = max;
9791 else
9792 len = end - start;
9793
9794 dups = (char *) bfd_alloc (abfd, len + 1);
9795 if (dups == NULL)
9796 return NULL;
9797
9798 memcpy (dups, start, len);
9799 dups[len] = '\0';
9800
9801 return dups;
9802 }
9803
9804 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9805 static bfd_boolean
9806 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9807 {
9808 if (note->descsz == sizeof (elfcore_psinfo_t))
9809 {
9810 elfcore_psinfo_t psinfo;
9811
9812 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9813
9814 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9815 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9816 #endif
9817 elf_tdata (abfd)->core->program
9818 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9819 sizeof (psinfo.pr_fname));
9820
9821 elf_tdata (abfd)->core->command
9822 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9823 sizeof (psinfo.pr_psargs));
9824 }
9825 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9826 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9827 {
9828 /* 64-bit host, 32-bit corefile */
9829 elfcore_psinfo32_t psinfo;
9830
9831 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9832
9833 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9834 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9835 #endif
9836 elf_tdata (abfd)->core->program
9837 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9838 sizeof (psinfo.pr_fname));
9839
9840 elf_tdata (abfd)->core->command
9841 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9842 sizeof (psinfo.pr_psargs));
9843 }
9844 #endif
9845
9846 else
9847 {
9848 /* Fail - we don't know how to handle any other
9849 note size (ie. data object type). */
9850 return TRUE;
9851 }
9852
9853 /* Note that for some reason, a spurious space is tacked
9854 onto the end of the args in some (at least one anyway)
9855 implementations, so strip it off if it exists. */
9856
9857 {
9858 char *command = elf_tdata (abfd)->core->command;
9859 int n = strlen (command);
9860
9861 if (0 < n && command[n - 1] == ' ')
9862 command[n - 1] = '\0';
9863 }
9864
9865 return TRUE;
9866 }
9867 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9868
9869 #if defined (HAVE_PSTATUS_T)
9870 static bfd_boolean
9871 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
9872 {
9873 if (note->descsz == sizeof (pstatus_t)
9874 #if defined (HAVE_PXSTATUS_T)
9875 || note->descsz == sizeof (pxstatus_t)
9876 #endif
9877 )
9878 {
9879 pstatus_t pstat;
9880
9881 memcpy (&pstat, note->descdata, sizeof (pstat));
9882
9883 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9884 }
9885 #if defined (HAVE_PSTATUS32_T)
9886 else if (note->descsz == sizeof (pstatus32_t))
9887 {
9888 /* 64-bit host, 32-bit corefile */
9889 pstatus32_t pstat;
9890
9891 memcpy (&pstat, note->descdata, sizeof (pstat));
9892
9893 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9894 }
9895 #endif
9896 /* Could grab some more details from the "representative"
9897 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
9898 NT_LWPSTATUS note, presumably. */
9899
9900 return TRUE;
9901 }
9902 #endif /* defined (HAVE_PSTATUS_T) */
9903
9904 #if defined (HAVE_LWPSTATUS_T)
9905 static bfd_boolean
9906 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
9907 {
9908 lwpstatus_t lwpstat;
9909 char buf[100];
9910 char *name;
9911 size_t len;
9912 asection *sect;
9913
9914 if (note->descsz != sizeof (lwpstat)
9915 #if defined (HAVE_LWPXSTATUS_T)
9916 && note->descsz != sizeof (lwpxstatus_t)
9917 #endif
9918 )
9919 return TRUE;
9920
9921 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9922
9923 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
9924 /* Do not overwrite the core signal if it has already been set by
9925 another thread. */
9926 if (elf_tdata (abfd)->core->signal == 0)
9927 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
9928
9929 /* Make a ".reg/999" section. */
9930
9931 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
9932 len = strlen (buf) + 1;
9933 name = bfd_alloc (abfd, len);
9934 if (name == NULL)
9935 return FALSE;
9936 memcpy (name, buf, len);
9937
9938 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9939 if (sect == NULL)
9940 return FALSE;
9941
9942 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9943 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
9944 sect->filepos = note->descpos
9945 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9946 #endif
9947
9948 #if defined (HAVE_LWPSTATUS_T_PR_REG)
9949 sect->size = sizeof (lwpstat.pr_reg);
9950 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9951 #endif
9952
9953 sect->alignment_power = 2;
9954
9955 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
9956 return FALSE;
9957
9958 /* Make a ".reg2/999" section */
9959
9960 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
9961 len = strlen (buf) + 1;
9962 name = bfd_alloc (abfd, len);
9963 if (name == NULL)
9964 return FALSE;
9965 memcpy (name, buf, len);
9966
9967 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9968 if (sect == NULL)
9969 return FALSE;
9970
9971 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9972 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
9973 sect->filepos = note->descpos
9974 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9975 #endif
9976
9977 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
9978 sect->size = sizeof (lwpstat.pr_fpreg);
9979 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9980 #endif
9981
9982 sect->alignment_power = 2;
9983
9984 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
9985 }
9986 #endif /* defined (HAVE_LWPSTATUS_T) */
9987
9988 static bfd_boolean
9989 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
9990 {
9991 char buf[30];
9992 char *name;
9993 size_t len;
9994 asection *sect;
9995 int type;
9996 int is_active_thread;
9997 bfd_vma base_addr;
9998
9999 if (note->descsz < 728)
10000 return TRUE;
10001
10002 if (! CONST_STRNEQ (note->namedata, "win32"))
10003 return TRUE;
10004
10005 type = bfd_get_32 (abfd, note->descdata);
10006
10007 switch (type)
10008 {
10009 case 1 /* NOTE_INFO_PROCESS */:
10010 /* FIXME: need to add ->core->command. */
10011 /* process_info.pid */
10012 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
10013 /* process_info.signal */
10014 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
10015 break;
10016
10017 case 2 /* NOTE_INFO_THREAD */:
10018 /* Make a ".reg/999" section. */
10019 /* thread_info.tid */
10020 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
10021
10022 len = strlen (buf) + 1;
10023 name = (char *) bfd_alloc (abfd, len);
10024 if (name == NULL)
10025 return FALSE;
10026
10027 memcpy (name, buf, len);
10028
10029 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10030 if (sect == NULL)
10031 return FALSE;
10032
10033 /* sizeof (thread_info.thread_context) */
10034 sect->size = 716;
10035 /* offsetof (thread_info.thread_context) */
10036 sect->filepos = note->descpos + 12;
10037 sect->alignment_power = 2;
10038
10039 /* thread_info.is_active_thread */
10040 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10041
10042 if (is_active_thread)
10043 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10044 return FALSE;
10045 break;
10046
10047 case 3 /* NOTE_INFO_MODULE */:
10048 /* Make a ".module/xxxxxxxx" section. */
10049 /* module_info.base_address */
10050 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10051 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10052
10053 len = strlen (buf) + 1;
10054 name = (char *) bfd_alloc (abfd, len);
10055 if (name == NULL)
10056 return FALSE;
10057
10058 memcpy (name, buf, len);
10059
10060 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10061
10062 if (sect == NULL)
10063 return FALSE;
10064
10065 sect->size = note->descsz;
10066 sect->filepos = note->descpos;
10067 sect->alignment_power = 2;
10068 break;
10069
10070 default:
10071 return TRUE;
10072 }
10073
10074 return TRUE;
10075 }
10076
10077 static bfd_boolean
10078 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10079 {
10080 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10081
10082 switch (note->type)
10083 {
10084 default:
10085 return TRUE;
10086
10087 case NT_PRSTATUS:
10088 if (bed->elf_backend_grok_prstatus)
10089 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10090 return TRUE;
10091 #if defined (HAVE_PRSTATUS_T)
10092 return elfcore_grok_prstatus (abfd, note);
10093 #else
10094 return TRUE;
10095 #endif
10096
10097 #if defined (HAVE_PSTATUS_T)
10098 case NT_PSTATUS:
10099 return elfcore_grok_pstatus (abfd, note);
10100 #endif
10101
10102 #if defined (HAVE_LWPSTATUS_T)
10103 case NT_LWPSTATUS:
10104 return elfcore_grok_lwpstatus (abfd, note);
10105 #endif
10106
10107 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10108 return elfcore_grok_prfpreg (abfd, note);
10109
10110 case NT_WIN32PSTATUS:
10111 return elfcore_grok_win32pstatus (abfd, note);
10112
10113 case NT_PRXFPREG: /* Linux SSE extension */
10114 if (note->namesz == 6
10115 && strcmp (note->namedata, "LINUX") == 0)
10116 return elfcore_grok_prxfpreg (abfd, note);
10117 else
10118 return TRUE;
10119
10120 case NT_X86_XSTATE: /* Linux XSAVE extension */
10121 if (note->namesz == 6
10122 && strcmp (note->namedata, "LINUX") == 0)
10123 return elfcore_grok_xstatereg (abfd, note);
10124 else
10125 return TRUE;
10126
10127 case NT_PPC_VMX:
10128 if (note->namesz == 6
10129 && strcmp (note->namedata, "LINUX") == 0)
10130 return elfcore_grok_ppc_vmx (abfd, note);
10131 else
10132 return TRUE;
10133
10134 case NT_PPC_VSX:
10135 if (note->namesz == 6
10136 && strcmp (note->namedata, "LINUX") == 0)
10137 return elfcore_grok_ppc_vsx (abfd, note);
10138 else
10139 return TRUE;
10140
10141 case NT_PPC_TAR:
10142 if (note->namesz == 6
10143 && strcmp (note->namedata, "LINUX") == 0)
10144 return elfcore_grok_ppc_tar (abfd, note);
10145 else
10146 return TRUE;
10147
10148 case NT_PPC_PPR:
10149 if (note->namesz == 6
10150 && strcmp (note->namedata, "LINUX") == 0)
10151 return elfcore_grok_ppc_ppr (abfd, note);
10152 else
10153 return TRUE;
10154
10155 case NT_PPC_DSCR:
10156 if (note->namesz == 6
10157 && strcmp (note->namedata, "LINUX") == 0)
10158 return elfcore_grok_ppc_dscr (abfd, note);
10159 else
10160 return TRUE;
10161
10162 case NT_PPC_EBB:
10163 if (note->namesz == 6
10164 && strcmp (note->namedata, "LINUX") == 0)
10165 return elfcore_grok_ppc_ebb (abfd, note);
10166 else
10167 return TRUE;
10168
10169 case NT_PPC_PMU:
10170 if (note->namesz == 6
10171 && strcmp (note->namedata, "LINUX") == 0)
10172 return elfcore_grok_ppc_pmu (abfd, note);
10173 else
10174 return TRUE;
10175
10176 case NT_PPC_TM_CGPR:
10177 if (note->namesz == 6
10178 && strcmp (note->namedata, "LINUX") == 0)
10179 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10180 else
10181 return TRUE;
10182
10183 case NT_PPC_TM_CFPR:
10184 if (note->namesz == 6
10185 && strcmp (note->namedata, "LINUX") == 0)
10186 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10187 else
10188 return TRUE;
10189
10190 case NT_PPC_TM_CVMX:
10191 if (note->namesz == 6
10192 && strcmp (note->namedata, "LINUX") == 0)
10193 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10194 else
10195 return TRUE;
10196
10197 case NT_PPC_TM_CVSX:
10198 if (note->namesz == 6
10199 && strcmp (note->namedata, "LINUX") == 0)
10200 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10201 else
10202 return TRUE;
10203
10204 case NT_PPC_TM_SPR:
10205 if (note->namesz == 6
10206 && strcmp (note->namedata, "LINUX") == 0)
10207 return elfcore_grok_ppc_tm_spr (abfd, note);
10208 else
10209 return TRUE;
10210
10211 case NT_PPC_TM_CTAR:
10212 if (note->namesz == 6
10213 && strcmp (note->namedata, "LINUX") == 0)
10214 return elfcore_grok_ppc_tm_ctar (abfd, note);
10215 else
10216 return TRUE;
10217
10218 case NT_PPC_TM_CPPR:
10219 if (note->namesz == 6
10220 && strcmp (note->namedata, "LINUX") == 0)
10221 return elfcore_grok_ppc_tm_cppr (abfd, note);
10222 else
10223 return TRUE;
10224
10225 case NT_PPC_TM_CDSCR:
10226 if (note->namesz == 6
10227 && strcmp (note->namedata, "LINUX") == 0)
10228 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10229 else
10230 return TRUE;
10231
10232 case NT_S390_HIGH_GPRS:
10233 if (note->namesz == 6
10234 && strcmp (note->namedata, "LINUX") == 0)
10235 return elfcore_grok_s390_high_gprs (abfd, note);
10236 else
10237 return TRUE;
10238
10239 case NT_S390_TIMER:
10240 if (note->namesz == 6
10241 && strcmp (note->namedata, "LINUX") == 0)
10242 return elfcore_grok_s390_timer (abfd, note);
10243 else
10244 return TRUE;
10245
10246 case NT_S390_TODCMP:
10247 if (note->namesz == 6
10248 && strcmp (note->namedata, "LINUX") == 0)
10249 return elfcore_grok_s390_todcmp (abfd, note);
10250 else
10251 return TRUE;
10252
10253 case NT_S390_TODPREG:
10254 if (note->namesz == 6
10255 && strcmp (note->namedata, "LINUX") == 0)
10256 return elfcore_grok_s390_todpreg (abfd, note);
10257 else
10258 return TRUE;
10259
10260 case NT_S390_CTRS:
10261 if (note->namesz == 6
10262 && strcmp (note->namedata, "LINUX") == 0)
10263 return elfcore_grok_s390_ctrs (abfd, note);
10264 else
10265 return TRUE;
10266
10267 case NT_S390_PREFIX:
10268 if (note->namesz == 6
10269 && strcmp (note->namedata, "LINUX") == 0)
10270 return elfcore_grok_s390_prefix (abfd, note);
10271 else
10272 return TRUE;
10273
10274 case NT_S390_LAST_BREAK:
10275 if (note->namesz == 6
10276 && strcmp (note->namedata, "LINUX") == 0)
10277 return elfcore_grok_s390_last_break (abfd, note);
10278 else
10279 return TRUE;
10280
10281 case NT_S390_SYSTEM_CALL:
10282 if (note->namesz == 6
10283 && strcmp (note->namedata, "LINUX") == 0)
10284 return elfcore_grok_s390_system_call (abfd, note);
10285 else
10286 return TRUE;
10287
10288 case NT_S390_TDB:
10289 if (note->namesz == 6
10290 && strcmp (note->namedata, "LINUX") == 0)
10291 return elfcore_grok_s390_tdb (abfd, note);
10292 else
10293 return TRUE;
10294
10295 case NT_S390_VXRS_LOW:
10296 if (note->namesz == 6
10297 && strcmp (note->namedata, "LINUX") == 0)
10298 return elfcore_grok_s390_vxrs_low (abfd, note);
10299 else
10300 return TRUE;
10301
10302 case NT_S390_VXRS_HIGH:
10303 if (note->namesz == 6
10304 && strcmp (note->namedata, "LINUX") == 0)
10305 return elfcore_grok_s390_vxrs_high (abfd, note);
10306 else
10307 return TRUE;
10308
10309 case NT_S390_GS_CB:
10310 if (note->namesz == 6
10311 && strcmp (note->namedata, "LINUX") == 0)
10312 return elfcore_grok_s390_gs_cb (abfd, note);
10313 else
10314 return TRUE;
10315
10316 case NT_S390_GS_BC:
10317 if (note->namesz == 6
10318 && strcmp (note->namedata, "LINUX") == 0)
10319 return elfcore_grok_s390_gs_bc (abfd, note);
10320 else
10321 return TRUE;
10322
10323 case NT_ARM_VFP:
10324 if (note->namesz == 6
10325 && strcmp (note->namedata, "LINUX") == 0)
10326 return elfcore_grok_arm_vfp (abfd, note);
10327 else
10328 return TRUE;
10329
10330 case NT_ARM_TLS:
10331 if (note->namesz == 6
10332 && strcmp (note->namedata, "LINUX") == 0)
10333 return elfcore_grok_aarch_tls (abfd, note);
10334 else
10335 return TRUE;
10336
10337 case NT_ARM_HW_BREAK:
10338 if (note->namesz == 6
10339 && strcmp (note->namedata, "LINUX") == 0)
10340 return elfcore_grok_aarch_hw_break (abfd, note);
10341 else
10342 return TRUE;
10343
10344 case NT_ARM_HW_WATCH:
10345 if (note->namesz == 6
10346 && strcmp (note->namedata, "LINUX") == 0)
10347 return elfcore_grok_aarch_hw_watch (abfd, note);
10348 else
10349 return TRUE;
10350
10351 case NT_ARM_SVE:
10352 if (note->namesz == 6
10353 && strcmp (note->namedata, "LINUX") == 0)
10354 return elfcore_grok_aarch_sve (abfd, note);
10355 else
10356 return TRUE;
10357
10358 case NT_ARM_PAC_MASK:
10359 if (note->namesz == 6
10360 && strcmp (note->namedata, "LINUX") == 0)
10361 return elfcore_grok_aarch_pauth (abfd, note);
10362 else
10363 return TRUE;
10364
10365 case NT_PRPSINFO:
10366 case NT_PSINFO:
10367 if (bed->elf_backend_grok_psinfo)
10368 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10369 return TRUE;
10370 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10371 return elfcore_grok_psinfo (abfd, note);
10372 #else
10373 return TRUE;
10374 #endif
10375
10376 case NT_AUXV:
10377 return elfcore_make_auxv_note_section (abfd, note, 0);
10378
10379 case NT_FILE:
10380 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10381 note);
10382
10383 case NT_SIGINFO:
10384 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10385 note);
10386
10387 }
10388 }
10389
10390 static bfd_boolean
10391 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10392 {
10393 struct bfd_build_id* build_id;
10394
10395 if (note->descsz == 0)
10396 return FALSE;
10397
10398 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10399 if (build_id == NULL)
10400 return FALSE;
10401
10402 build_id->size = note->descsz;
10403 memcpy (build_id->data, note->descdata, note->descsz);
10404 abfd->build_id = build_id;
10405
10406 return TRUE;
10407 }
10408
10409 static bfd_boolean
10410 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10411 {
10412 switch (note->type)
10413 {
10414 default:
10415 return TRUE;
10416
10417 case NT_GNU_PROPERTY_TYPE_0:
10418 return _bfd_elf_parse_gnu_properties (abfd, note);
10419
10420 case NT_GNU_BUILD_ID:
10421 return elfobj_grok_gnu_build_id (abfd, note);
10422 }
10423 }
10424
10425 static bfd_boolean
10426 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10427 {
10428 struct sdt_note *cur =
10429 (struct sdt_note *) bfd_alloc (abfd,
10430 sizeof (struct sdt_note) + note->descsz);
10431
10432 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10433 cur->size = (bfd_size_type) note->descsz;
10434 memcpy (cur->data, note->descdata, note->descsz);
10435
10436 elf_tdata (abfd)->sdt_note_head = cur;
10437
10438 return TRUE;
10439 }
10440
10441 static bfd_boolean
10442 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10443 {
10444 switch (note->type)
10445 {
10446 case NT_STAPSDT:
10447 return elfobj_grok_stapsdt_note_1 (abfd, note);
10448
10449 default:
10450 return TRUE;
10451 }
10452 }
10453
10454 static bfd_boolean
10455 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10456 {
10457 size_t offset;
10458
10459 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10460 {
10461 case ELFCLASS32:
10462 if (note->descsz < 108)
10463 return FALSE;
10464 break;
10465
10466 case ELFCLASS64:
10467 if (note->descsz < 120)
10468 return FALSE;
10469 break;
10470
10471 default:
10472 return FALSE;
10473 }
10474
10475 /* Check for version 1 in pr_version. */
10476 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10477 return FALSE;
10478
10479 offset = 4;
10480
10481 /* Skip over pr_psinfosz. */
10482 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10483 offset += 4;
10484 else
10485 {
10486 offset += 4; /* Padding before pr_psinfosz. */
10487 offset += 8;
10488 }
10489
10490 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10491 elf_tdata (abfd)->core->program
10492 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10493 offset += 17;
10494
10495 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10496 elf_tdata (abfd)->core->command
10497 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10498 offset += 81;
10499
10500 /* Padding before pr_pid. */
10501 offset += 2;
10502
10503 /* The pr_pid field was added in version "1a". */
10504 if (note->descsz < offset + 4)
10505 return TRUE;
10506
10507 elf_tdata (abfd)->core->pid
10508 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10509
10510 return TRUE;
10511 }
10512
10513 static bfd_boolean
10514 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10515 {
10516 size_t offset;
10517 size_t size;
10518 size_t min_size;
10519
10520 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10521 Also compute minimum size of this note. */
10522 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10523 {
10524 case ELFCLASS32:
10525 offset = 4 + 4;
10526 min_size = offset + (4 * 2) + 4 + 4 + 4;
10527 break;
10528
10529 case ELFCLASS64:
10530 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10531 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10532 break;
10533
10534 default:
10535 return FALSE;
10536 }
10537
10538 if (note->descsz < min_size)
10539 return FALSE;
10540
10541 /* Check for version 1 in pr_version. */
10542 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10543 return FALSE;
10544
10545 /* Extract size of pr_reg from pr_gregsetsz. */
10546 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10547 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10548 {
10549 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10550 offset += 4 * 2;
10551 }
10552 else
10553 {
10554 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10555 offset += 8 * 2;
10556 }
10557
10558 /* Skip over pr_osreldate. */
10559 offset += 4;
10560
10561 /* Read signal from pr_cursig. */
10562 if (elf_tdata (abfd)->core->signal == 0)
10563 elf_tdata (abfd)->core->signal
10564 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10565 offset += 4;
10566
10567 /* Read TID from pr_pid. */
10568 elf_tdata (abfd)->core->lwpid
10569 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10570 offset += 4;
10571
10572 /* Padding before pr_reg. */
10573 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10574 offset += 4;
10575
10576 /* Make sure that there is enough data remaining in the note. */
10577 if ((note->descsz - offset) < size)
10578 return FALSE;
10579
10580 /* Make a ".reg/999" section and a ".reg" section. */
10581 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10582 size, note->descpos + offset);
10583 }
10584
10585 static bfd_boolean
10586 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10587 {
10588 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10589
10590 switch (note->type)
10591 {
10592 case NT_PRSTATUS:
10593 if (bed->elf_backend_grok_freebsd_prstatus)
10594 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10595 return TRUE;
10596 return elfcore_grok_freebsd_prstatus (abfd, note);
10597
10598 case NT_FPREGSET:
10599 return elfcore_grok_prfpreg (abfd, note);
10600
10601 case NT_PRPSINFO:
10602 return elfcore_grok_freebsd_psinfo (abfd, note);
10603
10604 case NT_FREEBSD_THRMISC:
10605 if (note->namesz == 8)
10606 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10607 else
10608 return TRUE;
10609
10610 case NT_FREEBSD_PROCSTAT_PROC:
10611 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10612 note);
10613
10614 case NT_FREEBSD_PROCSTAT_FILES:
10615 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10616 note);
10617
10618 case NT_FREEBSD_PROCSTAT_VMMAP:
10619 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10620 note);
10621
10622 case NT_FREEBSD_PROCSTAT_AUXV:
10623 return elfcore_make_auxv_note_section (abfd, note, 4);
10624
10625 case NT_X86_XSTATE:
10626 if (note->namesz == 8)
10627 return elfcore_grok_xstatereg (abfd, note);
10628 else
10629 return TRUE;
10630
10631 case NT_FREEBSD_PTLWPINFO:
10632 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10633 note);
10634
10635 case NT_ARM_VFP:
10636 return elfcore_grok_arm_vfp (abfd, note);
10637
10638 default:
10639 return TRUE;
10640 }
10641 }
10642
10643 static bfd_boolean
10644 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10645 {
10646 char *cp;
10647
10648 cp = strchr (note->namedata, '@');
10649 if (cp != NULL)
10650 {
10651 *lwpidp = atoi(cp + 1);
10652 return TRUE;
10653 }
10654 return FALSE;
10655 }
10656
10657 static bfd_boolean
10658 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10659 {
10660 if (note->descsz <= 0x7c + 31)
10661 return FALSE;
10662
10663 /* Signal number at offset 0x08. */
10664 elf_tdata (abfd)->core->signal
10665 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10666
10667 /* Process ID at offset 0x50. */
10668 elf_tdata (abfd)->core->pid
10669 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10670
10671 /* Command name at 0x7c (max 32 bytes, including nul). */
10672 elf_tdata (abfd)->core->command
10673 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10674
10675 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10676 note);
10677 }
10678
10679 static bfd_boolean
10680 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10681 {
10682 int lwp;
10683
10684 if (elfcore_netbsd_get_lwpid (note, &lwp))
10685 elf_tdata (abfd)->core->lwpid = lwp;
10686
10687 switch (note->type)
10688 {
10689 case NT_NETBSDCORE_PROCINFO:
10690 /* NetBSD-specific core "procinfo". Note that we expect to
10691 find this note before any of the others, which is fine,
10692 since the kernel writes this note out first when it
10693 creates a core file. */
10694 return elfcore_grok_netbsd_procinfo (abfd, note);
10695 #ifdef NT_NETBSDCORE_AUXV
10696 case NT_NETBSDCORE_AUXV:
10697 /* NetBSD-specific Elf Auxiliary Vector data. */
10698 return elfcore_make_auxv_note_section (abfd, note, 4);
10699 #endif
10700 default:
10701 break;
10702 }
10703
10704 /* As of March 2017 there are no other machine-independent notes
10705 defined for NetBSD core files. If the note type is less
10706 than the start of the machine-dependent note types, we don't
10707 understand it. */
10708
10709 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10710 return TRUE;
10711
10712
10713 switch (bfd_get_arch (abfd))
10714 {
10715 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10716 PT_GETFPREGS == mach+2. */
10717
10718 case bfd_arch_alpha:
10719 case bfd_arch_sparc:
10720 switch (note->type)
10721 {
10722 case NT_NETBSDCORE_FIRSTMACH+0:
10723 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10724
10725 case NT_NETBSDCORE_FIRSTMACH+2:
10726 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10727
10728 default:
10729 return TRUE;
10730 }
10731
10732 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10733 There's also old PT___GETREGS40 == mach + 1 for old reg
10734 structure which lacks GBR. */
10735
10736 case bfd_arch_sh:
10737 switch (note->type)
10738 {
10739 case NT_NETBSDCORE_FIRSTMACH+3:
10740 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10741
10742 case NT_NETBSDCORE_FIRSTMACH+5:
10743 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10744
10745 default:
10746 return TRUE;
10747 }
10748
10749 /* On all other arch's, PT_GETREGS == mach+1 and
10750 PT_GETFPREGS == mach+3. */
10751
10752 default:
10753 switch (note->type)
10754 {
10755 case NT_NETBSDCORE_FIRSTMACH+1:
10756 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10757
10758 case NT_NETBSDCORE_FIRSTMACH+3:
10759 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10760
10761 default:
10762 return TRUE;
10763 }
10764 }
10765 /* NOTREACHED */
10766 }
10767
10768 static bfd_boolean
10769 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10770 {
10771 if (note->descsz <= 0x48 + 31)
10772 return FALSE;
10773
10774 /* Signal number at offset 0x08. */
10775 elf_tdata (abfd)->core->signal
10776 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10777
10778 /* Process ID at offset 0x20. */
10779 elf_tdata (abfd)->core->pid
10780 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10781
10782 /* Command name at 0x48 (max 32 bytes, including nul). */
10783 elf_tdata (abfd)->core->command
10784 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10785
10786 return TRUE;
10787 }
10788
10789 static bfd_boolean
10790 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10791 {
10792 if (note->type == NT_OPENBSD_PROCINFO)
10793 return elfcore_grok_openbsd_procinfo (abfd, note);
10794
10795 if (note->type == NT_OPENBSD_REGS)
10796 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10797
10798 if (note->type == NT_OPENBSD_FPREGS)
10799 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10800
10801 if (note->type == NT_OPENBSD_XFPREGS)
10802 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10803
10804 if (note->type == NT_OPENBSD_AUXV)
10805 return elfcore_make_auxv_note_section (abfd, note, 0);
10806
10807 if (note->type == NT_OPENBSD_WCOOKIE)
10808 {
10809 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10810 SEC_HAS_CONTENTS);
10811
10812 if (sect == NULL)
10813 return FALSE;
10814 sect->size = note->descsz;
10815 sect->filepos = note->descpos;
10816 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10817
10818 return TRUE;
10819 }
10820
10821 return TRUE;
10822 }
10823
10824 static bfd_boolean
10825 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
10826 {
10827 void *ddata = note->descdata;
10828 char buf[100];
10829 char *name;
10830 asection *sect;
10831 short sig;
10832 unsigned flags;
10833
10834 if (note->descsz < 16)
10835 return FALSE;
10836
10837 /* nto_procfs_status 'pid' field is at offset 0. */
10838 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
10839
10840 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10841 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10842
10843 /* nto_procfs_status 'flags' field is at offset 8. */
10844 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
10845
10846 /* nto_procfs_status 'what' field is at offset 14. */
10847 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10848 {
10849 elf_tdata (abfd)->core->signal = sig;
10850 elf_tdata (abfd)->core->lwpid = *tid;
10851 }
10852
10853 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10854 do not come from signals so we make sure we set the current
10855 thread just in case. */
10856 if (flags & 0x00000080)
10857 elf_tdata (abfd)->core->lwpid = *tid;
10858
10859 /* Make a ".qnx_core_status/%d" section. */
10860 sprintf (buf, ".qnx_core_status/%ld", *tid);
10861
10862 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10863 if (name == NULL)
10864 return FALSE;
10865 strcpy (name, buf);
10866
10867 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10868 if (sect == NULL)
10869 return FALSE;
10870
10871 sect->size = note->descsz;
10872 sect->filepos = note->descpos;
10873 sect->alignment_power = 2;
10874
10875 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10876 }
10877
10878 static bfd_boolean
10879 elfcore_grok_nto_regs (bfd *abfd,
10880 Elf_Internal_Note *note,
10881 long tid,
10882 char *base)
10883 {
10884 char buf[100];
10885 char *name;
10886 asection *sect;
10887
10888 /* Make a "(base)/%d" section. */
10889 sprintf (buf, "%s/%ld", base, tid);
10890
10891 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10892 if (name == NULL)
10893 return FALSE;
10894 strcpy (name, buf);
10895
10896 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10897 if (sect == NULL)
10898 return FALSE;
10899
10900 sect->size = note->descsz;
10901 sect->filepos = note->descpos;
10902 sect->alignment_power = 2;
10903
10904 /* This is the current thread. */
10905 if (elf_tdata (abfd)->core->lwpid == tid)
10906 return elfcore_maybe_make_sect (abfd, base, sect);
10907
10908 return TRUE;
10909 }
10910
10911 #define BFD_QNT_CORE_INFO 7
10912 #define BFD_QNT_CORE_STATUS 8
10913 #define BFD_QNT_CORE_GREG 9
10914 #define BFD_QNT_CORE_FPREG 10
10915
10916 static bfd_boolean
10917 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
10918 {
10919 /* Every GREG section has a STATUS section before it. Store the
10920 tid from the previous call to pass down to the next gregs
10921 function. */
10922 static long tid = 1;
10923
10924 switch (note->type)
10925 {
10926 case BFD_QNT_CORE_INFO:
10927 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10928 case BFD_QNT_CORE_STATUS:
10929 return elfcore_grok_nto_status (abfd, note, &tid);
10930 case BFD_QNT_CORE_GREG:
10931 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10932 case BFD_QNT_CORE_FPREG:
10933 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10934 default:
10935 return TRUE;
10936 }
10937 }
10938
10939 static bfd_boolean
10940 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10941 {
10942 char *name;
10943 asection *sect;
10944 size_t len;
10945
10946 /* Use note name as section name. */
10947 len = note->namesz;
10948 name = (char *) bfd_alloc (abfd, len);
10949 if (name == NULL)
10950 return FALSE;
10951 memcpy (name, note->namedata, len);
10952 name[len - 1] = '\0';
10953
10954 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10955 if (sect == NULL)
10956 return FALSE;
10957
10958 sect->size = note->descsz;
10959 sect->filepos = note->descpos;
10960 sect->alignment_power = 1;
10961
10962 return TRUE;
10963 }
10964
10965 /* Function: elfcore_write_note
10966
10967 Inputs:
10968 buffer to hold note, and current size of buffer
10969 name of note
10970 type of note
10971 data for note
10972 size of data for note
10973
10974 Writes note to end of buffer. ELF64 notes are written exactly as
10975 for ELF32, despite the current (as of 2006) ELF gabi specifying
10976 that they ought to have 8-byte namesz and descsz field, and have
10977 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10978
10979 Return:
10980 Pointer to realloc'd buffer, *BUFSIZ updated. */
10981
10982 char *
10983 elfcore_write_note (bfd *abfd,
10984 char *buf,
10985 int *bufsiz,
10986 const char *name,
10987 int type,
10988 const void *input,
10989 int size)
10990 {
10991 Elf_External_Note *xnp;
10992 size_t namesz;
10993 size_t newspace;
10994 char *dest;
10995
10996 namesz = 0;
10997 if (name != NULL)
10998 namesz = strlen (name) + 1;
10999
11000 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11001
11002 buf = (char *) realloc (buf, *bufsiz + newspace);
11003 if (buf == NULL)
11004 return buf;
11005 dest = buf + *bufsiz;
11006 *bufsiz += newspace;
11007 xnp = (Elf_External_Note *) dest;
11008 H_PUT_32 (abfd, namesz, xnp->namesz);
11009 H_PUT_32 (abfd, size, xnp->descsz);
11010 H_PUT_32 (abfd, type, xnp->type);
11011 dest = xnp->name;
11012 if (name != NULL)
11013 {
11014 memcpy (dest, name, namesz);
11015 dest += namesz;
11016 while (namesz & 3)
11017 {
11018 *dest++ = '\0';
11019 ++namesz;
11020 }
11021 }
11022 memcpy (dest, input, size);
11023 dest += size;
11024 while (size & 3)
11025 {
11026 *dest++ = '\0';
11027 ++size;
11028 }
11029 return buf;
11030 }
11031
11032 /* gcc-8 warns (*) on all the strncpy calls in this function about
11033 possible string truncation. The "truncation" is not a bug. We
11034 have an external representation of structs with fields that are not
11035 necessarily NULL terminated and corresponding internal
11036 representation fields that are one larger so that they can always
11037 be NULL terminated.
11038 gcc versions between 4.2 and 4.6 do not allow pragma control of
11039 diagnostics inside functions, giving a hard error if you try to use
11040 the finer control available with later versions.
11041 gcc prior to 4.2 warns about diagnostic push and pop.
11042 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11043 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11044 (*) Depending on your system header files! */
11045 #if GCC_VERSION >= 8000
11046 # pragma GCC diagnostic push
11047 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11048 #endif
11049 char *
11050 elfcore_write_prpsinfo (bfd *abfd,
11051 char *buf,
11052 int *bufsiz,
11053 const char *fname,
11054 const char *psargs)
11055 {
11056 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11057
11058 if (bed->elf_backend_write_core_note != NULL)
11059 {
11060 char *ret;
11061 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11062 NT_PRPSINFO, fname, psargs);
11063 if (ret != NULL)
11064 return ret;
11065 }
11066
11067 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11068 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11069 if (bed->s->elfclass == ELFCLASS32)
11070 {
11071 # if defined (HAVE_PSINFO32_T)
11072 psinfo32_t data;
11073 int note_type = NT_PSINFO;
11074 # else
11075 prpsinfo32_t data;
11076 int note_type = NT_PRPSINFO;
11077 # endif
11078
11079 memset (&data, 0, sizeof (data));
11080 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11081 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11082 return elfcore_write_note (abfd, buf, bufsiz,
11083 "CORE", note_type, &data, sizeof (data));
11084 }
11085 else
11086 # endif
11087 {
11088 # if defined (HAVE_PSINFO_T)
11089 psinfo_t data;
11090 int note_type = NT_PSINFO;
11091 # else
11092 prpsinfo_t data;
11093 int note_type = NT_PRPSINFO;
11094 # endif
11095
11096 memset (&data, 0, sizeof (data));
11097 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11098 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11099 return elfcore_write_note (abfd, buf, bufsiz,
11100 "CORE", note_type, &data, sizeof (data));
11101 }
11102 #endif /* PSINFO_T or PRPSINFO_T */
11103
11104 free (buf);
11105 return NULL;
11106 }
11107 #if GCC_VERSION >= 8000
11108 # pragma GCC diagnostic pop
11109 #endif
11110
11111 char *
11112 elfcore_write_linux_prpsinfo32
11113 (bfd *abfd, char *buf, int *bufsiz,
11114 const struct elf_internal_linux_prpsinfo *prpsinfo)
11115 {
11116 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11117 {
11118 struct elf_external_linux_prpsinfo32_ugid16 data;
11119
11120 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11121 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11122 &data, sizeof (data));
11123 }
11124 else
11125 {
11126 struct elf_external_linux_prpsinfo32_ugid32 data;
11127
11128 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11129 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11130 &data, sizeof (data));
11131 }
11132 }
11133
11134 char *
11135 elfcore_write_linux_prpsinfo64
11136 (bfd *abfd, char *buf, int *bufsiz,
11137 const struct elf_internal_linux_prpsinfo *prpsinfo)
11138 {
11139 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11140 {
11141 struct elf_external_linux_prpsinfo64_ugid16 data;
11142
11143 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11144 return elfcore_write_note (abfd, buf, bufsiz,
11145 "CORE", NT_PRPSINFO, &data, sizeof (data));
11146 }
11147 else
11148 {
11149 struct elf_external_linux_prpsinfo64_ugid32 data;
11150
11151 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11152 return elfcore_write_note (abfd, buf, bufsiz,
11153 "CORE", NT_PRPSINFO, &data, sizeof (data));
11154 }
11155 }
11156
11157 char *
11158 elfcore_write_prstatus (bfd *abfd,
11159 char *buf,
11160 int *bufsiz,
11161 long pid,
11162 int cursig,
11163 const void *gregs)
11164 {
11165 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11166
11167 if (bed->elf_backend_write_core_note != NULL)
11168 {
11169 char *ret;
11170 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11171 NT_PRSTATUS,
11172 pid, cursig, gregs);
11173 if (ret != NULL)
11174 return ret;
11175 }
11176
11177 #if defined (HAVE_PRSTATUS_T)
11178 #if defined (HAVE_PRSTATUS32_T)
11179 if (bed->s->elfclass == ELFCLASS32)
11180 {
11181 prstatus32_t prstat;
11182
11183 memset (&prstat, 0, sizeof (prstat));
11184 prstat.pr_pid = pid;
11185 prstat.pr_cursig = cursig;
11186 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11187 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11188 NT_PRSTATUS, &prstat, sizeof (prstat));
11189 }
11190 else
11191 #endif
11192 {
11193 prstatus_t prstat;
11194
11195 memset (&prstat, 0, sizeof (prstat));
11196 prstat.pr_pid = pid;
11197 prstat.pr_cursig = cursig;
11198 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11199 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11200 NT_PRSTATUS, &prstat, sizeof (prstat));
11201 }
11202 #endif /* HAVE_PRSTATUS_T */
11203
11204 free (buf);
11205 return NULL;
11206 }
11207
11208 #if defined (HAVE_LWPSTATUS_T)
11209 char *
11210 elfcore_write_lwpstatus (bfd *abfd,
11211 char *buf,
11212 int *bufsiz,
11213 long pid,
11214 int cursig,
11215 const void *gregs)
11216 {
11217 lwpstatus_t lwpstat;
11218 const char *note_name = "CORE";
11219
11220 memset (&lwpstat, 0, sizeof (lwpstat));
11221 lwpstat.pr_lwpid = pid >> 16;
11222 lwpstat.pr_cursig = cursig;
11223 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11224 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11225 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11226 #if !defined(gregs)
11227 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11228 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11229 #else
11230 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11231 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11232 #endif
11233 #endif
11234 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11235 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11236 }
11237 #endif /* HAVE_LWPSTATUS_T */
11238
11239 #if defined (HAVE_PSTATUS_T)
11240 char *
11241 elfcore_write_pstatus (bfd *abfd,
11242 char *buf,
11243 int *bufsiz,
11244 long pid,
11245 int cursig ATTRIBUTE_UNUSED,
11246 const void *gregs ATTRIBUTE_UNUSED)
11247 {
11248 const char *note_name = "CORE";
11249 #if defined (HAVE_PSTATUS32_T)
11250 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11251
11252 if (bed->s->elfclass == ELFCLASS32)
11253 {
11254 pstatus32_t pstat;
11255
11256 memset (&pstat, 0, sizeof (pstat));
11257 pstat.pr_pid = pid & 0xffff;
11258 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11259 NT_PSTATUS, &pstat, sizeof (pstat));
11260 return buf;
11261 }
11262 else
11263 #endif
11264 {
11265 pstatus_t pstat;
11266
11267 memset (&pstat, 0, sizeof (pstat));
11268 pstat.pr_pid = pid & 0xffff;
11269 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11270 NT_PSTATUS, &pstat, sizeof (pstat));
11271 return buf;
11272 }
11273 }
11274 #endif /* HAVE_PSTATUS_T */
11275
11276 char *
11277 elfcore_write_prfpreg (bfd *abfd,
11278 char *buf,
11279 int *bufsiz,
11280 const void *fpregs,
11281 int size)
11282 {
11283 const char *note_name = "CORE";
11284 return elfcore_write_note (abfd, buf, bufsiz,
11285 note_name, NT_FPREGSET, fpregs, size);
11286 }
11287
11288 char *
11289 elfcore_write_prxfpreg (bfd *abfd,
11290 char *buf,
11291 int *bufsiz,
11292 const void *xfpregs,
11293 int size)
11294 {
11295 char *note_name = "LINUX";
11296 return elfcore_write_note (abfd, buf, bufsiz,
11297 note_name, NT_PRXFPREG, xfpregs, size);
11298 }
11299
11300 char *
11301 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11302 const void *xfpregs, int size)
11303 {
11304 char *note_name;
11305 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11306 note_name = "FreeBSD";
11307 else
11308 note_name = "LINUX";
11309 return elfcore_write_note (abfd, buf, bufsiz,
11310 note_name, NT_X86_XSTATE, xfpregs, size);
11311 }
11312
11313 char *
11314 elfcore_write_ppc_vmx (bfd *abfd,
11315 char *buf,
11316 int *bufsiz,
11317 const void *ppc_vmx,
11318 int size)
11319 {
11320 char *note_name = "LINUX";
11321 return elfcore_write_note (abfd, buf, bufsiz,
11322 note_name, NT_PPC_VMX, ppc_vmx, size);
11323 }
11324
11325 char *
11326 elfcore_write_ppc_vsx (bfd *abfd,
11327 char *buf,
11328 int *bufsiz,
11329 const void *ppc_vsx,
11330 int size)
11331 {
11332 char *note_name = "LINUX";
11333 return elfcore_write_note (abfd, buf, bufsiz,
11334 note_name, NT_PPC_VSX, ppc_vsx, size);
11335 }
11336
11337 char *
11338 elfcore_write_ppc_tar (bfd *abfd,
11339 char *buf,
11340 int *bufsiz,
11341 const void *ppc_tar,
11342 int size)
11343 {
11344 char *note_name = "LINUX";
11345 return elfcore_write_note (abfd, buf, bufsiz,
11346 note_name, NT_PPC_TAR, ppc_tar, size);
11347 }
11348
11349 char *
11350 elfcore_write_ppc_ppr (bfd *abfd,
11351 char *buf,
11352 int *bufsiz,
11353 const void *ppc_ppr,
11354 int size)
11355 {
11356 char *note_name = "LINUX";
11357 return elfcore_write_note (abfd, buf, bufsiz,
11358 note_name, NT_PPC_PPR, ppc_ppr, size);
11359 }
11360
11361 char *
11362 elfcore_write_ppc_dscr (bfd *abfd,
11363 char *buf,
11364 int *bufsiz,
11365 const void *ppc_dscr,
11366 int size)
11367 {
11368 char *note_name = "LINUX";
11369 return elfcore_write_note (abfd, buf, bufsiz,
11370 note_name, NT_PPC_DSCR, ppc_dscr, size);
11371 }
11372
11373 char *
11374 elfcore_write_ppc_ebb (bfd *abfd,
11375 char *buf,
11376 int *bufsiz,
11377 const void *ppc_ebb,
11378 int size)
11379 {
11380 char *note_name = "LINUX";
11381 return elfcore_write_note (abfd, buf, bufsiz,
11382 note_name, NT_PPC_EBB, ppc_ebb, size);
11383 }
11384
11385 char *
11386 elfcore_write_ppc_pmu (bfd *abfd,
11387 char *buf,
11388 int *bufsiz,
11389 const void *ppc_pmu,
11390 int size)
11391 {
11392 char *note_name = "LINUX";
11393 return elfcore_write_note (abfd, buf, bufsiz,
11394 note_name, NT_PPC_PMU, ppc_pmu, size);
11395 }
11396
11397 char *
11398 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11399 char *buf,
11400 int *bufsiz,
11401 const void *ppc_tm_cgpr,
11402 int size)
11403 {
11404 char *note_name = "LINUX";
11405 return elfcore_write_note (abfd, buf, bufsiz,
11406 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11407 }
11408
11409 char *
11410 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11411 char *buf,
11412 int *bufsiz,
11413 const void *ppc_tm_cfpr,
11414 int size)
11415 {
11416 char *note_name = "LINUX";
11417 return elfcore_write_note (abfd, buf, bufsiz,
11418 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11419 }
11420
11421 char *
11422 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11423 char *buf,
11424 int *bufsiz,
11425 const void *ppc_tm_cvmx,
11426 int size)
11427 {
11428 char *note_name = "LINUX";
11429 return elfcore_write_note (abfd, buf, bufsiz,
11430 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11431 }
11432
11433 char *
11434 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11435 char *buf,
11436 int *bufsiz,
11437 const void *ppc_tm_cvsx,
11438 int size)
11439 {
11440 char *note_name = "LINUX";
11441 return elfcore_write_note (abfd, buf, bufsiz,
11442 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11443 }
11444
11445 char *
11446 elfcore_write_ppc_tm_spr (bfd *abfd,
11447 char *buf,
11448 int *bufsiz,
11449 const void *ppc_tm_spr,
11450 int size)
11451 {
11452 char *note_name = "LINUX";
11453 return elfcore_write_note (abfd, buf, bufsiz,
11454 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11455 }
11456
11457 char *
11458 elfcore_write_ppc_tm_ctar (bfd *abfd,
11459 char *buf,
11460 int *bufsiz,
11461 const void *ppc_tm_ctar,
11462 int size)
11463 {
11464 char *note_name = "LINUX";
11465 return elfcore_write_note (abfd, buf, bufsiz,
11466 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11467 }
11468
11469 char *
11470 elfcore_write_ppc_tm_cppr (bfd *abfd,
11471 char *buf,
11472 int *bufsiz,
11473 const void *ppc_tm_cppr,
11474 int size)
11475 {
11476 char *note_name = "LINUX";
11477 return elfcore_write_note (abfd, buf, bufsiz,
11478 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11479 }
11480
11481 char *
11482 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11483 char *buf,
11484 int *bufsiz,
11485 const void *ppc_tm_cdscr,
11486 int size)
11487 {
11488 char *note_name = "LINUX";
11489 return elfcore_write_note (abfd, buf, bufsiz,
11490 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11491 }
11492
11493 static char *
11494 elfcore_write_s390_high_gprs (bfd *abfd,
11495 char *buf,
11496 int *bufsiz,
11497 const void *s390_high_gprs,
11498 int size)
11499 {
11500 char *note_name = "LINUX";
11501 return elfcore_write_note (abfd, buf, bufsiz,
11502 note_name, NT_S390_HIGH_GPRS,
11503 s390_high_gprs, size);
11504 }
11505
11506 char *
11507 elfcore_write_s390_timer (bfd *abfd,
11508 char *buf,
11509 int *bufsiz,
11510 const void *s390_timer,
11511 int size)
11512 {
11513 char *note_name = "LINUX";
11514 return elfcore_write_note (abfd, buf, bufsiz,
11515 note_name, NT_S390_TIMER, s390_timer, size);
11516 }
11517
11518 char *
11519 elfcore_write_s390_todcmp (bfd *abfd,
11520 char *buf,
11521 int *bufsiz,
11522 const void *s390_todcmp,
11523 int size)
11524 {
11525 char *note_name = "LINUX";
11526 return elfcore_write_note (abfd, buf, bufsiz,
11527 note_name, NT_S390_TODCMP, s390_todcmp, size);
11528 }
11529
11530 char *
11531 elfcore_write_s390_todpreg (bfd *abfd,
11532 char *buf,
11533 int *bufsiz,
11534 const void *s390_todpreg,
11535 int size)
11536 {
11537 char *note_name = "LINUX";
11538 return elfcore_write_note (abfd, buf, bufsiz,
11539 note_name, NT_S390_TODPREG, s390_todpreg, size);
11540 }
11541
11542 char *
11543 elfcore_write_s390_ctrs (bfd *abfd,
11544 char *buf,
11545 int *bufsiz,
11546 const void *s390_ctrs,
11547 int size)
11548 {
11549 char *note_name = "LINUX";
11550 return elfcore_write_note (abfd, buf, bufsiz,
11551 note_name, NT_S390_CTRS, s390_ctrs, size);
11552 }
11553
11554 char *
11555 elfcore_write_s390_prefix (bfd *abfd,
11556 char *buf,
11557 int *bufsiz,
11558 const void *s390_prefix,
11559 int size)
11560 {
11561 char *note_name = "LINUX";
11562 return elfcore_write_note (abfd, buf, bufsiz,
11563 note_name, NT_S390_PREFIX, s390_prefix, size);
11564 }
11565
11566 char *
11567 elfcore_write_s390_last_break (bfd *abfd,
11568 char *buf,
11569 int *bufsiz,
11570 const void *s390_last_break,
11571 int size)
11572 {
11573 char *note_name = "LINUX";
11574 return elfcore_write_note (abfd, buf, bufsiz,
11575 note_name, NT_S390_LAST_BREAK,
11576 s390_last_break, size);
11577 }
11578
11579 char *
11580 elfcore_write_s390_system_call (bfd *abfd,
11581 char *buf,
11582 int *bufsiz,
11583 const void *s390_system_call,
11584 int size)
11585 {
11586 char *note_name = "LINUX";
11587 return elfcore_write_note (abfd, buf, bufsiz,
11588 note_name, NT_S390_SYSTEM_CALL,
11589 s390_system_call, size);
11590 }
11591
11592 char *
11593 elfcore_write_s390_tdb (bfd *abfd,
11594 char *buf,
11595 int *bufsiz,
11596 const void *s390_tdb,
11597 int size)
11598 {
11599 char *note_name = "LINUX";
11600 return elfcore_write_note (abfd, buf, bufsiz,
11601 note_name, NT_S390_TDB, s390_tdb, size);
11602 }
11603
11604 char *
11605 elfcore_write_s390_vxrs_low (bfd *abfd,
11606 char *buf,
11607 int *bufsiz,
11608 const void *s390_vxrs_low,
11609 int size)
11610 {
11611 char *note_name = "LINUX";
11612 return elfcore_write_note (abfd, buf, bufsiz,
11613 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11614 }
11615
11616 char *
11617 elfcore_write_s390_vxrs_high (bfd *abfd,
11618 char *buf,
11619 int *bufsiz,
11620 const void *s390_vxrs_high,
11621 int size)
11622 {
11623 char *note_name = "LINUX";
11624 return elfcore_write_note (abfd, buf, bufsiz,
11625 note_name, NT_S390_VXRS_HIGH,
11626 s390_vxrs_high, size);
11627 }
11628
11629 char *
11630 elfcore_write_s390_gs_cb (bfd *abfd,
11631 char *buf,
11632 int *bufsiz,
11633 const void *s390_gs_cb,
11634 int size)
11635 {
11636 char *note_name = "LINUX";
11637 return elfcore_write_note (abfd, buf, bufsiz,
11638 note_name, NT_S390_GS_CB,
11639 s390_gs_cb, size);
11640 }
11641
11642 char *
11643 elfcore_write_s390_gs_bc (bfd *abfd,
11644 char *buf,
11645 int *bufsiz,
11646 const void *s390_gs_bc,
11647 int size)
11648 {
11649 char *note_name = "LINUX";
11650 return elfcore_write_note (abfd, buf, bufsiz,
11651 note_name, NT_S390_GS_BC,
11652 s390_gs_bc, size);
11653 }
11654
11655 char *
11656 elfcore_write_arm_vfp (bfd *abfd,
11657 char *buf,
11658 int *bufsiz,
11659 const void *arm_vfp,
11660 int size)
11661 {
11662 char *note_name = "LINUX";
11663 return elfcore_write_note (abfd, buf, bufsiz,
11664 note_name, NT_ARM_VFP, arm_vfp, size);
11665 }
11666
11667 char *
11668 elfcore_write_aarch_tls (bfd *abfd,
11669 char *buf,
11670 int *bufsiz,
11671 const void *aarch_tls,
11672 int size)
11673 {
11674 char *note_name = "LINUX";
11675 return elfcore_write_note (abfd, buf, bufsiz,
11676 note_name, NT_ARM_TLS, aarch_tls, size);
11677 }
11678
11679 char *
11680 elfcore_write_aarch_hw_break (bfd *abfd,
11681 char *buf,
11682 int *bufsiz,
11683 const void *aarch_hw_break,
11684 int size)
11685 {
11686 char *note_name = "LINUX";
11687 return elfcore_write_note (abfd, buf, bufsiz,
11688 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11689 }
11690
11691 char *
11692 elfcore_write_aarch_hw_watch (bfd *abfd,
11693 char *buf,
11694 int *bufsiz,
11695 const void *aarch_hw_watch,
11696 int size)
11697 {
11698 char *note_name = "LINUX";
11699 return elfcore_write_note (abfd, buf, bufsiz,
11700 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11701 }
11702
11703 char *
11704 elfcore_write_aarch_sve (bfd *abfd,
11705 char *buf,
11706 int *bufsiz,
11707 const void *aarch_sve,
11708 int size)
11709 {
11710 char *note_name = "LINUX";
11711 return elfcore_write_note (abfd, buf, bufsiz,
11712 note_name, NT_ARM_SVE, aarch_sve, size);
11713 }
11714
11715 char *
11716 elfcore_write_aarch_pauth (bfd *abfd,
11717 char *buf,
11718 int *bufsiz,
11719 const void *aarch_pauth,
11720 int size)
11721 {
11722 char *note_name = "LINUX";
11723 return elfcore_write_note (abfd, buf, bufsiz,
11724 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11725 }
11726
11727 char *
11728 elfcore_write_register_note (bfd *abfd,
11729 char *buf,
11730 int *bufsiz,
11731 const char *section,
11732 const void *data,
11733 int size)
11734 {
11735 if (strcmp (section, ".reg2") == 0)
11736 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11737 if (strcmp (section, ".reg-xfp") == 0)
11738 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11739 if (strcmp (section, ".reg-xstate") == 0)
11740 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11741 if (strcmp (section, ".reg-ppc-vmx") == 0)
11742 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11743 if (strcmp (section, ".reg-ppc-vsx") == 0)
11744 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11745 if (strcmp (section, ".reg-ppc-tar") == 0)
11746 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11747 if (strcmp (section, ".reg-ppc-ppr") == 0)
11748 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11749 if (strcmp (section, ".reg-ppc-dscr") == 0)
11750 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11751 if (strcmp (section, ".reg-ppc-ebb") == 0)
11752 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11753 if (strcmp (section, ".reg-ppc-pmu") == 0)
11754 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11755 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11756 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11757 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11758 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11759 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11760 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11761 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11762 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11763 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11764 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11765 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11766 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11767 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11768 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11769 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11770 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11771 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11772 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11773 if (strcmp (section, ".reg-s390-timer") == 0)
11774 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11775 if (strcmp (section, ".reg-s390-todcmp") == 0)
11776 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11777 if (strcmp (section, ".reg-s390-todpreg") == 0)
11778 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11779 if (strcmp (section, ".reg-s390-ctrs") == 0)
11780 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11781 if (strcmp (section, ".reg-s390-prefix") == 0)
11782 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11783 if (strcmp (section, ".reg-s390-last-break") == 0)
11784 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11785 if (strcmp (section, ".reg-s390-system-call") == 0)
11786 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11787 if (strcmp (section, ".reg-s390-tdb") == 0)
11788 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11789 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11790 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11791 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11792 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11793 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11794 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11795 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11796 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11797 if (strcmp (section, ".reg-arm-vfp") == 0)
11798 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11799 if (strcmp (section, ".reg-aarch-tls") == 0)
11800 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11801 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11802 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11803 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11804 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11805 if (strcmp (section, ".reg-aarch-sve") == 0)
11806 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11807 if (strcmp (section, ".reg-aarch-pauth") == 0)
11808 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11809 return NULL;
11810 }
11811
11812 static bfd_boolean
11813 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11814 size_t align)
11815 {
11816 char *p;
11817
11818 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11819 gABI specifies that PT_NOTE alignment should be aligned to 4
11820 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11821 align is less than 4, we use 4 byte alignment. */
11822 if (align < 4)
11823 align = 4;
11824 if (align != 4 && align != 8)
11825 return FALSE;
11826
11827 p = buf;
11828 while (p < buf + size)
11829 {
11830 Elf_External_Note *xnp = (Elf_External_Note *) p;
11831 Elf_Internal_Note in;
11832
11833 if (offsetof (Elf_External_Note, name) > buf - p + size)
11834 return FALSE;
11835
11836 in.type = H_GET_32 (abfd, xnp->type);
11837
11838 in.namesz = H_GET_32 (abfd, xnp->namesz);
11839 in.namedata = xnp->name;
11840 if (in.namesz > buf - in.namedata + size)
11841 return FALSE;
11842
11843 in.descsz = H_GET_32 (abfd, xnp->descsz);
11844 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
11845 in.descpos = offset + (in.descdata - buf);
11846 if (in.descsz != 0
11847 && (in.descdata >= buf + size
11848 || in.descsz > buf - in.descdata + size))
11849 return FALSE;
11850
11851 switch (bfd_get_format (abfd))
11852 {
11853 default:
11854 return TRUE;
11855
11856 case bfd_core:
11857 {
11858 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
11859 struct
11860 {
11861 const char * string;
11862 size_t len;
11863 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
11864 }
11865 grokers[] =
11866 {
11867 GROKER_ELEMENT ("", elfcore_grok_note),
11868 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
11869 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11870 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11871 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
11872 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11873 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
11874 };
11875 #undef GROKER_ELEMENT
11876 int i;
11877
11878 for (i = ARRAY_SIZE (grokers); i--;)
11879 {
11880 if (in.namesz >= grokers[i].len
11881 && strncmp (in.namedata, grokers[i].string,
11882 grokers[i].len) == 0)
11883 {
11884 if (! grokers[i].func (abfd, & in))
11885 return FALSE;
11886 break;
11887 }
11888 }
11889 break;
11890 }
11891
11892 case bfd_object:
11893 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11894 {
11895 if (! elfobj_grok_gnu_note (abfd, &in))
11896 return FALSE;
11897 }
11898 else if (in.namesz == sizeof "stapsdt"
11899 && strcmp (in.namedata, "stapsdt") == 0)
11900 {
11901 if (! elfobj_grok_stapsdt_note (abfd, &in))
11902 return FALSE;
11903 }
11904 break;
11905 }
11906
11907 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
11908 }
11909
11910 return TRUE;
11911 }
11912
11913 bfd_boolean
11914 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11915 size_t align)
11916 {
11917 char *buf;
11918
11919 if (size == 0 || (size + 1) == 0)
11920 return TRUE;
11921
11922 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11923 return FALSE;
11924
11925 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
11926 if (buf == NULL)
11927 return FALSE;
11928
11929 /* PR 17512: file: ec08f814
11930 0-termintate the buffer so that string searches will not overflow. */
11931 buf[size] = 0;
11932
11933 if (!elf_parse_notes (abfd, buf, size, offset, align))
11934 {
11935 free (buf);
11936 return FALSE;
11937 }
11938
11939 free (buf);
11940 return TRUE;
11941 }
11942 \f
11943 /* Providing external access to the ELF program header table. */
11944
11945 /* Return an upper bound on the number of bytes required to store a
11946 copy of ABFD's program header table entries. Return -1 if an error
11947 occurs; bfd_get_error will return an appropriate code. */
11948
11949 long
11950 bfd_get_elf_phdr_upper_bound (bfd *abfd)
11951 {
11952 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11953 {
11954 bfd_set_error (bfd_error_wrong_format);
11955 return -1;
11956 }
11957
11958 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
11959 }
11960
11961 /* Copy ABFD's program header table entries to *PHDRS. The entries
11962 will be stored as an array of Elf_Internal_Phdr structures, as
11963 defined in include/elf/internal.h. To find out how large the
11964 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11965
11966 Return the number of program header table entries read, or -1 if an
11967 error occurs; bfd_get_error will return an appropriate code. */
11968
11969 int
11970 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
11971 {
11972 int num_phdrs;
11973
11974 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11975 {
11976 bfd_set_error (bfd_error_wrong_format);
11977 return -1;
11978 }
11979
11980 num_phdrs = elf_elfheader (abfd)->e_phnum;
11981 if (num_phdrs != 0)
11982 memcpy (phdrs, elf_tdata (abfd)->phdr,
11983 num_phdrs * sizeof (Elf_Internal_Phdr));
11984
11985 return num_phdrs;
11986 }
11987
11988 enum elf_reloc_type_class
11989 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11990 const asection *rel_sec ATTRIBUTE_UNUSED,
11991 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
11992 {
11993 return reloc_class_normal;
11994 }
11995
11996 /* For RELA architectures, return the relocation value for a
11997 relocation against a local symbol. */
11998
11999 bfd_vma
12000 _bfd_elf_rela_local_sym (bfd *abfd,
12001 Elf_Internal_Sym *sym,
12002 asection **psec,
12003 Elf_Internal_Rela *rel)
12004 {
12005 asection *sec = *psec;
12006 bfd_vma relocation;
12007
12008 relocation = (sec->output_section->vma
12009 + sec->output_offset
12010 + sym->st_value);
12011 if ((sec->flags & SEC_MERGE)
12012 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12013 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12014 {
12015 rel->r_addend =
12016 _bfd_merged_section_offset (abfd, psec,
12017 elf_section_data (sec)->sec_info,
12018 sym->st_value + rel->r_addend);
12019 if (sec != *psec)
12020 {
12021 /* If we have changed the section, and our original section is
12022 marked with SEC_EXCLUDE, it means that the original
12023 SEC_MERGE section has been completely subsumed in some
12024 other SEC_MERGE section. In this case, we need to leave
12025 some info around for --emit-relocs. */
12026 if ((sec->flags & SEC_EXCLUDE) != 0)
12027 sec->kept_section = *psec;
12028 sec = *psec;
12029 }
12030 rel->r_addend -= relocation;
12031 rel->r_addend += sec->output_section->vma + sec->output_offset;
12032 }
12033 return relocation;
12034 }
12035
12036 bfd_vma
12037 _bfd_elf_rel_local_sym (bfd *abfd,
12038 Elf_Internal_Sym *sym,
12039 asection **psec,
12040 bfd_vma addend)
12041 {
12042 asection *sec = *psec;
12043
12044 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12045 return sym->st_value + addend;
12046
12047 return _bfd_merged_section_offset (abfd, psec,
12048 elf_section_data (sec)->sec_info,
12049 sym->st_value + addend);
12050 }
12051
12052 /* Adjust an address within a section. Given OFFSET within SEC, return
12053 the new offset within the section, based upon changes made to the
12054 section. Returns -1 if the offset is now invalid.
12055 The offset (in abnd out) is in target sized bytes, however big a
12056 byte may be. */
12057
12058 bfd_vma
12059 _bfd_elf_section_offset (bfd *abfd,
12060 struct bfd_link_info *info,
12061 asection *sec,
12062 bfd_vma offset)
12063 {
12064 switch (sec->sec_info_type)
12065 {
12066 case SEC_INFO_TYPE_STABS:
12067 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12068 offset);
12069 case SEC_INFO_TYPE_EH_FRAME:
12070 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12071
12072 default:
12073 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12074 {
12075 /* Reverse the offset. */
12076 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12077 bfd_size_type address_size = bed->s->arch_size / 8;
12078
12079 /* address_size and sec->size are in octets. Convert
12080 to bytes before subtracting the original offset. */
12081 offset = ((sec->size - address_size)
12082 / bfd_octets_per_byte (abfd, sec) - offset);
12083 }
12084 return offset;
12085 }
12086 }
12087 \f
12088 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12089 reconstruct an ELF file by reading the segments out of remote memory
12090 based on the ELF file header at EHDR_VMA and the ELF program headers it
12091 points to. If not null, *LOADBASEP is filled in with the difference
12092 between the VMAs from which the segments were read, and the VMAs the
12093 file headers (and hence BFD's idea of each section's VMA) put them at.
12094
12095 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12096 remote memory at target address VMA into the local buffer at MYADDR; it
12097 should return zero on success or an `errno' code on failure. TEMPL must
12098 be a BFD for an ELF target with the word size and byte order found in
12099 the remote memory. */
12100
12101 bfd *
12102 bfd_elf_bfd_from_remote_memory
12103 (bfd *templ,
12104 bfd_vma ehdr_vma,
12105 bfd_size_type size,
12106 bfd_vma *loadbasep,
12107 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12108 {
12109 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12110 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12111 }
12112 \f
12113 long
12114 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12115 long symcount ATTRIBUTE_UNUSED,
12116 asymbol **syms ATTRIBUTE_UNUSED,
12117 long dynsymcount,
12118 asymbol **dynsyms,
12119 asymbol **ret)
12120 {
12121 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12122 asection *relplt;
12123 asymbol *s;
12124 const char *relplt_name;
12125 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12126 arelent *p;
12127 long count, i, n;
12128 size_t size;
12129 Elf_Internal_Shdr *hdr;
12130 char *names;
12131 asection *plt;
12132
12133 *ret = NULL;
12134
12135 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12136 return 0;
12137
12138 if (dynsymcount <= 0)
12139 return 0;
12140
12141 if (!bed->plt_sym_val)
12142 return 0;
12143
12144 relplt_name = bed->relplt_name;
12145 if (relplt_name == NULL)
12146 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12147 relplt = bfd_get_section_by_name (abfd, relplt_name);
12148 if (relplt == NULL)
12149 return 0;
12150
12151 hdr = &elf_section_data (relplt)->this_hdr;
12152 if (hdr->sh_link != elf_dynsymtab (abfd)
12153 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12154 return 0;
12155
12156 plt = bfd_get_section_by_name (abfd, ".plt");
12157 if (plt == NULL)
12158 return 0;
12159
12160 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12161 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12162 return -1;
12163
12164 count = relplt->size / hdr->sh_entsize;
12165 size = count * sizeof (asymbol);
12166 p = relplt->relocation;
12167 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12168 {
12169 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12170 if (p->addend != 0)
12171 {
12172 #ifdef BFD64
12173 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12174 #else
12175 size += sizeof ("+0x") - 1 + 8;
12176 #endif
12177 }
12178 }
12179
12180 s = *ret = (asymbol *) bfd_malloc (size);
12181 if (s == NULL)
12182 return -1;
12183
12184 names = (char *) (s + count);
12185 p = relplt->relocation;
12186 n = 0;
12187 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12188 {
12189 size_t len;
12190 bfd_vma addr;
12191
12192 addr = bed->plt_sym_val (i, plt, p);
12193 if (addr == (bfd_vma) -1)
12194 continue;
12195
12196 *s = **p->sym_ptr_ptr;
12197 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12198 we are defining a symbol, ensure one of them is set. */
12199 if ((s->flags & BSF_LOCAL) == 0)
12200 s->flags |= BSF_GLOBAL;
12201 s->flags |= BSF_SYNTHETIC;
12202 s->section = plt;
12203 s->value = addr - plt->vma;
12204 s->name = names;
12205 s->udata.p = NULL;
12206 len = strlen ((*p->sym_ptr_ptr)->name);
12207 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12208 names += len;
12209 if (p->addend != 0)
12210 {
12211 char buf[30], *a;
12212
12213 memcpy (names, "+0x", sizeof ("+0x") - 1);
12214 names += sizeof ("+0x") - 1;
12215 bfd_sprintf_vma (abfd, buf, p->addend);
12216 for (a = buf; *a == '0'; ++a)
12217 ;
12218 len = strlen (a);
12219 memcpy (names, a, len);
12220 names += len;
12221 }
12222 memcpy (names, "@plt", sizeof ("@plt"));
12223 names += sizeof ("@plt");
12224 ++s, ++n;
12225 }
12226
12227 return n;
12228 }
12229
12230 /* It is only used by x86-64 so far.
12231 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12232 but current usage would allow all of _bfd_std_section to be zero. */
12233 static const asymbol lcomm_sym
12234 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12235 asection _bfd_elf_large_com_section
12236 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12237 "LARGE_COMMON", 0, SEC_IS_COMMON);
12238
12239 bfd_boolean
12240 _bfd_elf_final_write_processing (bfd *abfd)
12241 {
12242 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12243
12244 i_ehdrp = elf_elfheader (abfd);
12245
12246 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12247 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12248
12249 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12250 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12251 STB_GNU_UNIQUE binding. */
12252 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12253 {
12254 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12255 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12256 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12257 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12258 {
12259 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12260 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12261 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12262 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12263 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12264 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12265 bfd_set_error (bfd_error_sorry);
12266 return FALSE;
12267 }
12268 }
12269 return TRUE;
12270 }
12271
12272
12273 /* Return TRUE for ELF symbol types that represent functions.
12274 This is the default version of this function, which is sufficient for
12275 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12276
12277 bfd_boolean
12278 _bfd_elf_is_function_type (unsigned int type)
12279 {
12280 return (type == STT_FUNC
12281 || type == STT_GNU_IFUNC);
12282 }
12283
12284 /* If the ELF symbol SYM might be a function in SEC, return the
12285 function size and set *CODE_OFF to the function's entry point,
12286 otherwise return zero. */
12287
12288 bfd_size_type
12289 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12290 bfd_vma *code_off)
12291 {
12292 bfd_size_type size;
12293
12294 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12295 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12296 || sym->section != sec)
12297 return 0;
12298
12299 *code_off = sym->value;
12300 size = 0;
12301 if (!(sym->flags & BSF_SYNTHETIC))
12302 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12303 if (size == 0)
12304 size = 1;
12305 return size;
12306 }
This page took 0.597395 seconds and 4 git commands to generate.