c4d6718aaa0ea540d4b4724008f4faa6ae4d6250
[deliverable/binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
55 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
56 file_ptr offset, size_t align);
57
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62 /* Swap in a Verdef structure. */
63
64 void
65 _bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
68 {
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
76 }
77
78 /* Swap out a Verdef structure. */
79
80 void
81 _bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
84 {
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
92 }
93
94 /* Swap in a Verdaux structure. */
95
96 void
97 _bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
100 {
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
103 }
104
105 /* Swap out a Verdaux structure. */
106
107 void
108 _bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
111 {
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
114 }
115
116 /* Swap in a Verneed structure. */
117
118 void
119 _bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
122 {
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
128 }
129
130 /* Swap out a Verneed structure. */
131
132 void
133 _bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
136 {
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
142 }
143
144 /* Swap in a Vernaux structure. */
145
146 void
147 _bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
150 {
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
156 }
157
158 /* Swap out a Vernaux structure. */
159
160 void
161 _bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
164 {
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
170 }
171
172 /* Swap in a Versym structure. */
173
174 void
175 _bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
178 {
179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
180 }
181
182 /* Swap out a Versym structure. */
183
184 void
185 _bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
188 {
189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
190 }
191
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
194
195 unsigned long
196 bfd_elf_hash (const char *namearg)
197 {
198 const unsigned char *name = (const unsigned char *) namearg;
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
214 return h & 0xffffffff;
215 }
216
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220 unsigned long
221 bfd_elf_gnu_hash (const char *namearg)
222 {
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230 }
231
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
234 bfd_boolean
235 bfd_elf_allocate_object (bfd *abfd,
236 size_t object_size,
237 enum elf_target_id object_id)
238 {
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
243
244 elf_object_id (abfd) = object_id;
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
253 return TRUE;
254 }
255
256
257 bfd_boolean
258 bfd_elf_make_object (bfd *abfd)
259 {
260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
262 bed->target_id);
263 }
264
265 bfd_boolean
266 bfd_elf_mkcorefile (bfd *abfd)
267 {
268 /* I think this can be done just like an object file. */
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
273 }
274
275 char *
276 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
277 {
278 Elf_Internal_Shdr **i_shdrp;
279 bfd_byte *shstrtab = NULL;
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
282
283 i_shdrp = elf_elfsections (abfd);
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
287 return NULL;
288
289 shstrtab = i_shdrp[shindex]->contents;
290 if (shstrtab == NULL)
291 {
292 /* No cached one, attempt to read, and cache what we read. */
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize + 1 <= 1
299 || bfd_seek (abfd, offset, SEEK_SET) != 0
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
310 i_shdrp[shindex]->contents = shstrtab;
311 }
312 return (char *) shstrtab;
313 }
314
315 char *
316 bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
319 {
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
328 hdr = elf_elfsections (abfd)[shindex];
329
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
338 abfd, shindex);
339 return NULL;
340 }
341
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
355
356 if (strindex >= hdr->sh_size)
357 {
358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
359 _bfd_error_handler
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
363 (shindex == shstrndx && strindex == hdr->sh_name
364 ? ".shstrtab"
365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
366 return NULL;
367 }
368
369 return ((char *) hdr->contents) + strindex;
370 }
371
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
379
380 Elf_Internal_Sym *
381 bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
388 {
389 Elf_Internal_Shdr *shndx_hdr;
390 void *alloc_ext;
391 const bfd_byte *esym;
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
394 Elf_Internal_Sym *alloc_intsym;
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
397 const struct elf_backend_data *bed;
398 size_t extsym_size;
399 size_t amt;
400 file_ptr pos;
401
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
442 alloc_intsym = NULL;
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
454 alloc_ext = bfd_malloc (amt);
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
498 intsym_buf = alloc_intsym;
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
506 shndx = extshndx_buf;
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd, (unsigned long) symoffset);
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529 }
530
531 /* Look up a symbol name. */
532 const char *
533 bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
537 {
538 const char *name;
539 unsigned int iname = isym->st_name;
540 unsigned int shindex = symtab_hdr->sh_link;
541
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym->st_shndx < elf_numsections (abfd))
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
554 name = bfd_section_name (sym_sec);
555
556 return name;
557 }
558
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563 typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566 } Elf_Internal_Group;
567
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571 static const char *
572 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 {
574 Elf_Internal_Shdr *hdr;
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
578
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
586 return NULL;
587
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
592 return NULL;
593
594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
595 }
596
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
598
599 static bfd_boolean
600 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 {
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum = elf_numsections (abfd);
613 num_group = 0;
614
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
626 num_group += 1;
627 }
628
629 if (num_group == 0)
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
633 elf_tdata (abfd)->group_sect_ptr = NULL;
634 }
635 else
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
639 size_t amt;
640
641 elf_tdata (abfd)->num_group = num_group;
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
646 return FALSE;
647 num_group = 0;
648
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 {
655 unsigned char *src;
656 Elf_Internal_Group *dest;
657
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 {
676 _bfd_error_handler
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
683 continue;
684 }
685
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->shdr = NULL;
703 dest->flags = idx;
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
707 break;
708 }
709 if (idx < shnum)
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
721 {
722 _bfd_error_handler
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
726 }
727 }
728 }
729 }
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
741 _bfd_error_handler
742 (_("%pB: no valid group sections found"), abfd);
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
753
754 for (j = 0; j < num_group; j++)
755 {
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
760 Elf_Internal_Group *idx;
761 bfd_size_type n_elt;
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
777 n_elt = shdr->sh_size / 4;
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
784 asection *s = NULL;
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
794 && elf_next_in_group (s) != NULL)
795 break;
796 if (n_elt != 0)
797 {
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
803 }
804 else
805 {
806 const char *gname;
807
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
810 return FALSE;
811 elf_group_name (newsect) = gname;
812
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect) = newsect;
815 }
816
817 /* If the group section has been created, point to the
818 new member. */
819 if (shdr->bfd_section != NULL)
820 elf_next_in_group (shdr->bfd_section) = newsect;
821
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
824 break;
825 }
826 }
827 }
828
829 if (elf_group_name (newsect) == NULL)
830 {
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
833 abfd, newsect);
834 return FALSE;
835 }
836 return TRUE;
837 }
838
839 bfd_boolean
840 _bfd_elf_setup_sections (bfd *abfd)
841 {
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
860 if (bed->link_order_error_handler)
861 bed->link_order_error_handler
862 /* xgettext:c-format */
863 (_("%pB: warning: sh_link not set for section `%pA'"),
864 abfd, s);
865 }
866 else
867 {
868 asection *linksec = NULL;
869
870 if (elfsec < elf_numsections (abfd))
871 {
872 this_hdr = elf_elfsections (abfd)[elfsec];
873 linksec = this_hdr->bfd_section;
874 }
875
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
879 if (linksec == NULL)
880 {
881 _bfd_error_handler
882 /* xgettext:c-format */
883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
884 s->owner, elfsec, s);
885 result = FALSE;
886 }
887
888 elf_linked_to_section (s) = linksec;
889 }
890 }
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
893 {
894 _bfd_error_handler
895 /* xgettext:c-format */
896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
897 abfd, elf_section_data (s)->this_idx);
898 result = FALSE;
899 }
900 }
901
902 /* Process section groups. */
903 if (num_group == (unsigned) -1)
904 return result;
905
906 for (i = 0; i < num_group; i++)
907 {
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
911
912 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
913 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
914 {
915 _bfd_error_handler
916 /* xgettext:c-format */
917 (_("%pB: section group entry number %u is corrupt"),
918 abfd, i);
919 result = FALSE;
920 continue;
921 }
922
923 idx = (Elf_Internal_Group *) shdr->contents;
924 n_elt = shdr->sh_size / 4;
925
926 while (--n_elt != 0)
927 {
928 ++ idx;
929
930 if (idx->shdr == NULL)
931 continue;
932 else if (idx->shdr->bfd_section)
933 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
934 else if (idx->shdr->sh_type != SHT_RELA
935 && idx->shdr->sh_type != SHT_REL)
936 {
937 /* There are some unknown sections in the group. */
938 _bfd_error_handler
939 /* xgettext:c-format */
940 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
941 abfd,
942 idx->shdr->sh_type,
943 bfd_elf_string_from_elf_section (abfd,
944 (elf_elfheader (abfd)
945 ->e_shstrndx),
946 idx->shdr->sh_name),
947 shdr->bfd_section);
948 result = FALSE;
949 }
950 }
951 }
952
953 return result;
954 }
955
956 bfd_boolean
957 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
958 {
959 return elf_next_in_group (sec) != NULL;
960 }
961
962 const char *
963 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
964 {
965 if (elf_sec_group (sec) != NULL)
966 return elf_group_name (sec);
967 return NULL;
968 }
969
970 static char *
971 convert_debug_to_zdebug (bfd *abfd, const char *name)
972 {
973 unsigned int len = strlen (name);
974 char *new_name = bfd_alloc (abfd, len + 2);
975 if (new_name == NULL)
976 return NULL;
977 new_name[0] = '.';
978 new_name[1] = 'z';
979 memcpy (new_name + 2, name + 1, len);
980 return new_name;
981 }
982
983 static char *
984 convert_zdebug_to_debug (bfd *abfd, const char *name)
985 {
986 unsigned int len = strlen (name);
987 char *new_name = bfd_alloc (abfd, len);
988 if (new_name == NULL)
989 return NULL;
990 new_name[0] = '.';
991 memcpy (new_name + 1, name + 2, len - 1);
992 return new_name;
993 }
994
995 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
996
997 struct lto_section
998 {
999 int16_t major_version;
1000 int16_t minor_version;
1001 unsigned char slim_object;
1002
1003 /* Flags is a private field that is not defined publicly. */
1004 uint16_t flags;
1005 };
1006
1007 /* Make a BFD section from an ELF section. We store a pointer to the
1008 BFD section in the bfd_section field of the header. */
1009
1010 bfd_boolean
1011 _bfd_elf_make_section_from_shdr (bfd *abfd,
1012 Elf_Internal_Shdr *hdr,
1013 const char *name,
1014 int shindex)
1015 {
1016 asection *newsect;
1017 flagword flags;
1018 const struct elf_backend_data *bed;
1019
1020 if (hdr->bfd_section != NULL)
1021 return TRUE;
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
1025 return FALSE;
1026
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
1029 elf_section_data (newsect)->this_idx = shindex;
1030
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
1035 newsect->filepos = hdr->sh_offset;
1036
1037 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1038 || !bfd_set_section_size (newsect, hdr->sh_size)
1039 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1040 return FALSE;
1041
1042 flags = SEC_NO_FLAGS;
1043 if (hdr->sh_type != SHT_NOBITS)
1044 flags |= SEC_HAS_CONTENTS;
1045 if (hdr->sh_type == SHT_GROUP)
1046 flags |= SEC_GROUP;
1047 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1048 {
1049 flags |= SEC_ALLOC;
1050 if (hdr->sh_type != SHT_NOBITS)
1051 flags |= SEC_LOAD;
1052 }
1053 if ((hdr->sh_flags & SHF_WRITE) == 0)
1054 flags |= SEC_READONLY;
1055 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1056 flags |= SEC_CODE;
1057 else if ((flags & SEC_LOAD) != 0)
1058 flags |= SEC_DATA;
1059 if ((hdr->sh_flags & SHF_MERGE) != 0)
1060 {
1061 flags |= SEC_MERGE;
1062 newsect->entsize = hdr->sh_entsize;
1063 }
1064 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1065 flags |= SEC_STRINGS;
1066 if (hdr->sh_flags & SHF_GROUP)
1067 if (!setup_group (abfd, hdr, newsect))
1068 return FALSE;
1069 if ((hdr->sh_flags & SHF_TLS) != 0)
1070 flags |= SEC_THREAD_LOCAL;
1071 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1072 flags |= SEC_EXCLUDE;
1073
1074 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1075 {
1076 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1077 but binutils as of 2019-07-23 did not set the EI_OSABI header
1078 byte. */
1079 case ELFOSABI_NONE:
1080 case ELFOSABI_GNU:
1081 case ELFOSABI_FREEBSD:
1082 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1083 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1084 break;
1085 }
1086
1087 if ((flags & SEC_ALLOC) == 0)
1088 {
1089 /* The debugging sections appear to be recognized only by name,
1090 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1091 if (name [0] == '.')
1092 {
1093 if (strncmp (name, ".debug", 6) == 0
1094 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1095 || strncmp (name, ".zdebug", 7) == 0)
1096 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1097 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1098 || strncmp (name, ".note.gnu", 9) == 0)
1099 flags |= SEC_ELF_OCTETS;
1100 else if (strncmp (name, ".line", 5) == 0
1101 || strncmp (name, ".stab", 5) == 0
1102 || strcmp (name, ".gdb_index") == 0)
1103 flags |= SEC_DEBUGGING;
1104 }
1105 }
1106
1107 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1108 only link a single copy of the section. This is used to support
1109 g++. g++ will emit each template expansion in its own section.
1110 The symbols will be defined as weak, so that multiple definitions
1111 are permitted. The GNU linker extension is to actually discard
1112 all but one of the sections. */
1113 if (CONST_STRNEQ (name, ".gnu.linkonce")
1114 && elf_next_in_group (newsect) == NULL)
1115 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1116
1117 if (!bfd_set_section_flags (newsect, flags))
1118 return FALSE;
1119
1120 bed = get_elf_backend_data (abfd);
1121 if (bed->elf_backend_section_flags)
1122 if (!bed->elf_backend_section_flags (hdr))
1123 return FALSE;
1124
1125 /* We do not parse the PT_NOTE segments as we are interested even in the
1126 separate debug info files which may have the segments offsets corrupted.
1127 PT_NOTEs from the core files are currently not parsed using BFD. */
1128 if (hdr->sh_type == SHT_NOTE)
1129 {
1130 bfd_byte *contents;
1131
1132 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1133 return FALSE;
1134
1135 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1136 hdr->sh_offset, hdr->sh_addralign);
1137 free (contents);
1138 }
1139
1140 if ((newsect->flags & SEC_ALLOC) != 0)
1141 {
1142 Elf_Internal_Phdr *phdr;
1143 unsigned int i, nload;
1144
1145 /* Some ELF linkers produce binaries with all the program header
1146 p_paddr fields zero. If we have such a binary with more than
1147 one PT_LOAD header, then leave the section lma equal to vma
1148 so that we don't create sections with overlapping lma. */
1149 phdr = elf_tdata (abfd)->phdr;
1150 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1151 if (phdr->p_paddr != 0)
1152 break;
1153 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1154 ++nload;
1155 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1156 return TRUE;
1157
1158 phdr = elf_tdata (abfd)->phdr;
1159 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1160 {
1161 if (((phdr->p_type == PT_LOAD
1162 && (hdr->sh_flags & SHF_TLS) == 0)
1163 || phdr->p_type == PT_TLS)
1164 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1165 {
1166 if ((newsect->flags & SEC_LOAD) == 0)
1167 newsect->lma = (phdr->p_paddr
1168 + hdr->sh_addr - phdr->p_vaddr);
1169 else
1170 /* We used to use the same adjustment for SEC_LOAD
1171 sections, but that doesn't work if the segment
1172 is packed with code from multiple VMAs.
1173 Instead we calculate the section LMA based on
1174 the segment LMA. It is assumed that the
1175 segment will contain sections with contiguous
1176 LMAs, even if the VMAs are not. */
1177 newsect->lma = (phdr->p_paddr
1178 + hdr->sh_offset - phdr->p_offset);
1179
1180 /* With contiguous segments, we can't tell from file
1181 offsets whether a section with zero size should
1182 be placed at the end of one segment or the
1183 beginning of the next. Decide based on vaddr. */
1184 if (hdr->sh_addr >= phdr->p_vaddr
1185 && (hdr->sh_addr + hdr->sh_size
1186 <= phdr->p_vaddr + phdr->p_memsz))
1187 break;
1188 }
1189 }
1190 }
1191
1192 /* Compress/decompress DWARF debug sections with names: .debug_* and
1193 .zdebug_*, after the section flags is set. */
1194 if ((newsect->flags & SEC_DEBUGGING)
1195 && ((name[1] == 'd' && name[6] == '_')
1196 || (name[1] == 'z' && name[7] == '_')))
1197 {
1198 enum { nothing, compress, decompress } action = nothing;
1199 int compression_header_size;
1200 bfd_size_type uncompressed_size;
1201 unsigned int uncompressed_align_power;
1202 bfd_boolean compressed
1203 = bfd_is_section_compressed_with_header (abfd, newsect,
1204 &compression_header_size,
1205 &uncompressed_size,
1206 &uncompressed_align_power);
1207 if (compressed)
1208 {
1209 /* Compressed section. Check if we should decompress. */
1210 if ((abfd->flags & BFD_DECOMPRESS))
1211 action = decompress;
1212 }
1213
1214 /* Compress the uncompressed section or convert from/to .zdebug*
1215 section. Check if we should compress. */
1216 if (action == nothing)
1217 {
1218 if (newsect->size != 0
1219 && (abfd->flags & BFD_COMPRESS)
1220 && compression_header_size >= 0
1221 && uncompressed_size > 0
1222 && (!compressed
1223 || ((compression_header_size > 0)
1224 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1225 action = compress;
1226 else
1227 return TRUE;
1228 }
1229
1230 if (action == compress)
1231 {
1232 if (!bfd_init_section_compress_status (abfd, newsect))
1233 {
1234 _bfd_error_handler
1235 /* xgettext:c-format */
1236 (_("%pB: unable to initialize compress status for section %s"),
1237 abfd, name);
1238 return FALSE;
1239 }
1240 }
1241 else
1242 {
1243 if (!bfd_init_section_decompress_status (abfd, newsect))
1244 {
1245 _bfd_error_handler
1246 /* xgettext:c-format */
1247 (_("%pB: unable to initialize decompress status for section %s"),
1248 abfd, name);
1249 return FALSE;
1250 }
1251 }
1252
1253 if (abfd->is_linker_input)
1254 {
1255 if (name[1] == 'z'
1256 && (action == decompress
1257 || (action == compress
1258 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1259 {
1260 /* Convert section name from .zdebug_* to .debug_* so
1261 that linker will consider this section as a debug
1262 section. */
1263 char *new_name = convert_zdebug_to_debug (abfd, name);
1264 if (new_name == NULL)
1265 return FALSE;
1266 bfd_rename_section (newsect, new_name);
1267 }
1268 }
1269 else
1270 /* For objdump, don't rename the section. For objcopy, delay
1271 section rename to elf_fake_sections. */
1272 newsect->flags |= SEC_ELF_RENAME;
1273 }
1274
1275 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1276 section. */
1277 const char *lto_section_name = ".gnu.lto_.lto.";
1278 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1279 {
1280 struct lto_section lsection;
1281 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1282 sizeof (struct lto_section)))
1283 abfd->lto_slim_object = lsection.slim_object;
1284 }
1285
1286 return TRUE;
1287 }
1288
1289 const char *const bfd_elf_section_type_names[] =
1290 {
1291 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1292 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1293 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1294 };
1295
1296 /* ELF relocs are against symbols. If we are producing relocatable
1297 output, and the reloc is against an external symbol, and nothing
1298 has given us any additional addend, the resulting reloc will also
1299 be against the same symbol. In such a case, we don't want to
1300 change anything about the way the reloc is handled, since it will
1301 all be done at final link time. Rather than put special case code
1302 into bfd_perform_relocation, all the reloc types use this howto
1303 function. It just short circuits the reloc if producing
1304 relocatable output against an external symbol. */
1305
1306 bfd_reloc_status_type
1307 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1308 arelent *reloc_entry,
1309 asymbol *symbol,
1310 void *data ATTRIBUTE_UNUSED,
1311 asection *input_section,
1312 bfd *output_bfd,
1313 char **error_message ATTRIBUTE_UNUSED)
1314 {
1315 if (output_bfd != NULL
1316 && (symbol->flags & BSF_SECTION_SYM) == 0
1317 && (! reloc_entry->howto->partial_inplace
1318 || reloc_entry->addend == 0))
1319 {
1320 reloc_entry->address += input_section->output_offset;
1321 return bfd_reloc_ok;
1322 }
1323
1324 return bfd_reloc_continue;
1325 }
1326 \f
1327 /* Returns TRUE if section A matches section B.
1328 Names, addresses and links may be different, but everything else
1329 should be the same. */
1330
1331 static bfd_boolean
1332 section_match (const Elf_Internal_Shdr * a,
1333 const Elf_Internal_Shdr * b)
1334 {
1335 if (a->sh_type != b->sh_type
1336 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1337 || a->sh_addralign != b->sh_addralign
1338 || a->sh_entsize != b->sh_entsize)
1339 return FALSE;
1340 if (a->sh_type == SHT_SYMTAB
1341 || a->sh_type == SHT_STRTAB)
1342 return TRUE;
1343 return a->sh_size == b->sh_size;
1344 }
1345
1346 /* Find a section in OBFD that has the same characteristics
1347 as IHEADER. Return the index of this section or SHN_UNDEF if
1348 none can be found. Check's section HINT first, as this is likely
1349 to be the correct section. */
1350
1351 static unsigned int
1352 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1353 const unsigned int hint)
1354 {
1355 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1356 unsigned int i;
1357
1358 BFD_ASSERT (iheader != NULL);
1359
1360 /* See PR 20922 for a reproducer of the NULL test. */
1361 if (hint < elf_numsections (obfd)
1362 && oheaders[hint] != NULL
1363 && section_match (oheaders[hint], iheader))
1364 return hint;
1365
1366 for (i = 1; i < elf_numsections (obfd); i++)
1367 {
1368 Elf_Internal_Shdr * oheader = oheaders[i];
1369
1370 if (oheader == NULL)
1371 continue;
1372 if (section_match (oheader, iheader))
1373 /* FIXME: Do we care if there is a potential for
1374 multiple matches ? */
1375 return i;
1376 }
1377
1378 return SHN_UNDEF;
1379 }
1380
1381 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1382 Processor specific section, based upon a matching input section.
1383 Returns TRUE upon success, FALSE otherwise. */
1384
1385 static bfd_boolean
1386 copy_special_section_fields (const bfd *ibfd,
1387 bfd *obfd,
1388 const Elf_Internal_Shdr *iheader,
1389 Elf_Internal_Shdr *oheader,
1390 const unsigned int secnum)
1391 {
1392 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bfd_boolean changed = FALSE;
1395 unsigned int sh_link;
1396
1397 if (oheader->sh_type == SHT_NOBITS)
1398 {
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1403
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return TRUE;
1420 }
1421
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields != NULL
1424 && bed->elf_backend_copy_special_section_fields
1425 (ibfd, obfd, iheader, oheader))
1426 return TRUE;
1427
1428 /* We have an iheader which might match oheader, and which has non-zero
1429 sh_info and/or sh_link fields. Attempt to follow those links and find
1430 the section in the output bfd which corresponds to the linked section
1431 in the input bfd. */
1432 if (iheader->sh_link != SHN_UNDEF)
1433 {
1434 /* See PR 20931 for a reproducer. */
1435 if (iheader->sh_link >= elf_numsections (ibfd))
1436 {
1437 _bfd_error_handler
1438 /* xgettext:c-format */
1439 (_("%pB: invalid sh_link field (%d) in section number %d"),
1440 ibfd, iheader->sh_link, secnum);
1441 return FALSE;
1442 }
1443
1444 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1445 if (sh_link != SHN_UNDEF)
1446 {
1447 oheader->sh_link = sh_link;
1448 changed = TRUE;
1449 }
1450 else
1451 /* FIXME: Should we install iheader->sh_link
1452 if we could not find a match ? */
1453 _bfd_error_handler
1454 /* xgettext:c-format */
1455 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1456 }
1457
1458 if (iheader->sh_info)
1459 {
1460 /* The sh_info field can hold arbitrary information, but if the
1461 SHF_LINK_INFO flag is set then it should be interpreted as a
1462 section index. */
1463 if (iheader->sh_flags & SHF_INFO_LINK)
1464 {
1465 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1466 iheader->sh_info);
1467 if (sh_link != SHN_UNDEF)
1468 oheader->sh_flags |= SHF_INFO_LINK;
1469 }
1470 else
1471 /* No idea what it means - just copy it. */
1472 sh_link = iheader->sh_info;
1473
1474 if (sh_link != SHN_UNDEF)
1475 {
1476 oheader->sh_info = sh_link;
1477 changed = TRUE;
1478 }
1479 else
1480 _bfd_error_handler
1481 /* xgettext:c-format */
1482 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1483 }
1484
1485 return changed;
1486 }
1487
1488 /* Copy the program header and other data from one object module to
1489 another. */
1490
1491 bfd_boolean
1492 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1493 {
1494 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
1497 unsigned int i;
1498
1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1501 return TRUE;
1502
1503 if (!elf_flags_init (obfd))
1504 {
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = TRUE;
1507 }
1508
1509 elf_gp (obfd) = elf_gp (ibfd);
1510
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1514
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1519
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1522
1523 if (iheaders == NULL || oheaders == NULL)
1524 return TRUE;
1525
1526 bed = get_elf_backend_data (obfd);
1527
1528 /* Possibly copy other fields in the section header. */
1529 for (i = 1; i < elf_numsections (obfd); i++)
1530 {
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
1533
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1541
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
1547
1548 /* Scan for the matching section in the input bfd.
1549 First we try for a direct mapping between the input and output sections. */
1550 for (j = 1; j < elf_numsections (ibfd); j++)
1551 {
1552 const Elf_Internal_Shdr * iheader = iheaders[j];
1553
1554 if (iheader == NULL)
1555 continue;
1556
1557 if (oheader->bfd_section != NULL
1558 && iheader->bfd_section != NULL
1559 && iheader->bfd_section->output_section != NULL
1560 && iheader->bfd_section->output_section == oheader->bfd_section)
1561 {
1562 /* We have found a connection from the input section to the
1563 output section. Attempt to copy the header fields. If
1564 this fails then do not try any further sections - there
1565 should only be a one-to-one mapping between input and output. */
1566 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1567 j = elf_numsections (ibfd);
1568 break;
1569 }
1570 }
1571
1572 if (j < elf_numsections (ibfd))
1573 continue;
1574
1575 /* That failed. So try to deduce the corresponding input section.
1576 Unfortunately we cannot compare names as the output string table
1577 is empty, so instead we check size, address and type. */
1578 for (j = 1; j < elf_numsections (ibfd); j++)
1579 {
1580 const Elf_Internal_Shdr * iheader = iheaders[j];
1581
1582 if (iheader == NULL)
1583 continue;
1584
1585 /* Try matching fields in the input section's header.
1586 Since --only-keep-debug turns all non-debug sections into
1587 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1588 input type. */
1589 if ((oheader->sh_type == SHT_NOBITS
1590 || iheader->sh_type == oheader->sh_type)
1591 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1592 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1593 && iheader->sh_addralign == oheader->sh_addralign
1594 && iheader->sh_entsize == oheader->sh_entsize
1595 && iheader->sh_size == oheader->sh_size
1596 && iheader->sh_addr == oheader->sh_addr
1597 && (iheader->sh_info != oheader->sh_info
1598 || iheader->sh_link != oheader->sh_link))
1599 {
1600 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1601 break;
1602 }
1603 }
1604
1605 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1606 {
1607 /* Final attempt. Call the backend copy function
1608 with a NULL input section. */
1609 if (bed->elf_backend_copy_special_section_fields != NULL)
1610 bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1611 }
1612 }
1613
1614 return TRUE;
1615 }
1616
1617 static const char *
1618 get_segment_type (unsigned int p_type)
1619 {
1620 const char *pt;
1621 switch (p_type)
1622 {
1623 case PT_NULL: pt = "NULL"; break;
1624 case PT_LOAD: pt = "LOAD"; break;
1625 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1626 case PT_INTERP: pt = "INTERP"; break;
1627 case PT_NOTE: pt = "NOTE"; break;
1628 case PT_SHLIB: pt = "SHLIB"; break;
1629 case PT_PHDR: pt = "PHDR"; break;
1630 case PT_TLS: pt = "TLS"; break;
1631 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1632 case PT_GNU_STACK: pt = "STACK"; break;
1633 case PT_GNU_RELRO: pt = "RELRO"; break;
1634 default: pt = NULL; break;
1635 }
1636 return pt;
1637 }
1638
1639 /* Print out the program headers. */
1640
1641 bfd_boolean
1642 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1643 {
1644 FILE *f = (FILE *) farg;
1645 Elf_Internal_Phdr *p;
1646 asection *s;
1647 bfd_byte *dynbuf = NULL;
1648
1649 p = elf_tdata (abfd)->phdr;
1650 if (p != NULL)
1651 {
1652 unsigned int i, c;
1653
1654 fprintf (f, _("\nProgram Header:\n"));
1655 c = elf_elfheader (abfd)->e_phnum;
1656 for (i = 0; i < c; i++, p++)
1657 {
1658 const char *pt = get_segment_type (p->p_type);
1659 char buf[20];
1660
1661 if (pt == NULL)
1662 {
1663 sprintf (buf, "0x%lx", p->p_type);
1664 pt = buf;
1665 }
1666 fprintf (f, "%8s off 0x", pt);
1667 bfd_fprintf_vma (abfd, f, p->p_offset);
1668 fprintf (f, " vaddr 0x");
1669 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1670 fprintf (f, " paddr 0x");
1671 bfd_fprintf_vma (abfd, f, p->p_paddr);
1672 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1673 fprintf (f, " filesz 0x");
1674 bfd_fprintf_vma (abfd, f, p->p_filesz);
1675 fprintf (f, " memsz 0x");
1676 bfd_fprintf_vma (abfd, f, p->p_memsz);
1677 fprintf (f, " flags %c%c%c",
1678 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1679 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1680 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1681 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1682 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1683 fprintf (f, "\n");
1684 }
1685 }
1686
1687 s = bfd_get_section_by_name (abfd, ".dynamic");
1688 if (s != NULL)
1689 {
1690 unsigned int elfsec;
1691 unsigned long shlink;
1692 bfd_byte *extdyn, *extdynend;
1693 size_t extdynsize;
1694 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1695
1696 fprintf (f, _("\nDynamic Section:\n"));
1697
1698 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1699 goto error_return;
1700
1701 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1702 if (elfsec == SHN_BAD)
1703 goto error_return;
1704 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1705
1706 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1707 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1708
1709 extdyn = dynbuf;
1710 /* PR 17512: file: 6f427532. */
1711 if (s->size < extdynsize)
1712 goto error_return;
1713 extdynend = extdyn + s->size;
1714 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1715 Fix range check. */
1716 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1717 {
1718 Elf_Internal_Dyn dyn;
1719 const char *name = "";
1720 char ab[20];
1721 bfd_boolean stringp;
1722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1723
1724 (*swap_dyn_in) (abfd, extdyn, &dyn);
1725
1726 if (dyn.d_tag == DT_NULL)
1727 break;
1728
1729 stringp = FALSE;
1730 switch (dyn.d_tag)
1731 {
1732 default:
1733 if (bed->elf_backend_get_target_dtag)
1734 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735
1736 if (!strcmp (name, ""))
1737 {
1738 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1739 name = ab;
1740 }
1741 break;
1742
1743 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1744 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1745 case DT_PLTGOT: name = "PLTGOT"; break;
1746 case DT_HASH: name = "HASH"; break;
1747 case DT_STRTAB: name = "STRTAB"; break;
1748 case DT_SYMTAB: name = "SYMTAB"; break;
1749 case DT_RELA: name = "RELA"; break;
1750 case DT_RELASZ: name = "RELASZ"; break;
1751 case DT_RELAENT: name = "RELAENT"; break;
1752 case DT_STRSZ: name = "STRSZ"; break;
1753 case DT_SYMENT: name = "SYMENT"; break;
1754 case DT_INIT: name = "INIT"; break;
1755 case DT_FINI: name = "FINI"; break;
1756 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1757 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1758 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1759 case DT_REL: name = "REL"; break;
1760 case DT_RELSZ: name = "RELSZ"; break;
1761 case DT_RELENT: name = "RELENT"; break;
1762 case DT_PLTREL: name = "PLTREL"; break;
1763 case DT_DEBUG: name = "DEBUG"; break;
1764 case DT_TEXTREL: name = "TEXTREL"; break;
1765 case DT_JMPREL: name = "JMPREL"; break;
1766 case DT_BIND_NOW: name = "BIND_NOW"; break;
1767 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1768 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1769 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1770 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1771 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1772 case DT_FLAGS: name = "FLAGS"; break;
1773 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1774 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1775 case DT_CHECKSUM: name = "CHECKSUM"; break;
1776 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1777 case DT_MOVEENT: name = "MOVEENT"; break;
1778 case DT_MOVESZ: name = "MOVESZ"; break;
1779 case DT_FEATURE: name = "FEATURE"; break;
1780 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1781 case DT_SYMINSZ: name = "SYMINSZ"; break;
1782 case DT_SYMINENT: name = "SYMINENT"; break;
1783 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1784 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1785 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1786 case DT_PLTPAD: name = "PLTPAD"; break;
1787 case DT_MOVETAB: name = "MOVETAB"; break;
1788 case DT_SYMINFO: name = "SYMINFO"; break;
1789 case DT_RELACOUNT: name = "RELACOUNT"; break;
1790 case DT_RELCOUNT: name = "RELCOUNT"; break;
1791 case DT_FLAGS_1: name = "FLAGS_1"; break;
1792 case DT_VERSYM: name = "VERSYM"; break;
1793 case DT_VERDEF: name = "VERDEF"; break;
1794 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1795 case DT_VERNEED: name = "VERNEED"; break;
1796 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1797 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1798 case DT_USED: name = "USED"; break;
1799 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1800 case DT_GNU_HASH: name = "GNU_HASH"; break;
1801 }
1802
1803 fprintf (f, " %-20s ", name);
1804 if (! stringp)
1805 {
1806 fprintf (f, "0x");
1807 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1808 }
1809 else
1810 {
1811 const char *string;
1812 unsigned int tagv = dyn.d_un.d_val;
1813
1814 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1815 if (string == NULL)
1816 goto error_return;
1817 fprintf (f, "%s", string);
1818 }
1819 fprintf (f, "\n");
1820 }
1821
1822 free (dynbuf);
1823 dynbuf = NULL;
1824 }
1825
1826 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1827 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1828 {
1829 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1830 return FALSE;
1831 }
1832
1833 if (elf_dynverdef (abfd) != 0)
1834 {
1835 Elf_Internal_Verdef *t;
1836
1837 fprintf (f, _("\nVersion definitions:\n"));
1838 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1839 {
1840 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1841 t->vd_flags, t->vd_hash,
1842 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1843 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1844 {
1845 Elf_Internal_Verdaux *a;
1846
1847 fprintf (f, "\t");
1848 for (a = t->vd_auxptr->vda_nextptr;
1849 a != NULL;
1850 a = a->vda_nextptr)
1851 fprintf (f, "%s ",
1852 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1853 fprintf (f, "\n");
1854 }
1855 }
1856 }
1857
1858 if (elf_dynverref (abfd) != 0)
1859 {
1860 Elf_Internal_Verneed *t;
1861
1862 fprintf (f, _("\nVersion References:\n"));
1863 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1864 {
1865 Elf_Internal_Vernaux *a;
1866
1867 fprintf (f, _(" required from %s:\n"),
1868 t->vn_filename ? t->vn_filename : "<corrupt>");
1869 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1870 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1871 a->vna_flags, a->vna_other,
1872 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1873 }
1874 }
1875
1876 return TRUE;
1877
1878 error_return:
1879 if (dynbuf != NULL)
1880 free (dynbuf);
1881 return FALSE;
1882 }
1883
1884 /* Get version string. */
1885
1886 const char *
1887 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1888 bfd_boolean *hidden)
1889 {
1890 const char *version_string = NULL;
1891 if (elf_dynversym (abfd) != 0
1892 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1893 {
1894 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1895
1896 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1897 vernum &= VERSYM_VERSION;
1898
1899 if (vernum == 0)
1900 version_string = "";
1901 else if (vernum == 1
1902 && (vernum > elf_tdata (abfd)->cverdefs
1903 || (elf_tdata (abfd)->verdef[0].vd_flags
1904 == VER_FLG_BASE)))
1905 version_string = "Base";
1906 else if (vernum <= elf_tdata (abfd)->cverdefs)
1907 version_string =
1908 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1909 else
1910 {
1911 Elf_Internal_Verneed *t;
1912
1913 version_string = _("<corrupt>");
1914 for (t = elf_tdata (abfd)->verref;
1915 t != NULL;
1916 t = t->vn_nextref)
1917 {
1918 Elf_Internal_Vernaux *a;
1919
1920 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1921 {
1922 if (a->vna_other == vernum)
1923 {
1924 version_string = a->vna_nodename;
1925 break;
1926 }
1927 }
1928 }
1929 }
1930 }
1931 return version_string;
1932 }
1933
1934 /* Display ELF-specific fields of a symbol. */
1935
1936 void
1937 bfd_elf_print_symbol (bfd *abfd,
1938 void *filep,
1939 asymbol *symbol,
1940 bfd_print_symbol_type how)
1941 {
1942 FILE *file = (FILE *) filep;
1943 switch (how)
1944 {
1945 case bfd_print_symbol_name:
1946 fprintf (file, "%s", symbol->name);
1947 break;
1948 case bfd_print_symbol_more:
1949 fprintf (file, "elf ");
1950 bfd_fprintf_vma (abfd, file, symbol->value);
1951 fprintf (file, " %x", symbol->flags);
1952 break;
1953 case bfd_print_symbol_all:
1954 {
1955 const char *section_name;
1956 const char *name = NULL;
1957 const struct elf_backend_data *bed;
1958 unsigned char st_other;
1959 bfd_vma val;
1960 const char *version_string;
1961 bfd_boolean hidden;
1962
1963 section_name = symbol->section ? symbol->section->name : "(*none*)";
1964
1965 bed = get_elf_backend_data (abfd);
1966 if (bed->elf_backend_print_symbol_all)
1967 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1968
1969 if (name == NULL)
1970 {
1971 name = symbol->name;
1972 bfd_print_symbol_vandf (abfd, file, symbol);
1973 }
1974
1975 fprintf (file, " %s\t", section_name);
1976 /* Print the "other" value for a symbol. For common symbols,
1977 we've already printed the size; now print the alignment.
1978 For other symbols, we have no specified alignment, and
1979 we've printed the address; now print the size. */
1980 if (symbol->section && bfd_is_com_section (symbol->section))
1981 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1982 else
1983 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1984 bfd_fprintf_vma (abfd, file, val);
1985
1986 /* If we have version information, print it. */
1987 version_string = _bfd_elf_get_symbol_version_string (abfd,
1988 symbol,
1989 &hidden);
1990 if (version_string)
1991 {
1992 if (!hidden)
1993 fprintf (file, " %-11s", version_string);
1994 else
1995 {
1996 int i;
1997
1998 fprintf (file, " (%s)", version_string);
1999 for (i = 10 - strlen (version_string); i > 0; --i)
2000 putc (' ', file);
2001 }
2002 }
2003
2004 /* If the st_other field is not zero, print it. */
2005 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2006
2007 switch (st_other)
2008 {
2009 case 0: break;
2010 case STV_INTERNAL: fprintf (file, " .internal"); break;
2011 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2012 case STV_PROTECTED: fprintf (file, " .protected"); break;
2013 default:
2014 /* Some other non-defined flags are also present, so print
2015 everything hex. */
2016 fprintf (file, " 0x%02x", (unsigned int) st_other);
2017 }
2018
2019 fprintf (file, " %s", name);
2020 }
2021 break;
2022 }
2023 }
2024 \f
2025 /* ELF .o/exec file reading */
2026
2027 /* Create a new bfd section from an ELF section header. */
2028
2029 bfd_boolean
2030 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2031 {
2032 Elf_Internal_Shdr *hdr;
2033 Elf_Internal_Ehdr *ehdr;
2034 const struct elf_backend_data *bed;
2035 const char *name;
2036 bfd_boolean ret = TRUE;
2037 static bfd_boolean * sections_being_created = NULL;
2038 static bfd * sections_being_created_abfd = NULL;
2039 static unsigned int nesting = 0;
2040
2041 if (shindex >= elf_numsections (abfd))
2042 return FALSE;
2043
2044 if (++ nesting > 3)
2045 {
2046 /* PR17512: A corrupt ELF binary might contain a recursive group of
2047 sections, with each the string indices pointing to the next in the
2048 loop. Detect this here, by refusing to load a section that we are
2049 already in the process of loading. We only trigger this test if
2050 we have nested at least three sections deep as normal ELF binaries
2051 can expect to recurse at least once.
2052
2053 FIXME: It would be better if this array was attached to the bfd,
2054 rather than being held in a static pointer. */
2055
2056 if (sections_being_created_abfd != abfd)
2057 sections_being_created = NULL;
2058 if (sections_being_created == NULL)
2059 {
2060 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2061 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
2062 if (sections_being_created == NULL)
2063 return FALSE;
2064 sections_being_created_abfd = abfd;
2065 }
2066 if (sections_being_created [shindex])
2067 {
2068 _bfd_error_handler
2069 (_("%pB: warning: loop in section dependencies detected"), abfd);
2070 return FALSE;
2071 }
2072 sections_being_created [shindex] = TRUE;
2073 }
2074
2075 hdr = elf_elfsections (abfd)[shindex];
2076 ehdr = elf_elfheader (abfd);
2077 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2078 hdr->sh_name);
2079 if (name == NULL)
2080 goto fail;
2081
2082 bed = get_elf_backend_data (abfd);
2083 switch (hdr->sh_type)
2084 {
2085 case SHT_NULL:
2086 /* Inactive section. Throw it away. */
2087 goto success;
2088
2089 case SHT_PROGBITS: /* Normal section with contents. */
2090 case SHT_NOBITS: /* .bss section. */
2091 case SHT_HASH: /* .hash section. */
2092 case SHT_NOTE: /* .note section. */
2093 case SHT_INIT_ARRAY: /* .init_array section. */
2094 case SHT_FINI_ARRAY: /* .fini_array section. */
2095 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2096 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2097 case SHT_GNU_HASH: /* .gnu.hash section. */
2098 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2099 goto success;
2100
2101 case SHT_DYNAMIC: /* Dynamic linking information. */
2102 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2103 goto fail;
2104
2105 if (hdr->sh_link > elf_numsections (abfd))
2106 {
2107 /* PR 10478: Accept Solaris binaries with a sh_link
2108 field set to SHN_BEFORE or SHN_AFTER. */
2109 switch (bfd_get_arch (abfd))
2110 {
2111 case bfd_arch_i386:
2112 case bfd_arch_sparc:
2113 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2114 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2115 break;
2116 /* Otherwise fall through. */
2117 default:
2118 goto fail;
2119 }
2120 }
2121 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2122 goto fail;
2123 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2124 {
2125 Elf_Internal_Shdr *dynsymhdr;
2126
2127 /* The shared libraries distributed with hpux11 have a bogus
2128 sh_link field for the ".dynamic" section. Find the
2129 string table for the ".dynsym" section instead. */
2130 if (elf_dynsymtab (abfd) != 0)
2131 {
2132 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 }
2135 else
2136 {
2137 unsigned int i, num_sec;
2138
2139 num_sec = elf_numsections (abfd);
2140 for (i = 1; i < num_sec; i++)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[i];
2143 if (dynsymhdr->sh_type == SHT_DYNSYM)
2144 {
2145 hdr->sh_link = dynsymhdr->sh_link;
2146 break;
2147 }
2148 }
2149 }
2150 }
2151 goto success;
2152
2153 case SHT_SYMTAB: /* A symbol table. */
2154 if (elf_onesymtab (abfd) == shindex)
2155 goto success;
2156
2157 if (hdr->sh_entsize != bed->s->sizeof_sym)
2158 goto fail;
2159
2160 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2161 {
2162 if (hdr->sh_size != 0)
2163 goto fail;
2164 /* Some assemblers erroneously set sh_info to one with a
2165 zero sh_size. ld sees this as a global symbol count
2166 of (unsigned) -1. Fix it here. */
2167 hdr->sh_info = 0;
2168 goto success;
2169 }
2170
2171 /* PR 18854: A binary might contain more than one symbol table.
2172 Unusual, but possible. Warn, but continue. */
2173 if (elf_onesymtab (abfd) != 0)
2174 {
2175 _bfd_error_handler
2176 /* xgettext:c-format */
2177 (_("%pB: warning: multiple symbol tables detected"
2178 " - ignoring the table in section %u"),
2179 abfd, shindex);
2180 goto success;
2181 }
2182 elf_onesymtab (abfd) = shindex;
2183 elf_symtab_hdr (abfd) = *hdr;
2184 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2185 abfd->flags |= HAS_SYMS;
2186
2187 /* Sometimes a shared object will map in the symbol table. If
2188 SHF_ALLOC is set, and this is a shared object, then we also
2189 treat this section as a BFD section. We can not base the
2190 decision purely on SHF_ALLOC, because that flag is sometimes
2191 set in a relocatable object file, which would confuse the
2192 linker. */
2193 if ((hdr->sh_flags & SHF_ALLOC) != 0
2194 && (abfd->flags & DYNAMIC) != 0
2195 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2196 shindex))
2197 goto fail;
2198
2199 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2200 can't read symbols without that section loaded as well. It
2201 is most likely specified by the next section header. */
2202 {
2203 elf_section_list * entry;
2204 unsigned int i, num_sec;
2205
2206 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2207 if (entry->hdr.sh_link == shindex)
2208 goto success;
2209
2210 num_sec = elf_numsections (abfd);
2211 for (i = shindex + 1; i < num_sec; i++)
2212 {
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2214
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2218 }
2219
2220 if (i == num_sec)
2221 for (i = 1; i < shindex; i++)
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2224
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
2229
2230 if (i != shindex)
2231 ret = bfd_section_from_shdr (abfd, i);
2232 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2233 goto success;
2234 }
2235
2236 case SHT_DYNSYM: /* A dynamic symbol table. */
2237 if (elf_dynsymtab (abfd) == shindex)
2238 goto success;
2239
2240 if (hdr->sh_entsize != bed->s->sizeof_sym)
2241 goto fail;
2242
2243 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2244 {
2245 if (hdr->sh_size != 0)
2246 goto fail;
2247
2248 /* Some linkers erroneously set sh_info to one with a
2249 zero sh_size. ld sees this as a global symbol count
2250 of (unsigned) -1. Fix it here. */
2251 hdr->sh_info = 0;
2252 goto success;
2253 }
2254
2255 /* PR 18854: A binary might contain more than one dynamic symbol table.
2256 Unusual, but possible. Warn, but continue. */
2257 if (elf_dynsymtab (abfd) != 0)
2258 {
2259 _bfd_error_handler
2260 /* xgettext:c-format */
2261 (_("%pB: warning: multiple dynamic symbol tables detected"
2262 " - ignoring the table in section %u"),
2263 abfd, shindex);
2264 goto success;
2265 }
2266 elf_dynsymtab (abfd) = shindex;
2267 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2268 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2269 abfd->flags |= HAS_SYMS;
2270
2271 /* Besides being a symbol table, we also treat this as a regular
2272 section, so that objcopy can handle it. */
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
2275
2276 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2277 {
2278 elf_section_list * entry;
2279
2280 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2281 if (entry->ndx == shindex)
2282 goto success;
2283
2284 entry = bfd_alloc (abfd, sizeof (*entry));
2285 if (entry == NULL)
2286 goto fail;
2287 entry->ndx = shindex;
2288 entry->hdr = * hdr;
2289 entry->next = elf_symtab_shndx_list (abfd);
2290 elf_symtab_shndx_list (abfd) = entry;
2291 elf_elfsections (abfd)[shindex] = & entry->hdr;
2292 goto success;
2293 }
2294
2295 case SHT_STRTAB: /* A string table. */
2296 if (hdr->bfd_section != NULL)
2297 goto success;
2298
2299 if (ehdr->e_shstrndx == shindex)
2300 {
2301 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2302 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2303 goto success;
2304 }
2305
2306 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2307 {
2308 symtab_strtab:
2309 elf_tdata (abfd)->strtab_hdr = *hdr;
2310 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2311 goto success;
2312 }
2313
2314 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2315 {
2316 dynsymtab_strtab:
2317 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2318 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2319 elf_elfsections (abfd)[shindex] = hdr;
2320 /* We also treat this as a regular section, so that objcopy
2321 can handle it. */
2322 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2323 shindex);
2324 goto success;
2325 }
2326
2327 /* If the string table isn't one of the above, then treat it as a
2328 regular section. We need to scan all the headers to be sure,
2329 just in case this strtab section appeared before the above. */
2330 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2331 {
2332 unsigned int i, num_sec;
2333
2334 num_sec = elf_numsections (abfd);
2335 for (i = 1; i < num_sec; i++)
2336 {
2337 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2338 if (hdr2->sh_link == shindex)
2339 {
2340 /* Prevent endless recursion on broken objects. */
2341 if (i == shindex)
2342 goto fail;
2343 if (! bfd_section_from_shdr (abfd, i))
2344 goto fail;
2345 if (elf_onesymtab (abfd) == i)
2346 goto symtab_strtab;
2347 if (elf_dynsymtab (abfd) == i)
2348 goto dynsymtab_strtab;
2349 }
2350 }
2351 }
2352 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2353 goto success;
2354
2355 case SHT_REL:
2356 case SHT_RELA:
2357 /* *These* do a lot of work -- but build no sections! */
2358 {
2359 asection *target_sect;
2360 Elf_Internal_Shdr *hdr2, **p_hdr;
2361 unsigned int num_sec = elf_numsections (abfd);
2362 struct bfd_elf_section_data *esdt;
2363
2364 if (hdr->sh_entsize
2365 != (bfd_size_type) (hdr->sh_type == SHT_REL
2366 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2367 goto fail;
2368
2369 /* Check for a bogus link to avoid crashing. */
2370 if (hdr->sh_link >= num_sec)
2371 {
2372 _bfd_error_handler
2373 /* xgettext:c-format */
2374 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2375 abfd, hdr->sh_link, name, shindex);
2376 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2377 shindex);
2378 goto success;
2379 }
2380
2381 /* For some incomprehensible reason Oracle distributes
2382 libraries for Solaris in which some of the objects have
2383 bogus sh_link fields. It would be nice if we could just
2384 reject them, but, unfortunately, some people need to use
2385 them. We scan through the section headers; if we find only
2386 one suitable symbol table, we clobber the sh_link to point
2387 to it. I hope this doesn't break anything.
2388
2389 Don't do it on executable nor shared library. */
2390 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2391 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2392 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2393 {
2394 unsigned int scan;
2395 int found;
2396
2397 found = 0;
2398 for (scan = 1; scan < num_sec; scan++)
2399 {
2400 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2401 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2402 {
2403 if (found != 0)
2404 {
2405 found = 0;
2406 break;
2407 }
2408 found = scan;
2409 }
2410 }
2411 if (found != 0)
2412 hdr->sh_link = found;
2413 }
2414
2415 /* Get the symbol table. */
2416 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2417 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2418 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2419 goto fail;
2420
2421 /* If this is an alloc section in an executable or shared
2422 library, or the reloc section does not use the main symbol
2423 table we don't treat it as a reloc section. BFD can't
2424 adequately represent such a section, so at least for now,
2425 we don't try. We just present it as a normal section. We
2426 also can't use it as a reloc section if it points to the
2427 null section, an invalid section, another reloc section, or
2428 its sh_link points to the null section. */
2429 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2430 && (hdr->sh_flags & SHF_ALLOC) != 0)
2431 || hdr->sh_link == SHN_UNDEF
2432 || hdr->sh_link != elf_onesymtab (abfd)
2433 || hdr->sh_info == SHN_UNDEF
2434 || hdr->sh_info >= num_sec
2435 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2436 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2437 {
2438 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2439 shindex);
2440 goto success;
2441 }
2442
2443 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2444 goto fail;
2445
2446 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2447 if (target_sect == NULL)
2448 goto fail;
2449
2450 esdt = elf_section_data (target_sect);
2451 if (hdr->sh_type == SHT_RELA)
2452 p_hdr = &esdt->rela.hdr;
2453 else
2454 p_hdr = &esdt->rel.hdr;
2455
2456 /* PR 17512: file: 0b4f81b7.
2457 Also see PR 24456, for a file which deliberately has two reloc
2458 sections. */
2459 if (*p_hdr != NULL)
2460 {
2461 _bfd_error_handler
2462 /* xgettext:c-format */
2463 (_("%pB: warning: multiple relocation sections for section %pA \
2464 found - ignoring all but the first"),
2465 abfd, target_sect);
2466 goto success;
2467 }
2468 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2469 if (hdr2 == NULL)
2470 goto fail;
2471 *hdr2 = *hdr;
2472 *p_hdr = hdr2;
2473 elf_elfsections (abfd)[shindex] = hdr2;
2474 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2475 * bed->s->int_rels_per_ext_rel);
2476 target_sect->flags |= SEC_RELOC;
2477 target_sect->relocation = NULL;
2478 target_sect->rel_filepos = hdr->sh_offset;
2479 /* In the section to which the relocations apply, mark whether
2480 its relocations are of the REL or RELA variety. */
2481 if (hdr->sh_size != 0)
2482 {
2483 if (hdr->sh_type == SHT_RELA)
2484 target_sect->use_rela_p = 1;
2485 }
2486 abfd->flags |= HAS_RELOC;
2487 goto success;
2488 }
2489
2490 case SHT_GNU_verdef:
2491 elf_dynverdef (abfd) = shindex;
2492 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2493 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2494 goto success;
2495
2496 case SHT_GNU_versym:
2497 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2498 goto fail;
2499
2500 elf_dynversym (abfd) = shindex;
2501 elf_tdata (abfd)->dynversym_hdr = *hdr;
2502 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2503 goto success;
2504
2505 case SHT_GNU_verneed:
2506 elf_dynverref (abfd) = shindex;
2507 elf_tdata (abfd)->dynverref_hdr = *hdr;
2508 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2509 goto success;
2510
2511 case SHT_SHLIB:
2512 goto success;
2513
2514 case SHT_GROUP:
2515 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2516 goto fail;
2517
2518 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2519 goto fail;
2520
2521 goto success;
2522
2523 default:
2524 /* Possibly an attributes section. */
2525 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2526 || hdr->sh_type == bed->obj_attrs_section_type)
2527 {
2528 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2529 goto fail;
2530 _bfd_elf_parse_attributes (abfd, hdr);
2531 goto success;
2532 }
2533
2534 /* Check for any processor-specific section types. */
2535 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2536 goto success;
2537
2538 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2539 {
2540 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2541 /* FIXME: How to properly handle allocated section reserved
2542 for applications? */
2543 _bfd_error_handler
2544 /* xgettext:c-format */
2545 (_("%pB: unknown type [%#x] section `%s'"),
2546 abfd, hdr->sh_type, name);
2547 else
2548 {
2549 /* Allow sections reserved for applications. */
2550 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2551 shindex);
2552 goto success;
2553 }
2554 }
2555 else if (hdr->sh_type >= SHT_LOPROC
2556 && hdr->sh_type <= SHT_HIPROC)
2557 /* FIXME: We should handle this section. */
2558 _bfd_error_handler
2559 /* xgettext:c-format */
2560 (_("%pB: unknown type [%#x] section `%s'"),
2561 abfd, hdr->sh_type, name);
2562 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2563 {
2564 /* Unrecognised OS-specific sections. */
2565 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2566 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2567 required to correctly process the section and the file should
2568 be rejected with an error message. */
2569 _bfd_error_handler
2570 /* xgettext:c-format */
2571 (_("%pB: unknown type [%#x] section `%s'"),
2572 abfd, hdr->sh_type, name);
2573 else
2574 {
2575 /* Otherwise it should be processed. */
2576 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2577 goto success;
2578 }
2579 }
2580 else
2581 /* FIXME: We should handle this section. */
2582 _bfd_error_handler
2583 /* xgettext:c-format */
2584 (_("%pB: unknown type [%#x] section `%s'"),
2585 abfd, hdr->sh_type, name);
2586
2587 goto fail;
2588 }
2589
2590 fail:
2591 ret = FALSE;
2592 success:
2593 if (sections_being_created && sections_being_created_abfd == abfd)
2594 sections_being_created [shindex] = FALSE;
2595 if (-- nesting == 0)
2596 {
2597 sections_being_created = NULL;
2598 sections_being_created_abfd = abfd;
2599 }
2600 return ret;
2601 }
2602
2603 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2604
2605 Elf_Internal_Sym *
2606 bfd_sym_from_r_symndx (struct sym_cache *cache,
2607 bfd *abfd,
2608 unsigned long r_symndx)
2609 {
2610 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2611
2612 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2613 {
2614 Elf_Internal_Shdr *symtab_hdr;
2615 unsigned char esym[sizeof (Elf64_External_Sym)];
2616 Elf_External_Sym_Shndx eshndx;
2617
2618 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2619 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2620 &cache->sym[ent], esym, &eshndx) == NULL)
2621 return NULL;
2622
2623 if (cache->abfd != abfd)
2624 {
2625 memset (cache->indx, -1, sizeof (cache->indx));
2626 cache->abfd = abfd;
2627 }
2628 cache->indx[ent] = r_symndx;
2629 }
2630
2631 return &cache->sym[ent];
2632 }
2633
2634 /* Given an ELF section number, retrieve the corresponding BFD
2635 section. */
2636
2637 asection *
2638 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2639 {
2640 if (sec_index >= elf_numsections (abfd))
2641 return NULL;
2642 return elf_elfsections (abfd)[sec_index]->bfd_section;
2643 }
2644
2645 static const struct bfd_elf_special_section special_sections_b[] =
2646 {
2647 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2648 { NULL, 0, 0, 0, 0 }
2649 };
2650
2651 static const struct bfd_elf_special_section special_sections_c[] =
2652 {
2653 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2654 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2655 { NULL, 0, 0, 0, 0 }
2656 };
2657
2658 static const struct bfd_elf_special_section special_sections_d[] =
2659 {
2660 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2661 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2662 /* There are more DWARF sections than these, but they needn't be added here
2663 unless you have to cope with broken compilers that don't emit section
2664 attributes or you want to help the user writing assembler. */
2665 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2666 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2667 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2668 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2669 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2670 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2671 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2672 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2673 { NULL, 0, 0, 0, 0 }
2674 };
2675
2676 static const struct bfd_elf_special_section special_sections_f[] =
2677 {
2678 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2679 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2680 { NULL, 0 , 0, 0, 0 }
2681 };
2682
2683 static const struct bfd_elf_special_section special_sections_g[] =
2684 {
2685 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2686 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2687 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2688 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2689 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2690 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2691 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2692 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2694 { NULL, 0, 0, 0, 0 }
2695 };
2696
2697 static const struct bfd_elf_special_section special_sections_h[] =
2698 {
2699 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2700 { NULL, 0, 0, 0, 0 }
2701 };
2702
2703 static const struct bfd_elf_special_section special_sections_i[] =
2704 {
2705 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2706 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2707 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2708 { NULL, 0, 0, 0, 0 }
2709 };
2710
2711 static const struct bfd_elf_special_section special_sections_l[] =
2712 {
2713 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2714 { NULL, 0, 0, 0, 0 }
2715 };
2716
2717 static const struct bfd_elf_special_section special_sections_n[] =
2718 {
2719 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2720 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2721 { NULL, 0, 0, 0, 0 }
2722 };
2723
2724 static const struct bfd_elf_special_section special_sections_p[] =
2725 {
2726 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2727 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2728 { NULL, 0, 0, 0, 0 }
2729 };
2730
2731 static const struct bfd_elf_special_section special_sections_r[] =
2732 {
2733 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2734 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2735 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2736 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2737 { NULL, 0, 0, 0, 0 }
2738 };
2739
2740 static const struct bfd_elf_special_section special_sections_s[] =
2741 {
2742 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2743 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2744 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2745 /* See struct bfd_elf_special_section declaration for the semantics of
2746 this special case where .prefix_length != strlen (.prefix). */
2747 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2748 { NULL, 0, 0, 0, 0 }
2749 };
2750
2751 static const struct bfd_elf_special_section special_sections_t[] =
2752 {
2753 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2754 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2755 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2756 { NULL, 0, 0, 0, 0 }
2757 };
2758
2759 static const struct bfd_elf_special_section special_sections_z[] =
2760 {
2761 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2762 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2763 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2764 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2765 { NULL, 0, 0, 0, 0 }
2766 };
2767
2768 static const struct bfd_elf_special_section * const special_sections[] =
2769 {
2770 special_sections_b, /* 'b' */
2771 special_sections_c, /* 'c' */
2772 special_sections_d, /* 'd' */
2773 NULL, /* 'e' */
2774 special_sections_f, /* 'f' */
2775 special_sections_g, /* 'g' */
2776 special_sections_h, /* 'h' */
2777 special_sections_i, /* 'i' */
2778 NULL, /* 'j' */
2779 NULL, /* 'k' */
2780 special_sections_l, /* 'l' */
2781 NULL, /* 'm' */
2782 special_sections_n, /* 'n' */
2783 NULL, /* 'o' */
2784 special_sections_p, /* 'p' */
2785 NULL, /* 'q' */
2786 special_sections_r, /* 'r' */
2787 special_sections_s, /* 's' */
2788 special_sections_t, /* 't' */
2789 NULL, /* 'u' */
2790 NULL, /* 'v' */
2791 NULL, /* 'w' */
2792 NULL, /* 'x' */
2793 NULL, /* 'y' */
2794 special_sections_z /* 'z' */
2795 };
2796
2797 const struct bfd_elf_special_section *
2798 _bfd_elf_get_special_section (const char *name,
2799 const struct bfd_elf_special_section *spec,
2800 unsigned int rela)
2801 {
2802 int i;
2803 int len;
2804
2805 len = strlen (name);
2806
2807 for (i = 0; spec[i].prefix != NULL; i++)
2808 {
2809 int suffix_len;
2810 int prefix_len = spec[i].prefix_length;
2811
2812 if (len < prefix_len)
2813 continue;
2814 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2815 continue;
2816
2817 suffix_len = spec[i].suffix_length;
2818 if (suffix_len <= 0)
2819 {
2820 if (name[prefix_len] != 0)
2821 {
2822 if (suffix_len == 0)
2823 continue;
2824 if (name[prefix_len] != '.'
2825 && (suffix_len == -2
2826 || (rela && spec[i].type == SHT_REL)))
2827 continue;
2828 }
2829 }
2830 else
2831 {
2832 if (len < prefix_len + suffix_len)
2833 continue;
2834 if (memcmp (name + len - suffix_len,
2835 spec[i].prefix + prefix_len,
2836 suffix_len) != 0)
2837 continue;
2838 }
2839 return &spec[i];
2840 }
2841
2842 return NULL;
2843 }
2844
2845 const struct bfd_elf_special_section *
2846 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2847 {
2848 int i;
2849 const struct bfd_elf_special_section *spec;
2850 const struct elf_backend_data *bed;
2851
2852 /* See if this is one of the special sections. */
2853 if (sec->name == NULL)
2854 return NULL;
2855
2856 bed = get_elf_backend_data (abfd);
2857 spec = bed->special_sections;
2858 if (spec)
2859 {
2860 spec = _bfd_elf_get_special_section (sec->name,
2861 bed->special_sections,
2862 sec->use_rela_p);
2863 if (spec != NULL)
2864 return spec;
2865 }
2866
2867 if (sec->name[0] != '.')
2868 return NULL;
2869
2870 i = sec->name[1] - 'b';
2871 if (i < 0 || i > 'z' - 'b')
2872 return NULL;
2873
2874 spec = special_sections[i];
2875
2876 if (spec == NULL)
2877 return NULL;
2878
2879 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2880 }
2881
2882 bfd_boolean
2883 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2884 {
2885 struct bfd_elf_section_data *sdata;
2886 const struct elf_backend_data *bed;
2887 const struct bfd_elf_special_section *ssect;
2888
2889 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2890 if (sdata == NULL)
2891 {
2892 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2893 sizeof (*sdata));
2894 if (sdata == NULL)
2895 return FALSE;
2896 sec->used_by_bfd = sdata;
2897 }
2898
2899 /* Indicate whether or not this section should use RELA relocations. */
2900 bed = get_elf_backend_data (abfd);
2901 sec->use_rela_p = bed->default_use_rela_p;
2902
2903 /* Set up ELF section type and flags for newly created sections, if
2904 there is an ABI mandated section. */
2905 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2906 if (ssect != NULL)
2907 {
2908 elf_section_type (sec) = ssect->type;
2909 elf_section_flags (sec) = ssect->attr;
2910 }
2911
2912 return _bfd_generic_new_section_hook (abfd, sec);
2913 }
2914
2915 /* Create a new bfd section from an ELF program header.
2916
2917 Since program segments have no names, we generate a synthetic name
2918 of the form segment<NUM>, where NUM is generally the index in the
2919 program header table. For segments that are split (see below) we
2920 generate the names segment<NUM>a and segment<NUM>b.
2921
2922 Note that some program segments may have a file size that is different than
2923 (less than) the memory size. All this means is that at execution the
2924 system must allocate the amount of memory specified by the memory size,
2925 but only initialize it with the first "file size" bytes read from the
2926 file. This would occur for example, with program segments consisting
2927 of combined data+bss.
2928
2929 To handle the above situation, this routine generates TWO bfd sections
2930 for the single program segment. The first has the length specified by
2931 the file size of the segment, and the second has the length specified
2932 by the difference between the two sizes. In effect, the segment is split
2933 into its initialized and uninitialized parts.
2934
2935 */
2936
2937 bfd_boolean
2938 _bfd_elf_make_section_from_phdr (bfd *abfd,
2939 Elf_Internal_Phdr *hdr,
2940 int hdr_index,
2941 const char *type_name)
2942 {
2943 asection *newsect;
2944 char *name;
2945 char namebuf[64];
2946 size_t len;
2947 int split;
2948
2949 split = ((hdr->p_memsz > 0)
2950 && (hdr->p_filesz > 0)
2951 && (hdr->p_memsz > hdr->p_filesz));
2952
2953 if (hdr->p_filesz > 0)
2954 {
2955 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2956 len = strlen (namebuf) + 1;
2957 name = (char *) bfd_alloc (abfd, len);
2958 if (!name)
2959 return FALSE;
2960 memcpy (name, namebuf, len);
2961 newsect = bfd_make_section (abfd, name);
2962 if (newsect == NULL)
2963 return FALSE;
2964 newsect->vma = hdr->p_vaddr;
2965 newsect->lma = hdr->p_paddr;
2966 newsect->size = hdr->p_filesz;
2967 newsect->filepos = hdr->p_offset;
2968 newsect->flags |= SEC_HAS_CONTENTS;
2969 newsect->alignment_power = bfd_log2 (hdr->p_align);
2970 if (hdr->p_type == PT_LOAD)
2971 {
2972 newsect->flags |= SEC_ALLOC;
2973 newsect->flags |= SEC_LOAD;
2974 if (hdr->p_flags & PF_X)
2975 {
2976 /* FIXME: all we known is that it has execute PERMISSION,
2977 may be data. */
2978 newsect->flags |= SEC_CODE;
2979 }
2980 }
2981 if (!(hdr->p_flags & PF_W))
2982 {
2983 newsect->flags |= SEC_READONLY;
2984 }
2985 }
2986
2987 if (hdr->p_memsz > hdr->p_filesz)
2988 {
2989 bfd_vma align;
2990
2991 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
2992 len = strlen (namebuf) + 1;
2993 name = (char *) bfd_alloc (abfd, len);
2994 if (!name)
2995 return FALSE;
2996 memcpy (name, namebuf, len);
2997 newsect = bfd_make_section (abfd, name);
2998 if (newsect == NULL)
2999 return FALSE;
3000 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3001 newsect->lma = hdr->p_paddr + hdr->p_filesz;
3002 newsect->size = hdr->p_memsz - hdr->p_filesz;
3003 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3004 align = newsect->vma & -newsect->vma;
3005 if (align == 0 || align > hdr->p_align)
3006 align = hdr->p_align;
3007 newsect->alignment_power = bfd_log2 (align);
3008 if (hdr->p_type == PT_LOAD)
3009 {
3010 /* Hack for gdb. Segments that have not been modified do
3011 not have their contents written to a core file, on the
3012 assumption that a debugger can find the contents in the
3013 executable. We flag this case by setting the fake
3014 section size to zero. Note that "real" bss sections will
3015 always have their contents dumped to the core file. */
3016 if (bfd_get_format (abfd) == bfd_core)
3017 newsect->size = 0;
3018 newsect->flags |= SEC_ALLOC;
3019 if (hdr->p_flags & PF_X)
3020 newsect->flags |= SEC_CODE;
3021 }
3022 if (!(hdr->p_flags & PF_W))
3023 newsect->flags |= SEC_READONLY;
3024 }
3025
3026 return TRUE;
3027 }
3028
3029 static bfd_boolean
3030 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3031 {
3032 /* The return value is ignored. Build-ids are considered optional. */
3033 if (templ->xvec->flavour == bfd_target_elf_flavour)
3034 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3035 (templ, offset);
3036 return FALSE;
3037 }
3038
3039 bfd_boolean
3040 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3041 {
3042 const struct elf_backend_data *bed;
3043
3044 switch (hdr->p_type)
3045 {
3046 case PT_NULL:
3047 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3048
3049 case PT_LOAD:
3050 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3051 return FALSE;
3052 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3053 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3054 return TRUE;
3055
3056 case PT_DYNAMIC:
3057 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3058
3059 case PT_INTERP:
3060 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3061
3062 case PT_NOTE:
3063 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3064 return FALSE;
3065 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3066 hdr->p_align))
3067 return FALSE;
3068 return TRUE;
3069
3070 case PT_SHLIB:
3071 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3072
3073 case PT_PHDR:
3074 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3075
3076 case PT_GNU_EH_FRAME:
3077 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3078 "eh_frame_hdr");
3079
3080 case PT_GNU_STACK:
3081 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3082
3083 case PT_GNU_RELRO:
3084 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3085
3086 default:
3087 /* Check for any processor-specific program segment types. */
3088 bed = get_elf_backend_data (abfd);
3089 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3090 }
3091 }
3092
3093 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3094 REL or RELA. */
3095
3096 Elf_Internal_Shdr *
3097 _bfd_elf_single_rel_hdr (asection *sec)
3098 {
3099 if (elf_section_data (sec)->rel.hdr)
3100 {
3101 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3102 return elf_section_data (sec)->rel.hdr;
3103 }
3104 else
3105 return elf_section_data (sec)->rela.hdr;
3106 }
3107
3108 static bfd_boolean
3109 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3110 Elf_Internal_Shdr *rel_hdr,
3111 const char *sec_name,
3112 bfd_boolean use_rela_p)
3113 {
3114 char *name = (char *) bfd_alloc (abfd,
3115 sizeof ".rela" + strlen (sec_name));
3116 if (name == NULL)
3117 return FALSE;
3118
3119 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3120 rel_hdr->sh_name =
3121 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3122 FALSE);
3123 if (rel_hdr->sh_name == (unsigned int) -1)
3124 return FALSE;
3125
3126 return TRUE;
3127 }
3128
3129 /* Allocate and initialize a section-header for a new reloc section,
3130 containing relocations against ASECT. It is stored in RELDATA. If
3131 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3132 relocations. */
3133
3134 static bfd_boolean
3135 _bfd_elf_init_reloc_shdr (bfd *abfd,
3136 struct bfd_elf_section_reloc_data *reldata,
3137 const char *sec_name,
3138 bfd_boolean use_rela_p,
3139 bfd_boolean delay_st_name_p)
3140 {
3141 Elf_Internal_Shdr *rel_hdr;
3142 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3143
3144 BFD_ASSERT (reldata->hdr == NULL);
3145 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3146 reldata->hdr = rel_hdr;
3147
3148 if (delay_st_name_p)
3149 rel_hdr->sh_name = (unsigned int) -1;
3150 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3151 use_rela_p))
3152 return FALSE;
3153 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3154 rel_hdr->sh_entsize = (use_rela_p
3155 ? bed->s->sizeof_rela
3156 : bed->s->sizeof_rel);
3157 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3158 rel_hdr->sh_flags = 0;
3159 rel_hdr->sh_addr = 0;
3160 rel_hdr->sh_size = 0;
3161 rel_hdr->sh_offset = 0;
3162
3163 return TRUE;
3164 }
3165
3166 /* Return the default section type based on the passed in section flags. */
3167
3168 int
3169 bfd_elf_get_default_section_type (flagword flags)
3170 {
3171 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3172 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3173 return SHT_NOBITS;
3174 return SHT_PROGBITS;
3175 }
3176
3177 struct fake_section_arg
3178 {
3179 struct bfd_link_info *link_info;
3180 bfd_boolean failed;
3181 };
3182
3183 /* Set up an ELF internal section header for a section. */
3184
3185 static void
3186 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3187 {
3188 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3189 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3190 struct bfd_elf_section_data *esd = elf_section_data (asect);
3191 Elf_Internal_Shdr *this_hdr;
3192 unsigned int sh_type;
3193 const char *name = asect->name;
3194 bfd_boolean delay_st_name_p = FALSE;
3195 bfd_vma mask;
3196
3197 if (arg->failed)
3198 {
3199 /* We already failed; just get out of the bfd_map_over_sections
3200 loop. */
3201 return;
3202 }
3203
3204 this_hdr = &esd->this_hdr;
3205
3206 if (arg->link_info)
3207 {
3208 /* ld: compress DWARF debug sections with names: .debug_*. */
3209 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3210 && (asect->flags & SEC_DEBUGGING)
3211 && name[1] == 'd'
3212 && name[6] == '_')
3213 {
3214 /* Set SEC_ELF_COMPRESS to indicate this section should be
3215 compressed. */
3216 asect->flags |= SEC_ELF_COMPRESS;
3217
3218 /* If this section will be compressed, delay adding section
3219 name to section name section after it is compressed in
3220 _bfd_elf_assign_file_positions_for_non_load. */
3221 delay_st_name_p = TRUE;
3222 }
3223 }
3224 else if ((asect->flags & SEC_ELF_RENAME))
3225 {
3226 /* objcopy: rename output DWARF debug section. */
3227 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3228 {
3229 /* When we decompress or compress with SHF_COMPRESSED,
3230 convert section name from .zdebug_* to .debug_* if
3231 needed. */
3232 if (name[1] == 'z')
3233 {
3234 char *new_name = convert_zdebug_to_debug (abfd, name);
3235 if (new_name == NULL)
3236 {
3237 arg->failed = TRUE;
3238 return;
3239 }
3240 name = new_name;
3241 }
3242 }
3243 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3244 {
3245 /* PR binutils/18087: Compression does not always make a
3246 section smaller. So only rename the section when
3247 compression has actually taken place. If input section
3248 name is .zdebug_*, we should never compress it again. */
3249 char *new_name = convert_debug_to_zdebug (abfd, name);
3250 if (new_name == NULL)
3251 {
3252 arg->failed = TRUE;
3253 return;
3254 }
3255 BFD_ASSERT (name[1] != 'z');
3256 name = new_name;
3257 }
3258 }
3259
3260 if (delay_st_name_p)
3261 this_hdr->sh_name = (unsigned int) -1;
3262 else
3263 {
3264 this_hdr->sh_name
3265 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3266 name, FALSE);
3267 if (this_hdr->sh_name == (unsigned int) -1)
3268 {
3269 arg->failed = TRUE;
3270 return;
3271 }
3272 }
3273
3274 /* Don't clear sh_flags. Assembler may set additional bits. */
3275
3276 if ((asect->flags & SEC_ALLOC) != 0
3277 || asect->user_set_vma)
3278 this_hdr->sh_addr = asect->vma;
3279 else
3280 this_hdr->sh_addr = 0;
3281
3282 this_hdr->sh_offset = 0;
3283 this_hdr->sh_size = asect->size;
3284 this_hdr->sh_link = 0;
3285 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3286 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3287 {
3288 _bfd_error_handler
3289 /* xgettext:c-format */
3290 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3291 abfd, asect->alignment_power, asect);
3292 arg->failed = TRUE;
3293 return;
3294 }
3295 /* Set sh_addralign to the highest power of two given by alignment
3296 consistent with the section VMA. Linker scripts can force VMA. */
3297 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3298 this_hdr->sh_addralign = mask & -mask;
3299 /* The sh_entsize and sh_info fields may have been set already by
3300 copy_private_section_data. */
3301
3302 this_hdr->bfd_section = asect;
3303 this_hdr->contents = NULL;
3304
3305 /* If the section type is unspecified, we set it based on
3306 asect->flags. */
3307 if ((asect->flags & SEC_GROUP) != 0)
3308 sh_type = SHT_GROUP;
3309 else
3310 sh_type = bfd_elf_get_default_section_type (asect->flags);
3311
3312 if (this_hdr->sh_type == SHT_NULL)
3313 this_hdr->sh_type = sh_type;
3314 else if (this_hdr->sh_type == SHT_NOBITS
3315 && sh_type == SHT_PROGBITS
3316 && (asect->flags & SEC_ALLOC) != 0)
3317 {
3318 /* Warn if we are changing a NOBITS section to PROGBITS, but
3319 allow the link to proceed. This can happen when users link
3320 non-bss input sections to bss output sections, or emit data
3321 to a bss output section via a linker script. */
3322 _bfd_error_handler
3323 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3324 this_hdr->sh_type = sh_type;
3325 }
3326
3327 switch (this_hdr->sh_type)
3328 {
3329 default:
3330 break;
3331
3332 case SHT_STRTAB:
3333 case SHT_NOTE:
3334 case SHT_NOBITS:
3335 case SHT_PROGBITS:
3336 break;
3337
3338 case SHT_INIT_ARRAY:
3339 case SHT_FINI_ARRAY:
3340 case SHT_PREINIT_ARRAY:
3341 this_hdr->sh_entsize = bed->s->arch_size / 8;
3342 break;
3343
3344 case SHT_HASH:
3345 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3346 break;
3347
3348 case SHT_DYNSYM:
3349 this_hdr->sh_entsize = bed->s->sizeof_sym;
3350 break;
3351
3352 case SHT_DYNAMIC:
3353 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3354 break;
3355
3356 case SHT_RELA:
3357 if (get_elf_backend_data (abfd)->may_use_rela_p)
3358 this_hdr->sh_entsize = bed->s->sizeof_rela;
3359 break;
3360
3361 case SHT_REL:
3362 if (get_elf_backend_data (abfd)->may_use_rel_p)
3363 this_hdr->sh_entsize = bed->s->sizeof_rel;
3364 break;
3365
3366 case SHT_GNU_versym:
3367 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3368 break;
3369
3370 case SHT_GNU_verdef:
3371 this_hdr->sh_entsize = 0;
3372 /* objcopy or strip will copy over sh_info, but may not set
3373 cverdefs. The linker will set cverdefs, but sh_info will be
3374 zero. */
3375 if (this_hdr->sh_info == 0)
3376 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3377 else
3378 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3379 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3380 break;
3381
3382 case SHT_GNU_verneed:
3383 this_hdr->sh_entsize = 0;
3384 /* objcopy or strip will copy over sh_info, but may not set
3385 cverrefs. The linker will set cverrefs, but sh_info will be
3386 zero. */
3387 if (this_hdr->sh_info == 0)
3388 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3389 else
3390 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3391 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3392 break;
3393
3394 case SHT_GROUP:
3395 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3396 break;
3397
3398 case SHT_GNU_HASH:
3399 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3400 break;
3401 }
3402
3403 if ((asect->flags & SEC_ALLOC) != 0)
3404 this_hdr->sh_flags |= SHF_ALLOC;
3405 if ((asect->flags & SEC_READONLY) == 0)
3406 this_hdr->sh_flags |= SHF_WRITE;
3407 if ((asect->flags & SEC_CODE) != 0)
3408 this_hdr->sh_flags |= SHF_EXECINSTR;
3409 if ((asect->flags & SEC_MERGE) != 0)
3410 {
3411 this_hdr->sh_flags |= SHF_MERGE;
3412 this_hdr->sh_entsize = asect->entsize;
3413 }
3414 if ((asect->flags & SEC_STRINGS) != 0)
3415 this_hdr->sh_flags |= SHF_STRINGS;
3416 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3417 this_hdr->sh_flags |= SHF_GROUP;
3418 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3419 {
3420 this_hdr->sh_flags |= SHF_TLS;
3421 if (asect->size == 0
3422 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3423 {
3424 struct bfd_link_order *o = asect->map_tail.link_order;
3425
3426 this_hdr->sh_size = 0;
3427 if (o != NULL)
3428 {
3429 this_hdr->sh_size = o->offset + o->size;
3430 if (this_hdr->sh_size != 0)
3431 this_hdr->sh_type = SHT_NOBITS;
3432 }
3433 }
3434 }
3435 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3436 this_hdr->sh_flags |= SHF_EXCLUDE;
3437
3438 /* If the section has relocs, set up a section header for the
3439 SHT_REL[A] section. If two relocation sections are required for
3440 this section, it is up to the processor-specific back-end to
3441 create the other. */
3442 if ((asect->flags & SEC_RELOC) != 0)
3443 {
3444 /* When doing a relocatable link, create both REL and RELA sections if
3445 needed. */
3446 if (arg->link_info
3447 /* Do the normal setup if we wouldn't create any sections here. */
3448 && esd->rel.count + esd->rela.count > 0
3449 && (bfd_link_relocatable (arg->link_info)
3450 || arg->link_info->emitrelocations))
3451 {
3452 if (esd->rel.count && esd->rel.hdr == NULL
3453 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3454 FALSE, delay_st_name_p))
3455 {
3456 arg->failed = TRUE;
3457 return;
3458 }
3459 if (esd->rela.count && esd->rela.hdr == NULL
3460 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3461 TRUE, delay_st_name_p))
3462 {
3463 arg->failed = TRUE;
3464 return;
3465 }
3466 }
3467 else if (!_bfd_elf_init_reloc_shdr (abfd,
3468 (asect->use_rela_p
3469 ? &esd->rela : &esd->rel),
3470 name,
3471 asect->use_rela_p,
3472 delay_st_name_p))
3473 {
3474 arg->failed = TRUE;
3475 return;
3476 }
3477 }
3478
3479 /* Check for processor-specific section types. */
3480 sh_type = this_hdr->sh_type;
3481 if (bed->elf_backend_fake_sections
3482 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3483 {
3484 arg->failed = TRUE;
3485 return;
3486 }
3487
3488 if (sh_type == SHT_NOBITS && asect->size != 0)
3489 {
3490 /* Don't change the header type from NOBITS if we are being
3491 called for objcopy --only-keep-debug. */
3492 this_hdr->sh_type = sh_type;
3493 }
3494 }
3495
3496 /* Fill in the contents of a SHT_GROUP section. Called from
3497 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3498 when ELF targets use the generic linker, ld. Called for ld -r
3499 from bfd_elf_final_link. */
3500
3501 void
3502 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3503 {
3504 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3505 asection *elt, *first;
3506 unsigned char *loc;
3507 bfd_boolean gas;
3508
3509 /* Ignore linker created group section. See elfNN_ia64_object_p in
3510 elfxx-ia64.c. */
3511 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3512 || sec->size == 0
3513 || *failedptr)
3514 return;
3515
3516 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3517 {
3518 unsigned long symindx = 0;
3519
3520 /* elf_group_id will have been set up by objcopy and the
3521 generic linker. */
3522 if (elf_group_id (sec) != NULL)
3523 symindx = elf_group_id (sec)->udata.i;
3524
3525 if (symindx == 0)
3526 {
3527 /* If called from the assembler, swap_out_syms will have set up
3528 elf_section_syms. */
3529 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3530 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3531 }
3532 elf_section_data (sec)->this_hdr.sh_info = symindx;
3533 }
3534 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3535 {
3536 /* The ELF backend linker sets sh_info to -2 when the group
3537 signature symbol is global, and thus the index can't be
3538 set until all local symbols are output. */
3539 asection *igroup;
3540 struct bfd_elf_section_data *sec_data;
3541 unsigned long symndx;
3542 unsigned long extsymoff;
3543 struct elf_link_hash_entry *h;
3544
3545 /* The point of this little dance to the first SHF_GROUP section
3546 then back to the SHT_GROUP section is that this gets us to
3547 the SHT_GROUP in the input object. */
3548 igroup = elf_sec_group (elf_next_in_group (sec));
3549 sec_data = elf_section_data (igroup);
3550 symndx = sec_data->this_hdr.sh_info;
3551 extsymoff = 0;
3552 if (!elf_bad_symtab (igroup->owner))
3553 {
3554 Elf_Internal_Shdr *symtab_hdr;
3555
3556 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3557 extsymoff = symtab_hdr->sh_info;
3558 }
3559 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3560 while (h->root.type == bfd_link_hash_indirect
3561 || h->root.type == bfd_link_hash_warning)
3562 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3563
3564 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3565 }
3566
3567 /* The contents won't be allocated for "ld -r" or objcopy. */
3568 gas = TRUE;
3569 if (sec->contents == NULL)
3570 {
3571 gas = FALSE;
3572 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3573
3574 /* Arrange for the section to be written out. */
3575 elf_section_data (sec)->this_hdr.contents = sec->contents;
3576 if (sec->contents == NULL)
3577 {
3578 *failedptr = TRUE;
3579 return;
3580 }
3581 }
3582
3583 loc = sec->contents + sec->size;
3584
3585 /* Get the pointer to the first section in the group that gas
3586 squirreled away here. objcopy arranges for this to be set to the
3587 start of the input section group. */
3588 first = elt = elf_next_in_group (sec);
3589
3590 /* First element is a flag word. Rest of section is elf section
3591 indices for all the sections of the group. Write them backwards
3592 just to keep the group in the same order as given in .section
3593 directives, not that it matters. */
3594 while (elt != NULL)
3595 {
3596 asection *s;
3597
3598 s = elt;
3599 if (!gas)
3600 s = s->output_section;
3601 if (s != NULL
3602 && !bfd_is_abs_section (s))
3603 {
3604 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3605 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3606
3607 if (elf_sec->rel.hdr != NULL
3608 && (gas
3609 || (input_elf_sec->rel.hdr != NULL
3610 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3611 {
3612 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3613 loc -= 4;
3614 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3615 }
3616 if (elf_sec->rela.hdr != NULL
3617 && (gas
3618 || (input_elf_sec->rela.hdr != NULL
3619 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3620 {
3621 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3622 loc -= 4;
3623 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3624 }
3625 loc -= 4;
3626 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3627 }
3628 elt = elf_next_in_group (elt);
3629 if (elt == first)
3630 break;
3631 }
3632
3633 loc -= 4;
3634 BFD_ASSERT (loc == sec->contents);
3635
3636 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3637 }
3638
3639 /* Given NAME, the name of a relocation section stripped of its
3640 .rel/.rela prefix, return the section in ABFD to which the
3641 relocations apply. */
3642
3643 asection *
3644 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3645 {
3646 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3647 section likely apply to .got.plt or .got section. */
3648 if (get_elf_backend_data (abfd)->want_got_plt
3649 && strcmp (name, ".plt") == 0)
3650 {
3651 asection *sec;
3652
3653 name = ".got.plt";
3654 sec = bfd_get_section_by_name (abfd, name);
3655 if (sec != NULL)
3656 return sec;
3657 name = ".got";
3658 }
3659
3660 return bfd_get_section_by_name (abfd, name);
3661 }
3662
3663 /* Return the section to which RELOC_SEC applies. */
3664
3665 static asection *
3666 elf_get_reloc_section (asection *reloc_sec)
3667 {
3668 const char *name;
3669 unsigned int type;
3670 bfd *abfd;
3671 const struct elf_backend_data *bed;
3672
3673 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3674 if (type != SHT_REL && type != SHT_RELA)
3675 return NULL;
3676
3677 /* We look up the section the relocs apply to by name. */
3678 name = reloc_sec->name;
3679 if (strncmp (name, ".rel", 4) != 0)
3680 return NULL;
3681 name += 4;
3682 if (type == SHT_RELA && *name++ != 'a')
3683 return NULL;
3684
3685 abfd = reloc_sec->owner;
3686 bed = get_elf_backend_data (abfd);
3687 return bed->get_reloc_section (abfd, name);
3688 }
3689
3690 /* Assign all ELF section numbers. The dummy first section is handled here
3691 too. The link/info pointers for the standard section types are filled
3692 in here too, while we're at it. */
3693
3694 static bfd_boolean
3695 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3696 {
3697 struct elf_obj_tdata *t = elf_tdata (abfd);
3698 asection *sec;
3699 unsigned int section_number;
3700 Elf_Internal_Shdr **i_shdrp;
3701 struct bfd_elf_section_data *d;
3702 bfd_boolean need_symtab;
3703 size_t amt;
3704
3705 section_number = 1;
3706
3707 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3708
3709 /* SHT_GROUP sections are in relocatable files only. */
3710 if (link_info == NULL || !link_info->resolve_section_groups)
3711 {
3712 size_t reloc_count = 0;
3713
3714 /* Put SHT_GROUP sections first. */
3715 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3716 {
3717 d = elf_section_data (sec);
3718
3719 if (d->this_hdr.sh_type == SHT_GROUP)
3720 {
3721 if (sec->flags & SEC_LINKER_CREATED)
3722 {
3723 /* Remove the linker created SHT_GROUP sections. */
3724 bfd_section_list_remove (abfd, sec);
3725 abfd->section_count--;
3726 }
3727 else
3728 d->this_idx = section_number++;
3729 }
3730
3731 /* Count relocations. */
3732 reloc_count += sec->reloc_count;
3733 }
3734
3735 /* Clear HAS_RELOC if there are no relocations. */
3736 if (reloc_count == 0)
3737 abfd->flags &= ~HAS_RELOC;
3738 }
3739
3740 for (sec = abfd->sections; sec; sec = sec->next)
3741 {
3742 d = elf_section_data (sec);
3743
3744 if (d->this_hdr.sh_type != SHT_GROUP)
3745 d->this_idx = section_number++;
3746 if (d->this_hdr.sh_name != (unsigned int) -1)
3747 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3748 if (d->rel.hdr)
3749 {
3750 d->rel.idx = section_number++;
3751 if (d->rel.hdr->sh_name != (unsigned int) -1)
3752 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3753 }
3754 else
3755 d->rel.idx = 0;
3756
3757 if (d->rela.hdr)
3758 {
3759 d->rela.idx = section_number++;
3760 if (d->rela.hdr->sh_name != (unsigned int) -1)
3761 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3762 }
3763 else
3764 d->rela.idx = 0;
3765 }
3766
3767 need_symtab = (bfd_get_symcount (abfd) > 0
3768 || (link_info == NULL
3769 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3770 == HAS_RELOC)));
3771 if (need_symtab)
3772 {
3773 elf_onesymtab (abfd) = section_number++;
3774 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3775 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3776 {
3777 elf_section_list *entry;
3778
3779 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3780
3781 entry = bfd_zalloc (abfd, sizeof (*entry));
3782 entry->ndx = section_number++;
3783 elf_symtab_shndx_list (abfd) = entry;
3784 entry->hdr.sh_name
3785 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3786 ".symtab_shndx", FALSE);
3787 if (entry->hdr.sh_name == (unsigned int) -1)
3788 return FALSE;
3789 }
3790 elf_strtab_sec (abfd) = section_number++;
3791 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3792 }
3793
3794 elf_shstrtab_sec (abfd) = section_number++;
3795 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3796 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3797
3798 if (section_number >= SHN_LORESERVE)
3799 {
3800 /* xgettext:c-format */
3801 _bfd_error_handler (_("%pB: too many sections: %u"),
3802 abfd, section_number);
3803 return FALSE;
3804 }
3805
3806 elf_numsections (abfd) = section_number;
3807 elf_elfheader (abfd)->e_shnum = section_number;
3808
3809 /* Set up the list of section header pointers, in agreement with the
3810 indices. */
3811 amt = section_number * sizeof (Elf_Internal_Shdr *);
3812 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3813 if (i_shdrp == NULL)
3814 return FALSE;
3815
3816 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3817 sizeof (Elf_Internal_Shdr));
3818 if (i_shdrp[0] == NULL)
3819 {
3820 bfd_release (abfd, i_shdrp);
3821 return FALSE;
3822 }
3823
3824 elf_elfsections (abfd) = i_shdrp;
3825
3826 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3827 if (need_symtab)
3828 {
3829 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3830 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3831 {
3832 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3833 BFD_ASSERT (entry != NULL);
3834 i_shdrp[entry->ndx] = & entry->hdr;
3835 entry->hdr.sh_link = elf_onesymtab (abfd);
3836 }
3837 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3838 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3839 }
3840
3841 for (sec = abfd->sections; sec; sec = sec->next)
3842 {
3843 asection *s;
3844
3845 d = elf_section_data (sec);
3846
3847 i_shdrp[d->this_idx] = &d->this_hdr;
3848 if (d->rel.idx != 0)
3849 i_shdrp[d->rel.idx] = d->rel.hdr;
3850 if (d->rela.idx != 0)
3851 i_shdrp[d->rela.idx] = d->rela.hdr;
3852
3853 /* Fill in the sh_link and sh_info fields while we're at it. */
3854
3855 /* sh_link of a reloc section is the section index of the symbol
3856 table. sh_info is the section index of the section to which
3857 the relocation entries apply. */
3858 if (d->rel.idx != 0)
3859 {
3860 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3861 d->rel.hdr->sh_info = d->this_idx;
3862 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3863 }
3864 if (d->rela.idx != 0)
3865 {
3866 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3867 d->rela.hdr->sh_info = d->this_idx;
3868 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3869 }
3870
3871 /* We need to set up sh_link for SHF_LINK_ORDER. */
3872 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3873 {
3874 s = elf_linked_to_section (sec);
3875 if (s)
3876 {
3877 /* elf_linked_to_section points to the input section. */
3878 if (link_info != NULL)
3879 {
3880 /* Check discarded linkonce section. */
3881 if (discarded_section (s))
3882 {
3883 asection *kept;
3884 _bfd_error_handler
3885 /* xgettext:c-format */
3886 (_("%pB: sh_link of section `%pA' points to"
3887 " discarded section `%pA' of `%pB'"),
3888 abfd, d->this_hdr.bfd_section,
3889 s, s->owner);
3890 /* Point to the kept section if it has the same
3891 size as the discarded one. */
3892 kept = _bfd_elf_check_kept_section (s, link_info);
3893 if (kept == NULL)
3894 {
3895 bfd_set_error (bfd_error_bad_value);
3896 return FALSE;
3897 }
3898 s = kept;
3899 }
3900
3901 s = s->output_section;
3902 BFD_ASSERT (s != NULL);
3903 }
3904 else
3905 {
3906 /* Handle objcopy. */
3907 if (s->output_section == NULL)
3908 {
3909 _bfd_error_handler
3910 /* xgettext:c-format */
3911 (_("%pB: sh_link of section `%pA' points to"
3912 " removed section `%pA' of `%pB'"),
3913 abfd, d->this_hdr.bfd_section, s, s->owner);
3914 bfd_set_error (bfd_error_bad_value);
3915 return FALSE;
3916 }
3917 s = s->output_section;
3918 }
3919 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3920 }
3921 else
3922 {
3923 /* PR 290:
3924 The Intel C compiler generates SHT_IA_64_UNWIND with
3925 SHF_LINK_ORDER. But it doesn't set the sh_link or
3926 sh_info fields. Hence we could get the situation
3927 where s is NULL. */
3928 const struct elf_backend_data *bed
3929 = get_elf_backend_data (abfd);
3930 if (bed->link_order_error_handler)
3931 bed->link_order_error_handler
3932 /* xgettext:c-format */
3933 (_("%pB: warning: sh_link not set for section `%pA'"),
3934 abfd, sec);
3935 }
3936 }
3937
3938 switch (d->this_hdr.sh_type)
3939 {
3940 case SHT_REL:
3941 case SHT_RELA:
3942 /* A reloc section which we are treating as a normal BFD
3943 section. sh_link is the section index of the symbol
3944 table. sh_info is the section index of the section to
3945 which the relocation entries apply. We assume that an
3946 allocated reloc section uses the dynamic symbol table.
3947 FIXME: How can we be sure? */
3948 s = bfd_get_section_by_name (abfd, ".dynsym");
3949 if (s != NULL)
3950 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3951
3952 s = elf_get_reloc_section (sec);
3953 if (s != NULL)
3954 {
3955 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3956 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3957 }
3958 break;
3959
3960 case SHT_STRTAB:
3961 /* We assume that a section named .stab*str is a stabs
3962 string section. We look for a section with the same name
3963 but without the trailing ``str'', and set its sh_link
3964 field to point to this section. */
3965 if (CONST_STRNEQ (sec->name, ".stab")
3966 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3967 {
3968 size_t len;
3969 char *alc;
3970
3971 len = strlen (sec->name);
3972 alc = (char *) bfd_malloc (len - 2);
3973 if (alc == NULL)
3974 return FALSE;
3975 memcpy (alc, sec->name, len - 3);
3976 alc[len - 3] = '\0';
3977 s = bfd_get_section_by_name (abfd, alc);
3978 free (alc);
3979 if (s != NULL)
3980 {
3981 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3982
3983 /* This is a .stab section. */
3984 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3985 elf_section_data (s)->this_hdr.sh_entsize
3986 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
3987 }
3988 }
3989 break;
3990
3991 case SHT_DYNAMIC:
3992 case SHT_DYNSYM:
3993 case SHT_GNU_verneed:
3994 case SHT_GNU_verdef:
3995 /* sh_link is the section header index of the string table
3996 used for the dynamic entries, or the symbol table, or the
3997 version strings. */
3998 s = bfd_get_section_by_name (abfd, ".dynstr");
3999 if (s != NULL)
4000 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4001 break;
4002
4003 case SHT_GNU_LIBLIST:
4004 /* sh_link is the section header index of the prelink library
4005 list used for the dynamic entries, or the symbol table, or
4006 the version strings. */
4007 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4008 ? ".dynstr" : ".gnu.libstr");
4009 if (s != NULL)
4010 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4011 break;
4012
4013 case SHT_HASH:
4014 case SHT_GNU_HASH:
4015 case SHT_GNU_versym:
4016 /* sh_link is the section header index of the symbol table
4017 this hash table or version table is for. */
4018 s = bfd_get_section_by_name (abfd, ".dynsym");
4019 if (s != NULL)
4020 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4021 break;
4022
4023 case SHT_GROUP:
4024 d->this_hdr.sh_link = elf_onesymtab (abfd);
4025 }
4026 }
4027
4028 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4029 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4030 debug section name from .debug_* to .zdebug_* if needed. */
4031
4032 return TRUE;
4033 }
4034
4035 static bfd_boolean
4036 sym_is_global (bfd *abfd, asymbol *sym)
4037 {
4038 /* If the backend has a special mapping, use it. */
4039 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4040 if (bed->elf_backend_sym_is_global)
4041 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4042
4043 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4044 || bfd_is_und_section (bfd_asymbol_section (sym))
4045 || bfd_is_com_section (bfd_asymbol_section (sym)));
4046 }
4047
4048 /* Filter global symbols of ABFD to include in the import library. All
4049 SYMCOUNT symbols of ABFD can be examined from their pointers in
4050 SYMS. Pointers of symbols to keep should be stored contiguously at
4051 the beginning of that array.
4052
4053 Returns the number of symbols to keep. */
4054
4055 unsigned int
4056 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4057 asymbol **syms, long symcount)
4058 {
4059 long src_count, dst_count = 0;
4060
4061 for (src_count = 0; src_count < symcount; src_count++)
4062 {
4063 asymbol *sym = syms[src_count];
4064 char *name = (char *) bfd_asymbol_name (sym);
4065 struct bfd_link_hash_entry *h;
4066
4067 if (!sym_is_global (abfd, sym))
4068 continue;
4069
4070 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4071 if (h == NULL)
4072 continue;
4073 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4074 continue;
4075 if (h->linker_def || h->ldscript_def)
4076 continue;
4077
4078 syms[dst_count++] = sym;
4079 }
4080
4081 syms[dst_count] = NULL;
4082
4083 return dst_count;
4084 }
4085
4086 /* Don't output section symbols for sections that are not going to be
4087 output, that are duplicates or there is no BFD section. */
4088
4089 static bfd_boolean
4090 ignore_section_sym (bfd *abfd, asymbol *sym)
4091 {
4092 elf_symbol_type *type_ptr;
4093
4094 if (sym == NULL)
4095 return FALSE;
4096
4097 if ((sym->flags & BSF_SECTION_SYM) == 0)
4098 return FALSE;
4099
4100 if (sym->section == NULL)
4101 return TRUE;
4102
4103 type_ptr = elf_symbol_from (abfd, sym);
4104 return ((type_ptr != NULL
4105 && type_ptr->internal_elf_sym.st_shndx != 0
4106 && bfd_is_abs_section (sym->section))
4107 || !(sym->section->owner == abfd
4108 || (sym->section->output_section != NULL
4109 && sym->section->output_section->owner == abfd
4110 && sym->section->output_offset == 0)
4111 || bfd_is_abs_section (sym->section)));
4112 }
4113
4114 /* Map symbol from it's internal number to the external number, moving
4115 all local symbols to be at the head of the list. */
4116
4117 static bfd_boolean
4118 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4119 {
4120 unsigned int symcount = bfd_get_symcount (abfd);
4121 asymbol **syms = bfd_get_outsymbols (abfd);
4122 asymbol **sect_syms;
4123 unsigned int num_locals = 0;
4124 unsigned int num_globals = 0;
4125 unsigned int num_locals2 = 0;
4126 unsigned int num_globals2 = 0;
4127 unsigned int max_index = 0;
4128 unsigned int idx;
4129 asection *asect;
4130 asymbol **new_syms;
4131 size_t amt;
4132
4133 #ifdef DEBUG
4134 fprintf (stderr, "elf_map_symbols\n");
4135 fflush (stderr);
4136 #endif
4137
4138 for (asect = abfd->sections; asect; asect = asect->next)
4139 {
4140 if (max_index < asect->index)
4141 max_index = asect->index;
4142 }
4143
4144 max_index++;
4145 amt = max_index * sizeof (asymbol *);
4146 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4147 if (sect_syms == NULL)
4148 return FALSE;
4149 elf_section_syms (abfd) = sect_syms;
4150 elf_num_section_syms (abfd) = max_index;
4151
4152 /* Init sect_syms entries for any section symbols we have already
4153 decided to output. */
4154 for (idx = 0; idx < symcount; idx++)
4155 {
4156 asymbol *sym = syms[idx];
4157
4158 if ((sym->flags & BSF_SECTION_SYM) != 0
4159 && sym->value == 0
4160 && !ignore_section_sym (abfd, sym)
4161 && !bfd_is_abs_section (sym->section))
4162 {
4163 asection *sec = sym->section;
4164
4165 if (sec->owner != abfd)
4166 sec = sec->output_section;
4167
4168 sect_syms[sec->index] = syms[idx];
4169 }
4170 }
4171
4172 /* Classify all of the symbols. */
4173 for (idx = 0; idx < symcount; idx++)
4174 {
4175 if (sym_is_global (abfd, syms[idx]))
4176 num_globals++;
4177 else if (!ignore_section_sym (abfd, syms[idx]))
4178 num_locals++;
4179 }
4180
4181 /* We will be adding a section symbol for each normal BFD section. Most
4182 sections will already have a section symbol in outsymbols, but
4183 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4184 at least in that case. */
4185 for (asect = abfd->sections; asect; asect = asect->next)
4186 {
4187 if (sect_syms[asect->index] == NULL)
4188 {
4189 if (!sym_is_global (abfd, asect->symbol))
4190 num_locals++;
4191 else
4192 num_globals++;
4193 }
4194 }
4195
4196 /* Now sort the symbols so the local symbols are first. */
4197 amt = (num_locals + num_globals) * sizeof (asymbol *);
4198 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4199 if (new_syms == NULL)
4200 return FALSE;
4201
4202 for (idx = 0; idx < symcount; idx++)
4203 {
4204 asymbol *sym = syms[idx];
4205 unsigned int i;
4206
4207 if (sym_is_global (abfd, sym))
4208 i = num_locals + num_globals2++;
4209 else if (!ignore_section_sym (abfd, sym))
4210 i = num_locals2++;
4211 else
4212 continue;
4213 new_syms[i] = sym;
4214 sym->udata.i = i + 1;
4215 }
4216 for (asect = abfd->sections; asect; asect = asect->next)
4217 {
4218 if (sect_syms[asect->index] == NULL)
4219 {
4220 asymbol *sym = asect->symbol;
4221 unsigned int i;
4222
4223 sect_syms[asect->index] = sym;
4224 if (!sym_is_global (abfd, sym))
4225 i = num_locals2++;
4226 else
4227 i = num_locals + num_globals2++;
4228 new_syms[i] = sym;
4229 sym->udata.i = i + 1;
4230 }
4231 }
4232
4233 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4234
4235 *pnum_locals = num_locals;
4236 return TRUE;
4237 }
4238
4239 /* Align to the maximum file alignment that could be required for any
4240 ELF data structure. */
4241
4242 static inline file_ptr
4243 align_file_position (file_ptr off, int align)
4244 {
4245 return (off + align - 1) & ~(align - 1);
4246 }
4247
4248 /* Assign a file position to a section, optionally aligning to the
4249 required section alignment. */
4250
4251 file_ptr
4252 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4253 file_ptr offset,
4254 bfd_boolean align)
4255 {
4256 if (align && i_shdrp->sh_addralign > 1)
4257 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4258 i_shdrp->sh_offset = offset;
4259 if (i_shdrp->bfd_section != NULL)
4260 i_shdrp->bfd_section->filepos = offset;
4261 if (i_shdrp->sh_type != SHT_NOBITS)
4262 offset += i_shdrp->sh_size;
4263 return offset;
4264 }
4265
4266 /* Compute the file positions we are going to put the sections at, and
4267 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4268 is not NULL, this is being called by the ELF backend linker. */
4269
4270 bfd_boolean
4271 _bfd_elf_compute_section_file_positions (bfd *abfd,
4272 struct bfd_link_info *link_info)
4273 {
4274 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4275 struct fake_section_arg fsargs;
4276 bfd_boolean failed;
4277 struct elf_strtab_hash *strtab = NULL;
4278 Elf_Internal_Shdr *shstrtab_hdr;
4279 bfd_boolean need_symtab;
4280
4281 if (abfd->output_has_begun)
4282 return TRUE;
4283
4284 /* Do any elf backend specific processing first. */
4285 if (bed->elf_backend_begin_write_processing)
4286 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4287
4288 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4289 return FALSE;
4290
4291 fsargs.failed = FALSE;
4292 fsargs.link_info = link_info;
4293 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4294 if (fsargs.failed)
4295 return FALSE;
4296
4297 if (!assign_section_numbers (abfd, link_info))
4298 return FALSE;
4299
4300 /* The backend linker builds symbol table information itself. */
4301 need_symtab = (link_info == NULL
4302 && (bfd_get_symcount (abfd) > 0
4303 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4304 == HAS_RELOC)));
4305 if (need_symtab)
4306 {
4307 /* Non-zero if doing a relocatable link. */
4308 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4309
4310 if (! swap_out_syms (abfd, &strtab, relocatable_p))
4311 return FALSE;
4312 }
4313
4314 failed = FALSE;
4315 if (link_info == NULL)
4316 {
4317 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4318 if (failed)
4319 return FALSE;
4320 }
4321
4322 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4323 /* sh_name was set in init_file_header. */
4324 shstrtab_hdr->sh_type = SHT_STRTAB;
4325 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4326 shstrtab_hdr->sh_addr = 0;
4327 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4328 shstrtab_hdr->sh_entsize = 0;
4329 shstrtab_hdr->sh_link = 0;
4330 shstrtab_hdr->sh_info = 0;
4331 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4332 shstrtab_hdr->sh_addralign = 1;
4333
4334 if (!assign_file_positions_except_relocs (abfd, link_info))
4335 return FALSE;
4336
4337 if (need_symtab)
4338 {
4339 file_ptr off;
4340 Elf_Internal_Shdr *hdr;
4341
4342 off = elf_next_file_pos (abfd);
4343
4344 hdr = & elf_symtab_hdr (abfd);
4345 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4346
4347 if (elf_symtab_shndx_list (abfd) != NULL)
4348 {
4349 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4350 if (hdr->sh_size != 0)
4351 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4352 /* FIXME: What about other symtab_shndx sections in the list ? */
4353 }
4354
4355 hdr = &elf_tdata (abfd)->strtab_hdr;
4356 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4357
4358 elf_next_file_pos (abfd) = off;
4359
4360 /* Now that we know where the .strtab section goes, write it
4361 out. */
4362 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4363 || ! _bfd_elf_strtab_emit (abfd, strtab))
4364 return FALSE;
4365 _bfd_elf_strtab_free (strtab);
4366 }
4367
4368 abfd->output_has_begun = TRUE;
4369
4370 return TRUE;
4371 }
4372
4373 /* Make an initial estimate of the size of the program header. If we
4374 get the number wrong here, we'll redo section placement. */
4375
4376 static bfd_size_type
4377 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4378 {
4379 size_t segs;
4380 asection *s;
4381 const struct elf_backend_data *bed;
4382
4383 /* Assume we will need exactly two PT_LOAD segments: one for text
4384 and one for data. */
4385 segs = 2;
4386
4387 s = bfd_get_section_by_name (abfd, ".interp");
4388 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4389 {
4390 /* If we have a loadable interpreter section, we need a
4391 PT_INTERP segment. In this case, assume we also need a
4392 PT_PHDR segment, although that may not be true for all
4393 targets. */
4394 segs += 2;
4395 }
4396
4397 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4398 {
4399 /* We need a PT_DYNAMIC segment. */
4400 ++segs;
4401 }
4402
4403 if (info != NULL && info->relro)
4404 {
4405 /* We need a PT_GNU_RELRO segment. */
4406 ++segs;
4407 }
4408
4409 if (elf_eh_frame_hdr (abfd))
4410 {
4411 /* We need a PT_GNU_EH_FRAME segment. */
4412 ++segs;
4413 }
4414
4415 if (elf_stack_flags (abfd))
4416 {
4417 /* We need a PT_GNU_STACK segment. */
4418 ++segs;
4419 }
4420
4421 s = bfd_get_section_by_name (abfd,
4422 NOTE_GNU_PROPERTY_SECTION_NAME);
4423 if (s != NULL && s->size != 0)
4424 {
4425 /* We need a PT_GNU_PROPERTY segment. */
4426 ++segs;
4427 }
4428
4429 for (s = abfd->sections; s != NULL; s = s->next)
4430 {
4431 if ((s->flags & SEC_LOAD) != 0
4432 && elf_section_type (s) == SHT_NOTE)
4433 {
4434 unsigned int alignment_power;
4435 /* We need a PT_NOTE segment. */
4436 ++segs;
4437 /* Try to create just one PT_NOTE segment for all adjacent
4438 loadable SHT_NOTE sections. gABI requires that within a
4439 PT_NOTE segment (and also inside of each SHT_NOTE section)
4440 each note should have the same alignment. So we check
4441 whether the sections are correctly aligned. */
4442 alignment_power = s->alignment_power;
4443 while (s->next != NULL
4444 && s->next->alignment_power == alignment_power
4445 && (s->next->flags & SEC_LOAD) != 0
4446 && elf_section_type (s->next) == SHT_NOTE)
4447 s = s->next;
4448 }
4449 }
4450
4451 for (s = abfd->sections; s != NULL; s = s->next)
4452 {
4453 if (s->flags & SEC_THREAD_LOCAL)
4454 {
4455 /* We need a PT_TLS segment. */
4456 ++segs;
4457 break;
4458 }
4459 }
4460
4461 bed = get_elf_backend_data (abfd);
4462
4463 if ((abfd->flags & D_PAGED) != 0
4464 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4465 {
4466 /* Add a PT_GNU_MBIND segment for each mbind section. */
4467 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4468 for (s = abfd->sections; s != NULL; s = s->next)
4469 if (elf_section_flags (s) & SHF_GNU_MBIND)
4470 {
4471 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4472 {
4473 _bfd_error_handler
4474 /* xgettext:c-format */
4475 (_("%pB: GNU_MBIND section `%pA' has invalid "
4476 "sh_info field: %d"),
4477 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4478 continue;
4479 }
4480 /* Align mbind section to page size. */
4481 if (s->alignment_power < page_align_power)
4482 s->alignment_power = page_align_power;
4483 segs ++;
4484 }
4485 }
4486
4487 /* Let the backend count up any program headers it might need. */
4488 if (bed->elf_backend_additional_program_headers)
4489 {
4490 int a;
4491
4492 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4493 if (a == -1)
4494 abort ();
4495 segs += a;
4496 }
4497
4498 return segs * bed->s->sizeof_phdr;
4499 }
4500
4501 /* Find the segment that contains the output_section of section. */
4502
4503 Elf_Internal_Phdr *
4504 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4505 {
4506 struct elf_segment_map *m;
4507 Elf_Internal_Phdr *p;
4508
4509 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4510 m != NULL;
4511 m = m->next, p++)
4512 {
4513 int i;
4514
4515 for (i = m->count - 1; i >= 0; i--)
4516 if (m->sections[i] == section)
4517 return p;
4518 }
4519
4520 return NULL;
4521 }
4522
4523 /* Create a mapping from a set of sections to a program segment. */
4524
4525 static struct elf_segment_map *
4526 make_mapping (bfd *abfd,
4527 asection **sections,
4528 unsigned int from,
4529 unsigned int to,
4530 bfd_boolean phdr)
4531 {
4532 struct elf_segment_map *m;
4533 unsigned int i;
4534 asection **hdrpp;
4535 size_t amt;
4536
4537 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4538 amt += (to - from) * sizeof (asection *);
4539 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4540 if (m == NULL)
4541 return NULL;
4542 m->next = NULL;
4543 m->p_type = PT_LOAD;
4544 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4545 m->sections[i - from] = *hdrpp;
4546 m->count = to - from;
4547
4548 if (from == 0 && phdr)
4549 {
4550 /* Include the headers in the first PT_LOAD segment. */
4551 m->includes_filehdr = 1;
4552 m->includes_phdrs = 1;
4553 }
4554
4555 return m;
4556 }
4557
4558 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4559 on failure. */
4560
4561 struct elf_segment_map *
4562 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4563 {
4564 struct elf_segment_map *m;
4565
4566 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4567 sizeof (struct elf_segment_map));
4568 if (m == NULL)
4569 return NULL;
4570 m->next = NULL;
4571 m->p_type = PT_DYNAMIC;
4572 m->count = 1;
4573 m->sections[0] = dynsec;
4574
4575 return m;
4576 }
4577
4578 /* Possibly add or remove segments from the segment map. */
4579
4580 static bfd_boolean
4581 elf_modify_segment_map (bfd *abfd,
4582 struct bfd_link_info *info,
4583 bfd_boolean remove_empty_load)
4584 {
4585 struct elf_segment_map **m;
4586 const struct elf_backend_data *bed;
4587
4588 /* The placement algorithm assumes that non allocated sections are
4589 not in PT_LOAD segments. We ensure this here by removing such
4590 sections from the segment map. We also remove excluded
4591 sections. Finally, any PT_LOAD segment without sections is
4592 removed. */
4593 m = &elf_seg_map (abfd);
4594 while (*m)
4595 {
4596 unsigned int i, new_count;
4597
4598 for (new_count = 0, i = 0; i < (*m)->count; i++)
4599 {
4600 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4601 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4602 || (*m)->p_type != PT_LOAD))
4603 {
4604 (*m)->sections[new_count] = (*m)->sections[i];
4605 new_count++;
4606 }
4607 }
4608 (*m)->count = new_count;
4609
4610 if (remove_empty_load
4611 && (*m)->p_type == PT_LOAD
4612 && (*m)->count == 0
4613 && !(*m)->includes_phdrs)
4614 *m = (*m)->next;
4615 else
4616 m = &(*m)->next;
4617 }
4618
4619 bed = get_elf_backend_data (abfd);
4620 if (bed->elf_backend_modify_segment_map != NULL)
4621 {
4622 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4623 return FALSE;
4624 }
4625
4626 return TRUE;
4627 }
4628
4629 #define IS_TBSS(s) \
4630 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4631
4632 /* Set up a mapping from BFD sections to program segments. */
4633
4634 bfd_boolean
4635 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4636 {
4637 unsigned int count;
4638 struct elf_segment_map *m;
4639 asection **sections = NULL;
4640 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4641 bfd_boolean no_user_phdrs;
4642
4643 no_user_phdrs = elf_seg_map (abfd) == NULL;
4644
4645 if (info != NULL)
4646 info->user_phdrs = !no_user_phdrs;
4647
4648 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4649 {
4650 asection *s;
4651 unsigned int i;
4652 struct elf_segment_map *mfirst;
4653 struct elf_segment_map **pm;
4654 asection *last_hdr;
4655 bfd_vma last_size;
4656 unsigned int hdr_index;
4657 bfd_vma maxpagesize;
4658 asection **hdrpp;
4659 bfd_boolean phdr_in_segment;
4660 bfd_boolean writable;
4661 bfd_boolean executable;
4662 unsigned int tls_count = 0;
4663 asection *first_tls = NULL;
4664 asection *first_mbind = NULL;
4665 asection *dynsec, *eh_frame_hdr;
4666 size_t amt;
4667 bfd_vma addr_mask, wrap_to = 0;
4668 bfd_size_type phdr_size;
4669
4670 /* Select the allocated sections, and sort them. */
4671
4672 amt = bfd_count_sections (abfd) * sizeof (asection *);
4673 sections = (asection **) bfd_malloc (amt);
4674 if (sections == NULL)
4675 goto error_return;
4676
4677 /* Calculate top address, avoiding undefined behaviour of shift
4678 left operator when shift count is equal to size of type
4679 being shifted. */
4680 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4681 addr_mask = (addr_mask << 1) + 1;
4682
4683 i = 0;
4684 for (s = abfd->sections; s != NULL; s = s->next)
4685 {
4686 if ((s->flags & SEC_ALLOC) != 0)
4687 {
4688 /* target_index is unused until bfd_elf_final_link
4689 starts output of section symbols. Use it to make
4690 qsort stable. */
4691 s->target_index = i;
4692 sections[i] = s;
4693 ++i;
4694 /* A wrapping section potentially clashes with header. */
4695 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4696 wrap_to = (s->lma + s->size) & addr_mask;
4697 }
4698 }
4699 BFD_ASSERT (i <= bfd_count_sections (abfd));
4700 count = i;
4701
4702 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4703
4704 phdr_size = elf_program_header_size (abfd);
4705 if (phdr_size == (bfd_size_type) -1)
4706 phdr_size = get_program_header_size (abfd, info);
4707 phdr_size += bed->s->sizeof_ehdr;
4708 maxpagesize = bed->maxpagesize;
4709 if (maxpagesize == 0)
4710 maxpagesize = 1;
4711 phdr_in_segment = info != NULL && info->load_phdrs;
4712 if (count != 0
4713 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4714 >= (phdr_size & (maxpagesize - 1))))
4715 /* For compatibility with old scripts that may not be using
4716 SIZEOF_HEADERS, add headers when it looks like space has
4717 been left for them. */
4718 phdr_in_segment = TRUE;
4719
4720 /* Build the mapping. */
4721 mfirst = NULL;
4722 pm = &mfirst;
4723
4724 /* If we have a .interp section, then create a PT_PHDR segment for
4725 the program headers and a PT_INTERP segment for the .interp
4726 section. */
4727 s = bfd_get_section_by_name (abfd, ".interp");
4728 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4729 {
4730 amt = sizeof (struct elf_segment_map);
4731 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4732 if (m == NULL)
4733 goto error_return;
4734 m->next = NULL;
4735 m->p_type = PT_PHDR;
4736 m->p_flags = PF_R;
4737 m->p_flags_valid = 1;
4738 m->includes_phdrs = 1;
4739 phdr_in_segment = TRUE;
4740 *pm = m;
4741 pm = &m->next;
4742
4743 amt = sizeof (struct elf_segment_map);
4744 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4745 if (m == NULL)
4746 goto error_return;
4747 m->next = NULL;
4748 m->p_type = PT_INTERP;
4749 m->count = 1;
4750 m->sections[0] = s;
4751
4752 *pm = m;
4753 pm = &m->next;
4754 }
4755
4756 /* Look through the sections. We put sections in the same program
4757 segment when the start of the second section can be placed within
4758 a few bytes of the end of the first section. */
4759 last_hdr = NULL;
4760 last_size = 0;
4761 hdr_index = 0;
4762 writable = FALSE;
4763 executable = FALSE;
4764 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4765 if (dynsec != NULL
4766 && (dynsec->flags & SEC_LOAD) == 0)
4767 dynsec = NULL;
4768
4769 if ((abfd->flags & D_PAGED) == 0)
4770 phdr_in_segment = FALSE;
4771
4772 /* Deal with -Ttext or something similar such that the first section
4773 is not adjacent to the program headers. This is an
4774 approximation, since at this point we don't know exactly how many
4775 program headers we will need. */
4776 if (phdr_in_segment && count > 0)
4777 {
4778 bfd_vma phdr_lma;
4779 bfd_boolean separate_phdr = FALSE;
4780
4781 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4782 if (info != NULL
4783 && info->separate_code
4784 && (sections[0]->flags & SEC_CODE) != 0)
4785 {
4786 /* If data sections should be separate from code and
4787 thus not executable, and the first section is
4788 executable then put the file and program headers in
4789 their own PT_LOAD. */
4790 separate_phdr = TRUE;
4791 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4792 == (sections[0]->lma & addr_mask & -maxpagesize)))
4793 {
4794 /* The file and program headers are currently on the
4795 same page as the first section. Put them on the
4796 previous page if we can. */
4797 if (phdr_lma >= maxpagesize)
4798 phdr_lma -= maxpagesize;
4799 else
4800 separate_phdr = FALSE;
4801 }
4802 }
4803 if ((sections[0]->lma & addr_mask) < phdr_lma
4804 || (sections[0]->lma & addr_mask) < phdr_size)
4805 /* If file and program headers would be placed at the end
4806 of memory then it's probably better to omit them. */
4807 phdr_in_segment = FALSE;
4808 else if (phdr_lma < wrap_to)
4809 /* If a section wraps around to where we'll be placing
4810 file and program headers, then the headers will be
4811 overwritten. */
4812 phdr_in_segment = FALSE;
4813 else if (separate_phdr)
4814 {
4815 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4816 if (m == NULL)
4817 goto error_return;
4818 m->p_paddr = phdr_lma;
4819 m->p_vaddr_offset
4820 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4821 m->p_paddr_valid = 1;
4822 *pm = m;
4823 pm = &m->next;
4824 phdr_in_segment = FALSE;
4825 }
4826 }
4827
4828 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4829 {
4830 asection *hdr;
4831 bfd_boolean new_segment;
4832
4833 hdr = *hdrpp;
4834
4835 /* See if this section and the last one will fit in the same
4836 segment. */
4837
4838 if (last_hdr == NULL)
4839 {
4840 /* If we don't have a segment yet, then we don't need a new
4841 one (we build the last one after this loop). */
4842 new_segment = FALSE;
4843 }
4844 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4845 {
4846 /* If this section has a different relation between the
4847 virtual address and the load address, then we need a new
4848 segment. */
4849 new_segment = TRUE;
4850 }
4851 else if (hdr->lma < last_hdr->lma + last_size
4852 || last_hdr->lma + last_size < last_hdr->lma)
4853 {
4854 /* If this section has a load address that makes it overlap
4855 the previous section, then we need a new segment. */
4856 new_segment = TRUE;
4857 }
4858 else if ((abfd->flags & D_PAGED) != 0
4859 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4860 == (hdr->lma & -maxpagesize)))
4861 {
4862 /* If we are demand paged then we can't map two disk
4863 pages onto the same memory page. */
4864 new_segment = FALSE;
4865 }
4866 /* In the next test we have to be careful when last_hdr->lma is close
4867 to the end of the address space. If the aligned address wraps
4868 around to the start of the address space, then there are no more
4869 pages left in memory and it is OK to assume that the current
4870 section can be included in the current segment. */
4871 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4872 + maxpagesize > last_hdr->lma)
4873 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4874 + maxpagesize <= hdr->lma))
4875 {
4876 /* If putting this section in this segment would force us to
4877 skip a page in the segment, then we need a new segment. */
4878 new_segment = TRUE;
4879 }
4880 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4881 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4882 {
4883 /* We don't want to put a loaded section after a
4884 nonloaded (ie. bss style) section in the same segment
4885 as that will force the non-loaded section to be loaded.
4886 Consider .tbss sections as loaded for this purpose. */
4887 new_segment = TRUE;
4888 }
4889 else if ((abfd->flags & D_PAGED) == 0)
4890 {
4891 /* If the file is not demand paged, which means that we
4892 don't require the sections to be correctly aligned in the
4893 file, then there is no other reason for a new segment. */
4894 new_segment = FALSE;
4895 }
4896 else if (info != NULL
4897 && info->separate_code
4898 && executable != ((hdr->flags & SEC_CODE) != 0))
4899 {
4900 new_segment = TRUE;
4901 }
4902 else if (! writable
4903 && (hdr->flags & SEC_READONLY) == 0)
4904 {
4905 /* We don't want to put a writable section in a read only
4906 segment. */
4907 new_segment = TRUE;
4908 }
4909 else
4910 {
4911 /* Otherwise, we can use the same segment. */
4912 new_segment = FALSE;
4913 }
4914
4915 /* Allow interested parties a chance to override our decision. */
4916 if (last_hdr != NULL
4917 && info != NULL
4918 && info->callbacks->override_segment_assignment != NULL)
4919 new_segment
4920 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4921 last_hdr,
4922 new_segment);
4923
4924 if (! new_segment)
4925 {
4926 if ((hdr->flags & SEC_READONLY) == 0)
4927 writable = TRUE;
4928 if ((hdr->flags & SEC_CODE) != 0)
4929 executable = TRUE;
4930 last_hdr = hdr;
4931 /* .tbss sections effectively have zero size. */
4932 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4933 continue;
4934 }
4935
4936 /* We need a new program segment. We must create a new program
4937 header holding all the sections from hdr_index until hdr. */
4938
4939 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4940 if (m == NULL)
4941 goto error_return;
4942
4943 *pm = m;
4944 pm = &m->next;
4945
4946 if ((hdr->flags & SEC_READONLY) == 0)
4947 writable = TRUE;
4948 else
4949 writable = FALSE;
4950
4951 if ((hdr->flags & SEC_CODE) == 0)
4952 executable = FALSE;
4953 else
4954 executable = TRUE;
4955
4956 last_hdr = hdr;
4957 /* .tbss sections effectively have zero size. */
4958 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4959 hdr_index = i;
4960 phdr_in_segment = FALSE;
4961 }
4962
4963 /* Create a final PT_LOAD program segment, but not if it's just
4964 for .tbss. */
4965 if (last_hdr != NULL
4966 && (i - hdr_index != 1
4967 || !IS_TBSS (last_hdr)))
4968 {
4969 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4970 if (m == NULL)
4971 goto error_return;
4972
4973 *pm = m;
4974 pm = &m->next;
4975 }
4976
4977 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4978 if (dynsec != NULL)
4979 {
4980 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4981 if (m == NULL)
4982 goto error_return;
4983 *pm = m;
4984 pm = &m->next;
4985 }
4986
4987 /* For each batch of consecutive loadable SHT_NOTE sections,
4988 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4989 because if we link together nonloadable .note sections and
4990 loadable .note sections, we will generate two .note sections
4991 in the output file. */
4992 for (s = abfd->sections; s != NULL; s = s->next)
4993 {
4994 if ((s->flags & SEC_LOAD) != 0
4995 && elf_section_type (s) == SHT_NOTE)
4996 {
4997 asection *s2;
4998 unsigned int alignment_power = s->alignment_power;
4999
5000 count = 1;
5001 for (s2 = s; s2->next != NULL; s2 = s2->next)
5002 {
5003 if (s2->next->alignment_power == alignment_power
5004 && (s2->next->flags & SEC_LOAD) != 0
5005 && elf_section_type (s2->next) == SHT_NOTE
5006 && align_power (s2->lma + s2->size,
5007 alignment_power)
5008 == s2->next->lma)
5009 count++;
5010 else
5011 break;
5012 }
5013 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5014 amt += count * sizeof (asection *);
5015 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5016 if (m == NULL)
5017 goto error_return;
5018 m->next = NULL;
5019 m->p_type = PT_NOTE;
5020 m->count = count;
5021 while (count > 1)
5022 {
5023 m->sections[m->count - count--] = s;
5024 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5025 s = s->next;
5026 }
5027 m->sections[m->count - 1] = s;
5028 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5029 *pm = m;
5030 pm = &m->next;
5031 }
5032 if (s->flags & SEC_THREAD_LOCAL)
5033 {
5034 if (! tls_count)
5035 first_tls = s;
5036 tls_count++;
5037 }
5038 if (first_mbind == NULL
5039 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5040 first_mbind = s;
5041 }
5042
5043 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5044 if (tls_count > 0)
5045 {
5046 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5047 amt += tls_count * sizeof (asection *);
5048 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5049 if (m == NULL)
5050 goto error_return;
5051 m->next = NULL;
5052 m->p_type = PT_TLS;
5053 m->count = tls_count;
5054 /* Mandated PF_R. */
5055 m->p_flags = PF_R;
5056 m->p_flags_valid = 1;
5057 s = first_tls;
5058 for (i = 0; i < tls_count; ++i)
5059 {
5060 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5061 {
5062 _bfd_error_handler
5063 (_("%pB: TLS sections are not adjacent:"), abfd);
5064 s = first_tls;
5065 i = 0;
5066 while (i < tls_count)
5067 {
5068 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5069 {
5070 _bfd_error_handler (_(" TLS: %pA"), s);
5071 i++;
5072 }
5073 else
5074 _bfd_error_handler (_(" non-TLS: %pA"), s);
5075 s = s->next;
5076 }
5077 bfd_set_error (bfd_error_bad_value);
5078 goto error_return;
5079 }
5080 m->sections[i] = s;
5081 s = s->next;
5082 }
5083
5084 *pm = m;
5085 pm = &m->next;
5086 }
5087
5088 if (first_mbind
5089 && (abfd->flags & D_PAGED) != 0
5090 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5091 for (s = first_mbind; s != NULL; s = s->next)
5092 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5093 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5094 {
5095 /* Mandated PF_R. */
5096 unsigned long p_flags = PF_R;
5097 if ((s->flags & SEC_READONLY) == 0)
5098 p_flags |= PF_W;
5099 if ((s->flags & SEC_CODE) != 0)
5100 p_flags |= PF_X;
5101
5102 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5103 m = bfd_zalloc (abfd, amt);
5104 if (m == NULL)
5105 goto error_return;
5106 m->next = NULL;
5107 m->p_type = (PT_GNU_MBIND_LO
5108 + elf_section_data (s)->this_hdr.sh_info);
5109 m->count = 1;
5110 m->p_flags_valid = 1;
5111 m->sections[0] = s;
5112 m->p_flags = p_flags;
5113
5114 *pm = m;
5115 pm = &m->next;
5116 }
5117
5118 s = bfd_get_section_by_name (abfd,
5119 NOTE_GNU_PROPERTY_SECTION_NAME);
5120 if (s != NULL && s->size != 0)
5121 {
5122 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5123 m = bfd_zalloc (abfd, amt);
5124 if (m == NULL)
5125 goto error_return;
5126 m->next = NULL;
5127 m->p_type = PT_GNU_PROPERTY;
5128 m->count = 1;
5129 m->p_flags_valid = 1;
5130 m->sections[0] = s;
5131 m->p_flags = PF_R;
5132 *pm = m;
5133 pm = &m->next;
5134 }
5135
5136 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5137 segment. */
5138 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5139 if (eh_frame_hdr != NULL
5140 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5141 {
5142 amt = sizeof (struct elf_segment_map);
5143 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5144 if (m == NULL)
5145 goto error_return;
5146 m->next = NULL;
5147 m->p_type = PT_GNU_EH_FRAME;
5148 m->count = 1;
5149 m->sections[0] = eh_frame_hdr->output_section;
5150
5151 *pm = m;
5152 pm = &m->next;
5153 }
5154
5155 if (elf_stack_flags (abfd))
5156 {
5157 amt = sizeof (struct elf_segment_map);
5158 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5159 if (m == NULL)
5160 goto error_return;
5161 m->next = NULL;
5162 m->p_type = PT_GNU_STACK;
5163 m->p_flags = elf_stack_flags (abfd);
5164 m->p_align = bed->stack_align;
5165 m->p_flags_valid = 1;
5166 m->p_align_valid = m->p_align != 0;
5167 if (info->stacksize > 0)
5168 {
5169 m->p_size = info->stacksize;
5170 m->p_size_valid = 1;
5171 }
5172
5173 *pm = m;
5174 pm = &m->next;
5175 }
5176
5177 if (info != NULL && info->relro)
5178 {
5179 for (m = mfirst; m != NULL; m = m->next)
5180 {
5181 if (m->p_type == PT_LOAD
5182 && m->count != 0
5183 && m->sections[0]->vma >= info->relro_start
5184 && m->sections[0]->vma < info->relro_end)
5185 {
5186 i = m->count;
5187 while (--i != (unsigned) -1)
5188 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5189 == (SEC_LOAD | SEC_HAS_CONTENTS))
5190 break;
5191
5192 if (i != (unsigned) -1)
5193 break;
5194 }
5195 }
5196
5197 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5198 if (m != NULL)
5199 {
5200 amt = sizeof (struct elf_segment_map);
5201 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5202 if (m == NULL)
5203 goto error_return;
5204 m->next = NULL;
5205 m->p_type = PT_GNU_RELRO;
5206 *pm = m;
5207 pm = &m->next;
5208 }
5209 }
5210
5211 free (sections);
5212 elf_seg_map (abfd) = mfirst;
5213 }
5214
5215 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5216 return FALSE;
5217
5218 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5219 ++count;
5220 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5221
5222 return TRUE;
5223
5224 error_return:
5225 if (sections != NULL)
5226 free (sections);
5227 return FALSE;
5228 }
5229
5230 /* Sort sections by address. */
5231
5232 static int
5233 elf_sort_sections (const void *arg1, const void *arg2)
5234 {
5235 const asection *sec1 = *(const asection **) arg1;
5236 const asection *sec2 = *(const asection **) arg2;
5237 bfd_size_type size1, size2;
5238
5239 /* Sort by LMA first, since this is the address used to
5240 place the section into a segment. */
5241 if (sec1->lma < sec2->lma)
5242 return -1;
5243 else if (sec1->lma > sec2->lma)
5244 return 1;
5245
5246 /* Then sort by VMA. Normally the LMA and the VMA will be
5247 the same, and this will do nothing. */
5248 if (sec1->vma < sec2->vma)
5249 return -1;
5250 else if (sec1->vma > sec2->vma)
5251 return 1;
5252
5253 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5254
5255 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5256
5257 if (TOEND (sec1))
5258 {
5259 if (!TOEND (sec2))
5260 return 1;
5261 }
5262 else if (TOEND (sec2))
5263 return -1;
5264
5265 #undef TOEND
5266
5267 /* Sort by size, to put zero sized sections
5268 before others at the same address. */
5269
5270 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5271 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5272
5273 if (size1 < size2)
5274 return -1;
5275 if (size1 > size2)
5276 return 1;
5277
5278 return sec1->target_index - sec2->target_index;
5279 }
5280
5281 /* This qsort comparison functions sorts PT_LOAD segments first and
5282 by p_paddr, for assign_file_positions_for_load_sections. */
5283
5284 static int
5285 elf_sort_segments (const void *arg1, const void *arg2)
5286 {
5287 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5288 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5289
5290 if (m1->p_type != m2->p_type)
5291 {
5292 if (m1->p_type == PT_NULL)
5293 return 1;
5294 if (m2->p_type == PT_NULL)
5295 return -1;
5296 return m1->p_type < m2->p_type ? -1 : 1;
5297 }
5298 if (m1->includes_filehdr != m2->includes_filehdr)
5299 return m1->includes_filehdr ? -1 : 1;
5300 if (m1->no_sort_lma != m2->no_sort_lma)
5301 return m1->no_sort_lma ? -1 : 1;
5302 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5303 {
5304 bfd_vma lma1, lma2;
5305 lma1 = 0;
5306 if (m1->p_paddr_valid)
5307 lma1 = m1->p_paddr;
5308 else if (m1->count != 0)
5309 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5310 lma2 = 0;
5311 if (m2->p_paddr_valid)
5312 lma2 = m2->p_paddr;
5313 else if (m2->count != 0)
5314 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5315 if (lma1 != lma2)
5316 return lma1 < lma2 ? -1 : 1;
5317 }
5318 if (m1->idx != m2->idx)
5319 return m1->idx < m2->idx ? -1 : 1;
5320 return 0;
5321 }
5322
5323 /* Ian Lance Taylor writes:
5324
5325 We shouldn't be using % with a negative signed number. That's just
5326 not good. We have to make sure either that the number is not
5327 negative, or that the number has an unsigned type. When the types
5328 are all the same size they wind up as unsigned. When file_ptr is a
5329 larger signed type, the arithmetic winds up as signed long long,
5330 which is wrong.
5331
5332 What we're trying to say here is something like ``increase OFF by
5333 the least amount that will cause it to be equal to the VMA modulo
5334 the page size.'' */
5335 /* In other words, something like:
5336
5337 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5338 off_offset = off % bed->maxpagesize;
5339 if (vma_offset < off_offset)
5340 adjustment = vma_offset + bed->maxpagesize - off_offset;
5341 else
5342 adjustment = vma_offset - off_offset;
5343
5344 which can be collapsed into the expression below. */
5345
5346 static file_ptr
5347 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5348 {
5349 /* PR binutils/16199: Handle an alignment of zero. */
5350 if (maxpagesize == 0)
5351 maxpagesize = 1;
5352 return ((vma - off) % maxpagesize);
5353 }
5354
5355 static void
5356 print_segment_map (const struct elf_segment_map *m)
5357 {
5358 unsigned int j;
5359 const char *pt = get_segment_type (m->p_type);
5360 char buf[32];
5361
5362 if (pt == NULL)
5363 {
5364 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5365 sprintf (buf, "LOPROC+%7.7x",
5366 (unsigned int) (m->p_type - PT_LOPROC));
5367 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5368 sprintf (buf, "LOOS+%7.7x",
5369 (unsigned int) (m->p_type - PT_LOOS));
5370 else
5371 snprintf (buf, sizeof (buf), "%8.8x",
5372 (unsigned int) m->p_type);
5373 pt = buf;
5374 }
5375 fflush (stdout);
5376 fprintf (stderr, "%s:", pt);
5377 for (j = 0; j < m->count; j++)
5378 fprintf (stderr, " %s", m->sections [j]->name);
5379 putc ('\n',stderr);
5380 fflush (stderr);
5381 }
5382
5383 static bfd_boolean
5384 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5385 {
5386 void *buf;
5387 bfd_boolean ret;
5388
5389 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5390 return FALSE;
5391 buf = bfd_zmalloc (len);
5392 if (buf == NULL)
5393 return FALSE;
5394 ret = bfd_bwrite (buf, len, abfd) == len;
5395 free (buf);
5396 return ret;
5397 }
5398
5399 /* Assign file positions to the sections based on the mapping from
5400 sections to segments. This function also sets up some fields in
5401 the file header. */
5402
5403 static bfd_boolean
5404 assign_file_positions_for_load_sections (bfd *abfd,
5405 struct bfd_link_info *link_info)
5406 {
5407 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5408 struct elf_segment_map *m;
5409 struct elf_segment_map *phdr_load_seg;
5410 Elf_Internal_Phdr *phdrs;
5411 Elf_Internal_Phdr *p;
5412 file_ptr off;
5413 bfd_size_type maxpagesize;
5414 unsigned int alloc, actual;
5415 unsigned int i, j;
5416 struct elf_segment_map **sorted_seg_map;
5417
5418 if (link_info == NULL
5419 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5420 return FALSE;
5421
5422 alloc = 0;
5423 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5424 m->idx = alloc++;
5425
5426 if (alloc)
5427 {
5428 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5429 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5430 }
5431 else
5432 {
5433 /* PR binutils/12467. */
5434 elf_elfheader (abfd)->e_phoff = 0;
5435 elf_elfheader (abfd)->e_phentsize = 0;
5436 }
5437
5438 elf_elfheader (abfd)->e_phnum = alloc;
5439
5440 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5441 {
5442 actual = alloc;
5443 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5444 }
5445 else
5446 {
5447 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5448 BFD_ASSERT (elf_program_header_size (abfd)
5449 == actual * bed->s->sizeof_phdr);
5450 BFD_ASSERT (actual >= alloc);
5451 }
5452
5453 if (alloc == 0)
5454 {
5455 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5456 return TRUE;
5457 }
5458
5459 /* We're writing the size in elf_program_header_size (abfd),
5460 see assign_file_positions_except_relocs, so make sure we have
5461 that amount allocated, with trailing space cleared.
5462 The variable alloc contains the computed need, while
5463 elf_program_header_size (abfd) contains the size used for the
5464 layout.
5465 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5466 where the layout is forced to according to a larger size in the
5467 last iterations for the testcase ld-elf/header. */
5468 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5469 + alloc * sizeof (*sorted_seg_map)));
5470 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5471 elf_tdata (abfd)->phdr = phdrs;
5472 if (phdrs == NULL)
5473 return FALSE;
5474
5475 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5476 {
5477 sorted_seg_map[j] = m;
5478 /* If elf_segment_map is not from map_sections_to_segments, the
5479 sections may not be correctly ordered. NOTE: sorting should
5480 not be done to the PT_NOTE section of a corefile, which may
5481 contain several pseudo-sections artificially created by bfd.
5482 Sorting these pseudo-sections breaks things badly. */
5483 if (m->count > 1
5484 && !(elf_elfheader (abfd)->e_type == ET_CORE
5485 && m->p_type == PT_NOTE))
5486 {
5487 for (i = 0; i < m->count; i++)
5488 m->sections[i]->target_index = i;
5489 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5490 elf_sort_sections);
5491 }
5492 }
5493 if (alloc > 1)
5494 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5495 elf_sort_segments);
5496
5497 maxpagesize = 1;
5498 if ((abfd->flags & D_PAGED) != 0)
5499 maxpagesize = bed->maxpagesize;
5500
5501 /* Sections must map to file offsets past the ELF file header. */
5502 off = bed->s->sizeof_ehdr;
5503 /* And if one of the PT_LOAD headers doesn't include the program
5504 headers then we'll be mapping program headers in the usual
5505 position after the ELF file header. */
5506 phdr_load_seg = NULL;
5507 for (j = 0; j < alloc; j++)
5508 {
5509 m = sorted_seg_map[j];
5510 if (m->p_type != PT_LOAD)
5511 break;
5512 if (m->includes_phdrs)
5513 {
5514 phdr_load_seg = m;
5515 break;
5516 }
5517 }
5518 if (phdr_load_seg == NULL)
5519 off += actual * bed->s->sizeof_phdr;
5520
5521 for (j = 0; j < alloc; j++)
5522 {
5523 asection **secpp;
5524 bfd_vma off_adjust;
5525 bfd_boolean no_contents;
5526
5527 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5528 number of sections with contents contributing to both p_filesz
5529 and p_memsz, followed by a number of sections with no contents
5530 that just contribute to p_memsz. In this loop, OFF tracks next
5531 available file offset for PT_LOAD and PT_NOTE segments. */
5532 m = sorted_seg_map[j];
5533 p = phdrs + m->idx;
5534 p->p_type = m->p_type;
5535 p->p_flags = m->p_flags;
5536
5537 if (m->count == 0)
5538 p->p_vaddr = m->p_vaddr_offset;
5539 else
5540 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
5541
5542 if (m->p_paddr_valid)
5543 p->p_paddr = m->p_paddr;
5544 else if (m->count == 0)
5545 p->p_paddr = 0;
5546 else
5547 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
5548
5549 if (p->p_type == PT_LOAD
5550 && (abfd->flags & D_PAGED) != 0)
5551 {
5552 /* p_align in demand paged PT_LOAD segments effectively stores
5553 the maximum page size. When copying an executable with
5554 objcopy, we set m->p_align from the input file. Use this
5555 value for maxpagesize rather than bed->maxpagesize, which
5556 may be different. Note that we use maxpagesize for PT_TLS
5557 segment alignment later in this function, so we are relying
5558 on at least one PT_LOAD segment appearing before a PT_TLS
5559 segment. */
5560 if (m->p_align_valid)
5561 maxpagesize = m->p_align;
5562
5563 p->p_align = maxpagesize;
5564 }
5565 else if (m->p_align_valid)
5566 p->p_align = m->p_align;
5567 else if (m->count == 0)
5568 p->p_align = 1 << bed->s->log_file_align;
5569
5570 if (m == phdr_load_seg)
5571 {
5572 if (!m->includes_filehdr)
5573 p->p_offset = off;
5574 off += actual * bed->s->sizeof_phdr;
5575 }
5576
5577 no_contents = FALSE;
5578 off_adjust = 0;
5579 if (p->p_type == PT_LOAD
5580 && m->count > 0)
5581 {
5582 bfd_size_type align;
5583 unsigned int align_power = 0;
5584
5585 if (m->p_align_valid)
5586 align = p->p_align;
5587 else
5588 {
5589 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5590 {
5591 unsigned int secalign;
5592
5593 secalign = bfd_section_alignment (*secpp);
5594 if (secalign > align_power)
5595 align_power = secalign;
5596 }
5597 align = (bfd_size_type) 1 << align_power;
5598 if (align < maxpagesize)
5599 align = maxpagesize;
5600 }
5601
5602 for (i = 0; i < m->count; i++)
5603 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5604 /* If we aren't making room for this section, then
5605 it must be SHT_NOBITS regardless of what we've
5606 set via struct bfd_elf_special_section. */
5607 elf_section_type (m->sections[i]) = SHT_NOBITS;
5608
5609 /* Find out whether this segment contains any loadable
5610 sections. */
5611 no_contents = TRUE;
5612 for (i = 0; i < m->count; i++)
5613 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5614 {
5615 no_contents = FALSE;
5616 break;
5617 }
5618
5619 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
5620
5621 /* Broken hardware and/or kernel require that files do not
5622 map the same page with different permissions on some hppa
5623 processors. */
5624 if (j != 0
5625 && (abfd->flags & D_PAGED) != 0
5626 && bed->no_page_alias
5627 && (off & (maxpagesize - 1)) != 0
5628 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5629 off_adjust += maxpagesize;
5630 off += off_adjust;
5631 if (no_contents)
5632 {
5633 /* We shouldn't need to align the segment on disk since
5634 the segment doesn't need file space, but the gABI
5635 arguably requires the alignment and glibc ld.so
5636 checks it. So to comply with the alignment
5637 requirement but not waste file space, we adjust
5638 p_offset for just this segment. (OFF_ADJUST is
5639 subtracted from OFF later.) This may put p_offset
5640 past the end of file, but that shouldn't matter. */
5641 }
5642 else
5643 off_adjust = 0;
5644 }
5645 /* Make sure the .dynamic section is the first section in the
5646 PT_DYNAMIC segment. */
5647 else if (p->p_type == PT_DYNAMIC
5648 && m->count > 1
5649 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5650 {
5651 _bfd_error_handler
5652 (_("%pB: The first section in the PT_DYNAMIC segment"
5653 " is not the .dynamic section"),
5654 abfd);
5655 bfd_set_error (bfd_error_bad_value);
5656 return FALSE;
5657 }
5658 /* Set the note section type to SHT_NOTE. */
5659 else if (p->p_type == PT_NOTE)
5660 for (i = 0; i < m->count; i++)
5661 elf_section_type (m->sections[i]) = SHT_NOTE;
5662
5663 if (m->includes_filehdr)
5664 {
5665 if (!m->p_flags_valid)
5666 p->p_flags |= PF_R;
5667 p->p_filesz = bed->s->sizeof_ehdr;
5668 p->p_memsz = bed->s->sizeof_ehdr;
5669 if (p->p_type == PT_LOAD)
5670 {
5671 if (m->count > 0)
5672 {
5673 if (p->p_vaddr < (bfd_vma) off
5674 || (!m->p_paddr_valid
5675 && p->p_paddr < (bfd_vma) off))
5676 {
5677 _bfd_error_handler
5678 (_("%pB: not enough room for program headers,"
5679 " try linking with -N"),
5680 abfd);
5681 bfd_set_error (bfd_error_bad_value);
5682 return FALSE;
5683 }
5684 p->p_vaddr -= off;
5685 if (!m->p_paddr_valid)
5686 p->p_paddr -= off;
5687 }
5688 }
5689 else if (sorted_seg_map[0]->includes_filehdr)
5690 {
5691 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5692 p->p_vaddr = filehdr->p_vaddr;
5693 if (!m->p_paddr_valid)
5694 p->p_paddr = filehdr->p_paddr;
5695 }
5696 }
5697
5698 if (m->includes_phdrs)
5699 {
5700 if (!m->p_flags_valid)
5701 p->p_flags |= PF_R;
5702 p->p_filesz += actual * bed->s->sizeof_phdr;
5703 p->p_memsz += actual * bed->s->sizeof_phdr;
5704 if (!m->includes_filehdr)
5705 {
5706 if (p->p_type == PT_LOAD)
5707 {
5708 elf_elfheader (abfd)->e_phoff = p->p_offset;
5709 if (m->count > 0)
5710 {
5711 p->p_vaddr -= off - p->p_offset;
5712 if (!m->p_paddr_valid)
5713 p->p_paddr -= off - p->p_offset;
5714 }
5715 }
5716 else if (phdr_load_seg != NULL)
5717 {
5718 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5719 bfd_vma phdr_off = 0;
5720 if (phdr_load_seg->includes_filehdr)
5721 phdr_off = bed->s->sizeof_ehdr;
5722 p->p_vaddr = phdr->p_vaddr + phdr_off;
5723 if (!m->p_paddr_valid)
5724 p->p_paddr = phdr->p_paddr + phdr_off;
5725 p->p_offset = phdr->p_offset + phdr_off;
5726 }
5727 else
5728 p->p_offset = bed->s->sizeof_ehdr;
5729 }
5730 }
5731
5732 if (p->p_type == PT_LOAD
5733 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5734 {
5735 if (!m->includes_filehdr && !m->includes_phdrs)
5736 {
5737 p->p_offset = off;
5738 if (no_contents)
5739 {
5740 /* Put meaningless p_offset for PT_LOAD segments
5741 without file contents somewhere within the first
5742 page, in an attempt to not point past EOF. */
5743 bfd_size_type align = maxpagesize;
5744 if (align < p->p_align)
5745 align = p->p_align;
5746 if (align < 1)
5747 align = 1;
5748 p->p_offset = off % align;
5749 }
5750 }
5751 else
5752 {
5753 file_ptr adjust;
5754
5755 adjust = off - (p->p_offset + p->p_filesz);
5756 if (!no_contents)
5757 p->p_filesz += adjust;
5758 p->p_memsz += adjust;
5759 }
5760 }
5761
5762 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5763 maps. Set filepos for sections in PT_LOAD segments, and in
5764 core files, for sections in PT_NOTE segments.
5765 assign_file_positions_for_non_load_sections will set filepos
5766 for other sections and update p_filesz for other segments. */
5767 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5768 {
5769 asection *sec;
5770 bfd_size_type align;
5771 Elf_Internal_Shdr *this_hdr;
5772
5773 sec = *secpp;
5774 this_hdr = &elf_section_data (sec)->this_hdr;
5775 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5776
5777 if ((p->p_type == PT_LOAD
5778 || p->p_type == PT_TLS)
5779 && (this_hdr->sh_type != SHT_NOBITS
5780 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5781 && ((this_hdr->sh_flags & SHF_TLS) == 0
5782 || p->p_type == PT_TLS))))
5783 {
5784 bfd_vma p_start = p->p_paddr;
5785 bfd_vma p_end = p_start + p->p_memsz;
5786 bfd_vma s_start = sec->lma;
5787 bfd_vma adjust = s_start - p_end;
5788
5789 if (adjust != 0
5790 && (s_start < p_end
5791 || p_end < p_start))
5792 {
5793 _bfd_error_handler
5794 /* xgettext:c-format */
5795 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5796 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
5797 adjust = 0;
5798 sec->lma = p_end;
5799 }
5800 p->p_memsz += adjust;
5801
5802 if (this_hdr->sh_type != SHT_NOBITS)
5803 {
5804 if (p->p_type == PT_LOAD)
5805 {
5806 if (p->p_filesz + adjust < p->p_memsz)
5807 {
5808 /* We have a PROGBITS section following NOBITS ones.
5809 Allocate file space for the NOBITS section(s) and
5810 zero it. */
5811 adjust = p->p_memsz - p->p_filesz;
5812 if (!write_zeros (abfd, off, adjust))
5813 return FALSE;
5814 }
5815 off += adjust;
5816 }
5817 p->p_filesz += adjust;
5818 }
5819 }
5820
5821 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5822 {
5823 /* The section at i == 0 is the one that actually contains
5824 everything. */
5825 if (i == 0)
5826 {
5827 this_hdr->sh_offset = sec->filepos = off;
5828 off += this_hdr->sh_size;
5829 p->p_filesz = this_hdr->sh_size;
5830 p->p_memsz = 0;
5831 p->p_align = 1;
5832 }
5833 else
5834 {
5835 /* The rest are fake sections that shouldn't be written. */
5836 sec->filepos = 0;
5837 sec->size = 0;
5838 sec->flags = 0;
5839 continue;
5840 }
5841 }
5842 else
5843 {
5844 if (p->p_type == PT_LOAD)
5845 {
5846 this_hdr->sh_offset = sec->filepos = off;
5847 if (this_hdr->sh_type != SHT_NOBITS)
5848 off += this_hdr->sh_size;
5849 }
5850 else if (this_hdr->sh_type == SHT_NOBITS
5851 && (this_hdr->sh_flags & SHF_TLS) != 0
5852 && this_hdr->sh_offset == 0)
5853 {
5854 /* This is a .tbss section that didn't get a PT_LOAD.
5855 (See _bfd_elf_map_sections_to_segments "Create a
5856 final PT_LOAD".) Set sh_offset to the value it
5857 would have if we had created a zero p_filesz and
5858 p_memsz PT_LOAD header for the section. This
5859 also makes the PT_TLS header have the same
5860 p_offset value. */
5861 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5862 off, align);
5863 this_hdr->sh_offset = sec->filepos = off + adjust;
5864 }
5865
5866 if (this_hdr->sh_type != SHT_NOBITS)
5867 {
5868 p->p_filesz += this_hdr->sh_size;
5869 /* A load section without SHF_ALLOC is something like
5870 a note section in a PT_NOTE segment. These take
5871 file space but are not loaded into memory. */
5872 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5873 p->p_memsz += this_hdr->sh_size;
5874 }
5875 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5876 {
5877 if (p->p_type == PT_TLS)
5878 p->p_memsz += this_hdr->sh_size;
5879
5880 /* .tbss is special. It doesn't contribute to p_memsz of
5881 normal segments. */
5882 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5883 p->p_memsz += this_hdr->sh_size;
5884 }
5885
5886 if (align > p->p_align
5887 && !m->p_align_valid
5888 && (p->p_type != PT_LOAD
5889 || (abfd->flags & D_PAGED) == 0))
5890 p->p_align = align;
5891 }
5892
5893 if (!m->p_flags_valid)
5894 {
5895 p->p_flags |= PF_R;
5896 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5897 p->p_flags |= PF_X;
5898 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5899 p->p_flags |= PF_W;
5900 }
5901 }
5902
5903 off -= off_adjust;
5904
5905 /* PR ld/20815 - Check that the program header segment, if
5906 present, will be loaded into memory. */
5907 if (p->p_type == PT_PHDR
5908 && phdr_load_seg == NULL
5909 && !(bed->elf_backend_allow_non_load_phdr != NULL
5910 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5911 {
5912 /* The fix for this error is usually to edit the linker script being
5913 used and set up the program headers manually. Either that or
5914 leave room for the headers at the start of the SECTIONS. */
5915 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5916 " by LOAD segment"),
5917 abfd);
5918 if (link_info == NULL)
5919 return FALSE;
5920 /* Arrange for the linker to exit with an error, deleting
5921 the output file unless --noinhibit-exec is given. */
5922 link_info->callbacks->info ("%X");
5923 }
5924
5925 /* Check that all sections are in a PT_LOAD segment.
5926 Don't check funky gdb generated core files. */
5927 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5928 {
5929 bfd_boolean check_vma = TRUE;
5930
5931 for (i = 1; i < m->count; i++)
5932 if (m->sections[i]->vma == m->sections[i - 1]->vma
5933 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5934 ->this_hdr), p) != 0
5935 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5936 ->this_hdr), p) != 0)
5937 {
5938 /* Looks like we have overlays packed into the segment. */
5939 check_vma = FALSE;
5940 break;
5941 }
5942
5943 for (i = 0; i < m->count; i++)
5944 {
5945 Elf_Internal_Shdr *this_hdr;
5946 asection *sec;
5947
5948 sec = m->sections[i];
5949 this_hdr = &(elf_section_data(sec)->this_hdr);
5950 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5951 && !ELF_TBSS_SPECIAL (this_hdr, p))
5952 {
5953 _bfd_error_handler
5954 /* xgettext:c-format */
5955 (_("%pB: section `%pA' can't be allocated in segment %d"),
5956 abfd, sec, j);
5957 print_segment_map (m);
5958 }
5959 }
5960 }
5961 }
5962
5963 elf_next_file_pos (abfd) = off;
5964
5965 if (link_info != NULL
5966 && phdr_load_seg != NULL
5967 && phdr_load_seg->includes_filehdr)
5968 {
5969 /* There is a segment that contains both the file headers and the
5970 program headers, so provide a symbol __ehdr_start pointing there.
5971 A program can use this to examine itself robustly. */
5972
5973 struct elf_link_hash_entry *hash
5974 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5975 FALSE, FALSE, TRUE);
5976 /* If the symbol was referenced and not defined, define it. */
5977 if (hash != NULL
5978 && (hash->root.type == bfd_link_hash_new
5979 || hash->root.type == bfd_link_hash_undefined
5980 || hash->root.type == bfd_link_hash_undefweak
5981 || hash->root.type == bfd_link_hash_common))
5982 {
5983 asection *s = NULL;
5984 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5985
5986 if (phdr_load_seg->count != 0)
5987 /* The segment contains sections, so use the first one. */
5988 s = phdr_load_seg->sections[0];
5989 else
5990 /* Use the first (i.e. lowest-addressed) section in any segment. */
5991 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5992 if (m->p_type == PT_LOAD && m->count != 0)
5993 {
5994 s = m->sections[0];
5995 break;
5996 }
5997
5998 if (s != NULL)
5999 {
6000 hash->root.u.def.value = filehdr_vaddr - s->vma;
6001 hash->root.u.def.section = s;
6002 }
6003 else
6004 {
6005 hash->root.u.def.value = filehdr_vaddr;
6006 hash->root.u.def.section = bfd_abs_section_ptr;
6007 }
6008
6009 hash->root.type = bfd_link_hash_defined;
6010 hash->def_regular = 1;
6011 hash->non_elf = 0;
6012 }
6013 }
6014
6015 return TRUE;
6016 }
6017
6018 /* Determine if a bfd is a debuginfo file. Unfortunately there
6019 is no defined method for detecting such files, so we have to
6020 use heuristics instead. */
6021
6022 bfd_boolean
6023 is_debuginfo_file (bfd *abfd)
6024 {
6025 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6026 return FALSE;
6027
6028 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6029 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6030 Elf_Internal_Shdr **headerp;
6031
6032 for (headerp = start_headers; headerp < end_headers; headerp ++)
6033 {
6034 Elf_Internal_Shdr *header = * headerp;
6035
6036 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6037 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6038 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6039 && header->sh_type != SHT_NOBITS
6040 && header->sh_type != SHT_NOTE)
6041 return FALSE;
6042 }
6043
6044 return TRUE;
6045 }
6046
6047 /* Assign file positions for the other sections, except for compressed debugging
6048 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6049
6050 static bfd_boolean
6051 assign_file_positions_for_non_load_sections (bfd *abfd,
6052 struct bfd_link_info *link_info)
6053 {
6054 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6055 Elf_Internal_Shdr **i_shdrpp;
6056 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6057 Elf_Internal_Phdr *phdrs;
6058 Elf_Internal_Phdr *p;
6059 struct elf_segment_map *m;
6060 file_ptr off;
6061
6062 i_shdrpp = elf_elfsections (abfd);
6063 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6064 off = elf_next_file_pos (abfd);
6065 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6066 {
6067 Elf_Internal_Shdr *hdr;
6068
6069 hdr = *hdrpp;
6070 if (hdr->bfd_section != NULL
6071 && (hdr->bfd_section->filepos != 0
6072 || (hdr->sh_type == SHT_NOBITS
6073 && hdr->contents == NULL)))
6074 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6075 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6076 {
6077 if (hdr->sh_size != 0
6078 /* PR 24717 - debuginfo files are known to be not strictly
6079 compliant with the ELF standard. In particular they often
6080 have .note.gnu.property sections that are outside of any
6081 loadable segment. This is not a problem for such files,
6082 so do not warn about them. */
6083 && ! is_debuginfo_file (abfd))
6084 _bfd_error_handler
6085 /* xgettext:c-format */
6086 (_("%pB: warning: allocated section `%s' not in segment"),
6087 abfd,
6088 (hdr->bfd_section == NULL
6089 ? "*unknown*"
6090 : hdr->bfd_section->name));
6091 /* We don't need to page align empty sections. */
6092 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6093 off += vma_page_aligned_bias (hdr->sh_addr, off,
6094 bed->maxpagesize);
6095 else
6096 off += vma_page_aligned_bias (hdr->sh_addr, off,
6097 hdr->sh_addralign);
6098 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6099 FALSE);
6100 }
6101 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6102 && hdr->bfd_section == NULL)
6103 /* We don't know the offset of these sections yet: their size has
6104 not been decided. */
6105 || (hdr->bfd_section != NULL
6106 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6107 || (bfd_section_is_ctf (hdr->bfd_section)
6108 && abfd->is_linker_output)))
6109 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6110 || (elf_symtab_shndx_list (abfd) != NULL
6111 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6112 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6113 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6114 hdr->sh_offset = -1;
6115 else
6116 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6117 }
6118 elf_next_file_pos (abfd) = off;
6119
6120 /* Now that we have set the section file positions, we can set up
6121 the file positions for the non PT_LOAD segments. */
6122 phdrs = elf_tdata (abfd)->phdr;
6123 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6124 {
6125 if (p->p_type == PT_GNU_RELRO)
6126 {
6127 bfd_vma start, end;
6128 bfd_boolean ok;
6129
6130 if (link_info != NULL)
6131 {
6132 /* During linking the range of the RELRO segment is passed
6133 in link_info. Note that there may be padding between
6134 relro_start and the first RELRO section. */
6135 start = link_info->relro_start;
6136 end = link_info->relro_end;
6137 }
6138 else if (m->count != 0)
6139 {
6140 if (!m->p_size_valid)
6141 abort ();
6142 start = m->sections[0]->vma;
6143 end = start + m->p_size;
6144 }
6145 else
6146 {
6147 start = 0;
6148 end = 0;
6149 }
6150
6151 ok = FALSE;
6152 if (start < end)
6153 {
6154 struct elf_segment_map *lm;
6155 const Elf_Internal_Phdr *lp;
6156 unsigned int i;
6157
6158 /* Find a LOAD segment containing a section in the RELRO
6159 segment. */
6160 for (lm = elf_seg_map (abfd), lp = phdrs;
6161 lm != NULL;
6162 lm = lm->next, lp++)
6163 {
6164 if (lp->p_type == PT_LOAD
6165 && lm->count != 0
6166 && (lm->sections[lm->count - 1]->vma
6167 + (!IS_TBSS (lm->sections[lm->count - 1])
6168 ? lm->sections[lm->count - 1]->size
6169 : 0)) > start
6170 && lm->sections[0]->vma < end)
6171 break;
6172 }
6173
6174 if (lm != NULL)
6175 {
6176 /* Find the section starting the RELRO segment. */
6177 for (i = 0; i < lm->count; i++)
6178 {
6179 asection *s = lm->sections[i];
6180 if (s->vma >= start
6181 && s->vma < end
6182 && s->size != 0)
6183 break;
6184 }
6185
6186 if (i < lm->count)
6187 {
6188 p->p_vaddr = lm->sections[i]->vma;
6189 p->p_paddr = lm->sections[i]->lma;
6190 p->p_offset = lm->sections[i]->filepos;
6191 p->p_memsz = end - p->p_vaddr;
6192 p->p_filesz = p->p_memsz;
6193
6194 /* The RELRO segment typically ends a few bytes
6195 into .got.plt but other layouts are possible.
6196 In cases where the end does not match any
6197 loaded section (for instance is in file
6198 padding), trim p_filesz back to correspond to
6199 the end of loaded section contents. */
6200 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6201 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6202
6203 /* Preserve the alignment and flags if they are
6204 valid. The gold linker generates RW/4 for
6205 the PT_GNU_RELRO section. It is better for
6206 objcopy/strip to honor these attributes
6207 otherwise gdb will choke when using separate
6208 debug files. */
6209 if (!m->p_align_valid)
6210 p->p_align = 1;
6211 if (!m->p_flags_valid)
6212 p->p_flags = PF_R;
6213 ok = TRUE;
6214 }
6215 }
6216 }
6217 if (link_info != NULL)
6218 BFD_ASSERT (ok);
6219 if (!ok)
6220 memset (p, 0, sizeof *p);
6221 }
6222 else if (p->p_type == PT_GNU_STACK)
6223 {
6224 if (m->p_size_valid)
6225 p->p_memsz = m->p_size;
6226 }
6227 else if (m->count != 0)
6228 {
6229 unsigned int i;
6230
6231 if (p->p_type != PT_LOAD
6232 && (p->p_type != PT_NOTE
6233 || bfd_get_format (abfd) != bfd_core))
6234 {
6235 /* A user specified segment layout may include a PHDR
6236 segment that overlaps with a LOAD segment... */
6237 if (p->p_type == PT_PHDR)
6238 {
6239 m->count = 0;
6240 continue;
6241 }
6242
6243 if (m->includes_filehdr || m->includes_phdrs)
6244 {
6245 /* PR 17512: file: 2195325e. */
6246 _bfd_error_handler
6247 (_("%pB: error: non-load segment %d includes file header "
6248 "and/or program header"),
6249 abfd, (int) (p - phdrs));
6250 return FALSE;
6251 }
6252
6253 p->p_filesz = 0;
6254 p->p_offset = m->sections[0]->filepos;
6255 for (i = m->count; i-- != 0;)
6256 {
6257 asection *sect = m->sections[i];
6258 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6259 if (hdr->sh_type != SHT_NOBITS)
6260 {
6261 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6262 + hdr->sh_size);
6263 break;
6264 }
6265 }
6266 }
6267 }
6268 }
6269
6270 return TRUE;
6271 }
6272
6273 static elf_section_list *
6274 find_section_in_list (unsigned int i, elf_section_list * list)
6275 {
6276 for (;list != NULL; list = list->next)
6277 if (list->ndx == i)
6278 break;
6279 return list;
6280 }
6281
6282 /* Work out the file positions of all the sections. This is called by
6283 _bfd_elf_compute_section_file_positions. All the section sizes and
6284 VMAs must be known before this is called.
6285
6286 Reloc sections come in two flavours: Those processed specially as
6287 "side-channel" data attached to a section to which they apply, and those that
6288 bfd doesn't process as relocations. The latter sort are stored in a normal
6289 bfd section by bfd_section_from_shdr. We don't consider the former sort
6290 here, unless they form part of the loadable image. Reloc sections not
6291 assigned here (and compressed debugging sections and CTF sections which
6292 nothing else in the file can rely upon) will be handled later by
6293 assign_file_positions_for_relocs.
6294
6295 We also don't set the positions of the .symtab and .strtab here. */
6296
6297 static bfd_boolean
6298 assign_file_positions_except_relocs (bfd *abfd,
6299 struct bfd_link_info *link_info)
6300 {
6301 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6302 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6303 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6304 unsigned int alloc;
6305
6306 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6307 && bfd_get_format (abfd) != bfd_core)
6308 {
6309 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6310 unsigned int num_sec = elf_numsections (abfd);
6311 Elf_Internal_Shdr **hdrpp;
6312 unsigned int i;
6313 file_ptr off;
6314
6315 /* Start after the ELF header. */
6316 off = i_ehdrp->e_ehsize;
6317
6318 /* We are not creating an executable, which means that we are
6319 not creating a program header, and that the actual order of
6320 the sections in the file is unimportant. */
6321 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6322 {
6323 Elf_Internal_Shdr *hdr;
6324
6325 hdr = *hdrpp;
6326 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6327 && hdr->bfd_section == NULL)
6328 /* Do not assign offsets for these sections yet: we don't know
6329 their sizes. */
6330 || (hdr->bfd_section != NULL
6331 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6332 || (bfd_section_is_ctf (hdr->bfd_section)
6333 && abfd->is_linker_output)))
6334 || i == elf_onesymtab (abfd)
6335 || (elf_symtab_shndx_list (abfd) != NULL
6336 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6337 || i == elf_strtab_sec (abfd)
6338 || i == elf_shstrtab_sec (abfd))
6339 {
6340 hdr->sh_offset = -1;
6341 }
6342 else
6343 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6344 }
6345
6346 elf_next_file_pos (abfd) = off;
6347 elf_program_header_size (abfd) = 0;
6348 }
6349 else
6350 {
6351 /* Assign file positions for the loaded sections based on the
6352 assignment of sections to segments. */
6353 if (!assign_file_positions_for_load_sections (abfd, link_info))
6354 return FALSE;
6355
6356 /* And for non-load sections. */
6357 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6358 return FALSE;
6359 }
6360
6361 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6362 return FALSE;
6363
6364 /* Write out the program headers. */
6365 alloc = i_ehdrp->e_phnum;
6366 if (alloc != 0)
6367 {
6368 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6369 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6370 return FALSE;
6371 }
6372
6373 return TRUE;
6374 }
6375
6376 bfd_boolean
6377 _bfd_elf_init_file_header (bfd *abfd,
6378 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6379 {
6380 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6381 struct elf_strtab_hash *shstrtab;
6382 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6383
6384 i_ehdrp = elf_elfheader (abfd);
6385
6386 shstrtab = _bfd_elf_strtab_init ();
6387 if (shstrtab == NULL)
6388 return FALSE;
6389
6390 elf_shstrtab (abfd) = shstrtab;
6391
6392 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6393 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6394 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6395 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6396
6397 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6398 i_ehdrp->e_ident[EI_DATA] =
6399 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6400 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6401
6402 if ((abfd->flags & DYNAMIC) != 0)
6403 i_ehdrp->e_type = ET_DYN;
6404 else if ((abfd->flags & EXEC_P) != 0)
6405 i_ehdrp->e_type = ET_EXEC;
6406 else if (bfd_get_format (abfd) == bfd_core)
6407 i_ehdrp->e_type = ET_CORE;
6408 else
6409 i_ehdrp->e_type = ET_REL;
6410
6411 switch (bfd_get_arch (abfd))
6412 {
6413 case bfd_arch_unknown:
6414 i_ehdrp->e_machine = EM_NONE;
6415 break;
6416
6417 /* There used to be a long list of cases here, each one setting
6418 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6419 in the corresponding bfd definition. To avoid duplication,
6420 the switch was removed. Machines that need special handling
6421 can generally do it in elf_backend_final_write_processing(),
6422 unless they need the information earlier than the final write.
6423 Such need can generally be supplied by replacing the tests for
6424 e_machine with the conditions used to determine it. */
6425 default:
6426 i_ehdrp->e_machine = bed->elf_machine_code;
6427 }
6428
6429 i_ehdrp->e_version = bed->s->ev_current;
6430 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6431
6432 /* No program header, for now. */
6433 i_ehdrp->e_phoff = 0;
6434 i_ehdrp->e_phentsize = 0;
6435 i_ehdrp->e_phnum = 0;
6436
6437 /* Each bfd section is section header entry. */
6438 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6439 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6440
6441 elf_tdata (abfd)->symtab_hdr.sh_name =
6442 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6443 elf_tdata (abfd)->strtab_hdr.sh_name =
6444 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6445 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6446 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6447 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6448 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6449 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6450 return FALSE;
6451
6452 return TRUE;
6453 }
6454
6455 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6456
6457 FIXME: We used to have code here to sort the PT_LOAD segments into
6458 ascending order, as per the ELF spec. But this breaks some programs,
6459 including the Linux kernel. But really either the spec should be
6460 changed or the programs updated. */
6461
6462 bfd_boolean
6463 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6464 {
6465 if (link_info != NULL && bfd_link_pie (link_info))
6466 {
6467 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6468 unsigned int num_segments = i_ehdrp->e_phnum;
6469 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6470 Elf_Internal_Phdr *segment = tdata->phdr;
6471 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6472
6473 /* Find the lowest p_vaddr in PT_LOAD segments. */
6474 bfd_vma p_vaddr = (bfd_vma) -1;
6475 for (; segment < end_segment; segment++)
6476 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6477 p_vaddr = segment->p_vaddr;
6478
6479 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6480 segments is non-zero. */
6481 if (p_vaddr)
6482 i_ehdrp->e_type = ET_EXEC;
6483 }
6484 return TRUE;
6485 }
6486
6487 /* Assign file positions for all the reloc sections which are not part
6488 of the loadable file image, and the file position of section headers. */
6489
6490 static bfd_boolean
6491 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6492 {
6493 file_ptr off;
6494 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6495 Elf_Internal_Shdr *shdrp;
6496 Elf_Internal_Ehdr *i_ehdrp;
6497 const struct elf_backend_data *bed;
6498
6499 off = elf_next_file_pos (abfd);
6500
6501 shdrpp = elf_elfsections (abfd);
6502 end_shdrpp = shdrpp + elf_numsections (abfd);
6503 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6504 {
6505 shdrp = *shdrpp;
6506 if (shdrp->sh_offset == -1)
6507 {
6508 asection *sec = shdrp->bfd_section;
6509 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6510 || shdrp->sh_type == SHT_RELA);
6511 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6512 if (is_rel
6513 || is_ctf
6514 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6515 {
6516 if (!is_rel && !is_ctf)
6517 {
6518 const char *name = sec->name;
6519 struct bfd_elf_section_data *d;
6520
6521 /* Compress DWARF debug sections. */
6522 if (!bfd_compress_section (abfd, sec,
6523 shdrp->contents))
6524 return FALSE;
6525
6526 if (sec->compress_status == COMPRESS_SECTION_DONE
6527 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6528 {
6529 /* If section is compressed with zlib-gnu, convert
6530 section name from .debug_* to .zdebug_*. */
6531 char *new_name
6532 = convert_debug_to_zdebug (abfd, name);
6533 if (new_name == NULL)
6534 return FALSE;
6535 name = new_name;
6536 }
6537 /* Add section name to section name section. */
6538 if (shdrp->sh_name != (unsigned int) -1)
6539 abort ();
6540 shdrp->sh_name
6541 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6542 name, FALSE);
6543 d = elf_section_data (sec);
6544
6545 /* Add reloc section name to section name section. */
6546 if (d->rel.hdr
6547 && !_bfd_elf_set_reloc_sh_name (abfd,
6548 d->rel.hdr,
6549 name, FALSE))
6550 return FALSE;
6551 if (d->rela.hdr
6552 && !_bfd_elf_set_reloc_sh_name (abfd,
6553 d->rela.hdr,
6554 name, TRUE))
6555 return FALSE;
6556
6557 /* Update section size and contents. */
6558 shdrp->sh_size = sec->size;
6559 shdrp->contents = sec->contents;
6560 shdrp->bfd_section->contents = NULL;
6561 }
6562 else if (is_ctf)
6563 {
6564 /* Update section size and contents. */
6565 shdrp->sh_size = sec->size;
6566 shdrp->contents = sec->contents;
6567 }
6568
6569 off = _bfd_elf_assign_file_position_for_section (shdrp,
6570 off,
6571 TRUE);
6572 }
6573 }
6574 }
6575
6576 /* Place section name section after DWARF debug sections have been
6577 compressed. */
6578 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6579 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6580 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6581 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6582
6583 /* Place the section headers. */
6584 i_ehdrp = elf_elfheader (abfd);
6585 bed = get_elf_backend_data (abfd);
6586 off = align_file_position (off, 1 << bed->s->log_file_align);
6587 i_ehdrp->e_shoff = off;
6588 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6589 elf_next_file_pos (abfd) = off;
6590
6591 return TRUE;
6592 }
6593
6594 bfd_boolean
6595 _bfd_elf_write_object_contents (bfd *abfd)
6596 {
6597 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6598 Elf_Internal_Shdr **i_shdrp;
6599 bfd_boolean failed;
6600 unsigned int count, num_sec;
6601 struct elf_obj_tdata *t;
6602
6603 if (! abfd->output_has_begun
6604 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6605 return FALSE;
6606 /* Do not rewrite ELF data when the BFD has been opened for update.
6607 abfd->output_has_begun was set to TRUE on opening, so creation of new
6608 sections, and modification of existing section sizes was restricted.
6609 This means the ELF header, program headers and section headers can't have
6610 changed.
6611 If the contents of any sections has been modified, then those changes have
6612 already been written to the BFD. */
6613 else if (abfd->direction == both_direction)
6614 {
6615 BFD_ASSERT (abfd->output_has_begun);
6616 return TRUE;
6617 }
6618
6619 i_shdrp = elf_elfsections (abfd);
6620
6621 failed = FALSE;
6622 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6623 if (failed)
6624 return FALSE;
6625
6626 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6627 return FALSE;
6628
6629 /* After writing the headers, we need to write the sections too... */
6630 num_sec = elf_numsections (abfd);
6631 for (count = 1; count < num_sec; count++)
6632 {
6633 i_shdrp[count]->sh_name
6634 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6635 i_shdrp[count]->sh_name);
6636 if (bed->elf_backend_section_processing)
6637 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6638 return FALSE;
6639 if (i_shdrp[count]->contents)
6640 {
6641 bfd_size_type amt = i_shdrp[count]->sh_size;
6642
6643 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6644 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6645 return FALSE;
6646 }
6647 }
6648
6649 /* Write out the section header names. */
6650 t = elf_tdata (abfd);
6651 if (elf_shstrtab (abfd) != NULL
6652 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6653 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6654 return FALSE;
6655
6656 if (!(*bed->elf_backend_final_write_processing) (abfd))
6657 return FALSE;
6658
6659 if (!bed->s->write_shdrs_and_ehdr (abfd))
6660 return FALSE;
6661
6662 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6663 if (t->o->build_id.after_write_object_contents != NULL)
6664 return (*t->o->build_id.after_write_object_contents) (abfd);
6665
6666 return TRUE;
6667 }
6668
6669 bfd_boolean
6670 _bfd_elf_write_corefile_contents (bfd *abfd)
6671 {
6672 /* Hopefully this can be done just like an object file. */
6673 return _bfd_elf_write_object_contents (abfd);
6674 }
6675
6676 /* Given a section, search the header to find them. */
6677
6678 unsigned int
6679 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6680 {
6681 const struct elf_backend_data *bed;
6682 unsigned int sec_index;
6683
6684 if (elf_section_data (asect) != NULL
6685 && elf_section_data (asect)->this_idx != 0)
6686 return elf_section_data (asect)->this_idx;
6687
6688 if (bfd_is_abs_section (asect))
6689 sec_index = SHN_ABS;
6690 else if (bfd_is_com_section (asect))
6691 sec_index = SHN_COMMON;
6692 else if (bfd_is_und_section (asect))
6693 sec_index = SHN_UNDEF;
6694 else
6695 sec_index = SHN_BAD;
6696
6697 bed = get_elf_backend_data (abfd);
6698 if (bed->elf_backend_section_from_bfd_section)
6699 {
6700 int retval = sec_index;
6701
6702 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6703 return retval;
6704 }
6705
6706 if (sec_index == SHN_BAD)
6707 bfd_set_error (bfd_error_nonrepresentable_section);
6708
6709 return sec_index;
6710 }
6711
6712 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6713 on error. */
6714
6715 int
6716 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6717 {
6718 asymbol *asym_ptr = *asym_ptr_ptr;
6719 int idx;
6720 flagword flags = asym_ptr->flags;
6721
6722 /* When gas creates relocations against local labels, it creates its
6723 own symbol for the section, but does put the symbol into the
6724 symbol chain, so udata is 0. When the linker is generating
6725 relocatable output, this section symbol may be for one of the
6726 input sections rather than the output section. */
6727 if (asym_ptr->udata.i == 0
6728 && (flags & BSF_SECTION_SYM)
6729 && asym_ptr->section)
6730 {
6731 asection *sec;
6732 int indx;
6733
6734 sec = asym_ptr->section;
6735 if (sec->owner != abfd && sec->output_section != NULL)
6736 sec = sec->output_section;
6737 if (sec->owner == abfd
6738 && (indx = sec->index) < elf_num_section_syms (abfd)
6739 && elf_section_syms (abfd)[indx] != NULL)
6740 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6741 }
6742
6743 idx = asym_ptr->udata.i;
6744
6745 if (idx == 0)
6746 {
6747 /* This case can occur when using --strip-symbol on a symbol
6748 which is used in a relocation entry. */
6749 _bfd_error_handler
6750 /* xgettext:c-format */
6751 (_("%pB: symbol `%s' required but not present"),
6752 abfd, bfd_asymbol_name (asym_ptr));
6753 bfd_set_error (bfd_error_no_symbols);
6754 return -1;
6755 }
6756
6757 #if DEBUG & 4
6758 {
6759 fprintf (stderr,
6760 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6761 (long) asym_ptr, asym_ptr->name, idx, flags);
6762 fflush (stderr);
6763 }
6764 #endif
6765
6766 return idx;
6767 }
6768
6769 /* Rewrite program header information. */
6770
6771 static bfd_boolean
6772 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6773 {
6774 Elf_Internal_Ehdr *iehdr;
6775 struct elf_segment_map *map;
6776 struct elf_segment_map *map_first;
6777 struct elf_segment_map **pointer_to_map;
6778 Elf_Internal_Phdr *segment;
6779 asection *section;
6780 unsigned int i;
6781 unsigned int num_segments;
6782 bfd_boolean phdr_included = FALSE;
6783 bfd_boolean p_paddr_valid;
6784 bfd_vma maxpagesize;
6785 struct elf_segment_map *phdr_adjust_seg = NULL;
6786 unsigned int phdr_adjust_num = 0;
6787 const struct elf_backend_data *bed;
6788
6789 bed = get_elf_backend_data (ibfd);
6790 iehdr = elf_elfheader (ibfd);
6791
6792 map_first = NULL;
6793 pointer_to_map = &map_first;
6794
6795 num_segments = elf_elfheader (ibfd)->e_phnum;
6796 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6797
6798 /* Returns the end address of the segment + 1. */
6799 #define SEGMENT_END(segment, start) \
6800 (start + (segment->p_memsz > segment->p_filesz \
6801 ? segment->p_memsz : segment->p_filesz))
6802
6803 #define SECTION_SIZE(section, segment) \
6804 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6805 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6806 ? section->size : 0)
6807
6808 /* Returns TRUE if the given section is contained within
6809 the given segment. VMA addresses are compared. */
6810 #define IS_CONTAINED_BY_VMA(section, segment) \
6811 (section->vma >= segment->p_vaddr \
6812 && (section->vma + SECTION_SIZE (section, segment) \
6813 <= (SEGMENT_END (segment, segment->p_vaddr))))
6814
6815 /* Returns TRUE if the given section is contained within
6816 the given segment. LMA addresses are compared. */
6817 #define IS_CONTAINED_BY_LMA(section, segment, base) \
6818 (section->lma >= base \
6819 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
6820 && (section->lma + SECTION_SIZE (section, segment) \
6821 <= SEGMENT_END (segment, base)))
6822
6823 /* Handle PT_NOTE segment. */
6824 #define IS_NOTE(p, s) \
6825 (p->p_type == PT_NOTE \
6826 && elf_section_type (s) == SHT_NOTE \
6827 && (bfd_vma) s->filepos >= p->p_offset \
6828 && ((bfd_vma) s->filepos + s->size \
6829 <= p->p_offset + p->p_filesz))
6830
6831 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6832 etc. */
6833 #define IS_COREFILE_NOTE(p, s) \
6834 (IS_NOTE (p, s) \
6835 && bfd_get_format (ibfd) == bfd_core \
6836 && s->vma == 0 \
6837 && s->lma == 0)
6838
6839 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6840 linker, which generates a PT_INTERP section with p_vaddr and
6841 p_memsz set to 0. */
6842 #define IS_SOLARIS_PT_INTERP(p, s) \
6843 (p->p_vaddr == 0 \
6844 && p->p_paddr == 0 \
6845 && p->p_memsz == 0 \
6846 && p->p_filesz > 0 \
6847 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6848 && s->size > 0 \
6849 && (bfd_vma) s->filepos >= p->p_offset \
6850 && ((bfd_vma) s->filepos + s->size \
6851 <= p->p_offset + p->p_filesz))
6852
6853 /* Decide if the given section should be included in the given segment.
6854 A section will be included if:
6855 1. It is within the address space of the segment -- we use the LMA
6856 if that is set for the segment and the VMA otherwise,
6857 2. It is an allocated section or a NOTE section in a PT_NOTE
6858 segment.
6859 3. There is an output section associated with it,
6860 4. The section has not already been allocated to a previous segment.
6861 5. PT_GNU_STACK segments do not include any sections.
6862 6. PT_TLS segment includes only SHF_TLS sections.
6863 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6864 8. PT_DYNAMIC should not contain empty sections at the beginning
6865 (with the possible exception of .dynamic). */
6866 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
6867 ((((segment->p_paddr \
6868 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6869 : IS_CONTAINED_BY_VMA (section, segment)) \
6870 && (section->flags & SEC_ALLOC) != 0) \
6871 || IS_NOTE (segment, section)) \
6872 && segment->p_type != PT_GNU_STACK \
6873 && (segment->p_type != PT_TLS \
6874 || (section->flags & SEC_THREAD_LOCAL)) \
6875 && (segment->p_type == PT_LOAD \
6876 || segment->p_type == PT_TLS \
6877 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6878 && (segment->p_type != PT_DYNAMIC \
6879 || SECTION_SIZE (section, segment) > 0 \
6880 || (segment->p_paddr \
6881 ? segment->p_paddr != section->lma \
6882 : segment->p_vaddr != section->vma) \
6883 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6884 && (segment->p_type != PT_LOAD || !section->segment_mark))
6885
6886 /* If the output section of a section in the input segment is NULL,
6887 it is removed from the corresponding output segment. */
6888 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6889 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6890 && section->output_section != NULL)
6891
6892 /* Returns TRUE iff seg1 starts after the end of seg2. */
6893 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6894 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6895
6896 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6897 their VMA address ranges and their LMA address ranges overlap.
6898 It is possible to have overlapping VMA ranges without overlapping LMA
6899 ranges. RedBoot images for example can have both .data and .bss mapped
6900 to the same VMA range, but with the .data section mapped to a different
6901 LMA. */
6902 #define SEGMENT_OVERLAPS(seg1, seg2) \
6903 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6904 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6905 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6906 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6907
6908 /* Initialise the segment mark field. */
6909 for (section = ibfd->sections; section != NULL; section = section->next)
6910 section->segment_mark = FALSE;
6911
6912 /* The Solaris linker creates program headers in which all the
6913 p_paddr fields are zero. When we try to objcopy or strip such a
6914 file, we get confused. Check for this case, and if we find it
6915 don't set the p_paddr_valid fields. */
6916 p_paddr_valid = FALSE;
6917 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6918 i < num_segments;
6919 i++, segment++)
6920 if (segment->p_paddr != 0)
6921 {
6922 p_paddr_valid = TRUE;
6923 break;
6924 }
6925
6926 /* Scan through the segments specified in the program header
6927 of the input BFD. For this first scan we look for overlaps
6928 in the loadable segments. These can be created by weird
6929 parameters to objcopy. Also, fix some solaris weirdness. */
6930 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6931 i < num_segments;
6932 i++, segment++)
6933 {
6934 unsigned int j;
6935 Elf_Internal_Phdr *segment2;
6936
6937 if (segment->p_type == PT_INTERP)
6938 for (section = ibfd->sections; section; section = section->next)
6939 if (IS_SOLARIS_PT_INTERP (segment, section))
6940 {
6941 /* Mininal change so that the normal section to segment
6942 assignment code will work. */
6943 segment->p_vaddr = section->vma;
6944 break;
6945 }
6946
6947 if (segment->p_type != PT_LOAD)
6948 {
6949 /* Remove PT_GNU_RELRO segment. */
6950 if (segment->p_type == PT_GNU_RELRO)
6951 segment->p_type = PT_NULL;
6952 continue;
6953 }
6954
6955 /* Determine if this segment overlaps any previous segments. */
6956 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
6957 {
6958 bfd_signed_vma extra_length;
6959
6960 if (segment2->p_type != PT_LOAD
6961 || !SEGMENT_OVERLAPS (segment, segment2))
6962 continue;
6963
6964 /* Merge the two segments together. */
6965 if (segment2->p_vaddr < segment->p_vaddr)
6966 {
6967 /* Extend SEGMENT2 to include SEGMENT and then delete
6968 SEGMENT. */
6969 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6970 - SEGMENT_END (segment2, segment2->p_vaddr));
6971
6972 if (extra_length > 0)
6973 {
6974 segment2->p_memsz += extra_length;
6975 segment2->p_filesz += extra_length;
6976 }
6977
6978 segment->p_type = PT_NULL;
6979
6980 /* Since we have deleted P we must restart the outer loop. */
6981 i = 0;
6982 segment = elf_tdata (ibfd)->phdr;
6983 break;
6984 }
6985 else
6986 {
6987 /* Extend SEGMENT to include SEGMENT2 and then delete
6988 SEGMENT2. */
6989 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6990 - SEGMENT_END (segment, segment->p_vaddr));
6991
6992 if (extra_length > 0)
6993 {
6994 segment->p_memsz += extra_length;
6995 segment->p_filesz += extra_length;
6996 }
6997
6998 segment2->p_type = PT_NULL;
6999 }
7000 }
7001 }
7002
7003 /* The second scan attempts to assign sections to segments. */
7004 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7005 i < num_segments;
7006 i++, segment++)
7007 {
7008 unsigned int section_count;
7009 asection **sections;
7010 asection *output_section;
7011 unsigned int isec;
7012 asection *matching_lma;
7013 asection *suggested_lma;
7014 unsigned int j;
7015 size_t amt;
7016 asection *first_section;
7017
7018 if (segment->p_type == PT_NULL)
7019 continue;
7020
7021 first_section = NULL;
7022 /* Compute how many sections might be placed into this segment. */
7023 for (section = ibfd->sections, section_count = 0;
7024 section != NULL;
7025 section = section->next)
7026 {
7027 /* Find the first section in the input segment, which may be
7028 removed from the corresponding output segment. */
7029 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7030 {
7031 if (first_section == NULL)
7032 first_section = section;
7033 if (section->output_section != NULL)
7034 ++section_count;
7035 }
7036 }
7037
7038 /* Allocate a segment map big enough to contain
7039 all of the sections we have selected. */
7040 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7041 amt += section_count * sizeof (asection *);
7042 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7043 if (map == NULL)
7044 return FALSE;
7045
7046 /* Initialise the fields of the segment map. Default to
7047 using the physical address of the segment in the input BFD. */
7048 map->next = NULL;
7049 map->p_type = segment->p_type;
7050 map->p_flags = segment->p_flags;
7051 map->p_flags_valid = 1;
7052
7053 /* If the first section in the input segment is removed, there is
7054 no need to preserve segment physical address in the corresponding
7055 output segment. */
7056 if (!first_section || first_section->output_section != NULL)
7057 {
7058 map->p_paddr = segment->p_paddr;
7059 map->p_paddr_valid = p_paddr_valid;
7060 }
7061
7062 /* Determine if this segment contains the ELF file header
7063 and if it contains the program headers themselves. */
7064 map->includes_filehdr = (segment->p_offset == 0
7065 && segment->p_filesz >= iehdr->e_ehsize);
7066 map->includes_phdrs = 0;
7067
7068 if (!phdr_included || segment->p_type != PT_LOAD)
7069 {
7070 map->includes_phdrs =
7071 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7072 && (segment->p_offset + segment->p_filesz
7073 >= ((bfd_vma) iehdr->e_phoff
7074 + iehdr->e_phnum * iehdr->e_phentsize)));
7075
7076 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7077 phdr_included = TRUE;
7078 }
7079
7080 if (section_count == 0)
7081 {
7082 /* Special segments, such as the PT_PHDR segment, may contain
7083 no sections, but ordinary, loadable segments should contain
7084 something. They are allowed by the ELF spec however, so only
7085 a warning is produced.
7086 There is however the valid use case of embedded systems which
7087 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7088 flash memory with zeros. No warning is shown for that case. */
7089 if (segment->p_type == PT_LOAD
7090 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7091 /* xgettext:c-format */
7092 _bfd_error_handler
7093 (_("%pB: warning: empty loadable segment detected"
7094 " at vaddr=%#" PRIx64 ", is this intentional?"),
7095 ibfd, (uint64_t) segment->p_vaddr);
7096
7097 map->p_vaddr_offset = segment->p_vaddr;
7098 map->count = 0;
7099 *pointer_to_map = map;
7100 pointer_to_map = &map->next;
7101
7102 continue;
7103 }
7104
7105 /* Now scan the sections in the input BFD again and attempt
7106 to add their corresponding output sections to the segment map.
7107 The problem here is how to handle an output section which has
7108 been moved (ie had its LMA changed). There are four possibilities:
7109
7110 1. None of the sections have been moved.
7111 In this case we can continue to use the segment LMA from the
7112 input BFD.
7113
7114 2. All of the sections have been moved by the same amount.
7115 In this case we can change the segment's LMA to match the LMA
7116 of the first section.
7117
7118 3. Some of the sections have been moved, others have not.
7119 In this case those sections which have not been moved can be
7120 placed in the current segment which will have to have its size,
7121 and possibly its LMA changed, and a new segment or segments will
7122 have to be created to contain the other sections.
7123
7124 4. The sections have been moved, but not by the same amount.
7125 In this case we can change the segment's LMA to match the LMA
7126 of the first section and we will have to create a new segment
7127 or segments to contain the other sections.
7128
7129 In order to save time, we allocate an array to hold the section
7130 pointers that we are interested in. As these sections get assigned
7131 to a segment, they are removed from this array. */
7132
7133 amt = section_count * sizeof (asection *);
7134 sections = (asection **) bfd_malloc (amt);
7135 if (sections == NULL)
7136 return FALSE;
7137
7138 /* Step One: Scan for segment vs section LMA conflicts.
7139 Also add the sections to the section array allocated above.
7140 Also add the sections to the current segment. In the common
7141 case, where the sections have not been moved, this means that
7142 we have completely filled the segment, and there is nothing
7143 more to do. */
7144 isec = 0;
7145 matching_lma = NULL;
7146 suggested_lma = NULL;
7147
7148 for (section = first_section, j = 0;
7149 section != NULL;
7150 section = section->next)
7151 {
7152 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
7153 {
7154 output_section = section->output_section;
7155
7156 sections[j++] = section;
7157
7158 /* The Solaris native linker always sets p_paddr to 0.
7159 We try to catch that case here, and set it to the
7160 correct value. Note - some backends require that
7161 p_paddr be left as zero. */
7162 if (!p_paddr_valid
7163 && segment->p_vaddr != 0
7164 && !bed->want_p_paddr_set_to_zero
7165 && isec == 0
7166 && output_section->lma != 0
7167 && (align_power (segment->p_vaddr
7168 + (map->includes_filehdr
7169 ? iehdr->e_ehsize : 0)
7170 + (map->includes_phdrs
7171 ? iehdr->e_phnum * iehdr->e_phentsize
7172 : 0),
7173 output_section->alignment_power)
7174 == output_section->vma))
7175 map->p_paddr = segment->p_vaddr;
7176
7177 /* Match up the physical address of the segment with the
7178 LMA address of the output section. */
7179 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7180 || IS_COREFILE_NOTE (segment, section)
7181 || (bed->want_p_paddr_set_to_zero
7182 && IS_CONTAINED_BY_VMA (output_section, segment)))
7183 {
7184 if (matching_lma == NULL
7185 || output_section->lma < matching_lma->lma)
7186 matching_lma = output_section;
7187
7188 /* We assume that if the section fits within the segment
7189 then it does not overlap any other section within that
7190 segment. */
7191 map->sections[isec++] = output_section;
7192 }
7193 else if (suggested_lma == NULL)
7194 suggested_lma = output_section;
7195
7196 if (j == section_count)
7197 break;
7198 }
7199 }
7200
7201 BFD_ASSERT (j == section_count);
7202
7203 /* Step Two: Adjust the physical address of the current segment,
7204 if necessary. */
7205 if (isec == section_count)
7206 {
7207 /* All of the sections fitted within the segment as currently
7208 specified. This is the default case. Add the segment to
7209 the list of built segments and carry on to process the next
7210 program header in the input BFD. */
7211 map->count = section_count;
7212 *pointer_to_map = map;
7213 pointer_to_map = &map->next;
7214
7215 if (p_paddr_valid
7216 && !bed->want_p_paddr_set_to_zero)
7217 {
7218 bfd_vma hdr_size = 0;
7219 if (map->includes_filehdr)
7220 hdr_size = iehdr->e_ehsize;
7221 if (map->includes_phdrs)
7222 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7223
7224 /* Account for padding before the first section in the
7225 segment. */
7226 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7227 }
7228
7229 free (sections);
7230 continue;
7231 }
7232 else
7233 {
7234 /* Change the current segment's physical address to match
7235 the LMA of the first section that fitted, or if no
7236 section fitted, the first section. */
7237 if (matching_lma == NULL)
7238 matching_lma = suggested_lma;
7239
7240 map->p_paddr = matching_lma->lma;
7241
7242 /* Offset the segment physical address from the lma
7243 to allow for space taken up by elf headers. */
7244 if (map->includes_phdrs)
7245 {
7246 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7247
7248 /* iehdr->e_phnum is just an estimate of the number
7249 of program headers that we will need. Make a note
7250 here of the number we used and the segment we chose
7251 to hold these headers, so that we can adjust the
7252 offset when we know the correct value. */
7253 phdr_adjust_num = iehdr->e_phnum;
7254 phdr_adjust_seg = map;
7255 }
7256
7257 if (map->includes_filehdr)
7258 {
7259 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7260 map->p_paddr -= iehdr->e_ehsize;
7261 /* We've subtracted off the size of headers from the
7262 first section lma, but there may have been some
7263 alignment padding before that section too. Try to
7264 account for that by adjusting the segment lma down to
7265 the same alignment. */
7266 if (segment->p_align != 0 && segment->p_align < align)
7267 align = segment->p_align;
7268 map->p_paddr &= -align;
7269 }
7270 }
7271
7272 /* Step Three: Loop over the sections again, this time assigning
7273 those that fit to the current segment and removing them from the
7274 sections array; but making sure not to leave large gaps. Once all
7275 possible sections have been assigned to the current segment it is
7276 added to the list of built segments and if sections still remain
7277 to be assigned, a new segment is constructed before repeating
7278 the loop. */
7279 isec = 0;
7280 do
7281 {
7282 map->count = 0;
7283 suggested_lma = NULL;
7284
7285 /* Fill the current segment with sections that fit. */
7286 for (j = 0; j < section_count; j++)
7287 {
7288 section = sections[j];
7289
7290 if (section == NULL)
7291 continue;
7292
7293 output_section = section->output_section;
7294
7295 BFD_ASSERT (output_section != NULL);
7296
7297 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7298 || IS_COREFILE_NOTE (segment, section))
7299 {
7300 if (map->count == 0)
7301 {
7302 /* If the first section in a segment does not start at
7303 the beginning of the segment, then something is
7304 wrong. */
7305 if (align_power (map->p_paddr
7306 + (map->includes_filehdr
7307 ? iehdr->e_ehsize : 0)
7308 + (map->includes_phdrs
7309 ? iehdr->e_phnum * iehdr->e_phentsize
7310 : 0),
7311 output_section->alignment_power)
7312 != output_section->lma)
7313 goto sorry;
7314 }
7315 else
7316 {
7317 asection *prev_sec;
7318
7319 prev_sec = map->sections[map->count - 1];
7320
7321 /* If the gap between the end of the previous section
7322 and the start of this section is more than
7323 maxpagesize then we need to start a new segment. */
7324 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7325 maxpagesize)
7326 < BFD_ALIGN (output_section->lma, maxpagesize))
7327 || (prev_sec->lma + prev_sec->size
7328 > output_section->lma))
7329 {
7330 if (suggested_lma == NULL)
7331 suggested_lma = output_section;
7332
7333 continue;
7334 }
7335 }
7336
7337 map->sections[map->count++] = output_section;
7338 ++isec;
7339 sections[j] = NULL;
7340 if (segment->p_type == PT_LOAD)
7341 section->segment_mark = TRUE;
7342 }
7343 else if (suggested_lma == NULL)
7344 suggested_lma = output_section;
7345 }
7346
7347 /* PR 23932. A corrupt input file may contain sections that cannot
7348 be assigned to any segment - because for example they have a
7349 negative size - or segments that do not contain any sections.
7350 But there are also valid reasons why a segment can be empty.
7351 So allow a count of zero. */
7352
7353 /* Add the current segment to the list of built segments. */
7354 *pointer_to_map = map;
7355 pointer_to_map = &map->next;
7356
7357 if (isec < section_count)
7358 {
7359 /* We still have not allocated all of the sections to
7360 segments. Create a new segment here, initialise it
7361 and carry on looping. */
7362 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7363 amt += section_count * sizeof (asection *);
7364 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7365 if (map == NULL)
7366 {
7367 free (sections);
7368 return FALSE;
7369 }
7370
7371 /* Initialise the fields of the segment map. Set the physical
7372 physical address to the LMA of the first section that has
7373 not yet been assigned. */
7374 map->next = NULL;
7375 map->p_type = segment->p_type;
7376 map->p_flags = segment->p_flags;
7377 map->p_flags_valid = 1;
7378 map->p_paddr = suggested_lma->lma;
7379 map->p_paddr_valid = p_paddr_valid;
7380 map->includes_filehdr = 0;
7381 map->includes_phdrs = 0;
7382 }
7383
7384 continue;
7385 sorry:
7386 bfd_set_error (bfd_error_sorry);
7387 free (sections);
7388 return FALSE;
7389 }
7390 while (isec < section_count);
7391
7392 free (sections);
7393 }
7394
7395 elf_seg_map (obfd) = map_first;
7396
7397 /* If we had to estimate the number of program headers that were
7398 going to be needed, then check our estimate now and adjust
7399 the offset if necessary. */
7400 if (phdr_adjust_seg != NULL)
7401 {
7402 unsigned int count;
7403
7404 for (count = 0, map = map_first; map != NULL; map = map->next)
7405 count++;
7406
7407 if (count > phdr_adjust_num)
7408 phdr_adjust_seg->p_paddr
7409 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7410
7411 for (map = map_first; map != NULL; map = map->next)
7412 if (map->p_type == PT_PHDR)
7413 {
7414 bfd_vma adjust
7415 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7416 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7417 break;
7418 }
7419 }
7420
7421 #undef SEGMENT_END
7422 #undef SECTION_SIZE
7423 #undef IS_CONTAINED_BY_VMA
7424 #undef IS_CONTAINED_BY_LMA
7425 #undef IS_NOTE
7426 #undef IS_COREFILE_NOTE
7427 #undef IS_SOLARIS_PT_INTERP
7428 #undef IS_SECTION_IN_INPUT_SEGMENT
7429 #undef INCLUDE_SECTION_IN_SEGMENT
7430 #undef SEGMENT_AFTER_SEGMENT
7431 #undef SEGMENT_OVERLAPS
7432 return TRUE;
7433 }
7434
7435 /* Copy ELF program header information. */
7436
7437 static bfd_boolean
7438 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7439 {
7440 Elf_Internal_Ehdr *iehdr;
7441 struct elf_segment_map *map;
7442 struct elf_segment_map *map_first;
7443 struct elf_segment_map **pointer_to_map;
7444 Elf_Internal_Phdr *segment;
7445 unsigned int i;
7446 unsigned int num_segments;
7447 bfd_boolean phdr_included = FALSE;
7448 bfd_boolean p_paddr_valid;
7449
7450 iehdr = elf_elfheader (ibfd);
7451
7452 map_first = NULL;
7453 pointer_to_map = &map_first;
7454
7455 /* If all the segment p_paddr fields are zero, don't set
7456 map->p_paddr_valid. */
7457 p_paddr_valid = FALSE;
7458 num_segments = elf_elfheader (ibfd)->e_phnum;
7459 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7460 i < num_segments;
7461 i++, segment++)
7462 if (segment->p_paddr != 0)
7463 {
7464 p_paddr_valid = TRUE;
7465 break;
7466 }
7467
7468 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7469 i < num_segments;
7470 i++, segment++)
7471 {
7472 asection *section;
7473 unsigned int section_count;
7474 size_t amt;
7475 Elf_Internal_Shdr *this_hdr;
7476 asection *first_section = NULL;
7477 asection *lowest_section;
7478
7479 /* Compute how many sections are in this segment. */
7480 for (section = ibfd->sections, section_count = 0;
7481 section != NULL;
7482 section = section->next)
7483 {
7484 this_hdr = &(elf_section_data(section)->this_hdr);
7485 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7486 {
7487 if (first_section == NULL)
7488 first_section = section;
7489 section_count++;
7490 }
7491 }
7492
7493 /* Allocate a segment map big enough to contain
7494 all of the sections we have selected. */
7495 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7496 amt += section_count * sizeof (asection *);
7497 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7498 if (map == NULL)
7499 return FALSE;
7500
7501 /* Initialize the fields of the output segment map with the
7502 input segment. */
7503 map->next = NULL;
7504 map->p_type = segment->p_type;
7505 map->p_flags = segment->p_flags;
7506 map->p_flags_valid = 1;
7507 map->p_paddr = segment->p_paddr;
7508 map->p_paddr_valid = p_paddr_valid;
7509 map->p_align = segment->p_align;
7510 map->p_align_valid = 1;
7511 map->p_vaddr_offset = 0;
7512
7513 if (map->p_type == PT_GNU_RELRO
7514 || map->p_type == PT_GNU_STACK)
7515 {
7516 /* The PT_GNU_RELRO segment may contain the first a few
7517 bytes in the .got.plt section even if the whole .got.plt
7518 section isn't in the PT_GNU_RELRO segment. We won't
7519 change the size of the PT_GNU_RELRO segment.
7520 Similarly, PT_GNU_STACK size is significant on uclinux
7521 systems. */
7522 map->p_size = segment->p_memsz;
7523 map->p_size_valid = 1;
7524 }
7525
7526 /* Determine if this segment contains the ELF file header
7527 and if it contains the program headers themselves. */
7528 map->includes_filehdr = (segment->p_offset == 0
7529 && segment->p_filesz >= iehdr->e_ehsize);
7530
7531 map->includes_phdrs = 0;
7532 if (! phdr_included || segment->p_type != PT_LOAD)
7533 {
7534 map->includes_phdrs =
7535 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7536 && (segment->p_offset + segment->p_filesz
7537 >= ((bfd_vma) iehdr->e_phoff
7538 + iehdr->e_phnum * iehdr->e_phentsize)));
7539
7540 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7541 phdr_included = TRUE;
7542 }
7543
7544 lowest_section = NULL;
7545 if (section_count != 0)
7546 {
7547 unsigned int isec = 0;
7548
7549 for (section = first_section;
7550 section != NULL;
7551 section = section->next)
7552 {
7553 this_hdr = &(elf_section_data(section)->this_hdr);
7554 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7555 {
7556 map->sections[isec++] = section->output_section;
7557 if ((section->flags & SEC_ALLOC) != 0)
7558 {
7559 bfd_vma seg_off;
7560
7561 if (lowest_section == NULL
7562 || section->lma < lowest_section->lma)
7563 lowest_section = section;
7564
7565 /* Section lmas are set up from PT_LOAD header
7566 p_paddr in _bfd_elf_make_section_from_shdr.
7567 If this header has a p_paddr that disagrees
7568 with the section lma, flag the p_paddr as
7569 invalid. */
7570 if ((section->flags & SEC_LOAD) != 0)
7571 seg_off = this_hdr->sh_offset - segment->p_offset;
7572 else
7573 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7574 if (section->lma - segment->p_paddr != seg_off)
7575 map->p_paddr_valid = FALSE;
7576 }
7577 if (isec == section_count)
7578 break;
7579 }
7580 }
7581 }
7582
7583 if (section_count == 0)
7584 map->p_vaddr_offset = segment->p_vaddr;
7585 else if (map->p_paddr_valid)
7586 {
7587 /* Account for padding before the first section in the segment. */
7588 bfd_vma hdr_size = 0;
7589 if (map->includes_filehdr)
7590 hdr_size = iehdr->e_ehsize;
7591 if (map->includes_phdrs)
7592 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7593
7594 map->p_vaddr_offset = (map->p_paddr + hdr_size
7595 - (lowest_section ? lowest_section->lma : 0));
7596 }
7597
7598 map->count = section_count;
7599 *pointer_to_map = map;
7600 pointer_to_map = &map->next;
7601 }
7602
7603 elf_seg_map (obfd) = map_first;
7604 return TRUE;
7605 }
7606
7607 /* Copy private BFD data. This copies or rewrites ELF program header
7608 information. */
7609
7610 static bfd_boolean
7611 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7612 {
7613 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7614 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7615 return TRUE;
7616
7617 if (elf_tdata (ibfd)->phdr == NULL)
7618 return TRUE;
7619
7620 if (ibfd->xvec == obfd->xvec)
7621 {
7622 /* Check to see if any sections in the input BFD
7623 covered by ELF program header have changed. */
7624 Elf_Internal_Phdr *segment;
7625 asection *section, *osec;
7626 unsigned int i, num_segments;
7627 Elf_Internal_Shdr *this_hdr;
7628 const struct elf_backend_data *bed;
7629
7630 bed = get_elf_backend_data (ibfd);
7631
7632 /* Regenerate the segment map if p_paddr is set to 0. */
7633 if (bed->want_p_paddr_set_to_zero)
7634 goto rewrite;
7635
7636 /* Initialize the segment mark field. */
7637 for (section = obfd->sections; section != NULL;
7638 section = section->next)
7639 section->segment_mark = FALSE;
7640
7641 num_segments = elf_elfheader (ibfd)->e_phnum;
7642 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7643 i < num_segments;
7644 i++, segment++)
7645 {
7646 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7647 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7648 which severly confuses things, so always regenerate the segment
7649 map in this case. */
7650 if (segment->p_paddr == 0
7651 && segment->p_memsz == 0
7652 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7653 goto rewrite;
7654
7655 for (section = ibfd->sections;
7656 section != NULL; section = section->next)
7657 {
7658 /* We mark the output section so that we know it comes
7659 from the input BFD. */
7660 osec = section->output_section;
7661 if (osec)
7662 osec->segment_mark = TRUE;
7663
7664 /* Check if this section is covered by the segment. */
7665 this_hdr = &(elf_section_data(section)->this_hdr);
7666 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7667 {
7668 /* FIXME: Check if its output section is changed or
7669 removed. What else do we need to check? */
7670 if (osec == NULL
7671 || section->flags != osec->flags
7672 || section->lma != osec->lma
7673 || section->vma != osec->vma
7674 || section->size != osec->size
7675 || section->rawsize != osec->rawsize
7676 || section->alignment_power != osec->alignment_power)
7677 goto rewrite;
7678 }
7679 }
7680 }
7681
7682 /* Check to see if any output section do not come from the
7683 input BFD. */
7684 for (section = obfd->sections; section != NULL;
7685 section = section->next)
7686 {
7687 if (!section->segment_mark)
7688 goto rewrite;
7689 else
7690 section->segment_mark = FALSE;
7691 }
7692
7693 return copy_elf_program_header (ibfd, obfd);
7694 }
7695
7696 rewrite:
7697 if (ibfd->xvec == obfd->xvec)
7698 {
7699 /* When rewriting program header, set the output maxpagesize to
7700 the maximum alignment of input PT_LOAD segments. */
7701 Elf_Internal_Phdr *segment;
7702 unsigned int i;
7703 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7704 bfd_vma maxpagesize = 0;
7705
7706 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7707 i < num_segments;
7708 i++, segment++)
7709 if (segment->p_type == PT_LOAD
7710 && maxpagesize < segment->p_align)
7711 {
7712 /* PR 17512: file: f17299af. */
7713 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7714 /* xgettext:c-format */
7715 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7716 PRIx64 " is too large"),
7717 ibfd, (uint64_t) segment->p_align);
7718 else
7719 maxpagesize = segment->p_align;
7720 }
7721
7722 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7723 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7724 }
7725
7726 return rewrite_elf_program_header (ibfd, obfd);
7727 }
7728
7729 /* Initialize private output section information from input section. */
7730
7731 bfd_boolean
7732 _bfd_elf_init_private_section_data (bfd *ibfd,
7733 asection *isec,
7734 bfd *obfd,
7735 asection *osec,
7736 struct bfd_link_info *link_info)
7737
7738 {
7739 Elf_Internal_Shdr *ihdr, *ohdr;
7740 bfd_boolean final_link = (link_info != NULL
7741 && !bfd_link_relocatable (link_info));
7742
7743 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7744 || obfd->xvec->flavour != bfd_target_elf_flavour)
7745 return TRUE;
7746
7747 BFD_ASSERT (elf_section_data (osec) != NULL);
7748
7749 /* If this is a known ABI section, ELF section type and flags may
7750 have been set up when OSEC was created. For normal sections we
7751 allow the user to override the type and flags other than
7752 SHF_MASKOS and SHF_MASKPROC. */
7753 if (elf_section_type (osec) == SHT_PROGBITS
7754 || elf_section_type (osec) == SHT_NOTE
7755 || elf_section_type (osec) == SHT_NOBITS)
7756 elf_section_type (osec) = SHT_NULL;
7757 /* For objcopy and relocatable link, copy the ELF section type from
7758 the input file if the BFD section flags are the same. (If they
7759 are different the user may be doing something like
7760 "objcopy --set-section-flags .text=alloc,data".) For a final
7761 link allow some flags that the linker clears to differ. */
7762 if (elf_section_type (osec) == SHT_NULL
7763 && (osec->flags == isec->flags
7764 || (final_link
7765 && ((osec->flags ^ isec->flags)
7766 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7767 elf_section_type (osec) = elf_section_type (isec);
7768
7769 /* FIXME: Is this correct for all OS/PROC specific flags? */
7770 elf_section_flags (osec) = (elf_section_flags (isec)
7771 & (SHF_MASKOS | SHF_MASKPROC));
7772
7773 /* Copy sh_info from input for mbind section. */
7774 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7775 && elf_section_flags (isec) & SHF_GNU_MBIND)
7776 elf_section_data (osec)->this_hdr.sh_info
7777 = elf_section_data (isec)->this_hdr.sh_info;
7778
7779 /* Set things up for objcopy and relocatable link. The output
7780 SHT_GROUP section will have its elf_next_in_group pointing back
7781 to the input group members. Ignore linker created group section.
7782 See elfNN_ia64_object_p in elfxx-ia64.c. */
7783 if ((link_info == NULL
7784 || !link_info->resolve_section_groups)
7785 && (elf_sec_group (isec) == NULL
7786 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7787 {
7788 if (elf_section_flags (isec) & SHF_GROUP)
7789 elf_section_flags (osec) |= SHF_GROUP;
7790 elf_next_in_group (osec) = elf_next_in_group (isec);
7791 elf_section_data (osec)->group = elf_section_data (isec)->group;
7792 }
7793
7794 /* If not decompress, preserve SHF_COMPRESSED. */
7795 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7796 elf_section_flags (osec) |= (elf_section_flags (isec)
7797 & SHF_COMPRESSED);
7798
7799 ihdr = &elf_section_data (isec)->this_hdr;
7800
7801 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7802 don't use the output section of the linked-to section since it
7803 may be NULL at this point. */
7804 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7805 {
7806 ohdr = &elf_section_data (osec)->this_hdr;
7807 ohdr->sh_flags |= SHF_LINK_ORDER;
7808 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7809 }
7810
7811 osec->use_rela_p = isec->use_rela_p;
7812
7813 return TRUE;
7814 }
7815
7816 /* Copy private section information. This copies over the entsize
7817 field, and sometimes the info field. */
7818
7819 bfd_boolean
7820 _bfd_elf_copy_private_section_data (bfd *ibfd,
7821 asection *isec,
7822 bfd *obfd,
7823 asection *osec)
7824 {
7825 Elf_Internal_Shdr *ihdr, *ohdr;
7826
7827 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7828 || obfd->xvec->flavour != bfd_target_elf_flavour)
7829 return TRUE;
7830
7831 ihdr = &elf_section_data (isec)->this_hdr;
7832 ohdr = &elf_section_data (osec)->this_hdr;
7833
7834 ohdr->sh_entsize = ihdr->sh_entsize;
7835
7836 if (ihdr->sh_type == SHT_SYMTAB
7837 || ihdr->sh_type == SHT_DYNSYM
7838 || ihdr->sh_type == SHT_GNU_verneed
7839 || ihdr->sh_type == SHT_GNU_verdef)
7840 ohdr->sh_info = ihdr->sh_info;
7841
7842 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7843 NULL);
7844 }
7845
7846 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7847 necessary if we are removing either the SHT_GROUP section or any of
7848 the group member sections. DISCARDED is the value that a section's
7849 output_section has if the section will be discarded, NULL when this
7850 function is called from objcopy, bfd_abs_section_ptr when called
7851 from the linker. */
7852
7853 bfd_boolean
7854 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7855 {
7856 asection *isec;
7857
7858 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7859 if (elf_section_type (isec) == SHT_GROUP)
7860 {
7861 asection *first = elf_next_in_group (isec);
7862 asection *s = first;
7863 bfd_size_type removed = 0;
7864
7865 while (s != NULL)
7866 {
7867 /* If this member section is being output but the
7868 SHT_GROUP section is not, then clear the group info
7869 set up by _bfd_elf_copy_private_section_data. */
7870 if (s->output_section != discarded
7871 && isec->output_section == discarded)
7872 {
7873 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7874 elf_group_name (s->output_section) = NULL;
7875 }
7876 /* Conversely, if the member section is not being output
7877 but the SHT_GROUP section is, then adjust its size. */
7878 else if (s->output_section == discarded
7879 && isec->output_section != discarded)
7880 {
7881 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7882 removed += 4;
7883 if (elf_sec->rel.hdr != NULL
7884 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7885 removed += 4;
7886 if (elf_sec->rela.hdr != NULL
7887 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7888 removed += 4;
7889 }
7890 s = elf_next_in_group (s);
7891 if (s == first)
7892 break;
7893 }
7894 if (removed != 0)
7895 {
7896 if (discarded != NULL)
7897 {
7898 /* If we've been called for ld -r, then we need to
7899 adjust the input section size. */
7900 if (isec->rawsize == 0)
7901 isec->rawsize = isec->size;
7902 isec->size = isec->rawsize - removed;
7903 if (isec->size <= 4)
7904 {
7905 isec->size = 0;
7906 isec->flags |= SEC_EXCLUDE;
7907 }
7908 }
7909 else
7910 {
7911 /* Adjust the output section size when called from
7912 objcopy. */
7913 isec->output_section->size -= removed;
7914 if (isec->output_section->size <= 4)
7915 {
7916 isec->output_section->size = 0;
7917 isec->output_section->flags |= SEC_EXCLUDE;
7918 }
7919 }
7920 }
7921 }
7922
7923 return TRUE;
7924 }
7925
7926 /* Copy private header information. */
7927
7928 bfd_boolean
7929 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7930 {
7931 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7932 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7933 return TRUE;
7934
7935 /* Copy over private BFD data if it has not already been copied.
7936 This must be done here, rather than in the copy_private_bfd_data
7937 entry point, because the latter is called after the section
7938 contents have been set, which means that the program headers have
7939 already been worked out. */
7940 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
7941 {
7942 if (! copy_private_bfd_data (ibfd, obfd))
7943 return FALSE;
7944 }
7945
7946 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7947 }
7948
7949 /* Copy private symbol information. If this symbol is in a section
7950 which we did not map into a BFD section, try to map the section
7951 index correctly. We use special macro definitions for the mapped
7952 section indices; these definitions are interpreted by the
7953 swap_out_syms function. */
7954
7955 #define MAP_ONESYMTAB (SHN_HIOS + 1)
7956 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
7957 #define MAP_STRTAB (SHN_HIOS + 3)
7958 #define MAP_SHSTRTAB (SHN_HIOS + 4)
7959 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
7960
7961 bfd_boolean
7962 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
7963 asymbol *isymarg,
7964 bfd *obfd,
7965 asymbol *osymarg)
7966 {
7967 elf_symbol_type *isym, *osym;
7968
7969 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7970 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7971 return TRUE;
7972
7973 isym = elf_symbol_from (ibfd, isymarg);
7974 osym = elf_symbol_from (obfd, osymarg);
7975
7976 if (isym != NULL
7977 && isym->internal_elf_sym.st_shndx != 0
7978 && osym != NULL
7979 && bfd_is_abs_section (isym->symbol.section))
7980 {
7981 unsigned int shndx;
7982
7983 shndx = isym->internal_elf_sym.st_shndx;
7984 if (shndx == elf_onesymtab (ibfd))
7985 shndx = MAP_ONESYMTAB;
7986 else if (shndx == elf_dynsymtab (ibfd))
7987 shndx = MAP_DYNSYMTAB;
7988 else if (shndx == elf_strtab_sec (ibfd))
7989 shndx = MAP_STRTAB;
7990 else if (shndx == elf_shstrtab_sec (ibfd))
7991 shndx = MAP_SHSTRTAB;
7992 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
7993 shndx = MAP_SYM_SHNDX;
7994 osym->internal_elf_sym.st_shndx = shndx;
7995 }
7996
7997 return TRUE;
7998 }
7999
8000 /* Swap out the symbols. */
8001
8002 static bfd_boolean
8003 swap_out_syms (bfd *abfd,
8004 struct elf_strtab_hash **sttp,
8005 int relocatable_p)
8006 {
8007 const struct elf_backend_data *bed;
8008 unsigned int symcount;
8009 asymbol **syms;
8010 struct elf_strtab_hash *stt;
8011 Elf_Internal_Shdr *symtab_hdr;
8012 Elf_Internal_Shdr *symtab_shndx_hdr;
8013 Elf_Internal_Shdr *symstrtab_hdr;
8014 struct elf_sym_strtab *symstrtab;
8015 bfd_byte *outbound_syms;
8016 bfd_byte *outbound_shndx;
8017 unsigned long outbound_syms_index;
8018 unsigned long outbound_shndx_index;
8019 unsigned int idx;
8020 unsigned int num_locals;
8021 size_t amt;
8022 bfd_boolean name_local_sections;
8023
8024 if (!elf_map_symbols (abfd, &num_locals))
8025 return FALSE;
8026
8027 /* Dump out the symtabs. */
8028 stt = _bfd_elf_strtab_init ();
8029 if (stt == NULL)
8030 return FALSE;
8031
8032 bed = get_elf_backend_data (abfd);
8033 symcount = bfd_get_symcount (abfd);
8034 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8035 symtab_hdr->sh_type = SHT_SYMTAB;
8036 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8037 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8038 symtab_hdr->sh_info = num_locals + 1;
8039 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8040
8041 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8042 symstrtab_hdr->sh_type = SHT_STRTAB;
8043
8044 /* Allocate buffer to swap out the .strtab section. */
8045 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8046 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8047 {
8048 bfd_set_error (bfd_error_no_memory);
8049 _bfd_elf_strtab_free (stt);
8050 return FALSE;
8051 }
8052
8053 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8054 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8055 {
8056 error_no_mem:
8057 bfd_set_error (bfd_error_no_memory);
8058 error_return:
8059 free (symstrtab);
8060 _bfd_elf_strtab_free (stt);
8061 return FALSE;
8062 }
8063 symtab_hdr->contents = outbound_syms;
8064 outbound_syms_index = 0;
8065
8066 outbound_shndx = NULL;
8067 outbound_shndx_index = 0;
8068
8069 if (elf_symtab_shndx_list (abfd))
8070 {
8071 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8072 if (symtab_shndx_hdr->sh_name != 0)
8073 {
8074 if (_bfd_mul_overflow (symcount + 1,
8075 sizeof (Elf_External_Sym_Shndx), &amt))
8076 goto error_no_mem;
8077 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8078 if (outbound_shndx == NULL)
8079 goto error_return;
8080
8081 symtab_shndx_hdr->contents = outbound_shndx;
8082 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8083 symtab_shndx_hdr->sh_size = amt;
8084 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8085 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8086 }
8087 /* FIXME: What about any other headers in the list ? */
8088 }
8089
8090 /* Now generate the data (for "contents"). */
8091 {
8092 /* Fill in zeroth symbol and swap it out. */
8093 Elf_Internal_Sym sym;
8094 sym.st_name = 0;
8095 sym.st_value = 0;
8096 sym.st_size = 0;
8097 sym.st_info = 0;
8098 sym.st_other = 0;
8099 sym.st_shndx = SHN_UNDEF;
8100 sym.st_target_internal = 0;
8101 symstrtab[0].sym = sym;
8102 symstrtab[0].dest_index = outbound_syms_index;
8103 symstrtab[0].destshndx_index = outbound_shndx_index;
8104 outbound_syms_index++;
8105 if (outbound_shndx != NULL)
8106 outbound_shndx_index++;
8107 }
8108
8109 name_local_sections
8110 = (bed->elf_backend_name_local_section_symbols
8111 && bed->elf_backend_name_local_section_symbols (abfd));
8112
8113 syms = bfd_get_outsymbols (abfd);
8114 for (idx = 0; idx < symcount;)
8115 {
8116 Elf_Internal_Sym sym;
8117 bfd_vma value = syms[idx]->value;
8118 elf_symbol_type *type_ptr;
8119 flagword flags = syms[idx]->flags;
8120 int type;
8121
8122 if (!name_local_sections
8123 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8124 {
8125 /* Local section symbols have no name. */
8126 sym.st_name = (unsigned long) -1;
8127 }
8128 else
8129 {
8130 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8131 to get the final offset for st_name. */
8132 sym.st_name
8133 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8134 FALSE);
8135 if (sym.st_name == (unsigned long) -1)
8136 goto error_return;
8137 }
8138
8139 type_ptr = elf_symbol_from (abfd, syms[idx]);
8140
8141 if ((flags & BSF_SECTION_SYM) == 0
8142 && bfd_is_com_section (syms[idx]->section))
8143 {
8144 /* ELF common symbols put the alignment into the `value' field,
8145 and the size into the `size' field. This is backwards from
8146 how BFD handles it, so reverse it here. */
8147 sym.st_size = value;
8148 if (type_ptr == NULL
8149 || type_ptr->internal_elf_sym.st_value == 0)
8150 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8151 else
8152 sym.st_value = type_ptr->internal_elf_sym.st_value;
8153 sym.st_shndx = _bfd_elf_section_from_bfd_section
8154 (abfd, syms[idx]->section);
8155 }
8156 else
8157 {
8158 asection *sec = syms[idx]->section;
8159 unsigned int shndx;
8160
8161 if (sec->output_section)
8162 {
8163 value += sec->output_offset;
8164 sec = sec->output_section;
8165 }
8166
8167 /* Don't add in the section vma for relocatable output. */
8168 if (! relocatable_p)
8169 value += sec->vma;
8170 sym.st_value = value;
8171 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8172
8173 if (bfd_is_abs_section (sec)
8174 && type_ptr != NULL
8175 && type_ptr->internal_elf_sym.st_shndx != 0)
8176 {
8177 /* This symbol is in a real ELF section which we did
8178 not create as a BFD section. Undo the mapping done
8179 by copy_private_symbol_data. */
8180 shndx = type_ptr->internal_elf_sym.st_shndx;
8181 switch (shndx)
8182 {
8183 case MAP_ONESYMTAB:
8184 shndx = elf_onesymtab (abfd);
8185 break;
8186 case MAP_DYNSYMTAB:
8187 shndx = elf_dynsymtab (abfd);
8188 break;
8189 case MAP_STRTAB:
8190 shndx = elf_strtab_sec (abfd);
8191 break;
8192 case MAP_SHSTRTAB:
8193 shndx = elf_shstrtab_sec (abfd);
8194 break;
8195 case MAP_SYM_SHNDX:
8196 if (elf_symtab_shndx_list (abfd))
8197 shndx = elf_symtab_shndx_list (abfd)->ndx;
8198 break;
8199 case SHN_COMMON:
8200 case SHN_ABS:
8201 shndx = SHN_ABS;
8202 break;
8203 default:
8204 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8205 {
8206 if (bed->symbol_section_index)
8207 shndx = bed->symbol_section_index (abfd, type_ptr);
8208 /* Otherwise just leave the index alone. */
8209 }
8210 else
8211 {
8212 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8213 _bfd_error_handler (_("%pB: \
8214 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8215 abfd, shndx);
8216 shndx = SHN_ABS;
8217 }
8218 break;
8219 }
8220 }
8221 else
8222 {
8223 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8224
8225 if (shndx == SHN_BAD)
8226 {
8227 asection *sec2;
8228
8229 /* Writing this would be a hell of a lot easier if
8230 we had some decent documentation on bfd, and
8231 knew what to expect of the library, and what to
8232 demand of applications. For example, it
8233 appears that `objcopy' might not set the
8234 section of a symbol to be a section that is
8235 actually in the output file. */
8236 sec2 = bfd_get_section_by_name (abfd, sec->name);
8237 if (sec2 != NULL)
8238 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8239 if (shndx == SHN_BAD)
8240 {
8241 /* xgettext:c-format */
8242 _bfd_error_handler
8243 (_("unable to find equivalent output section"
8244 " for symbol '%s' from section '%s'"),
8245 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8246 sec->name);
8247 bfd_set_error (bfd_error_invalid_operation);
8248 goto error_return;
8249 }
8250 }
8251 }
8252
8253 sym.st_shndx = shndx;
8254 }
8255
8256 if ((flags & BSF_THREAD_LOCAL) != 0)
8257 type = STT_TLS;
8258 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8259 type = STT_GNU_IFUNC;
8260 else if ((flags & BSF_FUNCTION) != 0)
8261 type = STT_FUNC;
8262 else if ((flags & BSF_OBJECT) != 0)
8263 type = STT_OBJECT;
8264 else if ((flags & BSF_RELC) != 0)
8265 type = STT_RELC;
8266 else if ((flags & BSF_SRELC) != 0)
8267 type = STT_SRELC;
8268 else
8269 type = STT_NOTYPE;
8270
8271 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8272 type = STT_TLS;
8273
8274 /* Processor-specific types. */
8275 if (type_ptr != NULL
8276 && bed->elf_backend_get_symbol_type)
8277 type = ((*bed->elf_backend_get_symbol_type)
8278 (&type_ptr->internal_elf_sym, type));
8279
8280 if (flags & BSF_SECTION_SYM)
8281 {
8282 if (flags & BSF_GLOBAL)
8283 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8284 else
8285 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8286 }
8287 else if (bfd_is_com_section (syms[idx]->section))
8288 {
8289 if (type != STT_TLS)
8290 {
8291 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8292 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8293 ? STT_COMMON : STT_OBJECT);
8294 else
8295 type = ((flags & BSF_ELF_COMMON) != 0
8296 ? STT_COMMON : STT_OBJECT);
8297 }
8298 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8299 }
8300 else if (bfd_is_und_section (syms[idx]->section))
8301 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8302 ? STB_WEAK
8303 : STB_GLOBAL),
8304 type);
8305 else if (flags & BSF_FILE)
8306 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8307 else
8308 {
8309 int bind = STB_LOCAL;
8310
8311 if (flags & BSF_LOCAL)
8312 bind = STB_LOCAL;
8313 else if (flags & BSF_GNU_UNIQUE)
8314 bind = STB_GNU_UNIQUE;
8315 else if (flags & BSF_WEAK)
8316 bind = STB_WEAK;
8317 else if (flags & BSF_GLOBAL)
8318 bind = STB_GLOBAL;
8319
8320 sym.st_info = ELF_ST_INFO (bind, type);
8321 }
8322
8323 if (type_ptr != NULL)
8324 {
8325 sym.st_other = type_ptr->internal_elf_sym.st_other;
8326 sym.st_target_internal
8327 = type_ptr->internal_elf_sym.st_target_internal;
8328 }
8329 else
8330 {
8331 sym.st_other = 0;
8332 sym.st_target_internal = 0;
8333 }
8334
8335 idx++;
8336 symstrtab[idx].sym = sym;
8337 symstrtab[idx].dest_index = outbound_syms_index;
8338 symstrtab[idx].destshndx_index = outbound_shndx_index;
8339
8340 outbound_syms_index++;
8341 if (outbound_shndx != NULL)
8342 outbound_shndx_index++;
8343 }
8344
8345 /* Finalize the .strtab section. */
8346 _bfd_elf_strtab_finalize (stt);
8347
8348 /* Swap out the .strtab section. */
8349 for (idx = 0; idx <= symcount; idx++)
8350 {
8351 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8352 if (elfsym->sym.st_name == (unsigned long) -1)
8353 elfsym->sym.st_name = 0;
8354 else
8355 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8356 elfsym->sym.st_name);
8357 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8358 (outbound_syms
8359 + (elfsym->dest_index
8360 * bed->s->sizeof_sym)),
8361 (outbound_shndx
8362 + (elfsym->destshndx_index
8363 * sizeof (Elf_External_Sym_Shndx))));
8364 }
8365 free (symstrtab);
8366
8367 *sttp = stt;
8368 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8369 symstrtab_hdr->sh_type = SHT_STRTAB;
8370 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8371 symstrtab_hdr->sh_addr = 0;
8372 symstrtab_hdr->sh_entsize = 0;
8373 symstrtab_hdr->sh_link = 0;
8374 symstrtab_hdr->sh_info = 0;
8375 symstrtab_hdr->sh_addralign = 1;
8376
8377 return TRUE;
8378 }
8379
8380 /* Return the number of bytes required to hold the symtab vector.
8381
8382 Note that we base it on the count plus 1, since we will null terminate
8383 the vector allocated based on this size. However, the ELF symbol table
8384 always has a dummy entry as symbol #0, so it ends up even. */
8385
8386 long
8387 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8388 {
8389 bfd_size_type symcount;
8390 long symtab_size;
8391 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8392
8393 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8394 if (symcount >= LONG_MAX / sizeof (asymbol *))
8395 {
8396 bfd_set_error (bfd_error_file_too_big);
8397 return -1;
8398 }
8399 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8400 if (symcount > 0)
8401 symtab_size -= sizeof (asymbol *);
8402
8403 return symtab_size;
8404 }
8405
8406 long
8407 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8408 {
8409 bfd_size_type symcount;
8410 long symtab_size;
8411 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8412
8413 if (elf_dynsymtab (abfd) == 0)
8414 {
8415 bfd_set_error (bfd_error_invalid_operation);
8416 return -1;
8417 }
8418
8419 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8420 if (symcount >= LONG_MAX / sizeof (asymbol *))
8421 {
8422 bfd_set_error (bfd_error_file_too_big);
8423 return -1;
8424 }
8425 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8426 if (symcount > 0)
8427 symtab_size -= sizeof (asymbol *);
8428
8429 return symtab_size;
8430 }
8431
8432 long
8433 _bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8434 sec_ptr asect)
8435 {
8436 #if SIZEOF_LONG == SIZEOF_INT
8437 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8438 {
8439 bfd_set_error (bfd_error_file_too_big);
8440 return -1;
8441 }
8442 #endif
8443 return (asect->reloc_count + 1) * sizeof (arelent *);
8444 }
8445
8446 /* Canonicalize the relocs. */
8447
8448 long
8449 _bfd_elf_canonicalize_reloc (bfd *abfd,
8450 sec_ptr section,
8451 arelent **relptr,
8452 asymbol **symbols)
8453 {
8454 arelent *tblptr;
8455 unsigned int i;
8456 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8457
8458 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8459 return -1;
8460
8461 tblptr = section->relocation;
8462 for (i = 0; i < section->reloc_count; i++)
8463 *relptr++ = tblptr++;
8464
8465 *relptr = NULL;
8466
8467 return section->reloc_count;
8468 }
8469
8470 long
8471 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8472 {
8473 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8474 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8475
8476 if (symcount >= 0)
8477 abfd->symcount = symcount;
8478 return symcount;
8479 }
8480
8481 long
8482 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8483 asymbol **allocation)
8484 {
8485 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8486 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8487
8488 if (symcount >= 0)
8489 abfd->dynsymcount = symcount;
8490 return symcount;
8491 }
8492
8493 /* Return the size required for the dynamic reloc entries. Any loadable
8494 section that was actually installed in the BFD, and has type SHT_REL
8495 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8496 dynamic reloc section. */
8497
8498 long
8499 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8500 {
8501 bfd_size_type count;
8502 asection *s;
8503
8504 if (elf_dynsymtab (abfd) == 0)
8505 {
8506 bfd_set_error (bfd_error_invalid_operation);
8507 return -1;
8508 }
8509
8510 count = 1;
8511 for (s = abfd->sections; s != NULL; s = s->next)
8512 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8513 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8514 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8515 {
8516 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8517 if (count > LONG_MAX / sizeof (arelent *))
8518 {
8519 bfd_set_error (bfd_error_file_too_big);
8520 return -1;
8521 }
8522 }
8523 return count * sizeof (arelent *);
8524 }
8525
8526 /* Canonicalize the dynamic relocation entries. Note that we return the
8527 dynamic relocations as a single block, although they are actually
8528 associated with particular sections; the interface, which was
8529 designed for SunOS style shared libraries, expects that there is only
8530 one set of dynamic relocs. Any loadable section that was actually
8531 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8532 dynamic symbol table, is considered to be a dynamic reloc section. */
8533
8534 long
8535 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8536 arelent **storage,
8537 asymbol **syms)
8538 {
8539 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8540 asection *s;
8541 long ret;
8542
8543 if (elf_dynsymtab (abfd) == 0)
8544 {
8545 bfd_set_error (bfd_error_invalid_operation);
8546 return -1;
8547 }
8548
8549 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8550 ret = 0;
8551 for (s = abfd->sections; s != NULL; s = s->next)
8552 {
8553 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8554 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8555 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8556 {
8557 arelent *p;
8558 long count, i;
8559
8560 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8561 return -1;
8562 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8563 p = s->relocation;
8564 for (i = 0; i < count; i++)
8565 *storage++ = p++;
8566 ret += count;
8567 }
8568 }
8569
8570 *storage = NULL;
8571
8572 return ret;
8573 }
8574 \f
8575 /* Read in the version information. */
8576
8577 bfd_boolean
8578 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8579 {
8580 bfd_byte *contents = NULL;
8581 unsigned int freeidx = 0;
8582 size_t amt;
8583
8584 if (elf_dynverref (abfd) != 0)
8585 {
8586 Elf_Internal_Shdr *hdr;
8587 Elf_External_Verneed *everneed;
8588 Elf_Internal_Verneed *iverneed;
8589 unsigned int i;
8590 bfd_byte *contents_end;
8591
8592 hdr = &elf_tdata (abfd)->dynverref_hdr;
8593
8594 if (hdr->sh_info == 0
8595 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8596 {
8597 error_return_bad_verref:
8598 _bfd_error_handler
8599 (_("%pB: .gnu.version_r invalid entry"), abfd);
8600 bfd_set_error (bfd_error_bad_value);
8601 error_return_verref:
8602 elf_tdata (abfd)->verref = NULL;
8603 elf_tdata (abfd)->cverrefs = 0;
8604 goto error_return;
8605 }
8606
8607 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8608 goto error_return_verref;
8609 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8610 if (contents == NULL)
8611 goto error_return_verref;
8612
8613 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8614 {
8615 bfd_set_error (bfd_error_file_too_big);
8616 goto error_return_verref;
8617 }
8618 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8619 if (elf_tdata (abfd)->verref == NULL)
8620 goto error_return_verref;
8621
8622 BFD_ASSERT (sizeof (Elf_External_Verneed)
8623 == sizeof (Elf_External_Vernaux));
8624 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8625 everneed = (Elf_External_Verneed *) contents;
8626 iverneed = elf_tdata (abfd)->verref;
8627 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8628 {
8629 Elf_External_Vernaux *evernaux;
8630 Elf_Internal_Vernaux *ivernaux;
8631 unsigned int j;
8632
8633 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8634
8635 iverneed->vn_bfd = abfd;
8636
8637 iverneed->vn_filename =
8638 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8639 iverneed->vn_file);
8640 if (iverneed->vn_filename == NULL)
8641 goto error_return_bad_verref;
8642
8643 if (iverneed->vn_cnt == 0)
8644 iverneed->vn_auxptr = NULL;
8645 else
8646 {
8647 if (_bfd_mul_overflow (iverneed->vn_cnt,
8648 sizeof (Elf_Internal_Vernaux), &amt))
8649 {
8650 bfd_set_error (bfd_error_file_too_big);
8651 goto error_return_verref;
8652 }
8653 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8654 bfd_alloc (abfd, amt);
8655 if (iverneed->vn_auxptr == NULL)
8656 goto error_return_verref;
8657 }
8658
8659 if (iverneed->vn_aux
8660 > (size_t) (contents_end - (bfd_byte *) everneed))
8661 goto error_return_bad_verref;
8662
8663 evernaux = ((Elf_External_Vernaux *)
8664 ((bfd_byte *) everneed + iverneed->vn_aux));
8665 ivernaux = iverneed->vn_auxptr;
8666 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8667 {
8668 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8669
8670 ivernaux->vna_nodename =
8671 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8672 ivernaux->vna_name);
8673 if (ivernaux->vna_nodename == NULL)
8674 goto error_return_bad_verref;
8675
8676 if (ivernaux->vna_other > freeidx)
8677 freeidx = ivernaux->vna_other;
8678
8679 ivernaux->vna_nextptr = NULL;
8680 if (ivernaux->vna_next == 0)
8681 {
8682 iverneed->vn_cnt = j + 1;
8683 break;
8684 }
8685 if (j + 1 < iverneed->vn_cnt)
8686 ivernaux->vna_nextptr = ivernaux + 1;
8687
8688 if (ivernaux->vna_next
8689 > (size_t) (contents_end - (bfd_byte *) evernaux))
8690 goto error_return_bad_verref;
8691
8692 evernaux = ((Elf_External_Vernaux *)
8693 ((bfd_byte *) evernaux + ivernaux->vna_next));
8694 }
8695
8696 iverneed->vn_nextref = NULL;
8697 if (iverneed->vn_next == 0)
8698 break;
8699 if (i + 1 < hdr->sh_info)
8700 iverneed->vn_nextref = iverneed + 1;
8701
8702 if (iverneed->vn_next
8703 > (size_t) (contents_end - (bfd_byte *) everneed))
8704 goto error_return_bad_verref;
8705
8706 everneed = ((Elf_External_Verneed *)
8707 ((bfd_byte *) everneed + iverneed->vn_next));
8708 }
8709 elf_tdata (abfd)->cverrefs = i;
8710
8711 free (contents);
8712 contents = NULL;
8713 }
8714
8715 if (elf_dynverdef (abfd) != 0)
8716 {
8717 Elf_Internal_Shdr *hdr;
8718 Elf_External_Verdef *everdef;
8719 Elf_Internal_Verdef *iverdef;
8720 Elf_Internal_Verdef *iverdefarr;
8721 Elf_Internal_Verdef iverdefmem;
8722 unsigned int i;
8723 unsigned int maxidx;
8724 bfd_byte *contents_end_def, *contents_end_aux;
8725
8726 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8727
8728 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8729 {
8730 error_return_bad_verdef:
8731 _bfd_error_handler
8732 (_("%pB: .gnu.version_d invalid entry"), abfd);
8733 bfd_set_error (bfd_error_bad_value);
8734 error_return_verdef:
8735 elf_tdata (abfd)->verdef = NULL;
8736 elf_tdata (abfd)->cverdefs = 0;
8737 goto error_return;
8738 }
8739
8740 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8741 goto error_return_verdef;
8742 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8743 if (contents == NULL)
8744 goto error_return_verdef;
8745
8746 BFD_ASSERT (sizeof (Elf_External_Verdef)
8747 >= sizeof (Elf_External_Verdaux));
8748 contents_end_def = contents + hdr->sh_size
8749 - sizeof (Elf_External_Verdef);
8750 contents_end_aux = contents + hdr->sh_size
8751 - sizeof (Elf_External_Verdaux);
8752
8753 /* We know the number of entries in the section but not the maximum
8754 index. Therefore we have to run through all entries and find
8755 the maximum. */
8756 everdef = (Elf_External_Verdef *) contents;
8757 maxidx = 0;
8758 for (i = 0; i < hdr->sh_info; ++i)
8759 {
8760 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8761
8762 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8763 goto error_return_bad_verdef;
8764 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8765 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8766
8767 if (iverdefmem.vd_next == 0)
8768 break;
8769
8770 if (iverdefmem.vd_next
8771 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8772 goto error_return_bad_verdef;
8773
8774 everdef = ((Elf_External_Verdef *)
8775 ((bfd_byte *) everdef + iverdefmem.vd_next));
8776 }
8777
8778 if (default_imported_symver)
8779 {
8780 if (freeidx > maxidx)
8781 maxidx = ++freeidx;
8782 else
8783 freeidx = ++maxidx;
8784 }
8785 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8786 {
8787 bfd_set_error (bfd_error_file_too_big);
8788 goto error_return_verdef;
8789 }
8790 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8791 if (elf_tdata (abfd)->verdef == NULL)
8792 goto error_return_verdef;
8793
8794 elf_tdata (abfd)->cverdefs = maxidx;
8795
8796 everdef = (Elf_External_Verdef *) contents;
8797 iverdefarr = elf_tdata (abfd)->verdef;
8798 for (i = 0; i < hdr->sh_info; i++)
8799 {
8800 Elf_External_Verdaux *everdaux;
8801 Elf_Internal_Verdaux *iverdaux;
8802 unsigned int j;
8803
8804 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8805
8806 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8807 goto error_return_bad_verdef;
8808
8809 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8810 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8811
8812 iverdef->vd_bfd = abfd;
8813
8814 if (iverdef->vd_cnt == 0)
8815 iverdef->vd_auxptr = NULL;
8816 else
8817 {
8818 if (_bfd_mul_overflow (iverdef->vd_cnt,
8819 sizeof (Elf_Internal_Verdaux), &amt))
8820 {
8821 bfd_set_error (bfd_error_file_too_big);
8822 goto error_return_verdef;
8823 }
8824 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8825 bfd_alloc (abfd, amt);
8826 if (iverdef->vd_auxptr == NULL)
8827 goto error_return_verdef;
8828 }
8829
8830 if (iverdef->vd_aux
8831 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8832 goto error_return_bad_verdef;
8833
8834 everdaux = ((Elf_External_Verdaux *)
8835 ((bfd_byte *) everdef + iverdef->vd_aux));
8836 iverdaux = iverdef->vd_auxptr;
8837 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8838 {
8839 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8840
8841 iverdaux->vda_nodename =
8842 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8843 iverdaux->vda_name);
8844 if (iverdaux->vda_nodename == NULL)
8845 goto error_return_bad_verdef;
8846
8847 iverdaux->vda_nextptr = NULL;
8848 if (iverdaux->vda_next == 0)
8849 {
8850 iverdef->vd_cnt = j + 1;
8851 break;
8852 }
8853 if (j + 1 < iverdef->vd_cnt)
8854 iverdaux->vda_nextptr = iverdaux + 1;
8855
8856 if (iverdaux->vda_next
8857 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8858 goto error_return_bad_verdef;
8859
8860 everdaux = ((Elf_External_Verdaux *)
8861 ((bfd_byte *) everdaux + iverdaux->vda_next));
8862 }
8863
8864 iverdef->vd_nodename = NULL;
8865 if (iverdef->vd_cnt)
8866 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8867
8868 iverdef->vd_nextdef = NULL;
8869 if (iverdef->vd_next == 0)
8870 break;
8871 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8872 iverdef->vd_nextdef = iverdef + 1;
8873
8874 everdef = ((Elf_External_Verdef *)
8875 ((bfd_byte *) everdef + iverdef->vd_next));
8876 }
8877
8878 free (contents);
8879 contents = NULL;
8880 }
8881 else if (default_imported_symver)
8882 {
8883 if (freeidx < 3)
8884 freeidx = 3;
8885 else
8886 freeidx++;
8887
8888 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8889 {
8890 bfd_set_error (bfd_error_file_too_big);
8891 goto error_return;
8892 }
8893 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8894 if (elf_tdata (abfd)->verdef == NULL)
8895 goto error_return;
8896
8897 elf_tdata (abfd)->cverdefs = freeidx;
8898 }
8899
8900 /* Create a default version based on the soname. */
8901 if (default_imported_symver)
8902 {
8903 Elf_Internal_Verdef *iverdef;
8904 Elf_Internal_Verdaux *iverdaux;
8905
8906 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
8907
8908 iverdef->vd_version = VER_DEF_CURRENT;
8909 iverdef->vd_flags = 0;
8910 iverdef->vd_ndx = freeidx;
8911 iverdef->vd_cnt = 1;
8912
8913 iverdef->vd_bfd = abfd;
8914
8915 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8916 if (iverdef->vd_nodename == NULL)
8917 goto error_return_verdef;
8918 iverdef->vd_nextdef = NULL;
8919 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8920 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
8921 if (iverdef->vd_auxptr == NULL)
8922 goto error_return_verdef;
8923
8924 iverdaux = iverdef->vd_auxptr;
8925 iverdaux->vda_nodename = iverdef->vd_nodename;
8926 }
8927
8928 return TRUE;
8929
8930 error_return:
8931 if (contents != NULL)
8932 free (contents);
8933 return FALSE;
8934 }
8935 \f
8936 asymbol *
8937 _bfd_elf_make_empty_symbol (bfd *abfd)
8938 {
8939 elf_symbol_type *newsym;
8940
8941 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
8942 if (!newsym)
8943 return NULL;
8944 newsym->symbol.the_bfd = abfd;
8945 return &newsym->symbol;
8946 }
8947
8948 void
8949 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8950 asymbol *symbol,
8951 symbol_info *ret)
8952 {
8953 bfd_symbol_info (symbol, ret);
8954 }
8955
8956 /* Return whether a symbol name implies a local symbol. Most targets
8957 use this function for the is_local_label_name entry point, but some
8958 override it. */
8959
8960 bfd_boolean
8961 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8962 const char *name)
8963 {
8964 /* Normal local symbols start with ``.L''. */
8965 if (name[0] == '.' && name[1] == 'L')
8966 return TRUE;
8967
8968 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8969 DWARF debugging symbols starting with ``..''. */
8970 if (name[0] == '.' && name[1] == '.')
8971 return TRUE;
8972
8973 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8974 emitting DWARF debugging output. I suspect this is actually a
8975 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8976 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8977 underscore to be emitted on some ELF targets). For ease of use,
8978 we treat such symbols as local. */
8979 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
8980 return TRUE;
8981
8982 /* Treat assembler generated fake symbols, dollar local labels and
8983 forward-backward labels (aka local labels) as locals.
8984 These labels have the form:
8985
8986 L0^A.* (fake symbols)
8987
8988 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8989
8990 Versions which start with .L will have already been matched above,
8991 so we only need to match the rest. */
8992 if (name[0] == 'L' && ISDIGIT (name[1]))
8993 {
8994 bfd_boolean ret = FALSE;
8995 const char * p;
8996 char c;
8997
8998 for (p = name + 2; (c = *p); p++)
8999 {
9000 if (c == 1 || c == 2)
9001 {
9002 if (c == 1 && p == name + 2)
9003 /* A fake symbol. */
9004 return TRUE;
9005
9006 /* FIXME: We are being paranoid here and treating symbols like
9007 L0^Bfoo as if there were non-local, on the grounds that the
9008 assembler will never generate them. But can any symbol
9009 containing an ASCII value in the range 1-31 ever be anything
9010 other than some kind of local ? */
9011 ret = TRUE;
9012 }
9013
9014 if (! ISDIGIT (c))
9015 {
9016 ret = FALSE;
9017 break;
9018 }
9019 }
9020 return ret;
9021 }
9022
9023 return FALSE;
9024 }
9025
9026 alent *
9027 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9028 asymbol *symbol ATTRIBUTE_UNUSED)
9029 {
9030 abort ();
9031 return NULL;
9032 }
9033
9034 bfd_boolean
9035 _bfd_elf_set_arch_mach (bfd *abfd,
9036 enum bfd_architecture arch,
9037 unsigned long machine)
9038 {
9039 /* If this isn't the right architecture for this backend, and this
9040 isn't the generic backend, fail. */
9041 if (arch != get_elf_backend_data (abfd)->arch
9042 && arch != bfd_arch_unknown
9043 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9044 return FALSE;
9045
9046 return bfd_default_set_arch_mach (abfd, arch, machine);
9047 }
9048
9049 /* Find the nearest line to a particular section and offset,
9050 for error reporting. */
9051
9052 bfd_boolean
9053 _bfd_elf_find_nearest_line (bfd *abfd,
9054 asymbol **symbols,
9055 asection *section,
9056 bfd_vma offset,
9057 const char **filename_ptr,
9058 const char **functionname_ptr,
9059 unsigned int *line_ptr,
9060 unsigned int *discriminator_ptr)
9061 {
9062 bfd_boolean found;
9063
9064 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9065 filename_ptr, functionname_ptr,
9066 line_ptr, discriminator_ptr,
9067 dwarf_debug_sections,
9068 &elf_tdata (abfd)->dwarf2_find_line_info))
9069 return TRUE;
9070
9071 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9072 filename_ptr, functionname_ptr, line_ptr))
9073 {
9074 if (!*functionname_ptr)
9075 _bfd_elf_find_function (abfd, symbols, section, offset,
9076 *filename_ptr ? NULL : filename_ptr,
9077 functionname_ptr);
9078 return TRUE;
9079 }
9080
9081 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9082 &found, filename_ptr,
9083 functionname_ptr, line_ptr,
9084 &elf_tdata (abfd)->line_info))
9085 return FALSE;
9086 if (found && (*functionname_ptr || *line_ptr))
9087 return TRUE;
9088
9089 if (symbols == NULL)
9090 return FALSE;
9091
9092 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9093 filename_ptr, functionname_ptr))
9094 return FALSE;
9095
9096 *line_ptr = 0;
9097 return TRUE;
9098 }
9099
9100 /* Find the line for a symbol. */
9101
9102 bfd_boolean
9103 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9104 const char **filename_ptr, unsigned int *line_ptr)
9105 {
9106 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9107 filename_ptr, NULL, line_ptr, NULL,
9108 dwarf_debug_sections,
9109 &elf_tdata (abfd)->dwarf2_find_line_info);
9110 }
9111
9112 /* After a call to bfd_find_nearest_line, successive calls to
9113 bfd_find_inliner_info can be used to get source information about
9114 each level of function inlining that terminated at the address
9115 passed to bfd_find_nearest_line. Currently this is only supported
9116 for DWARF2 with appropriate DWARF3 extensions. */
9117
9118 bfd_boolean
9119 _bfd_elf_find_inliner_info (bfd *abfd,
9120 const char **filename_ptr,
9121 const char **functionname_ptr,
9122 unsigned int *line_ptr)
9123 {
9124 bfd_boolean found;
9125 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9126 functionname_ptr, line_ptr,
9127 & elf_tdata (abfd)->dwarf2_find_line_info);
9128 return found;
9129 }
9130
9131 int
9132 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9133 {
9134 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9135 int ret = bed->s->sizeof_ehdr;
9136
9137 if (!bfd_link_relocatable (info))
9138 {
9139 bfd_size_type phdr_size = elf_program_header_size (abfd);
9140
9141 if (phdr_size == (bfd_size_type) -1)
9142 {
9143 struct elf_segment_map *m;
9144
9145 phdr_size = 0;
9146 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9147 phdr_size += bed->s->sizeof_phdr;
9148
9149 if (phdr_size == 0)
9150 phdr_size = get_program_header_size (abfd, info);
9151 }
9152
9153 elf_program_header_size (abfd) = phdr_size;
9154 ret += phdr_size;
9155 }
9156
9157 return ret;
9158 }
9159
9160 bfd_boolean
9161 _bfd_elf_set_section_contents (bfd *abfd,
9162 sec_ptr section,
9163 const void *location,
9164 file_ptr offset,
9165 bfd_size_type count)
9166 {
9167 Elf_Internal_Shdr *hdr;
9168 file_ptr pos;
9169
9170 if (! abfd->output_has_begun
9171 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9172 return FALSE;
9173
9174 if (!count)
9175 return TRUE;
9176
9177 hdr = &elf_section_data (section)->this_hdr;
9178 if (hdr->sh_offset == (file_ptr) -1)
9179 {
9180 if (bfd_section_is_ctf (section))
9181 /* Nothing to do with this section: the contents are generated
9182 later. */
9183 return TRUE;
9184
9185 /* We must compress this section. Write output to the buffer. */
9186 unsigned char *contents = hdr->contents;
9187 if ((offset + count) > hdr->sh_size
9188 || (section->flags & SEC_ELF_COMPRESS) == 0
9189 || contents == NULL)
9190 abort ();
9191 memcpy (contents + offset, location, count);
9192 return TRUE;
9193 }
9194 pos = hdr->sh_offset + offset;
9195 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9196 || bfd_bwrite (location, count, abfd) != count)
9197 return FALSE;
9198
9199 return TRUE;
9200 }
9201
9202 bfd_boolean
9203 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9204 arelent *cache_ptr ATTRIBUTE_UNUSED,
9205 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9206 {
9207 abort ();
9208 return FALSE;
9209 }
9210
9211 /* Try to convert a non-ELF reloc into an ELF one. */
9212
9213 bfd_boolean
9214 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9215 {
9216 /* Check whether we really have an ELF howto. */
9217
9218 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9219 {
9220 bfd_reloc_code_real_type code;
9221 reloc_howto_type *howto;
9222
9223 /* Alien reloc: Try to determine its type to replace it with an
9224 equivalent ELF reloc. */
9225
9226 if (areloc->howto->pc_relative)
9227 {
9228 switch (areloc->howto->bitsize)
9229 {
9230 case 8:
9231 code = BFD_RELOC_8_PCREL;
9232 break;
9233 case 12:
9234 code = BFD_RELOC_12_PCREL;
9235 break;
9236 case 16:
9237 code = BFD_RELOC_16_PCREL;
9238 break;
9239 case 24:
9240 code = BFD_RELOC_24_PCREL;
9241 break;
9242 case 32:
9243 code = BFD_RELOC_32_PCREL;
9244 break;
9245 case 64:
9246 code = BFD_RELOC_64_PCREL;
9247 break;
9248 default:
9249 goto fail;
9250 }
9251
9252 howto = bfd_reloc_type_lookup (abfd, code);
9253
9254 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9255 {
9256 if (howto->pcrel_offset)
9257 areloc->addend += areloc->address;
9258 else
9259 areloc->addend -= areloc->address; /* addend is unsigned!! */
9260 }
9261 }
9262 else
9263 {
9264 switch (areloc->howto->bitsize)
9265 {
9266 case 8:
9267 code = BFD_RELOC_8;
9268 break;
9269 case 14:
9270 code = BFD_RELOC_14;
9271 break;
9272 case 16:
9273 code = BFD_RELOC_16;
9274 break;
9275 case 26:
9276 code = BFD_RELOC_26;
9277 break;
9278 case 32:
9279 code = BFD_RELOC_32;
9280 break;
9281 case 64:
9282 code = BFD_RELOC_64;
9283 break;
9284 default:
9285 goto fail;
9286 }
9287
9288 howto = bfd_reloc_type_lookup (abfd, code);
9289 }
9290
9291 if (howto)
9292 areloc->howto = howto;
9293 else
9294 goto fail;
9295 }
9296
9297 return TRUE;
9298
9299 fail:
9300 /* xgettext:c-format */
9301 _bfd_error_handler (_("%pB: %s unsupported"),
9302 abfd, areloc->howto->name);
9303 bfd_set_error (bfd_error_sorry);
9304 return FALSE;
9305 }
9306
9307 bfd_boolean
9308 _bfd_elf_close_and_cleanup (bfd *abfd)
9309 {
9310 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9311 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
9312 {
9313 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9314 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9315 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9316 }
9317
9318 return _bfd_generic_close_and_cleanup (abfd);
9319 }
9320
9321 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9322 in the relocation's offset. Thus we cannot allow any sort of sanity
9323 range-checking to interfere. There is nothing else to do in processing
9324 this reloc. */
9325
9326 bfd_reloc_status_type
9327 _bfd_elf_rel_vtable_reloc_fn
9328 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9329 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9330 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9331 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9332 {
9333 return bfd_reloc_ok;
9334 }
9335 \f
9336 /* Elf core file support. Much of this only works on native
9337 toolchains, since we rely on knowing the
9338 machine-dependent procfs structure in order to pick
9339 out details about the corefile. */
9340
9341 #ifdef HAVE_SYS_PROCFS_H
9342 /* Needed for new procfs interface on sparc-solaris. */
9343 # define _STRUCTURED_PROC 1
9344 # include <sys/procfs.h>
9345 #endif
9346
9347 /* Return a PID that identifies a "thread" for threaded cores, or the
9348 PID of the main process for non-threaded cores. */
9349
9350 static int
9351 elfcore_make_pid (bfd *abfd)
9352 {
9353 int pid;
9354
9355 pid = elf_tdata (abfd)->core->lwpid;
9356 if (pid == 0)
9357 pid = elf_tdata (abfd)->core->pid;
9358
9359 return pid;
9360 }
9361
9362 /* If there isn't a section called NAME, make one, using
9363 data from SECT. Note, this function will generate a
9364 reference to NAME, so you shouldn't deallocate or
9365 overwrite it. */
9366
9367 static bfd_boolean
9368 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9369 {
9370 asection *sect2;
9371
9372 if (bfd_get_section_by_name (abfd, name) != NULL)
9373 return TRUE;
9374
9375 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9376 if (sect2 == NULL)
9377 return FALSE;
9378
9379 sect2->size = sect->size;
9380 sect2->filepos = sect->filepos;
9381 sect2->alignment_power = sect->alignment_power;
9382 return TRUE;
9383 }
9384
9385 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9386 actually creates up to two pseudosections:
9387 - For the single-threaded case, a section named NAME, unless
9388 such a section already exists.
9389 - For the multi-threaded case, a section named "NAME/PID", where
9390 PID is elfcore_make_pid (abfd).
9391 Both pseudosections have identical contents. */
9392 bfd_boolean
9393 _bfd_elfcore_make_pseudosection (bfd *abfd,
9394 char *name,
9395 size_t size,
9396 ufile_ptr filepos)
9397 {
9398 char buf[100];
9399 char *threaded_name;
9400 size_t len;
9401 asection *sect;
9402
9403 /* Build the section name. */
9404
9405 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9406 len = strlen (buf) + 1;
9407 threaded_name = (char *) bfd_alloc (abfd, len);
9408 if (threaded_name == NULL)
9409 return FALSE;
9410 memcpy (threaded_name, buf, len);
9411
9412 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9413 SEC_HAS_CONTENTS);
9414 if (sect == NULL)
9415 return FALSE;
9416 sect->size = size;
9417 sect->filepos = filepos;
9418 sect->alignment_power = 2;
9419
9420 return elfcore_maybe_make_sect (abfd, name, sect);
9421 }
9422
9423 static bfd_boolean
9424 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9425 size_t offs)
9426 {
9427 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9428 SEC_HAS_CONTENTS);
9429
9430 if (sect == NULL)
9431 return FALSE;
9432
9433 sect->size = note->descsz - offs;
9434 sect->filepos = note->descpos + offs;
9435 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9436
9437 return TRUE;
9438 }
9439
9440 /* prstatus_t exists on:
9441 solaris 2.5+
9442 linux 2.[01] + glibc
9443 unixware 4.2
9444 */
9445
9446 #if defined (HAVE_PRSTATUS_T)
9447
9448 static bfd_boolean
9449 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9450 {
9451 size_t size;
9452 int offset;
9453
9454 if (note->descsz == sizeof (prstatus_t))
9455 {
9456 prstatus_t prstat;
9457
9458 size = sizeof (prstat.pr_reg);
9459 offset = offsetof (prstatus_t, pr_reg);
9460 memcpy (&prstat, note->descdata, sizeof (prstat));
9461
9462 /* Do not overwrite the core signal if it
9463 has already been set by another thread. */
9464 if (elf_tdata (abfd)->core->signal == 0)
9465 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9466 if (elf_tdata (abfd)->core->pid == 0)
9467 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9468
9469 /* pr_who exists on:
9470 solaris 2.5+
9471 unixware 4.2
9472 pr_who doesn't exist on:
9473 linux 2.[01]
9474 */
9475 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9476 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9477 #else
9478 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9479 #endif
9480 }
9481 #if defined (HAVE_PRSTATUS32_T)
9482 else if (note->descsz == sizeof (prstatus32_t))
9483 {
9484 /* 64-bit host, 32-bit corefile */
9485 prstatus32_t prstat;
9486
9487 size = sizeof (prstat.pr_reg);
9488 offset = offsetof (prstatus32_t, pr_reg);
9489 memcpy (&prstat, note->descdata, sizeof (prstat));
9490
9491 /* Do not overwrite the core signal if it
9492 has already been set by another thread. */
9493 if (elf_tdata (abfd)->core->signal == 0)
9494 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9495 if (elf_tdata (abfd)->core->pid == 0)
9496 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9497
9498 /* pr_who exists on:
9499 solaris 2.5+
9500 unixware 4.2
9501 pr_who doesn't exist on:
9502 linux 2.[01]
9503 */
9504 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9505 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9506 #else
9507 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9508 #endif
9509 }
9510 #endif /* HAVE_PRSTATUS32_T */
9511 else
9512 {
9513 /* Fail - we don't know how to handle any other
9514 note size (ie. data object type). */
9515 return TRUE;
9516 }
9517
9518 /* Make a ".reg/999" section and a ".reg" section. */
9519 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9520 size, note->descpos + offset);
9521 }
9522 #endif /* defined (HAVE_PRSTATUS_T) */
9523
9524 /* Create a pseudosection containing the exact contents of NOTE. */
9525 static bfd_boolean
9526 elfcore_make_note_pseudosection (bfd *abfd,
9527 char *name,
9528 Elf_Internal_Note *note)
9529 {
9530 return _bfd_elfcore_make_pseudosection (abfd, name,
9531 note->descsz, note->descpos);
9532 }
9533
9534 /* There isn't a consistent prfpregset_t across platforms,
9535 but it doesn't matter, because we don't have to pick this
9536 data structure apart. */
9537
9538 static bfd_boolean
9539 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9540 {
9541 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9542 }
9543
9544 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9545 type of NT_PRXFPREG. Just include the whole note's contents
9546 literally. */
9547
9548 static bfd_boolean
9549 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9550 {
9551 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9552 }
9553
9554 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9555 with a note type of NT_X86_XSTATE. Just include the whole note's
9556 contents literally. */
9557
9558 static bfd_boolean
9559 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9560 {
9561 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9562 }
9563
9564 static bfd_boolean
9565 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9566 {
9567 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9568 }
9569
9570 static bfd_boolean
9571 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9572 {
9573 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9574 }
9575
9576 static bfd_boolean
9577 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9578 {
9579 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9580 }
9581
9582 static bfd_boolean
9583 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9584 {
9585 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9586 }
9587
9588 static bfd_boolean
9589 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9590 {
9591 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9592 }
9593
9594 static bfd_boolean
9595 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9596 {
9597 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9598 }
9599
9600 static bfd_boolean
9601 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9602 {
9603 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9604 }
9605
9606 static bfd_boolean
9607 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9608 {
9609 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9610 }
9611
9612 static bfd_boolean
9613 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9614 {
9615 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9616 }
9617
9618 static bfd_boolean
9619 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9620 {
9621 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9622 }
9623
9624 static bfd_boolean
9625 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9626 {
9627 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9628 }
9629
9630 static bfd_boolean
9631 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9632 {
9633 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9634 }
9635
9636 static bfd_boolean
9637 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9638 {
9639 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9640 }
9641
9642 static bfd_boolean
9643 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9644 {
9645 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9646 }
9647
9648 static bfd_boolean
9649 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9650 {
9651 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9652 }
9653
9654 static bfd_boolean
9655 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9656 {
9657 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9658 }
9659
9660 static bfd_boolean
9661 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9662 {
9663 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9664 }
9665
9666 static bfd_boolean
9667 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9668 {
9669 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9670 }
9671
9672 static bfd_boolean
9673 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9674 {
9675 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9676 }
9677
9678 static bfd_boolean
9679 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9680 {
9681 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9682 }
9683
9684 static bfd_boolean
9685 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9686 {
9687 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9688 }
9689
9690 static bfd_boolean
9691 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9692 {
9693 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9694 }
9695
9696 static bfd_boolean
9697 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9698 {
9699 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9700 }
9701
9702 static bfd_boolean
9703 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9704 {
9705 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9706 }
9707
9708 static bfd_boolean
9709 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9710 {
9711 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9712 }
9713
9714 static bfd_boolean
9715 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9716 {
9717 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9718 }
9719
9720 static bfd_boolean
9721 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9722 {
9723 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9724 }
9725
9726 static bfd_boolean
9727 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9728 {
9729 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9730 }
9731
9732 static bfd_boolean
9733 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9734 {
9735 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9736 }
9737
9738 static bfd_boolean
9739 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9740 {
9741 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9742 }
9743
9744 static bfd_boolean
9745 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9746 {
9747 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9748 }
9749
9750 static bfd_boolean
9751 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9752 {
9753 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9754 }
9755
9756 static bfd_boolean
9757 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9758 {
9759 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9760 }
9761
9762 static bfd_boolean
9763 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9764 {
9765 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9766 }
9767
9768 #if defined (HAVE_PRPSINFO_T)
9769 typedef prpsinfo_t elfcore_psinfo_t;
9770 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9771 typedef prpsinfo32_t elfcore_psinfo32_t;
9772 #endif
9773 #endif
9774
9775 #if defined (HAVE_PSINFO_T)
9776 typedef psinfo_t elfcore_psinfo_t;
9777 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9778 typedef psinfo32_t elfcore_psinfo32_t;
9779 #endif
9780 #endif
9781
9782 /* return a malloc'ed copy of a string at START which is at
9783 most MAX bytes long, possibly without a terminating '\0'.
9784 the copy will always have a terminating '\0'. */
9785
9786 char *
9787 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9788 {
9789 char *dups;
9790 char *end = (char *) memchr (start, '\0', max);
9791 size_t len;
9792
9793 if (end == NULL)
9794 len = max;
9795 else
9796 len = end - start;
9797
9798 dups = (char *) bfd_alloc (abfd, len + 1);
9799 if (dups == NULL)
9800 return NULL;
9801
9802 memcpy (dups, start, len);
9803 dups[len] = '\0';
9804
9805 return dups;
9806 }
9807
9808 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9809 static bfd_boolean
9810 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9811 {
9812 if (note->descsz == sizeof (elfcore_psinfo_t))
9813 {
9814 elfcore_psinfo_t psinfo;
9815
9816 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9817
9818 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9819 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9820 #endif
9821 elf_tdata (abfd)->core->program
9822 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9823 sizeof (psinfo.pr_fname));
9824
9825 elf_tdata (abfd)->core->command
9826 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9827 sizeof (psinfo.pr_psargs));
9828 }
9829 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9830 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9831 {
9832 /* 64-bit host, 32-bit corefile */
9833 elfcore_psinfo32_t psinfo;
9834
9835 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9836
9837 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9838 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9839 #endif
9840 elf_tdata (abfd)->core->program
9841 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9842 sizeof (psinfo.pr_fname));
9843
9844 elf_tdata (abfd)->core->command
9845 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9846 sizeof (psinfo.pr_psargs));
9847 }
9848 #endif
9849
9850 else
9851 {
9852 /* Fail - we don't know how to handle any other
9853 note size (ie. data object type). */
9854 return TRUE;
9855 }
9856
9857 /* Note that for some reason, a spurious space is tacked
9858 onto the end of the args in some (at least one anyway)
9859 implementations, so strip it off if it exists. */
9860
9861 {
9862 char *command = elf_tdata (abfd)->core->command;
9863 int n = strlen (command);
9864
9865 if (0 < n && command[n - 1] == ' ')
9866 command[n - 1] = '\0';
9867 }
9868
9869 return TRUE;
9870 }
9871 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9872
9873 #if defined (HAVE_PSTATUS_T)
9874 static bfd_boolean
9875 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
9876 {
9877 if (note->descsz == sizeof (pstatus_t)
9878 #if defined (HAVE_PXSTATUS_T)
9879 || note->descsz == sizeof (pxstatus_t)
9880 #endif
9881 )
9882 {
9883 pstatus_t pstat;
9884
9885 memcpy (&pstat, note->descdata, sizeof (pstat));
9886
9887 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9888 }
9889 #if defined (HAVE_PSTATUS32_T)
9890 else if (note->descsz == sizeof (pstatus32_t))
9891 {
9892 /* 64-bit host, 32-bit corefile */
9893 pstatus32_t pstat;
9894
9895 memcpy (&pstat, note->descdata, sizeof (pstat));
9896
9897 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9898 }
9899 #endif
9900 /* Could grab some more details from the "representative"
9901 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
9902 NT_LWPSTATUS note, presumably. */
9903
9904 return TRUE;
9905 }
9906 #endif /* defined (HAVE_PSTATUS_T) */
9907
9908 #if defined (HAVE_LWPSTATUS_T)
9909 static bfd_boolean
9910 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
9911 {
9912 lwpstatus_t lwpstat;
9913 char buf[100];
9914 char *name;
9915 size_t len;
9916 asection *sect;
9917
9918 if (note->descsz != sizeof (lwpstat)
9919 #if defined (HAVE_LWPXSTATUS_T)
9920 && note->descsz != sizeof (lwpxstatus_t)
9921 #endif
9922 )
9923 return TRUE;
9924
9925 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9926
9927 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
9928 /* Do not overwrite the core signal if it has already been set by
9929 another thread. */
9930 if (elf_tdata (abfd)->core->signal == 0)
9931 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
9932
9933 /* Make a ".reg/999" section. */
9934
9935 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
9936 len = strlen (buf) + 1;
9937 name = bfd_alloc (abfd, len);
9938 if (name == NULL)
9939 return FALSE;
9940 memcpy (name, buf, len);
9941
9942 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9943 if (sect == NULL)
9944 return FALSE;
9945
9946 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9947 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
9948 sect->filepos = note->descpos
9949 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9950 #endif
9951
9952 #if defined (HAVE_LWPSTATUS_T_PR_REG)
9953 sect->size = sizeof (lwpstat.pr_reg);
9954 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9955 #endif
9956
9957 sect->alignment_power = 2;
9958
9959 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
9960 return FALSE;
9961
9962 /* Make a ".reg2/999" section */
9963
9964 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
9965 len = strlen (buf) + 1;
9966 name = bfd_alloc (abfd, len);
9967 if (name == NULL)
9968 return FALSE;
9969 memcpy (name, buf, len);
9970
9971 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9972 if (sect == NULL)
9973 return FALSE;
9974
9975 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9976 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
9977 sect->filepos = note->descpos
9978 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
9979 #endif
9980
9981 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
9982 sect->size = sizeof (lwpstat.pr_fpreg);
9983 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
9984 #endif
9985
9986 sect->alignment_power = 2;
9987
9988 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
9989 }
9990 #endif /* defined (HAVE_LWPSTATUS_T) */
9991
9992 static bfd_boolean
9993 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
9994 {
9995 char buf[30];
9996 char *name;
9997 size_t len;
9998 asection *sect;
9999 int type;
10000 int is_active_thread;
10001 bfd_vma base_addr;
10002
10003 if (note->descsz < 728)
10004 return TRUE;
10005
10006 if (! CONST_STRNEQ (note->namedata, "win32"))
10007 return TRUE;
10008
10009 type = bfd_get_32 (abfd, note->descdata);
10010
10011 switch (type)
10012 {
10013 case 1 /* NOTE_INFO_PROCESS */:
10014 /* FIXME: need to add ->core->command. */
10015 /* process_info.pid */
10016 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
10017 /* process_info.signal */
10018 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
10019 break;
10020
10021 case 2 /* NOTE_INFO_THREAD */:
10022 /* Make a ".reg/999" section. */
10023 /* thread_info.tid */
10024 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
10025
10026 len = strlen (buf) + 1;
10027 name = (char *) bfd_alloc (abfd, len);
10028 if (name == NULL)
10029 return FALSE;
10030
10031 memcpy (name, buf, len);
10032
10033 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10034 if (sect == NULL)
10035 return FALSE;
10036
10037 /* sizeof (thread_info.thread_context) */
10038 sect->size = 716;
10039 /* offsetof (thread_info.thread_context) */
10040 sect->filepos = note->descpos + 12;
10041 sect->alignment_power = 2;
10042
10043 /* thread_info.is_active_thread */
10044 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10045
10046 if (is_active_thread)
10047 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10048 return FALSE;
10049 break;
10050
10051 case 3 /* NOTE_INFO_MODULE */:
10052 /* Make a ".module/xxxxxxxx" section. */
10053 /* module_info.base_address */
10054 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10055 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10056
10057 len = strlen (buf) + 1;
10058 name = (char *) bfd_alloc (abfd, len);
10059 if (name == NULL)
10060 return FALSE;
10061
10062 memcpy (name, buf, len);
10063
10064 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10065
10066 if (sect == NULL)
10067 return FALSE;
10068
10069 sect->size = note->descsz;
10070 sect->filepos = note->descpos;
10071 sect->alignment_power = 2;
10072 break;
10073
10074 default:
10075 return TRUE;
10076 }
10077
10078 return TRUE;
10079 }
10080
10081 static bfd_boolean
10082 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10083 {
10084 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10085
10086 switch (note->type)
10087 {
10088 default:
10089 return TRUE;
10090
10091 case NT_PRSTATUS:
10092 if (bed->elf_backend_grok_prstatus)
10093 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10094 return TRUE;
10095 #if defined (HAVE_PRSTATUS_T)
10096 return elfcore_grok_prstatus (abfd, note);
10097 #else
10098 return TRUE;
10099 #endif
10100
10101 #if defined (HAVE_PSTATUS_T)
10102 case NT_PSTATUS:
10103 return elfcore_grok_pstatus (abfd, note);
10104 #endif
10105
10106 #if defined (HAVE_LWPSTATUS_T)
10107 case NT_LWPSTATUS:
10108 return elfcore_grok_lwpstatus (abfd, note);
10109 #endif
10110
10111 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10112 return elfcore_grok_prfpreg (abfd, note);
10113
10114 case NT_WIN32PSTATUS:
10115 return elfcore_grok_win32pstatus (abfd, note);
10116
10117 case NT_PRXFPREG: /* Linux SSE extension */
10118 if (note->namesz == 6
10119 && strcmp (note->namedata, "LINUX") == 0)
10120 return elfcore_grok_prxfpreg (abfd, note);
10121 else
10122 return TRUE;
10123
10124 case NT_X86_XSTATE: /* Linux XSAVE extension */
10125 if (note->namesz == 6
10126 && strcmp (note->namedata, "LINUX") == 0)
10127 return elfcore_grok_xstatereg (abfd, note);
10128 else
10129 return TRUE;
10130
10131 case NT_PPC_VMX:
10132 if (note->namesz == 6
10133 && strcmp (note->namedata, "LINUX") == 0)
10134 return elfcore_grok_ppc_vmx (abfd, note);
10135 else
10136 return TRUE;
10137
10138 case NT_PPC_VSX:
10139 if (note->namesz == 6
10140 && strcmp (note->namedata, "LINUX") == 0)
10141 return elfcore_grok_ppc_vsx (abfd, note);
10142 else
10143 return TRUE;
10144
10145 case NT_PPC_TAR:
10146 if (note->namesz == 6
10147 && strcmp (note->namedata, "LINUX") == 0)
10148 return elfcore_grok_ppc_tar (abfd, note);
10149 else
10150 return TRUE;
10151
10152 case NT_PPC_PPR:
10153 if (note->namesz == 6
10154 && strcmp (note->namedata, "LINUX") == 0)
10155 return elfcore_grok_ppc_ppr (abfd, note);
10156 else
10157 return TRUE;
10158
10159 case NT_PPC_DSCR:
10160 if (note->namesz == 6
10161 && strcmp (note->namedata, "LINUX") == 0)
10162 return elfcore_grok_ppc_dscr (abfd, note);
10163 else
10164 return TRUE;
10165
10166 case NT_PPC_EBB:
10167 if (note->namesz == 6
10168 && strcmp (note->namedata, "LINUX") == 0)
10169 return elfcore_grok_ppc_ebb (abfd, note);
10170 else
10171 return TRUE;
10172
10173 case NT_PPC_PMU:
10174 if (note->namesz == 6
10175 && strcmp (note->namedata, "LINUX") == 0)
10176 return elfcore_grok_ppc_pmu (abfd, note);
10177 else
10178 return TRUE;
10179
10180 case NT_PPC_TM_CGPR:
10181 if (note->namesz == 6
10182 && strcmp (note->namedata, "LINUX") == 0)
10183 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10184 else
10185 return TRUE;
10186
10187 case NT_PPC_TM_CFPR:
10188 if (note->namesz == 6
10189 && strcmp (note->namedata, "LINUX") == 0)
10190 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10191 else
10192 return TRUE;
10193
10194 case NT_PPC_TM_CVMX:
10195 if (note->namesz == 6
10196 && strcmp (note->namedata, "LINUX") == 0)
10197 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10198 else
10199 return TRUE;
10200
10201 case NT_PPC_TM_CVSX:
10202 if (note->namesz == 6
10203 && strcmp (note->namedata, "LINUX") == 0)
10204 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10205 else
10206 return TRUE;
10207
10208 case NT_PPC_TM_SPR:
10209 if (note->namesz == 6
10210 && strcmp (note->namedata, "LINUX") == 0)
10211 return elfcore_grok_ppc_tm_spr (abfd, note);
10212 else
10213 return TRUE;
10214
10215 case NT_PPC_TM_CTAR:
10216 if (note->namesz == 6
10217 && strcmp (note->namedata, "LINUX") == 0)
10218 return elfcore_grok_ppc_tm_ctar (abfd, note);
10219 else
10220 return TRUE;
10221
10222 case NT_PPC_TM_CPPR:
10223 if (note->namesz == 6
10224 && strcmp (note->namedata, "LINUX") == 0)
10225 return elfcore_grok_ppc_tm_cppr (abfd, note);
10226 else
10227 return TRUE;
10228
10229 case NT_PPC_TM_CDSCR:
10230 if (note->namesz == 6
10231 && strcmp (note->namedata, "LINUX") == 0)
10232 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10233 else
10234 return TRUE;
10235
10236 case NT_S390_HIGH_GPRS:
10237 if (note->namesz == 6
10238 && strcmp (note->namedata, "LINUX") == 0)
10239 return elfcore_grok_s390_high_gprs (abfd, note);
10240 else
10241 return TRUE;
10242
10243 case NT_S390_TIMER:
10244 if (note->namesz == 6
10245 && strcmp (note->namedata, "LINUX") == 0)
10246 return elfcore_grok_s390_timer (abfd, note);
10247 else
10248 return TRUE;
10249
10250 case NT_S390_TODCMP:
10251 if (note->namesz == 6
10252 && strcmp (note->namedata, "LINUX") == 0)
10253 return elfcore_grok_s390_todcmp (abfd, note);
10254 else
10255 return TRUE;
10256
10257 case NT_S390_TODPREG:
10258 if (note->namesz == 6
10259 && strcmp (note->namedata, "LINUX") == 0)
10260 return elfcore_grok_s390_todpreg (abfd, note);
10261 else
10262 return TRUE;
10263
10264 case NT_S390_CTRS:
10265 if (note->namesz == 6
10266 && strcmp (note->namedata, "LINUX") == 0)
10267 return elfcore_grok_s390_ctrs (abfd, note);
10268 else
10269 return TRUE;
10270
10271 case NT_S390_PREFIX:
10272 if (note->namesz == 6
10273 && strcmp (note->namedata, "LINUX") == 0)
10274 return elfcore_grok_s390_prefix (abfd, note);
10275 else
10276 return TRUE;
10277
10278 case NT_S390_LAST_BREAK:
10279 if (note->namesz == 6
10280 && strcmp (note->namedata, "LINUX") == 0)
10281 return elfcore_grok_s390_last_break (abfd, note);
10282 else
10283 return TRUE;
10284
10285 case NT_S390_SYSTEM_CALL:
10286 if (note->namesz == 6
10287 && strcmp (note->namedata, "LINUX") == 0)
10288 return elfcore_grok_s390_system_call (abfd, note);
10289 else
10290 return TRUE;
10291
10292 case NT_S390_TDB:
10293 if (note->namesz == 6
10294 && strcmp (note->namedata, "LINUX") == 0)
10295 return elfcore_grok_s390_tdb (abfd, note);
10296 else
10297 return TRUE;
10298
10299 case NT_S390_VXRS_LOW:
10300 if (note->namesz == 6
10301 && strcmp (note->namedata, "LINUX") == 0)
10302 return elfcore_grok_s390_vxrs_low (abfd, note);
10303 else
10304 return TRUE;
10305
10306 case NT_S390_VXRS_HIGH:
10307 if (note->namesz == 6
10308 && strcmp (note->namedata, "LINUX") == 0)
10309 return elfcore_grok_s390_vxrs_high (abfd, note);
10310 else
10311 return TRUE;
10312
10313 case NT_S390_GS_CB:
10314 if (note->namesz == 6
10315 && strcmp (note->namedata, "LINUX") == 0)
10316 return elfcore_grok_s390_gs_cb (abfd, note);
10317 else
10318 return TRUE;
10319
10320 case NT_S390_GS_BC:
10321 if (note->namesz == 6
10322 && strcmp (note->namedata, "LINUX") == 0)
10323 return elfcore_grok_s390_gs_bc (abfd, note);
10324 else
10325 return TRUE;
10326
10327 case NT_ARM_VFP:
10328 if (note->namesz == 6
10329 && strcmp (note->namedata, "LINUX") == 0)
10330 return elfcore_grok_arm_vfp (abfd, note);
10331 else
10332 return TRUE;
10333
10334 case NT_ARM_TLS:
10335 if (note->namesz == 6
10336 && strcmp (note->namedata, "LINUX") == 0)
10337 return elfcore_grok_aarch_tls (abfd, note);
10338 else
10339 return TRUE;
10340
10341 case NT_ARM_HW_BREAK:
10342 if (note->namesz == 6
10343 && strcmp (note->namedata, "LINUX") == 0)
10344 return elfcore_grok_aarch_hw_break (abfd, note);
10345 else
10346 return TRUE;
10347
10348 case NT_ARM_HW_WATCH:
10349 if (note->namesz == 6
10350 && strcmp (note->namedata, "LINUX") == 0)
10351 return elfcore_grok_aarch_hw_watch (abfd, note);
10352 else
10353 return TRUE;
10354
10355 case NT_ARM_SVE:
10356 if (note->namesz == 6
10357 && strcmp (note->namedata, "LINUX") == 0)
10358 return elfcore_grok_aarch_sve (abfd, note);
10359 else
10360 return TRUE;
10361
10362 case NT_ARM_PAC_MASK:
10363 if (note->namesz == 6
10364 && strcmp (note->namedata, "LINUX") == 0)
10365 return elfcore_grok_aarch_pauth (abfd, note);
10366 else
10367 return TRUE;
10368
10369 case NT_PRPSINFO:
10370 case NT_PSINFO:
10371 if (bed->elf_backend_grok_psinfo)
10372 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10373 return TRUE;
10374 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10375 return elfcore_grok_psinfo (abfd, note);
10376 #else
10377 return TRUE;
10378 #endif
10379
10380 case NT_AUXV:
10381 return elfcore_make_auxv_note_section (abfd, note, 0);
10382
10383 case NT_FILE:
10384 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10385 note);
10386
10387 case NT_SIGINFO:
10388 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10389 note);
10390
10391 }
10392 }
10393
10394 static bfd_boolean
10395 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10396 {
10397 struct bfd_build_id* build_id;
10398
10399 if (note->descsz == 0)
10400 return FALSE;
10401
10402 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10403 if (build_id == NULL)
10404 return FALSE;
10405
10406 build_id->size = note->descsz;
10407 memcpy (build_id->data, note->descdata, note->descsz);
10408 abfd->build_id = build_id;
10409
10410 return TRUE;
10411 }
10412
10413 static bfd_boolean
10414 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10415 {
10416 switch (note->type)
10417 {
10418 default:
10419 return TRUE;
10420
10421 case NT_GNU_PROPERTY_TYPE_0:
10422 return _bfd_elf_parse_gnu_properties (abfd, note);
10423
10424 case NT_GNU_BUILD_ID:
10425 return elfobj_grok_gnu_build_id (abfd, note);
10426 }
10427 }
10428
10429 static bfd_boolean
10430 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10431 {
10432 struct sdt_note *cur =
10433 (struct sdt_note *) bfd_alloc (abfd,
10434 sizeof (struct sdt_note) + note->descsz);
10435
10436 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10437 cur->size = (bfd_size_type) note->descsz;
10438 memcpy (cur->data, note->descdata, note->descsz);
10439
10440 elf_tdata (abfd)->sdt_note_head = cur;
10441
10442 return TRUE;
10443 }
10444
10445 static bfd_boolean
10446 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10447 {
10448 switch (note->type)
10449 {
10450 case NT_STAPSDT:
10451 return elfobj_grok_stapsdt_note_1 (abfd, note);
10452
10453 default:
10454 return TRUE;
10455 }
10456 }
10457
10458 static bfd_boolean
10459 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10460 {
10461 size_t offset;
10462
10463 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10464 {
10465 case ELFCLASS32:
10466 if (note->descsz < 108)
10467 return FALSE;
10468 break;
10469
10470 case ELFCLASS64:
10471 if (note->descsz < 120)
10472 return FALSE;
10473 break;
10474
10475 default:
10476 return FALSE;
10477 }
10478
10479 /* Check for version 1 in pr_version. */
10480 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10481 return FALSE;
10482
10483 offset = 4;
10484
10485 /* Skip over pr_psinfosz. */
10486 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10487 offset += 4;
10488 else
10489 {
10490 offset += 4; /* Padding before pr_psinfosz. */
10491 offset += 8;
10492 }
10493
10494 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10495 elf_tdata (abfd)->core->program
10496 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10497 offset += 17;
10498
10499 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10500 elf_tdata (abfd)->core->command
10501 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10502 offset += 81;
10503
10504 /* Padding before pr_pid. */
10505 offset += 2;
10506
10507 /* The pr_pid field was added in version "1a". */
10508 if (note->descsz < offset + 4)
10509 return TRUE;
10510
10511 elf_tdata (abfd)->core->pid
10512 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10513
10514 return TRUE;
10515 }
10516
10517 static bfd_boolean
10518 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10519 {
10520 size_t offset;
10521 size_t size;
10522 size_t min_size;
10523
10524 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10525 Also compute minimum size of this note. */
10526 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10527 {
10528 case ELFCLASS32:
10529 offset = 4 + 4;
10530 min_size = offset + (4 * 2) + 4 + 4 + 4;
10531 break;
10532
10533 case ELFCLASS64:
10534 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10535 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10536 break;
10537
10538 default:
10539 return FALSE;
10540 }
10541
10542 if (note->descsz < min_size)
10543 return FALSE;
10544
10545 /* Check for version 1 in pr_version. */
10546 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10547 return FALSE;
10548
10549 /* Extract size of pr_reg from pr_gregsetsz. */
10550 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10551 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10552 {
10553 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10554 offset += 4 * 2;
10555 }
10556 else
10557 {
10558 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10559 offset += 8 * 2;
10560 }
10561
10562 /* Skip over pr_osreldate. */
10563 offset += 4;
10564
10565 /* Read signal from pr_cursig. */
10566 if (elf_tdata (abfd)->core->signal == 0)
10567 elf_tdata (abfd)->core->signal
10568 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10569 offset += 4;
10570
10571 /* Read TID from pr_pid. */
10572 elf_tdata (abfd)->core->lwpid
10573 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10574 offset += 4;
10575
10576 /* Padding before pr_reg. */
10577 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10578 offset += 4;
10579
10580 /* Make sure that there is enough data remaining in the note. */
10581 if ((note->descsz - offset) < size)
10582 return FALSE;
10583
10584 /* Make a ".reg/999" section and a ".reg" section. */
10585 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10586 size, note->descpos + offset);
10587 }
10588
10589 static bfd_boolean
10590 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10591 {
10592 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10593
10594 switch (note->type)
10595 {
10596 case NT_PRSTATUS:
10597 if (bed->elf_backend_grok_freebsd_prstatus)
10598 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10599 return TRUE;
10600 return elfcore_grok_freebsd_prstatus (abfd, note);
10601
10602 case NT_FPREGSET:
10603 return elfcore_grok_prfpreg (abfd, note);
10604
10605 case NT_PRPSINFO:
10606 return elfcore_grok_freebsd_psinfo (abfd, note);
10607
10608 case NT_FREEBSD_THRMISC:
10609 if (note->namesz == 8)
10610 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10611 else
10612 return TRUE;
10613
10614 case NT_FREEBSD_PROCSTAT_PROC:
10615 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10616 note);
10617
10618 case NT_FREEBSD_PROCSTAT_FILES:
10619 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10620 note);
10621
10622 case NT_FREEBSD_PROCSTAT_VMMAP:
10623 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10624 note);
10625
10626 case NT_FREEBSD_PROCSTAT_AUXV:
10627 return elfcore_make_auxv_note_section (abfd, note, 4);
10628
10629 case NT_X86_XSTATE:
10630 if (note->namesz == 8)
10631 return elfcore_grok_xstatereg (abfd, note);
10632 else
10633 return TRUE;
10634
10635 case NT_FREEBSD_PTLWPINFO:
10636 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10637 note);
10638
10639 case NT_ARM_VFP:
10640 return elfcore_grok_arm_vfp (abfd, note);
10641
10642 default:
10643 return TRUE;
10644 }
10645 }
10646
10647 static bfd_boolean
10648 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10649 {
10650 char *cp;
10651
10652 cp = strchr (note->namedata, '@');
10653 if (cp != NULL)
10654 {
10655 *lwpidp = atoi(cp + 1);
10656 return TRUE;
10657 }
10658 return FALSE;
10659 }
10660
10661 static bfd_boolean
10662 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10663 {
10664 if (note->descsz <= 0x7c + 31)
10665 return FALSE;
10666
10667 /* Signal number at offset 0x08. */
10668 elf_tdata (abfd)->core->signal
10669 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10670
10671 /* Process ID at offset 0x50. */
10672 elf_tdata (abfd)->core->pid
10673 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10674
10675 /* Command name at 0x7c (max 32 bytes, including nul). */
10676 elf_tdata (abfd)->core->command
10677 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10678
10679 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10680 note);
10681 }
10682
10683 static bfd_boolean
10684 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10685 {
10686 int lwp;
10687
10688 if (elfcore_netbsd_get_lwpid (note, &lwp))
10689 elf_tdata (abfd)->core->lwpid = lwp;
10690
10691 switch (note->type)
10692 {
10693 case NT_NETBSDCORE_PROCINFO:
10694 /* NetBSD-specific core "procinfo". Note that we expect to
10695 find this note before any of the others, which is fine,
10696 since the kernel writes this note out first when it
10697 creates a core file. */
10698 return elfcore_grok_netbsd_procinfo (abfd, note);
10699 #ifdef NT_NETBSDCORE_AUXV
10700 case NT_NETBSDCORE_AUXV:
10701 /* NetBSD-specific Elf Auxiliary Vector data. */
10702 return elfcore_make_auxv_note_section (abfd, note, 4);
10703 #endif
10704 default:
10705 break;
10706 }
10707
10708 /* As of March 2017 there are no other machine-independent notes
10709 defined for NetBSD core files. If the note type is less
10710 than the start of the machine-dependent note types, we don't
10711 understand it. */
10712
10713 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10714 return TRUE;
10715
10716
10717 switch (bfd_get_arch (abfd))
10718 {
10719 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10720 PT_GETFPREGS == mach+2. */
10721
10722 case bfd_arch_alpha:
10723 case bfd_arch_sparc:
10724 switch (note->type)
10725 {
10726 case NT_NETBSDCORE_FIRSTMACH+0:
10727 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10728
10729 case NT_NETBSDCORE_FIRSTMACH+2:
10730 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10731
10732 default:
10733 return TRUE;
10734 }
10735
10736 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10737 There's also old PT___GETREGS40 == mach + 1 for old reg
10738 structure which lacks GBR. */
10739
10740 case bfd_arch_sh:
10741 switch (note->type)
10742 {
10743 case NT_NETBSDCORE_FIRSTMACH+3:
10744 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10745
10746 case NT_NETBSDCORE_FIRSTMACH+5:
10747 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10748
10749 default:
10750 return TRUE;
10751 }
10752
10753 /* On all other arch's, PT_GETREGS == mach+1 and
10754 PT_GETFPREGS == mach+3. */
10755
10756 default:
10757 switch (note->type)
10758 {
10759 case NT_NETBSDCORE_FIRSTMACH+1:
10760 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10761
10762 case NT_NETBSDCORE_FIRSTMACH+3:
10763 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10764
10765 default:
10766 return TRUE;
10767 }
10768 }
10769 /* NOTREACHED */
10770 }
10771
10772 static bfd_boolean
10773 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10774 {
10775 if (note->descsz <= 0x48 + 31)
10776 return FALSE;
10777
10778 /* Signal number at offset 0x08. */
10779 elf_tdata (abfd)->core->signal
10780 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10781
10782 /* Process ID at offset 0x20. */
10783 elf_tdata (abfd)->core->pid
10784 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10785
10786 /* Command name at 0x48 (max 32 bytes, including nul). */
10787 elf_tdata (abfd)->core->command
10788 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10789
10790 return TRUE;
10791 }
10792
10793 static bfd_boolean
10794 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10795 {
10796 if (note->type == NT_OPENBSD_PROCINFO)
10797 return elfcore_grok_openbsd_procinfo (abfd, note);
10798
10799 if (note->type == NT_OPENBSD_REGS)
10800 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10801
10802 if (note->type == NT_OPENBSD_FPREGS)
10803 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10804
10805 if (note->type == NT_OPENBSD_XFPREGS)
10806 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10807
10808 if (note->type == NT_OPENBSD_AUXV)
10809 return elfcore_make_auxv_note_section (abfd, note, 0);
10810
10811 if (note->type == NT_OPENBSD_WCOOKIE)
10812 {
10813 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10814 SEC_HAS_CONTENTS);
10815
10816 if (sect == NULL)
10817 return FALSE;
10818 sect->size = note->descsz;
10819 sect->filepos = note->descpos;
10820 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10821
10822 return TRUE;
10823 }
10824
10825 return TRUE;
10826 }
10827
10828 static bfd_boolean
10829 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
10830 {
10831 void *ddata = note->descdata;
10832 char buf[100];
10833 char *name;
10834 asection *sect;
10835 short sig;
10836 unsigned flags;
10837
10838 if (note->descsz < 16)
10839 return FALSE;
10840
10841 /* nto_procfs_status 'pid' field is at offset 0. */
10842 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
10843
10844 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10845 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10846
10847 /* nto_procfs_status 'flags' field is at offset 8. */
10848 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
10849
10850 /* nto_procfs_status 'what' field is at offset 14. */
10851 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10852 {
10853 elf_tdata (abfd)->core->signal = sig;
10854 elf_tdata (abfd)->core->lwpid = *tid;
10855 }
10856
10857 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10858 do not come from signals so we make sure we set the current
10859 thread just in case. */
10860 if (flags & 0x00000080)
10861 elf_tdata (abfd)->core->lwpid = *tid;
10862
10863 /* Make a ".qnx_core_status/%d" section. */
10864 sprintf (buf, ".qnx_core_status/%ld", *tid);
10865
10866 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10867 if (name == NULL)
10868 return FALSE;
10869 strcpy (name, buf);
10870
10871 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10872 if (sect == NULL)
10873 return FALSE;
10874
10875 sect->size = note->descsz;
10876 sect->filepos = note->descpos;
10877 sect->alignment_power = 2;
10878
10879 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10880 }
10881
10882 static bfd_boolean
10883 elfcore_grok_nto_regs (bfd *abfd,
10884 Elf_Internal_Note *note,
10885 long tid,
10886 char *base)
10887 {
10888 char buf[100];
10889 char *name;
10890 asection *sect;
10891
10892 /* Make a "(base)/%d" section. */
10893 sprintf (buf, "%s/%ld", base, tid);
10894
10895 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10896 if (name == NULL)
10897 return FALSE;
10898 strcpy (name, buf);
10899
10900 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10901 if (sect == NULL)
10902 return FALSE;
10903
10904 sect->size = note->descsz;
10905 sect->filepos = note->descpos;
10906 sect->alignment_power = 2;
10907
10908 /* This is the current thread. */
10909 if (elf_tdata (abfd)->core->lwpid == tid)
10910 return elfcore_maybe_make_sect (abfd, base, sect);
10911
10912 return TRUE;
10913 }
10914
10915 #define BFD_QNT_CORE_INFO 7
10916 #define BFD_QNT_CORE_STATUS 8
10917 #define BFD_QNT_CORE_GREG 9
10918 #define BFD_QNT_CORE_FPREG 10
10919
10920 static bfd_boolean
10921 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
10922 {
10923 /* Every GREG section has a STATUS section before it. Store the
10924 tid from the previous call to pass down to the next gregs
10925 function. */
10926 static long tid = 1;
10927
10928 switch (note->type)
10929 {
10930 case BFD_QNT_CORE_INFO:
10931 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10932 case BFD_QNT_CORE_STATUS:
10933 return elfcore_grok_nto_status (abfd, note, &tid);
10934 case BFD_QNT_CORE_GREG:
10935 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10936 case BFD_QNT_CORE_FPREG:
10937 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10938 default:
10939 return TRUE;
10940 }
10941 }
10942
10943 static bfd_boolean
10944 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10945 {
10946 char *name;
10947 asection *sect;
10948 size_t len;
10949
10950 /* Use note name as section name. */
10951 len = note->namesz;
10952 name = (char *) bfd_alloc (abfd, len);
10953 if (name == NULL)
10954 return FALSE;
10955 memcpy (name, note->namedata, len);
10956 name[len - 1] = '\0';
10957
10958 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10959 if (sect == NULL)
10960 return FALSE;
10961
10962 sect->size = note->descsz;
10963 sect->filepos = note->descpos;
10964 sect->alignment_power = 1;
10965
10966 return TRUE;
10967 }
10968
10969 /* Function: elfcore_write_note
10970
10971 Inputs:
10972 buffer to hold note, and current size of buffer
10973 name of note
10974 type of note
10975 data for note
10976 size of data for note
10977
10978 Writes note to end of buffer. ELF64 notes are written exactly as
10979 for ELF32, despite the current (as of 2006) ELF gabi specifying
10980 that they ought to have 8-byte namesz and descsz field, and have
10981 8-byte alignment. Other writers, eg. Linux kernel, do the same.
10982
10983 Return:
10984 Pointer to realloc'd buffer, *BUFSIZ updated. */
10985
10986 char *
10987 elfcore_write_note (bfd *abfd,
10988 char *buf,
10989 int *bufsiz,
10990 const char *name,
10991 int type,
10992 const void *input,
10993 int size)
10994 {
10995 Elf_External_Note *xnp;
10996 size_t namesz;
10997 size_t newspace;
10998 char *dest;
10999
11000 namesz = 0;
11001 if (name != NULL)
11002 namesz = strlen (name) + 1;
11003
11004 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11005
11006 buf = (char *) realloc (buf, *bufsiz + newspace);
11007 if (buf == NULL)
11008 return buf;
11009 dest = buf + *bufsiz;
11010 *bufsiz += newspace;
11011 xnp = (Elf_External_Note *) dest;
11012 H_PUT_32 (abfd, namesz, xnp->namesz);
11013 H_PUT_32 (abfd, size, xnp->descsz);
11014 H_PUT_32 (abfd, type, xnp->type);
11015 dest = xnp->name;
11016 if (name != NULL)
11017 {
11018 memcpy (dest, name, namesz);
11019 dest += namesz;
11020 while (namesz & 3)
11021 {
11022 *dest++ = '\0';
11023 ++namesz;
11024 }
11025 }
11026 memcpy (dest, input, size);
11027 dest += size;
11028 while (size & 3)
11029 {
11030 *dest++ = '\0';
11031 ++size;
11032 }
11033 return buf;
11034 }
11035
11036 /* gcc-8 warns (*) on all the strncpy calls in this function about
11037 possible string truncation. The "truncation" is not a bug. We
11038 have an external representation of structs with fields that are not
11039 necessarily NULL terminated and corresponding internal
11040 representation fields that are one larger so that they can always
11041 be NULL terminated.
11042 gcc versions between 4.2 and 4.6 do not allow pragma control of
11043 diagnostics inside functions, giving a hard error if you try to use
11044 the finer control available with later versions.
11045 gcc prior to 4.2 warns about diagnostic push and pop.
11046 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11047 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11048 (*) Depending on your system header files! */
11049 #if GCC_VERSION >= 8000
11050 # pragma GCC diagnostic push
11051 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11052 #endif
11053 char *
11054 elfcore_write_prpsinfo (bfd *abfd,
11055 char *buf,
11056 int *bufsiz,
11057 const char *fname,
11058 const char *psargs)
11059 {
11060 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11061
11062 if (bed->elf_backend_write_core_note != NULL)
11063 {
11064 char *ret;
11065 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11066 NT_PRPSINFO, fname, psargs);
11067 if (ret != NULL)
11068 return ret;
11069 }
11070
11071 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11072 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11073 if (bed->s->elfclass == ELFCLASS32)
11074 {
11075 # if defined (HAVE_PSINFO32_T)
11076 psinfo32_t data;
11077 int note_type = NT_PSINFO;
11078 # else
11079 prpsinfo32_t data;
11080 int note_type = NT_PRPSINFO;
11081 # endif
11082
11083 memset (&data, 0, sizeof (data));
11084 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11085 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11086 return elfcore_write_note (abfd, buf, bufsiz,
11087 "CORE", note_type, &data, sizeof (data));
11088 }
11089 else
11090 # endif
11091 {
11092 # if defined (HAVE_PSINFO_T)
11093 psinfo_t data;
11094 int note_type = NT_PSINFO;
11095 # else
11096 prpsinfo_t data;
11097 int note_type = NT_PRPSINFO;
11098 # endif
11099
11100 memset (&data, 0, sizeof (data));
11101 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11102 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11103 return elfcore_write_note (abfd, buf, bufsiz,
11104 "CORE", note_type, &data, sizeof (data));
11105 }
11106 #endif /* PSINFO_T or PRPSINFO_T */
11107
11108 free (buf);
11109 return NULL;
11110 }
11111 #if GCC_VERSION >= 8000
11112 # pragma GCC diagnostic pop
11113 #endif
11114
11115 char *
11116 elfcore_write_linux_prpsinfo32
11117 (bfd *abfd, char *buf, int *bufsiz,
11118 const struct elf_internal_linux_prpsinfo *prpsinfo)
11119 {
11120 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11121 {
11122 struct elf_external_linux_prpsinfo32_ugid16 data;
11123
11124 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11125 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11126 &data, sizeof (data));
11127 }
11128 else
11129 {
11130 struct elf_external_linux_prpsinfo32_ugid32 data;
11131
11132 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11133 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11134 &data, sizeof (data));
11135 }
11136 }
11137
11138 char *
11139 elfcore_write_linux_prpsinfo64
11140 (bfd *abfd, char *buf, int *bufsiz,
11141 const struct elf_internal_linux_prpsinfo *prpsinfo)
11142 {
11143 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11144 {
11145 struct elf_external_linux_prpsinfo64_ugid16 data;
11146
11147 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11148 return elfcore_write_note (abfd, buf, bufsiz,
11149 "CORE", NT_PRPSINFO, &data, sizeof (data));
11150 }
11151 else
11152 {
11153 struct elf_external_linux_prpsinfo64_ugid32 data;
11154
11155 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11156 return elfcore_write_note (abfd, buf, bufsiz,
11157 "CORE", NT_PRPSINFO, &data, sizeof (data));
11158 }
11159 }
11160
11161 char *
11162 elfcore_write_prstatus (bfd *abfd,
11163 char *buf,
11164 int *bufsiz,
11165 long pid,
11166 int cursig,
11167 const void *gregs)
11168 {
11169 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11170
11171 if (bed->elf_backend_write_core_note != NULL)
11172 {
11173 char *ret;
11174 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11175 NT_PRSTATUS,
11176 pid, cursig, gregs);
11177 if (ret != NULL)
11178 return ret;
11179 }
11180
11181 #if defined (HAVE_PRSTATUS_T)
11182 #if defined (HAVE_PRSTATUS32_T)
11183 if (bed->s->elfclass == ELFCLASS32)
11184 {
11185 prstatus32_t prstat;
11186
11187 memset (&prstat, 0, sizeof (prstat));
11188 prstat.pr_pid = pid;
11189 prstat.pr_cursig = cursig;
11190 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11191 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11192 NT_PRSTATUS, &prstat, sizeof (prstat));
11193 }
11194 else
11195 #endif
11196 {
11197 prstatus_t prstat;
11198
11199 memset (&prstat, 0, sizeof (prstat));
11200 prstat.pr_pid = pid;
11201 prstat.pr_cursig = cursig;
11202 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11203 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11204 NT_PRSTATUS, &prstat, sizeof (prstat));
11205 }
11206 #endif /* HAVE_PRSTATUS_T */
11207
11208 free (buf);
11209 return NULL;
11210 }
11211
11212 #if defined (HAVE_LWPSTATUS_T)
11213 char *
11214 elfcore_write_lwpstatus (bfd *abfd,
11215 char *buf,
11216 int *bufsiz,
11217 long pid,
11218 int cursig,
11219 const void *gregs)
11220 {
11221 lwpstatus_t lwpstat;
11222 const char *note_name = "CORE";
11223
11224 memset (&lwpstat, 0, sizeof (lwpstat));
11225 lwpstat.pr_lwpid = pid >> 16;
11226 lwpstat.pr_cursig = cursig;
11227 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11228 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11229 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11230 #if !defined(gregs)
11231 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11232 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11233 #else
11234 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11235 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11236 #endif
11237 #endif
11238 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11239 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11240 }
11241 #endif /* HAVE_LWPSTATUS_T */
11242
11243 #if defined (HAVE_PSTATUS_T)
11244 char *
11245 elfcore_write_pstatus (bfd *abfd,
11246 char *buf,
11247 int *bufsiz,
11248 long pid,
11249 int cursig ATTRIBUTE_UNUSED,
11250 const void *gregs ATTRIBUTE_UNUSED)
11251 {
11252 const char *note_name = "CORE";
11253 #if defined (HAVE_PSTATUS32_T)
11254 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11255
11256 if (bed->s->elfclass == ELFCLASS32)
11257 {
11258 pstatus32_t pstat;
11259
11260 memset (&pstat, 0, sizeof (pstat));
11261 pstat.pr_pid = pid & 0xffff;
11262 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11263 NT_PSTATUS, &pstat, sizeof (pstat));
11264 return buf;
11265 }
11266 else
11267 #endif
11268 {
11269 pstatus_t pstat;
11270
11271 memset (&pstat, 0, sizeof (pstat));
11272 pstat.pr_pid = pid & 0xffff;
11273 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11274 NT_PSTATUS, &pstat, sizeof (pstat));
11275 return buf;
11276 }
11277 }
11278 #endif /* HAVE_PSTATUS_T */
11279
11280 char *
11281 elfcore_write_prfpreg (bfd *abfd,
11282 char *buf,
11283 int *bufsiz,
11284 const void *fpregs,
11285 int size)
11286 {
11287 const char *note_name = "CORE";
11288 return elfcore_write_note (abfd, buf, bufsiz,
11289 note_name, NT_FPREGSET, fpregs, size);
11290 }
11291
11292 char *
11293 elfcore_write_prxfpreg (bfd *abfd,
11294 char *buf,
11295 int *bufsiz,
11296 const void *xfpregs,
11297 int size)
11298 {
11299 char *note_name = "LINUX";
11300 return elfcore_write_note (abfd, buf, bufsiz,
11301 note_name, NT_PRXFPREG, xfpregs, size);
11302 }
11303
11304 char *
11305 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11306 const void *xfpregs, int size)
11307 {
11308 char *note_name;
11309 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11310 note_name = "FreeBSD";
11311 else
11312 note_name = "LINUX";
11313 return elfcore_write_note (abfd, buf, bufsiz,
11314 note_name, NT_X86_XSTATE, xfpregs, size);
11315 }
11316
11317 char *
11318 elfcore_write_ppc_vmx (bfd *abfd,
11319 char *buf,
11320 int *bufsiz,
11321 const void *ppc_vmx,
11322 int size)
11323 {
11324 char *note_name = "LINUX";
11325 return elfcore_write_note (abfd, buf, bufsiz,
11326 note_name, NT_PPC_VMX, ppc_vmx, size);
11327 }
11328
11329 char *
11330 elfcore_write_ppc_vsx (bfd *abfd,
11331 char *buf,
11332 int *bufsiz,
11333 const void *ppc_vsx,
11334 int size)
11335 {
11336 char *note_name = "LINUX";
11337 return elfcore_write_note (abfd, buf, bufsiz,
11338 note_name, NT_PPC_VSX, ppc_vsx, size);
11339 }
11340
11341 char *
11342 elfcore_write_ppc_tar (bfd *abfd,
11343 char *buf,
11344 int *bufsiz,
11345 const void *ppc_tar,
11346 int size)
11347 {
11348 char *note_name = "LINUX";
11349 return elfcore_write_note (abfd, buf, bufsiz,
11350 note_name, NT_PPC_TAR, ppc_tar, size);
11351 }
11352
11353 char *
11354 elfcore_write_ppc_ppr (bfd *abfd,
11355 char *buf,
11356 int *bufsiz,
11357 const void *ppc_ppr,
11358 int size)
11359 {
11360 char *note_name = "LINUX";
11361 return elfcore_write_note (abfd, buf, bufsiz,
11362 note_name, NT_PPC_PPR, ppc_ppr, size);
11363 }
11364
11365 char *
11366 elfcore_write_ppc_dscr (bfd *abfd,
11367 char *buf,
11368 int *bufsiz,
11369 const void *ppc_dscr,
11370 int size)
11371 {
11372 char *note_name = "LINUX";
11373 return elfcore_write_note (abfd, buf, bufsiz,
11374 note_name, NT_PPC_DSCR, ppc_dscr, size);
11375 }
11376
11377 char *
11378 elfcore_write_ppc_ebb (bfd *abfd,
11379 char *buf,
11380 int *bufsiz,
11381 const void *ppc_ebb,
11382 int size)
11383 {
11384 char *note_name = "LINUX";
11385 return elfcore_write_note (abfd, buf, bufsiz,
11386 note_name, NT_PPC_EBB, ppc_ebb, size);
11387 }
11388
11389 char *
11390 elfcore_write_ppc_pmu (bfd *abfd,
11391 char *buf,
11392 int *bufsiz,
11393 const void *ppc_pmu,
11394 int size)
11395 {
11396 char *note_name = "LINUX";
11397 return elfcore_write_note (abfd, buf, bufsiz,
11398 note_name, NT_PPC_PMU, ppc_pmu, size);
11399 }
11400
11401 char *
11402 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11403 char *buf,
11404 int *bufsiz,
11405 const void *ppc_tm_cgpr,
11406 int size)
11407 {
11408 char *note_name = "LINUX";
11409 return elfcore_write_note (abfd, buf, bufsiz,
11410 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11411 }
11412
11413 char *
11414 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11415 char *buf,
11416 int *bufsiz,
11417 const void *ppc_tm_cfpr,
11418 int size)
11419 {
11420 char *note_name = "LINUX";
11421 return elfcore_write_note (abfd, buf, bufsiz,
11422 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11423 }
11424
11425 char *
11426 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11427 char *buf,
11428 int *bufsiz,
11429 const void *ppc_tm_cvmx,
11430 int size)
11431 {
11432 char *note_name = "LINUX";
11433 return elfcore_write_note (abfd, buf, bufsiz,
11434 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11435 }
11436
11437 char *
11438 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11439 char *buf,
11440 int *bufsiz,
11441 const void *ppc_tm_cvsx,
11442 int size)
11443 {
11444 char *note_name = "LINUX";
11445 return elfcore_write_note (abfd, buf, bufsiz,
11446 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11447 }
11448
11449 char *
11450 elfcore_write_ppc_tm_spr (bfd *abfd,
11451 char *buf,
11452 int *bufsiz,
11453 const void *ppc_tm_spr,
11454 int size)
11455 {
11456 char *note_name = "LINUX";
11457 return elfcore_write_note (abfd, buf, bufsiz,
11458 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11459 }
11460
11461 char *
11462 elfcore_write_ppc_tm_ctar (bfd *abfd,
11463 char *buf,
11464 int *bufsiz,
11465 const void *ppc_tm_ctar,
11466 int size)
11467 {
11468 char *note_name = "LINUX";
11469 return elfcore_write_note (abfd, buf, bufsiz,
11470 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11471 }
11472
11473 char *
11474 elfcore_write_ppc_tm_cppr (bfd *abfd,
11475 char *buf,
11476 int *bufsiz,
11477 const void *ppc_tm_cppr,
11478 int size)
11479 {
11480 char *note_name = "LINUX";
11481 return elfcore_write_note (abfd, buf, bufsiz,
11482 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11483 }
11484
11485 char *
11486 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11487 char *buf,
11488 int *bufsiz,
11489 const void *ppc_tm_cdscr,
11490 int size)
11491 {
11492 char *note_name = "LINUX";
11493 return elfcore_write_note (abfd, buf, bufsiz,
11494 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11495 }
11496
11497 static char *
11498 elfcore_write_s390_high_gprs (bfd *abfd,
11499 char *buf,
11500 int *bufsiz,
11501 const void *s390_high_gprs,
11502 int size)
11503 {
11504 char *note_name = "LINUX";
11505 return elfcore_write_note (abfd, buf, bufsiz,
11506 note_name, NT_S390_HIGH_GPRS,
11507 s390_high_gprs, size);
11508 }
11509
11510 char *
11511 elfcore_write_s390_timer (bfd *abfd,
11512 char *buf,
11513 int *bufsiz,
11514 const void *s390_timer,
11515 int size)
11516 {
11517 char *note_name = "LINUX";
11518 return elfcore_write_note (abfd, buf, bufsiz,
11519 note_name, NT_S390_TIMER, s390_timer, size);
11520 }
11521
11522 char *
11523 elfcore_write_s390_todcmp (bfd *abfd,
11524 char *buf,
11525 int *bufsiz,
11526 const void *s390_todcmp,
11527 int size)
11528 {
11529 char *note_name = "LINUX";
11530 return elfcore_write_note (abfd, buf, bufsiz,
11531 note_name, NT_S390_TODCMP, s390_todcmp, size);
11532 }
11533
11534 char *
11535 elfcore_write_s390_todpreg (bfd *abfd,
11536 char *buf,
11537 int *bufsiz,
11538 const void *s390_todpreg,
11539 int size)
11540 {
11541 char *note_name = "LINUX";
11542 return elfcore_write_note (abfd, buf, bufsiz,
11543 note_name, NT_S390_TODPREG, s390_todpreg, size);
11544 }
11545
11546 char *
11547 elfcore_write_s390_ctrs (bfd *abfd,
11548 char *buf,
11549 int *bufsiz,
11550 const void *s390_ctrs,
11551 int size)
11552 {
11553 char *note_name = "LINUX";
11554 return elfcore_write_note (abfd, buf, bufsiz,
11555 note_name, NT_S390_CTRS, s390_ctrs, size);
11556 }
11557
11558 char *
11559 elfcore_write_s390_prefix (bfd *abfd,
11560 char *buf,
11561 int *bufsiz,
11562 const void *s390_prefix,
11563 int size)
11564 {
11565 char *note_name = "LINUX";
11566 return elfcore_write_note (abfd, buf, bufsiz,
11567 note_name, NT_S390_PREFIX, s390_prefix, size);
11568 }
11569
11570 char *
11571 elfcore_write_s390_last_break (bfd *abfd,
11572 char *buf,
11573 int *bufsiz,
11574 const void *s390_last_break,
11575 int size)
11576 {
11577 char *note_name = "LINUX";
11578 return elfcore_write_note (abfd, buf, bufsiz,
11579 note_name, NT_S390_LAST_BREAK,
11580 s390_last_break, size);
11581 }
11582
11583 char *
11584 elfcore_write_s390_system_call (bfd *abfd,
11585 char *buf,
11586 int *bufsiz,
11587 const void *s390_system_call,
11588 int size)
11589 {
11590 char *note_name = "LINUX";
11591 return elfcore_write_note (abfd, buf, bufsiz,
11592 note_name, NT_S390_SYSTEM_CALL,
11593 s390_system_call, size);
11594 }
11595
11596 char *
11597 elfcore_write_s390_tdb (bfd *abfd,
11598 char *buf,
11599 int *bufsiz,
11600 const void *s390_tdb,
11601 int size)
11602 {
11603 char *note_name = "LINUX";
11604 return elfcore_write_note (abfd, buf, bufsiz,
11605 note_name, NT_S390_TDB, s390_tdb, size);
11606 }
11607
11608 char *
11609 elfcore_write_s390_vxrs_low (bfd *abfd,
11610 char *buf,
11611 int *bufsiz,
11612 const void *s390_vxrs_low,
11613 int size)
11614 {
11615 char *note_name = "LINUX";
11616 return elfcore_write_note (abfd, buf, bufsiz,
11617 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11618 }
11619
11620 char *
11621 elfcore_write_s390_vxrs_high (bfd *abfd,
11622 char *buf,
11623 int *bufsiz,
11624 const void *s390_vxrs_high,
11625 int size)
11626 {
11627 char *note_name = "LINUX";
11628 return elfcore_write_note (abfd, buf, bufsiz,
11629 note_name, NT_S390_VXRS_HIGH,
11630 s390_vxrs_high, size);
11631 }
11632
11633 char *
11634 elfcore_write_s390_gs_cb (bfd *abfd,
11635 char *buf,
11636 int *bufsiz,
11637 const void *s390_gs_cb,
11638 int size)
11639 {
11640 char *note_name = "LINUX";
11641 return elfcore_write_note (abfd, buf, bufsiz,
11642 note_name, NT_S390_GS_CB,
11643 s390_gs_cb, size);
11644 }
11645
11646 char *
11647 elfcore_write_s390_gs_bc (bfd *abfd,
11648 char *buf,
11649 int *bufsiz,
11650 const void *s390_gs_bc,
11651 int size)
11652 {
11653 char *note_name = "LINUX";
11654 return elfcore_write_note (abfd, buf, bufsiz,
11655 note_name, NT_S390_GS_BC,
11656 s390_gs_bc, size);
11657 }
11658
11659 char *
11660 elfcore_write_arm_vfp (bfd *abfd,
11661 char *buf,
11662 int *bufsiz,
11663 const void *arm_vfp,
11664 int size)
11665 {
11666 char *note_name = "LINUX";
11667 return elfcore_write_note (abfd, buf, bufsiz,
11668 note_name, NT_ARM_VFP, arm_vfp, size);
11669 }
11670
11671 char *
11672 elfcore_write_aarch_tls (bfd *abfd,
11673 char *buf,
11674 int *bufsiz,
11675 const void *aarch_tls,
11676 int size)
11677 {
11678 char *note_name = "LINUX";
11679 return elfcore_write_note (abfd, buf, bufsiz,
11680 note_name, NT_ARM_TLS, aarch_tls, size);
11681 }
11682
11683 char *
11684 elfcore_write_aarch_hw_break (bfd *abfd,
11685 char *buf,
11686 int *bufsiz,
11687 const void *aarch_hw_break,
11688 int size)
11689 {
11690 char *note_name = "LINUX";
11691 return elfcore_write_note (abfd, buf, bufsiz,
11692 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11693 }
11694
11695 char *
11696 elfcore_write_aarch_hw_watch (bfd *abfd,
11697 char *buf,
11698 int *bufsiz,
11699 const void *aarch_hw_watch,
11700 int size)
11701 {
11702 char *note_name = "LINUX";
11703 return elfcore_write_note (abfd, buf, bufsiz,
11704 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11705 }
11706
11707 char *
11708 elfcore_write_aarch_sve (bfd *abfd,
11709 char *buf,
11710 int *bufsiz,
11711 const void *aarch_sve,
11712 int size)
11713 {
11714 char *note_name = "LINUX";
11715 return elfcore_write_note (abfd, buf, bufsiz,
11716 note_name, NT_ARM_SVE, aarch_sve, size);
11717 }
11718
11719 char *
11720 elfcore_write_aarch_pauth (bfd *abfd,
11721 char *buf,
11722 int *bufsiz,
11723 const void *aarch_pauth,
11724 int size)
11725 {
11726 char *note_name = "LINUX";
11727 return elfcore_write_note (abfd, buf, bufsiz,
11728 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11729 }
11730
11731 char *
11732 elfcore_write_register_note (bfd *abfd,
11733 char *buf,
11734 int *bufsiz,
11735 const char *section,
11736 const void *data,
11737 int size)
11738 {
11739 if (strcmp (section, ".reg2") == 0)
11740 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11741 if (strcmp (section, ".reg-xfp") == 0)
11742 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11743 if (strcmp (section, ".reg-xstate") == 0)
11744 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11745 if (strcmp (section, ".reg-ppc-vmx") == 0)
11746 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11747 if (strcmp (section, ".reg-ppc-vsx") == 0)
11748 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11749 if (strcmp (section, ".reg-ppc-tar") == 0)
11750 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11751 if (strcmp (section, ".reg-ppc-ppr") == 0)
11752 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11753 if (strcmp (section, ".reg-ppc-dscr") == 0)
11754 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11755 if (strcmp (section, ".reg-ppc-ebb") == 0)
11756 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11757 if (strcmp (section, ".reg-ppc-pmu") == 0)
11758 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11759 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11760 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11761 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11762 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11763 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11764 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11765 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11766 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11767 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11768 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11769 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11770 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11771 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11772 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11773 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11774 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11775 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11776 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11777 if (strcmp (section, ".reg-s390-timer") == 0)
11778 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11779 if (strcmp (section, ".reg-s390-todcmp") == 0)
11780 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11781 if (strcmp (section, ".reg-s390-todpreg") == 0)
11782 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11783 if (strcmp (section, ".reg-s390-ctrs") == 0)
11784 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11785 if (strcmp (section, ".reg-s390-prefix") == 0)
11786 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11787 if (strcmp (section, ".reg-s390-last-break") == 0)
11788 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11789 if (strcmp (section, ".reg-s390-system-call") == 0)
11790 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11791 if (strcmp (section, ".reg-s390-tdb") == 0)
11792 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11793 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11794 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11795 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11796 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11797 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11798 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11799 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11800 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11801 if (strcmp (section, ".reg-arm-vfp") == 0)
11802 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11803 if (strcmp (section, ".reg-aarch-tls") == 0)
11804 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11805 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11806 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11807 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11808 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11809 if (strcmp (section, ".reg-aarch-sve") == 0)
11810 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11811 if (strcmp (section, ".reg-aarch-pauth") == 0)
11812 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11813 return NULL;
11814 }
11815
11816 static bfd_boolean
11817 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11818 size_t align)
11819 {
11820 char *p;
11821
11822 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11823 gABI specifies that PT_NOTE alignment should be aligned to 4
11824 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11825 align is less than 4, we use 4 byte alignment. */
11826 if (align < 4)
11827 align = 4;
11828 if (align != 4 && align != 8)
11829 return FALSE;
11830
11831 p = buf;
11832 while (p < buf + size)
11833 {
11834 Elf_External_Note *xnp = (Elf_External_Note *) p;
11835 Elf_Internal_Note in;
11836
11837 if (offsetof (Elf_External_Note, name) > buf - p + size)
11838 return FALSE;
11839
11840 in.type = H_GET_32 (abfd, xnp->type);
11841
11842 in.namesz = H_GET_32 (abfd, xnp->namesz);
11843 in.namedata = xnp->name;
11844 if (in.namesz > buf - in.namedata + size)
11845 return FALSE;
11846
11847 in.descsz = H_GET_32 (abfd, xnp->descsz);
11848 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
11849 in.descpos = offset + (in.descdata - buf);
11850 if (in.descsz != 0
11851 && (in.descdata >= buf + size
11852 || in.descsz > buf - in.descdata + size))
11853 return FALSE;
11854
11855 switch (bfd_get_format (abfd))
11856 {
11857 default:
11858 return TRUE;
11859
11860 case bfd_core:
11861 {
11862 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
11863 struct
11864 {
11865 const char * string;
11866 size_t len;
11867 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
11868 }
11869 grokers[] =
11870 {
11871 GROKER_ELEMENT ("", elfcore_grok_note),
11872 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
11873 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11874 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11875 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
11876 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11877 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
11878 };
11879 #undef GROKER_ELEMENT
11880 int i;
11881
11882 for (i = ARRAY_SIZE (grokers); i--;)
11883 {
11884 if (in.namesz >= grokers[i].len
11885 && strncmp (in.namedata, grokers[i].string,
11886 grokers[i].len) == 0)
11887 {
11888 if (! grokers[i].func (abfd, & in))
11889 return FALSE;
11890 break;
11891 }
11892 }
11893 break;
11894 }
11895
11896 case bfd_object:
11897 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11898 {
11899 if (! elfobj_grok_gnu_note (abfd, &in))
11900 return FALSE;
11901 }
11902 else if (in.namesz == sizeof "stapsdt"
11903 && strcmp (in.namedata, "stapsdt") == 0)
11904 {
11905 if (! elfobj_grok_stapsdt_note (abfd, &in))
11906 return FALSE;
11907 }
11908 break;
11909 }
11910
11911 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
11912 }
11913
11914 return TRUE;
11915 }
11916
11917 bfd_boolean
11918 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11919 size_t align)
11920 {
11921 char *buf;
11922
11923 if (size == 0 || (size + 1) == 0)
11924 return TRUE;
11925
11926 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11927 return FALSE;
11928
11929 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
11930 if (buf == NULL)
11931 return FALSE;
11932
11933 /* PR 17512: file: ec08f814
11934 0-termintate the buffer so that string searches will not overflow. */
11935 buf[size] = 0;
11936
11937 if (!elf_parse_notes (abfd, buf, size, offset, align))
11938 {
11939 free (buf);
11940 return FALSE;
11941 }
11942
11943 free (buf);
11944 return TRUE;
11945 }
11946 \f
11947 /* Providing external access to the ELF program header table. */
11948
11949 /* Return an upper bound on the number of bytes required to store a
11950 copy of ABFD's program header table entries. Return -1 if an error
11951 occurs; bfd_get_error will return an appropriate code. */
11952
11953 long
11954 bfd_get_elf_phdr_upper_bound (bfd *abfd)
11955 {
11956 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11957 {
11958 bfd_set_error (bfd_error_wrong_format);
11959 return -1;
11960 }
11961
11962 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
11963 }
11964
11965 /* Copy ABFD's program header table entries to *PHDRS. The entries
11966 will be stored as an array of Elf_Internal_Phdr structures, as
11967 defined in include/elf/internal.h. To find out how large the
11968 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11969
11970 Return the number of program header table entries read, or -1 if an
11971 error occurs; bfd_get_error will return an appropriate code. */
11972
11973 int
11974 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
11975 {
11976 int num_phdrs;
11977
11978 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11979 {
11980 bfd_set_error (bfd_error_wrong_format);
11981 return -1;
11982 }
11983
11984 num_phdrs = elf_elfheader (abfd)->e_phnum;
11985 if (num_phdrs != 0)
11986 memcpy (phdrs, elf_tdata (abfd)->phdr,
11987 num_phdrs * sizeof (Elf_Internal_Phdr));
11988
11989 return num_phdrs;
11990 }
11991
11992 enum elf_reloc_type_class
11993 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
11994 const asection *rel_sec ATTRIBUTE_UNUSED,
11995 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
11996 {
11997 return reloc_class_normal;
11998 }
11999
12000 /* For RELA architectures, return the relocation value for a
12001 relocation against a local symbol. */
12002
12003 bfd_vma
12004 _bfd_elf_rela_local_sym (bfd *abfd,
12005 Elf_Internal_Sym *sym,
12006 asection **psec,
12007 Elf_Internal_Rela *rel)
12008 {
12009 asection *sec = *psec;
12010 bfd_vma relocation;
12011
12012 relocation = (sec->output_section->vma
12013 + sec->output_offset
12014 + sym->st_value);
12015 if ((sec->flags & SEC_MERGE)
12016 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12017 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12018 {
12019 rel->r_addend =
12020 _bfd_merged_section_offset (abfd, psec,
12021 elf_section_data (sec)->sec_info,
12022 sym->st_value + rel->r_addend);
12023 if (sec != *psec)
12024 {
12025 /* If we have changed the section, and our original section is
12026 marked with SEC_EXCLUDE, it means that the original
12027 SEC_MERGE section has been completely subsumed in some
12028 other SEC_MERGE section. In this case, we need to leave
12029 some info around for --emit-relocs. */
12030 if ((sec->flags & SEC_EXCLUDE) != 0)
12031 sec->kept_section = *psec;
12032 sec = *psec;
12033 }
12034 rel->r_addend -= relocation;
12035 rel->r_addend += sec->output_section->vma + sec->output_offset;
12036 }
12037 return relocation;
12038 }
12039
12040 bfd_vma
12041 _bfd_elf_rel_local_sym (bfd *abfd,
12042 Elf_Internal_Sym *sym,
12043 asection **psec,
12044 bfd_vma addend)
12045 {
12046 asection *sec = *psec;
12047
12048 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12049 return sym->st_value + addend;
12050
12051 return _bfd_merged_section_offset (abfd, psec,
12052 elf_section_data (sec)->sec_info,
12053 sym->st_value + addend);
12054 }
12055
12056 /* Adjust an address within a section. Given OFFSET within SEC, return
12057 the new offset within the section, based upon changes made to the
12058 section. Returns -1 if the offset is now invalid.
12059 The offset (in abnd out) is in target sized bytes, however big a
12060 byte may be. */
12061
12062 bfd_vma
12063 _bfd_elf_section_offset (bfd *abfd,
12064 struct bfd_link_info *info,
12065 asection *sec,
12066 bfd_vma offset)
12067 {
12068 switch (sec->sec_info_type)
12069 {
12070 case SEC_INFO_TYPE_STABS:
12071 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12072 offset);
12073 case SEC_INFO_TYPE_EH_FRAME:
12074 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12075
12076 default:
12077 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12078 {
12079 /* Reverse the offset. */
12080 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12081 bfd_size_type address_size = bed->s->arch_size / 8;
12082
12083 /* address_size and sec->size are in octets. Convert
12084 to bytes before subtracting the original offset. */
12085 offset = ((sec->size - address_size)
12086 / bfd_octets_per_byte (abfd, sec) - offset);
12087 }
12088 return offset;
12089 }
12090 }
12091 \f
12092 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12093 reconstruct an ELF file by reading the segments out of remote memory
12094 based on the ELF file header at EHDR_VMA and the ELF program headers it
12095 points to. If not null, *LOADBASEP is filled in with the difference
12096 between the VMAs from which the segments were read, and the VMAs the
12097 file headers (and hence BFD's idea of each section's VMA) put them at.
12098
12099 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12100 remote memory at target address VMA into the local buffer at MYADDR; it
12101 should return zero on success or an `errno' code on failure. TEMPL must
12102 be a BFD for an ELF target with the word size and byte order found in
12103 the remote memory. */
12104
12105 bfd *
12106 bfd_elf_bfd_from_remote_memory
12107 (bfd *templ,
12108 bfd_vma ehdr_vma,
12109 bfd_size_type size,
12110 bfd_vma *loadbasep,
12111 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12112 {
12113 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12114 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12115 }
12116 \f
12117 long
12118 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12119 long symcount ATTRIBUTE_UNUSED,
12120 asymbol **syms ATTRIBUTE_UNUSED,
12121 long dynsymcount,
12122 asymbol **dynsyms,
12123 asymbol **ret)
12124 {
12125 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12126 asection *relplt;
12127 asymbol *s;
12128 const char *relplt_name;
12129 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12130 arelent *p;
12131 long count, i, n;
12132 size_t size;
12133 Elf_Internal_Shdr *hdr;
12134 char *names;
12135 asection *plt;
12136
12137 *ret = NULL;
12138
12139 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12140 return 0;
12141
12142 if (dynsymcount <= 0)
12143 return 0;
12144
12145 if (!bed->plt_sym_val)
12146 return 0;
12147
12148 relplt_name = bed->relplt_name;
12149 if (relplt_name == NULL)
12150 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12151 relplt = bfd_get_section_by_name (abfd, relplt_name);
12152 if (relplt == NULL)
12153 return 0;
12154
12155 hdr = &elf_section_data (relplt)->this_hdr;
12156 if (hdr->sh_link != elf_dynsymtab (abfd)
12157 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12158 return 0;
12159
12160 plt = bfd_get_section_by_name (abfd, ".plt");
12161 if (plt == NULL)
12162 return 0;
12163
12164 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12165 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12166 return -1;
12167
12168 count = relplt->size / hdr->sh_entsize;
12169 size = count * sizeof (asymbol);
12170 p = relplt->relocation;
12171 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12172 {
12173 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12174 if (p->addend != 0)
12175 {
12176 #ifdef BFD64
12177 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12178 #else
12179 size += sizeof ("+0x") - 1 + 8;
12180 #endif
12181 }
12182 }
12183
12184 s = *ret = (asymbol *) bfd_malloc (size);
12185 if (s == NULL)
12186 return -1;
12187
12188 names = (char *) (s + count);
12189 p = relplt->relocation;
12190 n = 0;
12191 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12192 {
12193 size_t len;
12194 bfd_vma addr;
12195
12196 addr = bed->plt_sym_val (i, plt, p);
12197 if (addr == (bfd_vma) -1)
12198 continue;
12199
12200 *s = **p->sym_ptr_ptr;
12201 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12202 we are defining a symbol, ensure one of them is set. */
12203 if ((s->flags & BSF_LOCAL) == 0)
12204 s->flags |= BSF_GLOBAL;
12205 s->flags |= BSF_SYNTHETIC;
12206 s->section = plt;
12207 s->value = addr - plt->vma;
12208 s->name = names;
12209 s->udata.p = NULL;
12210 len = strlen ((*p->sym_ptr_ptr)->name);
12211 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12212 names += len;
12213 if (p->addend != 0)
12214 {
12215 char buf[30], *a;
12216
12217 memcpy (names, "+0x", sizeof ("+0x") - 1);
12218 names += sizeof ("+0x") - 1;
12219 bfd_sprintf_vma (abfd, buf, p->addend);
12220 for (a = buf; *a == '0'; ++a)
12221 ;
12222 len = strlen (a);
12223 memcpy (names, a, len);
12224 names += len;
12225 }
12226 memcpy (names, "@plt", sizeof ("@plt"));
12227 names += sizeof ("@plt");
12228 ++s, ++n;
12229 }
12230
12231 return n;
12232 }
12233
12234 /* It is only used by x86-64 so far.
12235 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12236 but current usage would allow all of _bfd_std_section to be zero. */
12237 static const asymbol lcomm_sym
12238 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12239 asection _bfd_elf_large_com_section
12240 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12241 "LARGE_COMMON", 0, SEC_IS_COMMON);
12242
12243 bfd_boolean
12244 _bfd_elf_final_write_processing (bfd *abfd)
12245 {
12246 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12247
12248 i_ehdrp = elf_elfheader (abfd);
12249
12250 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12251 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12252
12253 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12254 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12255 STB_GNU_UNIQUE binding. */
12256 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12257 {
12258 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12259 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12260 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12261 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12262 {
12263 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12264 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12265 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12266 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12267 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12268 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12269 bfd_set_error (bfd_error_sorry);
12270 return FALSE;
12271 }
12272 }
12273 return TRUE;
12274 }
12275
12276
12277 /* Return TRUE for ELF symbol types that represent functions.
12278 This is the default version of this function, which is sufficient for
12279 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12280
12281 bfd_boolean
12282 _bfd_elf_is_function_type (unsigned int type)
12283 {
12284 return (type == STT_FUNC
12285 || type == STT_GNU_IFUNC);
12286 }
12287
12288 /* If the ELF symbol SYM might be a function in SEC, return the
12289 function size and set *CODE_OFF to the function's entry point,
12290 otherwise return zero. */
12291
12292 bfd_size_type
12293 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12294 bfd_vma *code_off)
12295 {
12296 bfd_size_type size;
12297
12298 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12299 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12300 || sym->section != sec)
12301 return 0;
12302
12303 *code_off = sym->value;
12304 size = 0;
12305 if (!(sym->flags & BSF_SYNTHETIC))
12306 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12307 if (size == 0)
12308 size = 1;
12309 return size;
12310 }
This page took 0.284178 seconds and 4 git commands to generate.