Fix an abort triggered when objcopy is used to set the "share" section flag on an...
[binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
55 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
56 file_ptr offset, size_t align);
57
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62 /* Swap in a Verdef structure. */
63
64 void
65 _bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
68 {
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
76 }
77
78 /* Swap out a Verdef structure. */
79
80 void
81 _bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
84 {
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
92 }
93
94 /* Swap in a Verdaux structure. */
95
96 void
97 _bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
100 {
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
103 }
104
105 /* Swap out a Verdaux structure. */
106
107 void
108 _bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
111 {
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
114 }
115
116 /* Swap in a Verneed structure. */
117
118 void
119 _bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
122 {
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
128 }
129
130 /* Swap out a Verneed structure. */
131
132 void
133 _bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
136 {
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
142 }
143
144 /* Swap in a Vernaux structure. */
145
146 void
147 _bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
150 {
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
156 }
157
158 /* Swap out a Vernaux structure. */
159
160 void
161 _bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
164 {
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
170 }
171
172 /* Swap in a Versym structure. */
173
174 void
175 _bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
178 {
179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
180 }
181
182 /* Swap out a Versym structure. */
183
184 void
185 _bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
188 {
189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
190 }
191
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
194
195 unsigned long
196 bfd_elf_hash (const char *namearg)
197 {
198 const unsigned char *name = (const unsigned char *) namearg;
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
214 return h & 0xffffffff;
215 }
216
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220 unsigned long
221 bfd_elf_gnu_hash (const char *namearg)
222 {
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230 }
231
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
234 bfd_boolean
235 bfd_elf_allocate_object (bfd *abfd,
236 size_t object_size,
237 enum elf_target_id object_id)
238 {
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
243
244 elf_object_id (abfd) = object_id;
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
253 return TRUE;
254 }
255
256
257 bfd_boolean
258 bfd_elf_make_object (bfd *abfd)
259 {
260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
262 bed->target_id);
263 }
264
265 bfd_boolean
266 bfd_elf_mkcorefile (bfd *abfd)
267 {
268 /* I think this can be done just like an object file. */
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
273 }
274
275 char *
276 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
277 {
278 Elf_Internal_Shdr **i_shdrp;
279 bfd_byte *shstrtab = NULL;
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
282
283 i_shdrp = elf_elfsections (abfd);
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
287 return NULL;
288
289 shstrtab = i_shdrp[shindex]->contents;
290 if (shstrtab == NULL)
291 {
292 /* No cached one, attempt to read, and cache what we read. */
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize + 1 <= 1
299 || bfd_seek (abfd, offset, SEEK_SET) != 0
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
310 i_shdrp[shindex]->contents = shstrtab;
311 }
312 return (char *) shstrtab;
313 }
314
315 char *
316 bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
319 {
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
328 hdr = elf_elfsections (abfd)[shindex];
329
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
338 abfd, shindex);
339 return NULL;
340 }
341
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
355
356 if (strindex >= hdr->sh_size)
357 {
358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
359 _bfd_error_handler
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
363 (shindex == shstrndx && strindex == hdr->sh_name
364 ? ".shstrtab"
365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
366 return NULL;
367 }
368
369 return ((char *) hdr->contents) + strindex;
370 }
371
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
379
380 Elf_Internal_Sym *
381 bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
388 {
389 Elf_Internal_Shdr *shndx_hdr;
390 void *alloc_ext;
391 const bfd_byte *esym;
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
394 Elf_Internal_Sym *alloc_intsym;
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
397 const struct elf_backend_data *bed;
398 size_t extsym_size;
399 size_t amt;
400 file_ptr pos;
401
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
442 alloc_intsym = NULL;
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
454 alloc_ext = bfd_malloc (amt);
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
498 intsym_buf = alloc_intsym;
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
506 shndx = extshndx_buf;
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd, (unsigned long) symoffset);
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529 }
530
531 /* Look up a symbol name. */
532 const char *
533 bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
537 {
538 const char *name;
539 unsigned int iname = isym->st_name;
540 unsigned int shindex = symtab_hdr->sh_link;
541
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym->st_shndx < elf_numsections (abfd))
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
554 name = bfd_section_name (sym_sec);
555
556 return name;
557 }
558
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563 typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566 } Elf_Internal_Group;
567
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571 static const char *
572 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 {
574 Elf_Internal_Shdr *hdr;
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
578
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
586 return NULL;
587
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
592 return NULL;
593
594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
595 }
596
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
598
599 static bfd_boolean
600 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 {
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum = elf_numsections (abfd);
613 num_group = 0;
614
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
626 num_group += 1;
627 }
628
629 if (num_group == 0)
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
633 elf_tdata (abfd)->group_sect_ptr = NULL;
634 }
635 else
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
639 size_t amt;
640
641 elf_tdata (abfd)->num_group = num_group;
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
646 return FALSE;
647 num_group = 0;
648
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 {
655 unsigned char *src;
656 Elf_Internal_Group *dest;
657
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 {
676 _bfd_error_handler
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
683 continue;
684 }
685
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->shdr = NULL;
703 dest->flags = idx;
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
707 break;
708 }
709 if (idx < shnum)
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
721 {
722 _bfd_error_handler
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
726 }
727 }
728 }
729 }
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
741 _bfd_error_handler
742 (_("%pB: no valid group sections found"), abfd);
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
753
754 for (j = 0; j < num_group; j++)
755 {
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
760 Elf_Internal_Group *idx;
761 bfd_size_type n_elt;
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
777 n_elt = shdr->sh_size / 4;
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
784 asection *s = NULL;
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
794 && elf_next_in_group (s) != NULL)
795 break;
796 if (n_elt != 0)
797 {
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
803 }
804 else
805 {
806 const char *gname;
807
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
810 return FALSE;
811 elf_group_name (newsect) = gname;
812
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect) = newsect;
815 }
816
817 /* If the group section has been created, point to the
818 new member. */
819 if (shdr->bfd_section != NULL)
820 elf_next_in_group (shdr->bfd_section) = newsect;
821
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
824 break;
825 }
826 }
827 }
828
829 if (elf_group_name (newsect) == NULL)
830 {
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
833 abfd, newsect);
834 return FALSE;
835 }
836 return TRUE;
837 }
838
839 bfd_boolean
840 _bfd_elf_setup_sections (bfd *abfd)
841 {
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
860 if (bed->link_order_error_handler)
861 bed->link_order_error_handler
862 /* xgettext:c-format */
863 (_("%pB: warning: sh_link not set for section `%pA'"),
864 abfd, s);
865 }
866 else
867 {
868 asection *linksec = NULL;
869
870 if (elfsec < elf_numsections (abfd))
871 {
872 this_hdr = elf_elfsections (abfd)[elfsec];
873 linksec = this_hdr->bfd_section;
874 }
875
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
879 if (linksec == NULL)
880 {
881 _bfd_error_handler
882 /* xgettext:c-format */
883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
884 s->owner, elfsec, s);
885 result = FALSE;
886 }
887
888 elf_linked_to_section (s) = linksec;
889 }
890 }
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
893 {
894 _bfd_error_handler
895 /* xgettext:c-format */
896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
897 abfd, elf_section_data (s)->this_idx);
898 result = FALSE;
899 }
900 }
901
902 /* Process section groups. */
903 if (num_group == (unsigned) -1)
904 return result;
905
906 for (i = 0; i < num_group; i++)
907 {
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
911
912 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
913 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
914 {
915 _bfd_error_handler
916 /* xgettext:c-format */
917 (_("%pB: section group entry number %u is corrupt"),
918 abfd, i);
919 result = FALSE;
920 continue;
921 }
922
923 idx = (Elf_Internal_Group *) shdr->contents;
924 n_elt = shdr->sh_size / 4;
925
926 while (--n_elt != 0)
927 {
928 ++ idx;
929
930 if (idx->shdr == NULL)
931 continue;
932 else if (idx->shdr->bfd_section)
933 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
934 else if (idx->shdr->sh_type != SHT_RELA
935 && idx->shdr->sh_type != SHT_REL)
936 {
937 /* There are some unknown sections in the group. */
938 _bfd_error_handler
939 /* xgettext:c-format */
940 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
941 abfd,
942 idx->shdr->sh_type,
943 bfd_elf_string_from_elf_section (abfd,
944 (elf_elfheader (abfd)
945 ->e_shstrndx),
946 idx->shdr->sh_name),
947 shdr->bfd_section);
948 result = FALSE;
949 }
950 }
951 }
952
953 return result;
954 }
955
956 bfd_boolean
957 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
958 {
959 return elf_next_in_group (sec) != NULL;
960 }
961
962 const char *
963 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
964 {
965 if (elf_sec_group (sec) != NULL)
966 return elf_group_name (sec);
967 return NULL;
968 }
969
970 static char *
971 convert_debug_to_zdebug (bfd *abfd, const char *name)
972 {
973 unsigned int len = strlen (name);
974 char *new_name = bfd_alloc (abfd, len + 2);
975 if (new_name == NULL)
976 return NULL;
977 new_name[0] = '.';
978 new_name[1] = 'z';
979 memcpy (new_name + 2, name + 1, len);
980 return new_name;
981 }
982
983 static char *
984 convert_zdebug_to_debug (bfd *abfd, const char *name)
985 {
986 unsigned int len = strlen (name);
987 char *new_name = bfd_alloc (abfd, len);
988 if (new_name == NULL)
989 return NULL;
990 new_name[0] = '.';
991 memcpy (new_name + 1, name + 2, len - 1);
992 return new_name;
993 }
994
995 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
996
997 struct lto_section
998 {
999 int16_t major_version;
1000 int16_t minor_version;
1001 unsigned char slim_object;
1002
1003 /* Flags is a private field that is not defined publicly. */
1004 uint16_t flags;
1005 };
1006
1007 /* Make a BFD section from an ELF section. We store a pointer to the
1008 BFD section in the bfd_section field of the header. */
1009
1010 bfd_boolean
1011 _bfd_elf_make_section_from_shdr (bfd *abfd,
1012 Elf_Internal_Shdr *hdr,
1013 const char *name,
1014 int shindex)
1015 {
1016 asection *newsect;
1017 flagword flags;
1018 const struct elf_backend_data *bed;
1019
1020 if (hdr->bfd_section != NULL)
1021 return TRUE;
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
1025 return FALSE;
1026
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
1029 elf_section_data (newsect)->this_idx = shindex;
1030
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
1035 newsect->filepos = hdr->sh_offset;
1036
1037 if (!bfd_set_section_vma (newsect, hdr->sh_addr)
1038 || !bfd_set_section_size (newsect, hdr->sh_size)
1039 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1040 return FALSE;
1041
1042 flags = SEC_NO_FLAGS;
1043 if (hdr->sh_type != SHT_NOBITS)
1044 flags |= SEC_HAS_CONTENTS;
1045 if (hdr->sh_type == SHT_GROUP)
1046 flags |= SEC_GROUP;
1047 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1048 {
1049 flags |= SEC_ALLOC;
1050 if (hdr->sh_type != SHT_NOBITS)
1051 flags |= SEC_LOAD;
1052 }
1053 if ((hdr->sh_flags & SHF_WRITE) == 0)
1054 flags |= SEC_READONLY;
1055 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1056 flags |= SEC_CODE;
1057 else if ((flags & SEC_LOAD) != 0)
1058 flags |= SEC_DATA;
1059 if ((hdr->sh_flags & SHF_MERGE) != 0)
1060 {
1061 flags |= SEC_MERGE;
1062 newsect->entsize = hdr->sh_entsize;
1063 }
1064 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1065 flags |= SEC_STRINGS;
1066 if (hdr->sh_flags & SHF_GROUP)
1067 if (!setup_group (abfd, hdr, newsect))
1068 return FALSE;
1069 if ((hdr->sh_flags & SHF_TLS) != 0)
1070 flags |= SEC_THREAD_LOCAL;
1071 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1072 flags |= SEC_EXCLUDE;
1073
1074 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1075 {
1076 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1077 but binutils as of 2019-07-23 did not set the EI_OSABI header
1078 byte. */
1079 case ELFOSABI_NONE:
1080 case ELFOSABI_GNU:
1081 case ELFOSABI_FREEBSD:
1082 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1083 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1084 break;
1085 }
1086
1087 if ((flags & SEC_ALLOC) == 0)
1088 {
1089 /* The debugging sections appear to be recognized only by name,
1090 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1091 if (name [0] == '.')
1092 {
1093 if (strncmp (name, ".debug", 6) == 0
1094 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1095 || strncmp (name, ".zdebug", 7) == 0)
1096 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1097 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1098 || strncmp (name, ".note.gnu", 9) == 0)
1099 flags |= SEC_ELF_OCTETS;
1100 else if (strncmp (name, ".line", 5) == 0
1101 || strncmp (name, ".stab", 5) == 0
1102 || strcmp (name, ".gdb_index") == 0)
1103 flags |= SEC_DEBUGGING;
1104 }
1105 }
1106
1107 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1108 only link a single copy of the section. This is used to support
1109 g++. g++ will emit each template expansion in its own section.
1110 The symbols will be defined as weak, so that multiple definitions
1111 are permitted. The GNU linker extension is to actually discard
1112 all but one of the sections. */
1113 if (CONST_STRNEQ (name, ".gnu.linkonce")
1114 && elf_next_in_group (newsect) == NULL)
1115 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1116
1117 if (!bfd_set_section_flags (newsect, flags))
1118 return FALSE;
1119
1120 bed = get_elf_backend_data (abfd);
1121 if (bed->elf_backend_section_flags)
1122 if (!bed->elf_backend_section_flags (hdr))
1123 return FALSE;
1124
1125 /* We do not parse the PT_NOTE segments as we are interested even in the
1126 separate debug info files which may have the segments offsets corrupted.
1127 PT_NOTEs from the core files are currently not parsed using BFD. */
1128 if (hdr->sh_type == SHT_NOTE)
1129 {
1130 bfd_byte *contents;
1131
1132 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1133 return FALSE;
1134
1135 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1136 hdr->sh_offset, hdr->sh_addralign);
1137 free (contents);
1138 }
1139
1140 if ((newsect->flags & SEC_ALLOC) != 0)
1141 {
1142 Elf_Internal_Phdr *phdr;
1143 unsigned int i, nload;
1144
1145 /* Some ELF linkers produce binaries with all the program header
1146 p_paddr fields zero. If we have such a binary with more than
1147 one PT_LOAD header, then leave the section lma equal to vma
1148 so that we don't create sections with overlapping lma. */
1149 phdr = elf_tdata (abfd)->phdr;
1150 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1151 if (phdr->p_paddr != 0)
1152 break;
1153 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1154 ++nload;
1155 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1156 return TRUE;
1157
1158 phdr = elf_tdata (abfd)->phdr;
1159 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1160 {
1161 if (((phdr->p_type == PT_LOAD
1162 && (hdr->sh_flags & SHF_TLS) == 0)
1163 || phdr->p_type == PT_TLS)
1164 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1165 {
1166 if ((newsect->flags & SEC_LOAD) == 0)
1167 newsect->lma = (phdr->p_paddr
1168 + hdr->sh_addr - phdr->p_vaddr);
1169 else
1170 /* We used to use the same adjustment for SEC_LOAD
1171 sections, but that doesn't work if the segment
1172 is packed with code from multiple VMAs.
1173 Instead we calculate the section LMA based on
1174 the segment LMA. It is assumed that the
1175 segment will contain sections with contiguous
1176 LMAs, even if the VMAs are not. */
1177 newsect->lma = (phdr->p_paddr
1178 + hdr->sh_offset - phdr->p_offset);
1179
1180 /* With contiguous segments, we can't tell from file
1181 offsets whether a section with zero size should
1182 be placed at the end of one segment or the
1183 beginning of the next. Decide based on vaddr. */
1184 if (hdr->sh_addr >= phdr->p_vaddr
1185 && (hdr->sh_addr + hdr->sh_size
1186 <= phdr->p_vaddr + phdr->p_memsz))
1187 break;
1188 }
1189 }
1190 }
1191
1192 /* Compress/decompress DWARF debug sections with names: .debug_* and
1193 .zdebug_*, after the section flags is set. */
1194 if ((newsect->flags & SEC_DEBUGGING)
1195 && ((name[1] == 'd' && name[6] == '_')
1196 || (name[1] == 'z' && name[7] == '_')))
1197 {
1198 enum { nothing, compress, decompress } action = nothing;
1199 int compression_header_size;
1200 bfd_size_type uncompressed_size;
1201 unsigned int uncompressed_align_power;
1202 bfd_boolean compressed
1203 = bfd_is_section_compressed_with_header (abfd, newsect,
1204 &compression_header_size,
1205 &uncompressed_size,
1206 &uncompressed_align_power);
1207 if (compressed)
1208 {
1209 /* Compressed section. Check if we should decompress. */
1210 if ((abfd->flags & BFD_DECOMPRESS))
1211 action = decompress;
1212 }
1213
1214 /* Compress the uncompressed section or convert from/to .zdebug*
1215 section. Check if we should compress. */
1216 if (action == nothing)
1217 {
1218 if (newsect->size != 0
1219 && (abfd->flags & BFD_COMPRESS)
1220 && compression_header_size >= 0
1221 && uncompressed_size > 0
1222 && (!compressed
1223 || ((compression_header_size > 0)
1224 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1225 action = compress;
1226 else
1227 return TRUE;
1228 }
1229
1230 if (action == compress)
1231 {
1232 if (!bfd_init_section_compress_status (abfd, newsect))
1233 {
1234 _bfd_error_handler
1235 /* xgettext:c-format */
1236 (_("%pB: unable to initialize compress status for section %s"),
1237 abfd, name);
1238 return FALSE;
1239 }
1240 }
1241 else
1242 {
1243 if (!bfd_init_section_decompress_status (abfd, newsect))
1244 {
1245 _bfd_error_handler
1246 /* xgettext:c-format */
1247 (_("%pB: unable to initialize decompress status for section %s"),
1248 abfd, name);
1249 return FALSE;
1250 }
1251 }
1252
1253 if (abfd->is_linker_input)
1254 {
1255 if (name[1] == 'z'
1256 && (action == decompress
1257 || (action == compress
1258 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1259 {
1260 /* Convert section name from .zdebug_* to .debug_* so
1261 that linker will consider this section as a debug
1262 section. */
1263 char *new_name = convert_zdebug_to_debug (abfd, name);
1264 if (new_name == NULL)
1265 return FALSE;
1266 bfd_rename_section (newsect, new_name);
1267 }
1268 }
1269 else
1270 /* For objdump, don't rename the section. For objcopy, delay
1271 section rename to elf_fake_sections. */
1272 newsect->flags |= SEC_ELF_RENAME;
1273 }
1274
1275 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1276 section. */
1277 const char *lto_section_name = ".gnu.lto_.lto.";
1278 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1279 {
1280 struct lto_section lsection;
1281 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1282 sizeof (struct lto_section)))
1283 abfd->lto_slim_object = lsection.slim_object;
1284 }
1285
1286 return TRUE;
1287 }
1288
1289 const char *const bfd_elf_section_type_names[] =
1290 {
1291 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1292 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1293 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1294 };
1295
1296 /* ELF relocs are against symbols. If we are producing relocatable
1297 output, and the reloc is against an external symbol, and nothing
1298 has given us any additional addend, the resulting reloc will also
1299 be against the same symbol. In such a case, we don't want to
1300 change anything about the way the reloc is handled, since it will
1301 all be done at final link time. Rather than put special case code
1302 into bfd_perform_relocation, all the reloc types use this howto
1303 function. It just short circuits the reloc if producing
1304 relocatable output against an external symbol. */
1305
1306 bfd_reloc_status_type
1307 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1308 arelent *reloc_entry,
1309 asymbol *symbol,
1310 void *data ATTRIBUTE_UNUSED,
1311 asection *input_section,
1312 bfd *output_bfd,
1313 char **error_message ATTRIBUTE_UNUSED)
1314 {
1315 if (output_bfd != NULL
1316 && (symbol->flags & BSF_SECTION_SYM) == 0
1317 && (! reloc_entry->howto->partial_inplace
1318 || reloc_entry->addend == 0))
1319 {
1320 reloc_entry->address += input_section->output_offset;
1321 return bfd_reloc_ok;
1322 }
1323
1324 return bfd_reloc_continue;
1325 }
1326 \f
1327 /* Returns TRUE if section A matches section B.
1328 Names, addresses and links may be different, but everything else
1329 should be the same. */
1330
1331 static bfd_boolean
1332 section_match (const Elf_Internal_Shdr * a,
1333 const Elf_Internal_Shdr * b)
1334 {
1335 if (a->sh_type != b->sh_type
1336 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1337 || a->sh_addralign != b->sh_addralign
1338 || a->sh_entsize != b->sh_entsize)
1339 return FALSE;
1340 if (a->sh_type == SHT_SYMTAB
1341 || a->sh_type == SHT_STRTAB)
1342 return TRUE;
1343 return a->sh_size == b->sh_size;
1344 }
1345
1346 /* Find a section in OBFD that has the same characteristics
1347 as IHEADER. Return the index of this section or SHN_UNDEF if
1348 none can be found. Check's section HINT first, as this is likely
1349 to be the correct section. */
1350
1351 static unsigned int
1352 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1353 const unsigned int hint)
1354 {
1355 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1356 unsigned int i;
1357
1358 BFD_ASSERT (iheader != NULL);
1359
1360 /* See PR 20922 for a reproducer of the NULL test. */
1361 if (hint < elf_numsections (obfd)
1362 && oheaders[hint] != NULL
1363 && section_match (oheaders[hint], iheader))
1364 return hint;
1365
1366 for (i = 1; i < elf_numsections (obfd); i++)
1367 {
1368 Elf_Internal_Shdr * oheader = oheaders[i];
1369
1370 if (oheader == NULL)
1371 continue;
1372 if (section_match (oheader, iheader))
1373 /* FIXME: Do we care if there is a potential for
1374 multiple matches ? */
1375 return i;
1376 }
1377
1378 return SHN_UNDEF;
1379 }
1380
1381 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1382 Processor specific section, based upon a matching input section.
1383 Returns TRUE upon success, FALSE otherwise. */
1384
1385 static bfd_boolean
1386 copy_special_section_fields (const bfd *ibfd,
1387 bfd *obfd,
1388 const Elf_Internal_Shdr *iheader,
1389 Elf_Internal_Shdr *oheader,
1390 const unsigned int secnum)
1391 {
1392 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1393 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bfd_boolean changed = FALSE;
1395 unsigned int sh_link;
1396
1397 if (oheader->sh_type == SHT_NOBITS)
1398 {
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1403
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return TRUE;
1420 }
1421
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields != NULL
1424 && bed->elf_backend_copy_special_section_fields
1425 (ibfd, obfd, iheader, oheader))
1426 return TRUE;
1427
1428 /* We have an iheader which might match oheader, and which has non-zero
1429 sh_info and/or sh_link fields. Attempt to follow those links and find
1430 the section in the output bfd which corresponds to the linked section
1431 in the input bfd. */
1432 if (iheader->sh_link != SHN_UNDEF)
1433 {
1434 /* See PR 20931 for a reproducer. */
1435 if (iheader->sh_link >= elf_numsections (ibfd))
1436 {
1437 _bfd_error_handler
1438 /* xgettext:c-format */
1439 (_("%pB: invalid sh_link field (%d) in section number %d"),
1440 ibfd, iheader->sh_link, secnum);
1441 return FALSE;
1442 }
1443
1444 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1445 if (sh_link != SHN_UNDEF)
1446 {
1447 oheader->sh_link = sh_link;
1448 changed = TRUE;
1449 }
1450 else
1451 /* FIXME: Should we install iheader->sh_link
1452 if we could not find a match ? */
1453 _bfd_error_handler
1454 /* xgettext:c-format */
1455 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1456 }
1457
1458 if (iheader->sh_info)
1459 {
1460 /* The sh_info field can hold arbitrary information, but if the
1461 SHF_LINK_INFO flag is set then it should be interpreted as a
1462 section index. */
1463 if (iheader->sh_flags & SHF_INFO_LINK)
1464 {
1465 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1466 iheader->sh_info);
1467 if (sh_link != SHN_UNDEF)
1468 oheader->sh_flags |= SHF_INFO_LINK;
1469 }
1470 else
1471 /* No idea what it means - just copy it. */
1472 sh_link = iheader->sh_info;
1473
1474 if (sh_link != SHN_UNDEF)
1475 {
1476 oheader->sh_info = sh_link;
1477 changed = TRUE;
1478 }
1479 else
1480 _bfd_error_handler
1481 /* xgettext:c-format */
1482 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1483 }
1484
1485 return changed;
1486 }
1487
1488 /* Copy the program header and other data from one object module to
1489 another. */
1490
1491 bfd_boolean
1492 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1493 {
1494 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
1497 unsigned int i;
1498
1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1501 return TRUE;
1502
1503 if (!elf_flags_init (obfd))
1504 {
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = TRUE;
1507 }
1508
1509 elf_gp (obfd) = elf_gp (ibfd);
1510
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1514
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1519
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1522
1523 if (iheaders == NULL || oheaders == NULL)
1524 return TRUE;
1525
1526 bed = get_elf_backend_data (obfd);
1527
1528 /* Possibly copy other fields in the section header. */
1529 for (i = 1; i < elf_numsections (obfd); i++)
1530 {
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
1533
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1541
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
1547
1548 /* Scan for the matching section in the input bfd.
1549 First we try for a direct mapping between the input and output sections. */
1550 for (j = 1; j < elf_numsections (ibfd); j++)
1551 {
1552 const Elf_Internal_Shdr * iheader = iheaders[j];
1553
1554 if (iheader == NULL)
1555 continue;
1556
1557 if (oheader->bfd_section != NULL
1558 && iheader->bfd_section != NULL
1559 && iheader->bfd_section->output_section != NULL
1560 && iheader->bfd_section->output_section == oheader->bfd_section)
1561 {
1562 /* We have found a connection from the input section to the
1563 output section. Attempt to copy the header fields. If
1564 this fails then do not try any further sections - there
1565 should only be a one-to-one mapping between input and output. */
1566 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1567 j = elf_numsections (ibfd);
1568 break;
1569 }
1570 }
1571
1572 if (j < elf_numsections (ibfd))
1573 continue;
1574
1575 /* That failed. So try to deduce the corresponding input section.
1576 Unfortunately we cannot compare names as the output string table
1577 is empty, so instead we check size, address and type. */
1578 for (j = 1; j < elf_numsections (ibfd); j++)
1579 {
1580 const Elf_Internal_Shdr * iheader = iheaders[j];
1581
1582 if (iheader == NULL)
1583 continue;
1584
1585 /* Try matching fields in the input section's header.
1586 Since --only-keep-debug turns all non-debug sections into
1587 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1588 input type. */
1589 if ((oheader->sh_type == SHT_NOBITS
1590 || iheader->sh_type == oheader->sh_type)
1591 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1592 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1593 && iheader->sh_addralign == oheader->sh_addralign
1594 && iheader->sh_entsize == oheader->sh_entsize
1595 && iheader->sh_size == oheader->sh_size
1596 && iheader->sh_addr == oheader->sh_addr
1597 && (iheader->sh_info != oheader->sh_info
1598 || iheader->sh_link != oheader->sh_link))
1599 {
1600 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1601 break;
1602 }
1603 }
1604
1605 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1606 {
1607 /* Final attempt. Call the backend copy function
1608 with a NULL input section. */
1609 if (bed->elf_backend_copy_special_section_fields != NULL)
1610 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd, NULL, oheader);
1611 }
1612 }
1613
1614 return TRUE;
1615 }
1616
1617 static const char *
1618 get_segment_type (unsigned int p_type)
1619 {
1620 const char *pt;
1621 switch (p_type)
1622 {
1623 case PT_NULL: pt = "NULL"; break;
1624 case PT_LOAD: pt = "LOAD"; break;
1625 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1626 case PT_INTERP: pt = "INTERP"; break;
1627 case PT_NOTE: pt = "NOTE"; break;
1628 case PT_SHLIB: pt = "SHLIB"; break;
1629 case PT_PHDR: pt = "PHDR"; break;
1630 case PT_TLS: pt = "TLS"; break;
1631 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1632 case PT_GNU_STACK: pt = "STACK"; break;
1633 case PT_GNU_RELRO: pt = "RELRO"; break;
1634 default: pt = NULL; break;
1635 }
1636 return pt;
1637 }
1638
1639 /* Print out the program headers. */
1640
1641 bfd_boolean
1642 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1643 {
1644 FILE *f = (FILE *) farg;
1645 Elf_Internal_Phdr *p;
1646 asection *s;
1647 bfd_byte *dynbuf = NULL;
1648
1649 p = elf_tdata (abfd)->phdr;
1650 if (p != NULL)
1651 {
1652 unsigned int i, c;
1653
1654 fprintf (f, _("\nProgram Header:\n"));
1655 c = elf_elfheader (abfd)->e_phnum;
1656 for (i = 0; i < c; i++, p++)
1657 {
1658 const char *pt = get_segment_type (p->p_type);
1659 char buf[20];
1660
1661 if (pt == NULL)
1662 {
1663 sprintf (buf, "0x%lx", p->p_type);
1664 pt = buf;
1665 }
1666 fprintf (f, "%8s off 0x", pt);
1667 bfd_fprintf_vma (abfd, f, p->p_offset);
1668 fprintf (f, " vaddr 0x");
1669 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1670 fprintf (f, " paddr 0x");
1671 bfd_fprintf_vma (abfd, f, p->p_paddr);
1672 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1673 fprintf (f, " filesz 0x");
1674 bfd_fprintf_vma (abfd, f, p->p_filesz);
1675 fprintf (f, " memsz 0x");
1676 bfd_fprintf_vma (abfd, f, p->p_memsz);
1677 fprintf (f, " flags %c%c%c",
1678 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1679 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1680 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1681 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1682 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1683 fprintf (f, "\n");
1684 }
1685 }
1686
1687 s = bfd_get_section_by_name (abfd, ".dynamic");
1688 if (s != NULL)
1689 {
1690 unsigned int elfsec;
1691 unsigned long shlink;
1692 bfd_byte *extdyn, *extdynend;
1693 size_t extdynsize;
1694 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1695
1696 fprintf (f, _("\nDynamic Section:\n"));
1697
1698 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1699 goto error_return;
1700
1701 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1702 if (elfsec == SHN_BAD)
1703 goto error_return;
1704 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1705
1706 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1707 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1708
1709 extdyn = dynbuf;
1710 /* PR 17512: file: 6f427532. */
1711 if (s->size < extdynsize)
1712 goto error_return;
1713 extdynend = extdyn + s->size;
1714 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1715 Fix range check. */
1716 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1717 {
1718 Elf_Internal_Dyn dyn;
1719 const char *name = "";
1720 char ab[20];
1721 bfd_boolean stringp;
1722 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1723
1724 (*swap_dyn_in) (abfd, extdyn, &dyn);
1725
1726 if (dyn.d_tag == DT_NULL)
1727 break;
1728
1729 stringp = FALSE;
1730 switch (dyn.d_tag)
1731 {
1732 default:
1733 if (bed->elf_backend_get_target_dtag)
1734 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735
1736 if (!strcmp (name, ""))
1737 {
1738 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1739 name = ab;
1740 }
1741 break;
1742
1743 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1744 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1745 case DT_PLTGOT: name = "PLTGOT"; break;
1746 case DT_HASH: name = "HASH"; break;
1747 case DT_STRTAB: name = "STRTAB"; break;
1748 case DT_SYMTAB: name = "SYMTAB"; break;
1749 case DT_RELA: name = "RELA"; break;
1750 case DT_RELASZ: name = "RELASZ"; break;
1751 case DT_RELAENT: name = "RELAENT"; break;
1752 case DT_STRSZ: name = "STRSZ"; break;
1753 case DT_SYMENT: name = "SYMENT"; break;
1754 case DT_INIT: name = "INIT"; break;
1755 case DT_FINI: name = "FINI"; break;
1756 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1757 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1758 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1759 case DT_REL: name = "REL"; break;
1760 case DT_RELSZ: name = "RELSZ"; break;
1761 case DT_RELENT: name = "RELENT"; break;
1762 case DT_PLTREL: name = "PLTREL"; break;
1763 case DT_DEBUG: name = "DEBUG"; break;
1764 case DT_TEXTREL: name = "TEXTREL"; break;
1765 case DT_JMPREL: name = "JMPREL"; break;
1766 case DT_BIND_NOW: name = "BIND_NOW"; break;
1767 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1768 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1769 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1770 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1771 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1772 case DT_FLAGS: name = "FLAGS"; break;
1773 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1774 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1775 case DT_CHECKSUM: name = "CHECKSUM"; break;
1776 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1777 case DT_MOVEENT: name = "MOVEENT"; break;
1778 case DT_MOVESZ: name = "MOVESZ"; break;
1779 case DT_FEATURE: name = "FEATURE"; break;
1780 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1781 case DT_SYMINSZ: name = "SYMINSZ"; break;
1782 case DT_SYMINENT: name = "SYMINENT"; break;
1783 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1784 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1785 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1786 case DT_PLTPAD: name = "PLTPAD"; break;
1787 case DT_MOVETAB: name = "MOVETAB"; break;
1788 case DT_SYMINFO: name = "SYMINFO"; break;
1789 case DT_RELACOUNT: name = "RELACOUNT"; break;
1790 case DT_RELCOUNT: name = "RELCOUNT"; break;
1791 case DT_FLAGS_1: name = "FLAGS_1"; break;
1792 case DT_VERSYM: name = "VERSYM"; break;
1793 case DT_VERDEF: name = "VERDEF"; break;
1794 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1795 case DT_VERNEED: name = "VERNEED"; break;
1796 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1797 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1798 case DT_USED: name = "USED"; break;
1799 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1800 case DT_GNU_HASH: name = "GNU_HASH"; break;
1801 }
1802
1803 fprintf (f, " %-20s ", name);
1804 if (! stringp)
1805 {
1806 fprintf (f, "0x");
1807 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1808 }
1809 else
1810 {
1811 const char *string;
1812 unsigned int tagv = dyn.d_un.d_val;
1813
1814 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1815 if (string == NULL)
1816 goto error_return;
1817 fprintf (f, "%s", string);
1818 }
1819 fprintf (f, "\n");
1820 }
1821
1822 free (dynbuf);
1823 dynbuf = NULL;
1824 }
1825
1826 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1827 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1828 {
1829 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1830 return FALSE;
1831 }
1832
1833 if (elf_dynverdef (abfd) != 0)
1834 {
1835 Elf_Internal_Verdef *t;
1836
1837 fprintf (f, _("\nVersion definitions:\n"));
1838 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1839 {
1840 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1841 t->vd_flags, t->vd_hash,
1842 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1843 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1844 {
1845 Elf_Internal_Verdaux *a;
1846
1847 fprintf (f, "\t");
1848 for (a = t->vd_auxptr->vda_nextptr;
1849 a != NULL;
1850 a = a->vda_nextptr)
1851 fprintf (f, "%s ",
1852 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1853 fprintf (f, "\n");
1854 }
1855 }
1856 }
1857
1858 if (elf_dynverref (abfd) != 0)
1859 {
1860 Elf_Internal_Verneed *t;
1861
1862 fprintf (f, _("\nVersion References:\n"));
1863 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1864 {
1865 Elf_Internal_Vernaux *a;
1866
1867 fprintf (f, _(" required from %s:\n"),
1868 t->vn_filename ? t->vn_filename : "<corrupt>");
1869 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1870 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1871 a->vna_flags, a->vna_other,
1872 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1873 }
1874 }
1875
1876 return TRUE;
1877
1878 error_return:
1879 if (dynbuf != NULL)
1880 free (dynbuf);
1881 return FALSE;
1882 }
1883
1884 /* Get version string. */
1885
1886 const char *
1887 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1888 bfd_boolean *hidden)
1889 {
1890 const char *version_string = NULL;
1891 if (elf_dynversym (abfd) != 0
1892 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1893 {
1894 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1895
1896 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1897 vernum &= VERSYM_VERSION;
1898
1899 if (vernum == 0)
1900 version_string = "";
1901 else if (vernum == 1
1902 && (vernum > elf_tdata (abfd)->cverdefs
1903 || (elf_tdata (abfd)->verdef[0].vd_flags
1904 == VER_FLG_BASE)))
1905 version_string = "Base";
1906 else if (vernum <= elf_tdata (abfd)->cverdefs)
1907 version_string =
1908 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1909 else
1910 {
1911 Elf_Internal_Verneed *t;
1912
1913 version_string = _("<corrupt>");
1914 for (t = elf_tdata (abfd)->verref;
1915 t != NULL;
1916 t = t->vn_nextref)
1917 {
1918 Elf_Internal_Vernaux *a;
1919
1920 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1921 {
1922 if (a->vna_other == vernum)
1923 {
1924 version_string = a->vna_nodename;
1925 break;
1926 }
1927 }
1928 }
1929 }
1930 }
1931 return version_string;
1932 }
1933
1934 /* Display ELF-specific fields of a symbol. */
1935
1936 void
1937 bfd_elf_print_symbol (bfd *abfd,
1938 void *filep,
1939 asymbol *symbol,
1940 bfd_print_symbol_type how)
1941 {
1942 FILE *file = (FILE *) filep;
1943 switch (how)
1944 {
1945 case bfd_print_symbol_name:
1946 fprintf (file, "%s", symbol->name);
1947 break;
1948 case bfd_print_symbol_more:
1949 fprintf (file, "elf ");
1950 bfd_fprintf_vma (abfd, file, symbol->value);
1951 fprintf (file, " %x", symbol->flags);
1952 break;
1953 case bfd_print_symbol_all:
1954 {
1955 const char *section_name;
1956 const char *name = NULL;
1957 const struct elf_backend_data *bed;
1958 unsigned char st_other;
1959 bfd_vma val;
1960 const char *version_string;
1961 bfd_boolean hidden;
1962
1963 section_name = symbol->section ? symbol->section->name : "(*none*)";
1964
1965 bed = get_elf_backend_data (abfd);
1966 if (bed->elf_backend_print_symbol_all)
1967 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1968
1969 if (name == NULL)
1970 {
1971 name = symbol->name;
1972 bfd_print_symbol_vandf (abfd, file, symbol);
1973 }
1974
1975 fprintf (file, " %s\t", section_name);
1976 /* Print the "other" value for a symbol. For common symbols,
1977 we've already printed the size; now print the alignment.
1978 For other symbols, we have no specified alignment, and
1979 we've printed the address; now print the size. */
1980 if (symbol->section && bfd_is_com_section (symbol->section))
1981 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1982 else
1983 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1984 bfd_fprintf_vma (abfd, file, val);
1985
1986 /* If we have version information, print it. */
1987 version_string = _bfd_elf_get_symbol_version_string (abfd,
1988 symbol,
1989 &hidden);
1990 if (version_string)
1991 {
1992 if (!hidden)
1993 fprintf (file, " %-11s", version_string);
1994 else
1995 {
1996 int i;
1997
1998 fprintf (file, " (%s)", version_string);
1999 for (i = 10 - strlen (version_string); i > 0; --i)
2000 putc (' ', file);
2001 }
2002 }
2003
2004 /* If the st_other field is not zero, print it. */
2005 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2006
2007 switch (st_other)
2008 {
2009 case 0: break;
2010 case STV_INTERNAL: fprintf (file, " .internal"); break;
2011 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2012 case STV_PROTECTED: fprintf (file, " .protected"); break;
2013 default:
2014 /* Some other non-defined flags are also present, so print
2015 everything hex. */
2016 fprintf (file, " 0x%02x", (unsigned int) st_other);
2017 }
2018
2019 fprintf (file, " %s", name);
2020 }
2021 break;
2022 }
2023 }
2024 \f
2025 /* ELF .o/exec file reading */
2026
2027 /* Create a new bfd section from an ELF section header. */
2028
2029 bfd_boolean
2030 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2031 {
2032 Elf_Internal_Shdr *hdr;
2033 Elf_Internal_Ehdr *ehdr;
2034 const struct elf_backend_data *bed;
2035 const char *name;
2036 bfd_boolean ret = TRUE;
2037 static bfd_boolean * sections_being_created = NULL;
2038 static bfd * sections_being_created_abfd = NULL;
2039 static unsigned int nesting = 0;
2040
2041 if (shindex >= elf_numsections (abfd))
2042 return FALSE;
2043
2044 if (++ nesting > 3)
2045 {
2046 /* PR17512: A corrupt ELF binary might contain a recursive group of
2047 sections, with each the string indices pointing to the next in the
2048 loop. Detect this here, by refusing to load a section that we are
2049 already in the process of loading. We only trigger this test if
2050 we have nested at least three sections deep as normal ELF binaries
2051 can expect to recurse at least once.
2052
2053 FIXME: It would be better if this array was attached to the bfd,
2054 rather than being held in a static pointer. */
2055
2056 if (sections_being_created_abfd != abfd)
2057 sections_being_created = NULL;
2058 if (sections_being_created == NULL)
2059 {
2060 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2061 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
2062 if (sections_being_created == NULL)
2063 return FALSE;
2064 sections_being_created_abfd = abfd;
2065 }
2066 if (sections_being_created [shindex])
2067 {
2068 _bfd_error_handler
2069 (_("%pB: warning: loop in section dependencies detected"), abfd);
2070 return FALSE;
2071 }
2072 sections_being_created [shindex] = TRUE;
2073 }
2074
2075 hdr = elf_elfsections (abfd)[shindex];
2076 ehdr = elf_elfheader (abfd);
2077 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2078 hdr->sh_name);
2079 if (name == NULL)
2080 goto fail;
2081
2082 bed = get_elf_backend_data (abfd);
2083 switch (hdr->sh_type)
2084 {
2085 case SHT_NULL:
2086 /* Inactive section. Throw it away. */
2087 goto success;
2088
2089 case SHT_PROGBITS: /* Normal section with contents. */
2090 case SHT_NOBITS: /* .bss section. */
2091 case SHT_HASH: /* .hash section. */
2092 case SHT_NOTE: /* .note section. */
2093 case SHT_INIT_ARRAY: /* .init_array section. */
2094 case SHT_FINI_ARRAY: /* .fini_array section. */
2095 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2096 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2097 case SHT_GNU_HASH: /* .gnu.hash section. */
2098 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2099 goto success;
2100
2101 case SHT_DYNAMIC: /* Dynamic linking information. */
2102 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2103 goto fail;
2104
2105 if (hdr->sh_link > elf_numsections (abfd))
2106 {
2107 /* PR 10478: Accept Solaris binaries with a sh_link
2108 field set to SHN_BEFORE or SHN_AFTER. */
2109 switch (bfd_get_arch (abfd))
2110 {
2111 case bfd_arch_i386:
2112 case bfd_arch_sparc:
2113 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2114 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2115 break;
2116 /* Otherwise fall through. */
2117 default:
2118 goto fail;
2119 }
2120 }
2121 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2122 goto fail;
2123 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2124 {
2125 Elf_Internal_Shdr *dynsymhdr;
2126
2127 /* The shared libraries distributed with hpux11 have a bogus
2128 sh_link field for the ".dynamic" section. Find the
2129 string table for the ".dynsym" section instead. */
2130 if (elf_dynsymtab (abfd) != 0)
2131 {
2132 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 }
2135 else
2136 {
2137 unsigned int i, num_sec;
2138
2139 num_sec = elf_numsections (abfd);
2140 for (i = 1; i < num_sec; i++)
2141 {
2142 dynsymhdr = elf_elfsections (abfd)[i];
2143 if (dynsymhdr->sh_type == SHT_DYNSYM)
2144 {
2145 hdr->sh_link = dynsymhdr->sh_link;
2146 break;
2147 }
2148 }
2149 }
2150 }
2151 goto success;
2152
2153 case SHT_SYMTAB: /* A symbol table. */
2154 if (elf_onesymtab (abfd) == shindex)
2155 goto success;
2156
2157 if (hdr->sh_entsize != bed->s->sizeof_sym)
2158 goto fail;
2159
2160 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2161 {
2162 if (hdr->sh_size != 0)
2163 goto fail;
2164 /* Some assemblers erroneously set sh_info to one with a
2165 zero sh_size. ld sees this as a global symbol count
2166 of (unsigned) -1. Fix it here. */
2167 hdr->sh_info = 0;
2168 goto success;
2169 }
2170
2171 /* PR 18854: A binary might contain more than one symbol table.
2172 Unusual, but possible. Warn, but continue. */
2173 if (elf_onesymtab (abfd) != 0)
2174 {
2175 _bfd_error_handler
2176 /* xgettext:c-format */
2177 (_("%pB: warning: multiple symbol tables detected"
2178 " - ignoring the table in section %u"),
2179 abfd, shindex);
2180 goto success;
2181 }
2182 elf_onesymtab (abfd) = shindex;
2183 elf_symtab_hdr (abfd) = *hdr;
2184 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2185 abfd->flags |= HAS_SYMS;
2186
2187 /* Sometimes a shared object will map in the symbol table. If
2188 SHF_ALLOC is set, and this is a shared object, then we also
2189 treat this section as a BFD section. We can not base the
2190 decision purely on SHF_ALLOC, because that flag is sometimes
2191 set in a relocatable object file, which would confuse the
2192 linker. */
2193 if ((hdr->sh_flags & SHF_ALLOC) != 0
2194 && (abfd->flags & DYNAMIC) != 0
2195 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2196 shindex))
2197 goto fail;
2198
2199 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2200 can't read symbols without that section loaded as well. It
2201 is most likely specified by the next section header. */
2202 {
2203 elf_section_list * entry;
2204 unsigned int i, num_sec;
2205
2206 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2207 if (entry->hdr.sh_link == shindex)
2208 goto success;
2209
2210 num_sec = elf_numsections (abfd);
2211 for (i = shindex + 1; i < num_sec; i++)
2212 {
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2214
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2218 }
2219
2220 if (i == num_sec)
2221 for (i = 1; i < shindex; i++)
2222 {
2223 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2224
2225 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2226 && hdr2->sh_link == shindex)
2227 break;
2228 }
2229
2230 if (i != shindex)
2231 ret = bfd_section_from_shdr (abfd, i);
2232 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2233 goto success;
2234 }
2235
2236 case SHT_DYNSYM: /* A dynamic symbol table. */
2237 if (elf_dynsymtab (abfd) == shindex)
2238 goto success;
2239
2240 if (hdr->sh_entsize != bed->s->sizeof_sym)
2241 goto fail;
2242
2243 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2244 {
2245 if (hdr->sh_size != 0)
2246 goto fail;
2247
2248 /* Some linkers erroneously set sh_info to one with a
2249 zero sh_size. ld sees this as a global symbol count
2250 of (unsigned) -1. Fix it here. */
2251 hdr->sh_info = 0;
2252 goto success;
2253 }
2254
2255 /* PR 18854: A binary might contain more than one dynamic symbol table.
2256 Unusual, but possible. Warn, but continue. */
2257 if (elf_dynsymtab (abfd) != 0)
2258 {
2259 _bfd_error_handler
2260 /* xgettext:c-format */
2261 (_("%pB: warning: multiple dynamic symbol tables detected"
2262 " - ignoring the table in section %u"),
2263 abfd, shindex);
2264 goto success;
2265 }
2266 elf_dynsymtab (abfd) = shindex;
2267 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2268 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2269 abfd->flags |= HAS_SYMS;
2270
2271 /* Besides being a symbol table, we also treat this as a regular
2272 section, so that objcopy can handle it. */
2273 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2274 goto success;
2275
2276 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2277 {
2278 elf_section_list * entry;
2279
2280 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2281 if (entry->ndx == shindex)
2282 goto success;
2283
2284 entry = bfd_alloc (abfd, sizeof (*entry));
2285 if (entry == NULL)
2286 goto fail;
2287 entry->ndx = shindex;
2288 entry->hdr = * hdr;
2289 entry->next = elf_symtab_shndx_list (abfd);
2290 elf_symtab_shndx_list (abfd) = entry;
2291 elf_elfsections (abfd)[shindex] = & entry->hdr;
2292 goto success;
2293 }
2294
2295 case SHT_STRTAB: /* A string table. */
2296 if (hdr->bfd_section != NULL)
2297 goto success;
2298
2299 if (ehdr->e_shstrndx == shindex)
2300 {
2301 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2302 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2303 goto success;
2304 }
2305
2306 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2307 {
2308 symtab_strtab:
2309 elf_tdata (abfd)->strtab_hdr = *hdr;
2310 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2311 goto success;
2312 }
2313
2314 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2315 {
2316 dynsymtab_strtab:
2317 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2318 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2319 elf_elfsections (abfd)[shindex] = hdr;
2320 /* We also treat this as a regular section, so that objcopy
2321 can handle it. */
2322 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2323 shindex);
2324 goto success;
2325 }
2326
2327 /* If the string table isn't one of the above, then treat it as a
2328 regular section. We need to scan all the headers to be sure,
2329 just in case this strtab section appeared before the above. */
2330 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2331 {
2332 unsigned int i, num_sec;
2333
2334 num_sec = elf_numsections (abfd);
2335 for (i = 1; i < num_sec; i++)
2336 {
2337 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2338 if (hdr2->sh_link == shindex)
2339 {
2340 /* Prevent endless recursion on broken objects. */
2341 if (i == shindex)
2342 goto fail;
2343 if (! bfd_section_from_shdr (abfd, i))
2344 goto fail;
2345 if (elf_onesymtab (abfd) == i)
2346 goto symtab_strtab;
2347 if (elf_dynsymtab (abfd) == i)
2348 goto dynsymtab_strtab;
2349 }
2350 }
2351 }
2352 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2353 goto success;
2354
2355 case SHT_REL:
2356 case SHT_RELA:
2357 /* *These* do a lot of work -- but build no sections! */
2358 {
2359 asection *target_sect;
2360 Elf_Internal_Shdr *hdr2, **p_hdr;
2361 unsigned int num_sec = elf_numsections (abfd);
2362 struct bfd_elf_section_data *esdt;
2363
2364 if (hdr->sh_entsize
2365 != (bfd_size_type) (hdr->sh_type == SHT_REL
2366 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2367 goto fail;
2368
2369 /* Check for a bogus link to avoid crashing. */
2370 if (hdr->sh_link >= num_sec)
2371 {
2372 _bfd_error_handler
2373 /* xgettext:c-format */
2374 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2375 abfd, hdr->sh_link, name, shindex);
2376 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2377 shindex);
2378 goto success;
2379 }
2380
2381 /* For some incomprehensible reason Oracle distributes
2382 libraries for Solaris in which some of the objects have
2383 bogus sh_link fields. It would be nice if we could just
2384 reject them, but, unfortunately, some people need to use
2385 them. We scan through the section headers; if we find only
2386 one suitable symbol table, we clobber the sh_link to point
2387 to it. I hope this doesn't break anything.
2388
2389 Don't do it on executable nor shared library. */
2390 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2391 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2392 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2393 {
2394 unsigned int scan;
2395 int found;
2396
2397 found = 0;
2398 for (scan = 1; scan < num_sec; scan++)
2399 {
2400 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2401 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2402 {
2403 if (found != 0)
2404 {
2405 found = 0;
2406 break;
2407 }
2408 found = scan;
2409 }
2410 }
2411 if (found != 0)
2412 hdr->sh_link = found;
2413 }
2414
2415 /* Get the symbol table. */
2416 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2417 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2418 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2419 goto fail;
2420
2421 /* If this is an alloc section in an executable or shared
2422 library, or the reloc section does not use the main symbol
2423 table we don't treat it as a reloc section. BFD can't
2424 adequately represent such a section, so at least for now,
2425 we don't try. We just present it as a normal section. We
2426 also can't use it as a reloc section if it points to the
2427 null section, an invalid section, another reloc section, or
2428 its sh_link points to the null section. */
2429 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2430 && (hdr->sh_flags & SHF_ALLOC) != 0)
2431 || hdr->sh_link == SHN_UNDEF
2432 || hdr->sh_link != elf_onesymtab (abfd)
2433 || hdr->sh_info == SHN_UNDEF
2434 || hdr->sh_info >= num_sec
2435 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2436 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2437 {
2438 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2439 shindex);
2440 goto success;
2441 }
2442
2443 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2444 goto fail;
2445
2446 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2447 if (target_sect == NULL)
2448 goto fail;
2449
2450 esdt = elf_section_data (target_sect);
2451 if (hdr->sh_type == SHT_RELA)
2452 p_hdr = &esdt->rela.hdr;
2453 else
2454 p_hdr = &esdt->rel.hdr;
2455
2456 /* PR 17512: file: 0b4f81b7.
2457 Also see PR 24456, for a file which deliberately has two reloc
2458 sections. */
2459 if (*p_hdr != NULL)
2460 {
2461 if (bed->init_secondary_reloc_section == NULL
2462 || ! bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2463 {
2464 _bfd_error_handler
2465 /* xgettext:c-format */
2466 (_("%pB: warning: secondary relocation section '%s' for section %pA found - ignoring"),
2467 abfd, name, target_sect);
2468 }
2469 goto success;
2470 }
2471
2472 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2473 if (hdr2 == NULL)
2474 goto fail;
2475 *hdr2 = *hdr;
2476 *p_hdr = hdr2;
2477 elf_elfsections (abfd)[shindex] = hdr2;
2478 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2479 * bed->s->int_rels_per_ext_rel);
2480 target_sect->flags |= SEC_RELOC;
2481 target_sect->relocation = NULL;
2482 target_sect->rel_filepos = hdr->sh_offset;
2483 /* In the section to which the relocations apply, mark whether
2484 its relocations are of the REL or RELA variety. */
2485 if (hdr->sh_size != 0)
2486 {
2487 if (hdr->sh_type == SHT_RELA)
2488 target_sect->use_rela_p = 1;
2489 }
2490 abfd->flags |= HAS_RELOC;
2491 goto success;
2492 }
2493
2494 case SHT_GNU_verdef:
2495 elf_dynverdef (abfd) = shindex;
2496 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2497 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2498 goto success;
2499
2500 case SHT_GNU_versym:
2501 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2502 goto fail;
2503
2504 elf_dynversym (abfd) = shindex;
2505 elf_tdata (abfd)->dynversym_hdr = *hdr;
2506 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2507 goto success;
2508
2509 case SHT_GNU_verneed:
2510 elf_dynverref (abfd) = shindex;
2511 elf_tdata (abfd)->dynverref_hdr = *hdr;
2512 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2513 goto success;
2514
2515 case SHT_SHLIB:
2516 goto success;
2517
2518 case SHT_GROUP:
2519 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2520 goto fail;
2521
2522 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2523 goto fail;
2524
2525 goto success;
2526
2527 default:
2528 /* Possibly an attributes section. */
2529 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2530 || hdr->sh_type == bed->obj_attrs_section_type)
2531 {
2532 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2533 goto fail;
2534 _bfd_elf_parse_attributes (abfd, hdr);
2535 goto success;
2536 }
2537
2538 /* Check for any processor-specific section types. */
2539 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2540 goto success;
2541
2542 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2543 {
2544 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2545 /* FIXME: How to properly handle allocated section reserved
2546 for applications? */
2547 _bfd_error_handler
2548 /* xgettext:c-format */
2549 (_("%pB: unknown type [%#x] section `%s'"),
2550 abfd, hdr->sh_type, name);
2551 else
2552 {
2553 /* Allow sections reserved for applications. */
2554 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2555 shindex);
2556 goto success;
2557 }
2558 }
2559 else if (hdr->sh_type >= SHT_LOPROC
2560 && hdr->sh_type <= SHT_HIPROC)
2561 /* FIXME: We should handle this section. */
2562 _bfd_error_handler
2563 /* xgettext:c-format */
2564 (_("%pB: unknown type [%#x] section `%s'"),
2565 abfd, hdr->sh_type, name);
2566 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2567 {
2568 /* Unrecognised OS-specific sections. */
2569 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2570 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2571 required to correctly process the section and the file should
2572 be rejected with an error message. */
2573 _bfd_error_handler
2574 /* xgettext:c-format */
2575 (_("%pB: unknown type [%#x] section `%s'"),
2576 abfd, hdr->sh_type, name);
2577 else
2578 {
2579 /* Otherwise it should be processed. */
2580 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2581 goto success;
2582 }
2583 }
2584 else
2585 /* FIXME: We should handle this section. */
2586 _bfd_error_handler
2587 /* xgettext:c-format */
2588 (_("%pB: unknown type [%#x] section `%s'"),
2589 abfd, hdr->sh_type, name);
2590
2591 goto fail;
2592 }
2593
2594 fail:
2595 ret = FALSE;
2596 success:
2597 if (sections_being_created && sections_being_created_abfd == abfd)
2598 sections_being_created [shindex] = FALSE;
2599 if (-- nesting == 0)
2600 {
2601 sections_being_created = NULL;
2602 sections_being_created_abfd = abfd;
2603 }
2604 return ret;
2605 }
2606
2607 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2608
2609 Elf_Internal_Sym *
2610 bfd_sym_from_r_symndx (struct sym_cache *cache,
2611 bfd *abfd,
2612 unsigned long r_symndx)
2613 {
2614 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2615
2616 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2617 {
2618 Elf_Internal_Shdr *symtab_hdr;
2619 unsigned char esym[sizeof (Elf64_External_Sym)];
2620 Elf_External_Sym_Shndx eshndx;
2621
2622 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2623 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2624 &cache->sym[ent], esym, &eshndx) == NULL)
2625 return NULL;
2626
2627 if (cache->abfd != abfd)
2628 {
2629 memset (cache->indx, -1, sizeof (cache->indx));
2630 cache->abfd = abfd;
2631 }
2632 cache->indx[ent] = r_symndx;
2633 }
2634
2635 return &cache->sym[ent];
2636 }
2637
2638 /* Given an ELF section number, retrieve the corresponding BFD
2639 section. */
2640
2641 asection *
2642 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2643 {
2644 if (sec_index >= elf_numsections (abfd))
2645 return NULL;
2646 return elf_elfsections (abfd)[sec_index]->bfd_section;
2647 }
2648
2649 static const struct bfd_elf_special_section special_sections_b[] =
2650 {
2651 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2652 { NULL, 0, 0, 0, 0 }
2653 };
2654
2655 static const struct bfd_elf_special_section special_sections_c[] =
2656 {
2657 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2658 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2659 { NULL, 0, 0, 0, 0 }
2660 };
2661
2662 static const struct bfd_elf_special_section special_sections_d[] =
2663 {
2664 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2665 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2666 /* There are more DWARF sections than these, but they needn't be added here
2667 unless you have to cope with broken compilers that don't emit section
2668 attributes or you want to help the user writing assembler. */
2669 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2670 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2671 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2672 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2673 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2674 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2675 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2676 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2677 { NULL, 0, 0, 0, 0 }
2678 };
2679
2680 static const struct bfd_elf_special_section special_sections_f[] =
2681 {
2682 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2683 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2684 { NULL, 0 , 0, 0, 0 }
2685 };
2686
2687 static const struct bfd_elf_special_section special_sections_g[] =
2688 {
2689 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2690 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2691 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2692 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2693 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2694 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2695 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2696 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2697 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2698 { NULL, 0, 0, 0, 0 }
2699 };
2700
2701 static const struct bfd_elf_special_section special_sections_h[] =
2702 {
2703 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2704 { NULL, 0, 0, 0, 0 }
2705 };
2706
2707 static const struct bfd_elf_special_section special_sections_i[] =
2708 {
2709 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2710 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2711 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2712 { NULL, 0, 0, 0, 0 }
2713 };
2714
2715 static const struct bfd_elf_special_section special_sections_l[] =
2716 {
2717 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2718 { NULL, 0, 0, 0, 0 }
2719 };
2720
2721 static const struct bfd_elf_special_section special_sections_n[] =
2722 {
2723 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2724 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2725 { NULL, 0, 0, 0, 0 }
2726 };
2727
2728 static const struct bfd_elf_special_section special_sections_p[] =
2729 {
2730 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2731 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2732 { NULL, 0, 0, 0, 0 }
2733 };
2734
2735 static const struct bfd_elf_special_section special_sections_r[] =
2736 {
2737 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2738 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2739 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2740 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2741 { NULL, 0, 0, 0, 0 }
2742 };
2743
2744 static const struct bfd_elf_special_section special_sections_s[] =
2745 {
2746 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2747 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2748 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2749 /* See struct bfd_elf_special_section declaration for the semantics of
2750 this special case where .prefix_length != strlen (.prefix). */
2751 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2752 { NULL, 0, 0, 0, 0 }
2753 };
2754
2755 static const struct bfd_elf_special_section special_sections_t[] =
2756 {
2757 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2758 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2759 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2760 { NULL, 0, 0, 0, 0 }
2761 };
2762
2763 static const struct bfd_elf_special_section special_sections_z[] =
2764 {
2765 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2766 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2767 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2768 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2769 { NULL, 0, 0, 0, 0 }
2770 };
2771
2772 static const struct bfd_elf_special_section * const special_sections[] =
2773 {
2774 special_sections_b, /* 'b' */
2775 special_sections_c, /* 'c' */
2776 special_sections_d, /* 'd' */
2777 NULL, /* 'e' */
2778 special_sections_f, /* 'f' */
2779 special_sections_g, /* 'g' */
2780 special_sections_h, /* 'h' */
2781 special_sections_i, /* 'i' */
2782 NULL, /* 'j' */
2783 NULL, /* 'k' */
2784 special_sections_l, /* 'l' */
2785 NULL, /* 'm' */
2786 special_sections_n, /* 'n' */
2787 NULL, /* 'o' */
2788 special_sections_p, /* 'p' */
2789 NULL, /* 'q' */
2790 special_sections_r, /* 'r' */
2791 special_sections_s, /* 's' */
2792 special_sections_t, /* 't' */
2793 NULL, /* 'u' */
2794 NULL, /* 'v' */
2795 NULL, /* 'w' */
2796 NULL, /* 'x' */
2797 NULL, /* 'y' */
2798 special_sections_z /* 'z' */
2799 };
2800
2801 const struct bfd_elf_special_section *
2802 _bfd_elf_get_special_section (const char *name,
2803 const struct bfd_elf_special_section *spec,
2804 unsigned int rela)
2805 {
2806 int i;
2807 int len;
2808
2809 len = strlen (name);
2810
2811 for (i = 0; spec[i].prefix != NULL; i++)
2812 {
2813 int suffix_len;
2814 int prefix_len = spec[i].prefix_length;
2815
2816 if (len < prefix_len)
2817 continue;
2818 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2819 continue;
2820
2821 suffix_len = spec[i].suffix_length;
2822 if (suffix_len <= 0)
2823 {
2824 if (name[prefix_len] != 0)
2825 {
2826 if (suffix_len == 0)
2827 continue;
2828 if (name[prefix_len] != '.'
2829 && (suffix_len == -2
2830 || (rela && spec[i].type == SHT_REL)))
2831 continue;
2832 }
2833 }
2834 else
2835 {
2836 if (len < prefix_len + suffix_len)
2837 continue;
2838 if (memcmp (name + len - suffix_len,
2839 spec[i].prefix + prefix_len,
2840 suffix_len) != 0)
2841 continue;
2842 }
2843 return &spec[i];
2844 }
2845
2846 return NULL;
2847 }
2848
2849 const struct bfd_elf_special_section *
2850 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2851 {
2852 int i;
2853 const struct bfd_elf_special_section *spec;
2854 const struct elf_backend_data *bed;
2855
2856 /* See if this is one of the special sections. */
2857 if (sec->name == NULL)
2858 return NULL;
2859
2860 bed = get_elf_backend_data (abfd);
2861 spec = bed->special_sections;
2862 if (spec)
2863 {
2864 spec = _bfd_elf_get_special_section (sec->name,
2865 bed->special_sections,
2866 sec->use_rela_p);
2867 if (spec != NULL)
2868 return spec;
2869 }
2870
2871 if (sec->name[0] != '.')
2872 return NULL;
2873
2874 i = sec->name[1] - 'b';
2875 if (i < 0 || i > 'z' - 'b')
2876 return NULL;
2877
2878 spec = special_sections[i];
2879
2880 if (spec == NULL)
2881 return NULL;
2882
2883 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2884 }
2885
2886 bfd_boolean
2887 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2888 {
2889 struct bfd_elf_section_data *sdata;
2890 const struct elf_backend_data *bed;
2891 const struct bfd_elf_special_section *ssect;
2892
2893 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2894 if (sdata == NULL)
2895 {
2896 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2897 sizeof (*sdata));
2898 if (sdata == NULL)
2899 return FALSE;
2900 sec->used_by_bfd = sdata;
2901 }
2902
2903 /* Indicate whether or not this section should use RELA relocations. */
2904 bed = get_elf_backend_data (abfd);
2905 sec->use_rela_p = bed->default_use_rela_p;
2906
2907 /* Set up ELF section type and flags for newly created sections, if
2908 there is an ABI mandated section. */
2909 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2910 if (ssect != NULL)
2911 {
2912 elf_section_type (sec) = ssect->type;
2913 elf_section_flags (sec) = ssect->attr;
2914 }
2915
2916 return _bfd_generic_new_section_hook (abfd, sec);
2917 }
2918
2919 /* Create a new bfd section from an ELF program header.
2920
2921 Since program segments have no names, we generate a synthetic name
2922 of the form segment<NUM>, where NUM is generally the index in the
2923 program header table. For segments that are split (see below) we
2924 generate the names segment<NUM>a and segment<NUM>b.
2925
2926 Note that some program segments may have a file size that is different than
2927 (less than) the memory size. All this means is that at execution the
2928 system must allocate the amount of memory specified by the memory size,
2929 but only initialize it with the first "file size" bytes read from the
2930 file. This would occur for example, with program segments consisting
2931 of combined data+bss.
2932
2933 To handle the above situation, this routine generates TWO bfd sections
2934 for the single program segment. The first has the length specified by
2935 the file size of the segment, and the second has the length specified
2936 by the difference between the two sizes. In effect, the segment is split
2937 into its initialized and uninitialized parts.
2938
2939 */
2940
2941 bfd_boolean
2942 _bfd_elf_make_section_from_phdr (bfd *abfd,
2943 Elf_Internal_Phdr *hdr,
2944 int hdr_index,
2945 const char *type_name)
2946 {
2947 asection *newsect;
2948 char *name;
2949 char namebuf[64];
2950 size_t len;
2951 int split;
2952
2953 split = ((hdr->p_memsz > 0)
2954 && (hdr->p_filesz > 0)
2955 && (hdr->p_memsz > hdr->p_filesz));
2956
2957 if (hdr->p_filesz > 0)
2958 {
2959 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2960 len = strlen (namebuf) + 1;
2961 name = (char *) bfd_alloc (abfd, len);
2962 if (!name)
2963 return FALSE;
2964 memcpy (name, namebuf, len);
2965 newsect = bfd_make_section (abfd, name);
2966 if (newsect == NULL)
2967 return FALSE;
2968 newsect->vma = hdr->p_vaddr;
2969 newsect->lma = hdr->p_paddr;
2970 newsect->size = hdr->p_filesz;
2971 newsect->filepos = hdr->p_offset;
2972 newsect->flags |= SEC_HAS_CONTENTS;
2973 newsect->alignment_power = bfd_log2 (hdr->p_align);
2974 if (hdr->p_type == PT_LOAD)
2975 {
2976 newsect->flags |= SEC_ALLOC;
2977 newsect->flags |= SEC_LOAD;
2978 if (hdr->p_flags & PF_X)
2979 {
2980 /* FIXME: all we known is that it has execute PERMISSION,
2981 may be data. */
2982 newsect->flags |= SEC_CODE;
2983 }
2984 }
2985 if (!(hdr->p_flags & PF_W))
2986 {
2987 newsect->flags |= SEC_READONLY;
2988 }
2989 }
2990
2991 if (hdr->p_memsz > hdr->p_filesz)
2992 {
2993 bfd_vma align;
2994
2995 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
2996 len = strlen (namebuf) + 1;
2997 name = (char *) bfd_alloc (abfd, len);
2998 if (!name)
2999 return FALSE;
3000 memcpy (name, namebuf, len);
3001 newsect = bfd_make_section (abfd, name);
3002 if (newsect == NULL)
3003 return FALSE;
3004 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
3005 newsect->lma = hdr->p_paddr + hdr->p_filesz;
3006 newsect->size = hdr->p_memsz - hdr->p_filesz;
3007 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3008 align = newsect->vma & -newsect->vma;
3009 if (align == 0 || align > hdr->p_align)
3010 align = hdr->p_align;
3011 newsect->alignment_power = bfd_log2 (align);
3012 if (hdr->p_type == PT_LOAD)
3013 {
3014 /* Hack for gdb. Segments that have not been modified do
3015 not have their contents written to a core file, on the
3016 assumption that a debugger can find the contents in the
3017 executable. We flag this case by setting the fake
3018 section size to zero. Note that "real" bss sections will
3019 always have their contents dumped to the core file. */
3020 if (bfd_get_format (abfd) == bfd_core)
3021 newsect->size = 0;
3022 newsect->flags |= SEC_ALLOC;
3023 if (hdr->p_flags & PF_X)
3024 newsect->flags |= SEC_CODE;
3025 }
3026 if (!(hdr->p_flags & PF_W))
3027 newsect->flags |= SEC_READONLY;
3028 }
3029
3030 return TRUE;
3031 }
3032
3033 static bfd_boolean
3034 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3035 {
3036 /* The return value is ignored. Build-ids are considered optional. */
3037 if (templ->xvec->flavour == bfd_target_elf_flavour)
3038 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3039 (templ, offset);
3040 return FALSE;
3041 }
3042
3043 bfd_boolean
3044 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3045 {
3046 const struct elf_backend_data *bed;
3047
3048 switch (hdr->p_type)
3049 {
3050 case PT_NULL:
3051 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3052
3053 case PT_LOAD:
3054 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3055 return FALSE;
3056 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3057 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3058 return TRUE;
3059
3060 case PT_DYNAMIC:
3061 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3062
3063 case PT_INTERP:
3064 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3065
3066 case PT_NOTE:
3067 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3068 return FALSE;
3069 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3070 hdr->p_align))
3071 return FALSE;
3072 return TRUE;
3073
3074 case PT_SHLIB:
3075 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3076
3077 case PT_PHDR:
3078 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3079
3080 case PT_GNU_EH_FRAME:
3081 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3082 "eh_frame_hdr");
3083
3084 case PT_GNU_STACK:
3085 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3086
3087 case PT_GNU_RELRO:
3088 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3089
3090 default:
3091 /* Check for any processor-specific program segment types. */
3092 bed = get_elf_backend_data (abfd);
3093 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3094 }
3095 }
3096
3097 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3098 REL or RELA. */
3099
3100 Elf_Internal_Shdr *
3101 _bfd_elf_single_rel_hdr (asection *sec)
3102 {
3103 if (elf_section_data (sec)->rel.hdr)
3104 {
3105 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3106 return elf_section_data (sec)->rel.hdr;
3107 }
3108 else
3109 return elf_section_data (sec)->rela.hdr;
3110 }
3111
3112 static bfd_boolean
3113 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3114 Elf_Internal_Shdr *rel_hdr,
3115 const char *sec_name,
3116 bfd_boolean use_rela_p)
3117 {
3118 char *name = (char *) bfd_alloc (abfd,
3119 sizeof ".rela" + strlen (sec_name));
3120 if (name == NULL)
3121 return FALSE;
3122
3123 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3124 rel_hdr->sh_name =
3125 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3126 FALSE);
3127 if (rel_hdr->sh_name == (unsigned int) -1)
3128 return FALSE;
3129
3130 return TRUE;
3131 }
3132
3133 /* Allocate and initialize a section-header for a new reloc section,
3134 containing relocations against ASECT. It is stored in RELDATA. If
3135 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3136 relocations. */
3137
3138 static bfd_boolean
3139 _bfd_elf_init_reloc_shdr (bfd *abfd,
3140 struct bfd_elf_section_reloc_data *reldata,
3141 const char *sec_name,
3142 bfd_boolean use_rela_p,
3143 bfd_boolean delay_st_name_p)
3144 {
3145 Elf_Internal_Shdr *rel_hdr;
3146 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3147
3148 BFD_ASSERT (reldata->hdr == NULL);
3149 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3150 reldata->hdr = rel_hdr;
3151
3152 if (delay_st_name_p)
3153 rel_hdr->sh_name = (unsigned int) -1;
3154 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3155 use_rela_p))
3156 return FALSE;
3157 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3158 rel_hdr->sh_entsize = (use_rela_p
3159 ? bed->s->sizeof_rela
3160 : bed->s->sizeof_rel);
3161 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3162 rel_hdr->sh_flags = 0;
3163 rel_hdr->sh_addr = 0;
3164 rel_hdr->sh_size = 0;
3165 rel_hdr->sh_offset = 0;
3166
3167 return TRUE;
3168 }
3169
3170 /* Return the default section type based on the passed in section flags. */
3171
3172 int
3173 bfd_elf_get_default_section_type (flagword flags)
3174 {
3175 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3176 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3177 return SHT_NOBITS;
3178 return SHT_PROGBITS;
3179 }
3180
3181 struct fake_section_arg
3182 {
3183 struct bfd_link_info *link_info;
3184 bfd_boolean failed;
3185 };
3186
3187 /* Set up an ELF internal section header for a section. */
3188
3189 static void
3190 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3191 {
3192 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3193 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3194 struct bfd_elf_section_data *esd = elf_section_data (asect);
3195 Elf_Internal_Shdr *this_hdr;
3196 unsigned int sh_type;
3197 const char *name = asect->name;
3198 bfd_boolean delay_st_name_p = FALSE;
3199 bfd_vma mask;
3200
3201 if (arg->failed)
3202 {
3203 /* We already failed; just get out of the bfd_map_over_sections
3204 loop. */
3205 return;
3206 }
3207
3208 this_hdr = &esd->this_hdr;
3209
3210 if (arg->link_info)
3211 {
3212 /* ld: compress DWARF debug sections with names: .debug_*. */
3213 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3214 && (asect->flags & SEC_DEBUGGING)
3215 && name[1] == 'd'
3216 && name[6] == '_')
3217 {
3218 /* Set SEC_ELF_COMPRESS to indicate this section should be
3219 compressed. */
3220 asect->flags |= SEC_ELF_COMPRESS;
3221 /* If this section will be compressed, delay adding section
3222 name to section name section after it is compressed in
3223 _bfd_elf_assign_file_positions_for_non_load. */
3224 delay_st_name_p = TRUE;
3225 }
3226 }
3227 else if ((asect->flags & SEC_ELF_RENAME))
3228 {
3229 /* objcopy: rename output DWARF debug section. */
3230 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3231 {
3232 /* When we decompress or compress with SHF_COMPRESSED,
3233 convert section name from .zdebug_* to .debug_* if
3234 needed. */
3235 if (name[1] == 'z')
3236 {
3237 char *new_name = convert_zdebug_to_debug (abfd, name);
3238 if (new_name == NULL)
3239 {
3240 arg->failed = TRUE;
3241 return;
3242 }
3243 name = new_name;
3244 }
3245 }
3246 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3247 {
3248 /* PR binutils/18087: Compression does not always make a
3249 section smaller. So only rename the section when
3250 compression has actually taken place. If input section
3251 name is .zdebug_*, we should never compress it again. */
3252 char *new_name = convert_debug_to_zdebug (abfd, name);
3253 if (new_name == NULL)
3254 {
3255 arg->failed = TRUE;
3256 return;
3257 }
3258 BFD_ASSERT (name[1] != 'z');
3259 name = new_name;
3260 }
3261 }
3262
3263 if (delay_st_name_p)
3264 this_hdr->sh_name = (unsigned int) -1;
3265 else
3266 {
3267 this_hdr->sh_name
3268 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3269 name, FALSE);
3270 if (this_hdr->sh_name == (unsigned int) -1)
3271 {
3272 arg->failed = TRUE;
3273 return;
3274 }
3275 }
3276
3277 /* Don't clear sh_flags. Assembler may set additional bits. */
3278
3279 if ((asect->flags & SEC_ALLOC) != 0
3280 || asect->user_set_vma)
3281 this_hdr->sh_addr = asect->vma;
3282 else
3283 this_hdr->sh_addr = 0;
3284
3285 this_hdr->sh_offset = 0;
3286 this_hdr->sh_size = asect->size;
3287 this_hdr->sh_link = 0;
3288 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3289 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3290 {
3291 _bfd_error_handler
3292 /* xgettext:c-format */
3293 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3294 abfd, asect->alignment_power, asect);
3295 arg->failed = TRUE;
3296 return;
3297 }
3298 /* Set sh_addralign to the highest power of two given by alignment
3299 consistent with the section VMA. Linker scripts can force VMA. */
3300 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3301 this_hdr->sh_addralign = mask & -mask;
3302 /* The sh_entsize and sh_info fields may have been set already by
3303 copy_private_section_data. */
3304
3305 this_hdr->bfd_section = asect;
3306 this_hdr->contents = NULL;
3307
3308 /* If the section type is unspecified, we set it based on
3309 asect->flags. */
3310 if ((asect->flags & SEC_GROUP) != 0)
3311 sh_type = SHT_GROUP;
3312 else
3313 sh_type = bfd_elf_get_default_section_type (asect->flags);
3314
3315 if (this_hdr->sh_type == SHT_NULL)
3316 this_hdr->sh_type = sh_type;
3317 else if (this_hdr->sh_type == SHT_NOBITS
3318 && sh_type == SHT_PROGBITS
3319 && (asect->flags & SEC_ALLOC) != 0)
3320 {
3321 /* Warn if we are changing a NOBITS section to PROGBITS, but
3322 allow the link to proceed. This can happen when users link
3323 non-bss input sections to bss output sections, or emit data
3324 to a bss output section via a linker script. */
3325 _bfd_error_handler
3326 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3327 this_hdr->sh_type = sh_type;
3328 }
3329
3330 switch (this_hdr->sh_type)
3331 {
3332 default:
3333 break;
3334
3335 case SHT_STRTAB:
3336 case SHT_NOTE:
3337 case SHT_NOBITS:
3338 case SHT_PROGBITS:
3339 break;
3340
3341 case SHT_INIT_ARRAY:
3342 case SHT_FINI_ARRAY:
3343 case SHT_PREINIT_ARRAY:
3344 this_hdr->sh_entsize = bed->s->arch_size / 8;
3345 break;
3346
3347 case SHT_HASH:
3348 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3349 break;
3350
3351 case SHT_DYNSYM:
3352 this_hdr->sh_entsize = bed->s->sizeof_sym;
3353 break;
3354
3355 case SHT_DYNAMIC:
3356 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3357 break;
3358
3359 case SHT_RELA:
3360 if (get_elf_backend_data (abfd)->may_use_rela_p)
3361 this_hdr->sh_entsize = bed->s->sizeof_rela;
3362 break;
3363
3364 case SHT_REL:
3365 if (get_elf_backend_data (abfd)->may_use_rel_p)
3366 this_hdr->sh_entsize = bed->s->sizeof_rel;
3367 break;
3368
3369 case SHT_GNU_versym:
3370 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3371 break;
3372
3373 case SHT_GNU_verdef:
3374 this_hdr->sh_entsize = 0;
3375 /* objcopy or strip will copy over sh_info, but may not set
3376 cverdefs. The linker will set cverdefs, but sh_info will be
3377 zero. */
3378 if (this_hdr->sh_info == 0)
3379 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3380 else
3381 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3382 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3383 break;
3384
3385 case SHT_GNU_verneed:
3386 this_hdr->sh_entsize = 0;
3387 /* objcopy or strip will copy over sh_info, but may not set
3388 cverrefs. The linker will set cverrefs, but sh_info will be
3389 zero. */
3390 if (this_hdr->sh_info == 0)
3391 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3392 else
3393 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3394 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3395 break;
3396
3397 case SHT_GROUP:
3398 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3399 break;
3400
3401 case SHT_GNU_HASH:
3402 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3403 break;
3404 }
3405
3406 if ((asect->flags & SEC_ALLOC) != 0)
3407 this_hdr->sh_flags |= SHF_ALLOC;
3408 if ((asect->flags & SEC_READONLY) == 0)
3409 this_hdr->sh_flags |= SHF_WRITE;
3410 if ((asect->flags & SEC_CODE) != 0)
3411 this_hdr->sh_flags |= SHF_EXECINSTR;
3412 if ((asect->flags & SEC_MERGE) != 0)
3413 {
3414 this_hdr->sh_flags |= SHF_MERGE;
3415 this_hdr->sh_entsize = asect->entsize;
3416 }
3417 if ((asect->flags & SEC_STRINGS) != 0)
3418 this_hdr->sh_flags |= SHF_STRINGS;
3419 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3420 this_hdr->sh_flags |= SHF_GROUP;
3421 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3422 {
3423 this_hdr->sh_flags |= SHF_TLS;
3424 if (asect->size == 0
3425 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3426 {
3427 struct bfd_link_order *o = asect->map_tail.link_order;
3428
3429 this_hdr->sh_size = 0;
3430 if (o != NULL)
3431 {
3432 this_hdr->sh_size = o->offset + o->size;
3433 if (this_hdr->sh_size != 0)
3434 this_hdr->sh_type = SHT_NOBITS;
3435 }
3436 }
3437 }
3438 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3439 this_hdr->sh_flags |= SHF_EXCLUDE;
3440
3441 /* If the section has relocs, set up a section header for the
3442 SHT_REL[A] section. If two relocation sections are required for
3443 this section, it is up to the processor-specific back-end to
3444 create the other. */
3445 if ((asect->flags & SEC_RELOC) != 0)
3446 {
3447 /* When doing a relocatable link, create both REL and RELA sections if
3448 needed. */
3449 if (arg->link_info
3450 /* Do the normal setup if we wouldn't create any sections here. */
3451 && esd->rel.count + esd->rela.count > 0
3452 && (bfd_link_relocatable (arg->link_info)
3453 || arg->link_info->emitrelocations))
3454 {
3455 if (esd->rel.count && esd->rel.hdr == NULL
3456 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3457 FALSE, delay_st_name_p))
3458 {
3459 arg->failed = TRUE;
3460 return;
3461 }
3462 if (esd->rela.count && esd->rela.hdr == NULL
3463 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3464 TRUE, delay_st_name_p))
3465 {
3466 arg->failed = TRUE;
3467 return;
3468 }
3469 }
3470 else if (!_bfd_elf_init_reloc_shdr (abfd,
3471 (asect->use_rela_p
3472 ? &esd->rela : &esd->rel),
3473 name,
3474 asect->use_rela_p,
3475 delay_st_name_p))
3476 {
3477 arg->failed = TRUE;
3478 return;
3479 }
3480 }
3481
3482 /* Check for processor-specific section types. */
3483 sh_type = this_hdr->sh_type;
3484 if (bed->elf_backend_fake_sections
3485 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3486 {
3487 arg->failed = TRUE;
3488 return;
3489 }
3490
3491 if (sh_type == SHT_NOBITS && asect->size != 0)
3492 {
3493 /* Don't change the header type from NOBITS if we are being
3494 called for objcopy --only-keep-debug. */
3495 this_hdr->sh_type = sh_type;
3496 }
3497 }
3498
3499 /* Fill in the contents of a SHT_GROUP section. Called from
3500 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3501 when ELF targets use the generic linker, ld. Called for ld -r
3502 from bfd_elf_final_link. */
3503
3504 void
3505 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3506 {
3507 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3508 asection *elt, *first;
3509 unsigned char *loc;
3510 bfd_boolean gas;
3511
3512 /* Ignore linker created group section. See elfNN_ia64_object_p in
3513 elfxx-ia64.c. */
3514 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3515 || sec->size == 0
3516 || *failedptr)
3517 return;
3518
3519 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3520 {
3521 unsigned long symindx = 0;
3522
3523 /* elf_group_id will have been set up by objcopy and the
3524 generic linker. */
3525 if (elf_group_id (sec) != NULL)
3526 symindx = elf_group_id (sec)->udata.i;
3527
3528 if (symindx == 0)
3529 {
3530 /* If called from the assembler, swap_out_syms will have set up
3531 elf_section_syms. */
3532 BFD_ASSERT (elf_section_syms (abfd) != NULL);
3533 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3534 }
3535 elf_section_data (sec)->this_hdr.sh_info = symindx;
3536 }
3537 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3538 {
3539 /* The ELF backend linker sets sh_info to -2 when the group
3540 signature symbol is global, and thus the index can't be
3541 set until all local symbols are output. */
3542 asection *igroup;
3543 struct bfd_elf_section_data *sec_data;
3544 unsigned long symndx;
3545 unsigned long extsymoff;
3546 struct elf_link_hash_entry *h;
3547
3548 /* The point of this little dance to the first SHF_GROUP section
3549 then back to the SHT_GROUP section is that this gets us to
3550 the SHT_GROUP in the input object. */
3551 igroup = elf_sec_group (elf_next_in_group (sec));
3552 sec_data = elf_section_data (igroup);
3553 symndx = sec_data->this_hdr.sh_info;
3554 extsymoff = 0;
3555 if (!elf_bad_symtab (igroup->owner))
3556 {
3557 Elf_Internal_Shdr *symtab_hdr;
3558
3559 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3560 extsymoff = symtab_hdr->sh_info;
3561 }
3562 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3563 while (h->root.type == bfd_link_hash_indirect
3564 || h->root.type == bfd_link_hash_warning)
3565 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3566
3567 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3568 }
3569
3570 /* The contents won't be allocated for "ld -r" or objcopy. */
3571 gas = TRUE;
3572 if (sec->contents == NULL)
3573 {
3574 gas = FALSE;
3575 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3576
3577 /* Arrange for the section to be written out. */
3578 elf_section_data (sec)->this_hdr.contents = sec->contents;
3579 if (sec->contents == NULL)
3580 {
3581 *failedptr = TRUE;
3582 return;
3583 }
3584 }
3585
3586 loc = sec->contents + sec->size;
3587
3588 /* Get the pointer to the first section in the group that gas
3589 squirreled away here. objcopy arranges for this to be set to the
3590 start of the input section group. */
3591 first = elt = elf_next_in_group (sec);
3592
3593 /* First element is a flag word. Rest of section is elf section
3594 indices for all the sections of the group. Write them backwards
3595 just to keep the group in the same order as given in .section
3596 directives, not that it matters. */
3597 while (elt != NULL)
3598 {
3599 asection *s;
3600
3601 s = elt;
3602 if (!gas)
3603 s = s->output_section;
3604 if (s != NULL
3605 && !bfd_is_abs_section (s))
3606 {
3607 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3608 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3609
3610 if (elf_sec->rel.hdr != NULL
3611 && (gas
3612 || (input_elf_sec->rel.hdr != NULL
3613 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3614 {
3615 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3616 loc -= 4;
3617 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3618 }
3619 if (elf_sec->rela.hdr != NULL
3620 && (gas
3621 || (input_elf_sec->rela.hdr != NULL
3622 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3623 {
3624 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3625 loc -= 4;
3626 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3627 }
3628 loc -= 4;
3629 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3630 }
3631 elt = elf_next_in_group (elt);
3632 if (elt == first)
3633 break;
3634 }
3635
3636 loc -= 4;
3637 BFD_ASSERT (loc == sec->contents);
3638
3639 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3640 }
3641
3642 /* Given NAME, the name of a relocation section stripped of its
3643 .rel/.rela prefix, return the section in ABFD to which the
3644 relocations apply. */
3645
3646 asection *
3647 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3648 {
3649 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3650 section likely apply to .got.plt or .got section. */
3651 if (get_elf_backend_data (abfd)->want_got_plt
3652 && strcmp (name, ".plt") == 0)
3653 {
3654 asection *sec;
3655
3656 name = ".got.plt";
3657 sec = bfd_get_section_by_name (abfd, name);
3658 if (sec != NULL)
3659 return sec;
3660 name = ".got";
3661 }
3662
3663 return bfd_get_section_by_name (abfd, name);
3664 }
3665
3666 /* Return the section to which RELOC_SEC applies. */
3667
3668 static asection *
3669 elf_get_reloc_section (asection *reloc_sec)
3670 {
3671 const char *name;
3672 unsigned int type;
3673 bfd *abfd;
3674 const struct elf_backend_data *bed;
3675
3676 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3677 if (type != SHT_REL && type != SHT_RELA)
3678 return NULL;
3679
3680 /* We look up the section the relocs apply to by name. */
3681 name = reloc_sec->name;
3682 if (strncmp (name, ".rel", 4) != 0)
3683 return NULL;
3684 name += 4;
3685 if (type == SHT_RELA && *name++ != 'a')
3686 return NULL;
3687
3688 abfd = reloc_sec->owner;
3689 bed = get_elf_backend_data (abfd);
3690 return bed->get_reloc_section (abfd, name);
3691 }
3692
3693 /* Assign all ELF section numbers. The dummy first section is handled here
3694 too. The link/info pointers for the standard section types are filled
3695 in here too, while we're at it. */
3696
3697 static bfd_boolean
3698 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3699 {
3700 struct elf_obj_tdata *t = elf_tdata (abfd);
3701 asection *sec;
3702 unsigned int section_number;
3703 Elf_Internal_Shdr **i_shdrp;
3704 struct bfd_elf_section_data *d;
3705 bfd_boolean need_symtab;
3706 size_t amt;
3707
3708 section_number = 1;
3709
3710 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3711
3712 /* SHT_GROUP sections are in relocatable files only. */
3713 if (link_info == NULL || !link_info->resolve_section_groups)
3714 {
3715 size_t reloc_count = 0;
3716
3717 /* Put SHT_GROUP sections first. */
3718 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3719 {
3720 d = elf_section_data (sec);
3721
3722 if (d->this_hdr.sh_type == SHT_GROUP)
3723 {
3724 if (sec->flags & SEC_LINKER_CREATED)
3725 {
3726 /* Remove the linker created SHT_GROUP sections. */
3727 bfd_section_list_remove (abfd, sec);
3728 abfd->section_count--;
3729 }
3730 else
3731 d->this_idx = section_number++;
3732 }
3733
3734 /* Count relocations. */
3735 reloc_count += sec->reloc_count;
3736 }
3737
3738 /* Clear HAS_RELOC if there are no relocations. */
3739 if (reloc_count == 0)
3740 abfd->flags &= ~HAS_RELOC;
3741 }
3742
3743 for (sec = abfd->sections; sec; sec = sec->next)
3744 {
3745 d = elf_section_data (sec);
3746
3747 if (d->this_hdr.sh_type != SHT_GROUP)
3748 d->this_idx = section_number++;
3749 if (d->this_hdr.sh_name != (unsigned int) -1)
3750 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3751 if (d->rel.hdr)
3752 {
3753 d->rel.idx = section_number++;
3754 if (d->rel.hdr->sh_name != (unsigned int) -1)
3755 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3756 }
3757 else
3758 d->rel.idx = 0;
3759
3760 if (d->rela.hdr)
3761 {
3762 d->rela.idx = section_number++;
3763 if (d->rela.hdr->sh_name != (unsigned int) -1)
3764 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3765 }
3766 else
3767 d->rela.idx = 0;
3768 }
3769
3770 need_symtab = (bfd_get_symcount (abfd) > 0
3771 || (link_info == NULL
3772 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3773 == HAS_RELOC)));
3774 if (need_symtab)
3775 {
3776 elf_onesymtab (abfd) = section_number++;
3777 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3778 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3779 {
3780 elf_section_list *entry;
3781
3782 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3783
3784 entry = bfd_zalloc (abfd, sizeof (*entry));
3785 entry->ndx = section_number++;
3786 elf_symtab_shndx_list (abfd) = entry;
3787 entry->hdr.sh_name
3788 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3789 ".symtab_shndx", FALSE);
3790 if (entry->hdr.sh_name == (unsigned int) -1)
3791 return FALSE;
3792 }
3793 elf_strtab_sec (abfd) = section_number++;
3794 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3795 }
3796
3797 elf_shstrtab_sec (abfd) = section_number++;
3798 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3799 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3800
3801 if (section_number >= SHN_LORESERVE)
3802 {
3803 /* xgettext:c-format */
3804 _bfd_error_handler (_("%pB: too many sections: %u"),
3805 abfd, section_number);
3806 return FALSE;
3807 }
3808
3809 elf_numsections (abfd) = section_number;
3810 elf_elfheader (abfd)->e_shnum = section_number;
3811
3812 /* Set up the list of section header pointers, in agreement with the
3813 indices. */
3814 amt = section_number * sizeof (Elf_Internal_Shdr *);
3815 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3816 if (i_shdrp == NULL)
3817 return FALSE;
3818
3819 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3820 sizeof (Elf_Internal_Shdr));
3821 if (i_shdrp[0] == NULL)
3822 {
3823 bfd_release (abfd, i_shdrp);
3824 return FALSE;
3825 }
3826
3827 elf_elfsections (abfd) = i_shdrp;
3828
3829 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3830 if (need_symtab)
3831 {
3832 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3833 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3834 {
3835 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3836 BFD_ASSERT (entry != NULL);
3837 i_shdrp[entry->ndx] = & entry->hdr;
3838 entry->hdr.sh_link = elf_onesymtab (abfd);
3839 }
3840 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3841 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3842 }
3843
3844 for (sec = abfd->sections; sec; sec = sec->next)
3845 {
3846 asection *s;
3847
3848 d = elf_section_data (sec);
3849
3850 i_shdrp[d->this_idx] = &d->this_hdr;
3851 if (d->rel.idx != 0)
3852 i_shdrp[d->rel.idx] = d->rel.hdr;
3853 if (d->rela.idx != 0)
3854 i_shdrp[d->rela.idx] = d->rela.hdr;
3855
3856 /* Fill in the sh_link and sh_info fields while we're at it. */
3857
3858 /* sh_link of a reloc section is the section index of the symbol
3859 table. sh_info is the section index of the section to which
3860 the relocation entries apply. */
3861 if (d->rel.idx != 0)
3862 {
3863 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3864 d->rel.hdr->sh_info = d->this_idx;
3865 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3866 }
3867 if (d->rela.idx != 0)
3868 {
3869 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3870 d->rela.hdr->sh_info = d->this_idx;
3871 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3872 }
3873
3874 /* We need to set up sh_link for SHF_LINK_ORDER. */
3875 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3876 {
3877 s = elf_linked_to_section (sec);
3878 if (s)
3879 {
3880 /* elf_linked_to_section points to the input section. */
3881 if (link_info != NULL)
3882 {
3883 /* Check discarded linkonce section. */
3884 if (discarded_section (s))
3885 {
3886 asection *kept;
3887 _bfd_error_handler
3888 /* xgettext:c-format */
3889 (_("%pB: sh_link of section `%pA' points to"
3890 " discarded section `%pA' of `%pB'"),
3891 abfd, d->this_hdr.bfd_section,
3892 s, s->owner);
3893 /* Point to the kept section if it has the same
3894 size as the discarded one. */
3895 kept = _bfd_elf_check_kept_section (s, link_info);
3896 if (kept == NULL)
3897 {
3898 bfd_set_error (bfd_error_bad_value);
3899 return FALSE;
3900 }
3901 s = kept;
3902 }
3903
3904 s = s->output_section;
3905 BFD_ASSERT (s != NULL);
3906 }
3907 else
3908 {
3909 /* Handle objcopy. */
3910 if (s->output_section == NULL)
3911 {
3912 _bfd_error_handler
3913 /* xgettext:c-format */
3914 (_("%pB: sh_link of section `%pA' points to"
3915 " removed section `%pA' of `%pB'"),
3916 abfd, d->this_hdr.bfd_section, s, s->owner);
3917 bfd_set_error (bfd_error_bad_value);
3918 return FALSE;
3919 }
3920 s = s->output_section;
3921 }
3922 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3923 }
3924 else
3925 {
3926 /* PR 290:
3927 The Intel C compiler generates SHT_IA_64_UNWIND with
3928 SHF_LINK_ORDER. But it doesn't set the sh_link or
3929 sh_info fields. Hence we could get the situation
3930 where s is NULL. */
3931 const struct elf_backend_data *bed
3932 = get_elf_backend_data (abfd);
3933 if (bed->link_order_error_handler)
3934 bed->link_order_error_handler
3935 /* xgettext:c-format */
3936 (_("%pB: warning: sh_link not set for section `%pA'"),
3937 abfd, sec);
3938 }
3939 }
3940
3941 switch (d->this_hdr.sh_type)
3942 {
3943 case SHT_REL:
3944 case SHT_RELA:
3945 /* A reloc section which we are treating as a normal BFD
3946 section. sh_link is the section index of the symbol
3947 table. sh_info is the section index of the section to
3948 which the relocation entries apply. We assume that an
3949 allocated reloc section uses the dynamic symbol table.
3950 FIXME: How can we be sure? */
3951 s = bfd_get_section_by_name (abfd, ".dynsym");
3952 if (s != NULL)
3953 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3954
3955 s = elf_get_reloc_section (sec);
3956 if (s != NULL)
3957 {
3958 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3959 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3960 }
3961 break;
3962
3963 case SHT_STRTAB:
3964 /* We assume that a section named .stab*str is a stabs
3965 string section. We look for a section with the same name
3966 but without the trailing ``str'', and set its sh_link
3967 field to point to this section. */
3968 if (CONST_STRNEQ (sec->name, ".stab")
3969 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3970 {
3971 size_t len;
3972 char *alc;
3973
3974 len = strlen (sec->name);
3975 alc = (char *) bfd_malloc (len - 2);
3976 if (alc == NULL)
3977 return FALSE;
3978 memcpy (alc, sec->name, len - 3);
3979 alc[len - 3] = '\0';
3980 s = bfd_get_section_by_name (abfd, alc);
3981 free (alc);
3982 if (s != NULL)
3983 {
3984 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3985
3986 /* This is a .stab section. */
3987 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
3988 elf_section_data (s)->this_hdr.sh_entsize
3989 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
3990 }
3991 }
3992 break;
3993
3994 case SHT_DYNAMIC:
3995 case SHT_DYNSYM:
3996 case SHT_GNU_verneed:
3997 case SHT_GNU_verdef:
3998 /* sh_link is the section header index of the string table
3999 used for the dynamic entries, or the symbol table, or the
4000 version strings. */
4001 s = bfd_get_section_by_name (abfd, ".dynstr");
4002 if (s != NULL)
4003 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4004 break;
4005
4006 case SHT_GNU_LIBLIST:
4007 /* sh_link is the section header index of the prelink library
4008 list used for the dynamic entries, or the symbol table, or
4009 the version strings. */
4010 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4011 ? ".dynstr" : ".gnu.libstr");
4012 if (s != NULL)
4013 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4014 break;
4015
4016 case SHT_HASH:
4017 case SHT_GNU_HASH:
4018 case SHT_GNU_versym:
4019 /* sh_link is the section header index of the symbol table
4020 this hash table or version table is for. */
4021 s = bfd_get_section_by_name (abfd, ".dynsym");
4022 if (s != NULL)
4023 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4024 break;
4025
4026 case SHT_GROUP:
4027 d->this_hdr.sh_link = elf_onesymtab (abfd);
4028 }
4029 }
4030
4031 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4032 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4033 debug section name from .debug_* to .zdebug_* if needed. */
4034
4035 return TRUE;
4036 }
4037
4038 static bfd_boolean
4039 sym_is_global (bfd *abfd, asymbol *sym)
4040 {
4041 /* If the backend has a special mapping, use it. */
4042 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4043 if (bed->elf_backend_sym_is_global)
4044 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4045
4046 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4047 || bfd_is_und_section (bfd_asymbol_section (sym))
4048 || bfd_is_com_section (bfd_asymbol_section (sym)));
4049 }
4050
4051 /* Filter global symbols of ABFD to include in the import library. All
4052 SYMCOUNT symbols of ABFD can be examined from their pointers in
4053 SYMS. Pointers of symbols to keep should be stored contiguously at
4054 the beginning of that array.
4055
4056 Returns the number of symbols to keep. */
4057
4058 unsigned int
4059 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4060 asymbol **syms, long symcount)
4061 {
4062 long src_count, dst_count = 0;
4063
4064 for (src_count = 0; src_count < symcount; src_count++)
4065 {
4066 asymbol *sym = syms[src_count];
4067 char *name = (char *) bfd_asymbol_name (sym);
4068 struct bfd_link_hash_entry *h;
4069
4070 if (!sym_is_global (abfd, sym))
4071 continue;
4072
4073 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4074 if (h == NULL)
4075 continue;
4076 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4077 continue;
4078 if (h->linker_def || h->ldscript_def)
4079 continue;
4080
4081 syms[dst_count++] = sym;
4082 }
4083
4084 syms[dst_count] = NULL;
4085
4086 return dst_count;
4087 }
4088
4089 /* Don't output section symbols for sections that are not going to be
4090 output, that are duplicates or there is no BFD section. */
4091
4092 static bfd_boolean
4093 ignore_section_sym (bfd *abfd, asymbol *sym)
4094 {
4095 elf_symbol_type *type_ptr;
4096
4097 if (sym == NULL)
4098 return FALSE;
4099
4100 if ((sym->flags & BSF_SECTION_SYM) == 0)
4101 return FALSE;
4102
4103 if (sym->section == NULL)
4104 return TRUE;
4105
4106 type_ptr = elf_symbol_from (abfd, sym);
4107 return ((type_ptr != NULL
4108 && type_ptr->internal_elf_sym.st_shndx != 0
4109 && bfd_is_abs_section (sym->section))
4110 || !(sym->section->owner == abfd
4111 || (sym->section->output_section != NULL
4112 && sym->section->output_section->owner == abfd
4113 && sym->section->output_offset == 0)
4114 || bfd_is_abs_section (sym->section)));
4115 }
4116
4117 /* Map symbol from it's internal number to the external number, moving
4118 all local symbols to be at the head of the list. */
4119
4120 static bfd_boolean
4121 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4122 {
4123 unsigned int symcount = bfd_get_symcount (abfd);
4124 asymbol **syms = bfd_get_outsymbols (abfd);
4125 asymbol **sect_syms;
4126 unsigned int num_locals = 0;
4127 unsigned int num_globals = 0;
4128 unsigned int num_locals2 = 0;
4129 unsigned int num_globals2 = 0;
4130 unsigned int max_index = 0;
4131 unsigned int idx;
4132 asection *asect;
4133 asymbol **new_syms;
4134 size_t amt;
4135
4136 #ifdef DEBUG
4137 fprintf (stderr, "elf_map_symbols\n");
4138 fflush (stderr);
4139 #endif
4140
4141 for (asect = abfd->sections; asect; asect = asect->next)
4142 {
4143 if (max_index < asect->index)
4144 max_index = asect->index;
4145 }
4146
4147 max_index++;
4148 amt = max_index * sizeof (asymbol *);
4149 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4150 if (sect_syms == NULL)
4151 return FALSE;
4152 elf_section_syms (abfd) = sect_syms;
4153 elf_num_section_syms (abfd) = max_index;
4154
4155 /* Init sect_syms entries for any section symbols we have already
4156 decided to output. */
4157 for (idx = 0; idx < symcount; idx++)
4158 {
4159 asymbol *sym = syms[idx];
4160
4161 if ((sym->flags & BSF_SECTION_SYM) != 0
4162 && sym->value == 0
4163 && !ignore_section_sym (abfd, sym)
4164 && !bfd_is_abs_section (sym->section))
4165 {
4166 asection *sec = sym->section;
4167
4168 if (sec->owner != abfd)
4169 sec = sec->output_section;
4170
4171 sect_syms[sec->index] = syms[idx];
4172 }
4173 }
4174
4175 /* Classify all of the symbols. */
4176 for (idx = 0; idx < symcount; idx++)
4177 {
4178 if (sym_is_global (abfd, syms[idx]))
4179 num_globals++;
4180 else if (!ignore_section_sym (abfd, syms[idx]))
4181 num_locals++;
4182 }
4183
4184 /* We will be adding a section symbol for each normal BFD section. Most
4185 sections will already have a section symbol in outsymbols, but
4186 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4187 at least in that case. */
4188 for (asect = abfd->sections; asect; asect = asect->next)
4189 {
4190 if (sect_syms[asect->index] == NULL)
4191 {
4192 if (!sym_is_global (abfd, asect->symbol))
4193 num_locals++;
4194 else
4195 num_globals++;
4196 }
4197 }
4198
4199 /* Now sort the symbols so the local symbols are first. */
4200 amt = (num_locals + num_globals) * sizeof (asymbol *);
4201 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4202 if (new_syms == NULL)
4203 return FALSE;
4204
4205 for (idx = 0; idx < symcount; idx++)
4206 {
4207 asymbol *sym = syms[idx];
4208 unsigned int i;
4209
4210 if (sym_is_global (abfd, sym))
4211 i = num_locals + num_globals2++;
4212 else if (!ignore_section_sym (abfd, sym))
4213 i = num_locals2++;
4214 else
4215 continue;
4216 new_syms[i] = sym;
4217 sym->udata.i = i + 1;
4218 }
4219 for (asect = abfd->sections; asect; asect = asect->next)
4220 {
4221 if (sect_syms[asect->index] == NULL)
4222 {
4223 asymbol *sym = asect->symbol;
4224 unsigned int i;
4225
4226 sect_syms[asect->index] = sym;
4227 if (!sym_is_global (abfd, sym))
4228 i = num_locals2++;
4229 else
4230 i = num_locals + num_globals2++;
4231 new_syms[i] = sym;
4232 sym->udata.i = i + 1;
4233 }
4234 }
4235
4236 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4237
4238 *pnum_locals = num_locals;
4239 return TRUE;
4240 }
4241
4242 /* Align to the maximum file alignment that could be required for any
4243 ELF data structure. */
4244
4245 static inline file_ptr
4246 align_file_position (file_ptr off, int align)
4247 {
4248 return (off + align - 1) & ~(align - 1);
4249 }
4250
4251 /* Assign a file position to a section, optionally aligning to the
4252 required section alignment. */
4253
4254 file_ptr
4255 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4256 file_ptr offset,
4257 bfd_boolean align)
4258 {
4259 if (align && i_shdrp->sh_addralign > 1)
4260 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4261 i_shdrp->sh_offset = offset;
4262 if (i_shdrp->bfd_section != NULL)
4263 i_shdrp->bfd_section->filepos = offset;
4264 if (i_shdrp->sh_type != SHT_NOBITS)
4265 offset += i_shdrp->sh_size;
4266 return offset;
4267 }
4268
4269 /* Compute the file positions we are going to put the sections at, and
4270 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4271 is not NULL, this is being called by the ELF backend linker. */
4272
4273 bfd_boolean
4274 _bfd_elf_compute_section_file_positions (bfd *abfd,
4275 struct bfd_link_info *link_info)
4276 {
4277 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4278 struct fake_section_arg fsargs;
4279 bfd_boolean failed;
4280 struct elf_strtab_hash *strtab = NULL;
4281 Elf_Internal_Shdr *shstrtab_hdr;
4282 bfd_boolean need_symtab;
4283
4284 if (abfd->output_has_begun)
4285 return TRUE;
4286
4287 /* Do any elf backend specific processing first. */
4288 if (bed->elf_backend_begin_write_processing)
4289 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4290
4291 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4292 return FALSE;
4293
4294 fsargs.failed = FALSE;
4295 fsargs.link_info = link_info;
4296 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4297 if (fsargs.failed)
4298 return FALSE;
4299
4300 if (!assign_section_numbers (abfd, link_info))
4301 return FALSE;
4302
4303 /* The backend linker builds symbol table information itself. */
4304 need_symtab = (link_info == NULL
4305 && (bfd_get_symcount (abfd) > 0
4306 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4307 == HAS_RELOC)));
4308 if (need_symtab)
4309 {
4310 /* Non-zero if doing a relocatable link. */
4311 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4312
4313 if (! swap_out_syms (abfd, &strtab, relocatable_p))
4314 return FALSE;
4315 }
4316
4317 failed = FALSE;
4318 if (link_info == NULL)
4319 {
4320 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4321 if (failed)
4322 return FALSE;
4323 }
4324
4325 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4326 /* sh_name was set in init_file_header. */
4327 shstrtab_hdr->sh_type = SHT_STRTAB;
4328 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4329 shstrtab_hdr->sh_addr = 0;
4330 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4331 shstrtab_hdr->sh_entsize = 0;
4332 shstrtab_hdr->sh_link = 0;
4333 shstrtab_hdr->sh_info = 0;
4334 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4335 shstrtab_hdr->sh_addralign = 1;
4336
4337 if (!assign_file_positions_except_relocs (abfd, link_info))
4338 return FALSE;
4339
4340 if (need_symtab)
4341 {
4342 file_ptr off;
4343 Elf_Internal_Shdr *hdr;
4344
4345 off = elf_next_file_pos (abfd);
4346
4347 hdr = & elf_symtab_hdr (abfd);
4348 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4349
4350 if (elf_symtab_shndx_list (abfd) != NULL)
4351 {
4352 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4353 if (hdr->sh_size != 0)
4354 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4355 /* FIXME: What about other symtab_shndx sections in the list ? */
4356 }
4357
4358 hdr = &elf_tdata (abfd)->strtab_hdr;
4359 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4360
4361 elf_next_file_pos (abfd) = off;
4362
4363 /* Now that we know where the .strtab section goes, write it
4364 out. */
4365 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4366 || ! _bfd_elf_strtab_emit (abfd, strtab))
4367 return FALSE;
4368 _bfd_elf_strtab_free (strtab);
4369 }
4370
4371 abfd->output_has_begun = TRUE;
4372
4373 return TRUE;
4374 }
4375
4376 /* Make an initial estimate of the size of the program header. If we
4377 get the number wrong here, we'll redo section placement. */
4378
4379 static bfd_size_type
4380 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4381 {
4382 size_t segs;
4383 asection *s;
4384 const struct elf_backend_data *bed;
4385
4386 /* Assume we will need exactly two PT_LOAD segments: one for text
4387 and one for data. */
4388 segs = 2;
4389
4390 s = bfd_get_section_by_name (abfd, ".interp");
4391 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4392 {
4393 /* If we have a loadable interpreter section, we need a
4394 PT_INTERP segment. In this case, assume we also need a
4395 PT_PHDR segment, although that may not be true for all
4396 targets. */
4397 segs += 2;
4398 }
4399
4400 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4401 {
4402 /* We need a PT_DYNAMIC segment. */
4403 ++segs;
4404 }
4405
4406 if (info != NULL && info->relro)
4407 {
4408 /* We need a PT_GNU_RELRO segment. */
4409 ++segs;
4410 }
4411
4412 if (elf_eh_frame_hdr (abfd))
4413 {
4414 /* We need a PT_GNU_EH_FRAME segment. */
4415 ++segs;
4416 }
4417
4418 if (elf_stack_flags (abfd))
4419 {
4420 /* We need a PT_GNU_STACK segment. */
4421 ++segs;
4422 }
4423
4424 s = bfd_get_section_by_name (abfd,
4425 NOTE_GNU_PROPERTY_SECTION_NAME);
4426 if (s != NULL && s->size != 0)
4427 {
4428 /* We need a PT_GNU_PROPERTY segment. */
4429 ++segs;
4430 }
4431
4432 for (s = abfd->sections; s != NULL; s = s->next)
4433 {
4434 if ((s->flags & SEC_LOAD) != 0
4435 && elf_section_type (s) == SHT_NOTE)
4436 {
4437 unsigned int alignment_power;
4438 /* We need a PT_NOTE segment. */
4439 ++segs;
4440 /* Try to create just one PT_NOTE segment for all adjacent
4441 loadable SHT_NOTE sections. gABI requires that within a
4442 PT_NOTE segment (and also inside of each SHT_NOTE section)
4443 each note should have the same alignment. So we check
4444 whether the sections are correctly aligned. */
4445 alignment_power = s->alignment_power;
4446 while (s->next != NULL
4447 && s->next->alignment_power == alignment_power
4448 && (s->next->flags & SEC_LOAD) != 0
4449 && elf_section_type (s->next) == SHT_NOTE)
4450 s = s->next;
4451 }
4452 }
4453
4454 for (s = abfd->sections; s != NULL; s = s->next)
4455 {
4456 if (s->flags & SEC_THREAD_LOCAL)
4457 {
4458 /* We need a PT_TLS segment. */
4459 ++segs;
4460 break;
4461 }
4462 }
4463
4464 bed = get_elf_backend_data (abfd);
4465
4466 if ((abfd->flags & D_PAGED) != 0
4467 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4468 {
4469 /* Add a PT_GNU_MBIND segment for each mbind section. */
4470 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4471 for (s = abfd->sections; s != NULL; s = s->next)
4472 if (elf_section_flags (s) & SHF_GNU_MBIND)
4473 {
4474 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4475 {
4476 _bfd_error_handler
4477 /* xgettext:c-format */
4478 (_("%pB: GNU_MBIND section `%pA' has invalid "
4479 "sh_info field: %d"),
4480 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4481 continue;
4482 }
4483 /* Align mbind section to page size. */
4484 if (s->alignment_power < page_align_power)
4485 s->alignment_power = page_align_power;
4486 segs ++;
4487 }
4488 }
4489
4490 /* Let the backend count up any program headers it might need. */
4491 if (bed->elf_backend_additional_program_headers)
4492 {
4493 int a;
4494
4495 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4496 if (a == -1)
4497 abort ();
4498 segs += a;
4499 }
4500
4501 return segs * bed->s->sizeof_phdr;
4502 }
4503
4504 /* Find the segment that contains the output_section of section. */
4505
4506 Elf_Internal_Phdr *
4507 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4508 {
4509 struct elf_segment_map *m;
4510 Elf_Internal_Phdr *p;
4511
4512 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4513 m != NULL;
4514 m = m->next, p++)
4515 {
4516 int i;
4517
4518 for (i = m->count - 1; i >= 0; i--)
4519 if (m->sections[i] == section)
4520 return p;
4521 }
4522
4523 return NULL;
4524 }
4525
4526 /* Create a mapping from a set of sections to a program segment. */
4527
4528 static struct elf_segment_map *
4529 make_mapping (bfd *abfd,
4530 asection **sections,
4531 unsigned int from,
4532 unsigned int to,
4533 bfd_boolean phdr)
4534 {
4535 struct elf_segment_map *m;
4536 unsigned int i;
4537 asection **hdrpp;
4538 size_t amt;
4539
4540 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4541 amt += (to - from) * sizeof (asection *);
4542 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4543 if (m == NULL)
4544 return NULL;
4545 m->next = NULL;
4546 m->p_type = PT_LOAD;
4547 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4548 m->sections[i - from] = *hdrpp;
4549 m->count = to - from;
4550
4551 if (from == 0 && phdr)
4552 {
4553 /* Include the headers in the first PT_LOAD segment. */
4554 m->includes_filehdr = 1;
4555 m->includes_phdrs = 1;
4556 }
4557
4558 return m;
4559 }
4560
4561 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4562 on failure. */
4563
4564 struct elf_segment_map *
4565 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4566 {
4567 struct elf_segment_map *m;
4568
4569 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4570 sizeof (struct elf_segment_map));
4571 if (m == NULL)
4572 return NULL;
4573 m->next = NULL;
4574 m->p_type = PT_DYNAMIC;
4575 m->count = 1;
4576 m->sections[0] = dynsec;
4577
4578 return m;
4579 }
4580
4581 /* Possibly add or remove segments from the segment map. */
4582
4583 static bfd_boolean
4584 elf_modify_segment_map (bfd *abfd,
4585 struct bfd_link_info *info,
4586 bfd_boolean remove_empty_load)
4587 {
4588 struct elf_segment_map **m;
4589 const struct elf_backend_data *bed;
4590
4591 /* The placement algorithm assumes that non allocated sections are
4592 not in PT_LOAD segments. We ensure this here by removing such
4593 sections from the segment map. We also remove excluded
4594 sections. Finally, any PT_LOAD segment without sections is
4595 removed. */
4596 m = &elf_seg_map (abfd);
4597 while (*m)
4598 {
4599 unsigned int i, new_count;
4600
4601 for (new_count = 0, i = 0; i < (*m)->count; i++)
4602 {
4603 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4604 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4605 || (*m)->p_type != PT_LOAD))
4606 {
4607 (*m)->sections[new_count] = (*m)->sections[i];
4608 new_count++;
4609 }
4610 }
4611 (*m)->count = new_count;
4612
4613 if (remove_empty_load
4614 && (*m)->p_type == PT_LOAD
4615 && (*m)->count == 0
4616 && !(*m)->includes_phdrs)
4617 *m = (*m)->next;
4618 else
4619 m = &(*m)->next;
4620 }
4621
4622 bed = get_elf_backend_data (abfd);
4623 if (bed->elf_backend_modify_segment_map != NULL)
4624 {
4625 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4626 return FALSE;
4627 }
4628
4629 return TRUE;
4630 }
4631
4632 #define IS_TBSS(s) \
4633 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4634
4635 /* Set up a mapping from BFD sections to program segments. */
4636
4637 bfd_boolean
4638 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4639 {
4640 unsigned int count;
4641 struct elf_segment_map *m;
4642 asection **sections = NULL;
4643 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4644 bfd_boolean no_user_phdrs;
4645
4646 no_user_phdrs = elf_seg_map (abfd) == NULL;
4647
4648 if (info != NULL)
4649 info->user_phdrs = !no_user_phdrs;
4650
4651 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4652 {
4653 asection *s;
4654 unsigned int i;
4655 struct elf_segment_map *mfirst;
4656 struct elf_segment_map **pm;
4657 asection *last_hdr;
4658 bfd_vma last_size;
4659 unsigned int hdr_index;
4660 bfd_vma maxpagesize;
4661 asection **hdrpp;
4662 bfd_boolean phdr_in_segment;
4663 bfd_boolean writable;
4664 bfd_boolean executable;
4665 unsigned int tls_count = 0;
4666 asection *first_tls = NULL;
4667 asection *first_mbind = NULL;
4668 asection *dynsec, *eh_frame_hdr;
4669 size_t amt;
4670 bfd_vma addr_mask, wrap_to = 0;
4671 bfd_size_type phdr_size;
4672
4673 /* Select the allocated sections, and sort them. */
4674
4675 amt = bfd_count_sections (abfd) * sizeof (asection *);
4676 sections = (asection **) bfd_malloc (amt);
4677 if (sections == NULL)
4678 goto error_return;
4679
4680 /* Calculate top address, avoiding undefined behaviour of shift
4681 left operator when shift count is equal to size of type
4682 being shifted. */
4683 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4684 addr_mask = (addr_mask << 1) + 1;
4685
4686 i = 0;
4687 for (s = abfd->sections; s != NULL; s = s->next)
4688 {
4689 if ((s->flags & SEC_ALLOC) != 0)
4690 {
4691 /* target_index is unused until bfd_elf_final_link
4692 starts output of section symbols. Use it to make
4693 qsort stable. */
4694 s->target_index = i;
4695 sections[i] = s;
4696 ++i;
4697 /* A wrapping section potentially clashes with header. */
4698 if (((s->lma + s->size) & addr_mask) < (s->lma & addr_mask))
4699 wrap_to = (s->lma + s->size) & addr_mask;
4700 }
4701 }
4702 BFD_ASSERT (i <= bfd_count_sections (abfd));
4703 count = i;
4704
4705 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4706
4707 phdr_size = elf_program_header_size (abfd);
4708 if (phdr_size == (bfd_size_type) -1)
4709 phdr_size = get_program_header_size (abfd, info);
4710 phdr_size += bed->s->sizeof_ehdr;
4711 maxpagesize = bed->maxpagesize;
4712 if (maxpagesize == 0)
4713 maxpagesize = 1;
4714 phdr_in_segment = info != NULL && info->load_phdrs;
4715 if (count != 0
4716 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4717 >= (phdr_size & (maxpagesize - 1))))
4718 /* For compatibility with old scripts that may not be using
4719 SIZEOF_HEADERS, add headers when it looks like space has
4720 been left for them. */
4721 phdr_in_segment = TRUE;
4722
4723 /* Build the mapping. */
4724 mfirst = NULL;
4725 pm = &mfirst;
4726
4727 /* If we have a .interp section, then create a PT_PHDR segment for
4728 the program headers and a PT_INTERP segment for the .interp
4729 section. */
4730 s = bfd_get_section_by_name (abfd, ".interp");
4731 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4732 {
4733 amt = sizeof (struct elf_segment_map);
4734 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4735 if (m == NULL)
4736 goto error_return;
4737 m->next = NULL;
4738 m->p_type = PT_PHDR;
4739 m->p_flags = PF_R;
4740 m->p_flags_valid = 1;
4741 m->includes_phdrs = 1;
4742 phdr_in_segment = TRUE;
4743 *pm = m;
4744 pm = &m->next;
4745
4746 amt = sizeof (struct elf_segment_map);
4747 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4748 if (m == NULL)
4749 goto error_return;
4750 m->next = NULL;
4751 m->p_type = PT_INTERP;
4752 m->count = 1;
4753 m->sections[0] = s;
4754
4755 *pm = m;
4756 pm = &m->next;
4757 }
4758
4759 /* Look through the sections. We put sections in the same program
4760 segment when the start of the second section can be placed within
4761 a few bytes of the end of the first section. */
4762 last_hdr = NULL;
4763 last_size = 0;
4764 hdr_index = 0;
4765 writable = FALSE;
4766 executable = FALSE;
4767 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4768 if (dynsec != NULL
4769 && (dynsec->flags & SEC_LOAD) == 0)
4770 dynsec = NULL;
4771
4772 if ((abfd->flags & D_PAGED) == 0)
4773 phdr_in_segment = FALSE;
4774
4775 /* Deal with -Ttext or something similar such that the first section
4776 is not adjacent to the program headers. This is an
4777 approximation, since at this point we don't know exactly how many
4778 program headers we will need. */
4779 if (phdr_in_segment && count > 0)
4780 {
4781 bfd_vma phdr_lma;
4782 bfd_boolean separate_phdr = FALSE;
4783
4784 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4785 if (info != NULL
4786 && info->separate_code
4787 && (sections[0]->flags & SEC_CODE) != 0)
4788 {
4789 /* If data sections should be separate from code and
4790 thus not executable, and the first section is
4791 executable then put the file and program headers in
4792 their own PT_LOAD. */
4793 separate_phdr = TRUE;
4794 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4795 == (sections[0]->lma & addr_mask & -maxpagesize)))
4796 {
4797 /* The file and program headers are currently on the
4798 same page as the first section. Put them on the
4799 previous page if we can. */
4800 if (phdr_lma >= maxpagesize)
4801 phdr_lma -= maxpagesize;
4802 else
4803 separate_phdr = FALSE;
4804 }
4805 }
4806 if ((sections[0]->lma & addr_mask) < phdr_lma
4807 || (sections[0]->lma & addr_mask) < phdr_size)
4808 /* If file and program headers would be placed at the end
4809 of memory then it's probably better to omit them. */
4810 phdr_in_segment = FALSE;
4811 else if (phdr_lma < wrap_to)
4812 /* If a section wraps around to where we'll be placing
4813 file and program headers, then the headers will be
4814 overwritten. */
4815 phdr_in_segment = FALSE;
4816 else if (separate_phdr)
4817 {
4818 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4819 if (m == NULL)
4820 goto error_return;
4821 m->p_paddr = phdr_lma;
4822 m->p_vaddr_offset
4823 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4824 m->p_paddr_valid = 1;
4825 *pm = m;
4826 pm = &m->next;
4827 phdr_in_segment = FALSE;
4828 }
4829 }
4830
4831 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4832 {
4833 asection *hdr;
4834 bfd_boolean new_segment;
4835
4836 hdr = *hdrpp;
4837
4838 /* See if this section and the last one will fit in the same
4839 segment. */
4840
4841 if (last_hdr == NULL)
4842 {
4843 /* If we don't have a segment yet, then we don't need a new
4844 one (we build the last one after this loop). */
4845 new_segment = FALSE;
4846 }
4847 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4848 {
4849 /* If this section has a different relation between the
4850 virtual address and the load address, then we need a new
4851 segment. */
4852 new_segment = TRUE;
4853 }
4854 else if (hdr->lma < last_hdr->lma + last_size
4855 || last_hdr->lma + last_size < last_hdr->lma)
4856 {
4857 /* If this section has a load address that makes it overlap
4858 the previous section, then we need a new segment. */
4859 new_segment = TRUE;
4860 }
4861 else if ((abfd->flags & D_PAGED) != 0
4862 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4863 == (hdr->lma & -maxpagesize)))
4864 {
4865 /* If we are demand paged then we can't map two disk
4866 pages onto the same memory page. */
4867 new_segment = FALSE;
4868 }
4869 /* In the next test we have to be careful when last_hdr->lma is close
4870 to the end of the address space. If the aligned address wraps
4871 around to the start of the address space, then there are no more
4872 pages left in memory and it is OK to assume that the current
4873 section can be included in the current segment. */
4874 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4875 + maxpagesize > last_hdr->lma)
4876 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4877 + maxpagesize <= hdr->lma))
4878 {
4879 /* If putting this section in this segment would force us to
4880 skip a page in the segment, then we need a new segment. */
4881 new_segment = TRUE;
4882 }
4883 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4884 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4885 {
4886 /* We don't want to put a loaded section after a
4887 nonloaded (ie. bss style) section in the same segment
4888 as that will force the non-loaded section to be loaded.
4889 Consider .tbss sections as loaded for this purpose. */
4890 new_segment = TRUE;
4891 }
4892 else if ((abfd->flags & D_PAGED) == 0)
4893 {
4894 /* If the file is not demand paged, which means that we
4895 don't require the sections to be correctly aligned in the
4896 file, then there is no other reason for a new segment. */
4897 new_segment = FALSE;
4898 }
4899 else if (info != NULL
4900 && info->separate_code
4901 && executable != ((hdr->flags & SEC_CODE) != 0))
4902 {
4903 new_segment = TRUE;
4904 }
4905 else if (! writable
4906 && (hdr->flags & SEC_READONLY) == 0)
4907 {
4908 /* We don't want to put a writable section in a read only
4909 segment. */
4910 new_segment = TRUE;
4911 }
4912 else
4913 {
4914 /* Otherwise, we can use the same segment. */
4915 new_segment = FALSE;
4916 }
4917
4918 /* Allow interested parties a chance to override our decision. */
4919 if (last_hdr != NULL
4920 && info != NULL
4921 && info->callbacks->override_segment_assignment != NULL)
4922 new_segment
4923 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4924 last_hdr,
4925 new_segment);
4926
4927 if (! new_segment)
4928 {
4929 if ((hdr->flags & SEC_READONLY) == 0)
4930 writable = TRUE;
4931 if ((hdr->flags & SEC_CODE) != 0)
4932 executable = TRUE;
4933 last_hdr = hdr;
4934 /* .tbss sections effectively have zero size. */
4935 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4936 continue;
4937 }
4938
4939 /* We need a new program segment. We must create a new program
4940 header holding all the sections from hdr_index until hdr. */
4941
4942 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4943 if (m == NULL)
4944 goto error_return;
4945
4946 *pm = m;
4947 pm = &m->next;
4948
4949 if ((hdr->flags & SEC_READONLY) == 0)
4950 writable = TRUE;
4951 else
4952 writable = FALSE;
4953
4954 if ((hdr->flags & SEC_CODE) == 0)
4955 executable = FALSE;
4956 else
4957 executable = TRUE;
4958
4959 last_hdr = hdr;
4960 /* .tbss sections effectively have zero size. */
4961 last_size = !IS_TBSS (hdr) ? hdr->size : 0;
4962 hdr_index = i;
4963 phdr_in_segment = FALSE;
4964 }
4965
4966 /* Create a final PT_LOAD program segment, but not if it's just
4967 for .tbss. */
4968 if (last_hdr != NULL
4969 && (i - hdr_index != 1
4970 || !IS_TBSS (last_hdr)))
4971 {
4972 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4973 if (m == NULL)
4974 goto error_return;
4975
4976 *pm = m;
4977 pm = &m->next;
4978 }
4979
4980 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4981 if (dynsec != NULL)
4982 {
4983 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4984 if (m == NULL)
4985 goto error_return;
4986 *pm = m;
4987 pm = &m->next;
4988 }
4989
4990 /* For each batch of consecutive loadable SHT_NOTE sections,
4991 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4992 because if we link together nonloadable .note sections and
4993 loadable .note sections, we will generate two .note sections
4994 in the output file. */
4995 for (s = abfd->sections; s != NULL; s = s->next)
4996 {
4997 if ((s->flags & SEC_LOAD) != 0
4998 && elf_section_type (s) == SHT_NOTE)
4999 {
5000 asection *s2;
5001 unsigned int alignment_power = s->alignment_power;
5002
5003 count = 1;
5004 for (s2 = s; s2->next != NULL; s2 = s2->next)
5005 {
5006 if (s2->next->alignment_power == alignment_power
5007 && (s2->next->flags & SEC_LOAD) != 0
5008 && elf_section_type (s2->next) == SHT_NOTE
5009 && align_power (s2->lma + s2->size,
5010 alignment_power)
5011 == s2->next->lma)
5012 count++;
5013 else
5014 break;
5015 }
5016 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5017 amt += count * sizeof (asection *);
5018 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5019 if (m == NULL)
5020 goto error_return;
5021 m->next = NULL;
5022 m->p_type = PT_NOTE;
5023 m->count = count;
5024 while (count > 1)
5025 {
5026 m->sections[m->count - count--] = s;
5027 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5028 s = s->next;
5029 }
5030 m->sections[m->count - 1] = s;
5031 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5032 *pm = m;
5033 pm = &m->next;
5034 }
5035 if (s->flags & SEC_THREAD_LOCAL)
5036 {
5037 if (! tls_count)
5038 first_tls = s;
5039 tls_count++;
5040 }
5041 if (first_mbind == NULL
5042 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5043 first_mbind = s;
5044 }
5045
5046 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5047 if (tls_count > 0)
5048 {
5049 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5050 amt += tls_count * sizeof (asection *);
5051 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5052 if (m == NULL)
5053 goto error_return;
5054 m->next = NULL;
5055 m->p_type = PT_TLS;
5056 m->count = tls_count;
5057 /* Mandated PF_R. */
5058 m->p_flags = PF_R;
5059 m->p_flags_valid = 1;
5060 s = first_tls;
5061 for (i = 0; i < tls_count; ++i)
5062 {
5063 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5064 {
5065 _bfd_error_handler
5066 (_("%pB: TLS sections are not adjacent:"), abfd);
5067 s = first_tls;
5068 i = 0;
5069 while (i < tls_count)
5070 {
5071 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5072 {
5073 _bfd_error_handler (_(" TLS: %pA"), s);
5074 i++;
5075 }
5076 else
5077 _bfd_error_handler (_(" non-TLS: %pA"), s);
5078 s = s->next;
5079 }
5080 bfd_set_error (bfd_error_bad_value);
5081 goto error_return;
5082 }
5083 m->sections[i] = s;
5084 s = s->next;
5085 }
5086
5087 *pm = m;
5088 pm = &m->next;
5089 }
5090
5091 if (first_mbind
5092 && (abfd->flags & D_PAGED) != 0
5093 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5094 for (s = first_mbind; s != NULL; s = s->next)
5095 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5096 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5097 {
5098 /* Mandated PF_R. */
5099 unsigned long p_flags = PF_R;
5100 if ((s->flags & SEC_READONLY) == 0)
5101 p_flags |= PF_W;
5102 if ((s->flags & SEC_CODE) != 0)
5103 p_flags |= PF_X;
5104
5105 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5106 m = bfd_zalloc (abfd, amt);
5107 if (m == NULL)
5108 goto error_return;
5109 m->next = NULL;
5110 m->p_type = (PT_GNU_MBIND_LO
5111 + elf_section_data (s)->this_hdr.sh_info);
5112 m->count = 1;
5113 m->p_flags_valid = 1;
5114 m->sections[0] = s;
5115 m->p_flags = p_flags;
5116
5117 *pm = m;
5118 pm = &m->next;
5119 }
5120
5121 s = bfd_get_section_by_name (abfd,
5122 NOTE_GNU_PROPERTY_SECTION_NAME);
5123 if (s != NULL && s->size != 0)
5124 {
5125 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5126 m = bfd_zalloc (abfd, amt);
5127 if (m == NULL)
5128 goto error_return;
5129 m->next = NULL;
5130 m->p_type = PT_GNU_PROPERTY;
5131 m->count = 1;
5132 m->p_flags_valid = 1;
5133 m->sections[0] = s;
5134 m->p_flags = PF_R;
5135 *pm = m;
5136 pm = &m->next;
5137 }
5138
5139 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5140 segment. */
5141 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5142 if (eh_frame_hdr != NULL
5143 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5144 {
5145 amt = sizeof (struct elf_segment_map);
5146 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5147 if (m == NULL)
5148 goto error_return;
5149 m->next = NULL;
5150 m->p_type = PT_GNU_EH_FRAME;
5151 m->count = 1;
5152 m->sections[0] = eh_frame_hdr->output_section;
5153
5154 *pm = m;
5155 pm = &m->next;
5156 }
5157
5158 if (elf_stack_flags (abfd))
5159 {
5160 amt = sizeof (struct elf_segment_map);
5161 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5162 if (m == NULL)
5163 goto error_return;
5164 m->next = NULL;
5165 m->p_type = PT_GNU_STACK;
5166 m->p_flags = elf_stack_flags (abfd);
5167 m->p_align = bed->stack_align;
5168 m->p_flags_valid = 1;
5169 m->p_align_valid = m->p_align != 0;
5170 if (info->stacksize > 0)
5171 {
5172 m->p_size = info->stacksize;
5173 m->p_size_valid = 1;
5174 }
5175
5176 *pm = m;
5177 pm = &m->next;
5178 }
5179
5180 if (info != NULL && info->relro)
5181 {
5182 for (m = mfirst; m != NULL; m = m->next)
5183 {
5184 if (m->p_type == PT_LOAD
5185 && m->count != 0
5186 && m->sections[0]->vma >= info->relro_start
5187 && m->sections[0]->vma < info->relro_end)
5188 {
5189 i = m->count;
5190 while (--i != (unsigned) -1)
5191 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5192 == (SEC_LOAD | SEC_HAS_CONTENTS))
5193 break;
5194
5195 if (i != (unsigned) -1)
5196 break;
5197 }
5198 }
5199
5200 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5201 if (m != NULL)
5202 {
5203 amt = sizeof (struct elf_segment_map);
5204 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5205 if (m == NULL)
5206 goto error_return;
5207 m->next = NULL;
5208 m->p_type = PT_GNU_RELRO;
5209 *pm = m;
5210 pm = &m->next;
5211 }
5212 }
5213
5214 free (sections);
5215 elf_seg_map (abfd) = mfirst;
5216 }
5217
5218 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5219 return FALSE;
5220
5221 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5222 ++count;
5223 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5224
5225 return TRUE;
5226
5227 error_return:
5228 if (sections != NULL)
5229 free (sections);
5230 return FALSE;
5231 }
5232
5233 /* Sort sections by address. */
5234
5235 static int
5236 elf_sort_sections (const void *arg1, const void *arg2)
5237 {
5238 const asection *sec1 = *(const asection **) arg1;
5239 const asection *sec2 = *(const asection **) arg2;
5240 bfd_size_type size1, size2;
5241
5242 /* Sort by LMA first, since this is the address used to
5243 place the section into a segment. */
5244 if (sec1->lma < sec2->lma)
5245 return -1;
5246 else if (sec1->lma > sec2->lma)
5247 return 1;
5248
5249 /* Then sort by VMA. Normally the LMA and the VMA will be
5250 the same, and this will do nothing. */
5251 if (sec1->vma < sec2->vma)
5252 return -1;
5253 else if (sec1->vma > sec2->vma)
5254 return 1;
5255
5256 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5257
5258 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5259
5260 if (TOEND (sec1))
5261 {
5262 if (!TOEND (sec2))
5263 return 1;
5264 }
5265 else if (TOEND (sec2))
5266 return -1;
5267
5268 #undef TOEND
5269
5270 /* Sort by size, to put zero sized sections
5271 before others at the same address. */
5272
5273 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5274 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5275
5276 if (size1 < size2)
5277 return -1;
5278 if (size1 > size2)
5279 return 1;
5280
5281 return sec1->target_index - sec2->target_index;
5282 }
5283
5284 /* This qsort comparison functions sorts PT_LOAD segments first and
5285 by p_paddr, for assign_file_positions_for_load_sections. */
5286
5287 static int
5288 elf_sort_segments (const void *arg1, const void *arg2)
5289 {
5290 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5291 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5292
5293 if (m1->p_type != m2->p_type)
5294 {
5295 if (m1->p_type == PT_NULL)
5296 return 1;
5297 if (m2->p_type == PT_NULL)
5298 return -1;
5299 return m1->p_type < m2->p_type ? -1 : 1;
5300 }
5301 if (m1->includes_filehdr != m2->includes_filehdr)
5302 return m1->includes_filehdr ? -1 : 1;
5303 if (m1->no_sort_lma != m2->no_sort_lma)
5304 return m1->no_sort_lma ? -1 : 1;
5305 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5306 {
5307 bfd_vma lma1, lma2;
5308 lma1 = 0;
5309 if (m1->p_paddr_valid)
5310 lma1 = m1->p_paddr;
5311 else if (m1->count != 0)
5312 lma1 = m1->sections[0]->lma + m1->p_vaddr_offset;
5313 lma2 = 0;
5314 if (m2->p_paddr_valid)
5315 lma2 = m2->p_paddr;
5316 else if (m2->count != 0)
5317 lma2 = m2->sections[0]->lma + m2->p_vaddr_offset;
5318 if (lma1 != lma2)
5319 return lma1 < lma2 ? -1 : 1;
5320 }
5321 if (m1->idx != m2->idx)
5322 return m1->idx < m2->idx ? -1 : 1;
5323 return 0;
5324 }
5325
5326 /* Ian Lance Taylor writes:
5327
5328 We shouldn't be using % with a negative signed number. That's just
5329 not good. We have to make sure either that the number is not
5330 negative, or that the number has an unsigned type. When the types
5331 are all the same size they wind up as unsigned. When file_ptr is a
5332 larger signed type, the arithmetic winds up as signed long long,
5333 which is wrong.
5334
5335 What we're trying to say here is something like ``increase OFF by
5336 the least amount that will cause it to be equal to the VMA modulo
5337 the page size.'' */
5338 /* In other words, something like:
5339
5340 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5341 off_offset = off % bed->maxpagesize;
5342 if (vma_offset < off_offset)
5343 adjustment = vma_offset + bed->maxpagesize - off_offset;
5344 else
5345 adjustment = vma_offset - off_offset;
5346
5347 which can be collapsed into the expression below. */
5348
5349 static file_ptr
5350 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5351 {
5352 /* PR binutils/16199: Handle an alignment of zero. */
5353 if (maxpagesize == 0)
5354 maxpagesize = 1;
5355 return ((vma - off) % maxpagesize);
5356 }
5357
5358 static void
5359 print_segment_map (const struct elf_segment_map *m)
5360 {
5361 unsigned int j;
5362 const char *pt = get_segment_type (m->p_type);
5363 char buf[32];
5364
5365 if (pt == NULL)
5366 {
5367 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5368 sprintf (buf, "LOPROC+%7.7x",
5369 (unsigned int) (m->p_type - PT_LOPROC));
5370 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5371 sprintf (buf, "LOOS+%7.7x",
5372 (unsigned int) (m->p_type - PT_LOOS));
5373 else
5374 snprintf (buf, sizeof (buf), "%8.8x",
5375 (unsigned int) m->p_type);
5376 pt = buf;
5377 }
5378 fflush (stdout);
5379 fprintf (stderr, "%s:", pt);
5380 for (j = 0; j < m->count; j++)
5381 fprintf (stderr, " %s", m->sections [j]->name);
5382 putc ('\n',stderr);
5383 fflush (stderr);
5384 }
5385
5386 static bfd_boolean
5387 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5388 {
5389 void *buf;
5390 bfd_boolean ret;
5391
5392 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5393 return FALSE;
5394 buf = bfd_zmalloc (len);
5395 if (buf == NULL)
5396 return FALSE;
5397 ret = bfd_bwrite (buf, len, abfd) == len;
5398 free (buf);
5399 return ret;
5400 }
5401
5402 /* Assign file positions to the sections based on the mapping from
5403 sections to segments. This function also sets up some fields in
5404 the file header. */
5405
5406 static bfd_boolean
5407 assign_file_positions_for_load_sections (bfd *abfd,
5408 struct bfd_link_info *link_info)
5409 {
5410 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5411 struct elf_segment_map *m;
5412 struct elf_segment_map *phdr_load_seg;
5413 Elf_Internal_Phdr *phdrs;
5414 Elf_Internal_Phdr *p;
5415 file_ptr off;
5416 bfd_size_type maxpagesize;
5417 unsigned int alloc, actual;
5418 unsigned int i, j;
5419 struct elf_segment_map **sorted_seg_map;
5420
5421 if (link_info == NULL
5422 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5423 return FALSE;
5424
5425 alloc = 0;
5426 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5427 m->idx = alloc++;
5428
5429 if (alloc)
5430 {
5431 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5432 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5433 }
5434 else
5435 {
5436 /* PR binutils/12467. */
5437 elf_elfheader (abfd)->e_phoff = 0;
5438 elf_elfheader (abfd)->e_phentsize = 0;
5439 }
5440
5441 elf_elfheader (abfd)->e_phnum = alloc;
5442
5443 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5444 {
5445 actual = alloc;
5446 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5447 }
5448 else
5449 {
5450 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5451 BFD_ASSERT (elf_program_header_size (abfd)
5452 == actual * bed->s->sizeof_phdr);
5453 BFD_ASSERT (actual >= alloc);
5454 }
5455
5456 if (alloc == 0)
5457 {
5458 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5459 return TRUE;
5460 }
5461
5462 /* We're writing the size in elf_program_header_size (abfd),
5463 see assign_file_positions_except_relocs, so make sure we have
5464 that amount allocated, with trailing space cleared.
5465 The variable alloc contains the computed need, while
5466 elf_program_header_size (abfd) contains the size used for the
5467 layout.
5468 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5469 where the layout is forced to according to a larger size in the
5470 last iterations for the testcase ld-elf/header. */
5471 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5472 + alloc * sizeof (*sorted_seg_map)));
5473 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5474 elf_tdata (abfd)->phdr = phdrs;
5475 if (phdrs == NULL)
5476 return FALSE;
5477
5478 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5479 {
5480 sorted_seg_map[j] = m;
5481 /* If elf_segment_map is not from map_sections_to_segments, the
5482 sections may not be correctly ordered. NOTE: sorting should
5483 not be done to the PT_NOTE section of a corefile, which may
5484 contain several pseudo-sections artificially created by bfd.
5485 Sorting these pseudo-sections breaks things badly. */
5486 if (m->count > 1
5487 && !(elf_elfheader (abfd)->e_type == ET_CORE
5488 && m->p_type == PT_NOTE))
5489 {
5490 for (i = 0; i < m->count; i++)
5491 m->sections[i]->target_index = i;
5492 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5493 elf_sort_sections);
5494 }
5495 }
5496 if (alloc > 1)
5497 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5498 elf_sort_segments);
5499
5500 maxpagesize = 1;
5501 if ((abfd->flags & D_PAGED) != 0)
5502 maxpagesize = bed->maxpagesize;
5503
5504 /* Sections must map to file offsets past the ELF file header. */
5505 off = bed->s->sizeof_ehdr;
5506 /* And if one of the PT_LOAD headers doesn't include the program
5507 headers then we'll be mapping program headers in the usual
5508 position after the ELF file header. */
5509 phdr_load_seg = NULL;
5510 for (j = 0; j < alloc; j++)
5511 {
5512 m = sorted_seg_map[j];
5513 if (m->p_type != PT_LOAD)
5514 break;
5515 if (m->includes_phdrs)
5516 {
5517 phdr_load_seg = m;
5518 break;
5519 }
5520 }
5521 if (phdr_load_seg == NULL)
5522 off += actual * bed->s->sizeof_phdr;
5523
5524 for (j = 0; j < alloc; j++)
5525 {
5526 asection **secpp;
5527 bfd_vma off_adjust;
5528 bfd_boolean no_contents;
5529
5530 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5531 number of sections with contents contributing to both p_filesz
5532 and p_memsz, followed by a number of sections with no contents
5533 that just contribute to p_memsz. In this loop, OFF tracks next
5534 available file offset for PT_LOAD and PT_NOTE segments. */
5535 m = sorted_seg_map[j];
5536 p = phdrs + m->idx;
5537 p->p_type = m->p_type;
5538 p->p_flags = m->p_flags;
5539
5540 if (m->count == 0)
5541 p->p_vaddr = m->p_vaddr_offset;
5542 else
5543 p->p_vaddr = m->sections[0]->vma + m->p_vaddr_offset;
5544
5545 if (m->p_paddr_valid)
5546 p->p_paddr = m->p_paddr;
5547 else if (m->count == 0)
5548 p->p_paddr = 0;
5549 else
5550 p->p_paddr = m->sections[0]->lma + m->p_vaddr_offset;
5551
5552 if (p->p_type == PT_LOAD
5553 && (abfd->flags & D_PAGED) != 0)
5554 {
5555 /* p_align in demand paged PT_LOAD segments effectively stores
5556 the maximum page size. When copying an executable with
5557 objcopy, we set m->p_align from the input file. Use this
5558 value for maxpagesize rather than bed->maxpagesize, which
5559 may be different. Note that we use maxpagesize for PT_TLS
5560 segment alignment later in this function, so we are relying
5561 on at least one PT_LOAD segment appearing before a PT_TLS
5562 segment. */
5563 if (m->p_align_valid)
5564 maxpagesize = m->p_align;
5565
5566 p->p_align = maxpagesize;
5567 }
5568 else if (m->p_align_valid)
5569 p->p_align = m->p_align;
5570 else if (m->count == 0)
5571 p->p_align = 1 << bed->s->log_file_align;
5572
5573 if (m == phdr_load_seg)
5574 {
5575 if (!m->includes_filehdr)
5576 p->p_offset = off;
5577 off += actual * bed->s->sizeof_phdr;
5578 }
5579
5580 no_contents = FALSE;
5581 off_adjust = 0;
5582 if (p->p_type == PT_LOAD
5583 && m->count > 0)
5584 {
5585 bfd_size_type align;
5586 unsigned int align_power = 0;
5587
5588 if (m->p_align_valid)
5589 align = p->p_align;
5590 else
5591 {
5592 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5593 {
5594 unsigned int secalign;
5595
5596 secalign = bfd_section_alignment (*secpp);
5597 if (secalign > align_power)
5598 align_power = secalign;
5599 }
5600 align = (bfd_size_type) 1 << align_power;
5601 if (align < maxpagesize)
5602 align = maxpagesize;
5603 }
5604
5605 for (i = 0; i < m->count; i++)
5606 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5607 /* If we aren't making room for this section, then
5608 it must be SHT_NOBITS regardless of what we've
5609 set via struct bfd_elf_special_section. */
5610 elf_section_type (m->sections[i]) = SHT_NOBITS;
5611
5612 /* Find out whether this segment contains any loadable
5613 sections. */
5614 no_contents = TRUE;
5615 for (i = 0; i < m->count; i++)
5616 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5617 {
5618 no_contents = FALSE;
5619 break;
5620 }
5621
5622 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align);
5623
5624 /* Broken hardware and/or kernel require that files do not
5625 map the same page with different permissions on some hppa
5626 processors. */
5627 if (j != 0
5628 && (abfd->flags & D_PAGED) != 0
5629 && bed->no_page_alias
5630 && (off & (maxpagesize - 1)) != 0
5631 && (off & -maxpagesize) == ((off + off_adjust) & -maxpagesize))
5632 off_adjust += maxpagesize;
5633 off += off_adjust;
5634 if (no_contents)
5635 {
5636 /* We shouldn't need to align the segment on disk since
5637 the segment doesn't need file space, but the gABI
5638 arguably requires the alignment and glibc ld.so
5639 checks it. So to comply with the alignment
5640 requirement but not waste file space, we adjust
5641 p_offset for just this segment. (OFF_ADJUST is
5642 subtracted from OFF later.) This may put p_offset
5643 past the end of file, but that shouldn't matter. */
5644 }
5645 else
5646 off_adjust = 0;
5647 }
5648 /* Make sure the .dynamic section is the first section in the
5649 PT_DYNAMIC segment. */
5650 else if (p->p_type == PT_DYNAMIC
5651 && m->count > 1
5652 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5653 {
5654 _bfd_error_handler
5655 (_("%pB: The first section in the PT_DYNAMIC segment"
5656 " is not the .dynamic section"),
5657 abfd);
5658 bfd_set_error (bfd_error_bad_value);
5659 return FALSE;
5660 }
5661 /* Set the note section type to SHT_NOTE. */
5662 else if (p->p_type == PT_NOTE)
5663 for (i = 0; i < m->count; i++)
5664 elf_section_type (m->sections[i]) = SHT_NOTE;
5665
5666 if (m->includes_filehdr)
5667 {
5668 if (!m->p_flags_valid)
5669 p->p_flags |= PF_R;
5670 p->p_filesz = bed->s->sizeof_ehdr;
5671 p->p_memsz = bed->s->sizeof_ehdr;
5672 if (p->p_type == PT_LOAD)
5673 {
5674 if (m->count > 0)
5675 {
5676 if (p->p_vaddr < (bfd_vma) off
5677 || (!m->p_paddr_valid
5678 && p->p_paddr < (bfd_vma) off))
5679 {
5680 _bfd_error_handler
5681 (_("%pB: not enough room for program headers,"
5682 " try linking with -N"),
5683 abfd);
5684 bfd_set_error (bfd_error_bad_value);
5685 return FALSE;
5686 }
5687 p->p_vaddr -= off;
5688 if (!m->p_paddr_valid)
5689 p->p_paddr -= off;
5690 }
5691 }
5692 else if (sorted_seg_map[0]->includes_filehdr)
5693 {
5694 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5695 p->p_vaddr = filehdr->p_vaddr;
5696 if (!m->p_paddr_valid)
5697 p->p_paddr = filehdr->p_paddr;
5698 }
5699 }
5700
5701 if (m->includes_phdrs)
5702 {
5703 if (!m->p_flags_valid)
5704 p->p_flags |= PF_R;
5705 p->p_filesz += actual * bed->s->sizeof_phdr;
5706 p->p_memsz += actual * bed->s->sizeof_phdr;
5707 if (!m->includes_filehdr)
5708 {
5709 if (p->p_type == PT_LOAD)
5710 {
5711 elf_elfheader (abfd)->e_phoff = p->p_offset;
5712 if (m->count > 0)
5713 {
5714 p->p_vaddr -= off - p->p_offset;
5715 if (!m->p_paddr_valid)
5716 p->p_paddr -= off - p->p_offset;
5717 }
5718 }
5719 else if (phdr_load_seg != NULL)
5720 {
5721 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5722 bfd_vma phdr_off = 0;
5723 if (phdr_load_seg->includes_filehdr)
5724 phdr_off = bed->s->sizeof_ehdr;
5725 p->p_vaddr = phdr->p_vaddr + phdr_off;
5726 if (!m->p_paddr_valid)
5727 p->p_paddr = phdr->p_paddr + phdr_off;
5728 p->p_offset = phdr->p_offset + phdr_off;
5729 }
5730 else
5731 p->p_offset = bed->s->sizeof_ehdr;
5732 }
5733 }
5734
5735 if (p->p_type == PT_LOAD
5736 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5737 {
5738 if (!m->includes_filehdr && !m->includes_phdrs)
5739 {
5740 p->p_offset = off;
5741 if (no_contents)
5742 {
5743 /* Put meaningless p_offset for PT_LOAD segments
5744 without file contents somewhere within the first
5745 page, in an attempt to not point past EOF. */
5746 bfd_size_type align = maxpagesize;
5747 if (align < p->p_align)
5748 align = p->p_align;
5749 if (align < 1)
5750 align = 1;
5751 p->p_offset = off % align;
5752 }
5753 }
5754 else
5755 {
5756 file_ptr adjust;
5757
5758 adjust = off - (p->p_offset + p->p_filesz);
5759 if (!no_contents)
5760 p->p_filesz += adjust;
5761 p->p_memsz += adjust;
5762 }
5763 }
5764
5765 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5766 maps. Set filepos for sections in PT_LOAD segments, and in
5767 core files, for sections in PT_NOTE segments.
5768 assign_file_positions_for_non_load_sections will set filepos
5769 for other sections and update p_filesz for other segments. */
5770 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5771 {
5772 asection *sec;
5773 bfd_size_type align;
5774 Elf_Internal_Shdr *this_hdr;
5775
5776 sec = *secpp;
5777 this_hdr = &elf_section_data (sec)->this_hdr;
5778 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5779
5780 if ((p->p_type == PT_LOAD
5781 || p->p_type == PT_TLS)
5782 && (this_hdr->sh_type != SHT_NOBITS
5783 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5784 && ((this_hdr->sh_flags & SHF_TLS) == 0
5785 || p->p_type == PT_TLS))))
5786 {
5787 bfd_vma p_start = p->p_paddr;
5788 bfd_vma p_end = p_start + p->p_memsz;
5789 bfd_vma s_start = sec->lma;
5790 bfd_vma adjust = s_start - p_end;
5791
5792 if (adjust != 0
5793 && (s_start < p_end
5794 || p_end < p_start))
5795 {
5796 _bfd_error_handler
5797 /* xgettext:c-format */
5798 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5799 abfd, sec, (uint64_t) s_start, (uint64_t) p_end);
5800 adjust = 0;
5801 sec->lma = p_end;
5802 }
5803 p->p_memsz += adjust;
5804
5805 if (this_hdr->sh_type != SHT_NOBITS)
5806 {
5807 if (p->p_type == PT_LOAD)
5808 {
5809 if (p->p_filesz + adjust < p->p_memsz)
5810 {
5811 /* We have a PROGBITS section following NOBITS ones.
5812 Allocate file space for the NOBITS section(s) and
5813 zero it. */
5814 adjust = p->p_memsz - p->p_filesz;
5815 if (!write_zeros (abfd, off, adjust))
5816 return FALSE;
5817 }
5818 off += adjust;
5819 }
5820 p->p_filesz += adjust;
5821 }
5822 }
5823
5824 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5825 {
5826 /* The section at i == 0 is the one that actually contains
5827 everything. */
5828 if (i == 0)
5829 {
5830 this_hdr->sh_offset = sec->filepos = off;
5831 off += this_hdr->sh_size;
5832 p->p_filesz = this_hdr->sh_size;
5833 p->p_memsz = 0;
5834 p->p_align = 1;
5835 }
5836 else
5837 {
5838 /* The rest are fake sections that shouldn't be written. */
5839 sec->filepos = 0;
5840 sec->size = 0;
5841 sec->flags = 0;
5842 continue;
5843 }
5844 }
5845 else
5846 {
5847 if (p->p_type == PT_LOAD)
5848 {
5849 this_hdr->sh_offset = sec->filepos = off;
5850 if (this_hdr->sh_type != SHT_NOBITS)
5851 off += this_hdr->sh_size;
5852 }
5853 else if (this_hdr->sh_type == SHT_NOBITS
5854 && (this_hdr->sh_flags & SHF_TLS) != 0
5855 && this_hdr->sh_offset == 0)
5856 {
5857 /* This is a .tbss section that didn't get a PT_LOAD.
5858 (See _bfd_elf_map_sections_to_segments "Create a
5859 final PT_LOAD".) Set sh_offset to the value it
5860 would have if we had created a zero p_filesz and
5861 p_memsz PT_LOAD header for the section. This
5862 also makes the PT_TLS header have the same
5863 p_offset value. */
5864 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5865 off, align);
5866 this_hdr->sh_offset = sec->filepos = off + adjust;
5867 }
5868
5869 if (this_hdr->sh_type != SHT_NOBITS)
5870 {
5871 p->p_filesz += this_hdr->sh_size;
5872 /* A load section without SHF_ALLOC is something like
5873 a note section in a PT_NOTE segment. These take
5874 file space but are not loaded into memory. */
5875 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5876 p->p_memsz += this_hdr->sh_size;
5877 }
5878 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5879 {
5880 if (p->p_type == PT_TLS)
5881 p->p_memsz += this_hdr->sh_size;
5882
5883 /* .tbss is special. It doesn't contribute to p_memsz of
5884 normal segments. */
5885 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5886 p->p_memsz += this_hdr->sh_size;
5887 }
5888
5889 if (align > p->p_align
5890 && !m->p_align_valid
5891 && (p->p_type != PT_LOAD
5892 || (abfd->flags & D_PAGED) == 0))
5893 p->p_align = align;
5894 }
5895
5896 if (!m->p_flags_valid)
5897 {
5898 p->p_flags |= PF_R;
5899 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5900 p->p_flags |= PF_X;
5901 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5902 p->p_flags |= PF_W;
5903 }
5904 }
5905
5906 off -= off_adjust;
5907
5908 /* PR ld/20815 - Check that the program header segment, if
5909 present, will be loaded into memory. */
5910 if (p->p_type == PT_PHDR
5911 && phdr_load_seg == NULL
5912 && !(bed->elf_backend_allow_non_load_phdr != NULL
5913 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5914 {
5915 /* The fix for this error is usually to edit the linker script being
5916 used and set up the program headers manually. Either that or
5917 leave room for the headers at the start of the SECTIONS. */
5918 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5919 " by LOAD segment"),
5920 abfd);
5921 if (link_info == NULL)
5922 return FALSE;
5923 /* Arrange for the linker to exit with an error, deleting
5924 the output file unless --noinhibit-exec is given. */
5925 link_info->callbacks->info ("%X");
5926 }
5927
5928 /* Check that all sections are in a PT_LOAD segment.
5929 Don't check funky gdb generated core files. */
5930 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5931 {
5932 bfd_boolean check_vma = TRUE;
5933
5934 for (i = 1; i < m->count; i++)
5935 if (m->sections[i]->vma == m->sections[i - 1]->vma
5936 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5937 ->this_hdr), p) != 0
5938 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5939 ->this_hdr), p) != 0)
5940 {
5941 /* Looks like we have overlays packed into the segment. */
5942 check_vma = FALSE;
5943 break;
5944 }
5945
5946 for (i = 0; i < m->count; i++)
5947 {
5948 Elf_Internal_Shdr *this_hdr;
5949 asection *sec;
5950
5951 sec = m->sections[i];
5952 this_hdr = &(elf_section_data(sec)->this_hdr);
5953 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5954 && !ELF_TBSS_SPECIAL (this_hdr, p))
5955 {
5956 _bfd_error_handler
5957 /* xgettext:c-format */
5958 (_("%pB: section `%pA' can't be allocated in segment %d"),
5959 abfd, sec, j);
5960 print_segment_map (m);
5961 }
5962 }
5963 }
5964 }
5965
5966 elf_next_file_pos (abfd) = off;
5967
5968 if (link_info != NULL
5969 && phdr_load_seg != NULL
5970 && phdr_load_seg->includes_filehdr)
5971 {
5972 /* There is a segment that contains both the file headers and the
5973 program headers, so provide a symbol __ehdr_start pointing there.
5974 A program can use this to examine itself robustly. */
5975
5976 struct elf_link_hash_entry *hash
5977 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5978 FALSE, FALSE, TRUE);
5979 /* If the symbol was referenced and not defined, define it. */
5980 if (hash != NULL
5981 && (hash->root.type == bfd_link_hash_new
5982 || hash->root.type == bfd_link_hash_undefined
5983 || hash->root.type == bfd_link_hash_undefweak
5984 || hash->root.type == bfd_link_hash_common))
5985 {
5986 asection *s = NULL;
5987 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr;
5988
5989 if (phdr_load_seg->count != 0)
5990 /* The segment contains sections, so use the first one. */
5991 s = phdr_load_seg->sections[0];
5992 else
5993 /* Use the first (i.e. lowest-addressed) section in any segment. */
5994 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5995 if (m->p_type == PT_LOAD && m->count != 0)
5996 {
5997 s = m->sections[0];
5998 break;
5999 }
6000
6001 if (s != NULL)
6002 {
6003 hash->root.u.def.value = filehdr_vaddr - s->vma;
6004 hash->root.u.def.section = s;
6005 }
6006 else
6007 {
6008 hash->root.u.def.value = filehdr_vaddr;
6009 hash->root.u.def.section = bfd_abs_section_ptr;
6010 }
6011
6012 hash->root.type = bfd_link_hash_defined;
6013 hash->def_regular = 1;
6014 hash->non_elf = 0;
6015 }
6016 }
6017
6018 return TRUE;
6019 }
6020
6021 /* Determine if a bfd is a debuginfo file. Unfortunately there
6022 is no defined method for detecting such files, so we have to
6023 use heuristics instead. */
6024
6025 bfd_boolean
6026 is_debuginfo_file (bfd *abfd)
6027 {
6028 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6029 return FALSE;
6030
6031 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6032 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6033 Elf_Internal_Shdr **headerp;
6034
6035 for (headerp = start_headers; headerp < end_headers; headerp ++)
6036 {
6037 Elf_Internal_Shdr *header = * headerp;
6038
6039 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6040 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6041 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6042 && header->sh_type != SHT_NOBITS
6043 && header->sh_type != SHT_NOTE)
6044 return FALSE;
6045 }
6046
6047 return TRUE;
6048 }
6049
6050 /* Assign file positions for the other sections, except for compressed debugging
6051 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6052
6053 static bfd_boolean
6054 assign_file_positions_for_non_load_sections (bfd *abfd,
6055 struct bfd_link_info *link_info)
6056 {
6057 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6058 Elf_Internal_Shdr **i_shdrpp;
6059 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6060 Elf_Internal_Phdr *phdrs;
6061 Elf_Internal_Phdr *p;
6062 struct elf_segment_map *m;
6063 file_ptr off;
6064
6065 i_shdrpp = elf_elfsections (abfd);
6066 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6067 off = elf_next_file_pos (abfd);
6068 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6069 {
6070 Elf_Internal_Shdr *hdr;
6071
6072 hdr = *hdrpp;
6073 if (hdr->bfd_section != NULL
6074 && (hdr->bfd_section->filepos != 0
6075 || (hdr->sh_type == SHT_NOBITS
6076 && hdr->contents == NULL)))
6077 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6078 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6079 {
6080 if (hdr->sh_size != 0
6081 /* PR 24717 - debuginfo files are known to be not strictly
6082 compliant with the ELF standard. In particular they often
6083 have .note.gnu.property sections that are outside of any
6084 loadable segment. This is not a problem for such files,
6085 so do not warn about them. */
6086 && ! is_debuginfo_file (abfd))
6087 _bfd_error_handler
6088 /* xgettext:c-format */
6089 (_("%pB: warning: allocated section `%s' not in segment"),
6090 abfd,
6091 (hdr->bfd_section == NULL
6092 ? "*unknown*"
6093 : hdr->bfd_section->name));
6094 /* We don't need to page align empty sections. */
6095 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6096 off += vma_page_aligned_bias (hdr->sh_addr, off,
6097 bed->maxpagesize);
6098 else
6099 off += vma_page_aligned_bias (hdr->sh_addr, off,
6100 hdr->sh_addralign);
6101 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6102 FALSE);
6103 }
6104 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6105 && hdr->bfd_section == NULL)
6106 /* We don't know the offset of these sections yet: their size has
6107 not been decided. */
6108 || (hdr->bfd_section != NULL
6109 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6110 || (bfd_section_is_ctf (hdr->bfd_section)
6111 && abfd->is_linker_output)))
6112 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6113 || (elf_symtab_shndx_list (abfd) != NULL
6114 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6115 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6116 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6117 hdr->sh_offset = -1;
6118 else
6119 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6120 }
6121 elf_next_file_pos (abfd) = off;
6122
6123 /* Now that we have set the section file positions, we can set up
6124 the file positions for the non PT_LOAD segments. */
6125 phdrs = elf_tdata (abfd)->phdr;
6126 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6127 {
6128 if (p->p_type == PT_GNU_RELRO)
6129 {
6130 bfd_vma start, end;
6131 bfd_boolean ok;
6132
6133 if (link_info != NULL)
6134 {
6135 /* During linking the range of the RELRO segment is passed
6136 in link_info. Note that there may be padding between
6137 relro_start and the first RELRO section. */
6138 start = link_info->relro_start;
6139 end = link_info->relro_end;
6140 }
6141 else if (m->count != 0)
6142 {
6143 if (!m->p_size_valid)
6144 abort ();
6145 start = m->sections[0]->vma;
6146 end = start + m->p_size;
6147 }
6148 else
6149 {
6150 start = 0;
6151 end = 0;
6152 }
6153
6154 ok = FALSE;
6155 if (start < end)
6156 {
6157 struct elf_segment_map *lm;
6158 const Elf_Internal_Phdr *lp;
6159 unsigned int i;
6160
6161 /* Find a LOAD segment containing a section in the RELRO
6162 segment. */
6163 for (lm = elf_seg_map (abfd), lp = phdrs;
6164 lm != NULL;
6165 lm = lm->next, lp++)
6166 {
6167 if (lp->p_type == PT_LOAD
6168 && lm->count != 0
6169 && (lm->sections[lm->count - 1]->vma
6170 + (!IS_TBSS (lm->sections[lm->count - 1])
6171 ? lm->sections[lm->count - 1]->size
6172 : 0)) > start
6173 && lm->sections[0]->vma < end)
6174 break;
6175 }
6176
6177 if (lm != NULL)
6178 {
6179 /* Find the section starting the RELRO segment. */
6180 for (i = 0; i < lm->count; i++)
6181 {
6182 asection *s = lm->sections[i];
6183 if (s->vma >= start
6184 && s->vma < end
6185 && s->size != 0)
6186 break;
6187 }
6188
6189 if (i < lm->count)
6190 {
6191 p->p_vaddr = lm->sections[i]->vma;
6192 p->p_paddr = lm->sections[i]->lma;
6193 p->p_offset = lm->sections[i]->filepos;
6194 p->p_memsz = end - p->p_vaddr;
6195 p->p_filesz = p->p_memsz;
6196
6197 /* The RELRO segment typically ends a few bytes
6198 into .got.plt but other layouts are possible.
6199 In cases where the end does not match any
6200 loaded section (for instance is in file
6201 padding), trim p_filesz back to correspond to
6202 the end of loaded section contents. */
6203 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6204 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6205
6206 /* Preserve the alignment and flags if they are
6207 valid. The gold linker generates RW/4 for
6208 the PT_GNU_RELRO section. It is better for
6209 objcopy/strip to honor these attributes
6210 otherwise gdb will choke when using separate
6211 debug files. */
6212 if (!m->p_align_valid)
6213 p->p_align = 1;
6214 if (!m->p_flags_valid)
6215 p->p_flags = PF_R;
6216 ok = TRUE;
6217 }
6218 }
6219 }
6220 if (link_info != NULL)
6221 BFD_ASSERT (ok);
6222 if (!ok)
6223 memset (p, 0, sizeof *p);
6224 }
6225 else if (p->p_type == PT_GNU_STACK)
6226 {
6227 if (m->p_size_valid)
6228 p->p_memsz = m->p_size;
6229 }
6230 else if (m->count != 0)
6231 {
6232 unsigned int i;
6233
6234 if (p->p_type != PT_LOAD
6235 && (p->p_type != PT_NOTE
6236 || bfd_get_format (abfd) != bfd_core))
6237 {
6238 /* A user specified segment layout may include a PHDR
6239 segment that overlaps with a LOAD segment... */
6240 if (p->p_type == PT_PHDR)
6241 {
6242 m->count = 0;
6243 continue;
6244 }
6245
6246 if (m->includes_filehdr || m->includes_phdrs)
6247 {
6248 /* PR 17512: file: 2195325e. */
6249 _bfd_error_handler
6250 (_("%pB: error: non-load segment %d includes file header "
6251 "and/or program header"),
6252 abfd, (int) (p - phdrs));
6253 return FALSE;
6254 }
6255
6256 p->p_filesz = 0;
6257 p->p_offset = m->sections[0]->filepos;
6258 for (i = m->count; i-- != 0;)
6259 {
6260 asection *sect = m->sections[i];
6261 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6262 if (hdr->sh_type != SHT_NOBITS)
6263 {
6264 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6265 + hdr->sh_size);
6266 break;
6267 }
6268 }
6269 }
6270 }
6271 }
6272
6273 return TRUE;
6274 }
6275
6276 static elf_section_list *
6277 find_section_in_list (unsigned int i, elf_section_list * list)
6278 {
6279 for (;list != NULL; list = list->next)
6280 if (list->ndx == i)
6281 break;
6282 return list;
6283 }
6284
6285 /* Work out the file positions of all the sections. This is called by
6286 _bfd_elf_compute_section_file_positions. All the section sizes and
6287 VMAs must be known before this is called.
6288
6289 Reloc sections come in two flavours: Those processed specially as
6290 "side-channel" data attached to a section to which they apply, and those that
6291 bfd doesn't process as relocations. The latter sort are stored in a normal
6292 bfd section by bfd_section_from_shdr. We don't consider the former sort
6293 here, unless they form part of the loadable image. Reloc sections not
6294 assigned here (and compressed debugging sections and CTF sections which
6295 nothing else in the file can rely upon) will be handled later by
6296 assign_file_positions_for_relocs.
6297
6298 We also don't set the positions of the .symtab and .strtab here. */
6299
6300 static bfd_boolean
6301 assign_file_positions_except_relocs (bfd *abfd,
6302 struct bfd_link_info *link_info)
6303 {
6304 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6305 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6306 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6307 unsigned int alloc;
6308
6309 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6310 && bfd_get_format (abfd) != bfd_core)
6311 {
6312 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6313 unsigned int num_sec = elf_numsections (abfd);
6314 Elf_Internal_Shdr **hdrpp;
6315 unsigned int i;
6316 file_ptr off;
6317
6318 /* Start after the ELF header. */
6319 off = i_ehdrp->e_ehsize;
6320
6321 /* We are not creating an executable, which means that we are
6322 not creating a program header, and that the actual order of
6323 the sections in the file is unimportant. */
6324 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6325 {
6326 Elf_Internal_Shdr *hdr;
6327
6328 hdr = *hdrpp;
6329 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6330 && hdr->bfd_section == NULL)
6331 /* Do not assign offsets for these sections yet: we don't know
6332 their sizes. */
6333 || (hdr->bfd_section != NULL
6334 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6335 || (bfd_section_is_ctf (hdr->bfd_section)
6336 && abfd->is_linker_output)))
6337 || i == elf_onesymtab (abfd)
6338 || (elf_symtab_shndx_list (abfd) != NULL
6339 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6340 || i == elf_strtab_sec (abfd)
6341 || i == elf_shstrtab_sec (abfd))
6342 {
6343 hdr->sh_offset = -1;
6344 }
6345 else
6346 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6347 }
6348
6349 elf_next_file_pos (abfd) = off;
6350 elf_program_header_size (abfd) = 0;
6351 }
6352 else
6353 {
6354 /* Assign file positions for the loaded sections based on the
6355 assignment of sections to segments. */
6356 if (!assign_file_positions_for_load_sections (abfd, link_info))
6357 return FALSE;
6358
6359 /* And for non-load sections. */
6360 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6361 return FALSE;
6362 }
6363
6364 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6365 return FALSE;
6366
6367 /* Write out the program headers. */
6368 alloc = i_ehdrp->e_phnum;
6369 if (alloc != 0)
6370 {
6371 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6372 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6373 return FALSE;
6374 }
6375
6376 return TRUE;
6377 }
6378
6379 bfd_boolean
6380 _bfd_elf_init_file_header (bfd *abfd,
6381 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6382 {
6383 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6384 struct elf_strtab_hash *shstrtab;
6385 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6386
6387 i_ehdrp = elf_elfheader (abfd);
6388
6389 shstrtab = _bfd_elf_strtab_init ();
6390 if (shstrtab == NULL)
6391 return FALSE;
6392
6393 elf_shstrtab (abfd) = shstrtab;
6394
6395 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6396 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6397 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6398 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6399
6400 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6401 i_ehdrp->e_ident[EI_DATA] =
6402 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6403 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6404
6405 if ((abfd->flags & DYNAMIC) != 0)
6406 i_ehdrp->e_type = ET_DYN;
6407 else if ((abfd->flags & EXEC_P) != 0)
6408 i_ehdrp->e_type = ET_EXEC;
6409 else if (bfd_get_format (abfd) == bfd_core)
6410 i_ehdrp->e_type = ET_CORE;
6411 else
6412 i_ehdrp->e_type = ET_REL;
6413
6414 switch (bfd_get_arch (abfd))
6415 {
6416 case bfd_arch_unknown:
6417 i_ehdrp->e_machine = EM_NONE;
6418 break;
6419
6420 /* There used to be a long list of cases here, each one setting
6421 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6422 in the corresponding bfd definition. To avoid duplication,
6423 the switch was removed. Machines that need special handling
6424 can generally do it in elf_backend_final_write_processing(),
6425 unless they need the information earlier than the final write.
6426 Such need can generally be supplied by replacing the tests for
6427 e_machine with the conditions used to determine it. */
6428 default:
6429 i_ehdrp->e_machine = bed->elf_machine_code;
6430 }
6431
6432 i_ehdrp->e_version = bed->s->ev_current;
6433 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6434
6435 /* No program header, for now. */
6436 i_ehdrp->e_phoff = 0;
6437 i_ehdrp->e_phentsize = 0;
6438 i_ehdrp->e_phnum = 0;
6439
6440 /* Each bfd section is section header entry. */
6441 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6442 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6443
6444 elf_tdata (abfd)->symtab_hdr.sh_name =
6445 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6446 elf_tdata (abfd)->strtab_hdr.sh_name =
6447 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6448 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6449 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6450 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6451 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6452 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6453 return FALSE;
6454
6455 return TRUE;
6456 }
6457
6458 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6459
6460 FIXME: We used to have code here to sort the PT_LOAD segments into
6461 ascending order, as per the ELF spec. But this breaks some programs,
6462 including the Linux kernel. But really either the spec should be
6463 changed or the programs updated. */
6464
6465 bfd_boolean
6466 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6467 {
6468 if (link_info != NULL && bfd_link_pie (link_info))
6469 {
6470 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6471 unsigned int num_segments = i_ehdrp->e_phnum;
6472 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6473 Elf_Internal_Phdr *segment = tdata->phdr;
6474 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6475
6476 /* Find the lowest p_vaddr in PT_LOAD segments. */
6477 bfd_vma p_vaddr = (bfd_vma) -1;
6478 for (; segment < end_segment; segment++)
6479 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6480 p_vaddr = segment->p_vaddr;
6481
6482 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6483 segments is non-zero. */
6484 if (p_vaddr)
6485 i_ehdrp->e_type = ET_EXEC;
6486 }
6487 return TRUE;
6488 }
6489
6490 /* Assign file positions for all the reloc sections which are not part
6491 of the loadable file image, and the file position of section headers. */
6492
6493 static bfd_boolean
6494 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6495 {
6496 file_ptr off;
6497 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6498 Elf_Internal_Shdr *shdrp;
6499 Elf_Internal_Ehdr *i_ehdrp;
6500 const struct elf_backend_data *bed;
6501
6502 off = elf_next_file_pos (abfd);
6503
6504 shdrpp = elf_elfsections (abfd);
6505 end_shdrpp = shdrpp + elf_numsections (abfd);
6506 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6507 {
6508 shdrp = *shdrpp;
6509 if (shdrp->sh_offset == -1)
6510 {
6511 asection *sec = shdrp->bfd_section;
6512 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6513 || shdrp->sh_type == SHT_RELA);
6514 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6515 if (is_rel
6516 || is_ctf
6517 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6518 {
6519 if (!is_rel && !is_ctf)
6520 {
6521 const char *name = sec->name;
6522 struct bfd_elf_section_data *d;
6523
6524 /* Compress DWARF debug sections. */
6525 if (!bfd_compress_section (abfd, sec,
6526 shdrp->contents))
6527 return FALSE;
6528
6529 if (sec->compress_status == COMPRESS_SECTION_DONE
6530 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6531 {
6532 /* If section is compressed with zlib-gnu, convert
6533 section name from .debug_* to .zdebug_*. */
6534 char *new_name
6535 = convert_debug_to_zdebug (abfd, name);
6536 if (new_name == NULL)
6537 return FALSE;
6538 name = new_name;
6539 }
6540 /* Add section name to section name section. */
6541 if (shdrp->sh_name != (unsigned int) -1)
6542 abort ();
6543 shdrp->sh_name
6544 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6545 name, FALSE);
6546 d = elf_section_data (sec);
6547
6548 /* Add reloc section name to section name section. */
6549 if (d->rel.hdr
6550 && !_bfd_elf_set_reloc_sh_name (abfd,
6551 d->rel.hdr,
6552 name, FALSE))
6553 return FALSE;
6554 if (d->rela.hdr
6555 && !_bfd_elf_set_reloc_sh_name (abfd,
6556 d->rela.hdr,
6557 name, TRUE))
6558 return FALSE;
6559
6560 /* Update section size and contents. */
6561 shdrp->sh_size = sec->size;
6562 shdrp->contents = sec->contents;
6563 shdrp->bfd_section->contents = NULL;
6564 }
6565 else if (is_ctf)
6566 {
6567 /* Update section size and contents. */
6568 shdrp->sh_size = sec->size;
6569 shdrp->contents = sec->contents;
6570 }
6571
6572 off = _bfd_elf_assign_file_position_for_section (shdrp,
6573 off,
6574 TRUE);
6575 }
6576 }
6577 }
6578
6579 /* Place section name section after DWARF debug sections have been
6580 compressed. */
6581 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6582 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6583 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6584 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6585
6586 /* Place the section headers. */
6587 i_ehdrp = elf_elfheader (abfd);
6588 bed = get_elf_backend_data (abfd);
6589 off = align_file_position (off, 1 << bed->s->log_file_align);
6590 i_ehdrp->e_shoff = off;
6591 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6592 elf_next_file_pos (abfd) = off;
6593
6594 return TRUE;
6595 }
6596
6597 bfd_boolean
6598 _bfd_elf_write_object_contents (bfd *abfd)
6599 {
6600 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6601 Elf_Internal_Shdr **i_shdrp;
6602 bfd_boolean failed;
6603 unsigned int count, num_sec;
6604 struct elf_obj_tdata *t;
6605
6606 if (! abfd->output_has_begun
6607 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6608 return FALSE;
6609 /* Do not rewrite ELF data when the BFD has been opened for update.
6610 abfd->output_has_begun was set to TRUE on opening, so creation of new
6611 sections, and modification of existing section sizes was restricted.
6612 This means the ELF header, program headers and section headers can't have
6613 changed.
6614 If the contents of any sections has been modified, then those changes have
6615 already been written to the BFD. */
6616 else if (abfd->direction == both_direction)
6617 {
6618 BFD_ASSERT (abfd->output_has_begun);
6619 return TRUE;
6620 }
6621
6622 i_shdrp = elf_elfsections (abfd);
6623
6624 failed = FALSE;
6625 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6626 if (failed)
6627 return FALSE;
6628
6629 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6630 return FALSE;
6631
6632 /* After writing the headers, we need to write the sections too... */
6633 num_sec = elf_numsections (abfd);
6634 for (count = 1; count < num_sec; count++)
6635 {
6636 i_shdrp[count]->sh_name
6637 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6638 i_shdrp[count]->sh_name);
6639 if (bed->elf_backend_section_processing)
6640 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6641 return FALSE;
6642 if (i_shdrp[count]->contents)
6643 {
6644 bfd_size_type amt = i_shdrp[count]->sh_size;
6645
6646 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6647 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6648 return FALSE;
6649 }
6650 }
6651
6652 /* Write out the section header names. */
6653 t = elf_tdata (abfd);
6654 if (elf_shstrtab (abfd) != NULL
6655 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6656 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6657 return FALSE;
6658
6659 if (!(*bed->elf_backend_final_write_processing) (abfd))
6660 return FALSE;
6661
6662 if (!bed->s->write_shdrs_and_ehdr (abfd))
6663 return FALSE;
6664
6665 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6666 if (t->o->build_id.after_write_object_contents != NULL)
6667 return (*t->o->build_id.after_write_object_contents) (abfd);
6668
6669 return TRUE;
6670 }
6671
6672 bfd_boolean
6673 _bfd_elf_write_corefile_contents (bfd *abfd)
6674 {
6675 /* Hopefully this can be done just like an object file. */
6676 return _bfd_elf_write_object_contents (abfd);
6677 }
6678
6679 /* Given a section, search the header to find them. */
6680
6681 unsigned int
6682 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6683 {
6684 const struct elf_backend_data *bed;
6685 unsigned int sec_index;
6686
6687 if (elf_section_data (asect) != NULL
6688 && elf_section_data (asect)->this_idx != 0)
6689 return elf_section_data (asect)->this_idx;
6690
6691 if (bfd_is_abs_section (asect))
6692 sec_index = SHN_ABS;
6693 else if (bfd_is_com_section (asect))
6694 sec_index = SHN_COMMON;
6695 else if (bfd_is_und_section (asect))
6696 sec_index = SHN_UNDEF;
6697 else
6698 sec_index = SHN_BAD;
6699
6700 bed = get_elf_backend_data (abfd);
6701 if (bed->elf_backend_section_from_bfd_section)
6702 {
6703 int retval = sec_index;
6704
6705 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6706 return retval;
6707 }
6708
6709 if (sec_index == SHN_BAD)
6710 bfd_set_error (bfd_error_nonrepresentable_section);
6711
6712 return sec_index;
6713 }
6714
6715 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6716 on error. */
6717
6718 int
6719 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6720 {
6721 asymbol *asym_ptr = *asym_ptr_ptr;
6722 int idx;
6723 flagword flags = asym_ptr->flags;
6724
6725 /* When gas creates relocations against local labels, it creates its
6726 own symbol for the section, but does put the symbol into the
6727 symbol chain, so udata is 0. When the linker is generating
6728 relocatable output, this section symbol may be for one of the
6729 input sections rather than the output section. */
6730 if (asym_ptr->udata.i == 0
6731 && (flags & BSF_SECTION_SYM)
6732 && asym_ptr->section)
6733 {
6734 asection *sec;
6735 int indx;
6736
6737 sec = asym_ptr->section;
6738 if (sec->owner != abfd && sec->output_section != NULL)
6739 sec = sec->output_section;
6740 if (sec->owner == abfd
6741 && (indx = sec->index) < elf_num_section_syms (abfd)
6742 && elf_section_syms (abfd)[indx] != NULL)
6743 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6744 }
6745
6746 idx = asym_ptr->udata.i;
6747
6748 if (idx == 0)
6749 {
6750 /* This case can occur when using --strip-symbol on a symbol
6751 which is used in a relocation entry. */
6752 _bfd_error_handler
6753 /* xgettext:c-format */
6754 (_("%pB: symbol `%s' required but not present"),
6755 abfd, bfd_asymbol_name (asym_ptr));
6756 bfd_set_error (bfd_error_no_symbols);
6757 return -1;
6758 }
6759
6760 #if DEBUG & 4
6761 {
6762 fprintf (stderr,
6763 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6764 (long) asym_ptr, asym_ptr->name, idx, flags);
6765 fflush (stderr);
6766 }
6767 #endif
6768
6769 return idx;
6770 }
6771
6772 /* Rewrite program header information. */
6773
6774 static bfd_boolean
6775 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6776 {
6777 Elf_Internal_Ehdr *iehdr;
6778 struct elf_segment_map *map;
6779 struct elf_segment_map *map_first;
6780 struct elf_segment_map **pointer_to_map;
6781 Elf_Internal_Phdr *segment;
6782 asection *section;
6783 unsigned int i;
6784 unsigned int num_segments;
6785 bfd_boolean phdr_included = FALSE;
6786 bfd_boolean p_paddr_valid;
6787 bfd_vma maxpagesize;
6788 struct elf_segment_map *phdr_adjust_seg = NULL;
6789 unsigned int phdr_adjust_num = 0;
6790 const struct elf_backend_data *bed;
6791
6792 bed = get_elf_backend_data (ibfd);
6793 iehdr = elf_elfheader (ibfd);
6794
6795 map_first = NULL;
6796 pointer_to_map = &map_first;
6797
6798 num_segments = elf_elfheader (ibfd)->e_phnum;
6799 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6800
6801 /* Returns the end address of the segment + 1. */
6802 #define SEGMENT_END(segment, start) \
6803 (start + (segment->p_memsz > segment->p_filesz \
6804 ? segment->p_memsz : segment->p_filesz))
6805
6806 #define SECTION_SIZE(section, segment) \
6807 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6808 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6809 ? section->size : 0)
6810
6811 /* Returns TRUE if the given section is contained within
6812 the given segment. VMA addresses are compared. */
6813 #define IS_CONTAINED_BY_VMA(section, segment) \
6814 (section->vma >= segment->p_vaddr \
6815 && (section->vma + SECTION_SIZE (section, segment) \
6816 <= (SEGMENT_END (segment, segment->p_vaddr))))
6817
6818 /* Returns TRUE if the given section is contained within
6819 the given segment. LMA addresses are compared. */
6820 #define IS_CONTAINED_BY_LMA(section, segment, base) \
6821 (section->lma >= base \
6822 && (section->lma + SECTION_SIZE (section, segment) >= section->lma) \
6823 && (section->lma + SECTION_SIZE (section, segment) \
6824 <= SEGMENT_END (segment, base)))
6825
6826 /* Handle PT_NOTE segment. */
6827 #define IS_NOTE(p, s) \
6828 (p->p_type == PT_NOTE \
6829 && elf_section_type (s) == SHT_NOTE \
6830 && (bfd_vma) s->filepos >= p->p_offset \
6831 && ((bfd_vma) s->filepos + s->size \
6832 <= p->p_offset + p->p_filesz))
6833
6834 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6835 etc. */
6836 #define IS_COREFILE_NOTE(p, s) \
6837 (IS_NOTE (p, s) \
6838 && bfd_get_format (ibfd) == bfd_core \
6839 && s->vma == 0 \
6840 && s->lma == 0)
6841
6842 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6843 linker, which generates a PT_INTERP section with p_vaddr and
6844 p_memsz set to 0. */
6845 #define IS_SOLARIS_PT_INTERP(p, s) \
6846 (p->p_vaddr == 0 \
6847 && p->p_paddr == 0 \
6848 && p->p_memsz == 0 \
6849 && p->p_filesz > 0 \
6850 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6851 && s->size > 0 \
6852 && (bfd_vma) s->filepos >= p->p_offset \
6853 && ((bfd_vma) s->filepos + s->size \
6854 <= p->p_offset + p->p_filesz))
6855
6856 /* Decide if the given section should be included in the given segment.
6857 A section will be included if:
6858 1. It is within the address space of the segment -- we use the LMA
6859 if that is set for the segment and the VMA otherwise,
6860 2. It is an allocated section or a NOTE section in a PT_NOTE
6861 segment.
6862 3. There is an output section associated with it,
6863 4. The section has not already been allocated to a previous segment.
6864 5. PT_GNU_STACK segments do not include any sections.
6865 6. PT_TLS segment includes only SHF_TLS sections.
6866 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6867 8. PT_DYNAMIC should not contain empty sections at the beginning
6868 (with the possible exception of .dynamic). */
6869 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed) \
6870 ((((segment->p_paddr \
6871 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr) \
6872 : IS_CONTAINED_BY_VMA (section, segment)) \
6873 && (section->flags & SEC_ALLOC) != 0) \
6874 || IS_NOTE (segment, section)) \
6875 && segment->p_type != PT_GNU_STACK \
6876 && (segment->p_type != PT_TLS \
6877 || (section->flags & SEC_THREAD_LOCAL)) \
6878 && (segment->p_type == PT_LOAD \
6879 || segment->p_type == PT_TLS \
6880 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6881 && (segment->p_type != PT_DYNAMIC \
6882 || SECTION_SIZE (section, segment) > 0 \
6883 || (segment->p_paddr \
6884 ? segment->p_paddr != section->lma \
6885 : segment->p_vaddr != section->vma) \
6886 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6887 && (segment->p_type != PT_LOAD || !section->segment_mark))
6888
6889 /* If the output section of a section in the input segment is NULL,
6890 it is removed from the corresponding output segment. */
6891 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed) \
6892 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed) \
6893 && section->output_section != NULL)
6894
6895 /* Returns TRUE iff seg1 starts after the end of seg2. */
6896 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6897 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6898
6899 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6900 their VMA address ranges and their LMA address ranges overlap.
6901 It is possible to have overlapping VMA ranges without overlapping LMA
6902 ranges. RedBoot images for example can have both .data and .bss mapped
6903 to the same VMA range, but with the .data section mapped to a different
6904 LMA. */
6905 #define SEGMENT_OVERLAPS(seg1, seg2) \
6906 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6907 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6908 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6909 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6910
6911 /* Initialise the segment mark field. */
6912 for (section = ibfd->sections; section != NULL; section = section->next)
6913 section->segment_mark = FALSE;
6914
6915 /* The Solaris linker creates program headers in which all the
6916 p_paddr fields are zero. When we try to objcopy or strip such a
6917 file, we get confused. Check for this case, and if we find it
6918 don't set the p_paddr_valid fields. */
6919 p_paddr_valid = FALSE;
6920 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6921 i < num_segments;
6922 i++, segment++)
6923 if (segment->p_paddr != 0)
6924 {
6925 p_paddr_valid = TRUE;
6926 break;
6927 }
6928
6929 /* Scan through the segments specified in the program header
6930 of the input BFD. For this first scan we look for overlaps
6931 in the loadable segments. These can be created by weird
6932 parameters to objcopy. Also, fix some solaris weirdness. */
6933 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6934 i < num_segments;
6935 i++, segment++)
6936 {
6937 unsigned int j;
6938 Elf_Internal_Phdr *segment2;
6939
6940 if (segment->p_type == PT_INTERP)
6941 for (section = ibfd->sections; section; section = section->next)
6942 if (IS_SOLARIS_PT_INTERP (segment, section))
6943 {
6944 /* Mininal change so that the normal section to segment
6945 assignment code will work. */
6946 segment->p_vaddr = section->vma;
6947 break;
6948 }
6949
6950 if (segment->p_type != PT_LOAD)
6951 {
6952 /* Remove PT_GNU_RELRO segment. */
6953 if (segment->p_type == PT_GNU_RELRO)
6954 segment->p_type = PT_NULL;
6955 continue;
6956 }
6957
6958 /* Determine if this segment overlaps any previous segments. */
6959 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
6960 {
6961 bfd_signed_vma extra_length;
6962
6963 if (segment2->p_type != PT_LOAD
6964 || !SEGMENT_OVERLAPS (segment, segment2))
6965 continue;
6966
6967 /* Merge the two segments together. */
6968 if (segment2->p_vaddr < segment->p_vaddr)
6969 {
6970 /* Extend SEGMENT2 to include SEGMENT and then delete
6971 SEGMENT. */
6972 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6973 - SEGMENT_END (segment2, segment2->p_vaddr));
6974
6975 if (extra_length > 0)
6976 {
6977 segment2->p_memsz += extra_length;
6978 segment2->p_filesz += extra_length;
6979 }
6980
6981 segment->p_type = PT_NULL;
6982
6983 /* Since we have deleted P we must restart the outer loop. */
6984 i = 0;
6985 segment = elf_tdata (ibfd)->phdr;
6986 break;
6987 }
6988 else
6989 {
6990 /* Extend SEGMENT to include SEGMENT2 and then delete
6991 SEGMENT2. */
6992 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6993 - SEGMENT_END (segment, segment->p_vaddr));
6994
6995 if (extra_length > 0)
6996 {
6997 segment->p_memsz += extra_length;
6998 segment->p_filesz += extra_length;
6999 }
7000
7001 segment2->p_type = PT_NULL;
7002 }
7003 }
7004 }
7005
7006 /* The second scan attempts to assign sections to segments. */
7007 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7008 i < num_segments;
7009 i++, segment++)
7010 {
7011 unsigned int section_count;
7012 asection **sections;
7013 asection *output_section;
7014 unsigned int isec;
7015 asection *matching_lma;
7016 asection *suggested_lma;
7017 unsigned int j;
7018 size_t amt;
7019 asection *first_section;
7020
7021 if (segment->p_type == PT_NULL)
7022 continue;
7023
7024 first_section = NULL;
7025 /* Compute how many sections might be placed into this segment. */
7026 for (section = ibfd->sections, section_count = 0;
7027 section != NULL;
7028 section = section->next)
7029 {
7030 /* Find the first section in the input segment, which may be
7031 removed from the corresponding output segment. */
7032 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed))
7033 {
7034 if (first_section == NULL)
7035 first_section = section;
7036 if (section->output_section != NULL)
7037 ++section_count;
7038 }
7039 }
7040
7041 /* Allocate a segment map big enough to contain
7042 all of the sections we have selected. */
7043 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7044 amt += section_count * sizeof (asection *);
7045 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7046 if (map == NULL)
7047 return FALSE;
7048
7049 /* Initialise the fields of the segment map. Default to
7050 using the physical address of the segment in the input BFD. */
7051 map->next = NULL;
7052 map->p_type = segment->p_type;
7053 map->p_flags = segment->p_flags;
7054 map->p_flags_valid = 1;
7055
7056 /* If the first section in the input segment is removed, there is
7057 no need to preserve segment physical address in the corresponding
7058 output segment. */
7059 if (!first_section || first_section->output_section != NULL)
7060 {
7061 map->p_paddr = segment->p_paddr;
7062 map->p_paddr_valid = p_paddr_valid;
7063 }
7064
7065 /* Determine if this segment contains the ELF file header
7066 and if it contains the program headers themselves. */
7067 map->includes_filehdr = (segment->p_offset == 0
7068 && segment->p_filesz >= iehdr->e_ehsize);
7069 map->includes_phdrs = 0;
7070
7071 if (!phdr_included || segment->p_type != PT_LOAD)
7072 {
7073 map->includes_phdrs =
7074 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7075 && (segment->p_offset + segment->p_filesz
7076 >= ((bfd_vma) iehdr->e_phoff
7077 + iehdr->e_phnum * iehdr->e_phentsize)));
7078
7079 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7080 phdr_included = TRUE;
7081 }
7082
7083 if (section_count == 0)
7084 {
7085 /* Special segments, such as the PT_PHDR segment, may contain
7086 no sections, but ordinary, loadable segments should contain
7087 something. They are allowed by the ELF spec however, so only
7088 a warning is produced.
7089 There is however the valid use case of embedded systems which
7090 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7091 flash memory with zeros. No warning is shown for that case. */
7092 if (segment->p_type == PT_LOAD
7093 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7094 /* xgettext:c-format */
7095 _bfd_error_handler
7096 (_("%pB: warning: empty loadable segment detected"
7097 " at vaddr=%#" PRIx64 ", is this intentional?"),
7098 ibfd, (uint64_t) segment->p_vaddr);
7099
7100 map->p_vaddr_offset = segment->p_vaddr;
7101 map->count = 0;
7102 *pointer_to_map = map;
7103 pointer_to_map = &map->next;
7104
7105 continue;
7106 }
7107
7108 /* Now scan the sections in the input BFD again and attempt
7109 to add their corresponding output sections to the segment map.
7110 The problem here is how to handle an output section which has
7111 been moved (ie had its LMA changed). There are four possibilities:
7112
7113 1. None of the sections have been moved.
7114 In this case we can continue to use the segment LMA from the
7115 input BFD.
7116
7117 2. All of the sections have been moved by the same amount.
7118 In this case we can change the segment's LMA to match the LMA
7119 of the first section.
7120
7121 3. Some of the sections have been moved, others have not.
7122 In this case those sections which have not been moved can be
7123 placed in the current segment which will have to have its size,
7124 and possibly its LMA changed, and a new segment or segments will
7125 have to be created to contain the other sections.
7126
7127 4. The sections have been moved, but not by the same amount.
7128 In this case we can change the segment's LMA to match the LMA
7129 of the first section and we will have to create a new segment
7130 or segments to contain the other sections.
7131
7132 In order to save time, we allocate an array to hold the section
7133 pointers that we are interested in. As these sections get assigned
7134 to a segment, they are removed from this array. */
7135
7136 amt = section_count * sizeof (asection *);
7137 sections = (asection **) bfd_malloc (amt);
7138 if (sections == NULL)
7139 return FALSE;
7140
7141 /* Step One: Scan for segment vs section LMA conflicts.
7142 Also add the sections to the section array allocated above.
7143 Also add the sections to the current segment. In the common
7144 case, where the sections have not been moved, this means that
7145 we have completely filled the segment, and there is nothing
7146 more to do. */
7147 isec = 0;
7148 matching_lma = NULL;
7149 suggested_lma = NULL;
7150
7151 for (section = first_section, j = 0;
7152 section != NULL;
7153 section = section->next)
7154 {
7155 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed))
7156 {
7157 output_section = section->output_section;
7158
7159 sections[j++] = section;
7160
7161 /* The Solaris native linker always sets p_paddr to 0.
7162 We try to catch that case here, and set it to the
7163 correct value. Note - some backends require that
7164 p_paddr be left as zero. */
7165 if (!p_paddr_valid
7166 && segment->p_vaddr != 0
7167 && !bed->want_p_paddr_set_to_zero
7168 && isec == 0
7169 && output_section->lma != 0
7170 && (align_power (segment->p_vaddr
7171 + (map->includes_filehdr
7172 ? iehdr->e_ehsize : 0)
7173 + (map->includes_phdrs
7174 ? iehdr->e_phnum * iehdr->e_phentsize
7175 : 0),
7176 output_section->alignment_power)
7177 == output_section->vma))
7178 map->p_paddr = segment->p_vaddr;
7179
7180 /* Match up the physical address of the segment with the
7181 LMA address of the output section. */
7182 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7183 || IS_COREFILE_NOTE (segment, section)
7184 || (bed->want_p_paddr_set_to_zero
7185 && IS_CONTAINED_BY_VMA (output_section, segment)))
7186 {
7187 if (matching_lma == NULL
7188 || output_section->lma < matching_lma->lma)
7189 matching_lma = output_section;
7190
7191 /* We assume that if the section fits within the segment
7192 then it does not overlap any other section within that
7193 segment. */
7194 map->sections[isec++] = output_section;
7195 }
7196 else if (suggested_lma == NULL)
7197 suggested_lma = output_section;
7198
7199 if (j == section_count)
7200 break;
7201 }
7202 }
7203
7204 BFD_ASSERT (j == section_count);
7205
7206 /* Step Two: Adjust the physical address of the current segment,
7207 if necessary. */
7208 if (isec == section_count)
7209 {
7210 /* All of the sections fitted within the segment as currently
7211 specified. This is the default case. Add the segment to
7212 the list of built segments and carry on to process the next
7213 program header in the input BFD. */
7214 map->count = section_count;
7215 *pointer_to_map = map;
7216 pointer_to_map = &map->next;
7217
7218 if (p_paddr_valid
7219 && !bed->want_p_paddr_set_to_zero)
7220 {
7221 bfd_vma hdr_size = 0;
7222 if (map->includes_filehdr)
7223 hdr_size = iehdr->e_ehsize;
7224 if (map->includes_phdrs)
7225 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7226
7227 /* Account for padding before the first section in the
7228 segment. */
7229 map->p_vaddr_offset = map->p_paddr + hdr_size - matching_lma->lma;
7230 }
7231
7232 free (sections);
7233 continue;
7234 }
7235 else
7236 {
7237 /* Change the current segment's physical address to match
7238 the LMA of the first section that fitted, or if no
7239 section fitted, the first section. */
7240 if (matching_lma == NULL)
7241 matching_lma = suggested_lma;
7242
7243 map->p_paddr = matching_lma->lma;
7244
7245 /* Offset the segment physical address from the lma
7246 to allow for space taken up by elf headers. */
7247 if (map->includes_phdrs)
7248 {
7249 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7250
7251 /* iehdr->e_phnum is just an estimate of the number
7252 of program headers that we will need. Make a note
7253 here of the number we used and the segment we chose
7254 to hold these headers, so that we can adjust the
7255 offset when we know the correct value. */
7256 phdr_adjust_num = iehdr->e_phnum;
7257 phdr_adjust_seg = map;
7258 }
7259
7260 if (map->includes_filehdr)
7261 {
7262 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7263 map->p_paddr -= iehdr->e_ehsize;
7264 /* We've subtracted off the size of headers from the
7265 first section lma, but there may have been some
7266 alignment padding before that section too. Try to
7267 account for that by adjusting the segment lma down to
7268 the same alignment. */
7269 if (segment->p_align != 0 && segment->p_align < align)
7270 align = segment->p_align;
7271 map->p_paddr &= -align;
7272 }
7273 }
7274
7275 /* Step Three: Loop over the sections again, this time assigning
7276 those that fit to the current segment and removing them from the
7277 sections array; but making sure not to leave large gaps. Once all
7278 possible sections have been assigned to the current segment it is
7279 added to the list of built segments and if sections still remain
7280 to be assigned, a new segment is constructed before repeating
7281 the loop. */
7282 isec = 0;
7283 do
7284 {
7285 map->count = 0;
7286 suggested_lma = NULL;
7287
7288 /* Fill the current segment with sections that fit. */
7289 for (j = 0; j < section_count; j++)
7290 {
7291 section = sections[j];
7292
7293 if (section == NULL)
7294 continue;
7295
7296 output_section = section->output_section;
7297
7298 BFD_ASSERT (output_section != NULL);
7299
7300 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr)
7301 || IS_COREFILE_NOTE (segment, section))
7302 {
7303 if (map->count == 0)
7304 {
7305 /* If the first section in a segment does not start at
7306 the beginning of the segment, then something is
7307 wrong. */
7308 if (align_power (map->p_paddr
7309 + (map->includes_filehdr
7310 ? iehdr->e_ehsize : 0)
7311 + (map->includes_phdrs
7312 ? iehdr->e_phnum * iehdr->e_phentsize
7313 : 0),
7314 output_section->alignment_power)
7315 != output_section->lma)
7316 goto sorry;
7317 }
7318 else
7319 {
7320 asection *prev_sec;
7321
7322 prev_sec = map->sections[map->count - 1];
7323
7324 /* If the gap between the end of the previous section
7325 and the start of this section is more than
7326 maxpagesize then we need to start a new segment. */
7327 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7328 maxpagesize)
7329 < BFD_ALIGN (output_section->lma, maxpagesize))
7330 || (prev_sec->lma + prev_sec->size
7331 > output_section->lma))
7332 {
7333 if (suggested_lma == NULL)
7334 suggested_lma = output_section;
7335
7336 continue;
7337 }
7338 }
7339
7340 map->sections[map->count++] = output_section;
7341 ++isec;
7342 sections[j] = NULL;
7343 if (segment->p_type == PT_LOAD)
7344 section->segment_mark = TRUE;
7345 }
7346 else if (suggested_lma == NULL)
7347 suggested_lma = output_section;
7348 }
7349
7350 /* PR 23932. A corrupt input file may contain sections that cannot
7351 be assigned to any segment - because for example they have a
7352 negative size - or segments that do not contain any sections.
7353 But there are also valid reasons why a segment can be empty.
7354 So allow a count of zero. */
7355
7356 /* Add the current segment to the list of built segments. */
7357 *pointer_to_map = map;
7358 pointer_to_map = &map->next;
7359
7360 if (isec < section_count)
7361 {
7362 /* We still have not allocated all of the sections to
7363 segments. Create a new segment here, initialise it
7364 and carry on looping. */
7365 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7366 amt += section_count * sizeof (asection *);
7367 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7368 if (map == NULL)
7369 {
7370 free (sections);
7371 return FALSE;
7372 }
7373
7374 /* Initialise the fields of the segment map. Set the physical
7375 physical address to the LMA of the first section that has
7376 not yet been assigned. */
7377 map->next = NULL;
7378 map->p_type = segment->p_type;
7379 map->p_flags = segment->p_flags;
7380 map->p_flags_valid = 1;
7381 map->p_paddr = suggested_lma->lma;
7382 map->p_paddr_valid = p_paddr_valid;
7383 map->includes_filehdr = 0;
7384 map->includes_phdrs = 0;
7385 }
7386
7387 continue;
7388 sorry:
7389 bfd_set_error (bfd_error_sorry);
7390 free (sections);
7391 return FALSE;
7392 }
7393 while (isec < section_count);
7394
7395 free (sections);
7396 }
7397
7398 elf_seg_map (obfd) = map_first;
7399
7400 /* If we had to estimate the number of program headers that were
7401 going to be needed, then check our estimate now and adjust
7402 the offset if necessary. */
7403 if (phdr_adjust_seg != NULL)
7404 {
7405 unsigned int count;
7406
7407 for (count = 0, map = map_first; map != NULL; map = map->next)
7408 count++;
7409
7410 if (count > phdr_adjust_num)
7411 phdr_adjust_seg->p_paddr
7412 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7413
7414 for (map = map_first; map != NULL; map = map->next)
7415 if (map->p_type == PT_PHDR)
7416 {
7417 bfd_vma adjust
7418 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7419 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7420 break;
7421 }
7422 }
7423
7424 #undef SEGMENT_END
7425 #undef SECTION_SIZE
7426 #undef IS_CONTAINED_BY_VMA
7427 #undef IS_CONTAINED_BY_LMA
7428 #undef IS_NOTE
7429 #undef IS_COREFILE_NOTE
7430 #undef IS_SOLARIS_PT_INTERP
7431 #undef IS_SECTION_IN_INPUT_SEGMENT
7432 #undef INCLUDE_SECTION_IN_SEGMENT
7433 #undef SEGMENT_AFTER_SEGMENT
7434 #undef SEGMENT_OVERLAPS
7435 return TRUE;
7436 }
7437
7438 /* Copy ELF program header information. */
7439
7440 static bfd_boolean
7441 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7442 {
7443 Elf_Internal_Ehdr *iehdr;
7444 struct elf_segment_map *map;
7445 struct elf_segment_map *map_first;
7446 struct elf_segment_map **pointer_to_map;
7447 Elf_Internal_Phdr *segment;
7448 unsigned int i;
7449 unsigned int num_segments;
7450 bfd_boolean phdr_included = FALSE;
7451 bfd_boolean p_paddr_valid;
7452
7453 iehdr = elf_elfheader (ibfd);
7454
7455 map_first = NULL;
7456 pointer_to_map = &map_first;
7457
7458 /* If all the segment p_paddr fields are zero, don't set
7459 map->p_paddr_valid. */
7460 p_paddr_valid = FALSE;
7461 num_segments = elf_elfheader (ibfd)->e_phnum;
7462 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7463 i < num_segments;
7464 i++, segment++)
7465 if (segment->p_paddr != 0)
7466 {
7467 p_paddr_valid = TRUE;
7468 break;
7469 }
7470
7471 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7472 i < num_segments;
7473 i++, segment++)
7474 {
7475 asection *section;
7476 unsigned int section_count;
7477 size_t amt;
7478 Elf_Internal_Shdr *this_hdr;
7479 asection *first_section = NULL;
7480 asection *lowest_section;
7481
7482 /* Compute how many sections are in this segment. */
7483 for (section = ibfd->sections, section_count = 0;
7484 section != NULL;
7485 section = section->next)
7486 {
7487 this_hdr = &(elf_section_data(section)->this_hdr);
7488 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7489 {
7490 if (first_section == NULL)
7491 first_section = section;
7492 section_count++;
7493 }
7494 }
7495
7496 /* Allocate a segment map big enough to contain
7497 all of the sections we have selected. */
7498 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7499 amt += section_count * sizeof (asection *);
7500 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7501 if (map == NULL)
7502 return FALSE;
7503
7504 /* Initialize the fields of the output segment map with the
7505 input segment. */
7506 map->next = NULL;
7507 map->p_type = segment->p_type;
7508 map->p_flags = segment->p_flags;
7509 map->p_flags_valid = 1;
7510 map->p_paddr = segment->p_paddr;
7511 map->p_paddr_valid = p_paddr_valid;
7512 map->p_align = segment->p_align;
7513 map->p_align_valid = 1;
7514 map->p_vaddr_offset = 0;
7515
7516 if (map->p_type == PT_GNU_RELRO
7517 || map->p_type == PT_GNU_STACK)
7518 {
7519 /* The PT_GNU_RELRO segment may contain the first a few
7520 bytes in the .got.plt section even if the whole .got.plt
7521 section isn't in the PT_GNU_RELRO segment. We won't
7522 change the size of the PT_GNU_RELRO segment.
7523 Similarly, PT_GNU_STACK size is significant on uclinux
7524 systems. */
7525 map->p_size = segment->p_memsz;
7526 map->p_size_valid = 1;
7527 }
7528
7529 /* Determine if this segment contains the ELF file header
7530 and if it contains the program headers themselves. */
7531 map->includes_filehdr = (segment->p_offset == 0
7532 && segment->p_filesz >= iehdr->e_ehsize);
7533
7534 map->includes_phdrs = 0;
7535 if (! phdr_included || segment->p_type != PT_LOAD)
7536 {
7537 map->includes_phdrs =
7538 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7539 && (segment->p_offset + segment->p_filesz
7540 >= ((bfd_vma) iehdr->e_phoff
7541 + iehdr->e_phnum * iehdr->e_phentsize)));
7542
7543 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7544 phdr_included = TRUE;
7545 }
7546
7547 lowest_section = NULL;
7548 if (section_count != 0)
7549 {
7550 unsigned int isec = 0;
7551
7552 for (section = first_section;
7553 section != NULL;
7554 section = section->next)
7555 {
7556 this_hdr = &(elf_section_data(section)->this_hdr);
7557 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7558 {
7559 map->sections[isec++] = section->output_section;
7560 if ((section->flags & SEC_ALLOC) != 0)
7561 {
7562 bfd_vma seg_off;
7563
7564 if (lowest_section == NULL
7565 || section->lma < lowest_section->lma)
7566 lowest_section = section;
7567
7568 /* Section lmas are set up from PT_LOAD header
7569 p_paddr in _bfd_elf_make_section_from_shdr.
7570 If this header has a p_paddr that disagrees
7571 with the section lma, flag the p_paddr as
7572 invalid. */
7573 if ((section->flags & SEC_LOAD) != 0)
7574 seg_off = this_hdr->sh_offset - segment->p_offset;
7575 else
7576 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7577 if (section->lma - segment->p_paddr != seg_off)
7578 map->p_paddr_valid = FALSE;
7579 }
7580 if (isec == section_count)
7581 break;
7582 }
7583 }
7584 }
7585
7586 if (section_count == 0)
7587 map->p_vaddr_offset = segment->p_vaddr;
7588 else if (map->p_paddr_valid)
7589 {
7590 /* Account for padding before the first section in the segment. */
7591 bfd_vma hdr_size = 0;
7592 if (map->includes_filehdr)
7593 hdr_size = iehdr->e_ehsize;
7594 if (map->includes_phdrs)
7595 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7596
7597 map->p_vaddr_offset = (map->p_paddr + hdr_size
7598 - (lowest_section ? lowest_section->lma : 0));
7599 }
7600
7601 map->count = section_count;
7602 *pointer_to_map = map;
7603 pointer_to_map = &map->next;
7604 }
7605
7606 elf_seg_map (obfd) = map_first;
7607 return TRUE;
7608 }
7609
7610 /* Copy private BFD data. This copies or rewrites ELF program header
7611 information. */
7612
7613 static bfd_boolean
7614 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7615 {
7616 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7617 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7618 return TRUE;
7619
7620 if (elf_tdata (ibfd)->phdr == NULL)
7621 return TRUE;
7622
7623 if (ibfd->xvec == obfd->xvec)
7624 {
7625 /* Check to see if any sections in the input BFD
7626 covered by ELF program header have changed. */
7627 Elf_Internal_Phdr *segment;
7628 asection *section, *osec;
7629 unsigned int i, num_segments;
7630 Elf_Internal_Shdr *this_hdr;
7631 const struct elf_backend_data *bed;
7632
7633 bed = get_elf_backend_data (ibfd);
7634
7635 /* Regenerate the segment map if p_paddr is set to 0. */
7636 if (bed->want_p_paddr_set_to_zero)
7637 goto rewrite;
7638
7639 /* Initialize the segment mark field. */
7640 for (section = obfd->sections; section != NULL;
7641 section = section->next)
7642 section->segment_mark = FALSE;
7643
7644 num_segments = elf_elfheader (ibfd)->e_phnum;
7645 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7646 i < num_segments;
7647 i++, segment++)
7648 {
7649 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7650 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7651 which severly confuses things, so always regenerate the segment
7652 map in this case. */
7653 if (segment->p_paddr == 0
7654 && segment->p_memsz == 0
7655 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7656 goto rewrite;
7657
7658 for (section = ibfd->sections;
7659 section != NULL; section = section->next)
7660 {
7661 /* We mark the output section so that we know it comes
7662 from the input BFD. */
7663 osec = section->output_section;
7664 if (osec)
7665 osec->segment_mark = TRUE;
7666
7667 /* Check if this section is covered by the segment. */
7668 this_hdr = &(elf_section_data(section)->this_hdr);
7669 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7670 {
7671 /* FIXME: Check if its output section is changed or
7672 removed. What else do we need to check? */
7673 if (osec == NULL
7674 || section->flags != osec->flags
7675 || section->lma != osec->lma
7676 || section->vma != osec->vma
7677 || section->size != osec->size
7678 || section->rawsize != osec->rawsize
7679 || section->alignment_power != osec->alignment_power)
7680 goto rewrite;
7681 }
7682 }
7683 }
7684
7685 /* Check to see if any output section do not come from the
7686 input BFD. */
7687 for (section = obfd->sections; section != NULL;
7688 section = section->next)
7689 {
7690 if (!section->segment_mark)
7691 goto rewrite;
7692 else
7693 section->segment_mark = FALSE;
7694 }
7695
7696 return copy_elf_program_header (ibfd, obfd);
7697 }
7698
7699 rewrite:
7700 if (ibfd->xvec == obfd->xvec)
7701 {
7702 /* When rewriting program header, set the output maxpagesize to
7703 the maximum alignment of input PT_LOAD segments. */
7704 Elf_Internal_Phdr *segment;
7705 unsigned int i;
7706 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7707 bfd_vma maxpagesize = 0;
7708
7709 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7710 i < num_segments;
7711 i++, segment++)
7712 if (segment->p_type == PT_LOAD
7713 && maxpagesize < segment->p_align)
7714 {
7715 /* PR 17512: file: f17299af. */
7716 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7717 /* xgettext:c-format */
7718 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7719 PRIx64 " is too large"),
7720 ibfd, (uint64_t) segment->p_align);
7721 else
7722 maxpagesize = segment->p_align;
7723 }
7724
7725 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7726 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7727 }
7728
7729 return rewrite_elf_program_header (ibfd, obfd);
7730 }
7731
7732 /* Initialize private output section information from input section. */
7733
7734 bfd_boolean
7735 _bfd_elf_init_private_section_data (bfd *ibfd,
7736 asection *isec,
7737 bfd *obfd,
7738 asection *osec,
7739 struct bfd_link_info *link_info)
7740
7741 {
7742 Elf_Internal_Shdr *ihdr, *ohdr;
7743 bfd_boolean final_link = (link_info != NULL
7744 && !bfd_link_relocatable (link_info));
7745
7746 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7747 || obfd->xvec->flavour != bfd_target_elf_flavour)
7748 return TRUE;
7749
7750 BFD_ASSERT (elf_section_data (osec) != NULL);
7751
7752 /* If this is a known ABI section, ELF section type and flags may
7753 have been set up when OSEC was created. For normal sections we
7754 allow the user to override the type and flags other than
7755 SHF_MASKOS and SHF_MASKPROC. */
7756 if (elf_section_type (osec) == SHT_PROGBITS
7757 || elf_section_type (osec) == SHT_NOTE
7758 || elf_section_type (osec) == SHT_NOBITS)
7759 elf_section_type (osec) = SHT_NULL;
7760 /* For objcopy and relocatable link, copy the ELF section type from
7761 the input file if the BFD section flags are the same. (If they
7762 are different the user may be doing something like
7763 "objcopy --set-section-flags .text=alloc,data".) For a final
7764 link allow some flags that the linker clears to differ. */
7765 if (elf_section_type (osec) == SHT_NULL
7766 && (osec->flags == isec->flags
7767 || (final_link
7768 && ((osec->flags ^ isec->flags)
7769 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7770 elf_section_type (osec) = elf_section_type (isec);
7771
7772 /* FIXME: Is this correct for all OS/PROC specific flags? */
7773 elf_section_flags (osec) = (elf_section_flags (isec)
7774 & (SHF_MASKOS | SHF_MASKPROC));
7775
7776 /* Copy sh_info from input for mbind section. */
7777 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7778 && elf_section_flags (isec) & SHF_GNU_MBIND)
7779 elf_section_data (osec)->this_hdr.sh_info
7780 = elf_section_data (isec)->this_hdr.sh_info;
7781
7782 /* Set things up for objcopy and relocatable link. The output
7783 SHT_GROUP section will have its elf_next_in_group pointing back
7784 to the input group members. Ignore linker created group section.
7785 See elfNN_ia64_object_p in elfxx-ia64.c. */
7786 if ((link_info == NULL
7787 || !link_info->resolve_section_groups)
7788 && (elf_sec_group (isec) == NULL
7789 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7790 {
7791 if (elf_section_flags (isec) & SHF_GROUP)
7792 elf_section_flags (osec) |= SHF_GROUP;
7793 elf_next_in_group (osec) = elf_next_in_group (isec);
7794 elf_section_data (osec)->group = elf_section_data (isec)->group;
7795 }
7796
7797 /* If not decompress, preserve SHF_COMPRESSED. */
7798 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7799 elf_section_flags (osec) |= (elf_section_flags (isec)
7800 & SHF_COMPRESSED);
7801
7802 ihdr = &elf_section_data (isec)->this_hdr;
7803
7804 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7805 don't use the output section of the linked-to section since it
7806 may be NULL at this point. */
7807 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7808 {
7809 ohdr = &elf_section_data (osec)->this_hdr;
7810 ohdr->sh_flags |= SHF_LINK_ORDER;
7811 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7812 }
7813
7814 osec->use_rela_p = isec->use_rela_p;
7815
7816 return TRUE;
7817 }
7818
7819 /* Copy private section information. This copies over the entsize
7820 field, and sometimes the info field. */
7821
7822 bfd_boolean
7823 _bfd_elf_copy_private_section_data (bfd *ibfd,
7824 asection *isec,
7825 bfd *obfd,
7826 asection *osec)
7827 {
7828 Elf_Internal_Shdr *ihdr, *ohdr;
7829
7830 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7831 || obfd->xvec->flavour != bfd_target_elf_flavour)
7832 return TRUE;
7833
7834 ihdr = &elf_section_data (isec)->this_hdr;
7835 ohdr = &elf_section_data (osec)->this_hdr;
7836
7837 ohdr->sh_entsize = ihdr->sh_entsize;
7838
7839 if (ihdr->sh_type == SHT_SYMTAB
7840 || ihdr->sh_type == SHT_DYNSYM
7841 || ihdr->sh_type == SHT_GNU_verneed
7842 || ihdr->sh_type == SHT_GNU_verdef)
7843 ohdr->sh_info = ihdr->sh_info;
7844
7845 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7846 NULL);
7847 }
7848
7849 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7850 necessary if we are removing either the SHT_GROUP section or any of
7851 the group member sections. DISCARDED is the value that a section's
7852 output_section has if the section will be discarded, NULL when this
7853 function is called from objcopy, bfd_abs_section_ptr when called
7854 from the linker. */
7855
7856 bfd_boolean
7857 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7858 {
7859 asection *isec;
7860
7861 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7862 if (elf_section_type (isec) == SHT_GROUP)
7863 {
7864 asection *first = elf_next_in_group (isec);
7865 asection *s = first;
7866 bfd_size_type removed = 0;
7867
7868 while (s != NULL)
7869 {
7870 /* If this member section is being output but the
7871 SHT_GROUP section is not, then clear the group info
7872 set up by _bfd_elf_copy_private_section_data. */
7873 if (s->output_section != discarded
7874 && isec->output_section == discarded)
7875 {
7876 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7877 elf_group_name (s->output_section) = NULL;
7878 }
7879 /* Conversely, if the member section is not being output
7880 but the SHT_GROUP section is, then adjust its size. */
7881 else if (s->output_section == discarded
7882 && isec->output_section != discarded)
7883 {
7884 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7885 removed += 4;
7886 if (elf_sec->rel.hdr != NULL
7887 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7888 removed += 4;
7889 if (elf_sec->rela.hdr != NULL
7890 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7891 removed += 4;
7892 }
7893 s = elf_next_in_group (s);
7894 if (s == first)
7895 break;
7896 }
7897 if (removed != 0)
7898 {
7899 if (discarded != NULL)
7900 {
7901 /* If we've been called for ld -r, then we need to
7902 adjust the input section size. */
7903 if (isec->rawsize == 0)
7904 isec->rawsize = isec->size;
7905 isec->size = isec->rawsize - removed;
7906 if (isec->size <= 4)
7907 {
7908 isec->size = 0;
7909 isec->flags |= SEC_EXCLUDE;
7910 }
7911 }
7912 else
7913 {
7914 /* Adjust the output section size when called from
7915 objcopy. */
7916 isec->output_section->size -= removed;
7917 if (isec->output_section->size <= 4)
7918 {
7919 isec->output_section->size = 0;
7920 isec->output_section->flags |= SEC_EXCLUDE;
7921 }
7922 }
7923 }
7924 }
7925
7926 return TRUE;
7927 }
7928
7929 /* Copy private header information. */
7930
7931 bfd_boolean
7932 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7933 {
7934 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7935 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7936 return TRUE;
7937
7938 /* Copy over private BFD data if it has not already been copied.
7939 This must be done here, rather than in the copy_private_bfd_data
7940 entry point, because the latter is called after the section
7941 contents have been set, which means that the program headers have
7942 already been worked out. */
7943 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
7944 {
7945 if (! copy_private_bfd_data (ibfd, obfd))
7946 return FALSE;
7947 }
7948
7949 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7950 }
7951
7952 /* Copy private symbol information. If this symbol is in a section
7953 which we did not map into a BFD section, try to map the section
7954 index correctly. We use special macro definitions for the mapped
7955 section indices; these definitions are interpreted by the
7956 swap_out_syms function. */
7957
7958 #define MAP_ONESYMTAB (SHN_HIOS + 1)
7959 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
7960 #define MAP_STRTAB (SHN_HIOS + 3)
7961 #define MAP_SHSTRTAB (SHN_HIOS + 4)
7962 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
7963
7964 bfd_boolean
7965 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
7966 asymbol *isymarg,
7967 bfd *obfd,
7968 asymbol *osymarg)
7969 {
7970 elf_symbol_type *isym, *osym;
7971
7972 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7973 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7974 return TRUE;
7975
7976 isym = elf_symbol_from (ibfd, isymarg);
7977 osym = elf_symbol_from (obfd, osymarg);
7978
7979 if (isym != NULL
7980 && isym->internal_elf_sym.st_shndx != 0
7981 && osym != NULL
7982 && bfd_is_abs_section (isym->symbol.section))
7983 {
7984 unsigned int shndx;
7985
7986 shndx = isym->internal_elf_sym.st_shndx;
7987 if (shndx == elf_onesymtab (ibfd))
7988 shndx = MAP_ONESYMTAB;
7989 else if (shndx == elf_dynsymtab (ibfd))
7990 shndx = MAP_DYNSYMTAB;
7991 else if (shndx == elf_strtab_sec (ibfd))
7992 shndx = MAP_STRTAB;
7993 else if (shndx == elf_shstrtab_sec (ibfd))
7994 shndx = MAP_SHSTRTAB;
7995 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
7996 shndx = MAP_SYM_SHNDX;
7997 osym->internal_elf_sym.st_shndx = shndx;
7998 }
7999
8000 return TRUE;
8001 }
8002
8003 /* Swap out the symbols. */
8004
8005 static bfd_boolean
8006 swap_out_syms (bfd *abfd,
8007 struct elf_strtab_hash **sttp,
8008 int relocatable_p)
8009 {
8010 const struct elf_backend_data *bed;
8011 unsigned int symcount;
8012 asymbol **syms;
8013 struct elf_strtab_hash *stt;
8014 Elf_Internal_Shdr *symtab_hdr;
8015 Elf_Internal_Shdr *symtab_shndx_hdr;
8016 Elf_Internal_Shdr *symstrtab_hdr;
8017 struct elf_sym_strtab *symstrtab;
8018 bfd_byte *outbound_syms;
8019 bfd_byte *outbound_shndx;
8020 unsigned long outbound_syms_index;
8021 unsigned long outbound_shndx_index;
8022 unsigned int idx;
8023 unsigned int num_locals;
8024 size_t amt;
8025 bfd_boolean name_local_sections;
8026
8027 if (!elf_map_symbols (abfd, &num_locals))
8028 return FALSE;
8029
8030 /* Dump out the symtabs. */
8031 stt = _bfd_elf_strtab_init ();
8032 if (stt == NULL)
8033 return FALSE;
8034
8035 bed = get_elf_backend_data (abfd);
8036 symcount = bfd_get_symcount (abfd);
8037 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8038 symtab_hdr->sh_type = SHT_SYMTAB;
8039 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8040 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8041 symtab_hdr->sh_info = num_locals + 1;
8042 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8043
8044 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8045 symstrtab_hdr->sh_type = SHT_STRTAB;
8046
8047 /* Allocate buffer to swap out the .strtab section. */
8048 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8049 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8050 {
8051 bfd_set_error (bfd_error_no_memory);
8052 _bfd_elf_strtab_free (stt);
8053 return FALSE;
8054 }
8055
8056 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8057 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8058 {
8059 error_no_mem:
8060 bfd_set_error (bfd_error_no_memory);
8061 error_return:
8062 free (symstrtab);
8063 _bfd_elf_strtab_free (stt);
8064 return FALSE;
8065 }
8066 symtab_hdr->contents = outbound_syms;
8067 outbound_syms_index = 0;
8068
8069 outbound_shndx = NULL;
8070 outbound_shndx_index = 0;
8071
8072 if (elf_symtab_shndx_list (abfd))
8073 {
8074 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8075 if (symtab_shndx_hdr->sh_name != 0)
8076 {
8077 if (_bfd_mul_overflow (symcount + 1,
8078 sizeof (Elf_External_Sym_Shndx), &amt))
8079 goto error_no_mem;
8080 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8081 if (outbound_shndx == NULL)
8082 goto error_return;
8083
8084 symtab_shndx_hdr->contents = outbound_shndx;
8085 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8086 symtab_shndx_hdr->sh_size = amt;
8087 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8088 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8089 }
8090 /* FIXME: What about any other headers in the list ? */
8091 }
8092
8093 /* Now generate the data (for "contents"). */
8094 {
8095 /* Fill in zeroth symbol and swap it out. */
8096 Elf_Internal_Sym sym;
8097 sym.st_name = 0;
8098 sym.st_value = 0;
8099 sym.st_size = 0;
8100 sym.st_info = 0;
8101 sym.st_other = 0;
8102 sym.st_shndx = SHN_UNDEF;
8103 sym.st_target_internal = 0;
8104 symstrtab[0].sym = sym;
8105 symstrtab[0].dest_index = outbound_syms_index;
8106 symstrtab[0].destshndx_index = outbound_shndx_index;
8107 outbound_syms_index++;
8108 if (outbound_shndx != NULL)
8109 outbound_shndx_index++;
8110 }
8111
8112 name_local_sections
8113 = (bed->elf_backend_name_local_section_symbols
8114 && bed->elf_backend_name_local_section_symbols (abfd));
8115
8116 syms = bfd_get_outsymbols (abfd);
8117 for (idx = 0; idx < symcount;)
8118 {
8119 Elf_Internal_Sym sym;
8120 bfd_vma value = syms[idx]->value;
8121 elf_symbol_type *type_ptr;
8122 flagword flags = syms[idx]->flags;
8123 int type;
8124
8125 if (!name_local_sections
8126 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8127 {
8128 /* Local section symbols have no name. */
8129 sym.st_name = (unsigned long) -1;
8130 }
8131 else
8132 {
8133 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8134 to get the final offset for st_name. */
8135 sym.st_name
8136 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8137 FALSE);
8138 if (sym.st_name == (unsigned long) -1)
8139 goto error_return;
8140 }
8141
8142 type_ptr = elf_symbol_from (abfd, syms[idx]);
8143
8144 if ((flags & BSF_SECTION_SYM) == 0
8145 && bfd_is_com_section (syms[idx]->section))
8146 {
8147 /* ELF common symbols put the alignment into the `value' field,
8148 and the size into the `size' field. This is backwards from
8149 how BFD handles it, so reverse it here. */
8150 sym.st_size = value;
8151 if (type_ptr == NULL
8152 || type_ptr->internal_elf_sym.st_value == 0)
8153 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8154 else
8155 sym.st_value = type_ptr->internal_elf_sym.st_value;
8156 sym.st_shndx = _bfd_elf_section_from_bfd_section
8157 (abfd, syms[idx]->section);
8158 }
8159 else
8160 {
8161 asection *sec = syms[idx]->section;
8162 unsigned int shndx;
8163
8164 if (sec->output_section)
8165 {
8166 value += sec->output_offset;
8167 sec = sec->output_section;
8168 }
8169
8170 /* Don't add in the section vma for relocatable output. */
8171 if (! relocatable_p)
8172 value += sec->vma;
8173 sym.st_value = value;
8174 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8175
8176 if (bfd_is_abs_section (sec)
8177 && type_ptr != NULL
8178 && type_ptr->internal_elf_sym.st_shndx != 0)
8179 {
8180 /* This symbol is in a real ELF section which we did
8181 not create as a BFD section. Undo the mapping done
8182 by copy_private_symbol_data. */
8183 shndx = type_ptr->internal_elf_sym.st_shndx;
8184 switch (shndx)
8185 {
8186 case MAP_ONESYMTAB:
8187 shndx = elf_onesymtab (abfd);
8188 break;
8189 case MAP_DYNSYMTAB:
8190 shndx = elf_dynsymtab (abfd);
8191 break;
8192 case MAP_STRTAB:
8193 shndx = elf_strtab_sec (abfd);
8194 break;
8195 case MAP_SHSTRTAB:
8196 shndx = elf_shstrtab_sec (abfd);
8197 break;
8198 case MAP_SYM_SHNDX:
8199 if (elf_symtab_shndx_list (abfd))
8200 shndx = elf_symtab_shndx_list (abfd)->ndx;
8201 break;
8202 case SHN_COMMON:
8203 case SHN_ABS:
8204 shndx = SHN_ABS;
8205 break;
8206 default:
8207 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8208 {
8209 if (bed->symbol_section_index)
8210 shndx = bed->symbol_section_index (abfd, type_ptr);
8211 /* Otherwise just leave the index alone. */
8212 }
8213 else
8214 {
8215 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8216 _bfd_error_handler (_("%pB: \
8217 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8218 abfd, shndx);
8219 shndx = SHN_ABS;
8220 }
8221 break;
8222 }
8223 }
8224 else
8225 {
8226 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8227
8228 if (shndx == SHN_BAD)
8229 {
8230 asection *sec2;
8231
8232 /* Writing this would be a hell of a lot easier if
8233 we had some decent documentation on bfd, and
8234 knew what to expect of the library, and what to
8235 demand of applications. For example, it
8236 appears that `objcopy' might not set the
8237 section of a symbol to be a section that is
8238 actually in the output file. */
8239 sec2 = bfd_get_section_by_name (abfd, sec->name);
8240 if (sec2 != NULL)
8241 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8242 if (shndx == SHN_BAD)
8243 {
8244 /* xgettext:c-format */
8245 _bfd_error_handler
8246 (_("unable to find equivalent output section"
8247 " for symbol '%s' from section '%s'"),
8248 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8249 sec->name);
8250 bfd_set_error (bfd_error_invalid_operation);
8251 goto error_return;
8252 }
8253 }
8254 }
8255
8256 sym.st_shndx = shndx;
8257 }
8258
8259 if ((flags & BSF_THREAD_LOCAL) != 0)
8260 type = STT_TLS;
8261 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8262 type = STT_GNU_IFUNC;
8263 else if ((flags & BSF_FUNCTION) != 0)
8264 type = STT_FUNC;
8265 else if ((flags & BSF_OBJECT) != 0)
8266 type = STT_OBJECT;
8267 else if ((flags & BSF_RELC) != 0)
8268 type = STT_RELC;
8269 else if ((flags & BSF_SRELC) != 0)
8270 type = STT_SRELC;
8271 else
8272 type = STT_NOTYPE;
8273
8274 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8275 type = STT_TLS;
8276
8277 /* Processor-specific types. */
8278 if (type_ptr != NULL
8279 && bed->elf_backend_get_symbol_type)
8280 type = ((*bed->elf_backend_get_symbol_type)
8281 (&type_ptr->internal_elf_sym, type));
8282
8283 if (flags & BSF_SECTION_SYM)
8284 {
8285 if (flags & BSF_GLOBAL)
8286 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8287 else
8288 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8289 }
8290 else if (bfd_is_com_section (syms[idx]->section))
8291 {
8292 if (type != STT_TLS)
8293 {
8294 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8295 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8296 ? STT_COMMON : STT_OBJECT);
8297 else
8298 type = ((flags & BSF_ELF_COMMON) != 0
8299 ? STT_COMMON : STT_OBJECT);
8300 }
8301 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8302 }
8303 else if (bfd_is_und_section (syms[idx]->section))
8304 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8305 ? STB_WEAK
8306 : STB_GLOBAL),
8307 type);
8308 else if (flags & BSF_FILE)
8309 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8310 else
8311 {
8312 int bind = STB_LOCAL;
8313
8314 if (flags & BSF_LOCAL)
8315 bind = STB_LOCAL;
8316 else if (flags & BSF_GNU_UNIQUE)
8317 bind = STB_GNU_UNIQUE;
8318 else if (flags & BSF_WEAK)
8319 bind = STB_WEAK;
8320 else if (flags & BSF_GLOBAL)
8321 bind = STB_GLOBAL;
8322
8323 sym.st_info = ELF_ST_INFO (bind, type);
8324 }
8325
8326 if (type_ptr != NULL)
8327 {
8328 sym.st_other = type_ptr->internal_elf_sym.st_other;
8329 sym.st_target_internal
8330 = type_ptr->internal_elf_sym.st_target_internal;
8331 }
8332 else
8333 {
8334 sym.st_other = 0;
8335 sym.st_target_internal = 0;
8336 }
8337
8338 idx++;
8339 symstrtab[idx].sym = sym;
8340 symstrtab[idx].dest_index = outbound_syms_index;
8341 symstrtab[idx].destshndx_index = outbound_shndx_index;
8342
8343 outbound_syms_index++;
8344 if (outbound_shndx != NULL)
8345 outbound_shndx_index++;
8346 }
8347
8348 /* Finalize the .strtab section. */
8349 _bfd_elf_strtab_finalize (stt);
8350
8351 /* Swap out the .strtab section. */
8352 for (idx = 0; idx <= symcount; idx++)
8353 {
8354 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8355 if (elfsym->sym.st_name == (unsigned long) -1)
8356 elfsym->sym.st_name = 0;
8357 else
8358 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8359 elfsym->sym.st_name);
8360 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8361 (outbound_syms
8362 + (elfsym->dest_index
8363 * bed->s->sizeof_sym)),
8364 (outbound_shndx
8365 + (elfsym->destshndx_index
8366 * sizeof (Elf_External_Sym_Shndx))));
8367 }
8368 free (symstrtab);
8369
8370 *sttp = stt;
8371 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8372 symstrtab_hdr->sh_type = SHT_STRTAB;
8373 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8374 symstrtab_hdr->sh_addr = 0;
8375 symstrtab_hdr->sh_entsize = 0;
8376 symstrtab_hdr->sh_link = 0;
8377 symstrtab_hdr->sh_info = 0;
8378 symstrtab_hdr->sh_addralign = 1;
8379
8380 return TRUE;
8381 }
8382
8383 /* Return the number of bytes required to hold the symtab vector.
8384
8385 Note that we base it on the count plus 1, since we will null terminate
8386 the vector allocated based on this size. However, the ELF symbol table
8387 always has a dummy entry as symbol #0, so it ends up even. */
8388
8389 long
8390 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8391 {
8392 bfd_size_type symcount;
8393 long symtab_size;
8394 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8395
8396 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8397 if (symcount >= LONG_MAX / sizeof (asymbol *))
8398 {
8399 bfd_set_error (bfd_error_file_too_big);
8400 return -1;
8401 }
8402 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8403 if (symcount > 0)
8404 symtab_size -= sizeof (asymbol *);
8405
8406 return symtab_size;
8407 }
8408
8409 long
8410 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8411 {
8412 bfd_size_type symcount;
8413 long symtab_size;
8414 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8415
8416 if (elf_dynsymtab (abfd) == 0)
8417 {
8418 bfd_set_error (bfd_error_invalid_operation);
8419 return -1;
8420 }
8421
8422 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8423 if (symcount >= LONG_MAX / sizeof (asymbol *))
8424 {
8425 bfd_set_error (bfd_error_file_too_big);
8426 return -1;
8427 }
8428 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8429 if (symcount > 0)
8430 symtab_size -= sizeof (asymbol *);
8431
8432 return symtab_size;
8433 }
8434
8435 long
8436 _bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8437 sec_ptr asect)
8438 {
8439 #if SIZEOF_LONG == SIZEOF_INT
8440 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8441 {
8442 bfd_set_error (bfd_error_file_too_big);
8443 return -1;
8444 }
8445 #endif
8446 return (asect->reloc_count + 1) * sizeof (arelent *);
8447 }
8448
8449 /* Canonicalize the relocs. */
8450
8451 long
8452 _bfd_elf_canonicalize_reloc (bfd *abfd,
8453 sec_ptr section,
8454 arelent **relptr,
8455 asymbol **symbols)
8456 {
8457 arelent *tblptr;
8458 unsigned int i;
8459 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8460
8461 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8462 return -1;
8463
8464 tblptr = section->relocation;
8465 for (i = 0; i < section->reloc_count; i++)
8466 *relptr++ = tblptr++;
8467
8468 *relptr = NULL;
8469
8470 return section->reloc_count;
8471 }
8472
8473 long
8474 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8475 {
8476 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8477 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8478
8479 if (symcount >= 0)
8480 abfd->symcount = symcount;
8481 return symcount;
8482 }
8483
8484 long
8485 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8486 asymbol **allocation)
8487 {
8488 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8489 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8490
8491 if (symcount >= 0)
8492 abfd->dynsymcount = symcount;
8493 return symcount;
8494 }
8495
8496 /* Return the size required for the dynamic reloc entries. Any loadable
8497 section that was actually installed in the BFD, and has type SHT_REL
8498 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8499 dynamic reloc section. */
8500
8501 long
8502 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8503 {
8504 bfd_size_type count;
8505 asection *s;
8506
8507 if (elf_dynsymtab (abfd) == 0)
8508 {
8509 bfd_set_error (bfd_error_invalid_operation);
8510 return -1;
8511 }
8512
8513 count = 1;
8514 for (s = abfd->sections; s != NULL; s = s->next)
8515 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8516 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8517 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8518 {
8519 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8520 if (count > LONG_MAX / sizeof (arelent *))
8521 {
8522 bfd_set_error (bfd_error_file_too_big);
8523 return -1;
8524 }
8525 }
8526 return count * sizeof (arelent *);
8527 }
8528
8529 /* Canonicalize the dynamic relocation entries. Note that we return the
8530 dynamic relocations as a single block, although they are actually
8531 associated with particular sections; the interface, which was
8532 designed for SunOS style shared libraries, expects that there is only
8533 one set of dynamic relocs. Any loadable section that was actually
8534 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8535 dynamic symbol table, is considered to be a dynamic reloc section. */
8536
8537 long
8538 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8539 arelent **storage,
8540 asymbol **syms)
8541 {
8542 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8543 asection *s;
8544 long ret;
8545
8546 if (elf_dynsymtab (abfd) == 0)
8547 {
8548 bfd_set_error (bfd_error_invalid_operation);
8549 return -1;
8550 }
8551
8552 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8553 ret = 0;
8554 for (s = abfd->sections; s != NULL; s = s->next)
8555 {
8556 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8557 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8558 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8559 {
8560 arelent *p;
8561 long count, i;
8562
8563 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8564 return -1;
8565 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8566 p = s->relocation;
8567 for (i = 0; i < count; i++)
8568 *storage++ = p++;
8569 ret += count;
8570 }
8571 }
8572
8573 *storage = NULL;
8574
8575 return ret;
8576 }
8577 \f
8578 /* Read in the version information. */
8579
8580 bfd_boolean
8581 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8582 {
8583 bfd_byte *contents = NULL;
8584 unsigned int freeidx = 0;
8585 size_t amt;
8586
8587 if (elf_dynverref (abfd) != 0)
8588 {
8589 Elf_Internal_Shdr *hdr;
8590 Elf_External_Verneed *everneed;
8591 Elf_Internal_Verneed *iverneed;
8592 unsigned int i;
8593 bfd_byte *contents_end;
8594
8595 hdr = &elf_tdata (abfd)->dynverref_hdr;
8596
8597 if (hdr->sh_info == 0
8598 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8599 {
8600 error_return_bad_verref:
8601 _bfd_error_handler
8602 (_("%pB: .gnu.version_r invalid entry"), abfd);
8603 bfd_set_error (bfd_error_bad_value);
8604 error_return_verref:
8605 elf_tdata (abfd)->verref = NULL;
8606 elf_tdata (abfd)->cverrefs = 0;
8607 goto error_return;
8608 }
8609
8610 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8611 goto error_return_verref;
8612 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8613 if (contents == NULL)
8614 goto error_return_verref;
8615
8616 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8617 {
8618 bfd_set_error (bfd_error_file_too_big);
8619 goto error_return_verref;
8620 }
8621 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8622 if (elf_tdata (abfd)->verref == NULL)
8623 goto error_return_verref;
8624
8625 BFD_ASSERT (sizeof (Elf_External_Verneed)
8626 == sizeof (Elf_External_Vernaux));
8627 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8628 everneed = (Elf_External_Verneed *) contents;
8629 iverneed = elf_tdata (abfd)->verref;
8630 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8631 {
8632 Elf_External_Vernaux *evernaux;
8633 Elf_Internal_Vernaux *ivernaux;
8634 unsigned int j;
8635
8636 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8637
8638 iverneed->vn_bfd = abfd;
8639
8640 iverneed->vn_filename =
8641 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8642 iverneed->vn_file);
8643 if (iverneed->vn_filename == NULL)
8644 goto error_return_bad_verref;
8645
8646 if (iverneed->vn_cnt == 0)
8647 iverneed->vn_auxptr = NULL;
8648 else
8649 {
8650 if (_bfd_mul_overflow (iverneed->vn_cnt,
8651 sizeof (Elf_Internal_Vernaux), &amt))
8652 {
8653 bfd_set_error (bfd_error_file_too_big);
8654 goto error_return_verref;
8655 }
8656 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8657 bfd_alloc (abfd, amt);
8658 if (iverneed->vn_auxptr == NULL)
8659 goto error_return_verref;
8660 }
8661
8662 if (iverneed->vn_aux
8663 > (size_t) (contents_end - (bfd_byte *) everneed))
8664 goto error_return_bad_verref;
8665
8666 evernaux = ((Elf_External_Vernaux *)
8667 ((bfd_byte *) everneed + iverneed->vn_aux));
8668 ivernaux = iverneed->vn_auxptr;
8669 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8670 {
8671 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8672
8673 ivernaux->vna_nodename =
8674 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8675 ivernaux->vna_name);
8676 if (ivernaux->vna_nodename == NULL)
8677 goto error_return_bad_verref;
8678
8679 if (ivernaux->vna_other > freeidx)
8680 freeidx = ivernaux->vna_other;
8681
8682 ivernaux->vna_nextptr = NULL;
8683 if (ivernaux->vna_next == 0)
8684 {
8685 iverneed->vn_cnt = j + 1;
8686 break;
8687 }
8688 if (j + 1 < iverneed->vn_cnt)
8689 ivernaux->vna_nextptr = ivernaux + 1;
8690
8691 if (ivernaux->vna_next
8692 > (size_t) (contents_end - (bfd_byte *) evernaux))
8693 goto error_return_bad_verref;
8694
8695 evernaux = ((Elf_External_Vernaux *)
8696 ((bfd_byte *) evernaux + ivernaux->vna_next));
8697 }
8698
8699 iverneed->vn_nextref = NULL;
8700 if (iverneed->vn_next == 0)
8701 break;
8702 if (i + 1 < hdr->sh_info)
8703 iverneed->vn_nextref = iverneed + 1;
8704
8705 if (iverneed->vn_next
8706 > (size_t) (contents_end - (bfd_byte *) everneed))
8707 goto error_return_bad_verref;
8708
8709 everneed = ((Elf_External_Verneed *)
8710 ((bfd_byte *) everneed + iverneed->vn_next));
8711 }
8712 elf_tdata (abfd)->cverrefs = i;
8713
8714 free (contents);
8715 contents = NULL;
8716 }
8717
8718 if (elf_dynverdef (abfd) != 0)
8719 {
8720 Elf_Internal_Shdr *hdr;
8721 Elf_External_Verdef *everdef;
8722 Elf_Internal_Verdef *iverdef;
8723 Elf_Internal_Verdef *iverdefarr;
8724 Elf_Internal_Verdef iverdefmem;
8725 unsigned int i;
8726 unsigned int maxidx;
8727 bfd_byte *contents_end_def, *contents_end_aux;
8728
8729 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8730
8731 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8732 {
8733 error_return_bad_verdef:
8734 _bfd_error_handler
8735 (_("%pB: .gnu.version_d invalid entry"), abfd);
8736 bfd_set_error (bfd_error_bad_value);
8737 error_return_verdef:
8738 elf_tdata (abfd)->verdef = NULL;
8739 elf_tdata (abfd)->cverdefs = 0;
8740 goto error_return;
8741 }
8742
8743 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8744 goto error_return_verdef;
8745 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8746 if (contents == NULL)
8747 goto error_return_verdef;
8748
8749 BFD_ASSERT (sizeof (Elf_External_Verdef)
8750 >= sizeof (Elf_External_Verdaux));
8751 contents_end_def = contents + hdr->sh_size
8752 - sizeof (Elf_External_Verdef);
8753 contents_end_aux = contents + hdr->sh_size
8754 - sizeof (Elf_External_Verdaux);
8755
8756 /* We know the number of entries in the section but not the maximum
8757 index. Therefore we have to run through all entries and find
8758 the maximum. */
8759 everdef = (Elf_External_Verdef *) contents;
8760 maxidx = 0;
8761 for (i = 0; i < hdr->sh_info; ++i)
8762 {
8763 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8764
8765 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8766 goto error_return_bad_verdef;
8767 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8768 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8769
8770 if (iverdefmem.vd_next == 0)
8771 break;
8772
8773 if (iverdefmem.vd_next
8774 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8775 goto error_return_bad_verdef;
8776
8777 everdef = ((Elf_External_Verdef *)
8778 ((bfd_byte *) everdef + iverdefmem.vd_next));
8779 }
8780
8781 if (default_imported_symver)
8782 {
8783 if (freeidx > maxidx)
8784 maxidx = ++freeidx;
8785 else
8786 freeidx = ++maxidx;
8787 }
8788 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8789 {
8790 bfd_set_error (bfd_error_file_too_big);
8791 goto error_return_verdef;
8792 }
8793 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8794 if (elf_tdata (abfd)->verdef == NULL)
8795 goto error_return_verdef;
8796
8797 elf_tdata (abfd)->cverdefs = maxidx;
8798
8799 everdef = (Elf_External_Verdef *) contents;
8800 iverdefarr = elf_tdata (abfd)->verdef;
8801 for (i = 0; i < hdr->sh_info; i++)
8802 {
8803 Elf_External_Verdaux *everdaux;
8804 Elf_Internal_Verdaux *iverdaux;
8805 unsigned int j;
8806
8807 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8808
8809 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8810 goto error_return_bad_verdef;
8811
8812 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8813 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8814
8815 iverdef->vd_bfd = abfd;
8816
8817 if (iverdef->vd_cnt == 0)
8818 iverdef->vd_auxptr = NULL;
8819 else
8820 {
8821 if (_bfd_mul_overflow (iverdef->vd_cnt,
8822 sizeof (Elf_Internal_Verdaux), &amt))
8823 {
8824 bfd_set_error (bfd_error_file_too_big);
8825 goto error_return_verdef;
8826 }
8827 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8828 bfd_alloc (abfd, amt);
8829 if (iverdef->vd_auxptr == NULL)
8830 goto error_return_verdef;
8831 }
8832
8833 if (iverdef->vd_aux
8834 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8835 goto error_return_bad_verdef;
8836
8837 everdaux = ((Elf_External_Verdaux *)
8838 ((bfd_byte *) everdef + iverdef->vd_aux));
8839 iverdaux = iverdef->vd_auxptr;
8840 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8841 {
8842 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8843
8844 iverdaux->vda_nodename =
8845 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8846 iverdaux->vda_name);
8847 if (iverdaux->vda_nodename == NULL)
8848 goto error_return_bad_verdef;
8849
8850 iverdaux->vda_nextptr = NULL;
8851 if (iverdaux->vda_next == 0)
8852 {
8853 iverdef->vd_cnt = j + 1;
8854 break;
8855 }
8856 if (j + 1 < iverdef->vd_cnt)
8857 iverdaux->vda_nextptr = iverdaux + 1;
8858
8859 if (iverdaux->vda_next
8860 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8861 goto error_return_bad_verdef;
8862
8863 everdaux = ((Elf_External_Verdaux *)
8864 ((bfd_byte *) everdaux + iverdaux->vda_next));
8865 }
8866
8867 iverdef->vd_nodename = NULL;
8868 if (iverdef->vd_cnt)
8869 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8870
8871 iverdef->vd_nextdef = NULL;
8872 if (iverdef->vd_next == 0)
8873 break;
8874 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8875 iverdef->vd_nextdef = iverdef + 1;
8876
8877 everdef = ((Elf_External_Verdef *)
8878 ((bfd_byte *) everdef + iverdef->vd_next));
8879 }
8880
8881 free (contents);
8882 contents = NULL;
8883 }
8884 else if (default_imported_symver)
8885 {
8886 if (freeidx < 3)
8887 freeidx = 3;
8888 else
8889 freeidx++;
8890
8891 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8892 {
8893 bfd_set_error (bfd_error_file_too_big);
8894 goto error_return;
8895 }
8896 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8897 if (elf_tdata (abfd)->verdef == NULL)
8898 goto error_return;
8899
8900 elf_tdata (abfd)->cverdefs = freeidx;
8901 }
8902
8903 /* Create a default version based on the soname. */
8904 if (default_imported_symver)
8905 {
8906 Elf_Internal_Verdef *iverdef;
8907 Elf_Internal_Verdaux *iverdaux;
8908
8909 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
8910
8911 iverdef->vd_version = VER_DEF_CURRENT;
8912 iverdef->vd_flags = 0;
8913 iverdef->vd_ndx = freeidx;
8914 iverdef->vd_cnt = 1;
8915
8916 iverdef->vd_bfd = abfd;
8917
8918 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8919 if (iverdef->vd_nodename == NULL)
8920 goto error_return_verdef;
8921 iverdef->vd_nextdef = NULL;
8922 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8923 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
8924 if (iverdef->vd_auxptr == NULL)
8925 goto error_return_verdef;
8926
8927 iverdaux = iverdef->vd_auxptr;
8928 iverdaux->vda_nodename = iverdef->vd_nodename;
8929 }
8930
8931 return TRUE;
8932
8933 error_return:
8934 if (contents != NULL)
8935 free (contents);
8936 return FALSE;
8937 }
8938 \f
8939 asymbol *
8940 _bfd_elf_make_empty_symbol (bfd *abfd)
8941 {
8942 elf_symbol_type *newsym;
8943
8944 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
8945 if (!newsym)
8946 return NULL;
8947 newsym->symbol.the_bfd = abfd;
8948 return &newsym->symbol;
8949 }
8950
8951 void
8952 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8953 asymbol *symbol,
8954 symbol_info *ret)
8955 {
8956 bfd_symbol_info (symbol, ret);
8957 }
8958
8959 /* Return whether a symbol name implies a local symbol. Most targets
8960 use this function for the is_local_label_name entry point, but some
8961 override it. */
8962
8963 bfd_boolean
8964 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
8965 const char *name)
8966 {
8967 /* Normal local symbols start with ``.L''. */
8968 if (name[0] == '.' && name[1] == 'L')
8969 return TRUE;
8970
8971 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
8972 DWARF debugging symbols starting with ``..''. */
8973 if (name[0] == '.' && name[1] == '.')
8974 return TRUE;
8975
8976 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
8977 emitting DWARF debugging output. I suspect this is actually a
8978 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
8979 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
8980 underscore to be emitted on some ELF targets). For ease of use,
8981 we treat such symbols as local. */
8982 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
8983 return TRUE;
8984
8985 /* Treat assembler generated fake symbols, dollar local labels and
8986 forward-backward labels (aka local labels) as locals.
8987 These labels have the form:
8988
8989 L0^A.* (fake symbols)
8990
8991 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
8992
8993 Versions which start with .L will have already been matched above,
8994 so we only need to match the rest. */
8995 if (name[0] == 'L' && ISDIGIT (name[1]))
8996 {
8997 bfd_boolean ret = FALSE;
8998 const char * p;
8999 char c;
9000
9001 for (p = name + 2; (c = *p); p++)
9002 {
9003 if (c == 1 || c == 2)
9004 {
9005 if (c == 1 && p == name + 2)
9006 /* A fake symbol. */
9007 return TRUE;
9008
9009 /* FIXME: We are being paranoid here and treating symbols like
9010 L0^Bfoo as if there were non-local, on the grounds that the
9011 assembler will never generate them. But can any symbol
9012 containing an ASCII value in the range 1-31 ever be anything
9013 other than some kind of local ? */
9014 ret = TRUE;
9015 }
9016
9017 if (! ISDIGIT (c))
9018 {
9019 ret = FALSE;
9020 break;
9021 }
9022 }
9023 return ret;
9024 }
9025
9026 return FALSE;
9027 }
9028
9029 alent *
9030 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9031 asymbol *symbol ATTRIBUTE_UNUSED)
9032 {
9033 abort ();
9034 return NULL;
9035 }
9036
9037 bfd_boolean
9038 _bfd_elf_set_arch_mach (bfd *abfd,
9039 enum bfd_architecture arch,
9040 unsigned long machine)
9041 {
9042 /* If this isn't the right architecture for this backend, and this
9043 isn't the generic backend, fail. */
9044 if (arch != get_elf_backend_data (abfd)->arch
9045 && arch != bfd_arch_unknown
9046 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9047 return FALSE;
9048
9049 return bfd_default_set_arch_mach (abfd, arch, machine);
9050 }
9051
9052 /* Find the nearest line to a particular section and offset,
9053 for error reporting. */
9054
9055 bfd_boolean
9056 _bfd_elf_find_nearest_line (bfd *abfd,
9057 asymbol **symbols,
9058 asection *section,
9059 bfd_vma offset,
9060 const char **filename_ptr,
9061 const char **functionname_ptr,
9062 unsigned int *line_ptr,
9063 unsigned int *discriminator_ptr)
9064 {
9065 bfd_boolean found;
9066
9067 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9068 filename_ptr, functionname_ptr,
9069 line_ptr, discriminator_ptr,
9070 dwarf_debug_sections,
9071 &elf_tdata (abfd)->dwarf2_find_line_info))
9072 return TRUE;
9073
9074 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9075 filename_ptr, functionname_ptr, line_ptr))
9076 {
9077 if (!*functionname_ptr)
9078 _bfd_elf_find_function (abfd, symbols, section, offset,
9079 *filename_ptr ? NULL : filename_ptr,
9080 functionname_ptr);
9081 return TRUE;
9082 }
9083
9084 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9085 &found, filename_ptr,
9086 functionname_ptr, line_ptr,
9087 &elf_tdata (abfd)->line_info))
9088 return FALSE;
9089 if (found && (*functionname_ptr || *line_ptr))
9090 return TRUE;
9091
9092 if (symbols == NULL)
9093 return FALSE;
9094
9095 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9096 filename_ptr, functionname_ptr))
9097 return FALSE;
9098
9099 *line_ptr = 0;
9100 return TRUE;
9101 }
9102
9103 /* Find the line for a symbol. */
9104
9105 bfd_boolean
9106 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9107 const char **filename_ptr, unsigned int *line_ptr)
9108 {
9109 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9110 filename_ptr, NULL, line_ptr, NULL,
9111 dwarf_debug_sections,
9112 &elf_tdata (abfd)->dwarf2_find_line_info);
9113 }
9114
9115 /* After a call to bfd_find_nearest_line, successive calls to
9116 bfd_find_inliner_info can be used to get source information about
9117 each level of function inlining that terminated at the address
9118 passed to bfd_find_nearest_line. Currently this is only supported
9119 for DWARF2 with appropriate DWARF3 extensions. */
9120
9121 bfd_boolean
9122 _bfd_elf_find_inliner_info (bfd *abfd,
9123 const char **filename_ptr,
9124 const char **functionname_ptr,
9125 unsigned int *line_ptr)
9126 {
9127 bfd_boolean found;
9128 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9129 functionname_ptr, line_ptr,
9130 & elf_tdata (abfd)->dwarf2_find_line_info);
9131 return found;
9132 }
9133
9134 int
9135 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9136 {
9137 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9138 int ret = bed->s->sizeof_ehdr;
9139
9140 if (!bfd_link_relocatable (info))
9141 {
9142 bfd_size_type phdr_size = elf_program_header_size (abfd);
9143
9144 if (phdr_size == (bfd_size_type) -1)
9145 {
9146 struct elf_segment_map *m;
9147
9148 phdr_size = 0;
9149 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9150 phdr_size += bed->s->sizeof_phdr;
9151
9152 if (phdr_size == 0)
9153 phdr_size = get_program_header_size (abfd, info);
9154 }
9155
9156 elf_program_header_size (abfd) = phdr_size;
9157 ret += phdr_size;
9158 }
9159
9160 return ret;
9161 }
9162
9163 bfd_boolean
9164 _bfd_elf_set_section_contents (bfd *abfd,
9165 sec_ptr section,
9166 const void *location,
9167 file_ptr offset,
9168 bfd_size_type count)
9169 {
9170 Elf_Internal_Shdr *hdr;
9171 file_ptr pos;
9172
9173 if (! abfd->output_has_begun
9174 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9175 return FALSE;
9176
9177 if (!count)
9178 return TRUE;
9179
9180 hdr = &elf_section_data (section)->this_hdr;
9181 if (hdr->sh_offset == (file_ptr) -1)
9182 {
9183 unsigned char *contents;
9184
9185 if (bfd_section_is_ctf (section))
9186 /* Nothing to do with this section: the contents are generated
9187 later. */
9188 return TRUE;
9189
9190 if ((section->flags & SEC_ELF_COMPRESS) == 0)
9191 {
9192 _bfd_error_handler
9193 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9194 abfd, section);
9195 bfd_set_error (bfd_error_invalid_operation);
9196 return FALSE;
9197 }
9198
9199 if ((offset + count) > hdr->sh_size)
9200 {
9201 _bfd_error_handler
9202 (_("%pB:%pA: error: attempting to write over the end of the section"),
9203 abfd, section);
9204
9205 bfd_set_error (bfd_error_invalid_operation);
9206 return FALSE;
9207 }
9208
9209 contents = hdr->contents;
9210 if (contents == NULL)
9211 {
9212 _bfd_error_handler
9213 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9214 abfd, section);
9215
9216 bfd_set_error (bfd_error_invalid_operation);
9217 return FALSE;
9218 }
9219
9220 memcpy (contents + offset, location, count);
9221 return TRUE;
9222 }
9223
9224 pos = hdr->sh_offset + offset;
9225 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9226 || bfd_bwrite (location, count, abfd) != count)
9227 return FALSE;
9228
9229 return TRUE;
9230 }
9231
9232 bfd_boolean
9233 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9234 arelent *cache_ptr ATTRIBUTE_UNUSED,
9235 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9236 {
9237 abort ();
9238 return FALSE;
9239 }
9240
9241 /* Try to convert a non-ELF reloc into an ELF one. */
9242
9243 bfd_boolean
9244 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9245 {
9246 /* Check whether we really have an ELF howto. */
9247
9248 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9249 {
9250 bfd_reloc_code_real_type code;
9251 reloc_howto_type *howto;
9252
9253 /* Alien reloc: Try to determine its type to replace it with an
9254 equivalent ELF reloc. */
9255
9256 if (areloc->howto->pc_relative)
9257 {
9258 switch (areloc->howto->bitsize)
9259 {
9260 case 8:
9261 code = BFD_RELOC_8_PCREL;
9262 break;
9263 case 12:
9264 code = BFD_RELOC_12_PCREL;
9265 break;
9266 case 16:
9267 code = BFD_RELOC_16_PCREL;
9268 break;
9269 case 24:
9270 code = BFD_RELOC_24_PCREL;
9271 break;
9272 case 32:
9273 code = BFD_RELOC_32_PCREL;
9274 break;
9275 case 64:
9276 code = BFD_RELOC_64_PCREL;
9277 break;
9278 default:
9279 goto fail;
9280 }
9281
9282 howto = bfd_reloc_type_lookup (abfd, code);
9283
9284 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9285 {
9286 if (howto->pcrel_offset)
9287 areloc->addend += areloc->address;
9288 else
9289 areloc->addend -= areloc->address; /* addend is unsigned!! */
9290 }
9291 }
9292 else
9293 {
9294 switch (areloc->howto->bitsize)
9295 {
9296 case 8:
9297 code = BFD_RELOC_8;
9298 break;
9299 case 14:
9300 code = BFD_RELOC_14;
9301 break;
9302 case 16:
9303 code = BFD_RELOC_16;
9304 break;
9305 case 26:
9306 code = BFD_RELOC_26;
9307 break;
9308 case 32:
9309 code = BFD_RELOC_32;
9310 break;
9311 case 64:
9312 code = BFD_RELOC_64;
9313 break;
9314 default:
9315 goto fail;
9316 }
9317
9318 howto = bfd_reloc_type_lookup (abfd, code);
9319 }
9320
9321 if (howto)
9322 areloc->howto = howto;
9323 else
9324 goto fail;
9325 }
9326
9327 return TRUE;
9328
9329 fail:
9330 /* xgettext:c-format */
9331 _bfd_error_handler (_("%pB: %s unsupported"),
9332 abfd, areloc->howto->name);
9333 bfd_set_error (bfd_error_sorry);
9334 return FALSE;
9335 }
9336
9337 bfd_boolean
9338 _bfd_elf_close_and_cleanup (bfd *abfd)
9339 {
9340 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9341 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
9342 {
9343 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9344 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9345 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9346 }
9347
9348 return _bfd_generic_close_and_cleanup (abfd);
9349 }
9350
9351 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9352 in the relocation's offset. Thus we cannot allow any sort of sanity
9353 range-checking to interfere. There is nothing else to do in processing
9354 this reloc. */
9355
9356 bfd_reloc_status_type
9357 _bfd_elf_rel_vtable_reloc_fn
9358 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9359 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9360 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9361 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9362 {
9363 return bfd_reloc_ok;
9364 }
9365 \f
9366 /* Elf core file support. Much of this only works on native
9367 toolchains, since we rely on knowing the
9368 machine-dependent procfs structure in order to pick
9369 out details about the corefile. */
9370
9371 #ifdef HAVE_SYS_PROCFS_H
9372 /* Needed for new procfs interface on sparc-solaris. */
9373 # define _STRUCTURED_PROC 1
9374 # include <sys/procfs.h>
9375 #endif
9376
9377 /* Return a PID that identifies a "thread" for threaded cores, or the
9378 PID of the main process for non-threaded cores. */
9379
9380 static int
9381 elfcore_make_pid (bfd *abfd)
9382 {
9383 int pid;
9384
9385 pid = elf_tdata (abfd)->core->lwpid;
9386 if (pid == 0)
9387 pid = elf_tdata (abfd)->core->pid;
9388
9389 return pid;
9390 }
9391
9392 /* If there isn't a section called NAME, make one, using
9393 data from SECT. Note, this function will generate a
9394 reference to NAME, so you shouldn't deallocate or
9395 overwrite it. */
9396
9397 static bfd_boolean
9398 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9399 {
9400 asection *sect2;
9401
9402 if (bfd_get_section_by_name (abfd, name) != NULL)
9403 return TRUE;
9404
9405 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9406 if (sect2 == NULL)
9407 return FALSE;
9408
9409 sect2->size = sect->size;
9410 sect2->filepos = sect->filepos;
9411 sect2->alignment_power = sect->alignment_power;
9412 return TRUE;
9413 }
9414
9415 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9416 actually creates up to two pseudosections:
9417 - For the single-threaded case, a section named NAME, unless
9418 such a section already exists.
9419 - For the multi-threaded case, a section named "NAME/PID", where
9420 PID is elfcore_make_pid (abfd).
9421 Both pseudosections have identical contents. */
9422 bfd_boolean
9423 _bfd_elfcore_make_pseudosection (bfd *abfd,
9424 char *name,
9425 size_t size,
9426 ufile_ptr filepos)
9427 {
9428 char buf[100];
9429 char *threaded_name;
9430 size_t len;
9431 asection *sect;
9432
9433 /* Build the section name. */
9434
9435 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9436 len = strlen (buf) + 1;
9437 threaded_name = (char *) bfd_alloc (abfd, len);
9438 if (threaded_name == NULL)
9439 return FALSE;
9440 memcpy (threaded_name, buf, len);
9441
9442 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9443 SEC_HAS_CONTENTS);
9444 if (sect == NULL)
9445 return FALSE;
9446 sect->size = size;
9447 sect->filepos = filepos;
9448 sect->alignment_power = 2;
9449
9450 return elfcore_maybe_make_sect (abfd, name, sect);
9451 }
9452
9453 static bfd_boolean
9454 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9455 size_t offs)
9456 {
9457 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9458 SEC_HAS_CONTENTS);
9459
9460 if (sect == NULL)
9461 return FALSE;
9462
9463 sect->size = note->descsz - offs;
9464 sect->filepos = note->descpos + offs;
9465 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9466
9467 return TRUE;
9468 }
9469
9470 /* prstatus_t exists on:
9471 solaris 2.5+
9472 linux 2.[01] + glibc
9473 unixware 4.2
9474 */
9475
9476 #if defined (HAVE_PRSTATUS_T)
9477
9478 static bfd_boolean
9479 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9480 {
9481 size_t size;
9482 int offset;
9483
9484 if (note->descsz == sizeof (prstatus_t))
9485 {
9486 prstatus_t prstat;
9487
9488 size = sizeof (prstat.pr_reg);
9489 offset = offsetof (prstatus_t, pr_reg);
9490 memcpy (&prstat, note->descdata, sizeof (prstat));
9491
9492 /* Do not overwrite the core signal if it
9493 has already been set by another thread. */
9494 if (elf_tdata (abfd)->core->signal == 0)
9495 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9496 if (elf_tdata (abfd)->core->pid == 0)
9497 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9498
9499 /* pr_who exists on:
9500 solaris 2.5+
9501 unixware 4.2
9502 pr_who doesn't exist on:
9503 linux 2.[01]
9504 */
9505 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9506 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9507 #else
9508 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9509 #endif
9510 }
9511 #if defined (HAVE_PRSTATUS32_T)
9512 else if (note->descsz == sizeof (prstatus32_t))
9513 {
9514 /* 64-bit host, 32-bit corefile */
9515 prstatus32_t prstat;
9516
9517 size = sizeof (prstat.pr_reg);
9518 offset = offsetof (prstatus32_t, pr_reg);
9519 memcpy (&prstat, note->descdata, sizeof (prstat));
9520
9521 /* Do not overwrite the core signal if it
9522 has already been set by another thread. */
9523 if (elf_tdata (abfd)->core->signal == 0)
9524 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9525 if (elf_tdata (abfd)->core->pid == 0)
9526 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9527
9528 /* pr_who exists on:
9529 solaris 2.5+
9530 unixware 4.2
9531 pr_who doesn't exist on:
9532 linux 2.[01]
9533 */
9534 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9535 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9536 #else
9537 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9538 #endif
9539 }
9540 #endif /* HAVE_PRSTATUS32_T */
9541 else
9542 {
9543 /* Fail - we don't know how to handle any other
9544 note size (ie. data object type). */
9545 return TRUE;
9546 }
9547
9548 /* Make a ".reg/999" section and a ".reg" section. */
9549 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9550 size, note->descpos + offset);
9551 }
9552 #endif /* defined (HAVE_PRSTATUS_T) */
9553
9554 /* Create a pseudosection containing the exact contents of NOTE. */
9555 static bfd_boolean
9556 elfcore_make_note_pseudosection (bfd *abfd,
9557 char *name,
9558 Elf_Internal_Note *note)
9559 {
9560 return _bfd_elfcore_make_pseudosection (abfd, name,
9561 note->descsz, note->descpos);
9562 }
9563
9564 /* There isn't a consistent prfpregset_t across platforms,
9565 but it doesn't matter, because we don't have to pick this
9566 data structure apart. */
9567
9568 static bfd_boolean
9569 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9570 {
9571 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9572 }
9573
9574 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9575 type of NT_PRXFPREG. Just include the whole note's contents
9576 literally. */
9577
9578 static bfd_boolean
9579 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9580 {
9581 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9582 }
9583
9584 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9585 with a note type of NT_X86_XSTATE. Just include the whole note's
9586 contents literally. */
9587
9588 static bfd_boolean
9589 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9590 {
9591 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9592 }
9593
9594 static bfd_boolean
9595 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9596 {
9597 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9598 }
9599
9600 static bfd_boolean
9601 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9602 {
9603 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9604 }
9605
9606 static bfd_boolean
9607 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9608 {
9609 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9610 }
9611
9612 static bfd_boolean
9613 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9614 {
9615 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9616 }
9617
9618 static bfd_boolean
9619 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9620 {
9621 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9622 }
9623
9624 static bfd_boolean
9625 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9626 {
9627 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9628 }
9629
9630 static bfd_boolean
9631 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9632 {
9633 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9634 }
9635
9636 static bfd_boolean
9637 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9638 {
9639 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9640 }
9641
9642 static bfd_boolean
9643 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9644 {
9645 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9646 }
9647
9648 static bfd_boolean
9649 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9650 {
9651 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9652 }
9653
9654 static bfd_boolean
9655 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9656 {
9657 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9658 }
9659
9660 static bfd_boolean
9661 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9662 {
9663 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9664 }
9665
9666 static bfd_boolean
9667 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9668 {
9669 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9670 }
9671
9672 static bfd_boolean
9673 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9674 {
9675 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9676 }
9677
9678 static bfd_boolean
9679 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9680 {
9681 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9682 }
9683
9684 static bfd_boolean
9685 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9686 {
9687 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9688 }
9689
9690 static bfd_boolean
9691 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9692 {
9693 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9694 }
9695
9696 static bfd_boolean
9697 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9698 {
9699 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9700 }
9701
9702 static bfd_boolean
9703 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9704 {
9705 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9706 }
9707
9708 static bfd_boolean
9709 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9710 {
9711 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9712 }
9713
9714 static bfd_boolean
9715 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9716 {
9717 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9718 }
9719
9720 static bfd_boolean
9721 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9722 {
9723 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9724 }
9725
9726 static bfd_boolean
9727 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9728 {
9729 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9730 }
9731
9732 static bfd_boolean
9733 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9734 {
9735 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9736 }
9737
9738 static bfd_boolean
9739 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9740 {
9741 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9742 }
9743
9744 static bfd_boolean
9745 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9746 {
9747 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9748 }
9749
9750 static bfd_boolean
9751 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9752 {
9753 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9754 }
9755
9756 static bfd_boolean
9757 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9758 {
9759 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9760 }
9761
9762 static bfd_boolean
9763 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9764 {
9765 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9766 }
9767
9768 static bfd_boolean
9769 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9770 {
9771 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9772 }
9773
9774 static bfd_boolean
9775 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9776 {
9777 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9778 }
9779
9780 static bfd_boolean
9781 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9782 {
9783 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9784 }
9785
9786 static bfd_boolean
9787 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9788 {
9789 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9790 }
9791
9792 static bfd_boolean
9793 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9794 {
9795 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9796 }
9797
9798 #if defined (HAVE_PRPSINFO_T)
9799 typedef prpsinfo_t elfcore_psinfo_t;
9800 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9801 typedef prpsinfo32_t elfcore_psinfo32_t;
9802 #endif
9803 #endif
9804
9805 #if defined (HAVE_PSINFO_T)
9806 typedef psinfo_t elfcore_psinfo_t;
9807 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9808 typedef psinfo32_t elfcore_psinfo32_t;
9809 #endif
9810 #endif
9811
9812 /* return a malloc'ed copy of a string at START which is at
9813 most MAX bytes long, possibly without a terminating '\0'.
9814 the copy will always have a terminating '\0'. */
9815
9816 char *
9817 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9818 {
9819 char *dups;
9820 char *end = (char *) memchr (start, '\0', max);
9821 size_t len;
9822
9823 if (end == NULL)
9824 len = max;
9825 else
9826 len = end - start;
9827
9828 dups = (char *) bfd_alloc (abfd, len + 1);
9829 if (dups == NULL)
9830 return NULL;
9831
9832 memcpy (dups, start, len);
9833 dups[len] = '\0';
9834
9835 return dups;
9836 }
9837
9838 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9839 static bfd_boolean
9840 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9841 {
9842 if (note->descsz == sizeof (elfcore_psinfo_t))
9843 {
9844 elfcore_psinfo_t psinfo;
9845
9846 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9847
9848 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9849 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9850 #endif
9851 elf_tdata (abfd)->core->program
9852 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9853 sizeof (psinfo.pr_fname));
9854
9855 elf_tdata (abfd)->core->command
9856 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9857 sizeof (psinfo.pr_psargs));
9858 }
9859 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9860 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9861 {
9862 /* 64-bit host, 32-bit corefile */
9863 elfcore_psinfo32_t psinfo;
9864
9865 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9866
9867 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9868 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9869 #endif
9870 elf_tdata (abfd)->core->program
9871 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9872 sizeof (psinfo.pr_fname));
9873
9874 elf_tdata (abfd)->core->command
9875 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9876 sizeof (psinfo.pr_psargs));
9877 }
9878 #endif
9879
9880 else
9881 {
9882 /* Fail - we don't know how to handle any other
9883 note size (ie. data object type). */
9884 return TRUE;
9885 }
9886
9887 /* Note that for some reason, a spurious space is tacked
9888 onto the end of the args in some (at least one anyway)
9889 implementations, so strip it off if it exists. */
9890
9891 {
9892 char *command = elf_tdata (abfd)->core->command;
9893 int n = strlen (command);
9894
9895 if (0 < n && command[n - 1] == ' ')
9896 command[n - 1] = '\0';
9897 }
9898
9899 return TRUE;
9900 }
9901 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9902
9903 #if defined (HAVE_PSTATUS_T)
9904 static bfd_boolean
9905 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
9906 {
9907 if (note->descsz == sizeof (pstatus_t)
9908 #if defined (HAVE_PXSTATUS_T)
9909 || note->descsz == sizeof (pxstatus_t)
9910 #endif
9911 )
9912 {
9913 pstatus_t pstat;
9914
9915 memcpy (&pstat, note->descdata, sizeof (pstat));
9916
9917 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9918 }
9919 #if defined (HAVE_PSTATUS32_T)
9920 else if (note->descsz == sizeof (pstatus32_t))
9921 {
9922 /* 64-bit host, 32-bit corefile */
9923 pstatus32_t pstat;
9924
9925 memcpy (&pstat, note->descdata, sizeof (pstat));
9926
9927 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9928 }
9929 #endif
9930 /* Could grab some more details from the "representative"
9931 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
9932 NT_LWPSTATUS note, presumably. */
9933
9934 return TRUE;
9935 }
9936 #endif /* defined (HAVE_PSTATUS_T) */
9937
9938 #if defined (HAVE_LWPSTATUS_T)
9939 static bfd_boolean
9940 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
9941 {
9942 lwpstatus_t lwpstat;
9943 char buf[100];
9944 char *name;
9945 size_t len;
9946 asection *sect;
9947
9948 if (note->descsz != sizeof (lwpstat)
9949 #if defined (HAVE_LWPXSTATUS_T)
9950 && note->descsz != sizeof (lwpxstatus_t)
9951 #endif
9952 )
9953 return TRUE;
9954
9955 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
9956
9957 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
9958 /* Do not overwrite the core signal if it has already been set by
9959 another thread. */
9960 if (elf_tdata (abfd)->core->signal == 0)
9961 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
9962
9963 /* Make a ".reg/999" section. */
9964
9965 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
9966 len = strlen (buf) + 1;
9967 name = bfd_alloc (abfd, len);
9968 if (name == NULL)
9969 return FALSE;
9970 memcpy (name, buf, len);
9971
9972 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
9973 if (sect == NULL)
9974 return FALSE;
9975
9976 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
9977 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
9978 sect->filepos = note->descpos
9979 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
9980 #endif
9981
9982 #if defined (HAVE_LWPSTATUS_T_PR_REG)
9983 sect->size = sizeof (lwpstat.pr_reg);
9984 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
9985 #endif
9986
9987 sect->alignment_power = 2;
9988
9989 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
9990 return FALSE;
9991
9992 /* Make a ".reg2/999" section */
9993
9994 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
9995 len = strlen (buf) + 1;
9996 name = bfd_alloc (abfd, len);
9997 if (name == NULL)
9998 return FALSE;
9999 memcpy (name, buf, len);
10000
10001 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10002 if (sect == NULL)
10003 return FALSE;
10004
10005 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10006 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10007 sect->filepos = note->descpos
10008 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10009 #endif
10010
10011 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10012 sect->size = sizeof (lwpstat.pr_fpreg);
10013 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10014 #endif
10015
10016 sect->alignment_power = 2;
10017
10018 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10019 }
10020 #endif /* defined (HAVE_LWPSTATUS_T) */
10021
10022 static bfd_boolean
10023 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10024 {
10025 char buf[30];
10026 char *name;
10027 size_t len;
10028 asection *sect;
10029 int type;
10030 int is_active_thread;
10031 bfd_vma base_addr;
10032
10033 if (note->descsz < 728)
10034 return TRUE;
10035
10036 if (! CONST_STRNEQ (note->namedata, "win32"))
10037 return TRUE;
10038
10039 type = bfd_get_32 (abfd, note->descdata);
10040
10041 switch (type)
10042 {
10043 case 1 /* NOTE_INFO_PROCESS */:
10044 /* FIXME: need to add ->core->command. */
10045 /* process_info.pid */
10046 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
10047 /* process_info.signal */
10048 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
10049 break;
10050
10051 case 2 /* NOTE_INFO_THREAD */:
10052 /* Make a ".reg/999" section. */
10053 /* thread_info.tid */
10054 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
10055
10056 len = strlen (buf) + 1;
10057 name = (char *) bfd_alloc (abfd, len);
10058 if (name == NULL)
10059 return FALSE;
10060
10061 memcpy (name, buf, len);
10062
10063 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10064 if (sect == NULL)
10065 return FALSE;
10066
10067 /* sizeof (thread_info.thread_context) */
10068 sect->size = 716;
10069 /* offsetof (thread_info.thread_context) */
10070 sect->filepos = note->descpos + 12;
10071 sect->alignment_power = 2;
10072
10073 /* thread_info.is_active_thread */
10074 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10075
10076 if (is_active_thread)
10077 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10078 return FALSE;
10079 break;
10080
10081 case 3 /* NOTE_INFO_MODULE */:
10082 /* Make a ".module/xxxxxxxx" section. */
10083 /* module_info.base_address */
10084 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10085 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10086
10087 len = strlen (buf) + 1;
10088 name = (char *) bfd_alloc (abfd, len);
10089 if (name == NULL)
10090 return FALSE;
10091
10092 memcpy (name, buf, len);
10093
10094 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10095
10096 if (sect == NULL)
10097 return FALSE;
10098
10099 sect->size = note->descsz;
10100 sect->filepos = note->descpos;
10101 sect->alignment_power = 2;
10102 break;
10103
10104 default:
10105 return TRUE;
10106 }
10107
10108 return TRUE;
10109 }
10110
10111 static bfd_boolean
10112 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10113 {
10114 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10115
10116 switch (note->type)
10117 {
10118 default:
10119 return TRUE;
10120
10121 case NT_PRSTATUS:
10122 if (bed->elf_backend_grok_prstatus)
10123 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10124 return TRUE;
10125 #if defined (HAVE_PRSTATUS_T)
10126 return elfcore_grok_prstatus (abfd, note);
10127 #else
10128 return TRUE;
10129 #endif
10130
10131 #if defined (HAVE_PSTATUS_T)
10132 case NT_PSTATUS:
10133 return elfcore_grok_pstatus (abfd, note);
10134 #endif
10135
10136 #if defined (HAVE_LWPSTATUS_T)
10137 case NT_LWPSTATUS:
10138 return elfcore_grok_lwpstatus (abfd, note);
10139 #endif
10140
10141 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10142 return elfcore_grok_prfpreg (abfd, note);
10143
10144 case NT_WIN32PSTATUS:
10145 return elfcore_grok_win32pstatus (abfd, note);
10146
10147 case NT_PRXFPREG: /* Linux SSE extension */
10148 if (note->namesz == 6
10149 && strcmp (note->namedata, "LINUX") == 0)
10150 return elfcore_grok_prxfpreg (abfd, note);
10151 else
10152 return TRUE;
10153
10154 case NT_X86_XSTATE: /* Linux XSAVE extension */
10155 if (note->namesz == 6
10156 && strcmp (note->namedata, "LINUX") == 0)
10157 return elfcore_grok_xstatereg (abfd, note);
10158 else
10159 return TRUE;
10160
10161 case NT_PPC_VMX:
10162 if (note->namesz == 6
10163 && strcmp (note->namedata, "LINUX") == 0)
10164 return elfcore_grok_ppc_vmx (abfd, note);
10165 else
10166 return TRUE;
10167
10168 case NT_PPC_VSX:
10169 if (note->namesz == 6
10170 && strcmp (note->namedata, "LINUX") == 0)
10171 return elfcore_grok_ppc_vsx (abfd, note);
10172 else
10173 return TRUE;
10174
10175 case NT_PPC_TAR:
10176 if (note->namesz == 6
10177 && strcmp (note->namedata, "LINUX") == 0)
10178 return elfcore_grok_ppc_tar (abfd, note);
10179 else
10180 return TRUE;
10181
10182 case NT_PPC_PPR:
10183 if (note->namesz == 6
10184 && strcmp (note->namedata, "LINUX") == 0)
10185 return elfcore_grok_ppc_ppr (abfd, note);
10186 else
10187 return TRUE;
10188
10189 case NT_PPC_DSCR:
10190 if (note->namesz == 6
10191 && strcmp (note->namedata, "LINUX") == 0)
10192 return elfcore_grok_ppc_dscr (abfd, note);
10193 else
10194 return TRUE;
10195
10196 case NT_PPC_EBB:
10197 if (note->namesz == 6
10198 && strcmp (note->namedata, "LINUX") == 0)
10199 return elfcore_grok_ppc_ebb (abfd, note);
10200 else
10201 return TRUE;
10202
10203 case NT_PPC_PMU:
10204 if (note->namesz == 6
10205 && strcmp (note->namedata, "LINUX") == 0)
10206 return elfcore_grok_ppc_pmu (abfd, note);
10207 else
10208 return TRUE;
10209
10210 case NT_PPC_TM_CGPR:
10211 if (note->namesz == 6
10212 && strcmp (note->namedata, "LINUX") == 0)
10213 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10214 else
10215 return TRUE;
10216
10217 case NT_PPC_TM_CFPR:
10218 if (note->namesz == 6
10219 && strcmp (note->namedata, "LINUX") == 0)
10220 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10221 else
10222 return TRUE;
10223
10224 case NT_PPC_TM_CVMX:
10225 if (note->namesz == 6
10226 && strcmp (note->namedata, "LINUX") == 0)
10227 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10228 else
10229 return TRUE;
10230
10231 case NT_PPC_TM_CVSX:
10232 if (note->namesz == 6
10233 && strcmp (note->namedata, "LINUX") == 0)
10234 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10235 else
10236 return TRUE;
10237
10238 case NT_PPC_TM_SPR:
10239 if (note->namesz == 6
10240 && strcmp (note->namedata, "LINUX") == 0)
10241 return elfcore_grok_ppc_tm_spr (abfd, note);
10242 else
10243 return TRUE;
10244
10245 case NT_PPC_TM_CTAR:
10246 if (note->namesz == 6
10247 && strcmp (note->namedata, "LINUX") == 0)
10248 return elfcore_grok_ppc_tm_ctar (abfd, note);
10249 else
10250 return TRUE;
10251
10252 case NT_PPC_TM_CPPR:
10253 if (note->namesz == 6
10254 && strcmp (note->namedata, "LINUX") == 0)
10255 return elfcore_grok_ppc_tm_cppr (abfd, note);
10256 else
10257 return TRUE;
10258
10259 case NT_PPC_TM_CDSCR:
10260 if (note->namesz == 6
10261 && strcmp (note->namedata, "LINUX") == 0)
10262 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10263 else
10264 return TRUE;
10265
10266 case NT_S390_HIGH_GPRS:
10267 if (note->namesz == 6
10268 && strcmp (note->namedata, "LINUX") == 0)
10269 return elfcore_grok_s390_high_gprs (abfd, note);
10270 else
10271 return TRUE;
10272
10273 case NT_S390_TIMER:
10274 if (note->namesz == 6
10275 && strcmp (note->namedata, "LINUX") == 0)
10276 return elfcore_grok_s390_timer (abfd, note);
10277 else
10278 return TRUE;
10279
10280 case NT_S390_TODCMP:
10281 if (note->namesz == 6
10282 && strcmp (note->namedata, "LINUX") == 0)
10283 return elfcore_grok_s390_todcmp (abfd, note);
10284 else
10285 return TRUE;
10286
10287 case NT_S390_TODPREG:
10288 if (note->namesz == 6
10289 && strcmp (note->namedata, "LINUX") == 0)
10290 return elfcore_grok_s390_todpreg (abfd, note);
10291 else
10292 return TRUE;
10293
10294 case NT_S390_CTRS:
10295 if (note->namesz == 6
10296 && strcmp (note->namedata, "LINUX") == 0)
10297 return elfcore_grok_s390_ctrs (abfd, note);
10298 else
10299 return TRUE;
10300
10301 case NT_S390_PREFIX:
10302 if (note->namesz == 6
10303 && strcmp (note->namedata, "LINUX") == 0)
10304 return elfcore_grok_s390_prefix (abfd, note);
10305 else
10306 return TRUE;
10307
10308 case NT_S390_LAST_BREAK:
10309 if (note->namesz == 6
10310 && strcmp (note->namedata, "LINUX") == 0)
10311 return elfcore_grok_s390_last_break (abfd, note);
10312 else
10313 return TRUE;
10314
10315 case NT_S390_SYSTEM_CALL:
10316 if (note->namesz == 6
10317 && strcmp (note->namedata, "LINUX") == 0)
10318 return elfcore_grok_s390_system_call (abfd, note);
10319 else
10320 return TRUE;
10321
10322 case NT_S390_TDB:
10323 if (note->namesz == 6
10324 && strcmp (note->namedata, "LINUX") == 0)
10325 return elfcore_grok_s390_tdb (abfd, note);
10326 else
10327 return TRUE;
10328
10329 case NT_S390_VXRS_LOW:
10330 if (note->namesz == 6
10331 && strcmp (note->namedata, "LINUX") == 0)
10332 return elfcore_grok_s390_vxrs_low (abfd, note);
10333 else
10334 return TRUE;
10335
10336 case NT_S390_VXRS_HIGH:
10337 if (note->namesz == 6
10338 && strcmp (note->namedata, "LINUX") == 0)
10339 return elfcore_grok_s390_vxrs_high (abfd, note);
10340 else
10341 return TRUE;
10342
10343 case NT_S390_GS_CB:
10344 if (note->namesz == 6
10345 && strcmp (note->namedata, "LINUX") == 0)
10346 return elfcore_grok_s390_gs_cb (abfd, note);
10347 else
10348 return TRUE;
10349
10350 case NT_S390_GS_BC:
10351 if (note->namesz == 6
10352 && strcmp (note->namedata, "LINUX") == 0)
10353 return elfcore_grok_s390_gs_bc (abfd, note);
10354 else
10355 return TRUE;
10356
10357 case NT_ARM_VFP:
10358 if (note->namesz == 6
10359 && strcmp (note->namedata, "LINUX") == 0)
10360 return elfcore_grok_arm_vfp (abfd, note);
10361 else
10362 return TRUE;
10363
10364 case NT_ARM_TLS:
10365 if (note->namesz == 6
10366 && strcmp (note->namedata, "LINUX") == 0)
10367 return elfcore_grok_aarch_tls (abfd, note);
10368 else
10369 return TRUE;
10370
10371 case NT_ARM_HW_BREAK:
10372 if (note->namesz == 6
10373 && strcmp (note->namedata, "LINUX") == 0)
10374 return elfcore_grok_aarch_hw_break (abfd, note);
10375 else
10376 return TRUE;
10377
10378 case NT_ARM_HW_WATCH:
10379 if (note->namesz == 6
10380 && strcmp (note->namedata, "LINUX") == 0)
10381 return elfcore_grok_aarch_hw_watch (abfd, note);
10382 else
10383 return TRUE;
10384
10385 case NT_ARM_SVE:
10386 if (note->namesz == 6
10387 && strcmp (note->namedata, "LINUX") == 0)
10388 return elfcore_grok_aarch_sve (abfd, note);
10389 else
10390 return TRUE;
10391
10392 case NT_ARM_PAC_MASK:
10393 if (note->namesz == 6
10394 && strcmp (note->namedata, "LINUX") == 0)
10395 return elfcore_grok_aarch_pauth (abfd, note);
10396 else
10397 return TRUE;
10398
10399 case NT_PRPSINFO:
10400 case NT_PSINFO:
10401 if (bed->elf_backend_grok_psinfo)
10402 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10403 return TRUE;
10404 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10405 return elfcore_grok_psinfo (abfd, note);
10406 #else
10407 return TRUE;
10408 #endif
10409
10410 case NT_AUXV:
10411 return elfcore_make_auxv_note_section (abfd, note, 0);
10412
10413 case NT_FILE:
10414 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10415 note);
10416
10417 case NT_SIGINFO:
10418 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10419 note);
10420
10421 }
10422 }
10423
10424 static bfd_boolean
10425 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10426 {
10427 struct bfd_build_id* build_id;
10428
10429 if (note->descsz == 0)
10430 return FALSE;
10431
10432 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10433 if (build_id == NULL)
10434 return FALSE;
10435
10436 build_id->size = note->descsz;
10437 memcpy (build_id->data, note->descdata, note->descsz);
10438 abfd->build_id = build_id;
10439
10440 return TRUE;
10441 }
10442
10443 static bfd_boolean
10444 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10445 {
10446 switch (note->type)
10447 {
10448 default:
10449 return TRUE;
10450
10451 case NT_GNU_PROPERTY_TYPE_0:
10452 return _bfd_elf_parse_gnu_properties (abfd, note);
10453
10454 case NT_GNU_BUILD_ID:
10455 return elfobj_grok_gnu_build_id (abfd, note);
10456 }
10457 }
10458
10459 static bfd_boolean
10460 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10461 {
10462 struct sdt_note *cur =
10463 (struct sdt_note *) bfd_alloc (abfd,
10464 sizeof (struct sdt_note) + note->descsz);
10465
10466 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10467 cur->size = (bfd_size_type) note->descsz;
10468 memcpy (cur->data, note->descdata, note->descsz);
10469
10470 elf_tdata (abfd)->sdt_note_head = cur;
10471
10472 return TRUE;
10473 }
10474
10475 static bfd_boolean
10476 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10477 {
10478 switch (note->type)
10479 {
10480 case NT_STAPSDT:
10481 return elfobj_grok_stapsdt_note_1 (abfd, note);
10482
10483 default:
10484 return TRUE;
10485 }
10486 }
10487
10488 static bfd_boolean
10489 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10490 {
10491 size_t offset;
10492
10493 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10494 {
10495 case ELFCLASS32:
10496 if (note->descsz < 108)
10497 return FALSE;
10498 break;
10499
10500 case ELFCLASS64:
10501 if (note->descsz < 120)
10502 return FALSE;
10503 break;
10504
10505 default:
10506 return FALSE;
10507 }
10508
10509 /* Check for version 1 in pr_version. */
10510 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10511 return FALSE;
10512
10513 offset = 4;
10514
10515 /* Skip over pr_psinfosz. */
10516 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10517 offset += 4;
10518 else
10519 {
10520 offset += 4; /* Padding before pr_psinfosz. */
10521 offset += 8;
10522 }
10523
10524 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10525 elf_tdata (abfd)->core->program
10526 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10527 offset += 17;
10528
10529 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10530 elf_tdata (abfd)->core->command
10531 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10532 offset += 81;
10533
10534 /* Padding before pr_pid. */
10535 offset += 2;
10536
10537 /* The pr_pid field was added in version "1a". */
10538 if (note->descsz < offset + 4)
10539 return TRUE;
10540
10541 elf_tdata (abfd)->core->pid
10542 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10543
10544 return TRUE;
10545 }
10546
10547 static bfd_boolean
10548 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10549 {
10550 size_t offset;
10551 size_t size;
10552 size_t min_size;
10553
10554 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10555 Also compute minimum size of this note. */
10556 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10557 {
10558 case ELFCLASS32:
10559 offset = 4 + 4;
10560 min_size = offset + (4 * 2) + 4 + 4 + 4;
10561 break;
10562
10563 case ELFCLASS64:
10564 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10565 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10566 break;
10567
10568 default:
10569 return FALSE;
10570 }
10571
10572 if (note->descsz < min_size)
10573 return FALSE;
10574
10575 /* Check for version 1 in pr_version. */
10576 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10577 return FALSE;
10578
10579 /* Extract size of pr_reg from pr_gregsetsz. */
10580 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10581 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10582 {
10583 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10584 offset += 4 * 2;
10585 }
10586 else
10587 {
10588 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10589 offset += 8 * 2;
10590 }
10591
10592 /* Skip over pr_osreldate. */
10593 offset += 4;
10594
10595 /* Read signal from pr_cursig. */
10596 if (elf_tdata (abfd)->core->signal == 0)
10597 elf_tdata (abfd)->core->signal
10598 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10599 offset += 4;
10600
10601 /* Read TID from pr_pid. */
10602 elf_tdata (abfd)->core->lwpid
10603 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10604 offset += 4;
10605
10606 /* Padding before pr_reg. */
10607 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10608 offset += 4;
10609
10610 /* Make sure that there is enough data remaining in the note. */
10611 if ((note->descsz - offset) < size)
10612 return FALSE;
10613
10614 /* Make a ".reg/999" section and a ".reg" section. */
10615 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10616 size, note->descpos + offset);
10617 }
10618
10619 static bfd_boolean
10620 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10621 {
10622 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10623
10624 switch (note->type)
10625 {
10626 case NT_PRSTATUS:
10627 if (bed->elf_backend_grok_freebsd_prstatus)
10628 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10629 return TRUE;
10630 return elfcore_grok_freebsd_prstatus (abfd, note);
10631
10632 case NT_FPREGSET:
10633 return elfcore_grok_prfpreg (abfd, note);
10634
10635 case NT_PRPSINFO:
10636 return elfcore_grok_freebsd_psinfo (abfd, note);
10637
10638 case NT_FREEBSD_THRMISC:
10639 if (note->namesz == 8)
10640 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10641 else
10642 return TRUE;
10643
10644 case NT_FREEBSD_PROCSTAT_PROC:
10645 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10646 note);
10647
10648 case NT_FREEBSD_PROCSTAT_FILES:
10649 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10650 note);
10651
10652 case NT_FREEBSD_PROCSTAT_VMMAP:
10653 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10654 note);
10655
10656 case NT_FREEBSD_PROCSTAT_AUXV:
10657 return elfcore_make_auxv_note_section (abfd, note, 4);
10658
10659 case NT_X86_XSTATE:
10660 if (note->namesz == 8)
10661 return elfcore_grok_xstatereg (abfd, note);
10662 else
10663 return TRUE;
10664
10665 case NT_FREEBSD_PTLWPINFO:
10666 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10667 note);
10668
10669 case NT_ARM_VFP:
10670 return elfcore_grok_arm_vfp (abfd, note);
10671
10672 default:
10673 return TRUE;
10674 }
10675 }
10676
10677 static bfd_boolean
10678 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10679 {
10680 char *cp;
10681
10682 cp = strchr (note->namedata, '@');
10683 if (cp != NULL)
10684 {
10685 *lwpidp = atoi(cp + 1);
10686 return TRUE;
10687 }
10688 return FALSE;
10689 }
10690
10691 static bfd_boolean
10692 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10693 {
10694 if (note->descsz <= 0x7c + 31)
10695 return FALSE;
10696
10697 /* Signal number at offset 0x08. */
10698 elf_tdata (abfd)->core->signal
10699 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10700
10701 /* Process ID at offset 0x50. */
10702 elf_tdata (abfd)->core->pid
10703 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10704
10705 /* Command name at 0x7c (max 32 bytes, including nul). */
10706 elf_tdata (abfd)->core->command
10707 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10708
10709 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10710 note);
10711 }
10712
10713 static bfd_boolean
10714 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10715 {
10716 int lwp;
10717
10718 if (elfcore_netbsd_get_lwpid (note, &lwp))
10719 elf_tdata (abfd)->core->lwpid = lwp;
10720
10721 switch (note->type)
10722 {
10723 case NT_NETBSDCORE_PROCINFO:
10724 /* NetBSD-specific core "procinfo". Note that we expect to
10725 find this note before any of the others, which is fine,
10726 since the kernel writes this note out first when it
10727 creates a core file. */
10728 return elfcore_grok_netbsd_procinfo (abfd, note);
10729 #ifdef NT_NETBSDCORE_AUXV
10730 case NT_NETBSDCORE_AUXV:
10731 /* NetBSD-specific Elf Auxiliary Vector data. */
10732 return elfcore_make_auxv_note_section (abfd, note, 4);
10733 #endif
10734 default:
10735 break;
10736 }
10737
10738 /* As of March 2017 there are no other machine-independent notes
10739 defined for NetBSD core files. If the note type is less
10740 than the start of the machine-dependent note types, we don't
10741 understand it. */
10742
10743 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10744 return TRUE;
10745
10746
10747 switch (bfd_get_arch (abfd))
10748 {
10749 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10750 PT_GETFPREGS == mach+2. */
10751
10752 case bfd_arch_alpha:
10753 case bfd_arch_sparc:
10754 switch (note->type)
10755 {
10756 case NT_NETBSDCORE_FIRSTMACH+0:
10757 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10758
10759 case NT_NETBSDCORE_FIRSTMACH+2:
10760 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10761
10762 default:
10763 return TRUE;
10764 }
10765
10766 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10767 There's also old PT___GETREGS40 == mach + 1 for old reg
10768 structure which lacks GBR. */
10769
10770 case bfd_arch_sh:
10771 switch (note->type)
10772 {
10773 case NT_NETBSDCORE_FIRSTMACH+3:
10774 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10775
10776 case NT_NETBSDCORE_FIRSTMACH+5:
10777 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10778
10779 default:
10780 return TRUE;
10781 }
10782
10783 /* On all other arch's, PT_GETREGS == mach+1 and
10784 PT_GETFPREGS == mach+3. */
10785
10786 default:
10787 switch (note->type)
10788 {
10789 case NT_NETBSDCORE_FIRSTMACH+1:
10790 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10791
10792 case NT_NETBSDCORE_FIRSTMACH+3:
10793 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10794
10795 default:
10796 return TRUE;
10797 }
10798 }
10799 /* NOTREACHED */
10800 }
10801
10802 static bfd_boolean
10803 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10804 {
10805 if (note->descsz <= 0x48 + 31)
10806 return FALSE;
10807
10808 /* Signal number at offset 0x08. */
10809 elf_tdata (abfd)->core->signal
10810 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10811
10812 /* Process ID at offset 0x20. */
10813 elf_tdata (abfd)->core->pid
10814 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10815
10816 /* Command name at 0x48 (max 32 bytes, including nul). */
10817 elf_tdata (abfd)->core->command
10818 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10819
10820 return TRUE;
10821 }
10822
10823 static bfd_boolean
10824 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10825 {
10826 if (note->type == NT_OPENBSD_PROCINFO)
10827 return elfcore_grok_openbsd_procinfo (abfd, note);
10828
10829 if (note->type == NT_OPENBSD_REGS)
10830 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10831
10832 if (note->type == NT_OPENBSD_FPREGS)
10833 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10834
10835 if (note->type == NT_OPENBSD_XFPREGS)
10836 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10837
10838 if (note->type == NT_OPENBSD_AUXV)
10839 return elfcore_make_auxv_note_section (abfd, note, 0);
10840
10841 if (note->type == NT_OPENBSD_WCOOKIE)
10842 {
10843 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10844 SEC_HAS_CONTENTS);
10845
10846 if (sect == NULL)
10847 return FALSE;
10848 sect->size = note->descsz;
10849 sect->filepos = note->descpos;
10850 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10851
10852 return TRUE;
10853 }
10854
10855 return TRUE;
10856 }
10857
10858 static bfd_boolean
10859 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
10860 {
10861 void *ddata = note->descdata;
10862 char buf[100];
10863 char *name;
10864 asection *sect;
10865 short sig;
10866 unsigned flags;
10867
10868 if (note->descsz < 16)
10869 return FALSE;
10870
10871 /* nto_procfs_status 'pid' field is at offset 0. */
10872 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
10873
10874 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10875 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10876
10877 /* nto_procfs_status 'flags' field is at offset 8. */
10878 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
10879
10880 /* nto_procfs_status 'what' field is at offset 14. */
10881 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10882 {
10883 elf_tdata (abfd)->core->signal = sig;
10884 elf_tdata (abfd)->core->lwpid = *tid;
10885 }
10886
10887 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10888 do not come from signals so we make sure we set the current
10889 thread just in case. */
10890 if (flags & 0x00000080)
10891 elf_tdata (abfd)->core->lwpid = *tid;
10892
10893 /* Make a ".qnx_core_status/%d" section. */
10894 sprintf (buf, ".qnx_core_status/%ld", *tid);
10895
10896 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10897 if (name == NULL)
10898 return FALSE;
10899 strcpy (name, buf);
10900
10901 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10902 if (sect == NULL)
10903 return FALSE;
10904
10905 sect->size = note->descsz;
10906 sect->filepos = note->descpos;
10907 sect->alignment_power = 2;
10908
10909 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10910 }
10911
10912 static bfd_boolean
10913 elfcore_grok_nto_regs (bfd *abfd,
10914 Elf_Internal_Note *note,
10915 long tid,
10916 char *base)
10917 {
10918 char buf[100];
10919 char *name;
10920 asection *sect;
10921
10922 /* Make a "(base)/%d" section. */
10923 sprintf (buf, "%s/%ld", base, tid);
10924
10925 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10926 if (name == NULL)
10927 return FALSE;
10928 strcpy (name, buf);
10929
10930 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10931 if (sect == NULL)
10932 return FALSE;
10933
10934 sect->size = note->descsz;
10935 sect->filepos = note->descpos;
10936 sect->alignment_power = 2;
10937
10938 /* This is the current thread. */
10939 if (elf_tdata (abfd)->core->lwpid == tid)
10940 return elfcore_maybe_make_sect (abfd, base, sect);
10941
10942 return TRUE;
10943 }
10944
10945 #define BFD_QNT_CORE_INFO 7
10946 #define BFD_QNT_CORE_STATUS 8
10947 #define BFD_QNT_CORE_GREG 9
10948 #define BFD_QNT_CORE_FPREG 10
10949
10950 static bfd_boolean
10951 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
10952 {
10953 /* Every GREG section has a STATUS section before it. Store the
10954 tid from the previous call to pass down to the next gregs
10955 function. */
10956 static long tid = 1;
10957
10958 switch (note->type)
10959 {
10960 case BFD_QNT_CORE_INFO:
10961 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
10962 case BFD_QNT_CORE_STATUS:
10963 return elfcore_grok_nto_status (abfd, note, &tid);
10964 case BFD_QNT_CORE_GREG:
10965 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
10966 case BFD_QNT_CORE_FPREG:
10967 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
10968 default:
10969 return TRUE;
10970 }
10971 }
10972
10973 static bfd_boolean
10974 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
10975 {
10976 char *name;
10977 asection *sect;
10978 size_t len;
10979
10980 /* Use note name as section name. */
10981 len = note->namesz;
10982 name = (char *) bfd_alloc (abfd, len);
10983 if (name == NULL)
10984 return FALSE;
10985 memcpy (name, note->namedata, len);
10986 name[len - 1] = '\0';
10987
10988 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10989 if (sect == NULL)
10990 return FALSE;
10991
10992 sect->size = note->descsz;
10993 sect->filepos = note->descpos;
10994 sect->alignment_power = 1;
10995
10996 return TRUE;
10997 }
10998
10999 /* Function: elfcore_write_note
11000
11001 Inputs:
11002 buffer to hold note, and current size of buffer
11003 name of note
11004 type of note
11005 data for note
11006 size of data for note
11007
11008 Writes note to end of buffer. ELF64 notes are written exactly as
11009 for ELF32, despite the current (as of 2006) ELF gabi specifying
11010 that they ought to have 8-byte namesz and descsz field, and have
11011 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11012
11013 Return:
11014 Pointer to realloc'd buffer, *BUFSIZ updated. */
11015
11016 char *
11017 elfcore_write_note (bfd *abfd,
11018 char *buf,
11019 int *bufsiz,
11020 const char *name,
11021 int type,
11022 const void *input,
11023 int size)
11024 {
11025 Elf_External_Note *xnp;
11026 size_t namesz;
11027 size_t newspace;
11028 char *dest;
11029
11030 namesz = 0;
11031 if (name != NULL)
11032 namesz = strlen (name) + 1;
11033
11034 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11035
11036 buf = (char *) realloc (buf, *bufsiz + newspace);
11037 if (buf == NULL)
11038 return buf;
11039 dest = buf + *bufsiz;
11040 *bufsiz += newspace;
11041 xnp = (Elf_External_Note *) dest;
11042 H_PUT_32 (abfd, namesz, xnp->namesz);
11043 H_PUT_32 (abfd, size, xnp->descsz);
11044 H_PUT_32 (abfd, type, xnp->type);
11045 dest = xnp->name;
11046 if (name != NULL)
11047 {
11048 memcpy (dest, name, namesz);
11049 dest += namesz;
11050 while (namesz & 3)
11051 {
11052 *dest++ = '\0';
11053 ++namesz;
11054 }
11055 }
11056 memcpy (dest, input, size);
11057 dest += size;
11058 while (size & 3)
11059 {
11060 *dest++ = '\0';
11061 ++size;
11062 }
11063 return buf;
11064 }
11065
11066 /* gcc-8 warns (*) on all the strncpy calls in this function about
11067 possible string truncation. The "truncation" is not a bug. We
11068 have an external representation of structs with fields that are not
11069 necessarily NULL terminated and corresponding internal
11070 representation fields that are one larger so that they can always
11071 be NULL terminated.
11072 gcc versions between 4.2 and 4.6 do not allow pragma control of
11073 diagnostics inside functions, giving a hard error if you try to use
11074 the finer control available with later versions.
11075 gcc prior to 4.2 warns about diagnostic push and pop.
11076 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11077 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11078 (*) Depending on your system header files! */
11079 #if GCC_VERSION >= 8000
11080 # pragma GCC diagnostic push
11081 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11082 #endif
11083 char *
11084 elfcore_write_prpsinfo (bfd *abfd,
11085 char *buf,
11086 int *bufsiz,
11087 const char *fname,
11088 const char *psargs)
11089 {
11090 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11091
11092 if (bed->elf_backend_write_core_note != NULL)
11093 {
11094 char *ret;
11095 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11096 NT_PRPSINFO, fname, psargs);
11097 if (ret != NULL)
11098 return ret;
11099 }
11100
11101 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11102 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11103 if (bed->s->elfclass == ELFCLASS32)
11104 {
11105 # if defined (HAVE_PSINFO32_T)
11106 psinfo32_t data;
11107 int note_type = NT_PSINFO;
11108 # else
11109 prpsinfo32_t data;
11110 int note_type = NT_PRPSINFO;
11111 # endif
11112
11113 memset (&data, 0, sizeof (data));
11114 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11115 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11116 return elfcore_write_note (abfd, buf, bufsiz,
11117 "CORE", note_type, &data, sizeof (data));
11118 }
11119 else
11120 # endif
11121 {
11122 # if defined (HAVE_PSINFO_T)
11123 psinfo_t data;
11124 int note_type = NT_PSINFO;
11125 # else
11126 prpsinfo_t data;
11127 int note_type = NT_PRPSINFO;
11128 # endif
11129
11130 memset (&data, 0, sizeof (data));
11131 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11132 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11133 return elfcore_write_note (abfd, buf, bufsiz,
11134 "CORE", note_type, &data, sizeof (data));
11135 }
11136 #endif /* PSINFO_T or PRPSINFO_T */
11137
11138 free (buf);
11139 return NULL;
11140 }
11141 #if GCC_VERSION >= 8000
11142 # pragma GCC diagnostic pop
11143 #endif
11144
11145 char *
11146 elfcore_write_linux_prpsinfo32
11147 (bfd *abfd, char *buf, int *bufsiz,
11148 const struct elf_internal_linux_prpsinfo *prpsinfo)
11149 {
11150 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11151 {
11152 struct elf_external_linux_prpsinfo32_ugid16 data;
11153
11154 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11155 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11156 &data, sizeof (data));
11157 }
11158 else
11159 {
11160 struct elf_external_linux_prpsinfo32_ugid32 data;
11161
11162 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11163 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11164 &data, sizeof (data));
11165 }
11166 }
11167
11168 char *
11169 elfcore_write_linux_prpsinfo64
11170 (bfd *abfd, char *buf, int *bufsiz,
11171 const struct elf_internal_linux_prpsinfo *prpsinfo)
11172 {
11173 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11174 {
11175 struct elf_external_linux_prpsinfo64_ugid16 data;
11176
11177 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11178 return elfcore_write_note (abfd, buf, bufsiz,
11179 "CORE", NT_PRPSINFO, &data, sizeof (data));
11180 }
11181 else
11182 {
11183 struct elf_external_linux_prpsinfo64_ugid32 data;
11184
11185 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11186 return elfcore_write_note (abfd, buf, bufsiz,
11187 "CORE", NT_PRPSINFO, &data, sizeof (data));
11188 }
11189 }
11190
11191 char *
11192 elfcore_write_prstatus (bfd *abfd,
11193 char *buf,
11194 int *bufsiz,
11195 long pid,
11196 int cursig,
11197 const void *gregs)
11198 {
11199 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11200
11201 if (bed->elf_backend_write_core_note != NULL)
11202 {
11203 char *ret;
11204 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11205 NT_PRSTATUS,
11206 pid, cursig, gregs);
11207 if (ret != NULL)
11208 return ret;
11209 }
11210
11211 #if defined (HAVE_PRSTATUS_T)
11212 #if defined (HAVE_PRSTATUS32_T)
11213 if (bed->s->elfclass == ELFCLASS32)
11214 {
11215 prstatus32_t prstat;
11216
11217 memset (&prstat, 0, sizeof (prstat));
11218 prstat.pr_pid = pid;
11219 prstat.pr_cursig = cursig;
11220 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11221 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11222 NT_PRSTATUS, &prstat, sizeof (prstat));
11223 }
11224 else
11225 #endif
11226 {
11227 prstatus_t prstat;
11228
11229 memset (&prstat, 0, sizeof (prstat));
11230 prstat.pr_pid = pid;
11231 prstat.pr_cursig = cursig;
11232 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11233 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11234 NT_PRSTATUS, &prstat, sizeof (prstat));
11235 }
11236 #endif /* HAVE_PRSTATUS_T */
11237
11238 free (buf);
11239 return NULL;
11240 }
11241
11242 #if defined (HAVE_LWPSTATUS_T)
11243 char *
11244 elfcore_write_lwpstatus (bfd *abfd,
11245 char *buf,
11246 int *bufsiz,
11247 long pid,
11248 int cursig,
11249 const void *gregs)
11250 {
11251 lwpstatus_t lwpstat;
11252 const char *note_name = "CORE";
11253
11254 memset (&lwpstat, 0, sizeof (lwpstat));
11255 lwpstat.pr_lwpid = pid >> 16;
11256 lwpstat.pr_cursig = cursig;
11257 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11258 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11259 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11260 #if !defined(gregs)
11261 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11262 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11263 #else
11264 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11265 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11266 #endif
11267 #endif
11268 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11269 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11270 }
11271 #endif /* HAVE_LWPSTATUS_T */
11272
11273 #if defined (HAVE_PSTATUS_T)
11274 char *
11275 elfcore_write_pstatus (bfd *abfd,
11276 char *buf,
11277 int *bufsiz,
11278 long pid,
11279 int cursig ATTRIBUTE_UNUSED,
11280 const void *gregs ATTRIBUTE_UNUSED)
11281 {
11282 const char *note_name = "CORE";
11283 #if defined (HAVE_PSTATUS32_T)
11284 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11285
11286 if (bed->s->elfclass == ELFCLASS32)
11287 {
11288 pstatus32_t pstat;
11289
11290 memset (&pstat, 0, sizeof (pstat));
11291 pstat.pr_pid = pid & 0xffff;
11292 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11293 NT_PSTATUS, &pstat, sizeof (pstat));
11294 return buf;
11295 }
11296 else
11297 #endif
11298 {
11299 pstatus_t pstat;
11300
11301 memset (&pstat, 0, sizeof (pstat));
11302 pstat.pr_pid = pid & 0xffff;
11303 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11304 NT_PSTATUS, &pstat, sizeof (pstat));
11305 return buf;
11306 }
11307 }
11308 #endif /* HAVE_PSTATUS_T */
11309
11310 char *
11311 elfcore_write_prfpreg (bfd *abfd,
11312 char *buf,
11313 int *bufsiz,
11314 const void *fpregs,
11315 int size)
11316 {
11317 const char *note_name = "CORE";
11318 return elfcore_write_note (abfd, buf, bufsiz,
11319 note_name, NT_FPREGSET, fpregs, size);
11320 }
11321
11322 char *
11323 elfcore_write_prxfpreg (bfd *abfd,
11324 char *buf,
11325 int *bufsiz,
11326 const void *xfpregs,
11327 int size)
11328 {
11329 char *note_name = "LINUX";
11330 return elfcore_write_note (abfd, buf, bufsiz,
11331 note_name, NT_PRXFPREG, xfpregs, size);
11332 }
11333
11334 char *
11335 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11336 const void *xfpregs, int size)
11337 {
11338 char *note_name;
11339 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11340 note_name = "FreeBSD";
11341 else
11342 note_name = "LINUX";
11343 return elfcore_write_note (abfd, buf, bufsiz,
11344 note_name, NT_X86_XSTATE, xfpregs, size);
11345 }
11346
11347 char *
11348 elfcore_write_ppc_vmx (bfd *abfd,
11349 char *buf,
11350 int *bufsiz,
11351 const void *ppc_vmx,
11352 int size)
11353 {
11354 char *note_name = "LINUX";
11355 return elfcore_write_note (abfd, buf, bufsiz,
11356 note_name, NT_PPC_VMX, ppc_vmx, size);
11357 }
11358
11359 char *
11360 elfcore_write_ppc_vsx (bfd *abfd,
11361 char *buf,
11362 int *bufsiz,
11363 const void *ppc_vsx,
11364 int size)
11365 {
11366 char *note_name = "LINUX";
11367 return elfcore_write_note (abfd, buf, bufsiz,
11368 note_name, NT_PPC_VSX, ppc_vsx, size);
11369 }
11370
11371 char *
11372 elfcore_write_ppc_tar (bfd *abfd,
11373 char *buf,
11374 int *bufsiz,
11375 const void *ppc_tar,
11376 int size)
11377 {
11378 char *note_name = "LINUX";
11379 return elfcore_write_note (abfd, buf, bufsiz,
11380 note_name, NT_PPC_TAR, ppc_tar, size);
11381 }
11382
11383 char *
11384 elfcore_write_ppc_ppr (bfd *abfd,
11385 char *buf,
11386 int *bufsiz,
11387 const void *ppc_ppr,
11388 int size)
11389 {
11390 char *note_name = "LINUX";
11391 return elfcore_write_note (abfd, buf, bufsiz,
11392 note_name, NT_PPC_PPR, ppc_ppr, size);
11393 }
11394
11395 char *
11396 elfcore_write_ppc_dscr (bfd *abfd,
11397 char *buf,
11398 int *bufsiz,
11399 const void *ppc_dscr,
11400 int size)
11401 {
11402 char *note_name = "LINUX";
11403 return elfcore_write_note (abfd, buf, bufsiz,
11404 note_name, NT_PPC_DSCR, ppc_dscr, size);
11405 }
11406
11407 char *
11408 elfcore_write_ppc_ebb (bfd *abfd,
11409 char *buf,
11410 int *bufsiz,
11411 const void *ppc_ebb,
11412 int size)
11413 {
11414 char *note_name = "LINUX";
11415 return elfcore_write_note (abfd, buf, bufsiz,
11416 note_name, NT_PPC_EBB, ppc_ebb, size);
11417 }
11418
11419 char *
11420 elfcore_write_ppc_pmu (bfd *abfd,
11421 char *buf,
11422 int *bufsiz,
11423 const void *ppc_pmu,
11424 int size)
11425 {
11426 char *note_name = "LINUX";
11427 return elfcore_write_note (abfd, buf, bufsiz,
11428 note_name, NT_PPC_PMU, ppc_pmu, size);
11429 }
11430
11431 char *
11432 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11433 char *buf,
11434 int *bufsiz,
11435 const void *ppc_tm_cgpr,
11436 int size)
11437 {
11438 char *note_name = "LINUX";
11439 return elfcore_write_note (abfd, buf, bufsiz,
11440 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11441 }
11442
11443 char *
11444 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11445 char *buf,
11446 int *bufsiz,
11447 const void *ppc_tm_cfpr,
11448 int size)
11449 {
11450 char *note_name = "LINUX";
11451 return elfcore_write_note (abfd, buf, bufsiz,
11452 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11453 }
11454
11455 char *
11456 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11457 char *buf,
11458 int *bufsiz,
11459 const void *ppc_tm_cvmx,
11460 int size)
11461 {
11462 char *note_name = "LINUX";
11463 return elfcore_write_note (abfd, buf, bufsiz,
11464 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11465 }
11466
11467 char *
11468 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11469 char *buf,
11470 int *bufsiz,
11471 const void *ppc_tm_cvsx,
11472 int size)
11473 {
11474 char *note_name = "LINUX";
11475 return elfcore_write_note (abfd, buf, bufsiz,
11476 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11477 }
11478
11479 char *
11480 elfcore_write_ppc_tm_spr (bfd *abfd,
11481 char *buf,
11482 int *bufsiz,
11483 const void *ppc_tm_spr,
11484 int size)
11485 {
11486 char *note_name = "LINUX";
11487 return elfcore_write_note (abfd, buf, bufsiz,
11488 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11489 }
11490
11491 char *
11492 elfcore_write_ppc_tm_ctar (bfd *abfd,
11493 char *buf,
11494 int *bufsiz,
11495 const void *ppc_tm_ctar,
11496 int size)
11497 {
11498 char *note_name = "LINUX";
11499 return elfcore_write_note (abfd, buf, bufsiz,
11500 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11501 }
11502
11503 char *
11504 elfcore_write_ppc_tm_cppr (bfd *abfd,
11505 char *buf,
11506 int *bufsiz,
11507 const void *ppc_tm_cppr,
11508 int size)
11509 {
11510 char *note_name = "LINUX";
11511 return elfcore_write_note (abfd, buf, bufsiz,
11512 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11513 }
11514
11515 char *
11516 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11517 char *buf,
11518 int *bufsiz,
11519 const void *ppc_tm_cdscr,
11520 int size)
11521 {
11522 char *note_name = "LINUX";
11523 return elfcore_write_note (abfd, buf, bufsiz,
11524 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11525 }
11526
11527 static char *
11528 elfcore_write_s390_high_gprs (bfd *abfd,
11529 char *buf,
11530 int *bufsiz,
11531 const void *s390_high_gprs,
11532 int size)
11533 {
11534 char *note_name = "LINUX";
11535 return elfcore_write_note (abfd, buf, bufsiz,
11536 note_name, NT_S390_HIGH_GPRS,
11537 s390_high_gprs, size);
11538 }
11539
11540 char *
11541 elfcore_write_s390_timer (bfd *abfd,
11542 char *buf,
11543 int *bufsiz,
11544 const void *s390_timer,
11545 int size)
11546 {
11547 char *note_name = "LINUX";
11548 return elfcore_write_note (abfd, buf, bufsiz,
11549 note_name, NT_S390_TIMER, s390_timer, size);
11550 }
11551
11552 char *
11553 elfcore_write_s390_todcmp (bfd *abfd,
11554 char *buf,
11555 int *bufsiz,
11556 const void *s390_todcmp,
11557 int size)
11558 {
11559 char *note_name = "LINUX";
11560 return elfcore_write_note (abfd, buf, bufsiz,
11561 note_name, NT_S390_TODCMP, s390_todcmp, size);
11562 }
11563
11564 char *
11565 elfcore_write_s390_todpreg (bfd *abfd,
11566 char *buf,
11567 int *bufsiz,
11568 const void *s390_todpreg,
11569 int size)
11570 {
11571 char *note_name = "LINUX";
11572 return elfcore_write_note (abfd, buf, bufsiz,
11573 note_name, NT_S390_TODPREG, s390_todpreg, size);
11574 }
11575
11576 char *
11577 elfcore_write_s390_ctrs (bfd *abfd,
11578 char *buf,
11579 int *bufsiz,
11580 const void *s390_ctrs,
11581 int size)
11582 {
11583 char *note_name = "LINUX";
11584 return elfcore_write_note (abfd, buf, bufsiz,
11585 note_name, NT_S390_CTRS, s390_ctrs, size);
11586 }
11587
11588 char *
11589 elfcore_write_s390_prefix (bfd *abfd,
11590 char *buf,
11591 int *bufsiz,
11592 const void *s390_prefix,
11593 int size)
11594 {
11595 char *note_name = "LINUX";
11596 return elfcore_write_note (abfd, buf, bufsiz,
11597 note_name, NT_S390_PREFIX, s390_prefix, size);
11598 }
11599
11600 char *
11601 elfcore_write_s390_last_break (bfd *abfd,
11602 char *buf,
11603 int *bufsiz,
11604 const void *s390_last_break,
11605 int size)
11606 {
11607 char *note_name = "LINUX";
11608 return elfcore_write_note (abfd, buf, bufsiz,
11609 note_name, NT_S390_LAST_BREAK,
11610 s390_last_break, size);
11611 }
11612
11613 char *
11614 elfcore_write_s390_system_call (bfd *abfd,
11615 char *buf,
11616 int *bufsiz,
11617 const void *s390_system_call,
11618 int size)
11619 {
11620 char *note_name = "LINUX";
11621 return elfcore_write_note (abfd, buf, bufsiz,
11622 note_name, NT_S390_SYSTEM_CALL,
11623 s390_system_call, size);
11624 }
11625
11626 char *
11627 elfcore_write_s390_tdb (bfd *abfd,
11628 char *buf,
11629 int *bufsiz,
11630 const void *s390_tdb,
11631 int size)
11632 {
11633 char *note_name = "LINUX";
11634 return elfcore_write_note (abfd, buf, bufsiz,
11635 note_name, NT_S390_TDB, s390_tdb, size);
11636 }
11637
11638 char *
11639 elfcore_write_s390_vxrs_low (bfd *abfd,
11640 char *buf,
11641 int *bufsiz,
11642 const void *s390_vxrs_low,
11643 int size)
11644 {
11645 char *note_name = "LINUX";
11646 return elfcore_write_note (abfd, buf, bufsiz,
11647 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11648 }
11649
11650 char *
11651 elfcore_write_s390_vxrs_high (bfd *abfd,
11652 char *buf,
11653 int *bufsiz,
11654 const void *s390_vxrs_high,
11655 int size)
11656 {
11657 char *note_name = "LINUX";
11658 return elfcore_write_note (abfd, buf, bufsiz,
11659 note_name, NT_S390_VXRS_HIGH,
11660 s390_vxrs_high, size);
11661 }
11662
11663 char *
11664 elfcore_write_s390_gs_cb (bfd *abfd,
11665 char *buf,
11666 int *bufsiz,
11667 const void *s390_gs_cb,
11668 int size)
11669 {
11670 char *note_name = "LINUX";
11671 return elfcore_write_note (abfd, buf, bufsiz,
11672 note_name, NT_S390_GS_CB,
11673 s390_gs_cb, size);
11674 }
11675
11676 char *
11677 elfcore_write_s390_gs_bc (bfd *abfd,
11678 char *buf,
11679 int *bufsiz,
11680 const void *s390_gs_bc,
11681 int size)
11682 {
11683 char *note_name = "LINUX";
11684 return elfcore_write_note (abfd, buf, bufsiz,
11685 note_name, NT_S390_GS_BC,
11686 s390_gs_bc, size);
11687 }
11688
11689 char *
11690 elfcore_write_arm_vfp (bfd *abfd,
11691 char *buf,
11692 int *bufsiz,
11693 const void *arm_vfp,
11694 int size)
11695 {
11696 char *note_name = "LINUX";
11697 return elfcore_write_note (abfd, buf, bufsiz,
11698 note_name, NT_ARM_VFP, arm_vfp, size);
11699 }
11700
11701 char *
11702 elfcore_write_aarch_tls (bfd *abfd,
11703 char *buf,
11704 int *bufsiz,
11705 const void *aarch_tls,
11706 int size)
11707 {
11708 char *note_name = "LINUX";
11709 return elfcore_write_note (abfd, buf, bufsiz,
11710 note_name, NT_ARM_TLS, aarch_tls, size);
11711 }
11712
11713 char *
11714 elfcore_write_aarch_hw_break (bfd *abfd,
11715 char *buf,
11716 int *bufsiz,
11717 const void *aarch_hw_break,
11718 int size)
11719 {
11720 char *note_name = "LINUX";
11721 return elfcore_write_note (abfd, buf, bufsiz,
11722 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11723 }
11724
11725 char *
11726 elfcore_write_aarch_hw_watch (bfd *abfd,
11727 char *buf,
11728 int *bufsiz,
11729 const void *aarch_hw_watch,
11730 int size)
11731 {
11732 char *note_name = "LINUX";
11733 return elfcore_write_note (abfd, buf, bufsiz,
11734 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11735 }
11736
11737 char *
11738 elfcore_write_aarch_sve (bfd *abfd,
11739 char *buf,
11740 int *bufsiz,
11741 const void *aarch_sve,
11742 int size)
11743 {
11744 char *note_name = "LINUX";
11745 return elfcore_write_note (abfd, buf, bufsiz,
11746 note_name, NT_ARM_SVE, aarch_sve, size);
11747 }
11748
11749 char *
11750 elfcore_write_aarch_pauth (bfd *abfd,
11751 char *buf,
11752 int *bufsiz,
11753 const void *aarch_pauth,
11754 int size)
11755 {
11756 char *note_name = "LINUX";
11757 return elfcore_write_note (abfd, buf, bufsiz,
11758 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11759 }
11760
11761 char *
11762 elfcore_write_register_note (bfd *abfd,
11763 char *buf,
11764 int *bufsiz,
11765 const char *section,
11766 const void *data,
11767 int size)
11768 {
11769 if (strcmp (section, ".reg2") == 0)
11770 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11771 if (strcmp (section, ".reg-xfp") == 0)
11772 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11773 if (strcmp (section, ".reg-xstate") == 0)
11774 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11775 if (strcmp (section, ".reg-ppc-vmx") == 0)
11776 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11777 if (strcmp (section, ".reg-ppc-vsx") == 0)
11778 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11779 if (strcmp (section, ".reg-ppc-tar") == 0)
11780 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11781 if (strcmp (section, ".reg-ppc-ppr") == 0)
11782 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11783 if (strcmp (section, ".reg-ppc-dscr") == 0)
11784 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11785 if (strcmp (section, ".reg-ppc-ebb") == 0)
11786 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11787 if (strcmp (section, ".reg-ppc-pmu") == 0)
11788 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11789 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11790 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11791 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11792 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11793 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11794 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11795 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11796 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11797 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11798 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11799 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11800 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11801 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11802 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11803 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11804 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11805 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11806 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11807 if (strcmp (section, ".reg-s390-timer") == 0)
11808 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11809 if (strcmp (section, ".reg-s390-todcmp") == 0)
11810 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11811 if (strcmp (section, ".reg-s390-todpreg") == 0)
11812 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11813 if (strcmp (section, ".reg-s390-ctrs") == 0)
11814 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11815 if (strcmp (section, ".reg-s390-prefix") == 0)
11816 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11817 if (strcmp (section, ".reg-s390-last-break") == 0)
11818 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11819 if (strcmp (section, ".reg-s390-system-call") == 0)
11820 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11821 if (strcmp (section, ".reg-s390-tdb") == 0)
11822 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11823 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11824 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11825 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11826 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11827 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11828 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11829 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11830 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11831 if (strcmp (section, ".reg-arm-vfp") == 0)
11832 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11833 if (strcmp (section, ".reg-aarch-tls") == 0)
11834 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11835 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11836 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11837 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11838 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11839 if (strcmp (section, ".reg-aarch-sve") == 0)
11840 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11841 if (strcmp (section, ".reg-aarch-pauth") == 0)
11842 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11843 return NULL;
11844 }
11845
11846 static bfd_boolean
11847 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11848 size_t align)
11849 {
11850 char *p;
11851
11852 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11853 gABI specifies that PT_NOTE alignment should be aligned to 4
11854 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11855 align is less than 4, we use 4 byte alignment. */
11856 if (align < 4)
11857 align = 4;
11858 if (align != 4 && align != 8)
11859 return FALSE;
11860
11861 p = buf;
11862 while (p < buf + size)
11863 {
11864 Elf_External_Note *xnp = (Elf_External_Note *) p;
11865 Elf_Internal_Note in;
11866
11867 if (offsetof (Elf_External_Note, name) > buf - p + size)
11868 return FALSE;
11869
11870 in.type = H_GET_32 (abfd, xnp->type);
11871
11872 in.namesz = H_GET_32 (abfd, xnp->namesz);
11873 in.namedata = xnp->name;
11874 if (in.namesz > buf - in.namedata + size)
11875 return FALSE;
11876
11877 in.descsz = H_GET_32 (abfd, xnp->descsz);
11878 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
11879 in.descpos = offset + (in.descdata - buf);
11880 if (in.descsz != 0
11881 && (in.descdata >= buf + size
11882 || in.descsz > buf - in.descdata + size))
11883 return FALSE;
11884
11885 switch (bfd_get_format (abfd))
11886 {
11887 default:
11888 return TRUE;
11889
11890 case bfd_core:
11891 {
11892 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
11893 struct
11894 {
11895 const char * string;
11896 size_t len;
11897 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
11898 }
11899 grokers[] =
11900 {
11901 GROKER_ELEMENT ("", elfcore_grok_note),
11902 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
11903 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11904 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11905 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
11906 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11907 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
11908 };
11909 #undef GROKER_ELEMENT
11910 int i;
11911
11912 for (i = ARRAY_SIZE (grokers); i--;)
11913 {
11914 if (in.namesz >= grokers[i].len
11915 && strncmp (in.namedata, grokers[i].string,
11916 grokers[i].len) == 0)
11917 {
11918 if (! grokers[i].func (abfd, & in))
11919 return FALSE;
11920 break;
11921 }
11922 }
11923 break;
11924 }
11925
11926 case bfd_object:
11927 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11928 {
11929 if (! elfobj_grok_gnu_note (abfd, &in))
11930 return FALSE;
11931 }
11932 else if (in.namesz == sizeof "stapsdt"
11933 && strcmp (in.namedata, "stapsdt") == 0)
11934 {
11935 if (! elfobj_grok_stapsdt_note (abfd, &in))
11936 return FALSE;
11937 }
11938 break;
11939 }
11940
11941 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
11942 }
11943
11944 return TRUE;
11945 }
11946
11947 bfd_boolean
11948 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
11949 size_t align)
11950 {
11951 char *buf;
11952
11953 if (size == 0 || (size + 1) == 0)
11954 return TRUE;
11955
11956 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
11957 return FALSE;
11958
11959 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
11960 if (buf == NULL)
11961 return FALSE;
11962
11963 /* PR 17512: file: ec08f814
11964 0-termintate the buffer so that string searches will not overflow. */
11965 buf[size] = 0;
11966
11967 if (!elf_parse_notes (abfd, buf, size, offset, align))
11968 {
11969 free (buf);
11970 return FALSE;
11971 }
11972
11973 free (buf);
11974 return TRUE;
11975 }
11976 \f
11977 /* Providing external access to the ELF program header table. */
11978
11979 /* Return an upper bound on the number of bytes required to store a
11980 copy of ABFD's program header table entries. Return -1 if an error
11981 occurs; bfd_get_error will return an appropriate code. */
11982
11983 long
11984 bfd_get_elf_phdr_upper_bound (bfd *abfd)
11985 {
11986 if (abfd->xvec->flavour != bfd_target_elf_flavour)
11987 {
11988 bfd_set_error (bfd_error_wrong_format);
11989 return -1;
11990 }
11991
11992 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
11993 }
11994
11995 /* Copy ABFD's program header table entries to *PHDRS. The entries
11996 will be stored as an array of Elf_Internal_Phdr structures, as
11997 defined in include/elf/internal.h. To find out how large the
11998 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
11999
12000 Return the number of program header table entries read, or -1 if an
12001 error occurs; bfd_get_error will return an appropriate code. */
12002
12003 int
12004 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12005 {
12006 int num_phdrs;
12007
12008 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12009 {
12010 bfd_set_error (bfd_error_wrong_format);
12011 return -1;
12012 }
12013
12014 num_phdrs = elf_elfheader (abfd)->e_phnum;
12015 if (num_phdrs != 0)
12016 memcpy (phdrs, elf_tdata (abfd)->phdr,
12017 num_phdrs * sizeof (Elf_Internal_Phdr));
12018
12019 return num_phdrs;
12020 }
12021
12022 enum elf_reloc_type_class
12023 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12024 const asection *rel_sec ATTRIBUTE_UNUSED,
12025 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12026 {
12027 return reloc_class_normal;
12028 }
12029
12030 /* For RELA architectures, return the relocation value for a
12031 relocation against a local symbol. */
12032
12033 bfd_vma
12034 _bfd_elf_rela_local_sym (bfd *abfd,
12035 Elf_Internal_Sym *sym,
12036 asection **psec,
12037 Elf_Internal_Rela *rel)
12038 {
12039 asection *sec = *psec;
12040 bfd_vma relocation;
12041
12042 relocation = (sec->output_section->vma
12043 + sec->output_offset
12044 + sym->st_value);
12045 if ((sec->flags & SEC_MERGE)
12046 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12047 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12048 {
12049 rel->r_addend =
12050 _bfd_merged_section_offset (abfd, psec,
12051 elf_section_data (sec)->sec_info,
12052 sym->st_value + rel->r_addend);
12053 if (sec != *psec)
12054 {
12055 /* If we have changed the section, and our original section is
12056 marked with SEC_EXCLUDE, it means that the original
12057 SEC_MERGE section has been completely subsumed in some
12058 other SEC_MERGE section. In this case, we need to leave
12059 some info around for --emit-relocs. */
12060 if ((sec->flags & SEC_EXCLUDE) != 0)
12061 sec->kept_section = *psec;
12062 sec = *psec;
12063 }
12064 rel->r_addend -= relocation;
12065 rel->r_addend += sec->output_section->vma + sec->output_offset;
12066 }
12067 return relocation;
12068 }
12069
12070 bfd_vma
12071 _bfd_elf_rel_local_sym (bfd *abfd,
12072 Elf_Internal_Sym *sym,
12073 asection **psec,
12074 bfd_vma addend)
12075 {
12076 asection *sec = *psec;
12077
12078 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12079 return sym->st_value + addend;
12080
12081 return _bfd_merged_section_offset (abfd, psec,
12082 elf_section_data (sec)->sec_info,
12083 sym->st_value + addend);
12084 }
12085
12086 /* Adjust an address within a section. Given OFFSET within SEC, return
12087 the new offset within the section, based upon changes made to the
12088 section. Returns -1 if the offset is now invalid.
12089 The offset (in abnd out) is in target sized bytes, however big a
12090 byte may be. */
12091
12092 bfd_vma
12093 _bfd_elf_section_offset (bfd *abfd,
12094 struct bfd_link_info *info,
12095 asection *sec,
12096 bfd_vma offset)
12097 {
12098 switch (sec->sec_info_type)
12099 {
12100 case SEC_INFO_TYPE_STABS:
12101 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12102 offset);
12103 case SEC_INFO_TYPE_EH_FRAME:
12104 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12105
12106 default:
12107 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12108 {
12109 /* Reverse the offset. */
12110 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12111 bfd_size_type address_size = bed->s->arch_size / 8;
12112
12113 /* address_size and sec->size are in octets. Convert
12114 to bytes before subtracting the original offset. */
12115 offset = ((sec->size - address_size)
12116 / bfd_octets_per_byte (abfd, sec) - offset);
12117 }
12118 return offset;
12119 }
12120 }
12121 \f
12122 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12123 reconstruct an ELF file by reading the segments out of remote memory
12124 based on the ELF file header at EHDR_VMA and the ELF program headers it
12125 points to. If not null, *LOADBASEP is filled in with the difference
12126 between the VMAs from which the segments were read, and the VMAs the
12127 file headers (and hence BFD's idea of each section's VMA) put them at.
12128
12129 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12130 remote memory at target address VMA into the local buffer at MYADDR; it
12131 should return zero on success or an `errno' code on failure. TEMPL must
12132 be a BFD for an ELF target with the word size and byte order found in
12133 the remote memory. */
12134
12135 bfd *
12136 bfd_elf_bfd_from_remote_memory
12137 (bfd *templ,
12138 bfd_vma ehdr_vma,
12139 bfd_size_type size,
12140 bfd_vma *loadbasep,
12141 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12142 {
12143 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12144 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12145 }
12146 \f
12147 long
12148 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12149 long symcount ATTRIBUTE_UNUSED,
12150 asymbol **syms ATTRIBUTE_UNUSED,
12151 long dynsymcount,
12152 asymbol **dynsyms,
12153 asymbol **ret)
12154 {
12155 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12156 asection *relplt;
12157 asymbol *s;
12158 const char *relplt_name;
12159 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12160 arelent *p;
12161 long count, i, n;
12162 size_t size;
12163 Elf_Internal_Shdr *hdr;
12164 char *names;
12165 asection *plt;
12166
12167 *ret = NULL;
12168
12169 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12170 return 0;
12171
12172 if (dynsymcount <= 0)
12173 return 0;
12174
12175 if (!bed->plt_sym_val)
12176 return 0;
12177
12178 relplt_name = bed->relplt_name;
12179 if (relplt_name == NULL)
12180 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12181 relplt = bfd_get_section_by_name (abfd, relplt_name);
12182 if (relplt == NULL)
12183 return 0;
12184
12185 hdr = &elf_section_data (relplt)->this_hdr;
12186 if (hdr->sh_link != elf_dynsymtab (abfd)
12187 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12188 return 0;
12189
12190 plt = bfd_get_section_by_name (abfd, ".plt");
12191 if (plt == NULL)
12192 return 0;
12193
12194 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12195 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12196 return -1;
12197
12198 count = relplt->size / hdr->sh_entsize;
12199 size = count * sizeof (asymbol);
12200 p = relplt->relocation;
12201 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12202 {
12203 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12204 if (p->addend != 0)
12205 {
12206 #ifdef BFD64
12207 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12208 #else
12209 size += sizeof ("+0x") - 1 + 8;
12210 #endif
12211 }
12212 }
12213
12214 s = *ret = (asymbol *) bfd_malloc (size);
12215 if (s == NULL)
12216 return -1;
12217
12218 names = (char *) (s + count);
12219 p = relplt->relocation;
12220 n = 0;
12221 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12222 {
12223 size_t len;
12224 bfd_vma addr;
12225
12226 addr = bed->plt_sym_val (i, plt, p);
12227 if (addr == (bfd_vma) -1)
12228 continue;
12229
12230 *s = **p->sym_ptr_ptr;
12231 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12232 we are defining a symbol, ensure one of them is set. */
12233 if ((s->flags & BSF_LOCAL) == 0)
12234 s->flags |= BSF_GLOBAL;
12235 s->flags |= BSF_SYNTHETIC;
12236 s->section = plt;
12237 s->value = addr - plt->vma;
12238 s->name = names;
12239 s->udata.p = NULL;
12240 len = strlen ((*p->sym_ptr_ptr)->name);
12241 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12242 names += len;
12243 if (p->addend != 0)
12244 {
12245 char buf[30], *a;
12246
12247 memcpy (names, "+0x", sizeof ("+0x") - 1);
12248 names += sizeof ("+0x") - 1;
12249 bfd_sprintf_vma (abfd, buf, p->addend);
12250 for (a = buf; *a == '0'; ++a)
12251 ;
12252 len = strlen (a);
12253 memcpy (names, a, len);
12254 names += len;
12255 }
12256 memcpy (names, "@plt", sizeof ("@plt"));
12257 names += sizeof ("@plt");
12258 ++s, ++n;
12259 }
12260
12261 return n;
12262 }
12263
12264 /* It is only used by x86-64 so far.
12265 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12266 but current usage would allow all of _bfd_std_section to be zero. */
12267 static const asymbol lcomm_sym
12268 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12269 asection _bfd_elf_large_com_section
12270 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12271 "LARGE_COMMON", 0, SEC_IS_COMMON);
12272
12273 bfd_boolean
12274 _bfd_elf_final_write_processing (bfd *abfd)
12275 {
12276 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12277
12278 i_ehdrp = elf_elfheader (abfd);
12279
12280 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12281 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12282
12283 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12284 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12285 STB_GNU_UNIQUE binding. */
12286 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12287 {
12288 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12289 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12290 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12291 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12292 {
12293 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12294 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12295 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12296 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12297 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12298 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12299 bfd_set_error (bfd_error_sorry);
12300 return FALSE;
12301 }
12302 }
12303 return TRUE;
12304 }
12305
12306
12307 /* Return TRUE for ELF symbol types that represent functions.
12308 This is the default version of this function, which is sufficient for
12309 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12310
12311 bfd_boolean
12312 _bfd_elf_is_function_type (unsigned int type)
12313 {
12314 return (type == STT_FUNC
12315 || type == STT_GNU_IFUNC);
12316 }
12317
12318 /* If the ELF symbol SYM might be a function in SEC, return the
12319 function size and set *CODE_OFF to the function's entry point,
12320 otherwise return zero. */
12321
12322 bfd_size_type
12323 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12324 bfd_vma *code_off)
12325 {
12326 bfd_size_type size;
12327
12328 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12329 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12330 || sym->section != sec)
12331 return 0;
12332
12333 *code_off = sym->value;
12334 size = 0;
12335 if (!(sym->flags & BSF_SYNTHETIC))
12336 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12337 if (size == 0)
12338 size = 1;
12339 return size;
12340 }
12341
12342 /* Set to non-zero to enable some debug messages. */
12343 #define DEBUG_SECONDARY_RELOCS 0
12344
12345 /* An internal-to-the-bfd-library only section type
12346 used to indicate a cached secondary reloc section. */
12347 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12348
12349 /* Create a BFD section to hold a secondary reloc section. */
12350
12351 bfd_boolean
12352 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
12353 Elf_Internal_Shdr *hdr,
12354 const char * name,
12355 unsigned int shindex)
12356 {
12357 /* We only support RELA secondary relocs. */
12358 if (hdr->sh_type != SHT_RELA)
12359 return FALSE;
12360
12361 #if DEBUG_SECONDARY_RELOCS
12362 fprintf (stderr, "secondary reloc section %s encountered\n", name);
12363 #endif
12364 hdr->sh_type = SHT_SECONDARY_RELOC;
12365 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
12366 }
12367
12368 /* Read in any secondary relocs associated with SEC. */
12369
12370 bfd_boolean
12371 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
12372 asection * sec,
12373 asymbol ** symbols)
12374 {
12375 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12376 asection * relsec;
12377 bfd_boolean result = TRUE;
12378 bfd_vma (*r_sym) (bfd_vma);
12379
12380 #if BFD_DEFAULT_TARGET_SIZE > 32
12381 if (bfd_arch_bits_per_address (abfd) != 32)
12382 r_sym = elf64_r_sym;
12383 else
12384 #endif
12385 r_sym = elf32_r_sym;
12386
12387 /* Discover if there are any secondary reloc sections
12388 associated with SEC. */
12389 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12390 {
12391 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
12392
12393 if (hdr->sh_type == SHT_SECONDARY_RELOC
12394 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12395 {
12396 bfd_byte * native_relocs;
12397 bfd_byte * native_reloc;
12398 arelent * internal_relocs;
12399 arelent * internal_reloc;
12400 unsigned int i;
12401 unsigned int entsize;
12402 unsigned int symcount;
12403 unsigned int reloc_count;
12404 size_t amt;
12405
12406 if (ebd->elf_info_to_howto == NULL)
12407 return FALSE;
12408
12409 #if DEBUG_SECONDARY_RELOCS
12410 fprintf (stderr, "read secondary relocs for %s from %s\n",
12411 sec->name, relsec->name);
12412 #endif
12413 entsize = hdr->sh_entsize;
12414
12415 native_relocs = bfd_malloc (hdr->sh_size);
12416 if (native_relocs == NULL)
12417 {
12418 result = FALSE;
12419 continue;
12420 }
12421
12422 reloc_count = NUM_SHDR_ENTRIES (hdr);
12423 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
12424 {
12425 bfd_set_error (bfd_error_file_too_big);
12426 result = FALSE;
12427 continue;
12428 }
12429
12430 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
12431 if (internal_relocs == NULL)
12432 {
12433 free (native_relocs);
12434 result = FALSE;
12435 continue;
12436 }
12437
12438 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
12439 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
12440 != hdr->sh_size))
12441 {
12442 free (native_relocs);
12443 free (internal_relocs);
12444 result = FALSE;
12445 continue;
12446 }
12447
12448 symcount = bfd_get_symcount (abfd);
12449
12450 for (i = 0, internal_reloc = internal_relocs,
12451 native_reloc = native_relocs;
12452 i < reloc_count;
12453 i++, internal_reloc++, native_reloc += entsize)
12454 {
12455 bfd_boolean res;
12456 Elf_Internal_Rela rela;
12457
12458 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
12459
12460 /* The address of an ELF reloc is section relative for an object
12461 file, and absolute for an executable file or shared library.
12462 The address of a normal BFD reloc is always section relative,
12463 and the address of a dynamic reloc is absolute.. */
12464 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
12465 internal_reloc->address = rela.r_offset;
12466 else
12467 internal_reloc->address = rela.r_offset - sec->vma;
12468
12469 if (r_sym (rela.r_info) == STN_UNDEF)
12470 {
12471 /* FIXME: This and the error case below mean that we
12472 have a symbol on relocs that is not elf_symbol_type. */
12473 internal_reloc->sym_ptr_ptr =
12474 bfd_abs_section_ptr->symbol_ptr_ptr;
12475 }
12476 else if (r_sym (rela.r_info) > symcount)
12477 {
12478 _bfd_error_handler
12479 /* xgettext:c-format */
12480 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
12481 abfd, sec, i, (long) r_sym (rela.r_info));
12482 bfd_set_error (bfd_error_bad_value);
12483 internal_reloc->sym_ptr_ptr =
12484 bfd_abs_section_ptr->symbol_ptr_ptr;
12485 result = FALSE;
12486 }
12487 else
12488 {
12489 asymbol **ps;
12490
12491 ps = symbols + r_sym (rela.r_info) - 1;
12492
12493 internal_reloc->sym_ptr_ptr = ps;
12494 /* Make sure that this symbol is not removed by strip. */
12495 (*ps)->flags |= BSF_KEEP;
12496 }
12497
12498 internal_reloc->addend = rela.r_addend;
12499
12500 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
12501 if (! res || internal_reloc->howto == NULL)
12502 {
12503 #if DEBUG_SECONDARY_RELOCS
12504 fprintf (stderr, "there is no howto associated with reloc %lx\n",
12505 rela.r_info);
12506 #endif
12507 result = FALSE;
12508 }
12509 }
12510
12511 free (native_relocs);
12512 /* Store the internal relocs. */
12513 elf_section_data (relsec)->sec_info = internal_relocs;
12514 }
12515 }
12516
12517 return result;
12518 }
12519
12520 /* Set the ELF section header fields of an output secondary reloc section. */
12521
12522 bfd_boolean
12523 _bfd_elf_copy_special_section_fields (const bfd * ibfd ATTRIBUTE_UNUSED,
12524 bfd * obfd ATTRIBUTE_UNUSED,
12525 const Elf_Internal_Shdr * isection,
12526 Elf_Internal_Shdr * osection)
12527 {
12528 asection * isec;
12529 asection * osec;
12530
12531 if (isection == NULL)
12532 return FALSE;
12533
12534 if (isection->sh_type != SHT_SECONDARY_RELOC)
12535 return TRUE;
12536
12537 isec = isection->bfd_section;
12538 if (isec == NULL)
12539 return FALSE;
12540
12541 osec = osection->bfd_section;
12542 if (osec == NULL)
12543 return FALSE;
12544
12545 BFD_ASSERT (elf_section_data (osec)->sec_info == NULL);
12546 elf_section_data (osec)->sec_info = elf_section_data (isec)->sec_info;
12547 osection->sh_type = SHT_RELA;
12548 osection->sh_link = elf_onesymtab (obfd);
12549 if (osection->sh_link == 0)
12550 {
12551 /* There is no symbol table - we are hosed... */
12552 _bfd_error_handler
12553 /* xgettext:c-format */
12554 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
12555 obfd, osec);
12556 bfd_set_error (bfd_error_bad_value);
12557 return FALSE;
12558 }
12559
12560 /* Find the output section that corresponds to the isection's sh_info link. */
12561 BFD_ASSERT (isection->sh_info > 0
12562 && isection->sh_info < elf_numsections (ibfd));
12563 isection = elf_elfsections (ibfd)[isection->sh_info];
12564
12565 BFD_ASSERT (isection != NULL);
12566 BFD_ASSERT (isection->bfd_section != NULL);
12567 BFD_ASSERT (isection->bfd_section->output_section != NULL);
12568 osection->sh_info =
12569 elf_section_data (isection->bfd_section->output_section)->this_idx;
12570
12571 #if DEBUG_SECONDARY_RELOCS
12572 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
12573 osec->name, osection->sh_link, osection->sh_info);
12574 #endif
12575
12576 return TRUE;
12577 }
12578
12579 /* Write out a secondary reloc section. */
12580
12581 bfd_boolean
12582 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
12583 {
12584 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12585 bfd_vma addr_offset;
12586 asection * relsec;
12587 bfd_vma (*r_info) (bfd_vma, bfd_vma);
12588
12589 #if BFD_DEFAULT_TARGET_SIZE > 32
12590 if (bfd_arch_bits_per_address (abfd) != 32)
12591 r_info = elf64_r_info;
12592 else
12593 #endif
12594 r_info = elf32_r_info;
12595
12596 if (sec == NULL)
12597 return FALSE;
12598
12599 /* The address of an ELF reloc is section relative for an object
12600 file, and absolute for an executable file or shared library.
12601 The address of a BFD reloc is always section relative. */
12602 addr_offset = 0;
12603 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
12604 addr_offset = sec->vma;
12605
12606 /* Discover if there are any secondary reloc sections
12607 associated with SEC. */
12608 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12609 {
12610 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
12611 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
12612
12613 if (hdr->sh_type == SHT_RELA
12614 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12615 {
12616 asymbol * last_sym;
12617 int last_sym_idx;
12618 unsigned int reloc_count;
12619 unsigned int idx;
12620 arelent * src_irel;
12621 bfd_byte * dst_rela;
12622
12623 BFD_ASSERT (hdr->contents == NULL);
12624
12625 reloc_count = hdr->sh_size / hdr->sh_entsize;
12626 BFD_ASSERT (reloc_count > 0);
12627
12628 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
12629 if (hdr->contents == NULL)
12630 continue;
12631
12632 #if DEBUG_SECONDARY_RELOCS
12633 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
12634 reloc_count, sec->name, relsec->name);
12635 #endif
12636 last_sym = NULL;
12637 last_sym_idx = 0;
12638 dst_rela = hdr->contents;
12639 src_irel = (arelent *) esd->sec_info;
12640 BFD_ASSERT (src_irel != NULL);
12641
12642 for (idx = 0; idx < reloc_count; idx++, dst_rela += hdr->sh_entsize)
12643 {
12644 Elf_Internal_Rela src_rela;
12645 arelent *ptr;
12646 asymbol *sym;
12647 int n;
12648
12649 ptr = src_irel + idx;
12650 sym = *ptr->sym_ptr_ptr;
12651
12652 if (sym == last_sym)
12653 n = last_sym_idx;
12654 else
12655 {
12656 last_sym = sym;
12657 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
12658 if (n < 0)
12659 {
12660 #if DEBUG_SECONDARY_RELOCS
12661 fprintf (stderr, "failed to find symbol %s whilst rewriting relocs\n",
12662 sym->name);
12663 #endif
12664 /* FIXME: Signal failure somehow. */
12665 n = 0;
12666 }
12667 last_sym_idx = n;
12668 }
12669
12670 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
12671 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
12672 && ! _bfd_elf_validate_reloc (abfd, ptr))
12673 {
12674 #if DEBUG_SECONDARY_RELOCS
12675 fprintf (stderr, "symbol %s is not in the output bfd\n",
12676 sym->name);
12677 #endif
12678 /* FIXME: Signal failure somehow. */
12679 n = 0;
12680 }
12681
12682 if (ptr->howto == NULL)
12683 {
12684 #if DEBUG_SECONDARY_RELOCS
12685 fprintf (stderr, "reloc for symbol %s does not have a howto associated with it\n",
12686 sym->name);
12687 #endif
12688 /* FIXME: Signal failure somehow. */
12689 n = 0;
12690 }
12691
12692 src_rela.r_offset = ptr->address + addr_offset;
12693 src_rela.r_info = r_info (n, ptr->howto->type);
12694 src_rela.r_addend = ptr->addend;
12695 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
12696 }
12697 }
12698 }
12699
12700 return TRUE;
12701 }