Put bfd_section_from_shdr loop detection array in elf_tdata
[binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int,
55 struct bfd_link_info *);
56 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset, size_t align);
58
59 /* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63 /* Swap in a Verdef structure. */
64
65 void
66 _bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
69 {
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
77 }
78
79 /* Swap out a Verdef structure. */
80
81 void
82 _bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
85 {
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
93 }
94
95 /* Swap in a Verdaux structure. */
96
97 void
98 _bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
101 {
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
104 }
105
106 /* Swap out a Verdaux structure. */
107
108 void
109 _bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
112 {
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
115 }
116
117 /* Swap in a Verneed structure. */
118
119 void
120 _bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
123 {
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
129 }
130
131 /* Swap out a Verneed structure. */
132
133 void
134 _bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
137 {
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
143 }
144
145 /* Swap in a Vernaux structure. */
146
147 void
148 _bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
151 {
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
157 }
158
159 /* Swap out a Vernaux structure. */
160
161 void
162 _bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
165 {
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
171 }
172
173 /* Swap in a Versym structure. */
174
175 void
176 _bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
179 {
180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
181 }
182
183 /* Swap out a Versym structure. */
184
185 void
186 _bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
189 {
190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
191 }
192
193 /* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
195
196 unsigned long
197 bfd_elf_hash (const char *namearg)
198 {
199 const unsigned char *name = (const unsigned char *) namearg;
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
215 return h & 0xffffffff;
216 }
217
218 /* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221 unsigned long
222 bfd_elf_gnu_hash (const char *namearg)
223 {
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231 }
232
233 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
235 bfd_boolean
236 bfd_elf_allocate_object (bfd *abfd,
237 size_t object_size,
238 enum elf_target_id object_id)
239 {
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return FALSE;
244
245 elf_object_id (abfd) = object_id;
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return FALSE;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
254 return TRUE;
255 }
256
257
258 bfd_boolean
259 bfd_elf_make_object (bfd *abfd)
260 {
261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
263 bed->target_id);
264 }
265
266 bfd_boolean
267 bfd_elf_mkcorefile (bfd *abfd)
268 {
269 /* I think this can be done just like an object file. */
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return FALSE;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
274 }
275
276 char *
277 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
278 {
279 Elf_Internal_Shdr **i_shdrp;
280 bfd_byte *shstrtab = NULL;
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
283
284 i_shdrp = elf_elfsections (abfd);
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
288 return NULL;
289
290 shstrtab = i_shdrp[shindex]->contents;
291 if (shstrtab == NULL)
292 {
293 /* No cached one, attempt to read, and cache what we read. */
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
299 if (shstrtabsize + 1 <= 1
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
302 shstrtabsize)) == NULL)
303 {
304 /* Once we've failed to read it, make sure we don't keep
305 trying. Otherwise, we'll keep allocating space for
306 the string table over and over. */
307 i_shdrp[shindex]->sh_size = 0;
308 }
309 else
310 shstrtab[shstrtabsize] = '\0';
311 i_shdrp[shindex]->contents = shstrtab;
312 }
313 return (char *) shstrtab;
314 }
315
316 char *
317 bfd_elf_string_from_elf_section (bfd *abfd,
318 unsigned int shindex,
319 unsigned int strindex)
320 {
321 Elf_Internal_Shdr *hdr;
322
323 if (strindex == 0)
324 return "";
325
326 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
327 return NULL;
328
329 hdr = elf_elfsections (abfd)[shindex];
330
331 if (hdr->contents == NULL)
332 {
333 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
334 {
335 /* PR 17512: file: f057ec89. */
336 /* xgettext:c-format */
337 _bfd_error_handler (_("%pB: attempt to load strings from"
338 " a non-string section (number %d)"),
339 abfd, shindex);
340 return NULL;
341 }
342
343 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
344 return NULL;
345 }
346 else
347 {
348 /* PR 24273: The string section's contents may have already
349 been loaded elsewhere, eg because a corrupt file has the
350 string section index in the ELF header pointing at a group
351 section. So be paranoid, and test that the last byte of
352 the section is zero. */
353 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
354 return NULL;
355 }
356
357 if (strindex >= hdr->sh_size)
358 {
359 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
360 _bfd_error_handler
361 /* xgettext:c-format */
362 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
363 abfd, strindex, (uint64_t) hdr->sh_size,
364 (shindex == shstrndx && strindex == hdr->sh_name
365 ? ".shstrtab"
366 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
367 return NULL;
368 }
369
370 return ((char *) hdr->contents) + strindex;
371 }
372
373 /* Read and convert symbols to internal format.
374 SYMCOUNT specifies the number of symbols to read, starting from
375 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
376 are non-NULL, they are used to store the internal symbols, external
377 symbols, and symbol section index extensions, respectively.
378 Returns a pointer to the internal symbol buffer (malloced if necessary)
379 or NULL if there were no symbols or some kind of problem. */
380
381 Elf_Internal_Sym *
382 bfd_elf_get_elf_syms (bfd *ibfd,
383 Elf_Internal_Shdr *symtab_hdr,
384 size_t symcount,
385 size_t symoffset,
386 Elf_Internal_Sym *intsym_buf,
387 void *extsym_buf,
388 Elf_External_Sym_Shndx *extshndx_buf)
389 {
390 Elf_Internal_Shdr *shndx_hdr;
391 void *alloc_ext;
392 const bfd_byte *esym;
393 Elf_External_Sym_Shndx *alloc_extshndx;
394 Elf_External_Sym_Shndx *shndx;
395 Elf_Internal_Sym *alloc_intsym;
396 Elf_Internal_Sym *isym;
397 Elf_Internal_Sym *isymend;
398 const struct elf_backend_data *bed;
399 size_t extsym_size;
400 size_t amt;
401 file_ptr pos;
402
403 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
404 abort ();
405
406 if (symcount == 0)
407 return intsym_buf;
408
409 /* Normal syms might have section extension entries. */
410 shndx_hdr = NULL;
411 if (elf_symtab_shndx_list (ibfd) != NULL)
412 {
413 elf_section_list * entry;
414 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
415
416 /* Find an index section that is linked to this symtab section. */
417 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
418 {
419 /* PR 20063. */
420 if (entry->hdr.sh_link >= elf_numsections (ibfd))
421 continue;
422
423 if (sections[entry->hdr.sh_link] == symtab_hdr)
424 {
425 shndx_hdr = & entry->hdr;
426 break;
427 };
428 }
429
430 if (shndx_hdr == NULL)
431 {
432 if (symtab_hdr == & elf_symtab_hdr (ibfd))
433 /* Not really accurate, but this was how the old code used to work. */
434 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
435 /* Otherwise we do nothing. The assumption is that
436 the index table will not be needed. */
437 }
438 }
439
440 /* Read the symbols. */
441 alloc_ext = NULL;
442 alloc_extshndx = NULL;
443 alloc_intsym = NULL;
444 bed = get_elf_backend_data (ibfd);
445 extsym_size = bed->s->sizeof_sym;
446 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
447 {
448 bfd_set_error (bfd_error_file_too_big);
449 intsym_buf = NULL;
450 goto out;
451 }
452 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
453 if (extsym_buf == NULL)
454 {
455 alloc_ext = bfd_malloc (amt);
456 extsym_buf = alloc_ext;
457 }
458 if (extsym_buf == NULL
459 || bfd_seek (ibfd, pos, SEEK_SET) != 0
460 || bfd_bread (extsym_buf, amt, ibfd) != amt)
461 {
462 intsym_buf = NULL;
463 goto out;
464 }
465
466 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
467 extshndx_buf = NULL;
468 else
469 {
470 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
471 {
472 bfd_set_error (bfd_error_file_too_big);
473 intsym_buf = NULL;
474 goto out;
475 }
476 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
477 if (extshndx_buf == NULL)
478 {
479 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
480 extshndx_buf = alloc_extshndx;
481 }
482 if (extshndx_buf == NULL
483 || bfd_seek (ibfd, pos, SEEK_SET) != 0
484 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
485 {
486 intsym_buf = NULL;
487 goto out;
488 }
489 }
490
491 if (intsym_buf == NULL)
492 {
493 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
494 {
495 bfd_set_error (bfd_error_file_too_big);
496 goto out;
497 }
498 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
499 intsym_buf = alloc_intsym;
500 if (intsym_buf == NULL)
501 goto out;
502 }
503
504 /* Convert the symbols to internal form. */
505 isymend = intsym_buf + symcount;
506 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
507 shndx = extshndx_buf;
508 isym < isymend;
509 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
510 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
511 {
512 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
513 /* xgettext:c-format */
514 _bfd_error_handler (_("%pB symbol number %lu references"
515 " nonexistent SHT_SYMTAB_SHNDX section"),
516 ibfd, (unsigned long) symoffset);
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 free (alloc_ext);
524 free (alloc_extshndx);
525
526 return intsym_buf;
527 }
528
529 /* Look up a symbol name. */
530 const char *
531 bfd_elf_sym_name (bfd *abfd,
532 Elf_Internal_Shdr *symtab_hdr,
533 Elf_Internal_Sym *isym,
534 asection *sym_sec)
535 {
536 const char *name;
537 unsigned int iname = isym->st_name;
538 unsigned int shindex = symtab_hdr->sh_link;
539
540 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
541 /* Check for a bogus st_shndx to avoid crashing. */
542 && isym->st_shndx < elf_numsections (abfd))
543 {
544 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
545 shindex = elf_elfheader (abfd)->e_shstrndx;
546 }
547
548 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
549 if (name == NULL)
550 name = "(null)";
551 else if (sym_sec && *name == '\0')
552 name = bfd_section_name (sym_sec);
553
554 return name;
555 }
556
557 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
558 sections. The first element is the flags, the rest are section
559 pointers. */
560
561 typedef union elf_internal_group {
562 Elf_Internal_Shdr *shdr;
563 unsigned int flags;
564 } Elf_Internal_Group;
565
566 /* Return the name of the group signature symbol. Why isn't the
567 signature just a string? */
568
569 static const char *
570 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
571 {
572 Elf_Internal_Shdr *hdr;
573 unsigned char esym[sizeof (Elf64_External_Sym)];
574 Elf_External_Sym_Shndx eshndx;
575 Elf_Internal_Sym isym;
576
577 /* First we need to ensure the symbol table is available. Make sure
578 that it is a symbol table section. */
579 if (ghdr->sh_link >= elf_numsections (abfd))
580 return NULL;
581 hdr = elf_elfsections (abfd) [ghdr->sh_link];
582 if (hdr->sh_type != SHT_SYMTAB
583 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
584 return NULL;
585
586 /* Go read the symbol. */
587 hdr = &elf_tdata (abfd)->symtab_hdr;
588 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
589 &isym, esym, &eshndx) == NULL)
590 return NULL;
591
592 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
593 }
594
595 /* Set next_in_group list pointer, and group name for NEWSECT. */
596
597 static bfd_boolean
598 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
599 {
600 unsigned int num_group = elf_tdata (abfd)->num_group;
601
602 /* If num_group is zero, read in all SHT_GROUP sections. The count
603 is set to -1 if there are no SHT_GROUP sections. */
604 if (num_group == 0)
605 {
606 unsigned int i, shnum;
607
608 /* First count the number of groups. If we have a SHT_GROUP
609 section with just a flag word (ie. sh_size is 4), ignore it. */
610 shnum = elf_numsections (abfd);
611 num_group = 0;
612
613 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
614 ( (shdr)->sh_type == SHT_GROUP \
615 && (shdr)->sh_size >= minsize \
616 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
617 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
618
619 for (i = 0; i < shnum; i++)
620 {
621 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
622
623 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
624 num_group += 1;
625 }
626
627 if (num_group == 0)
628 {
629 num_group = (unsigned) -1;
630 elf_tdata (abfd)->num_group = num_group;
631 elf_tdata (abfd)->group_sect_ptr = NULL;
632 }
633 else
634 {
635 /* We keep a list of elf section headers for group sections,
636 so we can find them quickly. */
637 size_t amt;
638
639 elf_tdata (abfd)->num_group = num_group;
640 amt = num_group * sizeof (Elf_Internal_Shdr *);
641 elf_tdata (abfd)->group_sect_ptr
642 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
643 if (elf_tdata (abfd)->group_sect_ptr == NULL)
644 return FALSE;
645 num_group = 0;
646
647 for (i = 0; i < shnum; i++)
648 {
649 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
650
651 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
652 {
653 unsigned char *src;
654 Elf_Internal_Group *dest;
655
656 /* Make sure the group section has a BFD section
657 attached to it. */
658 if (!bfd_section_from_shdr (abfd, i))
659 return FALSE;
660
661 /* Add to list of sections. */
662 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
663 num_group += 1;
664
665 /* Read the raw contents. */
666 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
667 shdr->contents = NULL;
668 if (_bfd_mul_overflow (shdr->sh_size,
669 sizeof (*dest) / 4, &amt)
670 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
671 || !(shdr->contents
672 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
673 {
674 _bfd_error_handler
675 /* xgettext:c-format */
676 (_("%pB: invalid size field in group section"
677 " header: %#" PRIx64 ""),
678 abfd, (uint64_t) shdr->sh_size);
679 bfd_set_error (bfd_error_bad_value);
680 -- num_group;
681 continue;
682 }
683
684 /* Translate raw contents, a flag word followed by an
685 array of elf section indices all in target byte order,
686 to the flag word followed by an array of elf section
687 pointers. */
688 src = shdr->contents + shdr->sh_size;
689 dest = (Elf_Internal_Group *) (shdr->contents + amt);
690
691 while (1)
692 {
693 unsigned int idx;
694
695 src -= 4;
696 --dest;
697 idx = H_GET_32 (abfd, src);
698 if (src == shdr->contents)
699 {
700 dest->shdr = NULL;
701 dest->flags = idx;
702 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
703 shdr->bfd_section->flags
704 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
705 break;
706 }
707 if (idx < shnum)
708 {
709 dest->shdr = elf_elfsections (abfd)[idx];
710 /* PR binutils/23199: All sections in a
711 section group should be marked with
712 SHF_GROUP. But some tools generate
713 broken objects without SHF_GROUP. Fix
714 them up here. */
715 dest->shdr->sh_flags |= SHF_GROUP;
716 }
717 if (idx >= shnum
718 || dest->shdr->sh_type == SHT_GROUP)
719 {
720 _bfd_error_handler
721 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
722 abfd, i);
723 dest->shdr = NULL;
724 }
725 }
726 }
727 }
728
729 /* PR 17510: Corrupt binaries might contain invalid groups. */
730 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
731 {
732 elf_tdata (abfd)->num_group = num_group;
733
734 /* If all groups are invalid then fail. */
735 if (num_group == 0)
736 {
737 elf_tdata (abfd)->group_sect_ptr = NULL;
738 elf_tdata (abfd)->num_group = num_group = -1;
739 _bfd_error_handler
740 (_("%pB: no valid group sections found"), abfd);
741 bfd_set_error (bfd_error_bad_value);
742 }
743 }
744 }
745 }
746
747 if (num_group != (unsigned) -1)
748 {
749 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
750 unsigned int j;
751
752 for (j = 0; j < num_group; j++)
753 {
754 /* Begin search from previous found group. */
755 unsigned i = (j + search_offset) % num_group;
756
757 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
758 Elf_Internal_Group *idx;
759 bfd_size_type n_elt;
760
761 if (shdr == NULL)
762 continue;
763
764 idx = (Elf_Internal_Group *) shdr->contents;
765 if (idx == NULL || shdr->sh_size < 4)
766 {
767 /* See PR 21957 for a reproducer. */
768 /* xgettext:c-format */
769 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
770 abfd, shdr->bfd_section);
771 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
772 bfd_set_error (bfd_error_bad_value);
773 return FALSE;
774 }
775 n_elt = shdr->sh_size / 4;
776
777 /* Look through this group's sections to see if current
778 section is a member. */
779 while (--n_elt != 0)
780 if ((++idx)->shdr == hdr)
781 {
782 asection *s = NULL;
783
784 /* We are a member of this group. Go looking through
785 other members to see if any others are linked via
786 next_in_group. */
787 idx = (Elf_Internal_Group *) shdr->contents;
788 n_elt = shdr->sh_size / 4;
789 while (--n_elt != 0)
790 if ((++idx)->shdr != NULL
791 && (s = idx->shdr->bfd_section) != NULL
792 && elf_next_in_group (s) != NULL)
793 break;
794 if (n_elt != 0)
795 {
796 /* Snarf the group name from other member, and
797 insert current section in circular list. */
798 elf_group_name (newsect) = elf_group_name (s);
799 elf_next_in_group (newsect) = elf_next_in_group (s);
800 elf_next_in_group (s) = newsect;
801 }
802 else
803 {
804 const char *gname;
805
806 gname = group_signature (abfd, shdr);
807 if (gname == NULL)
808 return FALSE;
809 elf_group_name (newsect) = gname;
810
811 /* Start a circular list with one element. */
812 elf_next_in_group (newsect) = newsect;
813 }
814
815 /* If the group section has been created, point to the
816 new member. */
817 if (shdr->bfd_section != NULL)
818 elf_next_in_group (shdr->bfd_section) = newsect;
819
820 elf_tdata (abfd)->group_search_offset = i;
821 j = num_group - 1;
822 break;
823 }
824 }
825 }
826
827 if (elf_group_name (newsect) == NULL)
828 {
829 /* xgettext:c-format */
830 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
831 abfd, newsect);
832 return FALSE;
833 }
834 return TRUE;
835 }
836
837 bfd_boolean
838 _bfd_elf_setup_sections (bfd *abfd)
839 {
840 unsigned int i;
841 unsigned int num_group = elf_tdata (abfd)->num_group;
842 bfd_boolean result = TRUE;
843 asection *s;
844
845 /* Process SHF_LINK_ORDER. */
846 for (s = abfd->sections; s != NULL; s = s->next)
847 {
848 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
849 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
850 {
851 unsigned int elfsec = this_hdr->sh_link;
852 /* An sh_link value of 0 is now allowed. It indicates that linked
853 to section has already been discarded, but that the current
854 section has been retained for some other reason. This linking
855 section is still a candidate for later garbage collection
856 however. */
857 if (elfsec == 0)
858 {
859 elf_linked_to_section (s) = NULL;
860 }
861 else
862 {
863 asection *linksec = NULL;
864
865 if (elfsec < elf_numsections (abfd))
866 {
867 this_hdr = elf_elfsections (abfd)[elfsec];
868 linksec = this_hdr->bfd_section;
869 }
870
871 /* PR 1991, 2008:
872 Some strip/objcopy may leave an incorrect value in
873 sh_link. We don't want to proceed. */
874 if (linksec == NULL)
875 {
876 _bfd_error_handler
877 /* xgettext:c-format */
878 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
879 s->owner, elfsec, s);
880 result = FALSE;
881 }
882
883 elf_linked_to_section (s) = linksec;
884 }
885 }
886 else if (this_hdr->sh_type == SHT_GROUP
887 && elf_next_in_group (s) == NULL)
888 {
889 _bfd_error_handler
890 /* xgettext:c-format */
891 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
892 abfd, elf_section_data (s)->this_idx);
893 result = FALSE;
894 }
895 }
896
897 /* Process section groups. */
898 if (num_group == (unsigned) -1)
899 return result;
900
901 for (i = 0; i < num_group; i++)
902 {
903 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
904 Elf_Internal_Group *idx;
905 unsigned int n_elt;
906
907 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
908 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
909 {
910 _bfd_error_handler
911 /* xgettext:c-format */
912 (_("%pB: section group entry number %u is corrupt"),
913 abfd, i);
914 result = FALSE;
915 continue;
916 }
917
918 idx = (Elf_Internal_Group *) shdr->contents;
919 n_elt = shdr->sh_size / 4;
920
921 while (--n_elt != 0)
922 {
923 ++ idx;
924
925 if (idx->shdr == NULL)
926 continue;
927 else if (idx->shdr->bfd_section)
928 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
929 else if (idx->shdr->sh_type != SHT_RELA
930 && idx->shdr->sh_type != SHT_REL)
931 {
932 /* There are some unknown sections in the group. */
933 _bfd_error_handler
934 /* xgettext:c-format */
935 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
936 abfd,
937 idx->shdr->sh_type,
938 bfd_elf_string_from_elf_section (abfd,
939 (elf_elfheader (abfd)
940 ->e_shstrndx),
941 idx->shdr->sh_name),
942 shdr->bfd_section);
943 result = FALSE;
944 }
945 }
946 }
947
948 return result;
949 }
950
951 bfd_boolean
952 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
953 {
954 return elf_next_in_group (sec) != NULL;
955 }
956
957 const char *
958 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
959 {
960 if (elf_sec_group (sec) != NULL)
961 return elf_group_name (sec);
962 return NULL;
963 }
964
965 static char *
966 convert_debug_to_zdebug (bfd *abfd, const char *name)
967 {
968 unsigned int len = strlen (name);
969 char *new_name = bfd_alloc (abfd, len + 2);
970 if (new_name == NULL)
971 return NULL;
972 new_name[0] = '.';
973 new_name[1] = 'z';
974 memcpy (new_name + 2, name + 1, len);
975 return new_name;
976 }
977
978 static char *
979 convert_zdebug_to_debug (bfd *abfd, const char *name)
980 {
981 unsigned int len = strlen (name);
982 char *new_name = bfd_alloc (abfd, len);
983 if (new_name == NULL)
984 return NULL;
985 new_name[0] = '.';
986 memcpy (new_name + 1, name + 2, len - 1);
987 return new_name;
988 }
989
990 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
991
992 struct lto_section
993 {
994 int16_t major_version;
995 int16_t minor_version;
996 unsigned char slim_object;
997
998 /* Flags is a private field that is not defined publicly. */
999 uint16_t flags;
1000 };
1001
1002 /* Make a BFD section from an ELF section. We store a pointer to the
1003 BFD section in the bfd_section field of the header. */
1004
1005 bfd_boolean
1006 _bfd_elf_make_section_from_shdr (bfd *abfd,
1007 Elf_Internal_Shdr *hdr,
1008 const char *name,
1009 int shindex)
1010 {
1011 asection *newsect;
1012 flagword flags;
1013 const struct elf_backend_data *bed;
1014 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
1015
1016 if (hdr->bfd_section != NULL)
1017 return TRUE;
1018
1019 newsect = bfd_make_section_anyway (abfd, name);
1020 if (newsect == NULL)
1021 return FALSE;
1022
1023 hdr->bfd_section = newsect;
1024 elf_section_data (newsect)->this_hdr = *hdr;
1025 elf_section_data (newsect)->this_idx = shindex;
1026
1027 /* Always use the real type/flags. */
1028 elf_section_type (newsect) = hdr->sh_type;
1029 elf_section_flags (newsect) = hdr->sh_flags;
1030
1031 newsect->filepos = hdr->sh_offset;
1032
1033 flags = SEC_NO_FLAGS;
1034 if (hdr->sh_type != SHT_NOBITS)
1035 flags |= SEC_HAS_CONTENTS;
1036 if (hdr->sh_type == SHT_GROUP)
1037 flags |= SEC_GROUP;
1038 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1039 {
1040 flags |= SEC_ALLOC;
1041 if (hdr->sh_type != SHT_NOBITS)
1042 flags |= SEC_LOAD;
1043 }
1044 if ((hdr->sh_flags & SHF_WRITE) == 0)
1045 flags |= SEC_READONLY;
1046 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1047 flags |= SEC_CODE;
1048 else if ((flags & SEC_LOAD) != 0)
1049 flags |= SEC_DATA;
1050 if ((hdr->sh_flags & SHF_MERGE) != 0)
1051 {
1052 flags |= SEC_MERGE;
1053 newsect->entsize = hdr->sh_entsize;
1054 }
1055 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1056 flags |= SEC_STRINGS;
1057 if (hdr->sh_flags & SHF_GROUP)
1058 if (!setup_group (abfd, hdr, newsect))
1059 return FALSE;
1060 if ((hdr->sh_flags & SHF_TLS) != 0)
1061 flags |= SEC_THREAD_LOCAL;
1062 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1063 flags |= SEC_EXCLUDE;
1064
1065 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1066 {
1067 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1068 but binutils as of 2019-07-23 did not set the EI_OSABI header
1069 byte. */
1070 case ELFOSABI_GNU:
1071 case ELFOSABI_FREEBSD:
1072 if ((hdr->sh_flags & SHF_GNU_RETAIN) != 0)
1073 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_retain;
1074 /* Fall through */
1075 case ELFOSABI_NONE:
1076 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1077 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1078 break;
1079 }
1080
1081 if ((flags & SEC_ALLOC) == 0)
1082 {
1083 /* The debugging sections appear to be recognized only by name,
1084 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1085 if (name [0] == '.')
1086 {
1087 if (strncmp (name, ".debug", 6) == 0
1088 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1089 || strncmp (name, ".zdebug", 7) == 0)
1090 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1091 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1092 || strncmp (name, ".note.gnu", 9) == 0)
1093 {
1094 flags |= SEC_ELF_OCTETS;
1095 opb = 1;
1096 }
1097 else if (strncmp (name, ".line", 5) == 0
1098 || strncmp (name, ".stab", 5) == 0
1099 || strcmp (name, ".gdb_index") == 0)
1100 flags |= SEC_DEBUGGING;
1101 }
1102 }
1103
1104 if (!bfd_set_section_vma (newsect, hdr->sh_addr / opb)
1105 || !bfd_set_section_size (newsect, hdr->sh_size)
1106 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1107 return FALSE;
1108
1109 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1110 only link a single copy of the section. This is used to support
1111 g++. g++ will emit each template expansion in its own section.
1112 The symbols will be defined as weak, so that multiple definitions
1113 are permitted. The GNU linker extension is to actually discard
1114 all but one of the sections. */
1115 if (CONST_STRNEQ (name, ".gnu.linkonce")
1116 && elf_next_in_group (newsect) == NULL)
1117 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1118
1119 if (!bfd_set_section_flags (newsect, flags))
1120 return FALSE;
1121
1122 bed = get_elf_backend_data (abfd);
1123 if (bed->elf_backend_section_flags)
1124 if (!bed->elf_backend_section_flags (hdr))
1125 return FALSE;
1126
1127 /* We do not parse the PT_NOTE segments as we are interested even in the
1128 separate debug info files which may have the segments offsets corrupted.
1129 PT_NOTEs from the core files are currently not parsed using BFD. */
1130 if (hdr->sh_type == SHT_NOTE)
1131 {
1132 bfd_byte *contents;
1133
1134 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1135 return FALSE;
1136
1137 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1138 hdr->sh_offset, hdr->sh_addralign);
1139 free (contents);
1140 }
1141
1142 if ((newsect->flags & SEC_ALLOC) != 0)
1143 {
1144 Elf_Internal_Phdr *phdr;
1145 unsigned int i, nload;
1146
1147 /* Some ELF linkers produce binaries with all the program header
1148 p_paddr fields zero. If we have such a binary with more than
1149 one PT_LOAD header, then leave the section lma equal to vma
1150 so that we don't create sections with overlapping lma. */
1151 phdr = elf_tdata (abfd)->phdr;
1152 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1153 if (phdr->p_paddr != 0)
1154 break;
1155 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1156 ++nload;
1157 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1158 return TRUE;
1159
1160 phdr = elf_tdata (abfd)->phdr;
1161 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1162 {
1163 if (((phdr->p_type == PT_LOAD
1164 && (hdr->sh_flags & SHF_TLS) == 0)
1165 || phdr->p_type == PT_TLS)
1166 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1167 {
1168 if ((newsect->flags & SEC_LOAD) == 0)
1169 newsect->lma = (phdr->p_paddr
1170 + hdr->sh_addr - phdr->p_vaddr) / opb;
1171 else
1172 /* We used to use the same adjustment for SEC_LOAD
1173 sections, but that doesn't work if the segment
1174 is packed with code from multiple VMAs.
1175 Instead we calculate the section LMA based on
1176 the segment LMA. It is assumed that the
1177 segment will contain sections with contiguous
1178 LMAs, even if the VMAs are not. */
1179 newsect->lma = (phdr->p_paddr
1180 + hdr->sh_offset - phdr->p_offset) / opb;
1181
1182 /* With contiguous segments, we can't tell from file
1183 offsets whether a section with zero size should
1184 be placed at the end of one segment or the
1185 beginning of the next. Decide based on vaddr. */
1186 if (hdr->sh_addr >= phdr->p_vaddr
1187 && (hdr->sh_addr + hdr->sh_size
1188 <= phdr->p_vaddr + phdr->p_memsz))
1189 break;
1190 }
1191 }
1192 }
1193
1194 /* Compress/decompress DWARF debug sections with names: .debug_* and
1195 .zdebug_*, after the section flags is set. */
1196 if ((newsect->flags & SEC_DEBUGGING)
1197 && ((name[1] == 'd' && name[6] == '_')
1198 || (name[1] == 'z' && name[7] == '_')))
1199 {
1200 enum { nothing, compress, decompress } action = nothing;
1201 int compression_header_size;
1202 bfd_size_type uncompressed_size;
1203 unsigned int uncompressed_align_power;
1204 bfd_boolean compressed
1205 = bfd_is_section_compressed_with_header (abfd, newsect,
1206 &compression_header_size,
1207 &uncompressed_size,
1208 &uncompressed_align_power);
1209 if (compressed)
1210 {
1211 /* Compressed section. Check if we should decompress. */
1212 if ((abfd->flags & BFD_DECOMPRESS))
1213 action = decompress;
1214 }
1215
1216 /* Compress the uncompressed section or convert from/to .zdebug*
1217 section. Check if we should compress. */
1218 if (action == nothing)
1219 {
1220 if (newsect->size != 0
1221 && (abfd->flags & BFD_COMPRESS)
1222 && compression_header_size >= 0
1223 && uncompressed_size > 0
1224 && (!compressed
1225 || ((compression_header_size > 0)
1226 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1227 action = compress;
1228 else
1229 return TRUE;
1230 }
1231
1232 if (action == compress)
1233 {
1234 if (!bfd_init_section_compress_status (abfd, newsect))
1235 {
1236 _bfd_error_handler
1237 /* xgettext:c-format */
1238 (_("%pB: unable to initialize compress status for section %s"),
1239 abfd, name);
1240 return FALSE;
1241 }
1242 }
1243 else
1244 {
1245 if (!bfd_init_section_decompress_status (abfd, newsect))
1246 {
1247 _bfd_error_handler
1248 /* xgettext:c-format */
1249 (_("%pB: unable to initialize decompress status for section %s"),
1250 abfd, name);
1251 return FALSE;
1252 }
1253 }
1254
1255 if (abfd->is_linker_input)
1256 {
1257 if (name[1] == 'z'
1258 && (action == decompress
1259 || (action == compress
1260 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1261 {
1262 /* Convert section name from .zdebug_* to .debug_* so
1263 that linker will consider this section as a debug
1264 section. */
1265 char *new_name = convert_zdebug_to_debug (abfd, name);
1266 if (new_name == NULL)
1267 return FALSE;
1268 bfd_rename_section (newsect, new_name);
1269 }
1270 }
1271 else
1272 /* For objdump, don't rename the section. For objcopy, delay
1273 section rename to elf_fake_sections. */
1274 newsect->flags |= SEC_ELF_RENAME;
1275 }
1276
1277 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1278 section. */
1279 const char *lto_section_name = ".gnu.lto_.lto.";
1280 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1281 {
1282 struct lto_section lsection;
1283 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1284 sizeof (struct lto_section)))
1285 abfd->lto_slim_object = lsection.slim_object;
1286 }
1287
1288 return TRUE;
1289 }
1290
1291 const char *const bfd_elf_section_type_names[] =
1292 {
1293 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1294 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1295 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1296 };
1297
1298 /* ELF relocs are against symbols. If we are producing relocatable
1299 output, and the reloc is against an external symbol, and nothing
1300 has given us any additional addend, the resulting reloc will also
1301 be against the same symbol. In such a case, we don't want to
1302 change anything about the way the reloc is handled, since it will
1303 all be done at final link time. Rather than put special case code
1304 into bfd_perform_relocation, all the reloc types use this howto
1305 function. It just short circuits the reloc if producing
1306 relocatable output against an external symbol. */
1307
1308 bfd_reloc_status_type
1309 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1310 arelent *reloc_entry,
1311 asymbol *symbol,
1312 void *data ATTRIBUTE_UNUSED,
1313 asection *input_section,
1314 bfd *output_bfd,
1315 char **error_message ATTRIBUTE_UNUSED)
1316 {
1317 if (output_bfd != NULL
1318 && (symbol->flags & BSF_SECTION_SYM) == 0
1319 && (! reloc_entry->howto->partial_inplace
1320 || reloc_entry->addend == 0))
1321 {
1322 reloc_entry->address += input_section->output_offset;
1323 return bfd_reloc_ok;
1324 }
1325
1326 return bfd_reloc_continue;
1327 }
1328 \f
1329 /* Returns TRUE if section A matches section B.
1330 Names, addresses and links may be different, but everything else
1331 should be the same. */
1332
1333 static bfd_boolean
1334 section_match (const Elf_Internal_Shdr * a,
1335 const Elf_Internal_Shdr * b)
1336 {
1337 if (a->sh_type != b->sh_type
1338 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1339 || a->sh_addralign != b->sh_addralign
1340 || a->sh_entsize != b->sh_entsize)
1341 return FALSE;
1342 if (a->sh_type == SHT_SYMTAB
1343 || a->sh_type == SHT_STRTAB)
1344 return TRUE;
1345 return a->sh_size == b->sh_size;
1346 }
1347
1348 /* Find a section in OBFD that has the same characteristics
1349 as IHEADER. Return the index of this section or SHN_UNDEF if
1350 none can be found. Check's section HINT first, as this is likely
1351 to be the correct section. */
1352
1353 static unsigned int
1354 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1355 const unsigned int hint)
1356 {
1357 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1358 unsigned int i;
1359
1360 BFD_ASSERT (iheader != NULL);
1361
1362 /* See PR 20922 for a reproducer of the NULL test. */
1363 if (hint < elf_numsections (obfd)
1364 && oheaders[hint] != NULL
1365 && section_match (oheaders[hint], iheader))
1366 return hint;
1367
1368 for (i = 1; i < elf_numsections (obfd); i++)
1369 {
1370 Elf_Internal_Shdr * oheader = oheaders[i];
1371
1372 if (oheader == NULL)
1373 continue;
1374 if (section_match (oheader, iheader))
1375 /* FIXME: Do we care if there is a potential for
1376 multiple matches ? */
1377 return i;
1378 }
1379
1380 return SHN_UNDEF;
1381 }
1382
1383 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1384 Processor specific section, based upon a matching input section.
1385 Returns TRUE upon success, FALSE otherwise. */
1386
1387 static bfd_boolean
1388 copy_special_section_fields (const bfd *ibfd,
1389 bfd *obfd,
1390 const Elf_Internal_Shdr *iheader,
1391 Elf_Internal_Shdr *oheader,
1392 const unsigned int secnum)
1393 {
1394 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1395 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1396 bfd_boolean changed = FALSE;
1397 unsigned int sh_link;
1398
1399 if (oheader->sh_type == SHT_NOBITS)
1400 {
1401 /* This is a feature for objcopy --only-keep-debug:
1402 When a section's type is changed to NOBITS, we preserve
1403 the sh_link and sh_info fields so that they can be
1404 matched up with the original.
1405
1406 Note: Strictly speaking these assignments are wrong.
1407 The sh_link and sh_info fields should point to the
1408 relevent sections in the output BFD, which may not be in
1409 the same location as they were in the input BFD. But
1410 the whole point of this action is to preserve the
1411 original values of the sh_link and sh_info fields, so
1412 that they can be matched up with the section headers in
1413 the original file. So strictly speaking we may be
1414 creating an invalid ELF file, but it is only for a file
1415 that just contains debug info and only for sections
1416 without any contents. */
1417 if (oheader->sh_link == 0)
1418 oheader->sh_link = iheader->sh_link;
1419 if (oheader->sh_info == 0)
1420 oheader->sh_info = iheader->sh_info;
1421 return TRUE;
1422 }
1423
1424 /* Allow the target a chance to decide how these fields should be set. */
1425 if (bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1426 iheader, oheader))
1427 return TRUE;
1428
1429 /* We have an iheader which might match oheader, and which has non-zero
1430 sh_info and/or sh_link fields. Attempt to follow those links and find
1431 the section in the output bfd which corresponds to the linked section
1432 in the input bfd. */
1433 if (iheader->sh_link != SHN_UNDEF)
1434 {
1435 /* See PR 20931 for a reproducer. */
1436 if (iheader->sh_link >= elf_numsections (ibfd))
1437 {
1438 _bfd_error_handler
1439 /* xgettext:c-format */
1440 (_("%pB: invalid sh_link field (%d) in section number %d"),
1441 ibfd, iheader->sh_link, secnum);
1442 return FALSE;
1443 }
1444
1445 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1446 if (sh_link != SHN_UNDEF)
1447 {
1448 oheader->sh_link = sh_link;
1449 changed = TRUE;
1450 }
1451 else
1452 /* FIXME: Should we install iheader->sh_link
1453 if we could not find a match ? */
1454 _bfd_error_handler
1455 /* xgettext:c-format */
1456 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1457 }
1458
1459 if (iheader->sh_info)
1460 {
1461 /* The sh_info field can hold arbitrary information, but if the
1462 SHF_LINK_INFO flag is set then it should be interpreted as a
1463 section index. */
1464 if (iheader->sh_flags & SHF_INFO_LINK)
1465 {
1466 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1467 iheader->sh_info);
1468 if (sh_link != SHN_UNDEF)
1469 oheader->sh_flags |= SHF_INFO_LINK;
1470 }
1471 else
1472 /* No idea what it means - just copy it. */
1473 sh_link = iheader->sh_info;
1474
1475 if (sh_link != SHN_UNDEF)
1476 {
1477 oheader->sh_info = sh_link;
1478 changed = TRUE;
1479 }
1480 else
1481 _bfd_error_handler
1482 /* xgettext:c-format */
1483 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1484 }
1485
1486 return changed;
1487 }
1488
1489 /* Copy the program header and other data from one object module to
1490 another. */
1491
1492 bfd_boolean
1493 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1494 {
1495 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1496 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1497 const struct elf_backend_data *bed;
1498 unsigned int i;
1499
1500 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1501 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1502 return TRUE;
1503
1504 if (!elf_flags_init (obfd))
1505 {
1506 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1507 elf_flags_init (obfd) = TRUE;
1508 }
1509
1510 elf_gp (obfd) = elf_gp (ibfd);
1511
1512 /* Also copy the EI_OSABI field. */
1513 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1514 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1515
1516 /* If set, copy the EI_ABIVERSION field. */
1517 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1518 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1519 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1520
1521 /* Copy object attributes. */
1522 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1523
1524 if (iheaders == NULL || oheaders == NULL)
1525 return TRUE;
1526
1527 bed = get_elf_backend_data (obfd);
1528
1529 /* Possibly copy other fields in the section header. */
1530 for (i = 1; i < elf_numsections (obfd); i++)
1531 {
1532 unsigned int j;
1533 Elf_Internal_Shdr * oheader = oheaders[i];
1534
1535 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1536 because of a special case need for generating separate debug info
1537 files. See below for more details. */
1538 if (oheader == NULL
1539 || (oheader->sh_type != SHT_NOBITS
1540 && oheader->sh_type < SHT_LOOS))
1541 continue;
1542
1543 /* Ignore empty sections, and sections whose
1544 fields have already been initialised. */
1545 if (oheader->sh_size == 0
1546 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1547 continue;
1548
1549 /* Scan for the matching section in the input bfd.
1550 First we try for a direct mapping between the input and output sections. */
1551 for (j = 1; j < elf_numsections (ibfd); j++)
1552 {
1553 const Elf_Internal_Shdr * iheader = iheaders[j];
1554
1555 if (iheader == NULL)
1556 continue;
1557
1558 if (oheader->bfd_section != NULL
1559 && iheader->bfd_section != NULL
1560 && iheader->bfd_section->output_section != NULL
1561 && iheader->bfd_section->output_section == oheader->bfd_section)
1562 {
1563 /* We have found a connection from the input section to the
1564 output section. Attempt to copy the header fields. If
1565 this fails then do not try any further sections - there
1566 should only be a one-to-one mapping between input and output. */
1567 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1568 j = elf_numsections (ibfd);
1569 break;
1570 }
1571 }
1572
1573 if (j < elf_numsections (ibfd))
1574 continue;
1575
1576 /* That failed. So try to deduce the corresponding input section.
1577 Unfortunately we cannot compare names as the output string table
1578 is empty, so instead we check size, address and type. */
1579 for (j = 1; j < elf_numsections (ibfd); j++)
1580 {
1581 const Elf_Internal_Shdr * iheader = iheaders[j];
1582
1583 if (iheader == NULL)
1584 continue;
1585
1586 /* Try matching fields in the input section's header.
1587 Since --only-keep-debug turns all non-debug sections into
1588 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1589 input type. */
1590 if ((oheader->sh_type == SHT_NOBITS
1591 || iheader->sh_type == oheader->sh_type)
1592 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1593 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1594 && iheader->sh_addralign == oheader->sh_addralign
1595 && iheader->sh_entsize == oheader->sh_entsize
1596 && iheader->sh_size == oheader->sh_size
1597 && iheader->sh_addr == oheader->sh_addr
1598 && (iheader->sh_info != oheader->sh_info
1599 || iheader->sh_link != oheader->sh_link))
1600 {
1601 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1602 break;
1603 }
1604 }
1605
1606 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1607 {
1608 /* Final attempt. Call the backend copy function
1609 with a NULL input section. */
1610 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1611 NULL, oheader);
1612 }
1613 }
1614
1615 return TRUE;
1616 }
1617
1618 static const char *
1619 get_segment_type (unsigned int p_type)
1620 {
1621 const char *pt;
1622 switch (p_type)
1623 {
1624 case PT_NULL: pt = "NULL"; break;
1625 case PT_LOAD: pt = "LOAD"; break;
1626 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1627 case PT_INTERP: pt = "INTERP"; break;
1628 case PT_NOTE: pt = "NOTE"; break;
1629 case PT_SHLIB: pt = "SHLIB"; break;
1630 case PT_PHDR: pt = "PHDR"; break;
1631 case PT_TLS: pt = "TLS"; break;
1632 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1633 case PT_GNU_STACK: pt = "STACK"; break;
1634 case PT_GNU_RELRO: pt = "RELRO"; break;
1635 default: pt = NULL; break;
1636 }
1637 return pt;
1638 }
1639
1640 /* Print out the program headers. */
1641
1642 bfd_boolean
1643 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1644 {
1645 FILE *f = (FILE *) farg;
1646 Elf_Internal_Phdr *p;
1647 asection *s;
1648 bfd_byte *dynbuf = NULL;
1649
1650 p = elf_tdata (abfd)->phdr;
1651 if (p != NULL)
1652 {
1653 unsigned int i, c;
1654
1655 fprintf (f, _("\nProgram Header:\n"));
1656 c = elf_elfheader (abfd)->e_phnum;
1657 for (i = 0; i < c; i++, p++)
1658 {
1659 const char *pt = get_segment_type (p->p_type);
1660 char buf[20];
1661
1662 if (pt == NULL)
1663 {
1664 sprintf (buf, "0x%lx", p->p_type);
1665 pt = buf;
1666 }
1667 fprintf (f, "%8s off 0x", pt);
1668 bfd_fprintf_vma (abfd, f, p->p_offset);
1669 fprintf (f, " vaddr 0x");
1670 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1671 fprintf (f, " paddr 0x");
1672 bfd_fprintf_vma (abfd, f, p->p_paddr);
1673 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1674 fprintf (f, " filesz 0x");
1675 bfd_fprintf_vma (abfd, f, p->p_filesz);
1676 fprintf (f, " memsz 0x");
1677 bfd_fprintf_vma (abfd, f, p->p_memsz);
1678 fprintf (f, " flags %c%c%c",
1679 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1680 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1681 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1682 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1683 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1684 fprintf (f, "\n");
1685 }
1686 }
1687
1688 s = bfd_get_section_by_name (abfd, ".dynamic");
1689 if (s != NULL)
1690 {
1691 unsigned int elfsec;
1692 unsigned long shlink;
1693 bfd_byte *extdyn, *extdynend;
1694 size_t extdynsize;
1695 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1696
1697 fprintf (f, _("\nDynamic Section:\n"));
1698
1699 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1700 goto error_return;
1701
1702 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1703 if (elfsec == SHN_BAD)
1704 goto error_return;
1705 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1706
1707 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1708 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1709
1710 extdyn = dynbuf;
1711 /* PR 17512: file: 6f427532. */
1712 if (s->size < extdynsize)
1713 goto error_return;
1714 extdynend = extdyn + s->size;
1715 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1716 Fix range check. */
1717 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1718 {
1719 Elf_Internal_Dyn dyn;
1720 const char *name = "";
1721 char ab[20];
1722 bfd_boolean stringp;
1723 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1724
1725 (*swap_dyn_in) (abfd, extdyn, &dyn);
1726
1727 if (dyn.d_tag == DT_NULL)
1728 break;
1729
1730 stringp = FALSE;
1731 switch (dyn.d_tag)
1732 {
1733 default:
1734 if (bed->elf_backend_get_target_dtag)
1735 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1736
1737 if (!strcmp (name, ""))
1738 {
1739 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1740 name = ab;
1741 }
1742 break;
1743
1744 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1745 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1746 case DT_PLTGOT: name = "PLTGOT"; break;
1747 case DT_HASH: name = "HASH"; break;
1748 case DT_STRTAB: name = "STRTAB"; break;
1749 case DT_SYMTAB: name = "SYMTAB"; break;
1750 case DT_RELA: name = "RELA"; break;
1751 case DT_RELASZ: name = "RELASZ"; break;
1752 case DT_RELAENT: name = "RELAENT"; break;
1753 case DT_STRSZ: name = "STRSZ"; break;
1754 case DT_SYMENT: name = "SYMENT"; break;
1755 case DT_INIT: name = "INIT"; break;
1756 case DT_FINI: name = "FINI"; break;
1757 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1758 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1759 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1760 case DT_REL: name = "REL"; break;
1761 case DT_RELSZ: name = "RELSZ"; break;
1762 case DT_RELENT: name = "RELENT"; break;
1763 case DT_PLTREL: name = "PLTREL"; break;
1764 case DT_DEBUG: name = "DEBUG"; break;
1765 case DT_TEXTREL: name = "TEXTREL"; break;
1766 case DT_JMPREL: name = "JMPREL"; break;
1767 case DT_BIND_NOW: name = "BIND_NOW"; break;
1768 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1769 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1770 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1771 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1772 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1773 case DT_FLAGS: name = "FLAGS"; break;
1774 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1775 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1776 case DT_CHECKSUM: name = "CHECKSUM"; break;
1777 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1778 case DT_MOVEENT: name = "MOVEENT"; break;
1779 case DT_MOVESZ: name = "MOVESZ"; break;
1780 case DT_FEATURE: name = "FEATURE"; break;
1781 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1782 case DT_SYMINSZ: name = "SYMINSZ"; break;
1783 case DT_SYMINENT: name = "SYMINENT"; break;
1784 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1785 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1786 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1787 case DT_PLTPAD: name = "PLTPAD"; break;
1788 case DT_MOVETAB: name = "MOVETAB"; break;
1789 case DT_SYMINFO: name = "SYMINFO"; break;
1790 case DT_RELACOUNT: name = "RELACOUNT"; break;
1791 case DT_RELCOUNT: name = "RELCOUNT"; break;
1792 case DT_FLAGS_1: name = "FLAGS_1"; break;
1793 case DT_VERSYM: name = "VERSYM"; break;
1794 case DT_VERDEF: name = "VERDEF"; break;
1795 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1796 case DT_VERNEED: name = "VERNEED"; break;
1797 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1798 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1799 case DT_USED: name = "USED"; break;
1800 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1801 case DT_GNU_HASH: name = "GNU_HASH"; break;
1802 }
1803
1804 fprintf (f, " %-20s ", name);
1805 if (! stringp)
1806 {
1807 fprintf (f, "0x");
1808 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1809 }
1810 else
1811 {
1812 const char *string;
1813 unsigned int tagv = dyn.d_un.d_val;
1814
1815 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1816 if (string == NULL)
1817 goto error_return;
1818 fprintf (f, "%s", string);
1819 }
1820 fprintf (f, "\n");
1821 }
1822
1823 free (dynbuf);
1824 dynbuf = NULL;
1825 }
1826
1827 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1828 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1829 {
1830 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1831 return FALSE;
1832 }
1833
1834 if (elf_dynverdef (abfd) != 0)
1835 {
1836 Elf_Internal_Verdef *t;
1837
1838 fprintf (f, _("\nVersion definitions:\n"));
1839 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1840 {
1841 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1842 t->vd_flags, t->vd_hash,
1843 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1844 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1845 {
1846 Elf_Internal_Verdaux *a;
1847
1848 fprintf (f, "\t");
1849 for (a = t->vd_auxptr->vda_nextptr;
1850 a != NULL;
1851 a = a->vda_nextptr)
1852 fprintf (f, "%s ",
1853 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1854 fprintf (f, "\n");
1855 }
1856 }
1857 }
1858
1859 if (elf_dynverref (abfd) != 0)
1860 {
1861 Elf_Internal_Verneed *t;
1862
1863 fprintf (f, _("\nVersion References:\n"));
1864 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1865 {
1866 Elf_Internal_Vernaux *a;
1867
1868 fprintf (f, _(" required from %s:\n"),
1869 t->vn_filename ? t->vn_filename : "<corrupt>");
1870 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1871 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1872 a->vna_flags, a->vna_other,
1873 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1874 }
1875 }
1876
1877 return TRUE;
1878
1879 error_return:
1880 free (dynbuf);
1881 return FALSE;
1882 }
1883
1884 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1885 and return symbol version for symbol version itself. */
1886
1887 const char *
1888 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1889 bfd_boolean base_p,
1890 bfd_boolean *hidden)
1891 {
1892 const char *version_string = NULL;
1893 if (elf_dynversym (abfd) != 0
1894 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1895 {
1896 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1897
1898 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1899 vernum &= VERSYM_VERSION;
1900
1901 if (vernum == 0)
1902 version_string = "";
1903 else if (vernum == 1
1904 && (vernum > elf_tdata (abfd)->cverdefs
1905 || (elf_tdata (abfd)->verdef[0].vd_flags
1906 == VER_FLG_BASE)))
1907 version_string = base_p ? "Base" : "";
1908 else if (vernum <= elf_tdata (abfd)->cverdefs)
1909 {
1910 const char *nodename
1911 = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1912 version_string = "";
1913 if (base_p
1914 || nodename == NULL
1915 || symbol->name == NULL
1916 || strcmp (symbol->name, nodename) != 0)
1917 version_string = nodename;
1918 }
1919 else
1920 {
1921 Elf_Internal_Verneed *t;
1922
1923 version_string = _("<corrupt>");
1924 for (t = elf_tdata (abfd)->verref;
1925 t != NULL;
1926 t = t->vn_nextref)
1927 {
1928 Elf_Internal_Vernaux *a;
1929
1930 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1931 {
1932 if (a->vna_other == vernum)
1933 {
1934 version_string = a->vna_nodename;
1935 break;
1936 }
1937 }
1938 }
1939 }
1940 }
1941 return version_string;
1942 }
1943
1944 /* Display ELF-specific fields of a symbol. */
1945
1946 void
1947 bfd_elf_print_symbol (bfd *abfd,
1948 void *filep,
1949 asymbol *symbol,
1950 bfd_print_symbol_type how)
1951 {
1952 FILE *file = (FILE *) filep;
1953 switch (how)
1954 {
1955 case bfd_print_symbol_name:
1956 fprintf (file, "%s", symbol->name);
1957 break;
1958 case bfd_print_symbol_more:
1959 fprintf (file, "elf ");
1960 bfd_fprintf_vma (abfd, file, symbol->value);
1961 fprintf (file, " %x", symbol->flags);
1962 break;
1963 case bfd_print_symbol_all:
1964 {
1965 const char *section_name;
1966 const char *name = NULL;
1967 const struct elf_backend_data *bed;
1968 unsigned char st_other;
1969 bfd_vma val;
1970 const char *version_string;
1971 bfd_boolean hidden;
1972
1973 section_name = symbol->section ? symbol->section->name : "(*none*)";
1974
1975 bed = get_elf_backend_data (abfd);
1976 if (bed->elf_backend_print_symbol_all)
1977 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1978
1979 if (name == NULL)
1980 {
1981 name = symbol->name;
1982 bfd_print_symbol_vandf (abfd, file, symbol);
1983 }
1984
1985 fprintf (file, " %s\t", section_name);
1986 /* Print the "other" value for a symbol. For common symbols,
1987 we've already printed the size; now print the alignment.
1988 For other symbols, we have no specified alignment, and
1989 we've printed the address; now print the size. */
1990 if (symbol->section && bfd_is_com_section (symbol->section))
1991 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1992 else
1993 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1994 bfd_fprintf_vma (abfd, file, val);
1995
1996 /* If we have version information, print it. */
1997 version_string = _bfd_elf_get_symbol_version_string (abfd,
1998 symbol,
1999 TRUE,
2000 &hidden);
2001 if (version_string)
2002 {
2003 if (!hidden)
2004 fprintf (file, " %-11s", version_string);
2005 else
2006 {
2007 int i;
2008
2009 fprintf (file, " (%s)", version_string);
2010 for (i = 10 - strlen (version_string); i > 0; --i)
2011 putc (' ', file);
2012 }
2013 }
2014
2015 /* If the st_other field is not zero, print it. */
2016 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2017
2018 switch (st_other)
2019 {
2020 case 0: break;
2021 case STV_INTERNAL: fprintf (file, " .internal"); break;
2022 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2023 case STV_PROTECTED: fprintf (file, " .protected"); break;
2024 default:
2025 /* Some other non-defined flags are also present, so print
2026 everything hex. */
2027 fprintf (file, " 0x%02x", (unsigned int) st_other);
2028 }
2029
2030 fprintf (file, " %s", name);
2031 }
2032 break;
2033 }
2034 }
2035 \f
2036 /* ELF .o/exec file reading */
2037
2038 /* Create a new bfd section from an ELF section header. */
2039
2040 bfd_boolean
2041 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2042 {
2043 Elf_Internal_Shdr *hdr;
2044 Elf_Internal_Ehdr *ehdr;
2045 const struct elf_backend_data *bed;
2046 const char *name;
2047 bfd_boolean ret = TRUE;
2048
2049 if (shindex >= elf_numsections (abfd))
2050 return FALSE;
2051
2052 /* PR17512: A corrupt ELF binary might contain a loop of sections via
2053 sh_link or sh_info. Detect this here, by refusing to load a
2054 section that we are already in the process of loading. */
2055 if (elf_tdata (abfd)->being_created[shindex])
2056 {
2057 _bfd_error_handler
2058 (_("%pB: warning: loop in section dependencies detected"), abfd);
2059 return FALSE;
2060 }
2061 elf_tdata (abfd)->being_created[shindex] = TRUE;
2062
2063 hdr = elf_elfsections (abfd)[shindex];
2064 ehdr = elf_elfheader (abfd);
2065 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2066 hdr->sh_name);
2067 if (name == NULL)
2068 goto fail;
2069
2070 bed = get_elf_backend_data (abfd);
2071 switch (hdr->sh_type)
2072 {
2073 case SHT_NULL:
2074 /* Inactive section. Throw it away. */
2075 goto success;
2076
2077 case SHT_PROGBITS: /* Normal section with contents. */
2078 case SHT_NOBITS: /* .bss section. */
2079 case SHT_HASH: /* .hash section. */
2080 case SHT_NOTE: /* .note section. */
2081 case SHT_INIT_ARRAY: /* .init_array section. */
2082 case SHT_FINI_ARRAY: /* .fini_array section. */
2083 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2084 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2085 case SHT_GNU_HASH: /* .gnu.hash section. */
2086 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2087 goto success;
2088
2089 case SHT_DYNAMIC: /* Dynamic linking information. */
2090 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2091 goto fail;
2092
2093 if (hdr->sh_link > elf_numsections (abfd))
2094 {
2095 /* PR 10478: Accept Solaris binaries with a sh_link
2096 field set to SHN_BEFORE or SHN_AFTER. */
2097 switch (bfd_get_arch (abfd))
2098 {
2099 case bfd_arch_i386:
2100 case bfd_arch_sparc:
2101 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2102 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2103 break;
2104 /* Otherwise fall through. */
2105 default:
2106 goto fail;
2107 }
2108 }
2109 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2110 goto fail;
2111 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2112 {
2113 Elf_Internal_Shdr *dynsymhdr;
2114
2115 /* The shared libraries distributed with hpux11 have a bogus
2116 sh_link field for the ".dynamic" section. Find the
2117 string table for the ".dynsym" section instead. */
2118 if (elf_dynsymtab (abfd) != 0)
2119 {
2120 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2121 hdr->sh_link = dynsymhdr->sh_link;
2122 }
2123 else
2124 {
2125 unsigned int i, num_sec;
2126
2127 num_sec = elf_numsections (abfd);
2128 for (i = 1; i < num_sec; i++)
2129 {
2130 dynsymhdr = elf_elfsections (abfd)[i];
2131 if (dynsymhdr->sh_type == SHT_DYNSYM)
2132 {
2133 hdr->sh_link = dynsymhdr->sh_link;
2134 break;
2135 }
2136 }
2137 }
2138 }
2139 goto success;
2140
2141 case SHT_SYMTAB: /* A symbol table. */
2142 if (elf_onesymtab (abfd) == shindex)
2143 goto success;
2144
2145 if (hdr->sh_entsize != bed->s->sizeof_sym)
2146 goto fail;
2147
2148 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2149 {
2150 if (hdr->sh_size != 0)
2151 goto fail;
2152 /* Some assemblers erroneously set sh_info to one with a
2153 zero sh_size. ld sees this as a global symbol count
2154 of (unsigned) -1. Fix it here. */
2155 hdr->sh_info = 0;
2156 goto success;
2157 }
2158
2159 /* PR 18854: A binary might contain more than one symbol table.
2160 Unusual, but possible. Warn, but continue. */
2161 if (elf_onesymtab (abfd) != 0)
2162 {
2163 _bfd_error_handler
2164 /* xgettext:c-format */
2165 (_("%pB: warning: multiple symbol tables detected"
2166 " - ignoring the table in section %u"),
2167 abfd, shindex);
2168 goto success;
2169 }
2170 elf_onesymtab (abfd) = shindex;
2171 elf_symtab_hdr (abfd) = *hdr;
2172 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2173 abfd->flags |= HAS_SYMS;
2174
2175 /* Sometimes a shared object will map in the symbol table. If
2176 SHF_ALLOC is set, and this is a shared object, then we also
2177 treat this section as a BFD section. We can not base the
2178 decision purely on SHF_ALLOC, because that flag is sometimes
2179 set in a relocatable object file, which would confuse the
2180 linker. */
2181 if ((hdr->sh_flags & SHF_ALLOC) != 0
2182 && (abfd->flags & DYNAMIC) != 0
2183 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2184 shindex))
2185 goto fail;
2186
2187 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2188 can't read symbols without that section loaded as well. It
2189 is most likely specified by the next section header. */
2190 {
2191 elf_section_list * entry;
2192 unsigned int i, num_sec;
2193
2194 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2195 if (entry->hdr.sh_link == shindex)
2196 goto success;
2197
2198 num_sec = elf_numsections (abfd);
2199 for (i = shindex + 1; i < num_sec; i++)
2200 {
2201 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2202
2203 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2204 && hdr2->sh_link == shindex)
2205 break;
2206 }
2207
2208 if (i == num_sec)
2209 for (i = 1; i < shindex; i++)
2210 {
2211 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2212
2213 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2214 && hdr2->sh_link == shindex)
2215 break;
2216 }
2217
2218 if (i != shindex)
2219 ret = bfd_section_from_shdr (abfd, i);
2220 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2221 goto success;
2222 }
2223
2224 case SHT_DYNSYM: /* A dynamic symbol table. */
2225 if (elf_dynsymtab (abfd) == shindex)
2226 goto success;
2227
2228 if (hdr->sh_entsize != bed->s->sizeof_sym)
2229 goto fail;
2230
2231 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2232 {
2233 if (hdr->sh_size != 0)
2234 goto fail;
2235
2236 /* Some linkers erroneously set sh_info to one with a
2237 zero sh_size. ld sees this as a global symbol count
2238 of (unsigned) -1. Fix it here. */
2239 hdr->sh_info = 0;
2240 goto success;
2241 }
2242
2243 /* PR 18854: A binary might contain more than one dynamic symbol table.
2244 Unusual, but possible. Warn, but continue. */
2245 if (elf_dynsymtab (abfd) != 0)
2246 {
2247 _bfd_error_handler
2248 /* xgettext:c-format */
2249 (_("%pB: warning: multiple dynamic symbol tables detected"
2250 " - ignoring the table in section %u"),
2251 abfd, shindex);
2252 goto success;
2253 }
2254 elf_dynsymtab (abfd) = shindex;
2255 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2256 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2257 abfd->flags |= HAS_SYMS;
2258
2259 /* Besides being a symbol table, we also treat this as a regular
2260 section, so that objcopy can handle it. */
2261 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2262 goto success;
2263
2264 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2265 {
2266 elf_section_list * entry;
2267
2268 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2269 if (entry->ndx == shindex)
2270 goto success;
2271
2272 entry = bfd_alloc (abfd, sizeof (*entry));
2273 if (entry == NULL)
2274 goto fail;
2275 entry->ndx = shindex;
2276 entry->hdr = * hdr;
2277 entry->next = elf_symtab_shndx_list (abfd);
2278 elf_symtab_shndx_list (abfd) = entry;
2279 elf_elfsections (abfd)[shindex] = & entry->hdr;
2280 goto success;
2281 }
2282
2283 case SHT_STRTAB: /* A string table. */
2284 if (hdr->bfd_section != NULL)
2285 goto success;
2286
2287 if (ehdr->e_shstrndx == shindex)
2288 {
2289 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2290 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2291 goto success;
2292 }
2293
2294 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2295 {
2296 symtab_strtab:
2297 elf_tdata (abfd)->strtab_hdr = *hdr;
2298 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2299 goto success;
2300 }
2301
2302 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2303 {
2304 dynsymtab_strtab:
2305 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2306 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2307 elf_elfsections (abfd)[shindex] = hdr;
2308 /* We also treat this as a regular section, so that objcopy
2309 can handle it. */
2310 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2311 shindex);
2312 goto success;
2313 }
2314
2315 /* If the string table isn't one of the above, then treat it as a
2316 regular section. We need to scan all the headers to be sure,
2317 just in case this strtab section appeared before the above. */
2318 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2319 {
2320 unsigned int i, num_sec;
2321
2322 num_sec = elf_numsections (abfd);
2323 for (i = 1; i < num_sec; i++)
2324 {
2325 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2326 if (hdr2->sh_link == shindex)
2327 {
2328 /* Prevent endless recursion on broken objects. */
2329 if (i == shindex)
2330 goto fail;
2331 if (! bfd_section_from_shdr (abfd, i))
2332 goto fail;
2333 if (elf_onesymtab (abfd) == i)
2334 goto symtab_strtab;
2335 if (elf_dynsymtab (abfd) == i)
2336 goto dynsymtab_strtab;
2337 }
2338 }
2339 }
2340 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2341 goto success;
2342
2343 case SHT_REL:
2344 case SHT_RELA:
2345 /* *These* do a lot of work -- but build no sections! */
2346 {
2347 asection *target_sect;
2348 Elf_Internal_Shdr *hdr2, **p_hdr;
2349 unsigned int num_sec = elf_numsections (abfd);
2350 struct bfd_elf_section_data *esdt;
2351
2352 if (hdr->sh_entsize
2353 != (bfd_size_type) (hdr->sh_type == SHT_REL
2354 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2355 goto fail;
2356
2357 /* Check for a bogus link to avoid crashing. */
2358 if (hdr->sh_link >= num_sec)
2359 {
2360 _bfd_error_handler
2361 /* xgettext:c-format */
2362 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2363 abfd, hdr->sh_link, name, shindex);
2364 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2365 shindex);
2366 goto success;
2367 }
2368
2369 /* For some incomprehensible reason Oracle distributes
2370 libraries for Solaris in which some of the objects have
2371 bogus sh_link fields. It would be nice if we could just
2372 reject them, but, unfortunately, some people need to use
2373 them. We scan through the section headers; if we find only
2374 one suitable symbol table, we clobber the sh_link to point
2375 to it. I hope this doesn't break anything.
2376
2377 Don't do it on executable nor shared library. */
2378 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2379 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2380 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2381 {
2382 unsigned int scan;
2383 int found;
2384
2385 found = 0;
2386 for (scan = 1; scan < num_sec; scan++)
2387 {
2388 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2389 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2390 {
2391 if (found != 0)
2392 {
2393 found = 0;
2394 break;
2395 }
2396 found = scan;
2397 }
2398 }
2399 if (found != 0)
2400 hdr->sh_link = found;
2401 }
2402
2403 /* Get the symbol table. */
2404 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2405 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2406 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2407 goto fail;
2408
2409 /* If this is an alloc section in an executable or shared
2410 library, or the reloc section does not use the main symbol
2411 table we don't treat it as a reloc section. BFD can't
2412 adequately represent such a section, so at least for now,
2413 we don't try. We just present it as a normal section. We
2414 also can't use it as a reloc section if it points to the
2415 null section, an invalid section, another reloc section, or
2416 its sh_link points to the null section. */
2417 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2418 && (hdr->sh_flags & SHF_ALLOC) != 0)
2419 || hdr->sh_link == SHN_UNDEF
2420 || hdr->sh_link != elf_onesymtab (abfd)
2421 || hdr->sh_info == SHN_UNDEF
2422 || hdr->sh_info >= num_sec
2423 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2424 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2425 {
2426 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2427 shindex);
2428 goto success;
2429 }
2430
2431 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2432 goto fail;
2433
2434 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2435 if (target_sect == NULL)
2436 goto fail;
2437
2438 esdt = elf_section_data (target_sect);
2439 if (hdr->sh_type == SHT_RELA)
2440 p_hdr = &esdt->rela.hdr;
2441 else
2442 p_hdr = &esdt->rel.hdr;
2443
2444 /* PR 17512: file: 0b4f81b7.
2445 Also see PR 24456, for a file which deliberately has two reloc
2446 sections. */
2447 if (*p_hdr != NULL)
2448 {
2449 if (!bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2450 {
2451 _bfd_error_handler
2452 /* xgettext:c-format */
2453 (_("%pB: warning: secondary relocation section '%s' "
2454 "for section %pA found - ignoring"),
2455 abfd, name, target_sect);
2456 }
2457 goto success;
2458 }
2459
2460 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2461 if (hdr2 == NULL)
2462 goto fail;
2463 *hdr2 = *hdr;
2464 *p_hdr = hdr2;
2465 elf_elfsections (abfd)[shindex] = hdr2;
2466 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2467 * bed->s->int_rels_per_ext_rel);
2468 target_sect->flags |= SEC_RELOC;
2469 target_sect->relocation = NULL;
2470 target_sect->rel_filepos = hdr->sh_offset;
2471 /* In the section to which the relocations apply, mark whether
2472 its relocations are of the REL or RELA variety. */
2473 if (hdr->sh_size != 0)
2474 {
2475 if (hdr->sh_type == SHT_RELA)
2476 target_sect->use_rela_p = 1;
2477 }
2478 abfd->flags |= HAS_RELOC;
2479 goto success;
2480 }
2481
2482 case SHT_GNU_verdef:
2483 elf_dynverdef (abfd) = shindex;
2484 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2485 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2486 goto success;
2487
2488 case SHT_GNU_versym:
2489 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2490 goto fail;
2491
2492 elf_dynversym (abfd) = shindex;
2493 elf_tdata (abfd)->dynversym_hdr = *hdr;
2494 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2495 goto success;
2496
2497 case SHT_GNU_verneed:
2498 elf_dynverref (abfd) = shindex;
2499 elf_tdata (abfd)->dynverref_hdr = *hdr;
2500 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2501 goto success;
2502
2503 case SHT_SHLIB:
2504 goto success;
2505
2506 case SHT_GROUP:
2507 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2508 goto fail;
2509
2510 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2511 goto fail;
2512
2513 goto success;
2514
2515 default:
2516 /* Possibly an attributes section. */
2517 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2518 || hdr->sh_type == bed->obj_attrs_section_type)
2519 {
2520 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2521 goto fail;
2522 _bfd_elf_parse_attributes (abfd, hdr);
2523 goto success;
2524 }
2525
2526 /* Check for any processor-specific section types. */
2527 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2528 goto success;
2529
2530 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2531 {
2532 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2533 /* FIXME: How to properly handle allocated section reserved
2534 for applications? */
2535 _bfd_error_handler
2536 /* xgettext:c-format */
2537 (_("%pB: unknown type [%#x] section `%s'"),
2538 abfd, hdr->sh_type, name);
2539 else
2540 {
2541 /* Allow sections reserved for applications. */
2542 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2543 shindex);
2544 goto success;
2545 }
2546 }
2547 else if (hdr->sh_type >= SHT_LOPROC
2548 && hdr->sh_type <= SHT_HIPROC)
2549 /* FIXME: We should handle this section. */
2550 _bfd_error_handler
2551 /* xgettext:c-format */
2552 (_("%pB: unknown type [%#x] section `%s'"),
2553 abfd, hdr->sh_type, name);
2554 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2555 {
2556 /* Unrecognised OS-specific sections. */
2557 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2558 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2559 required to correctly process the section and the file should
2560 be rejected with an error message. */
2561 _bfd_error_handler
2562 /* xgettext:c-format */
2563 (_("%pB: unknown type [%#x] section `%s'"),
2564 abfd, hdr->sh_type, name);
2565 else
2566 {
2567 /* Otherwise it should be processed. */
2568 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2569 goto success;
2570 }
2571 }
2572 else
2573 /* FIXME: We should handle this section. */
2574 _bfd_error_handler
2575 /* xgettext:c-format */
2576 (_("%pB: unknown type [%#x] section `%s'"),
2577 abfd, hdr->sh_type, name);
2578
2579 goto fail;
2580 }
2581
2582 fail:
2583 ret = FALSE;
2584 success:
2585 elf_tdata (abfd)->being_created[shindex] = FALSE;
2586 return ret;
2587 }
2588
2589 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2590
2591 Elf_Internal_Sym *
2592 bfd_sym_from_r_symndx (struct sym_cache *cache,
2593 bfd *abfd,
2594 unsigned long r_symndx)
2595 {
2596 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2597
2598 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2599 {
2600 Elf_Internal_Shdr *symtab_hdr;
2601 unsigned char esym[sizeof (Elf64_External_Sym)];
2602 Elf_External_Sym_Shndx eshndx;
2603
2604 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2605 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2606 &cache->sym[ent], esym, &eshndx) == NULL)
2607 return NULL;
2608
2609 if (cache->abfd != abfd)
2610 {
2611 memset (cache->indx, -1, sizeof (cache->indx));
2612 cache->abfd = abfd;
2613 }
2614 cache->indx[ent] = r_symndx;
2615 }
2616
2617 return &cache->sym[ent];
2618 }
2619
2620 /* Given an ELF section number, retrieve the corresponding BFD
2621 section. */
2622
2623 asection *
2624 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2625 {
2626 if (sec_index >= elf_numsections (abfd))
2627 return NULL;
2628 return elf_elfsections (abfd)[sec_index]->bfd_section;
2629 }
2630
2631 static const struct bfd_elf_special_section special_sections_b[] =
2632 {
2633 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2634 { NULL, 0, 0, 0, 0 }
2635 };
2636
2637 static const struct bfd_elf_special_section special_sections_c[] =
2638 {
2639 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2640 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2641 { NULL, 0, 0, 0, 0 }
2642 };
2643
2644 static const struct bfd_elf_special_section special_sections_d[] =
2645 {
2646 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2647 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2648 /* There are more DWARF sections than these, but they needn't be added here
2649 unless you have to cope with broken compilers that don't emit section
2650 attributes or you want to help the user writing assembler. */
2651 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2652 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2653 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2654 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2655 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2656 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2657 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2658 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2659 { NULL, 0, 0, 0, 0 }
2660 };
2661
2662 static const struct bfd_elf_special_section special_sections_f[] =
2663 {
2664 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2665 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2666 { NULL, 0 , 0, 0, 0 }
2667 };
2668
2669 static const struct bfd_elf_special_section special_sections_g[] =
2670 {
2671 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2672 { STRING_COMMA_LEN (".gnu.linkonce.n"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2673 { STRING_COMMA_LEN (".gnu.linkonce.p"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2674 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2675 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2676 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2677 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2678 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2679 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2680 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2681 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2682 { NULL, 0, 0, 0, 0 }
2683 };
2684
2685 static const struct bfd_elf_special_section special_sections_h[] =
2686 {
2687 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2688 { NULL, 0, 0, 0, 0 }
2689 };
2690
2691 static const struct bfd_elf_special_section special_sections_i[] =
2692 {
2693 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2694 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2695 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2696 { NULL, 0, 0, 0, 0 }
2697 };
2698
2699 static const struct bfd_elf_special_section special_sections_l[] =
2700 {
2701 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2702 { NULL, 0, 0, 0, 0 }
2703 };
2704
2705 static const struct bfd_elf_special_section special_sections_n[] =
2706 {
2707 { STRING_COMMA_LEN (".noinit"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2708 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2709 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2710 { NULL, 0, 0, 0, 0 }
2711 };
2712
2713 static const struct bfd_elf_special_section special_sections_p[] =
2714 {
2715 { STRING_COMMA_LEN (".persistent"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2716 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2717 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2718 { NULL, 0, 0, 0, 0 }
2719 };
2720
2721 static const struct bfd_elf_special_section special_sections_r[] =
2722 {
2723 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2724 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2725 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2726 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2727 { NULL, 0, 0, 0, 0 }
2728 };
2729
2730 static const struct bfd_elf_special_section special_sections_s[] =
2731 {
2732 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2733 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2734 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2735 /* See struct bfd_elf_special_section declaration for the semantics of
2736 this special case where .prefix_length != strlen (.prefix). */
2737 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2738 { NULL, 0, 0, 0, 0 }
2739 };
2740
2741 static const struct bfd_elf_special_section special_sections_t[] =
2742 {
2743 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2744 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2745 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2746 { NULL, 0, 0, 0, 0 }
2747 };
2748
2749 static const struct bfd_elf_special_section special_sections_z[] =
2750 {
2751 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2752 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2753 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2754 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2755 { NULL, 0, 0, 0, 0 }
2756 };
2757
2758 static const struct bfd_elf_special_section * const special_sections[] =
2759 {
2760 special_sections_b, /* 'b' */
2761 special_sections_c, /* 'c' */
2762 special_sections_d, /* 'd' */
2763 NULL, /* 'e' */
2764 special_sections_f, /* 'f' */
2765 special_sections_g, /* 'g' */
2766 special_sections_h, /* 'h' */
2767 special_sections_i, /* 'i' */
2768 NULL, /* 'j' */
2769 NULL, /* 'k' */
2770 special_sections_l, /* 'l' */
2771 NULL, /* 'm' */
2772 special_sections_n, /* 'n' */
2773 NULL, /* 'o' */
2774 special_sections_p, /* 'p' */
2775 NULL, /* 'q' */
2776 special_sections_r, /* 'r' */
2777 special_sections_s, /* 's' */
2778 special_sections_t, /* 't' */
2779 NULL, /* 'u' */
2780 NULL, /* 'v' */
2781 NULL, /* 'w' */
2782 NULL, /* 'x' */
2783 NULL, /* 'y' */
2784 special_sections_z /* 'z' */
2785 };
2786
2787 const struct bfd_elf_special_section *
2788 _bfd_elf_get_special_section (const char *name,
2789 const struct bfd_elf_special_section *spec,
2790 unsigned int rela)
2791 {
2792 int i;
2793 int len;
2794
2795 len = strlen (name);
2796
2797 for (i = 0; spec[i].prefix != NULL; i++)
2798 {
2799 int suffix_len;
2800 int prefix_len = spec[i].prefix_length;
2801
2802 if (len < prefix_len)
2803 continue;
2804 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2805 continue;
2806
2807 suffix_len = spec[i].suffix_length;
2808 if (suffix_len <= 0)
2809 {
2810 if (name[prefix_len] != 0)
2811 {
2812 if (suffix_len == 0)
2813 continue;
2814 if (name[prefix_len] != '.'
2815 && (suffix_len == -2
2816 || (rela && spec[i].type == SHT_REL)))
2817 continue;
2818 }
2819 }
2820 else
2821 {
2822 if (len < prefix_len + suffix_len)
2823 continue;
2824 if (memcmp (name + len - suffix_len,
2825 spec[i].prefix + prefix_len,
2826 suffix_len) != 0)
2827 continue;
2828 }
2829 return &spec[i];
2830 }
2831
2832 return NULL;
2833 }
2834
2835 const struct bfd_elf_special_section *
2836 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2837 {
2838 int i;
2839 const struct bfd_elf_special_section *spec;
2840 const struct elf_backend_data *bed;
2841
2842 /* See if this is one of the special sections. */
2843 if (sec->name == NULL)
2844 return NULL;
2845
2846 bed = get_elf_backend_data (abfd);
2847 spec = bed->special_sections;
2848 if (spec)
2849 {
2850 spec = _bfd_elf_get_special_section (sec->name,
2851 bed->special_sections,
2852 sec->use_rela_p);
2853 if (spec != NULL)
2854 return spec;
2855 }
2856
2857 if (sec->name[0] != '.')
2858 return NULL;
2859
2860 i = sec->name[1] - 'b';
2861 if (i < 0 || i > 'z' - 'b')
2862 return NULL;
2863
2864 spec = special_sections[i];
2865
2866 if (spec == NULL)
2867 return NULL;
2868
2869 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2870 }
2871
2872 bfd_boolean
2873 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2874 {
2875 struct bfd_elf_section_data *sdata;
2876 const struct elf_backend_data *bed;
2877 const struct bfd_elf_special_section *ssect;
2878
2879 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2880 if (sdata == NULL)
2881 {
2882 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2883 sizeof (*sdata));
2884 if (sdata == NULL)
2885 return FALSE;
2886 sec->used_by_bfd = sdata;
2887 }
2888
2889 /* Indicate whether or not this section should use RELA relocations. */
2890 bed = get_elf_backend_data (abfd);
2891 sec->use_rela_p = bed->default_use_rela_p;
2892
2893 /* Set up ELF section type and flags for newly created sections, if
2894 there is an ABI mandated section. */
2895 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2896 if (ssect != NULL)
2897 {
2898 elf_section_type (sec) = ssect->type;
2899 elf_section_flags (sec) = ssect->attr;
2900 }
2901
2902 return _bfd_generic_new_section_hook (abfd, sec);
2903 }
2904
2905 /* Create a new bfd section from an ELF program header.
2906
2907 Since program segments have no names, we generate a synthetic name
2908 of the form segment<NUM>, where NUM is generally the index in the
2909 program header table. For segments that are split (see below) we
2910 generate the names segment<NUM>a and segment<NUM>b.
2911
2912 Note that some program segments may have a file size that is different than
2913 (less than) the memory size. All this means is that at execution the
2914 system must allocate the amount of memory specified by the memory size,
2915 but only initialize it with the first "file size" bytes read from the
2916 file. This would occur for example, with program segments consisting
2917 of combined data+bss.
2918
2919 To handle the above situation, this routine generates TWO bfd sections
2920 for the single program segment. The first has the length specified by
2921 the file size of the segment, and the second has the length specified
2922 by the difference between the two sizes. In effect, the segment is split
2923 into its initialized and uninitialized parts.
2924
2925 */
2926
2927 bfd_boolean
2928 _bfd_elf_make_section_from_phdr (bfd *abfd,
2929 Elf_Internal_Phdr *hdr,
2930 int hdr_index,
2931 const char *type_name)
2932 {
2933 asection *newsect;
2934 char *name;
2935 char namebuf[64];
2936 size_t len;
2937 int split;
2938 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
2939
2940 split = ((hdr->p_memsz > 0)
2941 && (hdr->p_filesz > 0)
2942 && (hdr->p_memsz > hdr->p_filesz));
2943
2944 if (hdr->p_filesz > 0)
2945 {
2946 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2947 len = strlen (namebuf) + 1;
2948 name = (char *) bfd_alloc (abfd, len);
2949 if (!name)
2950 return FALSE;
2951 memcpy (name, namebuf, len);
2952 newsect = bfd_make_section (abfd, name);
2953 if (newsect == NULL)
2954 return FALSE;
2955 newsect->vma = hdr->p_vaddr / opb;
2956 newsect->lma = hdr->p_paddr / opb;
2957 newsect->size = hdr->p_filesz;
2958 newsect->filepos = hdr->p_offset;
2959 newsect->flags |= SEC_HAS_CONTENTS;
2960 newsect->alignment_power = bfd_log2 (hdr->p_align);
2961 if (hdr->p_type == PT_LOAD)
2962 {
2963 newsect->flags |= SEC_ALLOC;
2964 newsect->flags |= SEC_LOAD;
2965 if (hdr->p_flags & PF_X)
2966 {
2967 /* FIXME: all we known is that it has execute PERMISSION,
2968 may be data. */
2969 newsect->flags |= SEC_CODE;
2970 }
2971 }
2972 if (!(hdr->p_flags & PF_W))
2973 {
2974 newsect->flags |= SEC_READONLY;
2975 }
2976 }
2977
2978 if (hdr->p_memsz > hdr->p_filesz)
2979 {
2980 bfd_vma align;
2981
2982 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
2983 len = strlen (namebuf) + 1;
2984 name = (char *) bfd_alloc (abfd, len);
2985 if (!name)
2986 return FALSE;
2987 memcpy (name, namebuf, len);
2988 newsect = bfd_make_section (abfd, name);
2989 if (newsect == NULL)
2990 return FALSE;
2991 newsect->vma = (hdr->p_vaddr + hdr->p_filesz) / opb;
2992 newsect->lma = (hdr->p_paddr + hdr->p_filesz) / opb;
2993 newsect->size = hdr->p_memsz - hdr->p_filesz;
2994 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2995 align = newsect->vma & -newsect->vma;
2996 if (align == 0 || align > hdr->p_align)
2997 align = hdr->p_align;
2998 newsect->alignment_power = bfd_log2 (align);
2999 if (hdr->p_type == PT_LOAD)
3000 {
3001 newsect->flags |= SEC_ALLOC;
3002 if (hdr->p_flags & PF_X)
3003 newsect->flags |= SEC_CODE;
3004 }
3005 if (!(hdr->p_flags & PF_W))
3006 newsect->flags |= SEC_READONLY;
3007 }
3008
3009 return TRUE;
3010 }
3011
3012 static bfd_boolean
3013 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3014 {
3015 /* The return value is ignored. Build-ids are considered optional. */
3016 if (templ->xvec->flavour == bfd_target_elf_flavour)
3017 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3018 (templ, offset);
3019 return FALSE;
3020 }
3021
3022 bfd_boolean
3023 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3024 {
3025 const struct elf_backend_data *bed;
3026
3027 switch (hdr->p_type)
3028 {
3029 case PT_NULL:
3030 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3031
3032 case PT_LOAD:
3033 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3034 return FALSE;
3035 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3036 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3037 return TRUE;
3038
3039 case PT_DYNAMIC:
3040 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3041
3042 case PT_INTERP:
3043 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3044
3045 case PT_NOTE:
3046 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3047 return FALSE;
3048 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3049 hdr->p_align))
3050 return FALSE;
3051 return TRUE;
3052
3053 case PT_SHLIB:
3054 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3055
3056 case PT_PHDR:
3057 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3058
3059 case PT_GNU_EH_FRAME:
3060 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3061 "eh_frame_hdr");
3062
3063 case PT_GNU_STACK:
3064 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3065
3066 case PT_GNU_RELRO:
3067 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3068
3069 default:
3070 /* Check for any processor-specific program segment types. */
3071 bed = get_elf_backend_data (abfd);
3072 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3073 }
3074 }
3075
3076 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3077 REL or RELA. */
3078
3079 Elf_Internal_Shdr *
3080 _bfd_elf_single_rel_hdr (asection *sec)
3081 {
3082 if (elf_section_data (sec)->rel.hdr)
3083 {
3084 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3085 return elf_section_data (sec)->rel.hdr;
3086 }
3087 else
3088 return elf_section_data (sec)->rela.hdr;
3089 }
3090
3091 static bfd_boolean
3092 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3093 Elf_Internal_Shdr *rel_hdr,
3094 const char *sec_name,
3095 bfd_boolean use_rela_p)
3096 {
3097 char *name = (char *) bfd_alloc (abfd,
3098 sizeof ".rela" + strlen (sec_name));
3099 if (name == NULL)
3100 return FALSE;
3101
3102 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3103 rel_hdr->sh_name =
3104 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3105 FALSE);
3106 if (rel_hdr->sh_name == (unsigned int) -1)
3107 return FALSE;
3108
3109 return TRUE;
3110 }
3111
3112 /* Allocate and initialize a section-header for a new reloc section,
3113 containing relocations against ASECT. It is stored in RELDATA. If
3114 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3115 relocations. */
3116
3117 static bfd_boolean
3118 _bfd_elf_init_reloc_shdr (bfd *abfd,
3119 struct bfd_elf_section_reloc_data *reldata,
3120 const char *sec_name,
3121 bfd_boolean use_rela_p,
3122 bfd_boolean delay_st_name_p)
3123 {
3124 Elf_Internal_Shdr *rel_hdr;
3125 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3126
3127 BFD_ASSERT (reldata->hdr == NULL);
3128 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3129 reldata->hdr = rel_hdr;
3130
3131 if (delay_st_name_p)
3132 rel_hdr->sh_name = (unsigned int) -1;
3133 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3134 use_rela_p))
3135 return FALSE;
3136 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3137 rel_hdr->sh_entsize = (use_rela_p
3138 ? bed->s->sizeof_rela
3139 : bed->s->sizeof_rel);
3140 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3141 rel_hdr->sh_flags = 0;
3142 rel_hdr->sh_addr = 0;
3143 rel_hdr->sh_size = 0;
3144 rel_hdr->sh_offset = 0;
3145
3146 return TRUE;
3147 }
3148
3149 /* Return the default section type based on the passed in section flags. */
3150
3151 int
3152 bfd_elf_get_default_section_type (flagword flags)
3153 {
3154 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3155 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3156 return SHT_NOBITS;
3157 return SHT_PROGBITS;
3158 }
3159
3160 struct fake_section_arg
3161 {
3162 struct bfd_link_info *link_info;
3163 bfd_boolean failed;
3164 };
3165
3166 /* Set up an ELF internal section header for a section. */
3167
3168 static void
3169 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3170 {
3171 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3172 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3173 struct bfd_elf_section_data *esd = elf_section_data (asect);
3174 Elf_Internal_Shdr *this_hdr;
3175 unsigned int sh_type;
3176 const char *name = asect->name;
3177 bfd_boolean delay_st_name_p = FALSE;
3178 bfd_vma mask;
3179
3180 if (arg->failed)
3181 {
3182 /* We already failed; just get out of the bfd_map_over_sections
3183 loop. */
3184 return;
3185 }
3186
3187 this_hdr = &esd->this_hdr;
3188
3189 if (arg->link_info)
3190 {
3191 /* ld: compress DWARF debug sections with names: .debug_*. */
3192 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3193 && (asect->flags & SEC_DEBUGGING)
3194 && name[1] == 'd'
3195 && name[6] == '_')
3196 {
3197 /* Set SEC_ELF_COMPRESS to indicate this section should be
3198 compressed. */
3199 asect->flags |= SEC_ELF_COMPRESS;
3200 /* If this section will be compressed, delay adding section
3201 name to section name section after it is compressed in
3202 _bfd_elf_assign_file_positions_for_non_load. */
3203 delay_st_name_p = TRUE;
3204 }
3205 }
3206 else if ((asect->flags & SEC_ELF_RENAME))
3207 {
3208 /* objcopy: rename output DWARF debug section. */
3209 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3210 {
3211 /* When we decompress or compress with SHF_COMPRESSED,
3212 convert section name from .zdebug_* to .debug_* if
3213 needed. */
3214 if (name[1] == 'z')
3215 {
3216 char *new_name = convert_zdebug_to_debug (abfd, name);
3217 if (new_name == NULL)
3218 {
3219 arg->failed = TRUE;
3220 return;
3221 }
3222 name = new_name;
3223 }
3224 }
3225 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3226 {
3227 /* PR binutils/18087: Compression does not always make a
3228 section smaller. So only rename the section when
3229 compression has actually taken place. If input section
3230 name is .zdebug_*, we should never compress it again. */
3231 char *new_name = convert_debug_to_zdebug (abfd, name);
3232 if (new_name == NULL)
3233 {
3234 arg->failed = TRUE;
3235 return;
3236 }
3237 BFD_ASSERT (name[1] != 'z');
3238 name = new_name;
3239 }
3240 }
3241
3242 if (delay_st_name_p)
3243 this_hdr->sh_name = (unsigned int) -1;
3244 else
3245 {
3246 this_hdr->sh_name
3247 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3248 name, FALSE);
3249 if (this_hdr->sh_name == (unsigned int) -1)
3250 {
3251 arg->failed = TRUE;
3252 return;
3253 }
3254 }
3255
3256 /* Don't clear sh_flags. Assembler may set additional bits. */
3257
3258 if ((asect->flags & SEC_ALLOC) != 0
3259 || asect->user_set_vma)
3260 this_hdr->sh_addr = asect->vma * bfd_octets_per_byte (abfd, asect);
3261 else
3262 this_hdr->sh_addr = 0;
3263
3264 this_hdr->sh_offset = 0;
3265 this_hdr->sh_size = asect->size;
3266 this_hdr->sh_link = 0;
3267 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3268 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3269 {
3270 _bfd_error_handler
3271 /* xgettext:c-format */
3272 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3273 abfd, asect->alignment_power, asect);
3274 arg->failed = TRUE;
3275 return;
3276 }
3277 /* Set sh_addralign to the highest power of two given by alignment
3278 consistent with the section VMA. Linker scripts can force VMA. */
3279 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3280 this_hdr->sh_addralign = mask & -mask;
3281 /* The sh_entsize and sh_info fields may have been set already by
3282 copy_private_section_data. */
3283
3284 this_hdr->bfd_section = asect;
3285 this_hdr->contents = NULL;
3286
3287 /* If the section type is unspecified, we set it based on
3288 asect->flags. */
3289 if ((asect->flags & SEC_GROUP) != 0)
3290 sh_type = SHT_GROUP;
3291 else
3292 sh_type = bfd_elf_get_default_section_type (asect->flags);
3293
3294 if (this_hdr->sh_type == SHT_NULL)
3295 this_hdr->sh_type = sh_type;
3296 else if (this_hdr->sh_type == SHT_NOBITS
3297 && sh_type == SHT_PROGBITS
3298 && (asect->flags & SEC_ALLOC) != 0)
3299 {
3300 /* Warn if we are changing a NOBITS section to PROGBITS, but
3301 allow the link to proceed. This can happen when users link
3302 non-bss input sections to bss output sections, or emit data
3303 to a bss output section via a linker script. */
3304 _bfd_error_handler
3305 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3306 this_hdr->sh_type = sh_type;
3307 }
3308
3309 switch (this_hdr->sh_type)
3310 {
3311 default:
3312 break;
3313
3314 case SHT_STRTAB:
3315 case SHT_NOTE:
3316 case SHT_NOBITS:
3317 case SHT_PROGBITS:
3318 break;
3319
3320 case SHT_INIT_ARRAY:
3321 case SHT_FINI_ARRAY:
3322 case SHT_PREINIT_ARRAY:
3323 this_hdr->sh_entsize = bed->s->arch_size / 8;
3324 break;
3325
3326 case SHT_HASH:
3327 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3328 break;
3329
3330 case SHT_DYNSYM:
3331 this_hdr->sh_entsize = bed->s->sizeof_sym;
3332 break;
3333
3334 case SHT_DYNAMIC:
3335 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3336 break;
3337
3338 case SHT_RELA:
3339 if (get_elf_backend_data (abfd)->may_use_rela_p)
3340 this_hdr->sh_entsize = bed->s->sizeof_rela;
3341 break;
3342
3343 case SHT_REL:
3344 if (get_elf_backend_data (abfd)->may_use_rel_p)
3345 this_hdr->sh_entsize = bed->s->sizeof_rel;
3346 break;
3347
3348 case SHT_GNU_versym:
3349 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3350 break;
3351
3352 case SHT_GNU_verdef:
3353 this_hdr->sh_entsize = 0;
3354 /* objcopy or strip will copy over sh_info, but may not set
3355 cverdefs. The linker will set cverdefs, but sh_info will be
3356 zero. */
3357 if (this_hdr->sh_info == 0)
3358 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3359 else
3360 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3361 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3362 break;
3363
3364 case SHT_GNU_verneed:
3365 this_hdr->sh_entsize = 0;
3366 /* objcopy or strip will copy over sh_info, but may not set
3367 cverrefs. The linker will set cverrefs, but sh_info will be
3368 zero. */
3369 if (this_hdr->sh_info == 0)
3370 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3371 else
3372 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3373 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3374 break;
3375
3376 case SHT_GROUP:
3377 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3378 break;
3379
3380 case SHT_GNU_HASH:
3381 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3382 break;
3383 }
3384
3385 if ((asect->flags & SEC_ALLOC) != 0)
3386 this_hdr->sh_flags |= SHF_ALLOC;
3387 if ((asect->flags & SEC_READONLY) == 0)
3388 this_hdr->sh_flags |= SHF_WRITE;
3389 if ((asect->flags & SEC_CODE) != 0)
3390 this_hdr->sh_flags |= SHF_EXECINSTR;
3391 if ((asect->flags & SEC_MERGE) != 0)
3392 {
3393 this_hdr->sh_flags |= SHF_MERGE;
3394 this_hdr->sh_entsize = asect->entsize;
3395 }
3396 if ((asect->flags & SEC_STRINGS) != 0)
3397 this_hdr->sh_flags |= SHF_STRINGS;
3398 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3399 this_hdr->sh_flags |= SHF_GROUP;
3400 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3401 {
3402 this_hdr->sh_flags |= SHF_TLS;
3403 if (asect->size == 0
3404 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3405 {
3406 struct bfd_link_order *o = asect->map_tail.link_order;
3407
3408 this_hdr->sh_size = 0;
3409 if (o != NULL)
3410 {
3411 this_hdr->sh_size = o->offset + o->size;
3412 if (this_hdr->sh_size != 0)
3413 this_hdr->sh_type = SHT_NOBITS;
3414 }
3415 }
3416 }
3417 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3418 this_hdr->sh_flags |= SHF_EXCLUDE;
3419
3420 /* If the section has relocs, set up a section header for the
3421 SHT_REL[A] section. If two relocation sections are required for
3422 this section, it is up to the processor-specific back-end to
3423 create the other. */
3424 if ((asect->flags & SEC_RELOC) != 0)
3425 {
3426 /* When doing a relocatable link, create both REL and RELA sections if
3427 needed. */
3428 if (arg->link_info
3429 /* Do the normal setup if we wouldn't create any sections here. */
3430 && esd->rel.count + esd->rela.count > 0
3431 && (bfd_link_relocatable (arg->link_info)
3432 || arg->link_info->emitrelocations))
3433 {
3434 if (esd->rel.count && esd->rel.hdr == NULL
3435 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3436 FALSE, delay_st_name_p))
3437 {
3438 arg->failed = TRUE;
3439 return;
3440 }
3441 if (esd->rela.count && esd->rela.hdr == NULL
3442 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3443 TRUE, delay_st_name_p))
3444 {
3445 arg->failed = TRUE;
3446 return;
3447 }
3448 }
3449 else if (!_bfd_elf_init_reloc_shdr (abfd,
3450 (asect->use_rela_p
3451 ? &esd->rela : &esd->rel),
3452 name,
3453 asect->use_rela_p,
3454 delay_st_name_p))
3455 {
3456 arg->failed = TRUE;
3457 return;
3458 }
3459 }
3460
3461 /* Check for processor-specific section types. */
3462 sh_type = this_hdr->sh_type;
3463 if (bed->elf_backend_fake_sections
3464 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3465 {
3466 arg->failed = TRUE;
3467 return;
3468 }
3469
3470 if (sh_type == SHT_NOBITS && asect->size != 0)
3471 {
3472 /* Don't change the header type from NOBITS if we are being
3473 called for objcopy --only-keep-debug. */
3474 this_hdr->sh_type = sh_type;
3475 }
3476 }
3477
3478 /* Fill in the contents of a SHT_GROUP section. Called from
3479 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3480 when ELF targets use the generic linker, ld. Called for ld -r
3481 from bfd_elf_final_link. */
3482
3483 void
3484 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3485 {
3486 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3487 asection *elt, *first;
3488 unsigned char *loc;
3489 bfd_boolean gas;
3490
3491 /* Ignore linker created group section. See elfNN_ia64_object_p in
3492 elfxx-ia64.c. */
3493 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3494 || sec->size == 0
3495 || *failedptr)
3496 return;
3497
3498 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3499 {
3500 unsigned long symindx = 0;
3501
3502 /* elf_group_id will have been set up by objcopy and the
3503 generic linker. */
3504 if (elf_group_id (sec) != NULL)
3505 symindx = elf_group_id (sec)->udata.i;
3506
3507 if (symindx == 0)
3508 {
3509 /* If called from the assembler, swap_out_syms will have set up
3510 elf_section_syms.
3511 PR 25699: A corrupt input file could contain bogus group info. */
3512 if (elf_section_syms (abfd) == NULL)
3513 {
3514 *failedptr = TRUE;
3515 return;
3516 }
3517 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3518 }
3519 elf_section_data (sec)->this_hdr.sh_info = symindx;
3520 }
3521 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3522 {
3523 /* The ELF backend linker sets sh_info to -2 when the group
3524 signature symbol is global, and thus the index can't be
3525 set until all local symbols are output. */
3526 asection *igroup;
3527 struct bfd_elf_section_data *sec_data;
3528 unsigned long symndx;
3529 unsigned long extsymoff;
3530 struct elf_link_hash_entry *h;
3531
3532 /* The point of this little dance to the first SHF_GROUP section
3533 then back to the SHT_GROUP section is that this gets us to
3534 the SHT_GROUP in the input object. */
3535 igroup = elf_sec_group (elf_next_in_group (sec));
3536 sec_data = elf_section_data (igroup);
3537 symndx = sec_data->this_hdr.sh_info;
3538 extsymoff = 0;
3539 if (!elf_bad_symtab (igroup->owner))
3540 {
3541 Elf_Internal_Shdr *symtab_hdr;
3542
3543 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3544 extsymoff = symtab_hdr->sh_info;
3545 }
3546 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3547 while (h->root.type == bfd_link_hash_indirect
3548 || h->root.type == bfd_link_hash_warning)
3549 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3550
3551 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3552 }
3553
3554 /* The contents won't be allocated for "ld -r" or objcopy. */
3555 gas = TRUE;
3556 if (sec->contents == NULL)
3557 {
3558 gas = FALSE;
3559 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3560
3561 /* Arrange for the section to be written out. */
3562 elf_section_data (sec)->this_hdr.contents = sec->contents;
3563 if (sec->contents == NULL)
3564 {
3565 *failedptr = TRUE;
3566 return;
3567 }
3568 }
3569
3570 loc = sec->contents + sec->size;
3571
3572 /* Get the pointer to the first section in the group that gas
3573 squirreled away here. objcopy arranges for this to be set to the
3574 start of the input section group. */
3575 first = elt = elf_next_in_group (sec);
3576
3577 /* First element is a flag word. Rest of section is elf section
3578 indices for all the sections of the group. Write them backwards
3579 just to keep the group in the same order as given in .section
3580 directives, not that it matters. */
3581 while (elt != NULL)
3582 {
3583 asection *s;
3584
3585 s = elt;
3586 if (!gas)
3587 s = s->output_section;
3588 if (s != NULL
3589 && !bfd_is_abs_section (s))
3590 {
3591 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3592 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3593
3594 if (elf_sec->rel.hdr != NULL
3595 && (gas
3596 || (input_elf_sec->rel.hdr != NULL
3597 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3598 {
3599 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3600 loc -= 4;
3601 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3602 }
3603 if (elf_sec->rela.hdr != NULL
3604 && (gas
3605 || (input_elf_sec->rela.hdr != NULL
3606 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3607 {
3608 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3609 loc -= 4;
3610 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3611 }
3612 loc -= 4;
3613 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3614 }
3615 elt = elf_next_in_group (elt);
3616 if (elt == first)
3617 break;
3618 }
3619
3620 loc -= 4;
3621 BFD_ASSERT (loc == sec->contents);
3622
3623 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3624 }
3625
3626 /* Given NAME, the name of a relocation section stripped of its
3627 .rel/.rela prefix, return the section in ABFD to which the
3628 relocations apply. */
3629
3630 asection *
3631 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3632 {
3633 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3634 section likely apply to .got.plt or .got section. */
3635 if (get_elf_backend_data (abfd)->want_got_plt
3636 && strcmp (name, ".plt") == 0)
3637 {
3638 asection *sec;
3639
3640 name = ".got.plt";
3641 sec = bfd_get_section_by_name (abfd, name);
3642 if (sec != NULL)
3643 return sec;
3644 name = ".got";
3645 }
3646
3647 return bfd_get_section_by_name (abfd, name);
3648 }
3649
3650 /* Return the section to which RELOC_SEC applies. */
3651
3652 static asection *
3653 elf_get_reloc_section (asection *reloc_sec)
3654 {
3655 const char *name;
3656 unsigned int type;
3657 bfd *abfd;
3658 const struct elf_backend_data *bed;
3659
3660 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3661 if (type != SHT_REL && type != SHT_RELA)
3662 return NULL;
3663
3664 /* We look up the section the relocs apply to by name. */
3665 name = reloc_sec->name;
3666 if (strncmp (name, ".rel", 4) != 0)
3667 return NULL;
3668 name += 4;
3669 if (type == SHT_RELA && *name++ != 'a')
3670 return NULL;
3671
3672 abfd = reloc_sec->owner;
3673 bed = get_elf_backend_data (abfd);
3674 return bed->get_reloc_section (abfd, name);
3675 }
3676
3677 /* Assign all ELF section numbers. The dummy first section is handled here
3678 too. The link/info pointers for the standard section types are filled
3679 in here too, while we're at it. LINK_INFO will be 0 when arriving
3680 here for objcopy, and when using the generic ELF linker. */
3681
3682 static bfd_boolean
3683 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3684 {
3685 struct elf_obj_tdata *t = elf_tdata (abfd);
3686 asection *sec;
3687 unsigned int section_number;
3688 Elf_Internal_Shdr **i_shdrp;
3689 struct bfd_elf_section_data *d;
3690 bfd_boolean need_symtab;
3691 size_t amt;
3692
3693 section_number = 1;
3694
3695 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3696
3697 /* SHT_GROUP sections are in relocatable files only. */
3698 if (link_info == NULL || !link_info->resolve_section_groups)
3699 {
3700 size_t reloc_count = 0;
3701
3702 /* Put SHT_GROUP sections first. */
3703 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3704 {
3705 d = elf_section_data (sec);
3706
3707 if (d->this_hdr.sh_type == SHT_GROUP)
3708 {
3709 if (sec->flags & SEC_LINKER_CREATED)
3710 {
3711 /* Remove the linker created SHT_GROUP sections. */
3712 bfd_section_list_remove (abfd, sec);
3713 abfd->section_count--;
3714 }
3715 else
3716 d->this_idx = section_number++;
3717 }
3718
3719 /* Count relocations. */
3720 reloc_count += sec->reloc_count;
3721 }
3722
3723 /* Clear HAS_RELOC if there are no relocations. */
3724 if (reloc_count == 0)
3725 abfd->flags &= ~HAS_RELOC;
3726 }
3727
3728 for (sec = abfd->sections; sec; sec = sec->next)
3729 {
3730 d = elf_section_data (sec);
3731
3732 if (d->this_hdr.sh_type != SHT_GROUP)
3733 d->this_idx = section_number++;
3734 if (d->this_hdr.sh_name != (unsigned int) -1)
3735 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3736 if (d->rel.hdr)
3737 {
3738 d->rel.idx = section_number++;
3739 if (d->rel.hdr->sh_name != (unsigned int) -1)
3740 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3741 }
3742 else
3743 d->rel.idx = 0;
3744
3745 if (d->rela.hdr)
3746 {
3747 d->rela.idx = section_number++;
3748 if (d->rela.hdr->sh_name != (unsigned int) -1)
3749 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3750 }
3751 else
3752 d->rela.idx = 0;
3753 }
3754
3755 need_symtab = (bfd_get_symcount (abfd) > 0
3756 || (link_info == NULL
3757 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3758 == HAS_RELOC)));
3759 if (need_symtab)
3760 {
3761 elf_onesymtab (abfd) = section_number++;
3762 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3763 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3764 {
3765 elf_section_list *entry;
3766
3767 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3768
3769 entry = bfd_zalloc (abfd, sizeof (*entry));
3770 entry->ndx = section_number++;
3771 elf_symtab_shndx_list (abfd) = entry;
3772 entry->hdr.sh_name
3773 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3774 ".symtab_shndx", FALSE);
3775 if (entry->hdr.sh_name == (unsigned int) -1)
3776 return FALSE;
3777 }
3778 elf_strtab_sec (abfd) = section_number++;
3779 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3780 }
3781
3782 elf_shstrtab_sec (abfd) = section_number++;
3783 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3784 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3785
3786 if (section_number >= SHN_LORESERVE)
3787 {
3788 /* xgettext:c-format */
3789 _bfd_error_handler (_("%pB: too many sections: %u"),
3790 abfd, section_number);
3791 return FALSE;
3792 }
3793
3794 elf_numsections (abfd) = section_number;
3795 elf_elfheader (abfd)->e_shnum = section_number;
3796
3797 /* Set up the list of section header pointers, in agreement with the
3798 indices. */
3799 amt = section_number * sizeof (Elf_Internal_Shdr *);
3800 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3801 if (i_shdrp == NULL)
3802 return FALSE;
3803
3804 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3805 sizeof (Elf_Internal_Shdr));
3806 if (i_shdrp[0] == NULL)
3807 {
3808 bfd_release (abfd, i_shdrp);
3809 return FALSE;
3810 }
3811
3812 elf_elfsections (abfd) = i_shdrp;
3813
3814 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3815 if (need_symtab)
3816 {
3817 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3818 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3819 {
3820 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3821 BFD_ASSERT (entry != NULL);
3822 i_shdrp[entry->ndx] = & entry->hdr;
3823 entry->hdr.sh_link = elf_onesymtab (abfd);
3824 }
3825 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3826 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3827 }
3828
3829 for (sec = abfd->sections; sec; sec = sec->next)
3830 {
3831 asection *s;
3832
3833 d = elf_section_data (sec);
3834
3835 i_shdrp[d->this_idx] = &d->this_hdr;
3836 if (d->rel.idx != 0)
3837 i_shdrp[d->rel.idx] = d->rel.hdr;
3838 if (d->rela.idx != 0)
3839 i_shdrp[d->rela.idx] = d->rela.hdr;
3840
3841 /* Fill in the sh_link and sh_info fields while we're at it. */
3842
3843 /* sh_link of a reloc section is the section index of the symbol
3844 table. sh_info is the section index of the section to which
3845 the relocation entries apply. */
3846 if (d->rel.idx != 0)
3847 {
3848 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3849 d->rel.hdr->sh_info = d->this_idx;
3850 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3851 }
3852 if (d->rela.idx != 0)
3853 {
3854 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3855 d->rela.hdr->sh_info = d->this_idx;
3856 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3857 }
3858
3859 /* We need to set up sh_link for SHF_LINK_ORDER. */
3860 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3861 {
3862 s = elf_linked_to_section (sec);
3863 /* We can now have a NULL linked section pointer.
3864 This happens when the sh_link field is 0, which is done
3865 when a linked to section is discarded but the linking
3866 section has been retained for some reason. */
3867 if (s)
3868 {
3869 /* Check discarded linkonce section. */
3870 if (discarded_section (s))
3871 {
3872 asection *kept;
3873 _bfd_error_handler
3874 /* xgettext:c-format */
3875 (_("%pB: sh_link of section `%pA' points to"
3876 " discarded section `%pA' of `%pB'"),
3877 abfd, d->this_hdr.bfd_section, s, s->owner);
3878 /* Point to the kept section if it has the same
3879 size as the discarded one. */
3880 kept = _bfd_elf_check_kept_section (s, link_info);
3881 if (kept == NULL)
3882 {
3883 bfd_set_error (bfd_error_bad_value);
3884 return FALSE;
3885 }
3886 s = kept;
3887 }
3888 /* Handle objcopy. */
3889 else if (s->output_section == NULL)
3890 {
3891 _bfd_error_handler
3892 /* xgettext:c-format */
3893 (_("%pB: sh_link of section `%pA' points to"
3894 " removed section `%pA' of `%pB'"),
3895 abfd, d->this_hdr.bfd_section, s, s->owner);
3896 bfd_set_error (bfd_error_bad_value);
3897 return FALSE;
3898 }
3899 s = s->output_section;
3900 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3901 }
3902 }
3903
3904 switch (d->this_hdr.sh_type)
3905 {
3906 case SHT_REL:
3907 case SHT_RELA:
3908 /* A reloc section which we are treating as a normal BFD
3909 section. sh_link is the section index of the symbol
3910 table. sh_info is the section index of the section to
3911 which the relocation entries apply. We assume that an
3912 allocated reloc section uses the dynamic symbol table.
3913 FIXME: How can we be sure? */
3914 s = bfd_get_section_by_name (abfd, ".dynsym");
3915 if (s != NULL)
3916 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3917
3918 s = elf_get_reloc_section (sec);
3919 if (s != NULL)
3920 {
3921 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3922 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3923 }
3924 break;
3925
3926 case SHT_STRTAB:
3927 /* We assume that a section named .stab*str is a stabs
3928 string section. We look for a section with the same name
3929 but without the trailing ``str'', and set its sh_link
3930 field to point to this section. */
3931 if (CONST_STRNEQ (sec->name, ".stab")
3932 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3933 {
3934 size_t len;
3935 char *alc;
3936
3937 len = strlen (sec->name);
3938 alc = (char *) bfd_malloc (len - 2);
3939 if (alc == NULL)
3940 return FALSE;
3941 memcpy (alc, sec->name, len - 3);
3942 alc[len - 3] = '\0';
3943 s = bfd_get_section_by_name (abfd, alc);
3944 free (alc);
3945 if (s != NULL)
3946 {
3947 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3948
3949 /* This is a .stab section. */
3950 elf_section_data (s)->this_hdr.sh_entsize = 12;
3951 }
3952 }
3953 break;
3954
3955 case SHT_DYNAMIC:
3956 case SHT_DYNSYM:
3957 case SHT_GNU_verneed:
3958 case SHT_GNU_verdef:
3959 /* sh_link is the section header index of the string table
3960 used for the dynamic entries, or the symbol table, or the
3961 version strings. */
3962 s = bfd_get_section_by_name (abfd, ".dynstr");
3963 if (s != NULL)
3964 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3965 break;
3966
3967 case SHT_GNU_LIBLIST:
3968 /* sh_link is the section header index of the prelink library
3969 list used for the dynamic entries, or the symbol table, or
3970 the version strings. */
3971 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3972 ? ".dynstr" : ".gnu.libstr");
3973 if (s != NULL)
3974 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3975 break;
3976
3977 case SHT_HASH:
3978 case SHT_GNU_HASH:
3979 case SHT_GNU_versym:
3980 /* sh_link is the section header index of the symbol table
3981 this hash table or version table is for. */
3982 s = bfd_get_section_by_name (abfd, ".dynsym");
3983 if (s != NULL)
3984 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3985 break;
3986
3987 case SHT_GROUP:
3988 d->this_hdr.sh_link = elf_onesymtab (abfd);
3989 }
3990 }
3991
3992 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3993 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3994 debug section name from .debug_* to .zdebug_* if needed. */
3995
3996 return TRUE;
3997 }
3998
3999 static bfd_boolean
4000 sym_is_global (bfd *abfd, asymbol *sym)
4001 {
4002 /* If the backend has a special mapping, use it. */
4003 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4004 if (bed->elf_backend_sym_is_global)
4005 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4006
4007 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4008 || bfd_is_und_section (bfd_asymbol_section (sym))
4009 || bfd_is_com_section (bfd_asymbol_section (sym)));
4010 }
4011
4012 /* Filter global symbols of ABFD to include in the import library. All
4013 SYMCOUNT symbols of ABFD can be examined from their pointers in
4014 SYMS. Pointers of symbols to keep should be stored contiguously at
4015 the beginning of that array.
4016
4017 Returns the number of symbols to keep. */
4018
4019 unsigned int
4020 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4021 asymbol **syms, long symcount)
4022 {
4023 long src_count, dst_count = 0;
4024
4025 for (src_count = 0; src_count < symcount; src_count++)
4026 {
4027 asymbol *sym = syms[src_count];
4028 char *name = (char *) bfd_asymbol_name (sym);
4029 struct bfd_link_hash_entry *h;
4030
4031 if (!sym_is_global (abfd, sym))
4032 continue;
4033
4034 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4035 if (h == NULL)
4036 continue;
4037 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4038 continue;
4039 if (h->linker_def || h->ldscript_def)
4040 continue;
4041
4042 syms[dst_count++] = sym;
4043 }
4044
4045 syms[dst_count] = NULL;
4046
4047 return dst_count;
4048 }
4049
4050 /* Don't output section symbols for sections that are not going to be
4051 output, that are duplicates or there is no BFD section. */
4052
4053 static bfd_boolean
4054 ignore_section_sym (bfd *abfd, asymbol *sym)
4055 {
4056 elf_symbol_type *type_ptr;
4057
4058 if (sym == NULL)
4059 return FALSE;
4060
4061 if ((sym->flags & BSF_SECTION_SYM) == 0)
4062 return FALSE;
4063
4064 if (sym->section == NULL)
4065 return TRUE;
4066
4067 type_ptr = elf_symbol_from (sym);
4068 return ((type_ptr != NULL
4069 && type_ptr->internal_elf_sym.st_shndx != 0
4070 && bfd_is_abs_section (sym->section))
4071 || !(sym->section->owner == abfd
4072 || (sym->section->output_section != NULL
4073 && sym->section->output_section->owner == abfd
4074 && sym->section->output_offset == 0)
4075 || bfd_is_abs_section (sym->section)));
4076 }
4077
4078 /* Map symbol from it's internal number to the external number, moving
4079 all local symbols to be at the head of the list. */
4080
4081 static bfd_boolean
4082 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4083 {
4084 unsigned int symcount = bfd_get_symcount (abfd);
4085 asymbol **syms = bfd_get_outsymbols (abfd);
4086 asymbol **sect_syms;
4087 unsigned int num_locals = 0;
4088 unsigned int num_globals = 0;
4089 unsigned int num_locals2 = 0;
4090 unsigned int num_globals2 = 0;
4091 unsigned int max_index = 0;
4092 unsigned int idx;
4093 asection *asect;
4094 asymbol **new_syms;
4095 size_t amt;
4096
4097 #ifdef DEBUG
4098 fprintf (stderr, "elf_map_symbols\n");
4099 fflush (stderr);
4100 #endif
4101
4102 for (asect = abfd->sections; asect; asect = asect->next)
4103 {
4104 if (max_index < asect->index)
4105 max_index = asect->index;
4106 }
4107
4108 max_index++;
4109 amt = max_index * sizeof (asymbol *);
4110 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4111 if (sect_syms == NULL)
4112 return FALSE;
4113 elf_section_syms (abfd) = sect_syms;
4114 elf_num_section_syms (abfd) = max_index;
4115
4116 /* Init sect_syms entries for any section symbols we have already
4117 decided to output. */
4118 for (idx = 0; idx < symcount; idx++)
4119 {
4120 asymbol *sym = syms[idx];
4121
4122 if ((sym->flags & BSF_SECTION_SYM) != 0
4123 && sym->value == 0
4124 && !ignore_section_sym (abfd, sym)
4125 && !bfd_is_abs_section (sym->section))
4126 {
4127 asection *sec = sym->section;
4128
4129 if (sec->owner != abfd)
4130 sec = sec->output_section;
4131
4132 sect_syms[sec->index] = syms[idx];
4133 }
4134 }
4135
4136 /* Classify all of the symbols. */
4137 for (idx = 0; idx < symcount; idx++)
4138 {
4139 if (sym_is_global (abfd, syms[idx]))
4140 num_globals++;
4141 else if (!ignore_section_sym (abfd, syms[idx]))
4142 num_locals++;
4143 }
4144
4145 /* We will be adding a section symbol for each normal BFD section. Most
4146 sections will already have a section symbol in outsymbols, but
4147 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4148 at least in that case. */
4149 for (asect = abfd->sections; asect; asect = asect->next)
4150 {
4151 if (sect_syms[asect->index] == NULL)
4152 {
4153 if (!sym_is_global (abfd, asect->symbol))
4154 num_locals++;
4155 else
4156 num_globals++;
4157 }
4158 }
4159
4160 /* Now sort the symbols so the local symbols are first. */
4161 amt = (num_locals + num_globals) * sizeof (asymbol *);
4162 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4163 if (new_syms == NULL)
4164 return FALSE;
4165
4166 for (idx = 0; idx < symcount; idx++)
4167 {
4168 asymbol *sym = syms[idx];
4169 unsigned int i;
4170
4171 if (sym_is_global (abfd, sym))
4172 i = num_locals + num_globals2++;
4173 else if (!ignore_section_sym (abfd, sym))
4174 i = num_locals2++;
4175 else
4176 continue;
4177 new_syms[i] = sym;
4178 sym->udata.i = i + 1;
4179 }
4180 for (asect = abfd->sections; asect; asect = asect->next)
4181 {
4182 if (sect_syms[asect->index] == NULL)
4183 {
4184 asymbol *sym = asect->symbol;
4185 unsigned int i;
4186
4187 sect_syms[asect->index] = sym;
4188 if (!sym_is_global (abfd, sym))
4189 i = num_locals2++;
4190 else
4191 i = num_locals + num_globals2++;
4192 new_syms[i] = sym;
4193 sym->udata.i = i + 1;
4194 }
4195 }
4196
4197 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4198
4199 *pnum_locals = num_locals;
4200 return TRUE;
4201 }
4202
4203 /* Align to the maximum file alignment that could be required for any
4204 ELF data structure. */
4205
4206 static inline file_ptr
4207 align_file_position (file_ptr off, int align)
4208 {
4209 return (off + align - 1) & ~(align - 1);
4210 }
4211
4212 /* Assign a file position to a section, optionally aligning to the
4213 required section alignment. */
4214
4215 file_ptr
4216 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4217 file_ptr offset,
4218 bfd_boolean align)
4219 {
4220 if (align && i_shdrp->sh_addralign > 1)
4221 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4222 i_shdrp->sh_offset = offset;
4223 if (i_shdrp->bfd_section != NULL)
4224 i_shdrp->bfd_section->filepos = offset;
4225 if (i_shdrp->sh_type != SHT_NOBITS)
4226 offset += i_shdrp->sh_size;
4227 return offset;
4228 }
4229
4230 /* Compute the file positions we are going to put the sections at, and
4231 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4232 is not NULL, this is being called by the ELF backend linker. */
4233
4234 bfd_boolean
4235 _bfd_elf_compute_section_file_positions (bfd *abfd,
4236 struct bfd_link_info *link_info)
4237 {
4238 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4239 struct fake_section_arg fsargs;
4240 bfd_boolean failed;
4241 struct elf_strtab_hash *strtab = NULL;
4242 Elf_Internal_Shdr *shstrtab_hdr;
4243 bfd_boolean need_symtab;
4244
4245 if (abfd->output_has_begun)
4246 return TRUE;
4247
4248 /* Do any elf backend specific processing first. */
4249 if (bed->elf_backend_begin_write_processing)
4250 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4251
4252 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4253 return FALSE;
4254
4255 fsargs.failed = FALSE;
4256 fsargs.link_info = link_info;
4257 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4258 if (fsargs.failed)
4259 return FALSE;
4260
4261 if (!assign_section_numbers (abfd, link_info))
4262 return FALSE;
4263
4264 /* The backend linker builds symbol table information itself. */
4265 need_symtab = (link_info == NULL
4266 && (bfd_get_symcount (abfd) > 0
4267 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4268 == HAS_RELOC)));
4269 if (need_symtab)
4270 {
4271 /* Non-zero if doing a relocatable link. */
4272 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4273
4274 if (! swap_out_syms (abfd, &strtab, relocatable_p, link_info))
4275 return FALSE;
4276 }
4277
4278 failed = FALSE;
4279 if (link_info == NULL)
4280 {
4281 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4282 if (failed)
4283 return FALSE;
4284 }
4285
4286 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4287 /* sh_name was set in init_file_header. */
4288 shstrtab_hdr->sh_type = SHT_STRTAB;
4289 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4290 shstrtab_hdr->sh_addr = 0;
4291 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4292 shstrtab_hdr->sh_entsize = 0;
4293 shstrtab_hdr->sh_link = 0;
4294 shstrtab_hdr->sh_info = 0;
4295 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4296 shstrtab_hdr->sh_addralign = 1;
4297
4298 if (!assign_file_positions_except_relocs (abfd, link_info))
4299 return FALSE;
4300
4301 if (need_symtab)
4302 {
4303 file_ptr off;
4304 Elf_Internal_Shdr *hdr;
4305
4306 off = elf_next_file_pos (abfd);
4307
4308 hdr = & elf_symtab_hdr (abfd);
4309 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4310
4311 if (elf_symtab_shndx_list (abfd) != NULL)
4312 {
4313 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4314 if (hdr->sh_size != 0)
4315 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4316 /* FIXME: What about other symtab_shndx sections in the list ? */
4317 }
4318
4319 hdr = &elf_tdata (abfd)->strtab_hdr;
4320 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4321
4322 elf_next_file_pos (abfd) = off;
4323
4324 /* Now that we know where the .strtab section goes, write it
4325 out. */
4326 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4327 || ! _bfd_elf_strtab_emit (abfd, strtab))
4328 return FALSE;
4329 _bfd_elf_strtab_free (strtab);
4330 }
4331
4332 abfd->output_has_begun = TRUE;
4333
4334 return TRUE;
4335 }
4336
4337 /* Make an initial estimate of the size of the program header. If we
4338 get the number wrong here, we'll redo section placement. */
4339
4340 static bfd_size_type
4341 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4342 {
4343 size_t segs;
4344 asection *s;
4345 const struct elf_backend_data *bed;
4346
4347 /* Assume we will need exactly two PT_LOAD segments: one for text
4348 and one for data. */
4349 segs = 2;
4350
4351 s = bfd_get_section_by_name (abfd, ".interp");
4352 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4353 {
4354 /* If we have a loadable interpreter section, we need a
4355 PT_INTERP segment. In this case, assume we also need a
4356 PT_PHDR segment, although that may not be true for all
4357 targets. */
4358 segs += 2;
4359 }
4360
4361 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4362 {
4363 /* We need a PT_DYNAMIC segment. */
4364 ++segs;
4365 }
4366
4367 if (info != NULL && info->relro)
4368 {
4369 /* We need a PT_GNU_RELRO segment. */
4370 ++segs;
4371 }
4372
4373 if (elf_eh_frame_hdr (abfd))
4374 {
4375 /* We need a PT_GNU_EH_FRAME segment. */
4376 ++segs;
4377 }
4378
4379 if (elf_stack_flags (abfd))
4380 {
4381 /* We need a PT_GNU_STACK segment. */
4382 ++segs;
4383 }
4384
4385 s = bfd_get_section_by_name (abfd,
4386 NOTE_GNU_PROPERTY_SECTION_NAME);
4387 if (s != NULL && s->size != 0)
4388 {
4389 /* We need a PT_GNU_PROPERTY segment. */
4390 ++segs;
4391 }
4392
4393 for (s = abfd->sections; s != NULL; s = s->next)
4394 {
4395 if ((s->flags & SEC_LOAD) != 0
4396 && elf_section_type (s) == SHT_NOTE)
4397 {
4398 unsigned int alignment_power;
4399 /* We need a PT_NOTE segment. */
4400 ++segs;
4401 /* Try to create just one PT_NOTE segment for all adjacent
4402 loadable SHT_NOTE sections. gABI requires that within a
4403 PT_NOTE segment (and also inside of each SHT_NOTE section)
4404 each note should have the same alignment. So we check
4405 whether the sections are correctly aligned. */
4406 alignment_power = s->alignment_power;
4407 while (s->next != NULL
4408 && s->next->alignment_power == alignment_power
4409 && (s->next->flags & SEC_LOAD) != 0
4410 && elf_section_type (s->next) == SHT_NOTE)
4411 s = s->next;
4412 }
4413 }
4414
4415 for (s = abfd->sections; s != NULL; s = s->next)
4416 {
4417 if (s->flags & SEC_THREAD_LOCAL)
4418 {
4419 /* We need a PT_TLS segment. */
4420 ++segs;
4421 break;
4422 }
4423 }
4424
4425 bed = get_elf_backend_data (abfd);
4426
4427 if ((abfd->flags & D_PAGED) != 0
4428 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4429 {
4430 /* Add a PT_GNU_MBIND segment for each mbind section. */
4431 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4432 for (s = abfd->sections; s != NULL; s = s->next)
4433 if (elf_section_flags (s) & SHF_GNU_MBIND)
4434 {
4435 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4436 {
4437 _bfd_error_handler
4438 /* xgettext:c-format */
4439 (_("%pB: GNU_MBIND section `%pA' has invalid "
4440 "sh_info field: %d"),
4441 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4442 continue;
4443 }
4444 /* Align mbind section to page size. */
4445 if (s->alignment_power < page_align_power)
4446 s->alignment_power = page_align_power;
4447 segs ++;
4448 }
4449 }
4450
4451 /* Let the backend count up any program headers it might need. */
4452 if (bed->elf_backend_additional_program_headers)
4453 {
4454 int a;
4455
4456 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4457 if (a == -1)
4458 abort ();
4459 segs += a;
4460 }
4461
4462 return segs * bed->s->sizeof_phdr;
4463 }
4464
4465 /* Find the segment that contains the output_section of section. */
4466
4467 Elf_Internal_Phdr *
4468 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4469 {
4470 struct elf_segment_map *m;
4471 Elf_Internal_Phdr *p;
4472
4473 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4474 m != NULL;
4475 m = m->next, p++)
4476 {
4477 int i;
4478
4479 for (i = m->count - 1; i >= 0; i--)
4480 if (m->sections[i] == section)
4481 return p;
4482 }
4483
4484 return NULL;
4485 }
4486
4487 /* Create a mapping from a set of sections to a program segment. */
4488
4489 static struct elf_segment_map *
4490 make_mapping (bfd *abfd,
4491 asection **sections,
4492 unsigned int from,
4493 unsigned int to,
4494 bfd_boolean phdr)
4495 {
4496 struct elf_segment_map *m;
4497 unsigned int i;
4498 asection **hdrpp;
4499 size_t amt;
4500
4501 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4502 amt += (to - from) * sizeof (asection *);
4503 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4504 if (m == NULL)
4505 return NULL;
4506 m->next = NULL;
4507 m->p_type = PT_LOAD;
4508 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4509 m->sections[i - from] = *hdrpp;
4510 m->count = to - from;
4511
4512 if (from == 0 && phdr)
4513 {
4514 /* Include the headers in the first PT_LOAD segment. */
4515 m->includes_filehdr = 1;
4516 m->includes_phdrs = 1;
4517 }
4518
4519 return m;
4520 }
4521
4522 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4523 on failure. */
4524
4525 struct elf_segment_map *
4526 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4527 {
4528 struct elf_segment_map *m;
4529
4530 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4531 sizeof (struct elf_segment_map));
4532 if (m == NULL)
4533 return NULL;
4534 m->next = NULL;
4535 m->p_type = PT_DYNAMIC;
4536 m->count = 1;
4537 m->sections[0] = dynsec;
4538
4539 return m;
4540 }
4541
4542 /* Possibly add or remove segments from the segment map. */
4543
4544 static bfd_boolean
4545 elf_modify_segment_map (bfd *abfd,
4546 struct bfd_link_info *info,
4547 bfd_boolean remove_empty_load)
4548 {
4549 struct elf_segment_map **m;
4550 const struct elf_backend_data *bed;
4551
4552 /* The placement algorithm assumes that non allocated sections are
4553 not in PT_LOAD segments. We ensure this here by removing such
4554 sections from the segment map. We also remove excluded
4555 sections. Finally, any PT_LOAD segment without sections is
4556 removed. */
4557 m = &elf_seg_map (abfd);
4558 while (*m)
4559 {
4560 unsigned int i, new_count;
4561
4562 for (new_count = 0, i = 0; i < (*m)->count; i++)
4563 {
4564 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4565 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4566 || (*m)->p_type != PT_LOAD))
4567 {
4568 (*m)->sections[new_count] = (*m)->sections[i];
4569 new_count++;
4570 }
4571 }
4572 (*m)->count = new_count;
4573
4574 if (remove_empty_load
4575 && (*m)->p_type == PT_LOAD
4576 && (*m)->count == 0
4577 && !(*m)->includes_phdrs)
4578 *m = (*m)->next;
4579 else
4580 m = &(*m)->next;
4581 }
4582
4583 bed = get_elf_backend_data (abfd);
4584 if (bed->elf_backend_modify_segment_map != NULL)
4585 {
4586 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4587 return FALSE;
4588 }
4589
4590 return TRUE;
4591 }
4592
4593 #define IS_TBSS(s) \
4594 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4595
4596 /* Set up a mapping from BFD sections to program segments. */
4597
4598 bfd_boolean
4599 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4600 {
4601 unsigned int count;
4602 struct elf_segment_map *m;
4603 asection **sections = NULL;
4604 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4605 bfd_boolean no_user_phdrs;
4606
4607 no_user_phdrs = elf_seg_map (abfd) == NULL;
4608
4609 if (info != NULL)
4610 info->user_phdrs = !no_user_phdrs;
4611
4612 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4613 {
4614 asection *s;
4615 unsigned int i;
4616 struct elf_segment_map *mfirst;
4617 struct elf_segment_map **pm;
4618 asection *last_hdr;
4619 bfd_vma last_size;
4620 unsigned int hdr_index;
4621 bfd_vma maxpagesize;
4622 asection **hdrpp;
4623 bfd_boolean phdr_in_segment;
4624 bfd_boolean writable;
4625 bfd_boolean executable;
4626 unsigned int tls_count = 0;
4627 asection *first_tls = NULL;
4628 asection *first_mbind = NULL;
4629 asection *dynsec, *eh_frame_hdr;
4630 size_t amt;
4631 bfd_vma addr_mask, wrap_to = 0; /* Bytes. */
4632 bfd_size_type phdr_size; /* Octets/bytes. */
4633 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
4634
4635 /* Select the allocated sections, and sort them. */
4636
4637 amt = bfd_count_sections (abfd) * sizeof (asection *);
4638 sections = (asection **) bfd_malloc (amt);
4639 if (sections == NULL)
4640 goto error_return;
4641
4642 /* Calculate top address, avoiding undefined behaviour of shift
4643 left operator when shift count is equal to size of type
4644 being shifted. */
4645 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4646 addr_mask = (addr_mask << 1) + 1;
4647
4648 i = 0;
4649 for (s = abfd->sections; s != NULL; s = s->next)
4650 {
4651 if ((s->flags & SEC_ALLOC) != 0)
4652 {
4653 /* target_index is unused until bfd_elf_final_link
4654 starts output of section symbols. Use it to make
4655 qsort stable. */
4656 s->target_index = i;
4657 sections[i] = s;
4658 ++i;
4659 /* A wrapping section potentially clashes with header. */
4660 if (((s->lma + s->size / opb) & addr_mask) < (s->lma & addr_mask))
4661 wrap_to = (s->lma + s->size / opb) & addr_mask;
4662 }
4663 }
4664 BFD_ASSERT (i <= bfd_count_sections (abfd));
4665 count = i;
4666
4667 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4668
4669 phdr_size = elf_program_header_size (abfd);
4670 if (phdr_size == (bfd_size_type) -1)
4671 phdr_size = get_program_header_size (abfd, info);
4672 phdr_size += bed->s->sizeof_ehdr;
4673 /* phdr_size is compared to LMA values which are in bytes. */
4674 phdr_size /= opb;
4675 maxpagesize = bed->maxpagesize;
4676 if (maxpagesize == 0)
4677 maxpagesize = 1;
4678 phdr_in_segment = info != NULL && info->load_phdrs;
4679 if (count != 0
4680 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4681 >= (phdr_size & (maxpagesize - 1))))
4682 /* For compatibility with old scripts that may not be using
4683 SIZEOF_HEADERS, add headers when it looks like space has
4684 been left for them. */
4685 phdr_in_segment = TRUE;
4686
4687 /* Build the mapping. */
4688 mfirst = NULL;
4689 pm = &mfirst;
4690
4691 /* If we have a .interp section, then create a PT_PHDR segment for
4692 the program headers and a PT_INTERP segment for the .interp
4693 section. */
4694 s = bfd_get_section_by_name (abfd, ".interp");
4695 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4696 {
4697 amt = sizeof (struct elf_segment_map);
4698 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4699 if (m == NULL)
4700 goto error_return;
4701 m->next = NULL;
4702 m->p_type = PT_PHDR;
4703 m->p_flags = PF_R;
4704 m->p_flags_valid = 1;
4705 m->includes_phdrs = 1;
4706 phdr_in_segment = TRUE;
4707 *pm = m;
4708 pm = &m->next;
4709
4710 amt = sizeof (struct elf_segment_map);
4711 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4712 if (m == NULL)
4713 goto error_return;
4714 m->next = NULL;
4715 m->p_type = PT_INTERP;
4716 m->count = 1;
4717 m->sections[0] = s;
4718
4719 *pm = m;
4720 pm = &m->next;
4721 }
4722
4723 /* Look through the sections. We put sections in the same program
4724 segment when the start of the second section can be placed within
4725 a few bytes of the end of the first section. */
4726 last_hdr = NULL;
4727 last_size = 0;
4728 hdr_index = 0;
4729 writable = FALSE;
4730 executable = FALSE;
4731 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4732 if (dynsec != NULL
4733 && (dynsec->flags & SEC_LOAD) == 0)
4734 dynsec = NULL;
4735
4736 if ((abfd->flags & D_PAGED) == 0)
4737 phdr_in_segment = FALSE;
4738
4739 /* Deal with -Ttext or something similar such that the first section
4740 is not adjacent to the program headers. This is an
4741 approximation, since at this point we don't know exactly how many
4742 program headers we will need. */
4743 if (phdr_in_segment && count > 0)
4744 {
4745 bfd_vma phdr_lma; /* Bytes. */
4746 bfd_boolean separate_phdr = FALSE;
4747
4748 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4749 if (info != NULL
4750 && info->separate_code
4751 && (sections[0]->flags & SEC_CODE) != 0)
4752 {
4753 /* If data sections should be separate from code and
4754 thus not executable, and the first section is
4755 executable then put the file and program headers in
4756 their own PT_LOAD. */
4757 separate_phdr = TRUE;
4758 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4759 == (sections[0]->lma & addr_mask & -maxpagesize)))
4760 {
4761 /* The file and program headers are currently on the
4762 same page as the first section. Put them on the
4763 previous page if we can. */
4764 if (phdr_lma >= maxpagesize)
4765 phdr_lma -= maxpagesize;
4766 else
4767 separate_phdr = FALSE;
4768 }
4769 }
4770 if ((sections[0]->lma & addr_mask) < phdr_lma
4771 || (sections[0]->lma & addr_mask) < phdr_size)
4772 /* If file and program headers would be placed at the end
4773 of memory then it's probably better to omit them. */
4774 phdr_in_segment = FALSE;
4775 else if (phdr_lma < wrap_to)
4776 /* If a section wraps around to where we'll be placing
4777 file and program headers, then the headers will be
4778 overwritten. */
4779 phdr_in_segment = FALSE;
4780 else if (separate_phdr)
4781 {
4782 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4783 if (m == NULL)
4784 goto error_return;
4785 m->p_paddr = phdr_lma * opb;
4786 m->p_vaddr_offset
4787 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4788 m->p_paddr_valid = 1;
4789 *pm = m;
4790 pm = &m->next;
4791 phdr_in_segment = FALSE;
4792 }
4793 }
4794
4795 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4796 {
4797 asection *hdr;
4798 bfd_boolean new_segment;
4799
4800 hdr = *hdrpp;
4801
4802 /* See if this section and the last one will fit in the same
4803 segment. */
4804
4805 if (last_hdr == NULL)
4806 {
4807 /* If we don't have a segment yet, then we don't need a new
4808 one (we build the last one after this loop). */
4809 new_segment = FALSE;
4810 }
4811 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4812 {
4813 /* If this section has a different relation between the
4814 virtual address and the load address, then we need a new
4815 segment. */
4816 new_segment = TRUE;
4817 }
4818 else if (hdr->lma < last_hdr->lma + last_size
4819 || last_hdr->lma + last_size < last_hdr->lma)
4820 {
4821 /* If this section has a load address that makes it overlap
4822 the previous section, then we need a new segment. */
4823 new_segment = TRUE;
4824 }
4825 else if ((abfd->flags & D_PAGED) != 0
4826 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4827 == (hdr->lma & -maxpagesize)))
4828 {
4829 /* If we are demand paged then we can't map two disk
4830 pages onto the same memory page. */
4831 new_segment = FALSE;
4832 }
4833 /* In the next test we have to be careful when last_hdr->lma is close
4834 to the end of the address space. If the aligned address wraps
4835 around to the start of the address space, then there are no more
4836 pages left in memory and it is OK to assume that the current
4837 section can be included in the current segment. */
4838 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4839 + maxpagesize > last_hdr->lma)
4840 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4841 + maxpagesize <= hdr->lma))
4842 {
4843 /* If putting this section in this segment would force us to
4844 skip a page in the segment, then we need a new segment. */
4845 new_segment = TRUE;
4846 }
4847 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4848 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4849 {
4850 /* We don't want to put a loaded section after a
4851 nonloaded (ie. bss style) section in the same segment
4852 as that will force the non-loaded section to be loaded.
4853 Consider .tbss sections as loaded for this purpose. */
4854 new_segment = TRUE;
4855 }
4856 else if ((abfd->flags & D_PAGED) == 0)
4857 {
4858 /* If the file is not demand paged, which means that we
4859 don't require the sections to be correctly aligned in the
4860 file, then there is no other reason for a new segment. */
4861 new_segment = FALSE;
4862 }
4863 else if (info != NULL
4864 && info->separate_code
4865 && executable != ((hdr->flags & SEC_CODE) != 0))
4866 {
4867 new_segment = TRUE;
4868 }
4869 else if (! writable
4870 && (hdr->flags & SEC_READONLY) == 0)
4871 {
4872 /* We don't want to put a writable section in a read only
4873 segment. */
4874 new_segment = TRUE;
4875 }
4876 else
4877 {
4878 /* Otherwise, we can use the same segment. */
4879 new_segment = FALSE;
4880 }
4881
4882 /* Allow interested parties a chance to override our decision. */
4883 if (last_hdr != NULL
4884 && info != NULL
4885 && info->callbacks->override_segment_assignment != NULL)
4886 new_segment
4887 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4888 last_hdr,
4889 new_segment);
4890
4891 if (! new_segment)
4892 {
4893 if ((hdr->flags & SEC_READONLY) == 0)
4894 writable = TRUE;
4895 if ((hdr->flags & SEC_CODE) != 0)
4896 executable = TRUE;
4897 last_hdr = hdr;
4898 /* .tbss sections effectively have zero size. */
4899 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4900 continue;
4901 }
4902
4903 /* We need a new program segment. We must create a new program
4904 header holding all the sections from hdr_index until hdr. */
4905
4906 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4907 if (m == NULL)
4908 goto error_return;
4909
4910 *pm = m;
4911 pm = &m->next;
4912
4913 if ((hdr->flags & SEC_READONLY) == 0)
4914 writable = TRUE;
4915 else
4916 writable = FALSE;
4917
4918 if ((hdr->flags & SEC_CODE) == 0)
4919 executable = FALSE;
4920 else
4921 executable = TRUE;
4922
4923 last_hdr = hdr;
4924 /* .tbss sections effectively have zero size. */
4925 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4926 hdr_index = i;
4927 phdr_in_segment = FALSE;
4928 }
4929
4930 /* Create a final PT_LOAD program segment, but not if it's just
4931 for .tbss. */
4932 if (last_hdr != NULL
4933 && (i - hdr_index != 1
4934 || !IS_TBSS (last_hdr)))
4935 {
4936 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4937 if (m == NULL)
4938 goto error_return;
4939
4940 *pm = m;
4941 pm = &m->next;
4942 }
4943
4944 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4945 if (dynsec != NULL)
4946 {
4947 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4948 if (m == NULL)
4949 goto error_return;
4950 *pm = m;
4951 pm = &m->next;
4952 }
4953
4954 /* For each batch of consecutive loadable SHT_NOTE sections,
4955 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4956 because if we link together nonloadable .note sections and
4957 loadable .note sections, we will generate two .note sections
4958 in the output file. */
4959 for (s = abfd->sections; s != NULL; s = s->next)
4960 {
4961 if ((s->flags & SEC_LOAD) != 0
4962 && elf_section_type (s) == SHT_NOTE)
4963 {
4964 asection *s2;
4965 unsigned int alignment_power = s->alignment_power;
4966
4967 count = 1;
4968 for (s2 = s; s2->next != NULL; s2 = s2->next)
4969 {
4970 if (s2->next->alignment_power == alignment_power
4971 && (s2->next->flags & SEC_LOAD) != 0
4972 && elf_section_type (s2->next) == SHT_NOTE
4973 && align_power (s2->lma + s2->size / opb,
4974 alignment_power)
4975 == s2->next->lma)
4976 count++;
4977 else
4978 break;
4979 }
4980 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4981 amt += count * sizeof (asection *);
4982 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4983 if (m == NULL)
4984 goto error_return;
4985 m->next = NULL;
4986 m->p_type = PT_NOTE;
4987 m->count = count;
4988 while (count > 1)
4989 {
4990 m->sections[m->count - count--] = s;
4991 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4992 s = s->next;
4993 }
4994 m->sections[m->count - 1] = s;
4995 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
4996 *pm = m;
4997 pm = &m->next;
4998 }
4999 if (s->flags & SEC_THREAD_LOCAL)
5000 {
5001 if (! tls_count)
5002 first_tls = s;
5003 tls_count++;
5004 }
5005 if (first_mbind == NULL
5006 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5007 first_mbind = s;
5008 }
5009
5010 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5011 if (tls_count > 0)
5012 {
5013 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5014 amt += tls_count * sizeof (asection *);
5015 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5016 if (m == NULL)
5017 goto error_return;
5018 m->next = NULL;
5019 m->p_type = PT_TLS;
5020 m->count = tls_count;
5021 /* Mandated PF_R. */
5022 m->p_flags = PF_R;
5023 m->p_flags_valid = 1;
5024 s = first_tls;
5025 for (i = 0; i < tls_count; ++i)
5026 {
5027 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5028 {
5029 _bfd_error_handler
5030 (_("%pB: TLS sections are not adjacent:"), abfd);
5031 s = first_tls;
5032 i = 0;
5033 while (i < tls_count)
5034 {
5035 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5036 {
5037 _bfd_error_handler (_(" TLS: %pA"), s);
5038 i++;
5039 }
5040 else
5041 _bfd_error_handler (_(" non-TLS: %pA"), s);
5042 s = s->next;
5043 }
5044 bfd_set_error (bfd_error_bad_value);
5045 goto error_return;
5046 }
5047 m->sections[i] = s;
5048 s = s->next;
5049 }
5050
5051 *pm = m;
5052 pm = &m->next;
5053 }
5054
5055 if (first_mbind
5056 && (abfd->flags & D_PAGED) != 0
5057 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5058 for (s = first_mbind; s != NULL; s = s->next)
5059 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5060 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5061 {
5062 /* Mandated PF_R. */
5063 unsigned long p_flags = PF_R;
5064 if ((s->flags & SEC_READONLY) == 0)
5065 p_flags |= PF_W;
5066 if ((s->flags & SEC_CODE) != 0)
5067 p_flags |= PF_X;
5068
5069 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5070 m = bfd_zalloc (abfd, amt);
5071 if (m == NULL)
5072 goto error_return;
5073 m->next = NULL;
5074 m->p_type = (PT_GNU_MBIND_LO
5075 + elf_section_data (s)->this_hdr.sh_info);
5076 m->count = 1;
5077 m->p_flags_valid = 1;
5078 m->sections[0] = s;
5079 m->p_flags = p_flags;
5080
5081 *pm = m;
5082 pm = &m->next;
5083 }
5084
5085 s = bfd_get_section_by_name (abfd,
5086 NOTE_GNU_PROPERTY_SECTION_NAME);
5087 if (s != NULL && s->size != 0)
5088 {
5089 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5090 m = bfd_zalloc (abfd, amt);
5091 if (m == NULL)
5092 goto error_return;
5093 m->next = NULL;
5094 m->p_type = PT_GNU_PROPERTY;
5095 m->count = 1;
5096 m->p_flags_valid = 1;
5097 m->sections[0] = s;
5098 m->p_flags = PF_R;
5099 *pm = m;
5100 pm = &m->next;
5101 }
5102
5103 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5104 segment. */
5105 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5106 if (eh_frame_hdr != NULL
5107 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5108 {
5109 amt = sizeof (struct elf_segment_map);
5110 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5111 if (m == NULL)
5112 goto error_return;
5113 m->next = NULL;
5114 m->p_type = PT_GNU_EH_FRAME;
5115 m->count = 1;
5116 m->sections[0] = eh_frame_hdr->output_section;
5117
5118 *pm = m;
5119 pm = &m->next;
5120 }
5121
5122 if (elf_stack_flags (abfd))
5123 {
5124 amt = sizeof (struct elf_segment_map);
5125 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5126 if (m == NULL)
5127 goto error_return;
5128 m->next = NULL;
5129 m->p_type = PT_GNU_STACK;
5130 m->p_flags = elf_stack_flags (abfd);
5131 m->p_align = bed->stack_align;
5132 m->p_flags_valid = 1;
5133 m->p_align_valid = m->p_align != 0;
5134 if (info->stacksize > 0)
5135 {
5136 m->p_size = info->stacksize;
5137 m->p_size_valid = 1;
5138 }
5139
5140 *pm = m;
5141 pm = &m->next;
5142 }
5143
5144 if (info != NULL && info->relro)
5145 {
5146 for (m = mfirst; m != NULL; m = m->next)
5147 {
5148 if (m->p_type == PT_LOAD
5149 && m->count != 0
5150 && m->sections[0]->vma >= info->relro_start
5151 && m->sections[0]->vma < info->relro_end)
5152 {
5153 i = m->count;
5154 while (--i != (unsigned) -1)
5155 {
5156 if (m->sections[i]->size > 0
5157 && (m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5158 == (SEC_LOAD | SEC_HAS_CONTENTS))
5159 break;
5160 }
5161
5162 if (i != (unsigned) -1)
5163 break;
5164 }
5165 }
5166
5167 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5168 if (m != NULL)
5169 {
5170 amt = sizeof (struct elf_segment_map);
5171 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5172 if (m == NULL)
5173 goto error_return;
5174 m->next = NULL;
5175 m->p_type = PT_GNU_RELRO;
5176 *pm = m;
5177 pm = &m->next;
5178 }
5179 }
5180
5181 free (sections);
5182 elf_seg_map (abfd) = mfirst;
5183 }
5184
5185 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5186 return FALSE;
5187
5188 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5189 ++count;
5190 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5191
5192 return TRUE;
5193
5194 error_return:
5195 free (sections);
5196 return FALSE;
5197 }
5198
5199 /* Sort sections by address. */
5200
5201 static int
5202 elf_sort_sections (const void *arg1, const void *arg2)
5203 {
5204 const asection *sec1 = *(const asection **) arg1;
5205 const asection *sec2 = *(const asection **) arg2;
5206 bfd_size_type size1, size2;
5207
5208 /* Sort by LMA first, since this is the address used to
5209 place the section into a segment. */
5210 if (sec1->lma < sec2->lma)
5211 return -1;
5212 else if (sec1->lma > sec2->lma)
5213 return 1;
5214
5215 /* Then sort by VMA. Normally the LMA and the VMA will be
5216 the same, and this will do nothing. */
5217 if (sec1->vma < sec2->vma)
5218 return -1;
5219 else if (sec1->vma > sec2->vma)
5220 return 1;
5221
5222 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5223
5224 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0 \
5225 && (x)->size != 0)
5226
5227 if (TOEND (sec1))
5228 {
5229 if (!TOEND (sec2))
5230 return 1;
5231 }
5232 else if (TOEND (sec2))
5233 return -1;
5234
5235 #undef TOEND
5236
5237 /* Sort by size, to put zero sized sections
5238 before others at the same address. */
5239
5240 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5241 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5242
5243 if (size1 < size2)
5244 return -1;
5245 if (size1 > size2)
5246 return 1;
5247
5248 return sec1->target_index - sec2->target_index;
5249 }
5250
5251 /* This qsort comparison functions sorts PT_LOAD segments first and
5252 by p_paddr, for assign_file_positions_for_load_sections. */
5253
5254 static int
5255 elf_sort_segments (const void *arg1, const void *arg2)
5256 {
5257 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5258 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5259
5260 if (m1->p_type != m2->p_type)
5261 {
5262 if (m1->p_type == PT_NULL)
5263 return 1;
5264 if (m2->p_type == PT_NULL)
5265 return -1;
5266 return m1->p_type < m2->p_type ? -1 : 1;
5267 }
5268 if (m1->includes_filehdr != m2->includes_filehdr)
5269 return m1->includes_filehdr ? -1 : 1;
5270 if (m1->no_sort_lma != m2->no_sort_lma)
5271 return m1->no_sort_lma ? -1 : 1;
5272 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5273 {
5274 bfd_vma lma1, lma2; /* Octets. */
5275 lma1 = 0;
5276 if (m1->p_paddr_valid)
5277 lma1 = m1->p_paddr;
5278 else if (m1->count != 0)
5279 {
5280 unsigned int opb = bfd_octets_per_byte (m1->sections[0]->owner,
5281 m1->sections[0]);
5282 lma1 = (m1->sections[0]->lma + m1->p_vaddr_offset) * opb;
5283 }
5284 lma2 = 0;
5285 if (m2->p_paddr_valid)
5286 lma2 = m2->p_paddr;
5287 else if (m2->count != 0)
5288 {
5289 unsigned int opb = bfd_octets_per_byte (m2->sections[0]->owner,
5290 m2->sections[0]);
5291 lma2 = (m2->sections[0]->lma + m2->p_vaddr_offset) * opb;
5292 }
5293 if (lma1 != lma2)
5294 return lma1 < lma2 ? -1 : 1;
5295 }
5296 if (m1->idx != m2->idx)
5297 return m1->idx < m2->idx ? -1 : 1;
5298 return 0;
5299 }
5300
5301 /* Ian Lance Taylor writes:
5302
5303 We shouldn't be using % with a negative signed number. That's just
5304 not good. We have to make sure either that the number is not
5305 negative, or that the number has an unsigned type. When the types
5306 are all the same size they wind up as unsigned. When file_ptr is a
5307 larger signed type, the arithmetic winds up as signed long long,
5308 which is wrong.
5309
5310 What we're trying to say here is something like ``increase OFF by
5311 the least amount that will cause it to be equal to the VMA modulo
5312 the page size.'' */
5313 /* In other words, something like:
5314
5315 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5316 off_offset = off % bed->maxpagesize;
5317 if (vma_offset < off_offset)
5318 adjustment = vma_offset + bed->maxpagesize - off_offset;
5319 else
5320 adjustment = vma_offset - off_offset;
5321
5322 which can be collapsed into the expression below. */
5323
5324 static file_ptr
5325 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5326 {
5327 /* PR binutils/16199: Handle an alignment of zero. */
5328 if (maxpagesize == 0)
5329 maxpagesize = 1;
5330 return ((vma - off) % maxpagesize);
5331 }
5332
5333 static void
5334 print_segment_map (const struct elf_segment_map *m)
5335 {
5336 unsigned int j;
5337 const char *pt = get_segment_type (m->p_type);
5338 char buf[32];
5339
5340 if (pt == NULL)
5341 {
5342 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5343 sprintf (buf, "LOPROC+%7.7x",
5344 (unsigned int) (m->p_type - PT_LOPROC));
5345 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5346 sprintf (buf, "LOOS+%7.7x",
5347 (unsigned int) (m->p_type - PT_LOOS));
5348 else
5349 snprintf (buf, sizeof (buf), "%8.8x",
5350 (unsigned int) m->p_type);
5351 pt = buf;
5352 }
5353 fflush (stdout);
5354 fprintf (stderr, "%s:", pt);
5355 for (j = 0; j < m->count; j++)
5356 fprintf (stderr, " %s", m->sections [j]->name);
5357 putc ('\n',stderr);
5358 fflush (stderr);
5359 }
5360
5361 static bfd_boolean
5362 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5363 {
5364 void *buf;
5365 bfd_boolean ret;
5366
5367 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5368 return FALSE;
5369 buf = bfd_zmalloc (len);
5370 if (buf == NULL)
5371 return FALSE;
5372 ret = bfd_bwrite (buf, len, abfd) == len;
5373 free (buf);
5374 return ret;
5375 }
5376
5377 /* Assign file positions to the sections based on the mapping from
5378 sections to segments. This function also sets up some fields in
5379 the file header. */
5380
5381 static bfd_boolean
5382 assign_file_positions_for_load_sections (bfd *abfd,
5383 struct bfd_link_info *link_info)
5384 {
5385 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5386 struct elf_segment_map *m;
5387 struct elf_segment_map *phdr_load_seg;
5388 Elf_Internal_Phdr *phdrs;
5389 Elf_Internal_Phdr *p;
5390 file_ptr off; /* Octets. */
5391 bfd_size_type maxpagesize;
5392 unsigned int alloc, actual;
5393 unsigned int i, j;
5394 struct elf_segment_map **sorted_seg_map;
5395 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
5396
5397 if (link_info == NULL
5398 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5399 return FALSE;
5400
5401 alloc = 0;
5402 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5403 m->idx = alloc++;
5404
5405 if (alloc)
5406 {
5407 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5408 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5409 }
5410 else
5411 {
5412 /* PR binutils/12467. */
5413 elf_elfheader (abfd)->e_phoff = 0;
5414 elf_elfheader (abfd)->e_phentsize = 0;
5415 }
5416
5417 elf_elfheader (abfd)->e_phnum = alloc;
5418
5419 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5420 {
5421 actual = alloc;
5422 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5423 }
5424 else
5425 {
5426 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5427 BFD_ASSERT (elf_program_header_size (abfd)
5428 == actual * bed->s->sizeof_phdr);
5429 BFD_ASSERT (actual >= alloc);
5430 }
5431
5432 if (alloc == 0)
5433 {
5434 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5435 return TRUE;
5436 }
5437
5438 /* We're writing the size in elf_program_header_size (abfd),
5439 see assign_file_positions_except_relocs, so make sure we have
5440 that amount allocated, with trailing space cleared.
5441 The variable alloc contains the computed need, while
5442 elf_program_header_size (abfd) contains the size used for the
5443 layout.
5444 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5445 where the layout is forced to according to a larger size in the
5446 last iterations for the testcase ld-elf/header. */
5447 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5448 + alloc * sizeof (*sorted_seg_map)));
5449 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5450 elf_tdata (abfd)->phdr = phdrs;
5451 if (phdrs == NULL)
5452 return FALSE;
5453
5454 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5455 {
5456 sorted_seg_map[j] = m;
5457 /* If elf_segment_map is not from map_sections_to_segments, the
5458 sections may not be correctly ordered. NOTE: sorting should
5459 not be done to the PT_NOTE section of a corefile, which may
5460 contain several pseudo-sections artificially created by bfd.
5461 Sorting these pseudo-sections breaks things badly. */
5462 if (m->count > 1
5463 && !(elf_elfheader (abfd)->e_type == ET_CORE
5464 && m->p_type == PT_NOTE))
5465 {
5466 for (i = 0; i < m->count; i++)
5467 m->sections[i]->target_index = i;
5468 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5469 elf_sort_sections);
5470 }
5471 }
5472 if (alloc > 1)
5473 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5474 elf_sort_segments);
5475
5476 maxpagesize = 1;
5477 if ((abfd->flags & D_PAGED) != 0)
5478 maxpagesize = bed->maxpagesize;
5479
5480 /* Sections must map to file offsets past the ELF file header. */
5481 off = bed->s->sizeof_ehdr;
5482 /* And if one of the PT_LOAD headers doesn't include the program
5483 headers then we'll be mapping program headers in the usual
5484 position after the ELF file header. */
5485 phdr_load_seg = NULL;
5486 for (j = 0; j < alloc; j++)
5487 {
5488 m = sorted_seg_map[j];
5489 if (m->p_type != PT_LOAD)
5490 break;
5491 if (m->includes_phdrs)
5492 {
5493 phdr_load_seg = m;
5494 break;
5495 }
5496 }
5497 if (phdr_load_seg == NULL)
5498 off += actual * bed->s->sizeof_phdr;
5499
5500 for (j = 0; j < alloc; j++)
5501 {
5502 asection **secpp;
5503 bfd_vma off_adjust; /* Octets. */
5504 bfd_boolean no_contents;
5505
5506 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5507 number of sections with contents contributing to both p_filesz
5508 and p_memsz, followed by a number of sections with no contents
5509 that just contribute to p_memsz. In this loop, OFF tracks next
5510 available file offset for PT_LOAD and PT_NOTE segments. */
5511 m = sorted_seg_map[j];
5512 p = phdrs + m->idx;
5513 p->p_type = m->p_type;
5514 p->p_flags = m->p_flags;
5515
5516 if (m->count == 0)
5517 p->p_vaddr = m->p_vaddr_offset * opb;
5518 else
5519 p->p_vaddr = (m->sections[0]->vma + m->p_vaddr_offset) * opb;
5520
5521 if (m->p_paddr_valid)
5522 p->p_paddr = m->p_paddr;
5523 else if (m->count == 0)
5524 p->p_paddr = 0;
5525 else
5526 p->p_paddr = (m->sections[0]->lma + m->p_vaddr_offset) * opb;
5527
5528 if (p->p_type == PT_LOAD
5529 && (abfd->flags & D_PAGED) != 0)
5530 {
5531 /* p_align in demand paged PT_LOAD segments effectively stores
5532 the maximum page size. When copying an executable with
5533 objcopy, we set m->p_align from the input file. Use this
5534 value for maxpagesize rather than bed->maxpagesize, which
5535 may be different. Note that we use maxpagesize for PT_TLS
5536 segment alignment later in this function, so we are relying
5537 on at least one PT_LOAD segment appearing before a PT_TLS
5538 segment. */
5539 if (m->p_align_valid)
5540 maxpagesize = m->p_align;
5541
5542 p->p_align = maxpagesize;
5543 }
5544 else if (m->p_align_valid)
5545 p->p_align = m->p_align;
5546 else if (m->count == 0)
5547 p->p_align = 1 << bed->s->log_file_align;
5548
5549 if (m == phdr_load_seg)
5550 {
5551 if (!m->includes_filehdr)
5552 p->p_offset = off;
5553 off += actual * bed->s->sizeof_phdr;
5554 }
5555
5556 no_contents = FALSE;
5557 off_adjust = 0;
5558 if (p->p_type == PT_LOAD
5559 && m->count > 0)
5560 {
5561 bfd_size_type align; /* Bytes. */
5562 unsigned int align_power = 0;
5563
5564 if (m->p_align_valid)
5565 align = p->p_align;
5566 else
5567 {
5568 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5569 {
5570 unsigned int secalign;
5571
5572 secalign = bfd_section_alignment (*secpp);
5573 if (secalign > align_power)
5574 align_power = secalign;
5575 }
5576 align = (bfd_size_type) 1 << align_power;
5577 if (align < maxpagesize)
5578 align = maxpagesize;
5579 }
5580
5581 for (i = 0; i < m->count; i++)
5582 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5583 /* If we aren't making room for this section, then
5584 it must be SHT_NOBITS regardless of what we've
5585 set via struct bfd_elf_special_section. */
5586 elf_section_type (m->sections[i]) = SHT_NOBITS;
5587
5588 /* Find out whether this segment contains any loadable
5589 sections. */
5590 no_contents = TRUE;
5591 for (i = 0; i < m->count; i++)
5592 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5593 {
5594 no_contents = FALSE;
5595 break;
5596 }
5597
5598 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align * opb);
5599
5600 /* Broken hardware and/or kernel require that files do not
5601 map the same page with different permissions on some hppa
5602 processors. */
5603 if (j != 0
5604 && (abfd->flags & D_PAGED) != 0
5605 && bed->no_page_alias
5606 && (off & (maxpagesize - 1)) != 0
5607 && ((off & -maxpagesize)
5608 == ((off + off_adjust) & -maxpagesize)))
5609 off_adjust += maxpagesize;
5610 off += off_adjust;
5611 if (no_contents)
5612 {
5613 /* We shouldn't need to align the segment on disk since
5614 the segment doesn't need file space, but the gABI
5615 arguably requires the alignment and glibc ld.so
5616 checks it. So to comply with the alignment
5617 requirement but not waste file space, we adjust
5618 p_offset for just this segment. (OFF_ADJUST is
5619 subtracted from OFF later.) This may put p_offset
5620 past the end of file, but that shouldn't matter. */
5621 }
5622 else
5623 off_adjust = 0;
5624 }
5625 /* Make sure the .dynamic section is the first section in the
5626 PT_DYNAMIC segment. */
5627 else if (p->p_type == PT_DYNAMIC
5628 && m->count > 1
5629 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5630 {
5631 _bfd_error_handler
5632 (_("%pB: The first section in the PT_DYNAMIC segment"
5633 " is not the .dynamic section"),
5634 abfd);
5635 bfd_set_error (bfd_error_bad_value);
5636 return FALSE;
5637 }
5638 /* Set the note section type to SHT_NOTE. */
5639 else if (p->p_type == PT_NOTE)
5640 for (i = 0; i < m->count; i++)
5641 elf_section_type (m->sections[i]) = SHT_NOTE;
5642
5643 if (m->includes_filehdr)
5644 {
5645 if (!m->p_flags_valid)
5646 p->p_flags |= PF_R;
5647 p->p_filesz = bed->s->sizeof_ehdr;
5648 p->p_memsz = bed->s->sizeof_ehdr;
5649 if (p->p_type == PT_LOAD)
5650 {
5651 if (m->count > 0)
5652 {
5653 if (p->p_vaddr < (bfd_vma) off
5654 || (!m->p_paddr_valid
5655 && p->p_paddr < (bfd_vma) off))
5656 {
5657 _bfd_error_handler
5658 (_("%pB: not enough room for program headers,"
5659 " try linking with -N"),
5660 abfd);
5661 bfd_set_error (bfd_error_bad_value);
5662 return FALSE;
5663 }
5664 p->p_vaddr -= off;
5665 if (!m->p_paddr_valid)
5666 p->p_paddr -= off;
5667 }
5668 }
5669 else if (sorted_seg_map[0]->includes_filehdr)
5670 {
5671 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5672 p->p_vaddr = filehdr->p_vaddr;
5673 if (!m->p_paddr_valid)
5674 p->p_paddr = filehdr->p_paddr;
5675 }
5676 }
5677
5678 if (m->includes_phdrs)
5679 {
5680 if (!m->p_flags_valid)
5681 p->p_flags |= PF_R;
5682 p->p_filesz += actual * bed->s->sizeof_phdr;
5683 p->p_memsz += actual * bed->s->sizeof_phdr;
5684 if (!m->includes_filehdr)
5685 {
5686 if (p->p_type == PT_LOAD)
5687 {
5688 elf_elfheader (abfd)->e_phoff = p->p_offset;
5689 if (m->count > 0)
5690 {
5691 p->p_vaddr -= off - p->p_offset;
5692 if (!m->p_paddr_valid)
5693 p->p_paddr -= off - p->p_offset;
5694 }
5695 }
5696 else if (phdr_load_seg != NULL)
5697 {
5698 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5699 bfd_vma phdr_off = 0; /* Octets. */
5700 if (phdr_load_seg->includes_filehdr)
5701 phdr_off = bed->s->sizeof_ehdr;
5702 p->p_vaddr = phdr->p_vaddr + phdr_off;
5703 if (!m->p_paddr_valid)
5704 p->p_paddr = phdr->p_paddr + phdr_off;
5705 p->p_offset = phdr->p_offset + phdr_off;
5706 }
5707 else
5708 p->p_offset = bed->s->sizeof_ehdr;
5709 }
5710 }
5711
5712 if (p->p_type == PT_LOAD
5713 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5714 {
5715 if (!m->includes_filehdr && !m->includes_phdrs)
5716 {
5717 p->p_offset = off;
5718 if (no_contents)
5719 {
5720 /* Put meaningless p_offset for PT_LOAD segments
5721 without file contents somewhere within the first
5722 page, in an attempt to not point past EOF. */
5723 bfd_size_type align = maxpagesize;
5724 if (align < p->p_align)
5725 align = p->p_align;
5726 if (align < 1)
5727 align = 1;
5728 p->p_offset = off % align;
5729 }
5730 }
5731 else
5732 {
5733 file_ptr adjust; /* Octets. */
5734
5735 adjust = off - (p->p_offset + p->p_filesz);
5736 if (!no_contents)
5737 p->p_filesz += adjust;
5738 p->p_memsz += adjust;
5739 }
5740 }
5741
5742 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5743 maps. Set filepos for sections in PT_LOAD segments, and in
5744 core files, for sections in PT_NOTE segments.
5745 assign_file_positions_for_non_load_sections will set filepos
5746 for other sections and update p_filesz for other segments. */
5747 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5748 {
5749 asection *sec;
5750 bfd_size_type align;
5751 Elf_Internal_Shdr *this_hdr;
5752
5753 sec = *secpp;
5754 this_hdr = &elf_section_data (sec)->this_hdr;
5755 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5756
5757 if ((p->p_type == PT_LOAD
5758 || p->p_type == PT_TLS)
5759 && (this_hdr->sh_type != SHT_NOBITS
5760 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5761 && ((this_hdr->sh_flags & SHF_TLS) == 0
5762 || p->p_type == PT_TLS))))
5763 {
5764 bfd_vma p_start = p->p_paddr; /* Octets. */
5765 bfd_vma p_end = p_start + p->p_memsz; /* Octets. */
5766 bfd_vma s_start = sec->lma * opb; /* Octets. */
5767 bfd_vma adjust = s_start - p_end; /* Octets. */
5768
5769 if (adjust != 0
5770 && (s_start < p_end
5771 || p_end < p_start))
5772 {
5773 _bfd_error_handler
5774 /* xgettext:c-format */
5775 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5776 abfd, sec, (uint64_t) s_start / opb,
5777 (uint64_t) p_end / opb);
5778 adjust = 0;
5779 sec->lma = p_end / opb;
5780 }
5781 p->p_memsz += adjust;
5782
5783 if (p->p_type == PT_LOAD)
5784 {
5785 if (this_hdr->sh_type != SHT_NOBITS)
5786 {
5787 off_adjust = 0;
5788 if (p->p_filesz + adjust < p->p_memsz)
5789 {
5790 /* We have a PROGBITS section following NOBITS ones.
5791 Allocate file space for the NOBITS section(s) and
5792 zero it. */
5793 adjust = p->p_memsz - p->p_filesz;
5794 if (!write_zeros (abfd, off, adjust))
5795 return FALSE;
5796 }
5797 }
5798 /* We only adjust sh_offset in SHT_NOBITS sections
5799 as would seem proper for their address when the
5800 section is first in the segment. sh_offset
5801 doesn't really have any significance for
5802 SHT_NOBITS anyway, apart from a notional position
5803 relative to other sections. Historically we
5804 didn't bother with adjusting sh_offset and some
5805 programs depend on it not being adjusted. See
5806 pr12921 and pr25662. */
5807 if (this_hdr->sh_type != SHT_NOBITS || i == 0)
5808 {
5809 off += adjust;
5810 if (this_hdr->sh_type == SHT_NOBITS)
5811 off_adjust += adjust;
5812 }
5813 }
5814 if (this_hdr->sh_type != SHT_NOBITS)
5815 p->p_filesz += adjust;
5816 }
5817
5818 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5819 {
5820 /* The section at i == 0 is the one that actually contains
5821 everything. */
5822 if (i == 0)
5823 {
5824 this_hdr->sh_offset = sec->filepos = off;
5825 off += this_hdr->sh_size;
5826 p->p_filesz = this_hdr->sh_size;
5827 p->p_memsz = 0;
5828 p->p_align = 1;
5829 }
5830 else
5831 {
5832 /* The rest are fake sections that shouldn't be written. */
5833 sec->filepos = 0;
5834 sec->size = 0;
5835 sec->flags = 0;
5836 continue;
5837 }
5838 }
5839 else
5840 {
5841 if (p->p_type == PT_LOAD)
5842 {
5843 this_hdr->sh_offset = sec->filepos = off;
5844 if (this_hdr->sh_type != SHT_NOBITS)
5845 off += this_hdr->sh_size;
5846 }
5847 else if (this_hdr->sh_type == SHT_NOBITS
5848 && (this_hdr->sh_flags & SHF_TLS) != 0
5849 && this_hdr->sh_offset == 0)
5850 {
5851 /* This is a .tbss section that didn't get a PT_LOAD.
5852 (See _bfd_elf_map_sections_to_segments "Create a
5853 final PT_LOAD".) Set sh_offset to the value it
5854 would have if we had created a zero p_filesz and
5855 p_memsz PT_LOAD header for the section. This
5856 also makes the PT_TLS header have the same
5857 p_offset value. */
5858 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5859 off, align);
5860 this_hdr->sh_offset = sec->filepos = off + adjust;
5861 }
5862
5863 if (this_hdr->sh_type != SHT_NOBITS)
5864 {
5865 p->p_filesz += this_hdr->sh_size;
5866 /* A load section without SHF_ALLOC is something like
5867 a note section in a PT_NOTE segment. These take
5868 file space but are not loaded into memory. */
5869 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5870 p->p_memsz += this_hdr->sh_size;
5871 }
5872 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5873 {
5874 if (p->p_type == PT_TLS)
5875 p->p_memsz += this_hdr->sh_size;
5876
5877 /* .tbss is special. It doesn't contribute to p_memsz of
5878 normal segments. */
5879 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5880 p->p_memsz += this_hdr->sh_size;
5881 }
5882
5883 if (align > p->p_align
5884 && !m->p_align_valid
5885 && (p->p_type != PT_LOAD
5886 || (abfd->flags & D_PAGED) == 0))
5887 p->p_align = align;
5888 }
5889
5890 if (!m->p_flags_valid)
5891 {
5892 p->p_flags |= PF_R;
5893 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5894 p->p_flags |= PF_X;
5895 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5896 p->p_flags |= PF_W;
5897 }
5898 }
5899
5900 off -= off_adjust;
5901
5902 /* PR ld/20815 - Check that the program header segment, if
5903 present, will be loaded into memory. */
5904 if (p->p_type == PT_PHDR
5905 && phdr_load_seg == NULL
5906 && !(bed->elf_backend_allow_non_load_phdr != NULL
5907 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5908 {
5909 /* The fix for this error is usually to edit the linker script being
5910 used and set up the program headers manually. Either that or
5911 leave room for the headers at the start of the SECTIONS. */
5912 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5913 " by LOAD segment"),
5914 abfd);
5915 if (link_info == NULL)
5916 return FALSE;
5917 /* Arrange for the linker to exit with an error, deleting
5918 the output file unless --noinhibit-exec is given. */
5919 link_info->callbacks->info ("%X");
5920 }
5921
5922 /* Check that all sections are in a PT_LOAD segment.
5923 Don't check funky gdb generated core files. */
5924 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5925 {
5926 bfd_boolean check_vma = TRUE;
5927
5928 for (i = 1; i < m->count; i++)
5929 if (m->sections[i]->vma == m->sections[i - 1]->vma
5930 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5931 ->this_hdr), p) != 0
5932 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5933 ->this_hdr), p) != 0)
5934 {
5935 /* Looks like we have overlays packed into the segment. */
5936 check_vma = FALSE;
5937 break;
5938 }
5939
5940 for (i = 0; i < m->count; i++)
5941 {
5942 Elf_Internal_Shdr *this_hdr;
5943 asection *sec;
5944
5945 sec = m->sections[i];
5946 this_hdr = &(elf_section_data(sec)->this_hdr);
5947 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5948 && !ELF_TBSS_SPECIAL (this_hdr, p))
5949 {
5950 _bfd_error_handler
5951 /* xgettext:c-format */
5952 (_("%pB: section `%pA' can't be allocated in segment %d"),
5953 abfd, sec, j);
5954 print_segment_map (m);
5955 }
5956 }
5957 }
5958 }
5959
5960 elf_next_file_pos (abfd) = off;
5961
5962 if (link_info != NULL
5963 && phdr_load_seg != NULL
5964 && phdr_load_seg->includes_filehdr)
5965 {
5966 /* There is a segment that contains both the file headers and the
5967 program headers, so provide a symbol __ehdr_start pointing there.
5968 A program can use this to examine itself robustly. */
5969
5970 struct elf_link_hash_entry *hash
5971 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
5972 FALSE, FALSE, TRUE);
5973 /* If the symbol was referenced and not defined, define it. */
5974 if (hash != NULL
5975 && (hash->root.type == bfd_link_hash_new
5976 || hash->root.type == bfd_link_hash_undefined
5977 || hash->root.type == bfd_link_hash_undefweak
5978 || hash->root.type == bfd_link_hash_common))
5979 {
5980 asection *s = NULL;
5981 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr / opb;
5982
5983 if (phdr_load_seg->count != 0)
5984 /* The segment contains sections, so use the first one. */
5985 s = phdr_load_seg->sections[0];
5986 else
5987 /* Use the first (i.e. lowest-addressed) section in any segment. */
5988 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5989 if (m->p_type == PT_LOAD && m->count != 0)
5990 {
5991 s = m->sections[0];
5992 break;
5993 }
5994
5995 if (s != NULL)
5996 {
5997 hash->root.u.def.value = filehdr_vaddr - s->vma;
5998 hash->root.u.def.section = s;
5999 }
6000 else
6001 {
6002 hash->root.u.def.value = filehdr_vaddr;
6003 hash->root.u.def.section = bfd_abs_section_ptr;
6004 }
6005
6006 hash->root.type = bfd_link_hash_defined;
6007 hash->def_regular = 1;
6008 hash->non_elf = 0;
6009 }
6010 }
6011
6012 return TRUE;
6013 }
6014
6015 /* Determine if a bfd is a debuginfo file. Unfortunately there
6016 is no defined method for detecting such files, so we have to
6017 use heuristics instead. */
6018
6019 bfd_boolean
6020 is_debuginfo_file (bfd *abfd)
6021 {
6022 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6023 return FALSE;
6024
6025 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6026 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6027 Elf_Internal_Shdr **headerp;
6028
6029 for (headerp = start_headers; headerp < end_headers; headerp ++)
6030 {
6031 Elf_Internal_Shdr *header = * headerp;
6032
6033 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6034 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6035 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6036 && header->sh_type != SHT_NOBITS
6037 && header->sh_type != SHT_NOTE)
6038 return FALSE;
6039 }
6040
6041 return TRUE;
6042 }
6043
6044 /* Assign file positions for the other sections, except for compressed debugging
6045 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6046
6047 static bfd_boolean
6048 assign_file_positions_for_non_load_sections (bfd *abfd,
6049 struct bfd_link_info *link_info)
6050 {
6051 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6052 Elf_Internal_Shdr **i_shdrpp;
6053 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6054 Elf_Internal_Phdr *phdrs;
6055 Elf_Internal_Phdr *p;
6056 struct elf_segment_map *m;
6057 file_ptr off;
6058 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
6059
6060 i_shdrpp = elf_elfsections (abfd);
6061 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6062 off = elf_next_file_pos (abfd);
6063 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6064 {
6065 Elf_Internal_Shdr *hdr;
6066
6067 hdr = *hdrpp;
6068 if (hdr->bfd_section != NULL
6069 && (hdr->bfd_section->filepos != 0
6070 || (hdr->sh_type == SHT_NOBITS
6071 && hdr->contents == NULL)))
6072 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6073 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6074 {
6075 if (hdr->sh_size != 0
6076 /* PR 24717 - debuginfo files are known to be not strictly
6077 compliant with the ELF standard. In particular they often
6078 have .note.gnu.property sections that are outside of any
6079 loadable segment. This is not a problem for such files,
6080 so do not warn about them. */
6081 && ! is_debuginfo_file (abfd))
6082 _bfd_error_handler
6083 /* xgettext:c-format */
6084 (_("%pB: warning: allocated section `%s' not in segment"),
6085 abfd,
6086 (hdr->bfd_section == NULL
6087 ? "*unknown*"
6088 : hdr->bfd_section->name));
6089 /* We don't need to page align empty sections. */
6090 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6091 off += vma_page_aligned_bias (hdr->sh_addr, off,
6092 bed->maxpagesize);
6093 else
6094 off += vma_page_aligned_bias (hdr->sh_addr, off,
6095 hdr->sh_addralign);
6096 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6097 FALSE);
6098 }
6099 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6100 && hdr->bfd_section == NULL)
6101 /* We don't know the offset of these sections yet: their size has
6102 not been decided. */
6103 || (hdr->bfd_section != NULL
6104 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6105 || (bfd_section_is_ctf (hdr->bfd_section)
6106 && abfd->is_linker_output)))
6107 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6108 || (elf_symtab_shndx_list (abfd) != NULL
6109 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6110 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6111 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6112 hdr->sh_offset = -1;
6113 else
6114 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6115 }
6116 elf_next_file_pos (abfd) = off;
6117
6118 /* Now that we have set the section file positions, we can set up
6119 the file positions for the non PT_LOAD segments. */
6120 phdrs = elf_tdata (abfd)->phdr;
6121 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6122 {
6123 if (p->p_type == PT_GNU_RELRO)
6124 {
6125 bfd_vma start, end; /* Bytes. */
6126 bfd_boolean ok;
6127
6128 if (link_info != NULL)
6129 {
6130 /* During linking the range of the RELRO segment is passed
6131 in link_info. Note that there may be padding between
6132 relro_start and the first RELRO section. */
6133 start = link_info->relro_start;
6134 end = link_info->relro_end;
6135 }
6136 else if (m->count != 0)
6137 {
6138 if (!m->p_size_valid)
6139 abort ();
6140 start = m->sections[0]->vma;
6141 end = start + m->p_size / opb;
6142 }
6143 else
6144 {
6145 start = 0;
6146 end = 0;
6147 }
6148
6149 ok = FALSE;
6150 if (start < end)
6151 {
6152 struct elf_segment_map *lm;
6153 const Elf_Internal_Phdr *lp;
6154 unsigned int i;
6155
6156 /* Find a LOAD segment containing a section in the RELRO
6157 segment. */
6158 for (lm = elf_seg_map (abfd), lp = phdrs;
6159 lm != NULL;
6160 lm = lm->next, lp++)
6161 {
6162 if (lp->p_type == PT_LOAD
6163 && lm->count != 0
6164 && (lm->sections[lm->count - 1]->vma
6165 + (!IS_TBSS (lm->sections[lm->count - 1])
6166 ? lm->sections[lm->count - 1]->size / opb
6167 : 0)) > start
6168 && lm->sections[0]->vma < end)
6169 break;
6170 }
6171
6172 if (lm != NULL)
6173 {
6174 /* Find the section starting the RELRO segment. */
6175 for (i = 0; i < lm->count; i++)
6176 {
6177 asection *s = lm->sections[i];
6178 if (s->vma >= start
6179 && s->vma < end
6180 && s->size != 0)
6181 break;
6182 }
6183
6184 if (i < lm->count)
6185 {
6186 p->p_vaddr = lm->sections[i]->vma * opb;
6187 p->p_paddr = lm->sections[i]->lma * opb;
6188 p->p_offset = lm->sections[i]->filepos;
6189 p->p_memsz = end * opb - p->p_vaddr;
6190 p->p_filesz = p->p_memsz;
6191
6192 /* The RELRO segment typically ends a few bytes
6193 into .got.plt but other layouts are possible.
6194 In cases where the end does not match any
6195 loaded section (for instance is in file
6196 padding), trim p_filesz back to correspond to
6197 the end of loaded section contents. */
6198 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6199 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6200
6201 /* Preserve the alignment and flags if they are
6202 valid. The gold linker generates RW/4 for
6203 the PT_GNU_RELRO section. It is better for
6204 objcopy/strip to honor these attributes
6205 otherwise gdb will choke when using separate
6206 debug files. */
6207 if (!m->p_align_valid)
6208 p->p_align = 1;
6209 if (!m->p_flags_valid)
6210 p->p_flags = PF_R;
6211 ok = TRUE;
6212 }
6213 }
6214 }
6215 if (link_info != NULL)
6216 BFD_ASSERT (ok);
6217 if (!ok)
6218 memset (p, 0, sizeof *p);
6219 }
6220 else if (p->p_type == PT_GNU_STACK)
6221 {
6222 if (m->p_size_valid)
6223 p->p_memsz = m->p_size;
6224 }
6225 else if (m->count != 0)
6226 {
6227 unsigned int i;
6228
6229 if (p->p_type != PT_LOAD
6230 && (p->p_type != PT_NOTE
6231 || bfd_get_format (abfd) != bfd_core))
6232 {
6233 /* A user specified segment layout may include a PHDR
6234 segment that overlaps with a LOAD segment... */
6235 if (p->p_type == PT_PHDR)
6236 {
6237 m->count = 0;
6238 continue;
6239 }
6240
6241 if (m->includes_filehdr || m->includes_phdrs)
6242 {
6243 /* PR 17512: file: 2195325e. */
6244 _bfd_error_handler
6245 (_("%pB: error: non-load segment %d includes file header "
6246 "and/or program header"),
6247 abfd, (int) (p - phdrs));
6248 return FALSE;
6249 }
6250
6251 p->p_filesz = 0;
6252 p->p_offset = m->sections[0]->filepos;
6253 for (i = m->count; i-- != 0;)
6254 {
6255 asection *sect = m->sections[i];
6256 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6257 if (hdr->sh_type != SHT_NOBITS)
6258 {
6259 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6260 + hdr->sh_size);
6261 break;
6262 }
6263 }
6264 }
6265 }
6266 }
6267
6268 return TRUE;
6269 }
6270
6271 static elf_section_list *
6272 find_section_in_list (unsigned int i, elf_section_list * list)
6273 {
6274 for (;list != NULL; list = list->next)
6275 if (list->ndx == i)
6276 break;
6277 return list;
6278 }
6279
6280 /* Work out the file positions of all the sections. This is called by
6281 _bfd_elf_compute_section_file_positions. All the section sizes and
6282 VMAs must be known before this is called.
6283
6284 Reloc sections come in two flavours: Those processed specially as
6285 "side-channel" data attached to a section to which they apply, and those that
6286 bfd doesn't process as relocations. The latter sort are stored in a normal
6287 bfd section by bfd_section_from_shdr. We don't consider the former sort
6288 here, unless they form part of the loadable image. Reloc sections not
6289 assigned here (and compressed debugging sections and CTF sections which
6290 nothing else in the file can rely upon) will be handled later by
6291 assign_file_positions_for_relocs.
6292
6293 We also don't set the positions of the .symtab and .strtab here. */
6294
6295 static bfd_boolean
6296 assign_file_positions_except_relocs (bfd *abfd,
6297 struct bfd_link_info *link_info)
6298 {
6299 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6300 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6301 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6302 unsigned int alloc;
6303
6304 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6305 && bfd_get_format (abfd) != bfd_core)
6306 {
6307 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6308 unsigned int num_sec = elf_numsections (abfd);
6309 Elf_Internal_Shdr **hdrpp;
6310 unsigned int i;
6311 file_ptr off;
6312
6313 /* Start after the ELF header. */
6314 off = i_ehdrp->e_ehsize;
6315
6316 /* We are not creating an executable, which means that we are
6317 not creating a program header, and that the actual order of
6318 the sections in the file is unimportant. */
6319 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6320 {
6321 Elf_Internal_Shdr *hdr;
6322
6323 hdr = *hdrpp;
6324 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6325 && hdr->bfd_section == NULL)
6326 /* Do not assign offsets for these sections yet: we don't know
6327 their sizes. */
6328 || (hdr->bfd_section != NULL
6329 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6330 || (bfd_section_is_ctf (hdr->bfd_section)
6331 && abfd->is_linker_output)))
6332 || i == elf_onesymtab (abfd)
6333 || (elf_symtab_shndx_list (abfd) != NULL
6334 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6335 || i == elf_strtab_sec (abfd)
6336 || i == elf_shstrtab_sec (abfd))
6337 {
6338 hdr->sh_offset = -1;
6339 }
6340 else
6341 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6342 }
6343
6344 elf_next_file_pos (abfd) = off;
6345 elf_program_header_size (abfd) = 0;
6346 }
6347 else
6348 {
6349 /* Assign file positions for the loaded sections based on the
6350 assignment of sections to segments. */
6351 if (!assign_file_positions_for_load_sections (abfd, link_info))
6352 return FALSE;
6353
6354 /* And for non-load sections. */
6355 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6356 return FALSE;
6357 }
6358
6359 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6360 return FALSE;
6361
6362 /* Write out the program headers. */
6363 alloc = i_ehdrp->e_phnum;
6364 if (alloc != 0)
6365 {
6366 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6367 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6368 return FALSE;
6369 }
6370
6371 return TRUE;
6372 }
6373
6374 bfd_boolean
6375 _bfd_elf_init_file_header (bfd *abfd,
6376 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6377 {
6378 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6379 struct elf_strtab_hash *shstrtab;
6380 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6381
6382 i_ehdrp = elf_elfheader (abfd);
6383
6384 shstrtab = _bfd_elf_strtab_init ();
6385 if (shstrtab == NULL)
6386 return FALSE;
6387
6388 elf_shstrtab (abfd) = shstrtab;
6389
6390 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6391 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6392 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6393 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6394
6395 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6396 i_ehdrp->e_ident[EI_DATA] =
6397 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6398 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6399
6400 if ((abfd->flags & DYNAMIC) != 0)
6401 i_ehdrp->e_type = ET_DYN;
6402 else if ((abfd->flags & EXEC_P) != 0)
6403 i_ehdrp->e_type = ET_EXEC;
6404 else if (bfd_get_format (abfd) == bfd_core)
6405 i_ehdrp->e_type = ET_CORE;
6406 else
6407 i_ehdrp->e_type = ET_REL;
6408
6409 switch (bfd_get_arch (abfd))
6410 {
6411 case bfd_arch_unknown:
6412 i_ehdrp->e_machine = EM_NONE;
6413 break;
6414
6415 /* There used to be a long list of cases here, each one setting
6416 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6417 in the corresponding bfd definition. To avoid duplication,
6418 the switch was removed. Machines that need special handling
6419 can generally do it in elf_backend_final_write_processing(),
6420 unless they need the information earlier than the final write.
6421 Such need can generally be supplied by replacing the tests for
6422 e_machine with the conditions used to determine it. */
6423 default:
6424 i_ehdrp->e_machine = bed->elf_machine_code;
6425 }
6426
6427 i_ehdrp->e_version = bed->s->ev_current;
6428 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6429
6430 /* No program header, for now. */
6431 i_ehdrp->e_phoff = 0;
6432 i_ehdrp->e_phentsize = 0;
6433 i_ehdrp->e_phnum = 0;
6434
6435 /* Each bfd section is section header entry. */
6436 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6437 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6438
6439 elf_tdata (abfd)->symtab_hdr.sh_name =
6440 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6441 elf_tdata (abfd)->strtab_hdr.sh_name =
6442 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6443 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6444 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6445 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6446 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6447 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6448 return FALSE;
6449
6450 return TRUE;
6451 }
6452
6453 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6454
6455 FIXME: We used to have code here to sort the PT_LOAD segments into
6456 ascending order, as per the ELF spec. But this breaks some programs,
6457 including the Linux kernel. But really either the spec should be
6458 changed or the programs updated. */
6459
6460 bfd_boolean
6461 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6462 {
6463 if (link_info != NULL && bfd_link_pie (link_info))
6464 {
6465 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6466 unsigned int num_segments = i_ehdrp->e_phnum;
6467 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6468 Elf_Internal_Phdr *segment = tdata->phdr;
6469 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6470
6471 /* Find the lowest p_vaddr in PT_LOAD segments. */
6472 bfd_vma p_vaddr = (bfd_vma) -1;
6473 for (; segment < end_segment; segment++)
6474 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6475 p_vaddr = segment->p_vaddr;
6476
6477 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6478 segments is non-zero. */
6479 if (p_vaddr)
6480 i_ehdrp->e_type = ET_EXEC;
6481 }
6482 return TRUE;
6483 }
6484
6485 /* Assign file positions for all the reloc sections which are not part
6486 of the loadable file image, and the file position of section headers. */
6487
6488 static bfd_boolean
6489 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6490 {
6491 file_ptr off;
6492 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6493 Elf_Internal_Shdr *shdrp;
6494 Elf_Internal_Ehdr *i_ehdrp;
6495 const struct elf_backend_data *bed;
6496
6497 off = elf_next_file_pos (abfd);
6498
6499 shdrpp = elf_elfsections (abfd);
6500 end_shdrpp = shdrpp + elf_numsections (abfd);
6501 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6502 {
6503 shdrp = *shdrpp;
6504 if (shdrp->sh_offset == -1)
6505 {
6506 asection *sec = shdrp->bfd_section;
6507 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6508 || shdrp->sh_type == SHT_RELA);
6509 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6510 if (is_rel
6511 || is_ctf
6512 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6513 {
6514 if (!is_rel && !is_ctf)
6515 {
6516 const char *name = sec->name;
6517 struct bfd_elf_section_data *d;
6518
6519 /* Compress DWARF debug sections. */
6520 if (!bfd_compress_section (abfd, sec,
6521 shdrp->contents))
6522 return FALSE;
6523
6524 if (sec->compress_status == COMPRESS_SECTION_DONE
6525 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6526 {
6527 /* If section is compressed with zlib-gnu, convert
6528 section name from .debug_* to .zdebug_*. */
6529 char *new_name
6530 = convert_debug_to_zdebug (abfd, name);
6531 if (new_name == NULL)
6532 return FALSE;
6533 name = new_name;
6534 }
6535 /* Add section name to section name section. */
6536 if (shdrp->sh_name != (unsigned int) -1)
6537 abort ();
6538 shdrp->sh_name
6539 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6540 name, FALSE);
6541 d = elf_section_data (sec);
6542
6543 /* Add reloc section name to section name section. */
6544 if (d->rel.hdr
6545 && !_bfd_elf_set_reloc_sh_name (abfd,
6546 d->rel.hdr,
6547 name, FALSE))
6548 return FALSE;
6549 if (d->rela.hdr
6550 && !_bfd_elf_set_reloc_sh_name (abfd,
6551 d->rela.hdr,
6552 name, TRUE))
6553 return FALSE;
6554
6555 /* Update section size and contents. */
6556 shdrp->sh_size = sec->size;
6557 shdrp->contents = sec->contents;
6558 shdrp->bfd_section->contents = NULL;
6559 }
6560 else if (is_ctf)
6561 {
6562 /* Update section size and contents. */
6563 shdrp->sh_size = sec->size;
6564 shdrp->contents = sec->contents;
6565 }
6566
6567 off = _bfd_elf_assign_file_position_for_section (shdrp,
6568 off,
6569 TRUE);
6570 }
6571 }
6572 }
6573
6574 /* Place section name section after DWARF debug sections have been
6575 compressed. */
6576 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6577 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6578 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6579 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6580
6581 /* Place the section headers. */
6582 i_ehdrp = elf_elfheader (abfd);
6583 bed = get_elf_backend_data (abfd);
6584 off = align_file_position (off, 1 << bed->s->log_file_align);
6585 i_ehdrp->e_shoff = off;
6586 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6587 elf_next_file_pos (abfd) = off;
6588
6589 return TRUE;
6590 }
6591
6592 bfd_boolean
6593 _bfd_elf_write_object_contents (bfd *abfd)
6594 {
6595 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6596 Elf_Internal_Shdr **i_shdrp;
6597 bfd_boolean failed;
6598 unsigned int count, num_sec;
6599 struct elf_obj_tdata *t;
6600
6601 if (! abfd->output_has_begun
6602 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6603 return FALSE;
6604 /* Do not rewrite ELF data when the BFD has been opened for update.
6605 abfd->output_has_begun was set to TRUE on opening, so creation of new
6606 sections, and modification of existing section sizes was restricted.
6607 This means the ELF header, program headers and section headers can't have
6608 changed.
6609 If the contents of any sections has been modified, then those changes have
6610 already been written to the BFD. */
6611 else if (abfd->direction == both_direction)
6612 {
6613 BFD_ASSERT (abfd->output_has_begun);
6614 return TRUE;
6615 }
6616
6617 i_shdrp = elf_elfsections (abfd);
6618
6619 failed = FALSE;
6620 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6621 if (failed)
6622 return FALSE;
6623
6624 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6625 return FALSE;
6626
6627 /* After writing the headers, we need to write the sections too... */
6628 num_sec = elf_numsections (abfd);
6629 for (count = 1; count < num_sec; count++)
6630 {
6631 i_shdrp[count]->sh_name
6632 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6633 i_shdrp[count]->sh_name);
6634 if (bed->elf_backend_section_processing)
6635 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6636 return FALSE;
6637 if (i_shdrp[count]->contents)
6638 {
6639 bfd_size_type amt = i_shdrp[count]->sh_size;
6640
6641 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6642 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6643 return FALSE;
6644 }
6645 }
6646
6647 /* Write out the section header names. */
6648 t = elf_tdata (abfd);
6649 if (elf_shstrtab (abfd) != NULL
6650 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6651 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6652 return FALSE;
6653
6654 if (!(*bed->elf_backend_final_write_processing) (abfd))
6655 return FALSE;
6656
6657 if (!bed->s->write_shdrs_and_ehdr (abfd))
6658 return FALSE;
6659
6660 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6661 if (t->o->build_id.after_write_object_contents != NULL)
6662 return (*t->o->build_id.after_write_object_contents) (abfd);
6663
6664 return TRUE;
6665 }
6666
6667 bfd_boolean
6668 _bfd_elf_write_corefile_contents (bfd *abfd)
6669 {
6670 /* Hopefully this can be done just like an object file. */
6671 return _bfd_elf_write_object_contents (abfd);
6672 }
6673
6674 /* Given a section, search the header to find them. */
6675
6676 unsigned int
6677 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6678 {
6679 const struct elf_backend_data *bed;
6680 unsigned int sec_index;
6681
6682 if (elf_section_data (asect) != NULL
6683 && elf_section_data (asect)->this_idx != 0)
6684 return elf_section_data (asect)->this_idx;
6685
6686 if (bfd_is_abs_section (asect))
6687 sec_index = SHN_ABS;
6688 else if (bfd_is_com_section (asect))
6689 sec_index = SHN_COMMON;
6690 else if (bfd_is_und_section (asect))
6691 sec_index = SHN_UNDEF;
6692 else
6693 sec_index = SHN_BAD;
6694
6695 bed = get_elf_backend_data (abfd);
6696 if (bed->elf_backend_section_from_bfd_section)
6697 {
6698 int retval = sec_index;
6699
6700 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6701 return retval;
6702 }
6703
6704 if (sec_index == SHN_BAD)
6705 bfd_set_error (bfd_error_nonrepresentable_section);
6706
6707 return sec_index;
6708 }
6709
6710 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6711 on error. */
6712
6713 int
6714 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6715 {
6716 asymbol *asym_ptr = *asym_ptr_ptr;
6717 int idx;
6718 flagword flags = asym_ptr->flags;
6719
6720 /* When gas creates relocations against local labels, it creates its
6721 own symbol for the section, but does put the symbol into the
6722 symbol chain, so udata is 0. When the linker is generating
6723 relocatable output, this section symbol may be for one of the
6724 input sections rather than the output section. */
6725 if (asym_ptr->udata.i == 0
6726 && (flags & BSF_SECTION_SYM)
6727 && asym_ptr->section)
6728 {
6729 asection *sec;
6730 int indx;
6731
6732 sec = asym_ptr->section;
6733 if (sec->owner != abfd && sec->output_section != NULL)
6734 sec = sec->output_section;
6735 if (sec->owner == abfd
6736 && (indx = sec->index) < elf_num_section_syms (abfd)
6737 && elf_section_syms (abfd)[indx] != NULL)
6738 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6739 }
6740
6741 idx = asym_ptr->udata.i;
6742
6743 if (idx == 0)
6744 {
6745 /* This case can occur when using --strip-symbol on a symbol
6746 which is used in a relocation entry. */
6747 _bfd_error_handler
6748 /* xgettext:c-format */
6749 (_("%pB: symbol `%s' required but not present"),
6750 abfd, bfd_asymbol_name (asym_ptr));
6751 bfd_set_error (bfd_error_no_symbols);
6752 return -1;
6753 }
6754
6755 #if DEBUG & 4
6756 {
6757 fprintf (stderr,
6758 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6759 (long) asym_ptr, asym_ptr->name, idx, flags);
6760 fflush (stderr);
6761 }
6762 #endif
6763
6764 return idx;
6765 }
6766
6767 /* Rewrite program header information. */
6768
6769 static bfd_boolean
6770 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6771 {
6772 Elf_Internal_Ehdr *iehdr;
6773 struct elf_segment_map *map;
6774 struct elf_segment_map *map_first;
6775 struct elf_segment_map **pointer_to_map;
6776 Elf_Internal_Phdr *segment;
6777 asection *section;
6778 unsigned int i;
6779 unsigned int num_segments;
6780 bfd_boolean phdr_included = FALSE;
6781 bfd_boolean p_paddr_valid;
6782 bfd_vma maxpagesize;
6783 struct elf_segment_map *phdr_adjust_seg = NULL;
6784 unsigned int phdr_adjust_num = 0;
6785 const struct elf_backend_data *bed;
6786 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
6787
6788 bed = get_elf_backend_data (ibfd);
6789 iehdr = elf_elfheader (ibfd);
6790
6791 map_first = NULL;
6792 pointer_to_map = &map_first;
6793
6794 num_segments = elf_elfheader (ibfd)->e_phnum;
6795 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6796
6797 /* Returns the end address of the segment + 1. */
6798 #define SEGMENT_END(segment, start) \
6799 (start + (segment->p_memsz > segment->p_filesz \
6800 ? segment->p_memsz : segment->p_filesz))
6801
6802 #define SECTION_SIZE(section, segment) \
6803 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6804 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6805 ? section->size : 0)
6806
6807 /* Returns TRUE if the given section is contained within
6808 the given segment. VMA addresses are compared. */
6809 #define IS_CONTAINED_BY_VMA(section, segment, opb) \
6810 (section->vma * (opb) >= segment->p_vaddr \
6811 && (section->vma * (opb) + SECTION_SIZE (section, segment) \
6812 <= (SEGMENT_END (segment, segment->p_vaddr))))
6813
6814 /* Returns TRUE if the given section is contained within
6815 the given segment. LMA addresses are compared. */
6816 #define IS_CONTAINED_BY_LMA(section, segment, base, opb) \
6817 (section->lma * (opb) >= base \
6818 && (section->lma + SECTION_SIZE (section, segment) / (opb) >= section->lma) \
6819 && (section->lma * (opb) + SECTION_SIZE (section, segment) \
6820 <= SEGMENT_END (segment, base)))
6821
6822 /* Handle PT_NOTE segment. */
6823 #define IS_NOTE(p, s) \
6824 (p->p_type == PT_NOTE \
6825 && elf_section_type (s) == SHT_NOTE \
6826 && (bfd_vma) s->filepos >= p->p_offset \
6827 && ((bfd_vma) s->filepos + s->size \
6828 <= p->p_offset + p->p_filesz))
6829
6830 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6831 etc. */
6832 #define IS_COREFILE_NOTE(p, s) \
6833 (IS_NOTE (p, s) \
6834 && bfd_get_format (ibfd) == bfd_core \
6835 && s->vma == 0 \
6836 && s->lma == 0)
6837
6838 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6839 linker, which generates a PT_INTERP section with p_vaddr and
6840 p_memsz set to 0. */
6841 #define IS_SOLARIS_PT_INTERP(p, s) \
6842 (p->p_vaddr == 0 \
6843 && p->p_paddr == 0 \
6844 && p->p_memsz == 0 \
6845 && p->p_filesz > 0 \
6846 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6847 && s->size > 0 \
6848 && (bfd_vma) s->filepos >= p->p_offset \
6849 && ((bfd_vma) s->filepos + s->size \
6850 <= p->p_offset + p->p_filesz))
6851
6852 /* Decide if the given section should be included in the given segment.
6853 A section will be included if:
6854 1. It is within the address space of the segment -- we use the LMA
6855 if that is set for the segment and the VMA otherwise,
6856 2. It is an allocated section or a NOTE section in a PT_NOTE
6857 segment.
6858 3. There is an output section associated with it,
6859 4. The section has not already been allocated to a previous segment.
6860 5. PT_GNU_STACK segments do not include any sections.
6861 6. PT_TLS segment includes only SHF_TLS sections.
6862 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6863 8. PT_DYNAMIC should not contain empty sections at the beginning
6864 (with the possible exception of .dynamic). */
6865 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6866 ((((segment->p_paddr \
6867 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr, opb) \
6868 : IS_CONTAINED_BY_VMA (section, segment, opb)) \
6869 && (section->flags & SEC_ALLOC) != 0) \
6870 || IS_NOTE (segment, section)) \
6871 && segment->p_type != PT_GNU_STACK \
6872 && (segment->p_type != PT_TLS \
6873 || (section->flags & SEC_THREAD_LOCAL)) \
6874 && (segment->p_type == PT_LOAD \
6875 || segment->p_type == PT_TLS \
6876 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6877 && (segment->p_type != PT_DYNAMIC \
6878 || SECTION_SIZE (section, segment) > 0 \
6879 || (segment->p_paddr \
6880 ? segment->p_paddr != section->lma * (opb) \
6881 : segment->p_vaddr != section->vma * (opb)) \
6882 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6883 && (segment->p_type != PT_LOAD || !section->segment_mark))
6884
6885 /* If the output section of a section in the input segment is NULL,
6886 it is removed from the corresponding output segment. */
6887 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
6888 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
6889 && section->output_section != NULL)
6890
6891 /* Returns TRUE iff seg1 starts after the end of seg2. */
6892 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6893 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6894
6895 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6896 their VMA address ranges and their LMA address ranges overlap.
6897 It is possible to have overlapping VMA ranges without overlapping LMA
6898 ranges. RedBoot images for example can have both .data and .bss mapped
6899 to the same VMA range, but with the .data section mapped to a different
6900 LMA. */
6901 #define SEGMENT_OVERLAPS(seg1, seg2) \
6902 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6903 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6904 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6905 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6906
6907 /* Initialise the segment mark field. */
6908 for (section = ibfd->sections; section != NULL; section = section->next)
6909 section->segment_mark = FALSE;
6910
6911 /* The Solaris linker creates program headers in which all the
6912 p_paddr fields are zero. When we try to objcopy or strip such a
6913 file, we get confused. Check for this case, and if we find it
6914 don't set the p_paddr_valid fields. */
6915 p_paddr_valid = FALSE;
6916 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6917 i < num_segments;
6918 i++, segment++)
6919 if (segment->p_paddr != 0)
6920 {
6921 p_paddr_valid = TRUE;
6922 break;
6923 }
6924
6925 /* Scan through the segments specified in the program header
6926 of the input BFD. For this first scan we look for overlaps
6927 in the loadable segments. These can be created by weird
6928 parameters to objcopy. Also, fix some solaris weirdness. */
6929 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6930 i < num_segments;
6931 i++, segment++)
6932 {
6933 unsigned int j;
6934 Elf_Internal_Phdr *segment2;
6935
6936 if (segment->p_type == PT_INTERP)
6937 for (section = ibfd->sections; section; section = section->next)
6938 if (IS_SOLARIS_PT_INTERP (segment, section))
6939 {
6940 /* Mininal change so that the normal section to segment
6941 assignment code will work. */
6942 segment->p_vaddr = section->vma * opb;
6943 break;
6944 }
6945
6946 if (segment->p_type != PT_LOAD)
6947 {
6948 /* Remove PT_GNU_RELRO segment. */
6949 if (segment->p_type == PT_GNU_RELRO)
6950 segment->p_type = PT_NULL;
6951 continue;
6952 }
6953
6954 /* Determine if this segment overlaps any previous segments. */
6955 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
6956 {
6957 bfd_signed_vma extra_length;
6958
6959 if (segment2->p_type != PT_LOAD
6960 || !SEGMENT_OVERLAPS (segment, segment2))
6961 continue;
6962
6963 /* Merge the two segments together. */
6964 if (segment2->p_vaddr < segment->p_vaddr)
6965 {
6966 /* Extend SEGMENT2 to include SEGMENT and then delete
6967 SEGMENT. */
6968 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
6969 - SEGMENT_END (segment2, segment2->p_vaddr));
6970
6971 if (extra_length > 0)
6972 {
6973 segment2->p_memsz += extra_length;
6974 segment2->p_filesz += extra_length;
6975 }
6976
6977 segment->p_type = PT_NULL;
6978
6979 /* Since we have deleted P we must restart the outer loop. */
6980 i = 0;
6981 segment = elf_tdata (ibfd)->phdr;
6982 break;
6983 }
6984 else
6985 {
6986 /* Extend SEGMENT to include SEGMENT2 and then delete
6987 SEGMENT2. */
6988 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
6989 - SEGMENT_END (segment, segment->p_vaddr));
6990
6991 if (extra_length > 0)
6992 {
6993 segment->p_memsz += extra_length;
6994 segment->p_filesz += extra_length;
6995 }
6996
6997 segment2->p_type = PT_NULL;
6998 }
6999 }
7000 }
7001
7002 /* The second scan attempts to assign sections to segments. */
7003 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7004 i < num_segments;
7005 i++, segment++)
7006 {
7007 unsigned int section_count;
7008 asection **sections;
7009 asection *output_section;
7010 unsigned int isec;
7011 asection *matching_lma;
7012 asection *suggested_lma;
7013 unsigned int j;
7014 size_t amt;
7015 asection *first_section;
7016
7017 if (segment->p_type == PT_NULL)
7018 continue;
7019
7020 first_section = NULL;
7021 /* Compute how many sections might be placed into this segment. */
7022 for (section = ibfd->sections, section_count = 0;
7023 section != NULL;
7024 section = section->next)
7025 {
7026 /* Find the first section in the input segment, which may be
7027 removed from the corresponding output segment. */
7028 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb))
7029 {
7030 if (first_section == NULL)
7031 first_section = section;
7032 if (section->output_section != NULL)
7033 ++section_count;
7034 }
7035 }
7036
7037 /* Allocate a segment map big enough to contain
7038 all of the sections we have selected. */
7039 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7040 amt += section_count * sizeof (asection *);
7041 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7042 if (map == NULL)
7043 return FALSE;
7044
7045 /* Initialise the fields of the segment map. Default to
7046 using the physical address of the segment in the input BFD. */
7047 map->next = NULL;
7048 map->p_type = segment->p_type;
7049 map->p_flags = segment->p_flags;
7050 map->p_flags_valid = 1;
7051
7052 /* If the first section in the input segment is removed, there is
7053 no need to preserve segment physical address in the corresponding
7054 output segment. */
7055 if (!first_section || first_section->output_section != NULL)
7056 {
7057 map->p_paddr = segment->p_paddr;
7058 map->p_paddr_valid = p_paddr_valid;
7059 }
7060
7061 /* Determine if this segment contains the ELF file header
7062 and if it contains the program headers themselves. */
7063 map->includes_filehdr = (segment->p_offset == 0
7064 && segment->p_filesz >= iehdr->e_ehsize);
7065 map->includes_phdrs = 0;
7066
7067 if (!phdr_included || segment->p_type != PT_LOAD)
7068 {
7069 map->includes_phdrs =
7070 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7071 && (segment->p_offset + segment->p_filesz
7072 >= ((bfd_vma) iehdr->e_phoff
7073 + iehdr->e_phnum * iehdr->e_phentsize)));
7074
7075 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7076 phdr_included = TRUE;
7077 }
7078
7079 if (section_count == 0)
7080 {
7081 /* Special segments, such as the PT_PHDR segment, may contain
7082 no sections, but ordinary, loadable segments should contain
7083 something. They are allowed by the ELF spec however, so only
7084 a warning is produced.
7085 There is however the valid use case of embedded systems which
7086 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7087 flash memory with zeros. No warning is shown for that case. */
7088 if (segment->p_type == PT_LOAD
7089 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7090 /* xgettext:c-format */
7091 _bfd_error_handler
7092 (_("%pB: warning: empty loadable segment detected"
7093 " at vaddr=%#" PRIx64 ", is this intentional?"),
7094 ibfd, (uint64_t) segment->p_vaddr);
7095
7096 map->p_vaddr_offset = segment->p_vaddr / opb;
7097 map->count = 0;
7098 *pointer_to_map = map;
7099 pointer_to_map = &map->next;
7100
7101 continue;
7102 }
7103
7104 /* Now scan the sections in the input BFD again and attempt
7105 to add their corresponding output sections to the segment map.
7106 The problem here is how to handle an output section which has
7107 been moved (ie had its LMA changed). There are four possibilities:
7108
7109 1. None of the sections have been moved.
7110 In this case we can continue to use the segment LMA from the
7111 input BFD.
7112
7113 2. All of the sections have been moved by the same amount.
7114 In this case we can change the segment's LMA to match the LMA
7115 of the first section.
7116
7117 3. Some of the sections have been moved, others have not.
7118 In this case those sections which have not been moved can be
7119 placed in the current segment which will have to have its size,
7120 and possibly its LMA changed, and a new segment or segments will
7121 have to be created to contain the other sections.
7122
7123 4. The sections have been moved, but not by the same amount.
7124 In this case we can change the segment's LMA to match the LMA
7125 of the first section and we will have to create a new segment
7126 or segments to contain the other sections.
7127
7128 In order to save time, we allocate an array to hold the section
7129 pointers that we are interested in. As these sections get assigned
7130 to a segment, they are removed from this array. */
7131
7132 amt = section_count * sizeof (asection *);
7133 sections = (asection **) bfd_malloc (amt);
7134 if (sections == NULL)
7135 return FALSE;
7136
7137 /* Step One: Scan for segment vs section LMA conflicts.
7138 Also add the sections to the section array allocated above.
7139 Also add the sections to the current segment. In the common
7140 case, where the sections have not been moved, this means that
7141 we have completely filled the segment, and there is nothing
7142 more to do. */
7143 isec = 0;
7144 matching_lma = NULL;
7145 suggested_lma = NULL;
7146
7147 for (section = first_section, j = 0;
7148 section != NULL;
7149 section = section->next)
7150 {
7151 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed, opb))
7152 {
7153 output_section = section->output_section;
7154
7155 sections[j++] = section;
7156
7157 /* The Solaris native linker always sets p_paddr to 0.
7158 We try to catch that case here, and set it to the
7159 correct value. Note - some backends require that
7160 p_paddr be left as zero. */
7161 if (!p_paddr_valid
7162 && segment->p_vaddr != 0
7163 && !bed->want_p_paddr_set_to_zero
7164 && isec == 0
7165 && output_section->lma != 0
7166 && (align_power (segment->p_vaddr
7167 + (map->includes_filehdr
7168 ? iehdr->e_ehsize : 0)
7169 + (map->includes_phdrs
7170 ? iehdr->e_phnum * iehdr->e_phentsize
7171 : 0),
7172 output_section->alignment_power * opb)
7173 == (output_section->vma * opb)))
7174 map->p_paddr = segment->p_vaddr;
7175
7176 /* Match up the physical address of the segment with the
7177 LMA address of the output section. */
7178 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7179 opb)
7180 || IS_COREFILE_NOTE (segment, section)
7181 || (bed->want_p_paddr_set_to_zero
7182 && IS_CONTAINED_BY_VMA (output_section, segment, opb)))
7183 {
7184 if (matching_lma == NULL
7185 || output_section->lma < matching_lma->lma)
7186 matching_lma = output_section;
7187
7188 /* We assume that if the section fits within the segment
7189 then it does not overlap any other section within that
7190 segment. */
7191 map->sections[isec++] = output_section;
7192 }
7193 else if (suggested_lma == NULL)
7194 suggested_lma = output_section;
7195
7196 if (j == section_count)
7197 break;
7198 }
7199 }
7200
7201 BFD_ASSERT (j == section_count);
7202
7203 /* Step Two: Adjust the physical address of the current segment,
7204 if necessary. */
7205 if (isec == section_count)
7206 {
7207 /* All of the sections fitted within the segment as currently
7208 specified. This is the default case. Add the segment to
7209 the list of built segments and carry on to process the next
7210 program header in the input BFD. */
7211 map->count = section_count;
7212 *pointer_to_map = map;
7213 pointer_to_map = &map->next;
7214
7215 if (p_paddr_valid
7216 && !bed->want_p_paddr_set_to_zero)
7217 {
7218 bfd_vma hdr_size = 0;
7219 if (map->includes_filehdr)
7220 hdr_size = iehdr->e_ehsize;
7221 if (map->includes_phdrs)
7222 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7223
7224 /* Account for padding before the first section in the
7225 segment. */
7226 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7227 - matching_lma->lma);
7228 }
7229
7230 free (sections);
7231 continue;
7232 }
7233 else
7234 {
7235 /* Change the current segment's physical address to match
7236 the LMA of the first section that fitted, or if no
7237 section fitted, the first section. */
7238 if (matching_lma == NULL)
7239 matching_lma = suggested_lma;
7240
7241 map->p_paddr = matching_lma->lma * opb;
7242
7243 /* Offset the segment physical address from the lma
7244 to allow for space taken up by elf headers. */
7245 if (map->includes_phdrs)
7246 {
7247 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7248
7249 /* iehdr->e_phnum is just an estimate of the number
7250 of program headers that we will need. Make a note
7251 here of the number we used and the segment we chose
7252 to hold these headers, so that we can adjust the
7253 offset when we know the correct value. */
7254 phdr_adjust_num = iehdr->e_phnum;
7255 phdr_adjust_seg = map;
7256 }
7257
7258 if (map->includes_filehdr)
7259 {
7260 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7261 map->p_paddr -= iehdr->e_ehsize;
7262 /* We've subtracted off the size of headers from the
7263 first section lma, but there may have been some
7264 alignment padding before that section too. Try to
7265 account for that by adjusting the segment lma down to
7266 the same alignment. */
7267 if (segment->p_align != 0 && segment->p_align < align)
7268 align = segment->p_align;
7269 map->p_paddr &= -(align * opb);
7270 }
7271 }
7272
7273 /* Step Three: Loop over the sections again, this time assigning
7274 those that fit to the current segment and removing them from the
7275 sections array; but making sure not to leave large gaps. Once all
7276 possible sections have been assigned to the current segment it is
7277 added to the list of built segments and if sections still remain
7278 to be assigned, a new segment is constructed before repeating
7279 the loop. */
7280 isec = 0;
7281 do
7282 {
7283 map->count = 0;
7284 suggested_lma = NULL;
7285
7286 /* Fill the current segment with sections that fit. */
7287 for (j = 0; j < section_count; j++)
7288 {
7289 section = sections[j];
7290
7291 if (section == NULL)
7292 continue;
7293
7294 output_section = section->output_section;
7295
7296 BFD_ASSERT (output_section != NULL);
7297
7298 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7299 opb)
7300 || IS_COREFILE_NOTE (segment, section))
7301 {
7302 if (map->count == 0)
7303 {
7304 /* If the first section in a segment does not start at
7305 the beginning of the segment, then something is
7306 wrong. */
7307 if (align_power (map->p_paddr
7308 + (map->includes_filehdr
7309 ? iehdr->e_ehsize : 0)
7310 + (map->includes_phdrs
7311 ? iehdr->e_phnum * iehdr->e_phentsize
7312 : 0),
7313 output_section->alignment_power * opb)
7314 != output_section->lma * opb)
7315 goto sorry;
7316 }
7317 else
7318 {
7319 asection *prev_sec;
7320
7321 prev_sec = map->sections[map->count - 1];
7322
7323 /* If the gap between the end of the previous section
7324 and the start of this section is more than
7325 maxpagesize then we need to start a new segment. */
7326 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7327 maxpagesize)
7328 < BFD_ALIGN (output_section->lma, maxpagesize))
7329 || (prev_sec->lma + prev_sec->size
7330 > output_section->lma))
7331 {
7332 if (suggested_lma == NULL)
7333 suggested_lma = output_section;
7334
7335 continue;
7336 }
7337 }
7338
7339 map->sections[map->count++] = output_section;
7340 ++isec;
7341 sections[j] = NULL;
7342 if (segment->p_type == PT_LOAD)
7343 section->segment_mark = TRUE;
7344 }
7345 else if (suggested_lma == NULL)
7346 suggested_lma = output_section;
7347 }
7348
7349 /* PR 23932. A corrupt input file may contain sections that cannot
7350 be assigned to any segment - because for example they have a
7351 negative size - or segments that do not contain any sections.
7352 But there are also valid reasons why a segment can be empty.
7353 So allow a count of zero. */
7354
7355 /* Add the current segment to the list of built segments. */
7356 *pointer_to_map = map;
7357 pointer_to_map = &map->next;
7358
7359 if (isec < section_count)
7360 {
7361 /* We still have not allocated all of the sections to
7362 segments. Create a new segment here, initialise it
7363 and carry on looping. */
7364 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7365 amt += section_count * sizeof (asection *);
7366 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7367 if (map == NULL)
7368 {
7369 free (sections);
7370 return FALSE;
7371 }
7372
7373 /* Initialise the fields of the segment map. Set the physical
7374 physical address to the LMA of the first section that has
7375 not yet been assigned. */
7376 map->next = NULL;
7377 map->p_type = segment->p_type;
7378 map->p_flags = segment->p_flags;
7379 map->p_flags_valid = 1;
7380 map->p_paddr = suggested_lma->lma * opb;
7381 map->p_paddr_valid = p_paddr_valid;
7382 map->includes_filehdr = 0;
7383 map->includes_phdrs = 0;
7384 }
7385
7386 continue;
7387 sorry:
7388 bfd_set_error (bfd_error_sorry);
7389 free (sections);
7390 return FALSE;
7391 }
7392 while (isec < section_count);
7393
7394 free (sections);
7395 }
7396
7397 elf_seg_map (obfd) = map_first;
7398
7399 /* If we had to estimate the number of program headers that were
7400 going to be needed, then check our estimate now and adjust
7401 the offset if necessary. */
7402 if (phdr_adjust_seg != NULL)
7403 {
7404 unsigned int count;
7405
7406 for (count = 0, map = map_first; map != NULL; map = map->next)
7407 count++;
7408
7409 if (count > phdr_adjust_num)
7410 phdr_adjust_seg->p_paddr
7411 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7412
7413 for (map = map_first; map != NULL; map = map->next)
7414 if (map->p_type == PT_PHDR)
7415 {
7416 bfd_vma adjust
7417 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7418 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7419 break;
7420 }
7421 }
7422
7423 #undef SEGMENT_END
7424 #undef SECTION_SIZE
7425 #undef IS_CONTAINED_BY_VMA
7426 #undef IS_CONTAINED_BY_LMA
7427 #undef IS_NOTE
7428 #undef IS_COREFILE_NOTE
7429 #undef IS_SOLARIS_PT_INTERP
7430 #undef IS_SECTION_IN_INPUT_SEGMENT
7431 #undef INCLUDE_SECTION_IN_SEGMENT
7432 #undef SEGMENT_AFTER_SEGMENT
7433 #undef SEGMENT_OVERLAPS
7434 return TRUE;
7435 }
7436
7437 /* Copy ELF program header information. */
7438
7439 static bfd_boolean
7440 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7441 {
7442 Elf_Internal_Ehdr *iehdr;
7443 struct elf_segment_map *map;
7444 struct elf_segment_map *map_first;
7445 struct elf_segment_map **pointer_to_map;
7446 Elf_Internal_Phdr *segment;
7447 unsigned int i;
7448 unsigned int num_segments;
7449 bfd_boolean phdr_included = FALSE;
7450 bfd_boolean p_paddr_valid;
7451 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
7452
7453 iehdr = elf_elfheader (ibfd);
7454
7455 map_first = NULL;
7456 pointer_to_map = &map_first;
7457
7458 /* If all the segment p_paddr fields are zero, don't set
7459 map->p_paddr_valid. */
7460 p_paddr_valid = FALSE;
7461 num_segments = elf_elfheader (ibfd)->e_phnum;
7462 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7463 i < num_segments;
7464 i++, segment++)
7465 if (segment->p_paddr != 0)
7466 {
7467 p_paddr_valid = TRUE;
7468 break;
7469 }
7470
7471 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7472 i < num_segments;
7473 i++, segment++)
7474 {
7475 asection *section;
7476 unsigned int section_count;
7477 size_t amt;
7478 Elf_Internal_Shdr *this_hdr;
7479 asection *first_section = NULL;
7480 asection *lowest_section;
7481
7482 /* Compute how many sections are in this segment. */
7483 for (section = ibfd->sections, section_count = 0;
7484 section != NULL;
7485 section = section->next)
7486 {
7487 this_hdr = &(elf_section_data(section)->this_hdr);
7488 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7489 {
7490 if (first_section == NULL)
7491 first_section = section;
7492 section_count++;
7493 }
7494 }
7495
7496 /* Allocate a segment map big enough to contain
7497 all of the sections we have selected. */
7498 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7499 amt += section_count * sizeof (asection *);
7500 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7501 if (map == NULL)
7502 return FALSE;
7503
7504 /* Initialize the fields of the output segment map with the
7505 input segment. */
7506 map->next = NULL;
7507 map->p_type = segment->p_type;
7508 map->p_flags = segment->p_flags;
7509 map->p_flags_valid = 1;
7510 map->p_paddr = segment->p_paddr;
7511 map->p_paddr_valid = p_paddr_valid;
7512 map->p_align = segment->p_align;
7513 map->p_align_valid = 1;
7514 map->p_vaddr_offset = 0;
7515
7516 if (map->p_type == PT_GNU_RELRO
7517 || map->p_type == PT_GNU_STACK)
7518 {
7519 /* The PT_GNU_RELRO segment may contain the first a few
7520 bytes in the .got.plt section even if the whole .got.plt
7521 section isn't in the PT_GNU_RELRO segment. We won't
7522 change the size of the PT_GNU_RELRO segment.
7523 Similarly, PT_GNU_STACK size is significant on uclinux
7524 systems. */
7525 map->p_size = segment->p_memsz;
7526 map->p_size_valid = 1;
7527 }
7528
7529 /* Determine if this segment contains the ELF file header
7530 and if it contains the program headers themselves. */
7531 map->includes_filehdr = (segment->p_offset == 0
7532 && segment->p_filesz >= iehdr->e_ehsize);
7533
7534 map->includes_phdrs = 0;
7535 if (! phdr_included || segment->p_type != PT_LOAD)
7536 {
7537 map->includes_phdrs =
7538 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7539 && (segment->p_offset + segment->p_filesz
7540 >= ((bfd_vma) iehdr->e_phoff
7541 + iehdr->e_phnum * iehdr->e_phentsize)));
7542
7543 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7544 phdr_included = TRUE;
7545 }
7546
7547 lowest_section = NULL;
7548 if (section_count != 0)
7549 {
7550 unsigned int isec = 0;
7551
7552 for (section = first_section;
7553 section != NULL;
7554 section = section->next)
7555 {
7556 this_hdr = &(elf_section_data(section)->this_hdr);
7557 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7558 {
7559 map->sections[isec++] = section->output_section;
7560 if ((section->flags & SEC_ALLOC) != 0)
7561 {
7562 bfd_vma seg_off;
7563
7564 if (lowest_section == NULL
7565 || section->lma < lowest_section->lma)
7566 lowest_section = section;
7567
7568 /* Section lmas are set up from PT_LOAD header
7569 p_paddr in _bfd_elf_make_section_from_shdr.
7570 If this header has a p_paddr that disagrees
7571 with the section lma, flag the p_paddr as
7572 invalid. */
7573 if ((section->flags & SEC_LOAD) != 0)
7574 seg_off = this_hdr->sh_offset - segment->p_offset;
7575 else
7576 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7577 if (section->lma * opb - segment->p_paddr != seg_off)
7578 map->p_paddr_valid = FALSE;
7579 }
7580 if (isec == section_count)
7581 break;
7582 }
7583 }
7584 }
7585
7586 if (section_count == 0)
7587 map->p_vaddr_offset = segment->p_vaddr / opb;
7588 else if (map->p_paddr_valid)
7589 {
7590 /* Account for padding before the first section in the segment. */
7591 bfd_vma hdr_size = 0;
7592 if (map->includes_filehdr)
7593 hdr_size = iehdr->e_ehsize;
7594 if (map->includes_phdrs)
7595 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7596
7597 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7598 - (lowest_section ? lowest_section->lma : 0));
7599 }
7600
7601 map->count = section_count;
7602 *pointer_to_map = map;
7603 pointer_to_map = &map->next;
7604 }
7605
7606 elf_seg_map (obfd) = map_first;
7607 return TRUE;
7608 }
7609
7610 /* Copy private BFD data. This copies or rewrites ELF program header
7611 information. */
7612
7613 static bfd_boolean
7614 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7615 {
7616 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7617 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7618 return TRUE;
7619
7620 if (elf_tdata (ibfd)->phdr == NULL)
7621 return TRUE;
7622
7623 if (ibfd->xvec == obfd->xvec)
7624 {
7625 /* Check to see if any sections in the input BFD
7626 covered by ELF program header have changed. */
7627 Elf_Internal_Phdr *segment;
7628 asection *section, *osec;
7629 unsigned int i, num_segments;
7630 Elf_Internal_Shdr *this_hdr;
7631 const struct elf_backend_data *bed;
7632
7633 bed = get_elf_backend_data (ibfd);
7634
7635 /* Regenerate the segment map if p_paddr is set to 0. */
7636 if (bed->want_p_paddr_set_to_zero)
7637 goto rewrite;
7638
7639 /* Initialize the segment mark field. */
7640 for (section = obfd->sections; section != NULL;
7641 section = section->next)
7642 section->segment_mark = FALSE;
7643
7644 num_segments = elf_elfheader (ibfd)->e_phnum;
7645 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7646 i < num_segments;
7647 i++, segment++)
7648 {
7649 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7650 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7651 which severly confuses things, so always regenerate the segment
7652 map in this case. */
7653 if (segment->p_paddr == 0
7654 && segment->p_memsz == 0
7655 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7656 goto rewrite;
7657
7658 for (section = ibfd->sections;
7659 section != NULL; section = section->next)
7660 {
7661 /* We mark the output section so that we know it comes
7662 from the input BFD. */
7663 osec = section->output_section;
7664 if (osec)
7665 osec->segment_mark = TRUE;
7666
7667 /* Check if this section is covered by the segment. */
7668 this_hdr = &(elf_section_data(section)->this_hdr);
7669 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7670 {
7671 /* FIXME: Check if its output section is changed or
7672 removed. What else do we need to check? */
7673 if (osec == NULL
7674 || section->flags != osec->flags
7675 || section->lma != osec->lma
7676 || section->vma != osec->vma
7677 || section->size != osec->size
7678 || section->rawsize != osec->rawsize
7679 || section->alignment_power != osec->alignment_power)
7680 goto rewrite;
7681 }
7682 }
7683 }
7684
7685 /* Check to see if any output section do not come from the
7686 input BFD. */
7687 for (section = obfd->sections; section != NULL;
7688 section = section->next)
7689 {
7690 if (!section->segment_mark)
7691 goto rewrite;
7692 else
7693 section->segment_mark = FALSE;
7694 }
7695
7696 return copy_elf_program_header (ibfd, obfd);
7697 }
7698
7699 rewrite:
7700 if (ibfd->xvec == obfd->xvec)
7701 {
7702 /* When rewriting program header, set the output maxpagesize to
7703 the maximum alignment of input PT_LOAD segments. */
7704 Elf_Internal_Phdr *segment;
7705 unsigned int i;
7706 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7707 bfd_vma maxpagesize = 0;
7708
7709 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7710 i < num_segments;
7711 i++, segment++)
7712 if (segment->p_type == PT_LOAD
7713 && maxpagesize < segment->p_align)
7714 {
7715 /* PR 17512: file: f17299af. */
7716 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7717 /* xgettext:c-format */
7718 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7719 PRIx64 " is too large"),
7720 ibfd, (uint64_t) segment->p_align);
7721 else
7722 maxpagesize = segment->p_align;
7723 }
7724
7725 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7726 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7727 }
7728
7729 return rewrite_elf_program_header (ibfd, obfd);
7730 }
7731
7732 /* Initialize private output section information from input section. */
7733
7734 bfd_boolean
7735 _bfd_elf_init_private_section_data (bfd *ibfd,
7736 asection *isec,
7737 bfd *obfd,
7738 asection *osec,
7739 struct bfd_link_info *link_info)
7740
7741 {
7742 Elf_Internal_Shdr *ihdr, *ohdr;
7743 bfd_boolean final_link = (link_info != NULL
7744 && !bfd_link_relocatable (link_info));
7745
7746 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7747 || obfd->xvec->flavour != bfd_target_elf_flavour)
7748 return TRUE;
7749
7750 BFD_ASSERT (elf_section_data (osec) != NULL);
7751
7752 /* If this is a known ABI section, ELF section type and flags may
7753 have been set up when OSEC was created. For normal sections we
7754 allow the user to override the type and flags other than
7755 SHF_MASKOS and SHF_MASKPROC. */
7756 if (elf_section_type (osec) == SHT_PROGBITS
7757 || elf_section_type (osec) == SHT_NOTE
7758 || elf_section_type (osec) == SHT_NOBITS)
7759 elf_section_type (osec) = SHT_NULL;
7760 /* For objcopy and relocatable link, copy the ELF section type from
7761 the input file if the BFD section flags are the same. (If they
7762 are different the user may be doing something like
7763 "objcopy --set-section-flags .text=alloc,data".) For a final
7764 link allow some flags that the linker clears to differ. */
7765 if (elf_section_type (osec) == SHT_NULL
7766 && (osec->flags == isec->flags
7767 || (final_link
7768 && ((osec->flags ^ isec->flags)
7769 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7770 elf_section_type (osec) = elf_section_type (isec);
7771
7772 /* FIXME: Is this correct for all OS/PROC specific flags? */
7773 elf_section_flags (osec) = (elf_section_flags (isec)
7774 & (SHF_MASKOS | SHF_MASKPROC));
7775
7776 /* Copy sh_info from input for mbind section. */
7777 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7778 && elf_section_flags (isec) & SHF_GNU_MBIND)
7779 elf_section_data (osec)->this_hdr.sh_info
7780 = elf_section_data (isec)->this_hdr.sh_info;
7781
7782 /* Set things up for objcopy and relocatable link. The output
7783 SHT_GROUP section will have its elf_next_in_group pointing back
7784 to the input group members. Ignore linker created group section.
7785 See elfNN_ia64_object_p in elfxx-ia64.c. */
7786 if ((link_info == NULL
7787 || !link_info->resolve_section_groups)
7788 && (elf_sec_group (isec) == NULL
7789 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7790 {
7791 if (elf_section_flags (isec) & SHF_GROUP)
7792 elf_section_flags (osec) |= SHF_GROUP;
7793 elf_next_in_group (osec) = elf_next_in_group (isec);
7794 elf_section_data (osec)->group = elf_section_data (isec)->group;
7795 }
7796
7797 /* If not decompress, preserve SHF_COMPRESSED. */
7798 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7799 elf_section_flags (osec) |= (elf_section_flags (isec)
7800 & SHF_COMPRESSED);
7801
7802 ihdr = &elf_section_data (isec)->this_hdr;
7803
7804 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7805 don't use the output section of the linked-to section since it
7806 may be NULL at this point. */
7807 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7808 {
7809 ohdr = &elf_section_data (osec)->this_hdr;
7810 ohdr->sh_flags |= SHF_LINK_ORDER;
7811 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7812 }
7813
7814 osec->use_rela_p = isec->use_rela_p;
7815
7816 return TRUE;
7817 }
7818
7819 /* Copy private section information. This copies over the entsize
7820 field, and sometimes the info field. */
7821
7822 bfd_boolean
7823 _bfd_elf_copy_private_section_data (bfd *ibfd,
7824 asection *isec,
7825 bfd *obfd,
7826 asection *osec)
7827 {
7828 Elf_Internal_Shdr *ihdr, *ohdr;
7829
7830 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7831 || obfd->xvec->flavour != bfd_target_elf_flavour)
7832 return TRUE;
7833
7834 ihdr = &elf_section_data (isec)->this_hdr;
7835 ohdr = &elf_section_data (osec)->this_hdr;
7836
7837 ohdr->sh_entsize = ihdr->sh_entsize;
7838
7839 if (ihdr->sh_type == SHT_SYMTAB
7840 || ihdr->sh_type == SHT_DYNSYM
7841 || ihdr->sh_type == SHT_GNU_verneed
7842 || ihdr->sh_type == SHT_GNU_verdef)
7843 ohdr->sh_info = ihdr->sh_info;
7844
7845 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7846 NULL);
7847 }
7848
7849 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7850 necessary if we are removing either the SHT_GROUP section or any of
7851 the group member sections. DISCARDED is the value that a section's
7852 output_section has if the section will be discarded, NULL when this
7853 function is called from objcopy, bfd_abs_section_ptr when called
7854 from the linker. */
7855
7856 bfd_boolean
7857 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7858 {
7859 asection *isec;
7860
7861 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7862 if (elf_section_type (isec) == SHT_GROUP)
7863 {
7864 asection *first = elf_next_in_group (isec);
7865 asection *s = first;
7866 bfd_size_type removed = 0;
7867
7868 while (s != NULL)
7869 {
7870 /* If this member section is being output but the
7871 SHT_GROUP section is not, then clear the group info
7872 set up by _bfd_elf_copy_private_section_data. */
7873 if (s->output_section != discarded
7874 && isec->output_section == discarded)
7875 {
7876 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7877 elf_group_name (s->output_section) = NULL;
7878 }
7879 else
7880 {
7881 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7882 if (s->output_section == discarded
7883 && isec->output_section != discarded)
7884 {
7885 /* Conversely, if the member section is not being
7886 output but the SHT_GROUP section is, then adjust
7887 its size. */
7888 removed += 4;
7889 if (elf_sec->rel.hdr != NULL
7890 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7891 removed += 4;
7892 if (elf_sec->rela.hdr != NULL
7893 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7894 removed += 4;
7895 }
7896 else
7897 {
7898 /* Also adjust for zero-sized relocation member
7899 section. */
7900 if (elf_sec->rel.hdr != NULL
7901 && elf_sec->rel.hdr->sh_size == 0)
7902 removed += 4;
7903 if (elf_sec->rela.hdr != NULL
7904 && elf_sec->rela.hdr->sh_size == 0)
7905 removed += 4;
7906 }
7907 }
7908 s = elf_next_in_group (s);
7909 if (s == first)
7910 break;
7911 }
7912 if (removed != 0)
7913 {
7914 if (discarded != NULL)
7915 {
7916 /* If we've been called for ld -r, then we need to
7917 adjust the input section size. */
7918 if (isec->rawsize == 0)
7919 isec->rawsize = isec->size;
7920 isec->size = isec->rawsize - removed;
7921 if (isec->size <= 4)
7922 {
7923 isec->size = 0;
7924 isec->flags |= SEC_EXCLUDE;
7925 }
7926 }
7927 else
7928 {
7929 /* Adjust the output section size when called from
7930 objcopy. */
7931 isec->output_section->size -= removed;
7932 if (isec->output_section->size <= 4)
7933 {
7934 isec->output_section->size = 0;
7935 isec->output_section->flags |= SEC_EXCLUDE;
7936 }
7937 }
7938 }
7939 }
7940
7941 return TRUE;
7942 }
7943
7944 /* Copy private header information. */
7945
7946 bfd_boolean
7947 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7948 {
7949 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7950 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7951 return TRUE;
7952
7953 /* Copy over private BFD data if it has not already been copied.
7954 This must be done here, rather than in the copy_private_bfd_data
7955 entry point, because the latter is called after the section
7956 contents have been set, which means that the program headers have
7957 already been worked out. */
7958 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
7959 {
7960 if (! copy_private_bfd_data (ibfd, obfd))
7961 return FALSE;
7962 }
7963
7964 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7965 }
7966
7967 /* Copy private symbol information. If this symbol is in a section
7968 which we did not map into a BFD section, try to map the section
7969 index correctly. We use special macro definitions for the mapped
7970 section indices; these definitions are interpreted by the
7971 swap_out_syms function. */
7972
7973 #define MAP_ONESYMTAB (SHN_HIOS + 1)
7974 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
7975 #define MAP_STRTAB (SHN_HIOS + 3)
7976 #define MAP_SHSTRTAB (SHN_HIOS + 4)
7977 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
7978
7979 bfd_boolean
7980 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
7981 asymbol *isymarg,
7982 bfd *obfd,
7983 asymbol *osymarg)
7984 {
7985 elf_symbol_type *isym, *osym;
7986
7987 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7988 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7989 return TRUE;
7990
7991 isym = elf_symbol_from (isymarg);
7992 osym = elf_symbol_from (osymarg);
7993
7994 if (isym != NULL
7995 && isym->internal_elf_sym.st_shndx != 0
7996 && osym != NULL
7997 && bfd_is_abs_section (isym->symbol.section))
7998 {
7999 unsigned int shndx;
8000
8001 shndx = isym->internal_elf_sym.st_shndx;
8002 if (shndx == elf_onesymtab (ibfd))
8003 shndx = MAP_ONESYMTAB;
8004 else if (shndx == elf_dynsymtab (ibfd))
8005 shndx = MAP_DYNSYMTAB;
8006 else if (shndx == elf_strtab_sec (ibfd))
8007 shndx = MAP_STRTAB;
8008 else if (shndx == elf_shstrtab_sec (ibfd))
8009 shndx = MAP_SHSTRTAB;
8010 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
8011 shndx = MAP_SYM_SHNDX;
8012 osym->internal_elf_sym.st_shndx = shndx;
8013 }
8014
8015 return TRUE;
8016 }
8017
8018 /* Swap out the symbols. */
8019
8020 static bfd_boolean
8021 swap_out_syms (bfd *abfd,
8022 struct elf_strtab_hash **sttp,
8023 int relocatable_p,
8024 struct bfd_link_info *info)
8025 {
8026 const struct elf_backend_data *bed;
8027 unsigned int symcount;
8028 asymbol **syms;
8029 struct elf_strtab_hash *stt;
8030 Elf_Internal_Shdr *symtab_hdr;
8031 Elf_Internal_Shdr *symtab_shndx_hdr;
8032 Elf_Internal_Shdr *symstrtab_hdr;
8033 struct elf_sym_strtab *symstrtab;
8034 bfd_byte *outbound_syms;
8035 bfd_byte *outbound_shndx;
8036 unsigned long outbound_syms_index;
8037 unsigned long outbound_shndx_index;
8038 unsigned int idx;
8039 unsigned int num_locals;
8040 size_t amt;
8041 bfd_boolean name_local_sections;
8042
8043 if (!elf_map_symbols (abfd, &num_locals))
8044 return FALSE;
8045
8046 /* Dump out the symtabs. */
8047 stt = _bfd_elf_strtab_init ();
8048 if (stt == NULL)
8049 return FALSE;
8050
8051 bed = get_elf_backend_data (abfd);
8052 symcount = bfd_get_symcount (abfd);
8053 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8054 symtab_hdr->sh_type = SHT_SYMTAB;
8055 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8056 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8057 symtab_hdr->sh_info = num_locals + 1;
8058 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8059
8060 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8061 symstrtab_hdr->sh_type = SHT_STRTAB;
8062
8063 /* Allocate buffer to swap out the .strtab section. */
8064 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8065 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8066 {
8067 bfd_set_error (bfd_error_no_memory);
8068 _bfd_elf_strtab_free (stt);
8069 return FALSE;
8070 }
8071
8072 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8073 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8074 {
8075 error_no_mem:
8076 bfd_set_error (bfd_error_no_memory);
8077 error_return:
8078 free (symstrtab);
8079 _bfd_elf_strtab_free (stt);
8080 return FALSE;
8081 }
8082 symtab_hdr->contents = outbound_syms;
8083 outbound_syms_index = 0;
8084
8085 outbound_shndx = NULL;
8086 outbound_shndx_index = 0;
8087
8088 if (elf_symtab_shndx_list (abfd))
8089 {
8090 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8091 if (symtab_shndx_hdr->sh_name != 0)
8092 {
8093 if (_bfd_mul_overflow (symcount + 1,
8094 sizeof (Elf_External_Sym_Shndx), &amt))
8095 goto error_no_mem;
8096 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8097 if (outbound_shndx == NULL)
8098 goto error_return;
8099
8100 symtab_shndx_hdr->contents = outbound_shndx;
8101 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8102 symtab_shndx_hdr->sh_size = amt;
8103 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8104 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8105 }
8106 /* FIXME: What about any other headers in the list ? */
8107 }
8108
8109 /* Now generate the data (for "contents"). */
8110 {
8111 /* Fill in zeroth symbol and swap it out. */
8112 Elf_Internal_Sym sym;
8113 sym.st_name = 0;
8114 sym.st_value = 0;
8115 sym.st_size = 0;
8116 sym.st_info = 0;
8117 sym.st_other = 0;
8118 sym.st_shndx = SHN_UNDEF;
8119 sym.st_target_internal = 0;
8120 symstrtab[0].sym = sym;
8121 symstrtab[0].dest_index = outbound_syms_index;
8122 symstrtab[0].destshndx_index = outbound_shndx_index;
8123 outbound_syms_index++;
8124 if (outbound_shndx != NULL)
8125 outbound_shndx_index++;
8126 }
8127
8128 name_local_sections
8129 = (bed->elf_backend_name_local_section_symbols
8130 && bed->elf_backend_name_local_section_symbols (abfd));
8131
8132 syms = bfd_get_outsymbols (abfd);
8133 for (idx = 0; idx < symcount;)
8134 {
8135 Elf_Internal_Sym sym;
8136 bfd_vma value = syms[idx]->value;
8137 elf_symbol_type *type_ptr;
8138 flagword flags = syms[idx]->flags;
8139 int type;
8140
8141 if (!name_local_sections
8142 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8143 {
8144 /* Local section symbols have no name. */
8145 sym.st_name = (unsigned long) -1;
8146 }
8147 else
8148 {
8149 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8150 to get the final offset for st_name. */
8151 sym.st_name
8152 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8153 FALSE);
8154 if (sym.st_name == (unsigned long) -1)
8155 goto error_return;
8156 }
8157
8158 type_ptr = elf_symbol_from (syms[idx]);
8159
8160 if ((flags & BSF_SECTION_SYM) == 0
8161 && bfd_is_com_section (syms[idx]->section))
8162 {
8163 /* ELF common symbols put the alignment into the `value' field,
8164 and the size into the `size' field. This is backwards from
8165 how BFD handles it, so reverse it here. */
8166 sym.st_size = value;
8167 if (type_ptr == NULL
8168 || type_ptr->internal_elf_sym.st_value == 0)
8169 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8170 else
8171 sym.st_value = type_ptr->internal_elf_sym.st_value;
8172 sym.st_shndx = _bfd_elf_section_from_bfd_section
8173 (abfd, syms[idx]->section);
8174 }
8175 else
8176 {
8177 asection *sec = syms[idx]->section;
8178 unsigned int shndx;
8179
8180 if (sec->output_section)
8181 {
8182 value += sec->output_offset;
8183 sec = sec->output_section;
8184 }
8185
8186 /* Don't add in the section vma for relocatable output. */
8187 if (! relocatable_p)
8188 value += sec->vma;
8189 sym.st_value = value;
8190 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8191
8192 if (bfd_is_abs_section (sec)
8193 && type_ptr != NULL
8194 && type_ptr->internal_elf_sym.st_shndx != 0)
8195 {
8196 /* This symbol is in a real ELF section which we did
8197 not create as a BFD section. Undo the mapping done
8198 by copy_private_symbol_data. */
8199 shndx = type_ptr->internal_elf_sym.st_shndx;
8200 switch (shndx)
8201 {
8202 case MAP_ONESYMTAB:
8203 shndx = elf_onesymtab (abfd);
8204 break;
8205 case MAP_DYNSYMTAB:
8206 shndx = elf_dynsymtab (abfd);
8207 break;
8208 case MAP_STRTAB:
8209 shndx = elf_strtab_sec (abfd);
8210 break;
8211 case MAP_SHSTRTAB:
8212 shndx = elf_shstrtab_sec (abfd);
8213 break;
8214 case MAP_SYM_SHNDX:
8215 if (elf_symtab_shndx_list (abfd))
8216 shndx = elf_symtab_shndx_list (abfd)->ndx;
8217 break;
8218 case SHN_COMMON:
8219 case SHN_ABS:
8220 shndx = SHN_ABS;
8221 break;
8222 default:
8223 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8224 {
8225 if (bed->symbol_section_index)
8226 shndx = bed->symbol_section_index (abfd, type_ptr);
8227 /* Otherwise just leave the index alone. */
8228 }
8229 else
8230 {
8231 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8232 _bfd_error_handler (_("%pB: \
8233 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8234 abfd, shndx);
8235 shndx = SHN_ABS;
8236 }
8237 break;
8238 }
8239 }
8240 else
8241 {
8242 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8243
8244 if (shndx == SHN_BAD)
8245 {
8246 asection *sec2;
8247
8248 /* Writing this would be a hell of a lot easier if
8249 we had some decent documentation on bfd, and
8250 knew what to expect of the library, and what to
8251 demand of applications. For example, it
8252 appears that `objcopy' might not set the
8253 section of a symbol to be a section that is
8254 actually in the output file. */
8255 sec2 = bfd_get_section_by_name (abfd, sec->name);
8256 if (sec2 != NULL)
8257 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8258 if (shndx == SHN_BAD)
8259 {
8260 /* xgettext:c-format */
8261 _bfd_error_handler
8262 (_("unable to find equivalent output section"
8263 " for symbol '%s' from section '%s'"),
8264 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8265 sec->name);
8266 bfd_set_error (bfd_error_invalid_operation);
8267 goto error_return;
8268 }
8269 }
8270 }
8271
8272 sym.st_shndx = shndx;
8273 }
8274
8275 if ((flags & BSF_THREAD_LOCAL) != 0)
8276 type = STT_TLS;
8277 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8278 type = STT_GNU_IFUNC;
8279 else if ((flags & BSF_FUNCTION) != 0)
8280 type = STT_FUNC;
8281 else if ((flags & BSF_OBJECT) != 0)
8282 type = STT_OBJECT;
8283 else if ((flags & BSF_RELC) != 0)
8284 type = STT_RELC;
8285 else if ((flags & BSF_SRELC) != 0)
8286 type = STT_SRELC;
8287 else
8288 type = STT_NOTYPE;
8289
8290 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8291 type = STT_TLS;
8292
8293 /* Processor-specific types. */
8294 if (type_ptr != NULL
8295 && bed->elf_backend_get_symbol_type)
8296 type = ((*bed->elf_backend_get_symbol_type)
8297 (&type_ptr->internal_elf_sym, type));
8298
8299 if (flags & BSF_SECTION_SYM)
8300 {
8301 if (flags & BSF_GLOBAL)
8302 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8303 else
8304 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8305 }
8306 else if (bfd_is_com_section (syms[idx]->section))
8307 {
8308 if (type != STT_TLS)
8309 {
8310 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8311 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8312 ? STT_COMMON : STT_OBJECT);
8313 else
8314 type = ((flags & BSF_ELF_COMMON) != 0
8315 ? STT_COMMON : STT_OBJECT);
8316 }
8317 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8318 }
8319 else if (bfd_is_und_section (syms[idx]->section))
8320 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8321 ? STB_WEAK
8322 : STB_GLOBAL),
8323 type);
8324 else if (flags & BSF_FILE)
8325 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8326 else
8327 {
8328 int bind = STB_LOCAL;
8329
8330 if (flags & BSF_LOCAL)
8331 bind = STB_LOCAL;
8332 else if (flags & BSF_GNU_UNIQUE)
8333 bind = STB_GNU_UNIQUE;
8334 else if (flags & BSF_WEAK)
8335 bind = STB_WEAK;
8336 else if (flags & BSF_GLOBAL)
8337 bind = STB_GLOBAL;
8338
8339 sym.st_info = ELF_ST_INFO (bind, type);
8340 }
8341
8342 if (type_ptr != NULL)
8343 {
8344 sym.st_other = type_ptr->internal_elf_sym.st_other;
8345 sym.st_target_internal
8346 = type_ptr->internal_elf_sym.st_target_internal;
8347 }
8348 else
8349 {
8350 sym.st_other = 0;
8351 sym.st_target_internal = 0;
8352 }
8353
8354 idx++;
8355 symstrtab[idx].sym = sym;
8356 symstrtab[idx].dest_index = outbound_syms_index;
8357 symstrtab[idx].destshndx_index = outbound_shndx_index;
8358
8359 outbound_syms_index++;
8360 if (outbound_shndx != NULL)
8361 outbound_shndx_index++;
8362 }
8363
8364 /* Finalize the .strtab section. */
8365 _bfd_elf_strtab_finalize (stt);
8366
8367 /* Swap out the .strtab section. */
8368 for (idx = 0; idx <= symcount; idx++)
8369 {
8370 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8371 if (elfsym->sym.st_name == (unsigned long) -1)
8372 elfsym->sym.st_name = 0;
8373 else
8374 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8375 elfsym->sym.st_name);
8376 if (info && info->callbacks->ctf_new_symbol)
8377 info->callbacks->ctf_new_symbol (elfsym->dest_index,
8378 &elfsym->sym);
8379
8380 /* Inform the linker of the addition of this symbol. */
8381
8382 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8383 (outbound_syms
8384 + (elfsym->dest_index
8385 * bed->s->sizeof_sym)),
8386 (outbound_shndx
8387 + (elfsym->destshndx_index
8388 * sizeof (Elf_External_Sym_Shndx))));
8389 }
8390 free (symstrtab);
8391
8392 *sttp = stt;
8393 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8394 symstrtab_hdr->sh_type = SHT_STRTAB;
8395 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8396 symstrtab_hdr->sh_addr = 0;
8397 symstrtab_hdr->sh_entsize = 0;
8398 symstrtab_hdr->sh_link = 0;
8399 symstrtab_hdr->sh_info = 0;
8400 symstrtab_hdr->sh_addralign = 1;
8401
8402 return TRUE;
8403 }
8404
8405 /* Return the number of bytes required to hold the symtab vector.
8406
8407 Note that we base it on the count plus 1, since we will null terminate
8408 the vector allocated based on this size. However, the ELF symbol table
8409 always has a dummy entry as symbol #0, so it ends up even. */
8410
8411 long
8412 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8413 {
8414 bfd_size_type symcount;
8415 long symtab_size;
8416 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8417
8418 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8419 if (symcount > LONG_MAX / sizeof (asymbol *))
8420 {
8421 bfd_set_error (bfd_error_file_too_big);
8422 return -1;
8423 }
8424 symtab_size = symcount * (sizeof (asymbol *));
8425 if (symcount == 0)
8426 symtab_size = sizeof (asymbol *);
8427 else if (!bfd_write_p (abfd))
8428 {
8429 ufile_ptr filesize = bfd_get_file_size (abfd);
8430
8431 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8432 {
8433 bfd_set_error (bfd_error_file_truncated);
8434 return -1;
8435 }
8436 }
8437
8438 return symtab_size;
8439 }
8440
8441 long
8442 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8443 {
8444 bfd_size_type symcount;
8445 long symtab_size;
8446 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8447
8448 if (elf_dynsymtab (abfd) == 0)
8449 {
8450 bfd_set_error (bfd_error_invalid_operation);
8451 return -1;
8452 }
8453
8454 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8455 if (symcount > LONG_MAX / sizeof (asymbol *))
8456 {
8457 bfd_set_error (bfd_error_file_too_big);
8458 return -1;
8459 }
8460 symtab_size = symcount * (sizeof (asymbol *));
8461 if (symcount == 0)
8462 symtab_size = sizeof (asymbol *);
8463 else if (!bfd_write_p (abfd))
8464 {
8465 ufile_ptr filesize = bfd_get_file_size (abfd);
8466
8467 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8468 {
8469 bfd_set_error (bfd_error_file_truncated);
8470 return -1;
8471 }
8472 }
8473
8474 return symtab_size;
8475 }
8476
8477 long
8478 _bfd_elf_get_reloc_upper_bound (bfd *abfd, sec_ptr asect)
8479 {
8480 if (asect->reloc_count != 0 && !bfd_write_p (abfd))
8481 {
8482 /* Sanity check reloc section size. */
8483 struct bfd_elf_section_data *d = elf_section_data (asect);
8484 Elf_Internal_Shdr *rel_hdr = &d->this_hdr;
8485 bfd_size_type ext_rel_size = rel_hdr->sh_size;
8486 ufile_ptr filesize = bfd_get_file_size (abfd);
8487
8488 if (filesize != 0 && ext_rel_size > filesize)
8489 {
8490 bfd_set_error (bfd_error_file_truncated);
8491 return -1;
8492 }
8493 }
8494
8495 #if SIZEOF_LONG == SIZEOF_INT
8496 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8497 {
8498 bfd_set_error (bfd_error_file_too_big);
8499 return -1;
8500 }
8501 #endif
8502 return (asect->reloc_count + 1) * sizeof (arelent *);
8503 }
8504
8505 /* Canonicalize the relocs. */
8506
8507 long
8508 _bfd_elf_canonicalize_reloc (bfd *abfd,
8509 sec_ptr section,
8510 arelent **relptr,
8511 asymbol **symbols)
8512 {
8513 arelent *tblptr;
8514 unsigned int i;
8515 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8516
8517 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8518 return -1;
8519
8520 tblptr = section->relocation;
8521 for (i = 0; i < section->reloc_count; i++)
8522 *relptr++ = tblptr++;
8523
8524 *relptr = NULL;
8525
8526 return section->reloc_count;
8527 }
8528
8529 long
8530 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8531 {
8532 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8533 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8534
8535 if (symcount >= 0)
8536 abfd->symcount = symcount;
8537 return symcount;
8538 }
8539
8540 long
8541 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8542 asymbol **allocation)
8543 {
8544 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8545 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8546
8547 if (symcount >= 0)
8548 abfd->dynsymcount = symcount;
8549 return symcount;
8550 }
8551
8552 /* Return the size required for the dynamic reloc entries. Any loadable
8553 section that was actually installed in the BFD, and has type SHT_REL
8554 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8555 dynamic reloc section. */
8556
8557 long
8558 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8559 {
8560 bfd_size_type count, ext_rel_size;
8561 asection *s;
8562
8563 if (elf_dynsymtab (abfd) == 0)
8564 {
8565 bfd_set_error (bfd_error_invalid_operation);
8566 return -1;
8567 }
8568
8569 count = 1;
8570 ext_rel_size = 0;
8571 for (s = abfd->sections; s != NULL; s = s->next)
8572 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8573 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8574 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8575 {
8576 ext_rel_size += s->size;
8577 if (ext_rel_size < s->size)
8578 {
8579 bfd_set_error (bfd_error_file_truncated);
8580 return -1;
8581 }
8582 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8583 if (count > LONG_MAX / sizeof (arelent *))
8584 {
8585 bfd_set_error (bfd_error_file_too_big);
8586 return -1;
8587 }
8588 }
8589 if (count > 1 && !bfd_write_p (abfd))
8590 {
8591 /* Sanity check reloc section sizes. */
8592 ufile_ptr filesize = bfd_get_file_size (abfd);
8593 if (filesize != 0 && ext_rel_size > filesize)
8594 {
8595 bfd_set_error (bfd_error_file_truncated);
8596 return -1;
8597 }
8598 }
8599 return count * sizeof (arelent *);
8600 }
8601
8602 /* Canonicalize the dynamic relocation entries. Note that we return the
8603 dynamic relocations as a single block, although they are actually
8604 associated with particular sections; the interface, which was
8605 designed for SunOS style shared libraries, expects that there is only
8606 one set of dynamic relocs. Any loadable section that was actually
8607 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8608 dynamic symbol table, is considered to be a dynamic reloc section. */
8609
8610 long
8611 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8612 arelent **storage,
8613 asymbol **syms)
8614 {
8615 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8616 asection *s;
8617 long ret;
8618
8619 if (elf_dynsymtab (abfd) == 0)
8620 {
8621 bfd_set_error (bfd_error_invalid_operation);
8622 return -1;
8623 }
8624
8625 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8626 ret = 0;
8627 for (s = abfd->sections; s != NULL; s = s->next)
8628 {
8629 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8630 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8631 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8632 {
8633 arelent *p;
8634 long count, i;
8635
8636 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8637 return -1;
8638 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8639 p = s->relocation;
8640 for (i = 0; i < count; i++)
8641 *storage++ = p++;
8642 ret += count;
8643 }
8644 }
8645
8646 *storage = NULL;
8647
8648 return ret;
8649 }
8650 \f
8651 /* Read in the version information. */
8652
8653 bfd_boolean
8654 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8655 {
8656 bfd_byte *contents = NULL;
8657 unsigned int freeidx = 0;
8658 size_t amt;
8659
8660 if (elf_dynverref (abfd) != 0)
8661 {
8662 Elf_Internal_Shdr *hdr;
8663 Elf_External_Verneed *everneed;
8664 Elf_Internal_Verneed *iverneed;
8665 unsigned int i;
8666 bfd_byte *contents_end;
8667
8668 hdr = &elf_tdata (abfd)->dynverref_hdr;
8669
8670 if (hdr->sh_info == 0
8671 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8672 {
8673 error_return_bad_verref:
8674 _bfd_error_handler
8675 (_("%pB: .gnu.version_r invalid entry"), abfd);
8676 bfd_set_error (bfd_error_bad_value);
8677 error_return_verref:
8678 elf_tdata (abfd)->verref = NULL;
8679 elf_tdata (abfd)->cverrefs = 0;
8680 goto error_return;
8681 }
8682
8683 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8684 goto error_return_verref;
8685 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8686 if (contents == NULL)
8687 goto error_return_verref;
8688
8689 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8690 {
8691 bfd_set_error (bfd_error_file_too_big);
8692 goto error_return_verref;
8693 }
8694 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8695 if (elf_tdata (abfd)->verref == NULL)
8696 goto error_return_verref;
8697
8698 BFD_ASSERT (sizeof (Elf_External_Verneed)
8699 == sizeof (Elf_External_Vernaux));
8700 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8701 everneed = (Elf_External_Verneed *) contents;
8702 iverneed = elf_tdata (abfd)->verref;
8703 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8704 {
8705 Elf_External_Vernaux *evernaux;
8706 Elf_Internal_Vernaux *ivernaux;
8707 unsigned int j;
8708
8709 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8710
8711 iverneed->vn_bfd = abfd;
8712
8713 iverneed->vn_filename =
8714 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8715 iverneed->vn_file);
8716 if (iverneed->vn_filename == NULL)
8717 goto error_return_bad_verref;
8718
8719 if (iverneed->vn_cnt == 0)
8720 iverneed->vn_auxptr = NULL;
8721 else
8722 {
8723 if (_bfd_mul_overflow (iverneed->vn_cnt,
8724 sizeof (Elf_Internal_Vernaux), &amt))
8725 {
8726 bfd_set_error (bfd_error_file_too_big);
8727 goto error_return_verref;
8728 }
8729 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8730 bfd_alloc (abfd, amt);
8731 if (iverneed->vn_auxptr == NULL)
8732 goto error_return_verref;
8733 }
8734
8735 if (iverneed->vn_aux
8736 > (size_t) (contents_end - (bfd_byte *) everneed))
8737 goto error_return_bad_verref;
8738
8739 evernaux = ((Elf_External_Vernaux *)
8740 ((bfd_byte *) everneed + iverneed->vn_aux));
8741 ivernaux = iverneed->vn_auxptr;
8742 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8743 {
8744 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8745
8746 ivernaux->vna_nodename =
8747 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8748 ivernaux->vna_name);
8749 if (ivernaux->vna_nodename == NULL)
8750 goto error_return_bad_verref;
8751
8752 if (ivernaux->vna_other > freeidx)
8753 freeidx = ivernaux->vna_other;
8754
8755 ivernaux->vna_nextptr = NULL;
8756 if (ivernaux->vna_next == 0)
8757 {
8758 iverneed->vn_cnt = j + 1;
8759 break;
8760 }
8761 if (j + 1 < iverneed->vn_cnt)
8762 ivernaux->vna_nextptr = ivernaux + 1;
8763
8764 if (ivernaux->vna_next
8765 > (size_t) (contents_end - (bfd_byte *) evernaux))
8766 goto error_return_bad_verref;
8767
8768 evernaux = ((Elf_External_Vernaux *)
8769 ((bfd_byte *) evernaux + ivernaux->vna_next));
8770 }
8771
8772 iverneed->vn_nextref = NULL;
8773 if (iverneed->vn_next == 0)
8774 break;
8775 if (i + 1 < hdr->sh_info)
8776 iverneed->vn_nextref = iverneed + 1;
8777
8778 if (iverneed->vn_next
8779 > (size_t) (contents_end - (bfd_byte *) everneed))
8780 goto error_return_bad_verref;
8781
8782 everneed = ((Elf_External_Verneed *)
8783 ((bfd_byte *) everneed + iverneed->vn_next));
8784 }
8785 elf_tdata (abfd)->cverrefs = i;
8786
8787 free (contents);
8788 contents = NULL;
8789 }
8790
8791 if (elf_dynverdef (abfd) != 0)
8792 {
8793 Elf_Internal_Shdr *hdr;
8794 Elf_External_Verdef *everdef;
8795 Elf_Internal_Verdef *iverdef;
8796 Elf_Internal_Verdef *iverdefarr;
8797 Elf_Internal_Verdef iverdefmem;
8798 unsigned int i;
8799 unsigned int maxidx;
8800 bfd_byte *contents_end_def, *contents_end_aux;
8801
8802 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8803
8804 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8805 {
8806 error_return_bad_verdef:
8807 _bfd_error_handler
8808 (_("%pB: .gnu.version_d invalid entry"), abfd);
8809 bfd_set_error (bfd_error_bad_value);
8810 error_return_verdef:
8811 elf_tdata (abfd)->verdef = NULL;
8812 elf_tdata (abfd)->cverdefs = 0;
8813 goto error_return;
8814 }
8815
8816 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8817 goto error_return_verdef;
8818 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8819 if (contents == NULL)
8820 goto error_return_verdef;
8821
8822 BFD_ASSERT (sizeof (Elf_External_Verdef)
8823 >= sizeof (Elf_External_Verdaux));
8824 contents_end_def = contents + hdr->sh_size
8825 - sizeof (Elf_External_Verdef);
8826 contents_end_aux = contents + hdr->sh_size
8827 - sizeof (Elf_External_Verdaux);
8828
8829 /* We know the number of entries in the section but not the maximum
8830 index. Therefore we have to run through all entries and find
8831 the maximum. */
8832 everdef = (Elf_External_Verdef *) contents;
8833 maxidx = 0;
8834 for (i = 0; i < hdr->sh_info; ++i)
8835 {
8836 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8837
8838 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8839 goto error_return_bad_verdef;
8840 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8841 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8842
8843 if (iverdefmem.vd_next == 0)
8844 break;
8845
8846 if (iverdefmem.vd_next
8847 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8848 goto error_return_bad_verdef;
8849
8850 everdef = ((Elf_External_Verdef *)
8851 ((bfd_byte *) everdef + iverdefmem.vd_next));
8852 }
8853
8854 if (default_imported_symver)
8855 {
8856 if (freeidx > maxidx)
8857 maxidx = ++freeidx;
8858 else
8859 freeidx = ++maxidx;
8860 }
8861 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8862 {
8863 bfd_set_error (bfd_error_file_too_big);
8864 goto error_return_verdef;
8865 }
8866 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8867 if (elf_tdata (abfd)->verdef == NULL)
8868 goto error_return_verdef;
8869
8870 elf_tdata (abfd)->cverdefs = maxidx;
8871
8872 everdef = (Elf_External_Verdef *) contents;
8873 iverdefarr = elf_tdata (abfd)->verdef;
8874 for (i = 0; i < hdr->sh_info; i++)
8875 {
8876 Elf_External_Verdaux *everdaux;
8877 Elf_Internal_Verdaux *iverdaux;
8878 unsigned int j;
8879
8880 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8881
8882 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8883 goto error_return_bad_verdef;
8884
8885 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8886 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8887
8888 iverdef->vd_bfd = abfd;
8889
8890 if (iverdef->vd_cnt == 0)
8891 iverdef->vd_auxptr = NULL;
8892 else
8893 {
8894 if (_bfd_mul_overflow (iverdef->vd_cnt,
8895 sizeof (Elf_Internal_Verdaux), &amt))
8896 {
8897 bfd_set_error (bfd_error_file_too_big);
8898 goto error_return_verdef;
8899 }
8900 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8901 bfd_alloc (abfd, amt);
8902 if (iverdef->vd_auxptr == NULL)
8903 goto error_return_verdef;
8904 }
8905
8906 if (iverdef->vd_aux
8907 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8908 goto error_return_bad_verdef;
8909
8910 everdaux = ((Elf_External_Verdaux *)
8911 ((bfd_byte *) everdef + iverdef->vd_aux));
8912 iverdaux = iverdef->vd_auxptr;
8913 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8914 {
8915 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8916
8917 iverdaux->vda_nodename =
8918 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8919 iverdaux->vda_name);
8920 if (iverdaux->vda_nodename == NULL)
8921 goto error_return_bad_verdef;
8922
8923 iverdaux->vda_nextptr = NULL;
8924 if (iverdaux->vda_next == 0)
8925 {
8926 iverdef->vd_cnt = j + 1;
8927 break;
8928 }
8929 if (j + 1 < iverdef->vd_cnt)
8930 iverdaux->vda_nextptr = iverdaux + 1;
8931
8932 if (iverdaux->vda_next
8933 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8934 goto error_return_bad_verdef;
8935
8936 everdaux = ((Elf_External_Verdaux *)
8937 ((bfd_byte *) everdaux + iverdaux->vda_next));
8938 }
8939
8940 iverdef->vd_nodename = NULL;
8941 if (iverdef->vd_cnt)
8942 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8943
8944 iverdef->vd_nextdef = NULL;
8945 if (iverdef->vd_next == 0)
8946 break;
8947 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8948 iverdef->vd_nextdef = iverdef + 1;
8949
8950 everdef = ((Elf_External_Verdef *)
8951 ((bfd_byte *) everdef + iverdef->vd_next));
8952 }
8953
8954 free (contents);
8955 contents = NULL;
8956 }
8957 else if (default_imported_symver)
8958 {
8959 if (freeidx < 3)
8960 freeidx = 3;
8961 else
8962 freeidx++;
8963
8964 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8965 {
8966 bfd_set_error (bfd_error_file_too_big);
8967 goto error_return;
8968 }
8969 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8970 if (elf_tdata (abfd)->verdef == NULL)
8971 goto error_return;
8972
8973 elf_tdata (abfd)->cverdefs = freeidx;
8974 }
8975
8976 /* Create a default version based on the soname. */
8977 if (default_imported_symver)
8978 {
8979 Elf_Internal_Verdef *iverdef;
8980 Elf_Internal_Verdaux *iverdaux;
8981
8982 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
8983
8984 iverdef->vd_version = VER_DEF_CURRENT;
8985 iverdef->vd_flags = 0;
8986 iverdef->vd_ndx = freeidx;
8987 iverdef->vd_cnt = 1;
8988
8989 iverdef->vd_bfd = abfd;
8990
8991 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8992 if (iverdef->vd_nodename == NULL)
8993 goto error_return_verdef;
8994 iverdef->vd_nextdef = NULL;
8995 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8996 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
8997 if (iverdef->vd_auxptr == NULL)
8998 goto error_return_verdef;
8999
9000 iverdaux = iverdef->vd_auxptr;
9001 iverdaux->vda_nodename = iverdef->vd_nodename;
9002 }
9003
9004 return TRUE;
9005
9006 error_return:
9007 free (contents);
9008 return FALSE;
9009 }
9010 \f
9011 asymbol *
9012 _bfd_elf_make_empty_symbol (bfd *abfd)
9013 {
9014 elf_symbol_type *newsym;
9015
9016 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
9017 if (!newsym)
9018 return NULL;
9019 newsym->symbol.the_bfd = abfd;
9020 return &newsym->symbol;
9021 }
9022
9023 void
9024 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
9025 asymbol *symbol,
9026 symbol_info *ret)
9027 {
9028 bfd_symbol_info (symbol, ret);
9029 }
9030
9031 /* Return whether a symbol name implies a local symbol. Most targets
9032 use this function for the is_local_label_name entry point, but some
9033 override it. */
9034
9035 bfd_boolean
9036 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
9037 const char *name)
9038 {
9039 /* Normal local symbols start with ``.L''. */
9040 if (name[0] == '.' && name[1] == 'L')
9041 return TRUE;
9042
9043 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9044 DWARF debugging symbols starting with ``..''. */
9045 if (name[0] == '.' && name[1] == '.')
9046 return TRUE;
9047
9048 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9049 emitting DWARF debugging output. I suspect this is actually a
9050 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9051 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9052 underscore to be emitted on some ELF targets). For ease of use,
9053 we treat such symbols as local. */
9054 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
9055 return TRUE;
9056
9057 /* Treat assembler generated fake symbols, dollar local labels and
9058 forward-backward labels (aka local labels) as locals.
9059 These labels have the form:
9060
9061 L0^A.* (fake symbols)
9062
9063 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9064
9065 Versions which start with .L will have already been matched above,
9066 so we only need to match the rest. */
9067 if (name[0] == 'L' && ISDIGIT (name[1]))
9068 {
9069 bfd_boolean ret = FALSE;
9070 const char * p;
9071 char c;
9072
9073 for (p = name + 2; (c = *p); p++)
9074 {
9075 if (c == 1 || c == 2)
9076 {
9077 if (c == 1 && p == name + 2)
9078 /* A fake symbol. */
9079 return TRUE;
9080
9081 /* FIXME: We are being paranoid here and treating symbols like
9082 L0^Bfoo as if there were non-local, on the grounds that the
9083 assembler will never generate them. But can any symbol
9084 containing an ASCII value in the range 1-31 ever be anything
9085 other than some kind of local ? */
9086 ret = TRUE;
9087 }
9088
9089 if (! ISDIGIT (c))
9090 {
9091 ret = FALSE;
9092 break;
9093 }
9094 }
9095 return ret;
9096 }
9097
9098 return FALSE;
9099 }
9100
9101 alent *
9102 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9103 asymbol *symbol ATTRIBUTE_UNUSED)
9104 {
9105 abort ();
9106 return NULL;
9107 }
9108
9109 bfd_boolean
9110 _bfd_elf_set_arch_mach (bfd *abfd,
9111 enum bfd_architecture arch,
9112 unsigned long machine)
9113 {
9114 /* If this isn't the right architecture for this backend, and this
9115 isn't the generic backend, fail. */
9116 if (arch != get_elf_backend_data (abfd)->arch
9117 && arch != bfd_arch_unknown
9118 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9119 return FALSE;
9120
9121 return bfd_default_set_arch_mach (abfd, arch, machine);
9122 }
9123
9124 /* Find the nearest line to a particular section and offset,
9125 for error reporting. */
9126
9127 bfd_boolean
9128 _bfd_elf_find_nearest_line (bfd *abfd,
9129 asymbol **symbols,
9130 asection *section,
9131 bfd_vma offset,
9132 const char **filename_ptr,
9133 const char **functionname_ptr,
9134 unsigned int *line_ptr,
9135 unsigned int *discriminator_ptr)
9136 {
9137 bfd_boolean found;
9138
9139 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9140 filename_ptr, functionname_ptr,
9141 line_ptr, discriminator_ptr,
9142 dwarf_debug_sections,
9143 &elf_tdata (abfd)->dwarf2_find_line_info))
9144 return TRUE;
9145
9146 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9147 filename_ptr, functionname_ptr, line_ptr))
9148 {
9149 if (!*functionname_ptr)
9150 _bfd_elf_find_function (abfd, symbols, section, offset,
9151 *filename_ptr ? NULL : filename_ptr,
9152 functionname_ptr);
9153 return TRUE;
9154 }
9155
9156 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9157 &found, filename_ptr,
9158 functionname_ptr, line_ptr,
9159 &elf_tdata (abfd)->line_info))
9160 return FALSE;
9161 if (found && (*functionname_ptr || *line_ptr))
9162 return TRUE;
9163
9164 if (symbols == NULL)
9165 return FALSE;
9166
9167 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9168 filename_ptr, functionname_ptr))
9169 return FALSE;
9170
9171 *line_ptr = 0;
9172 return TRUE;
9173 }
9174
9175 /* Find the line for a symbol. */
9176
9177 bfd_boolean
9178 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9179 const char **filename_ptr, unsigned int *line_ptr)
9180 {
9181 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9182 filename_ptr, NULL, line_ptr, NULL,
9183 dwarf_debug_sections,
9184 &elf_tdata (abfd)->dwarf2_find_line_info);
9185 }
9186
9187 /* After a call to bfd_find_nearest_line, successive calls to
9188 bfd_find_inliner_info can be used to get source information about
9189 each level of function inlining that terminated at the address
9190 passed to bfd_find_nearest_line. Currently this is only supported
9191 for DWARF2 with appropriate DWARF3 extensions. */
9192
9193 bfd_boolean
9194 _bfd_elf_find_inliner_info (bfd *abfd,
9195 const char **filename_ptr,
9196 const char **functionname_ptr,
9197 unsigned int *line_ptr)
9198 {
9199 bfd_boolean found;
9200 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9201 functionname_ptr, line_ptr,
9202 & elf_tdata (abfd)->dwarf2_find_line_info);
9203 return found;
9204 }
9205
9206 int
9207 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9208 {
9209 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9210 int ret = bed->s->sizeof_ehdr;
9211
9212 if (!bfd_link_relocatable (info))
9213 {
9214 bfd_size_type phdr_size = elf_program_header_size (abfd);
9215
9216 if (phdr_size == (bfd_size_type) -1)
9217 {
9218 struct elf_segment_map *m;
9219
9220 phdr_size = 0;
9221 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9222 phdr_size += bed->s->sizeof_phdr;
9223
9224 if (phdr_size == 0)
9225 phdr_size = get_program_header_size (abfd, info);
9226 }
9227
9228 elf_program_header_size (abfd) = phdr_size;
9229 ret += phdr_size;
9230 }
9231
9232 return ret;
9233 }
9234
9235 bfd_boolean
9236 _bfd_elf_set_section_contents (bfd *abfd,
9237 sec_ptr section,
9238 const void *location,
9239 file_ptr offset,
9240 bfd_size_type count)
9241 {
9242 Elf_Internal_Shdr *hdr;
9243 file_ptr pos;
9244
9245 if (! abfd->output_has_begun
9246 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9247 return FALSE;
9248
9249 if (!count)
9250 return TRUE;
9251
9252 hdr = &elf_section_data (section)->this_hdr;
9253 if (hdr->sh_offset == (file_ptr) -1)
9254 {
9255 unsigned char *contents;
9256
9257 if (bfd_section_is_ctf (section))
9258 /* Nothing to do with this section: the contents are generated
9259 later. */
9260 return TRUE;
9261
9262 if ((section->flags & SEC_ELF_COMPRESS) == 0)
9263 {
9264 _bfd_error_handler
9265 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9266 abfd, section);
9267 bfd_set_error (bfd_error_invalid_operation);
9268 return FALSE;
9269 }
9270
9271 if ((offset + count) > hdr->sh_size)
9272 {
9273 _bfd_error_handler
9274 (_("%pB:%pA: error: attempting to write over the end of the section"),
9275 abfd, section);
9276
9277 bfd_set_error (bfd_error_invalid_operation);
9278 return FALSE;
9279 }
9280
9281 contents = hdr->contents;
9282 if (contents == NULL)
9283 {
9284 _bfd_error_handler
9285 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9286 abfd, section);
9287
9288 bfd_set_error (bfd_error_invalid_operation);
9289 return FALSE;
9290 }
9291
9292 memcpy (contents + offset, location, count);
9293 return TRUE;
9294 }
9295
9296 pos = hdr->sh_offset + offset;
9297 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9298 || bfd_bwrite (location, count, abfd) != count)
9299 return FALSE;
9300
9301 return TRUE;
9302 }
9303
9304 bfd_boolean
9305 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9306 arelent *cache_ptr ATTRIBUTE_UNUSED,
9307 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9308 {
9309 abort ();
9310 return FALSE;
9311 }
9312
9313 /* Try to convert a non-ELF reloc into an ELF one. */
9314
9315 bfd_boolean
9316 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9317 {
9318 /* Check whether we really have an ELF howto. */
9319
9320 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9321 {
9322 bfd_reloc_code_real_type code;
9323 reloc_howto_type *howto;
9324
9325 /* Alien reloc: Try to determine its type to replace it with an
9326 equivalent ELF reloc. */
9327
9328 if (areloc->howto->pc_relative)
9329 {
9330 switch (areloc->howto->bitsize)
9331 {
9332 case 8:
9333 code = BFD_RELOC_8_PCREL;
9334 break;
9335 case 12:
9336 code = BFD_RELOC_12_PCREL;
9337 break;
9338 case 16:
9339 code = BFD_RELOC_16_PCREL;
9340 break;
9341 case 24:
9342 code = BFD_RELOC_24_PCREL;
9343 break;
9344 case 32:
9345 code = BFD_RELOC_32_PCREL;
9346 break;
9347 case 64:
9348 code = BFD_RELOC_64_PCREL;
9349 break;
9350 default:
9351 goto fail;
9352 }
9353
9354 howto = bfd_reloc_type_lookup (abfd, code);
9355
9356 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9357 {
9358 if (howto->pcrel_offset)
9359 areloc->addend += areloc->address;
9360 else
9361 areloc->addend -= areloc->address; /* addend is unsigned!! */
9362 }
9363 }
9364 else
9365 {
9366 switch (areloc->howto->bitsize)
9367 {
9368 case 8:
9369 code = BFD_RELOC_8;
9370 break;
9371 case 14:
9372 code = BFD_RELOC_14;
9373 break;
9374 case 16:
9375 code = BFD_RELOC_16;
9376 break;
9377 case 26:
9378 code = BFD_RELOC_26;
9379 break;
9380 case 32:
9381 code = BFD_RELOC_32;
9382 break;
9383 case 64:
9384 code = BFD_RELOC_64;
9385 break;
9386 default:
9387 goto fail;
9388 }
9389
9390 howto = bfd_reloc_type_lookup (abfd, code);
9391 }
9392
9393 if (howto)
9394 areloc->howto = howto;
9395 else
9396 goto fail;
9397 }
9398
9399 return TRUE;
9400
9401 fail:
9402 /* xgettext:c-format */
9403 _bfd_error_handler (_("%pB: %s unsupported"),
9404 abfd, areloc->howto->name);
9405 bfd_set_error (bfd_error_sorry);
9406 return FALSE;
9407 }
9408
9409 bfd_boolean
9410 _bfd_elf_close_and_cleanup (bfd *abfd)
9411 {
9412 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9413 if (tdata != NULL
9414 && (bfd_get_format (abfd) == bfd_object
9415 || bfd_get_format (abfd) == bfd_core))
9416 {
9417 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9418 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9419 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9420 }
9421
9422 return _bfd_generic_close_and_cleanup (abfd);
9423 }
9424
9425 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9426 in the relocation's offset. Thus we cannot allow any sort of sanity
9427 range-checking to interfere. There is nothing else to do in processing
9428 this reloc. */
9429
9430 bfd_reloc_status_type
9431 _bfd_elf_rel_vtable_reloc_fn
9432 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9433 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9434 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9435 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9436 {
9437 return bfd_reloc_ok;
9438 }
9439 \f
9440 /* Elf core file support. Much of this only works on native
9441 toolchains, since we rely on knowing the
9442 machine-dependent procfs structure in order to pick
9443 out details about the corefile. */
9444
9445 #ifdef HAVE_SYS_PROCFS_H
9446 # include <sys/procfs.h>
9447 #endif
9448
9449 /* Return a PID that identifies a "thread" for threaded cores, or the
9450 PID of the main process for non-threaded cores. */
9451
9452 static int
9453 elfcore_make_pid (bfd *abfd)
9454 {
9455 int pid;
9456
9457 pid = elf_tdata (abfd)->core->lwpid;
9458 if (pid == 0)
9459 pid = elf_tdata (abfd)->core->pid;
9460
9461 return pid;
9462 }
9463
9464 /* If there isn't a section called NAME, make one, using
9465 data from SECT. Note, this function will generate a
9466 reference to NAME, so you shouldn't deallocate or
9467 overwrite it. */
9468
9469 static bfd_boolean
9470 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9471 {
9472 asection *sect2;
9473
9474 if (bfd_get_section_by_name (abfd, name) != NULL)
9475 return TRUE;
9476
9477 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9478 if (sect2 == NULL)
9479 return FALSE;
9480
9481 sect2->size = sect->size;
9482 sect2->filepos = sect->filepos;
9483 sect2->alignment_power = sect->alignment_power;
9484 return TRUE;
9485 }
9486
9487 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9488 actually creates up to two pseudosections:
9489 - For the single-threaded case, a section named NAME, unless
9490 such a section already exists.
9491 - For the multi-threaded case, a section named "NAME/PID", where
9492 PID is elfcore_make_pid (abfd).
9493 Both pseudosections have identical contents. */
9494 bfd_boolean
9495 _bfd_elfcore_make_pseudosection (bfd *abfd,
9496 char *name,
9497 size_t size,
9498 ufile_ptr filepos)
9499 {
9500 char buf[100];
9501 char *threaded_name;
9502 size_t len;
9503 asection *sect;
9504
9505 /* Build the section name. */
9506
9507 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9508 len = strlen (buf) + 1;
9509 threaded_name = (char *) bfd_alloc (abfd, len);
9510 if (threaded_name == NULL)
9511 return FALSE;
9512 memcpy (threaded_name, buf, len);
9513
9514 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9515 SEC_HAS_CONTENTS);
9516 if (sect == NULL)
9517 return FALSE;
9518 sect->size = size;
9519 sect->filepos = filepos;
9520 sect->alignment_power = 2;
9521
9522 return elfcore_maybe_make_sect (abfd, name, sect);
9523 }
9524
9525 static bfd_boolean
9526 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9527 size_t offs)
9528 {
9529 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9530 SEC_HAS_CONTENTS);
9531
9532 if (sect == NULL)
9533 return FALSE;
9534
9535 sect->size = note->descsz - offs;
9536 sect->filepos = note->descpos + offs;
9537 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9538
9539 return TRUE;
9540 }
9541
9542 /* prstatus_t exists on:
9543 solaris 2.5+
9544 linux 2.[01] + glibc
9545 unixware 4.2
9546 */
9547
9548 #if defined (HAVE_PRSTATUS_T)
9549
9550 static bfd_boolean
9551 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9552 {
9553 size_t size;
9554 int offset;
9555
9556 if (note->descsz == sizeof (prstatus_t))
9557 {
9558 prstatus_t prstat;
9559
9560 size = sizeof (prstat.pr_reg);
9561 offset = offsetof (prstatus_t, pr_reg);
9562 memcpy (&prstat, note->descdata, sizeof (prstat));
9563
9564 /* Do not overwrite the core signal if it
9565 has already been set by another thread. */
9566 if (elf_tdata (abfd)->core->signal == 0)
9567 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9568 if (elf_tdata (abfd)->core->pid == 0)
9569 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9570
9571 /* pr_who exists on:
9572 solaris 2.5+
9573 unixware 4.2
9574 pr_who doesn't exist on:
9575 linux 2.[01]
9576 */
9577 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9578 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9579 #else
9580 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9581 #endif
9582 }
9583 #if defined (HAVE_PRSTATUS32_T)
9584 else if (note->descsz == sizeof (prstatus32_t))
9585 {
9586 /* 64-bit host, 32-bit corefile */
9587 prstatus32_t prstat;
9588
9589 size = sizeof (prstat.pr_reg);
9590 offset = offsetof (prstatus32_t, pr_reg);
9591 memcpy (&prstat, note->descdata, sizeof (prstat));
9592
9593 /* Do not overwrite the core signal if it
9594 has already been set by another thread. */
9595 if (elf_tdata (abfd)->core->signal == 0)
9596 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9597 if (elf_tdata (abfd)->core->pid == 0)
9598 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9599
9600 /* pr_who exists on:
9601 solaris 2.5+
9602 unixware 4.2
9603 pr_who doesn't exist on:
9604 linux 2.[01]
9605 */
9606 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9607 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9608 #else
9609 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9610 #endif
9611 }
9612 #endif /* HAVE_PRSTATUS32_T */
9613 else
9614 {
9615 /* Fail - we don't know how to handle any other
9616 note size (ie. data object type). */
9617 return TRUE;
9618 }
9619
9620 /* Make a ".reg/999" section and a ".reg" section. */
9621 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9622 size, note->descpos + offset);
9623 }
9624 #endif /* defined (HAVE_PRSTATUS_T) */
9625
9626 /* Create a pseudosection containing the exact contents of NOTE. */
9627 static bfd_boolean
9628 elfcore_make_note_pseudosection (bfd *abfd,
9629 char *name,
9630 Elf_Internal_Note *note)
9631 {
9632 return _bfd_elfcore_make_pseudosection (abfd, name,
9633 note->descsz, note->descpos);
9634 }
9635
9636 /* There isn't a consistent prfpregset_t across platforms,
9637 but it doesn't matter, because we don't have to pick this
9638 data structure apart. */
9639
9640 static bfd_boolean
9641 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9642 {
9643 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9644 }
9645
9646 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9647 type of NT_PRXFPREG. Just include the whole note's contents
9648 literally. */
9649
9650 static bfd_boolean
9651 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9652 {
9653 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9654 }
9655
9656 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9657 with a note type of NT_X86_XSTATE. Just include the whole note's
9658 contents literally. */
9659
9660 static bfd_boolean
9661 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9662 {
9663 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9664 }
9665
9666 static bfd_boolean
9667 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9668 {
9669 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9670 }
9671
9672 static bfd_boolean
9673 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9674 {
9675 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9676 }
9677
9678 static bfd_boolean
9679 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9680 {
9681 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9682 }
9683
9684 static bfd_boolean
9685 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9686 {
9687 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9688 }
9689
9690 static bfd_boolean
9691 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9692 {
9693 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9694 }
9695
9696 static bfd_boolean
9697 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9698 {
9699 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9700 }
9701
9702 static bfd_boolean
9703 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9704 {
9705 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9706 }
9707
9708 static bfd_boolean
9709 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9710 {
9711 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9712 }
9713
9714 static bfd_boolean
9715 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9716 {
9717 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9718 }
9719
9720 static bfd_boolean
9721 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9722 {
9723 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9724 }
9725
9726 static bfd_boolean
9727 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9728 {
9729 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9730 }
9731
9732 static bfd_boolean
9733 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9734 {
9735 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9736 }
9737
9738 static bfd_boolean
9739 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9740 {
9741 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9742 }
9743
9744 static bfd_boolean
9745 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9746 {
9747 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9748 }
9749
9750 static bfd_boolean
9751 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9752 {
9753 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9754 }
9755
9756 static bfd_boolean
9757 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9758 {
9759 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9760 }
9761
9762 static bfd_boolean
9763 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9764 {
9765 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9766 }
9767
9768 static bfd_boolean
9769 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9770 {
9771 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9772 }
9773
9774 static bfd_boolean
9775 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9776 {
9777 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9778 }
9779
9780 static bfd_boolean
9781 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9782 {
9783 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9784 }
9785
9786 static bfd_boolean
9787 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9788 {
9789 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9790 }
9791
9792 static bfd_boolean
9793 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9794 {
9795 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9796 }
9797
9798 static bfd_boolean
9799 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9800 {
9801 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9802 }
9803
9804 static bfd_boolean
9805 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9806 {
9807 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9808 }
9809
9810 static bfd_boolean
9811 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9812 {
9813 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9814 }
9815
9816 static bfd_boolean
9817 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9818 {
9819 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9820 }
9821
9822 static bfd_boolean
9823 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9824 {
9825 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9826 }
9827
9828 static bfd_boolean
9829 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9830 {
9831 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9832 }
9833
9834 static bfd_boolean
9835 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9836 {
9837 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9838 }
9839
9840 static bfd_boolean
9841 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9842 {
9843 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9844 }
9845
9846 static bfd_boolean
9847 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9848 {
9849 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9850 }
9851
9852 static bfd_boolean
9853 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9854 {
9855 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9856 }
9857
9858 static bfd_boolean
9859 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9860 {
9861 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9862 }
9863
9864 static bfd_boolean
9865 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9866 {
9867 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9868 }
9869
9870 static bfd_boolean
9871 elfcore_grok_arc_v2 (bfd *abfd, Elf_Internal_Note *note)
9872 {
9873 return elfcore_make_note_pseudosection (abfd, ".reg-arc-v2", note);
9874 }
9875
9876 #if defined (HAVE_PRPSINFO_T)
9877 typedef prpsinfo_t elfcore_psinfo_t;
9878 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9879 typedef prpsinfo32_t elfcore_psinfo32_t;
9880 #endif
9881 #endif
9882
9883 #if defined (HAVE_PSINFO_T)
9884 typedef psinfo_t elfcore_psinfo_t;
9885 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9886 typedef psinfo32_t elfcore_psinfo32_t;
9887 #endif
9888 #endif
9889
9890 /* return a malloc'ed copy of a string at START which is at
9891 most MAX bytes long, possibly without a terminating '\0'.
9892 the copy will always have a terminating '\0'. */
9893
9894 char *
9895 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9896 {
9897 char *dups;
9898 char *end = (char *) memchr (start, '\0', max);
9899 size_t len;
9900
9901 if (end == NULL)
9902 len = max;
9903 else
9904 len = end - start;
9905
9906 dups = (char *) bfd_alloc (abfd, len + 1);
9907 if (dups == NULL)
9908 return NULL;
9909
9910 memcpy (dups, start, len);
9911 dups[len] = '\0';
9912
9913 return dups;
9914 }
9915
9916 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9917 static bfd_boolean
9918 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9919 {
9920 if (note->descsz == sizeof (elfcore_psinfo_t))
9921 {
9922 elfcore_psinfo_t psinfo;
9923
9924 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9925
9926 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9927 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9928 #endif
9929 elf_tdata (abfd)->core->program
9930 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9931 sizeof (psinfo.pr_fname));
9932
9933 elf_tdata (abfd)->core->command
9934 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9935 sizeof (psinfo.pr_psargs));
9936 }
9937 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9938 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9939 {
9940 /* 64-bit host, 32-bit corefile */
9941 elfcore_psinfo32_t psinfo;
9942
9943 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9944
9945 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9946 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9947 #endif
9948 elf_tdata (abfd)->core->program
9949 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9950 sizeof (psinfo.pr_fname));
9951
9952 elf_tdata (abfd)->core->command
9953 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9954 sizeof (psinfo.pr_psargs));
9955 }
9956 #endif
9957
9958 else
9959 {
9960 /* Fail - we don't know how to handle any other
9961 note size (ie. data object type). */
9962 return TRUE;
9963 }
9964
9965 /* Note that for some reason, a spurious space is tacked
9966 onto the end of the args in some (at least one anyway)
9967 implementations, so strip it off if it exists. */
9968
9969 {
9970 char *command = elf_tdata (abfd)->core->command;
9971 int n = strlen (command);
9972
9973 if (0 < n && command[n - 1] == ' ')
9974 command[n - 1] = '\0';
9975 }
9976
9977 return TRUE;
9978 }
9979 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9980
9981 #if defined (HAVE_PSTATUS_T)
9982 static bfd_boolean
9983 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
9984 {
9985 if (note->descsz == sizeof (pstatus_t)
9986 #if defined (HAVE_PXSTATUS_T)
9987 || note->descsz == sizeof (pxstatus_t)
9988 #endif
9989 )
9990 {
9991 pstatus_t pstat;
9992
9993 memcpy (&pstat, note->descdata, sizeof (pstat));
9994
9995 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9996 }
9997 #if defined (HAVE_PSTATUS32_T)
9998 else if (note->descsz == sizeof (pstatus32_t))
9999 {
10000 /* 64-bit host, 32-bit corefile */
10001 pstatus32_t pstat;
10002
10003 memcpy (&pstat, note->descdata, sizeof (pstat));
10004
10005 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10006 }
10007 #endif
10008 /* Could grab some more details from the "representative"
10009 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
10010 NT_LWPSTATUS note, presumably. */
10011
10012 return TRUE;
10013 }
10014 #endif /* defined (HAVE_PSTATUS_T) */
10015
10016 #if defined (HAVE_LWPSTATUS_T)
10017 static bfd_boolean
10018 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
10019 {
10020 lwpstatus_t lwpstat;
10021 char buf[100];
10022 char *name;
10023 size_t len;
10024 asection *sect;
10025
10026 if (note->descsz != sizeof (lwpstat)
10027 #if defined (HAVE_LWPXSTATUS_T)
10028 && note->descsz != sizeof (lwpxstatus_t)
10029 #endif
10030 )
10031 return TRUE;
10032
10033 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
10034
10035 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
10036 /* Do not overwrite the core signal if it has already been set by
10037 another thread. */
10038 if (elf_tdata (abfd)->core->signal == 0)
10039 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
10040
10041 /* Make a ".reg/999" section. */
10042
10043 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
10044 len = strlen (buf) + 1;
10045 name = bfd_alloc (abfd, len);
10046 if (name == NULL)
10047 return FALSE;
10048 memcpy (name, buf, len);
10049
10050 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10051 if (sect == NULL)
10052 return FALSE;
10053
10054 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10055 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
10056 sect->filepos = note->descpos
10057 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
10058 #endif
10059
10060 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10061 sect->size = sizeof (lwpstat.pr_reg);
10062 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
10063 #endif
10064
10065 sect->alignment_power = 2;
10066
10067 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
10068 return FALSE;
10069
10070 /* Make a ".reg2/999" section */
10071
10072 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
10073 len = strlen (buf) + 1;
10074 name = bfd_alloc (abfd, len);
10075 if (name == NULL)
10076 return FALSE;
10077 memcpy (name, buf, len);
10078
10079 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10080 if (sect == NULL)
10081 return FALSE;
10082
10083 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10084 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10085 sect->filepos = note->descpos
10086 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10087 #endif
10088
10089 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10090 sect->size = sizeof (lwpstat.pr_fpreg);
10091 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10092 #endif
10093
10094 sect->alignment_power = 2;
10095
10096 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10097 }
10098 #endif /* defined (HAVE_LWPSTATUS_T) */
10099
10100 /* These constants, and the structure offsets used below, are defined by
10101 Cygwin's core_dump.h */
10102 #define NOTE_INFO_PROCESS 1
10103 #define NOTE_INFO_THREAD 2
10104 #define NOTE_INFO_MODULE 3
10105 #define NOTE_INFO_MODULE64 4
10106
10107 static bfd_boolean
10108 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10109 {
10110 char buf[30];
10111 char *name;
10112 size_t len;
10113 unsigned int name_size;
10114 asection *sect;
10115 unsigned int type;
10116 int is_active_thread;
10117 bfd_vma base_addr;
10118
10119 if (note->descsz < 4)
10120 return TRUE;
10121
10122 if (! CONST_STRNEQ (note->namedata, "win32"))
10123 return TRUE;
10124
10125 type = bfd_get_32 (abfd, note->descdata);
10126
10127 struct {
10128 const char *type_name;
10129 unsigned long min_size;
10130 } size_check[] =
10131 {
10132 { "NOTE_INFO_PROCESS", 12 },
10133 { "NOTE_INFO_THREAD", 12 },
10134 { "NOTE_INFO_MODULE", 12 },
10135 { "NOTE_INFO_MODULE64", 16 },
10136 };
10137
10138 if (type > (sizeof(size_check)/sizeof(size_check[0])))
10139 return TRUE;
10140
10141 if (note->descsz < size_check[type - 1].min_size)
10142 {
10143 _bfd_error_handler (_("%pB: warning: win32pstatus %s of size %lu bytes is too small"),
10144 abfd, size_check[type - 1].type_name, note->descsz);
10145 return TRUE;
10146 }
10147
10148 switch (type)
10149 {
10150 case NOTE_INFO_PROCESS:
10151 /* FIXME: need to add ->core->command. */
10152 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 4);
10153 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 8);
10154 break;
10155
10156 case NOTE_INFO_THREAD:
10157 /* Make a ".reg/<tid>" section containing the Win32 API thread CONTEXT
10158 structure. */
10159 /* thread_info.tid */
10160 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 4));
10161
10162 len = strlen (buf) + 1;
10163 name = (char *) bfd_alloc (abfd, len);
10164 if (name == NULL)
10165 return FALSE;
10166
10167 memcpy (name, buf, len);
10168
10169 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10170 if (sect == NULL)
10171 return FALSE;
10172
10173 /* sizeof (thread_info.thread_context) */
10174 sect->size = note->descsz - 12;
10175 /* offsetof (thread_info.thread_context) */
10176 sect->filepos = note->descpos + 12;
10177 sect->alignment_power = 2;
10178
10179 /* thread_info.is_active_thread */
10180 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10181
10182 if (is_active_thread)
10183 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10184 return FALSE;
10185 break;
10186
10187 case NOTE_INFO_MODULE:
10188 case NOTE_INFO_MODULE64:
10189 /* Make a ".module/xxxxxxxx" section. */
10190 if (type == NOTE_INFO_MODULE)
10191 {
10192 /* module_info.base_address */
10193 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10194 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10195 /* module_info.module_name_size */
10196 name_size = bfd_get_32 (abfd, note->descdata + 8);
10197 }
10198 else /* NOTE_INFO_MODULE64 */
10199 {
10200 /* module_info.base_address */
10201 base_addr = bfd_get_64 (abfd, note->descdata + 4);
10202 sprintf (buf, ".module/%016lx", (unsigned long) base_addr);
10203 /* module_info.module_name_size */
10204 name_size = bfd_get_32 (abfd, note->descdata + 12);
10205 }
10206
10207 len = strlen (buf) + 1;
10208 name = (char *) bfd_alloc (abfd, len);
10209 if (name == NULL)
10210 return FALSE;
10211
10212 memcpy (name, buf, len);
10213
10214 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10215
10216 if (sect == NULL)
10217 return FALSE;
10218
10219 if (note->descsz < 12 + name_size)
10220 {
10221 _bfd_error_handler (_("%pB: win32pstatus NOTE_INFO_MODULE of size %lu is too small to contain a name of size %u"),
10222 abfd, note->descsz, name_size);
10223 return TRUE;
10224 }
10225
10226 sect->size = note->descsz;
10227 sect->filepos = note->descpos;
10228 sect->alignment_power = 2;
10229 break;
10230
10231 default:
10232 return TRUE;
10233 }
10234
10235 return TRUE;
10236 }
10237
10238 static bfd_boolean
10239 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10240 {
10241 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10242
10243 switch (note->type)
10244 {
10245 default:
10246 return TRUE;
10247
10248 case NT_PRSTATUS:
10249 if (bed->elf_backend_grok_prstatus)
10250 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10251 return TRUE;
10252 #if defined (HAVE_PRSTATUS_T)
10253 return elfcore_grok_prstatus (abfd, note);
10254 #else
10255 return TRUE;
10256 #endif
10257
10258 #if defined (HAVE_PSTATUS_T)
10259 case NT_PSTATUS:
10260 return elfcore_grok_pstatus (abfd, note);
10261 #endif
10262
10263 #if defined (HAVE_LWPSTATUS_T)
10264 case NT_LWPSTATUS:
10265 return elfcore_grok_lwpstatus (abfd, note);
10266 #endif
10267
10268 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10269 return elfcore_grok_prfpreg (abfd, note);
10270
10271 case NT_WIN32PSTATUS:
10272 return elfcore_grok_win32pstatus (abfd, note);
10273
10274 case NT_PRXFPREG: /* Linux SSE extension */
10275 if (note->namesz == 6
10276 && strcmp (note->namedata, "LINUX") == 0)
10277 return elfcore_grok_prxfpreg (abfd, note);
10278 else
10279 return TRUE;
10280
10281 case NT_X86_XSTATE: /* Linux XSAVE extension */
10282 if (note->namesz == 6
10283 && strcmp (note->namedata, "LINUX") == 0)
10284 return elfcore_grok_xstatereg (abfd, note);
10285 else
10286 return TRUE;
10287
10288 case NT_PPC_VMX:
10289 if (note->namesz == 6
10290 && strcmp (note->namedata, "LINUX") == 0)
10291 return elfcore_grok_ppc_vmx (abfd, note);
10292 else
10293 return TRUE;
10294
10295 case NT_PPC_VSX:
10296 if (note->namesz == 6
10297 && strcmp (note->namedata, "LINUX") == 0)
10298 return elfcore_grok_ppc_vsx (abfd, note);
10299 else
10300 return TRUE;
10301
10302 case NT_PPC_TAR:
10303 if (note->namesz == 6
10304 && strcmp (note->namedata, "LINUX") == 0)
10305 return elfcore_grok_ppc_tar (abfd, note);
10306 else
10307 return TRUE;
10308
10309 case NT_PPC_PPR:
10310 if (note->namesz == 6
10311 && strcmp (note->namedata, "LINUX") == 0)
10312 return elfcore_grok_ppc_ppr (abfd, note);
10313 else
10314 return TRUE;
10315
10316 case NT_PPC_DSCR:
10317 if (note->namesz == 6
10318 && strcmp (note->namedata, "LINUX") == 0)
10319 return elfcore_grok_ppc_dscr (abfd, note);
10320 else
10321 return TRUE;
10322
10323 case NT_PPC_EBB:
10324 if (note->namesz == 6
10325 && strcmp (note->namedata, "LINUX") == 0)
10326 return elfcore_grok_ppc_ebb (abfd, note);
10327 else
10328 return TRUE;
10329
10330 case NT_PPC_PMU:
10331 if (note->namesz == 6
10332 && strcmp (note->namedata, "LINUX") == 0)
10333 return elfcore_grok_ppc_pmu (abfd, note);
10334 else
10335 return TRUE;
10336
10337 case NT_PPC_TM_CGPR:
10338 if (note->namesz == 6
10339 && strcmp (note->namedata, "LINUX") == 0)
10340 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10341 else
10342 return TRUE;
10343
10344 case NT_PPC_TM_CFPR:
10345 if (note->namesz == 6
10346 && strcmp (note->namedata, "LINUX") == 0)
10347 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10348 else
10349 return TRUE;
10350
10351 case NT_PPC_TM_CVMX:
10352 if (note->namesz == 6
10353 && strcmp (note->namedata, "LINUX") == 0)
10354 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10355 else
10356 return TRUE;
10357
10358 case NT_PPC_TM_CVSX:
10359 if (note->namesz == 6
10360 && strcmp (note->namedata, "LINUX") == 0)
10361 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10362 else
10363 return TRUE;
10364
10365 case NT_PPC_TM_SPR:
10366 if (note->namesz == 6
10367 && strcmp (note->namedata, "LINUX") == 0)
10368 return elfcore_grok_ppc_tm_spr (abfd, note);
10369 else
10370 return TRUE;
10371
10372 case NT_PPC_TM_CTAR:
10373 if (note->namesz == 6
10374 && strcmp (note->namedata, "LINUX") == 0)
10375 return elfcore_grok_ppc_tm_ctar (abfd, note);
10376 else
10377 return TRUE;
10378
10379 case NT_PPC_TM_CPPR:
10380 if (note->namesz == 6
10381 && strcmp (note->namedata, "LINUX") == 0)
10382 return elfcore_grok_ppc_tm_cppr (abfd, note);
10383 else
10384 return TRUE;
10385
10386 case NT_PPC_TM_CDSCR:
10387 if (note->namesz == 6
10388 && strcmp (note->namedata, "LINUX") == 0)
10389 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10390 else
10391 return TRUE;
10392
10393 case NT_S390_HIGH_GPRS:
10394 if (note->namesz == 6
10395 && strcmp (note->namedata, "LINUX") == 0)
10396 return elfcore_grok_s390_high_gprs (abfd, note);
10397 else
10398 return TRUE;
10399
10400 case NT_S390_TIMER:
10401 if (note->namesz == 6
10402 && strcmp (note->namedata, "LINUX") == 0)
10403 return elfcore_grok_s390_timer (abfd, note);
10404 else
10405 return TRUE;
10406
10407 case NT_S390_TODCMP:
10408 if (note->namesz == 6
10409 && strcmp (note->namedata, "LINUX") == 0)
10410 return elfcore_grok_s390_todcmp (abfd, note);
10411 else
10412 return TRUE;
10413
10414 case NT_S390_TODPREG:
10415 if (note->namesz == 6
10416 && strcmp (note->namedata, "LINUX") == 0)
10417 return elfcore_grok_s390_todpreg (abfd, note);
10418 else
10419 return TRUE;
10420
10421 case NT_S390_CTRS:
10422 if (note->namesz == 6
10423 && strcmp (note->namedata, "LINUX") == 0)
10424 return elfcore_grok_s390_ctrs (abfd, note);
10425 else
10426 return TRUE;
10427
10428 case NT_S390_PREFIX:
10429 if (note->namesz == 6
10430 && strcmp (note->namedata, "LINUX") == 0)
10431 return elfcore_grok_s390_prefix (abfd, note);
10432 else
10433 return TRUE;
10434
10435 case NT_S390_LAST_BREAK:
10436 if (note->namesz == 6
10437 && strcmp (note->namedata, "LINUX") == 0)
10438 return elfcore_grok_s390_last_break (abfd, note);
10439 else
10440 return TRUE;
10441
10442 case NT_S390_SYSTEM_CALL:
10443 if (note->namesz == 6
10444 && strcmp (note->namedata, "LINUX") == 0)
10445 return elfcore_grok_s390_system_call (abfd, note);
10446 else
10447 return TRUE;
10448
10449 case NT_S390_TDB:
10450 if (note->namesz == 6
10451 && strcmp (note->namedata, "LINUX") == 0)
10452 return elfcore_grok_s390_tdb (abfd, note);
10453 else
10454 return TRUE;
10455
10456 case NT_S390_VXRS_LOW:
10457 if (note->namesz == 6
10458 && strcmp (note->namedata, "LINUX") == 0)
10459 return elfcore_grok_s390_vxrs_low (abfd, note);
10460 else
10461 return TRUE;
10462
10463 case NT_S390_VXRS_HIGH:
10464 if (note->namesz == 6
10465 && strcmp (note->namedata, "LINUX") == 0)
10466 return elfcore_grok_s390_vxrs_high (abfd, note);
10467 else
10468 return TRUE;
10469
10470 case NT_S390_GS_CB:
10471 if (note->namesz == 6
10472 && strcmp (note->namedata, "LINUX") == 0)
10473 return elfcore_grok_s390_gs_cb (abfd, note);
10474 else
10475 return TRUE;
10476
10477 case NT_S390_GS_BC:
10478 if (note->namesz == 6
10479 && strcmp (note->namedata, "LINUX") == 0)
10480 return elfcore_grok_s390_gs_bc (abfd, note);
10481 else
10482 return TRUE;
10483
10484 case NT_ARC_V2:
10485 if (note->namesz == 6
10486 && strcmp (note->namedata, "LINUX") == 0)
10487 return elfcore_grok_arc_v2 (abfd, note);
10488 else
10489 return TRUE;
10490
10491 case NT_ARM_VFP:
10492 if (note->namesz == 6
10493 && strcmp (note->namedata, "LINUX") == 0)
10494 return elfcore_grok_arm_vfp (abfd, note);
10495 else
10496 return TRUE;
10497
10498 case NT_ARM_TLS:
10499 if (note->namesz == 6
10500 && strcmp (note->namedata, "LINUX") == 0)
10501 return elfcore_grok_aarch_tls (abfd, note);
10502 else
10503 return TRUE;
10504
10505 case NT_ARM_HW_BREAK:
10506 if (note->namesz == 6
10507 && strcmp (note->namedata, "LINUX") == 0)
10508 return elfcore_grok_aarch_hw_break (abfd, note);
10509 else
10510 return TRUE;
10511
10512 case NT_ARM_HW_WATCH:
10513 if (note->namesz == 6
10514 && strcmp (note->namedata, "LINUX") == 0)
10515 return elfcore_grok_aarch_hw_watch (abfd, note);
10516 else
10517 return TRUE;
10518
10519 case NT_ARM_SVE:
10520 if (note->namesz == 6
10521 && strcmp (note->namedata, "LINUX") == 0)
10522 return elfcore_grok_aarch_sve (abfd, note);
10523 else
10524 return TRUE;
10525
10526 case NT_ARM_PAC_MASK:
10527 if (note->namesz == 6
10528 && strcmp (note->namedata, "LINUX") == 0)
10529 return elfcore_grok_aarch_pauth (abfd, note);
10530 else
10531 return TRUE;
10532
10533 case NT_PRPSINFO:
10534 case NT_PSINFO:
10535 if (bed->elf_backend_grok_psinfo)
10536 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10537 return TRUE;
10538 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10539 return elfcore_grok_psinfo (abfd, note);
10540 #else
10541 return TRUE;
10542 #endif
10543
10544 case NT_AUXV:
10545 return elfcore_make_auxv_note_section (abfd, note, 0);
10546
10547 case NT_FILE:
10548 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10549 note);
10550
10551 case NT_SIGINFO:
10552 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10553 note);
10554
10555 }
10556 }
10557
10558 static bfd_boolean
10559 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10560 {
10561 struct bfd_build_id* build_id;
10562
10563 if (note->descsz == 0)
10564 return FALSE;
10565
10566 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10567 if (build_id == NULL)
10568 return FALSE;
10569
10570 build_id->size = note->descsz;
10571 memcpy (build_id->data, note->descdata, note->descsz);
10572 abfd->build_id = build_id;
10573
10574 return TRUE;
10575 }
10576
10577 static bfd_boolean
10578 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10579 {
10580 switch (note->type)
10581 {
10582 default:
10583 return TRUE;
10584
10585 case NT_GNU_PROPERTY_TYPE_0:
10586 return _bfd_elf_parse_gnu_properties (abfd, note);
10587
10588 case NT_GNU_BUILD_ID:
10589 return elfobj_grok_gnu_build_id (abfd, note);
10590 }
10591 }
10592
10593 static bfd_boolean
10594 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10595 {
10596 struct sdt_note *cur =
10597 (struct sdt_note *) bfd_alloc (abfd,
10598 sizeof (struct sdt_note) + note->descsz);
10599
10600 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10601 cur->size = (bfd_size_type) note->descsz;
10602 memcpy (cur->data, note->descdata, note->descsz);
10603
10604 elf_tdata (abfd)->sdt_note_head = cur;
10605
10606 return TRUE;
10607 }
10608
10609 static bfd_boolean
10610 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10611 {
10612 switch (note->type)
10613 {
10614 case NT_STAPSDT:
10615 return elfobj_grok_stapsdt_note_1 (abfd, note);
10616
10617 default:
10618 return TRUE;
10619 }
10620 }
10621
10622 static bfd_boolean
10623 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10624 {
10625 size_t offset;
10626
10627 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10628 {
10629 case ELFCLASS32:
10630 if (note->descsz < 108)
10631 return FALSE;
10632 break;
10633
10634 case ELFCLASS64:
10635 if (note->descsz < 120)
10636 return FALSE;
10637 break;
10638
10639 default:
10640 return FALSE;
10641 }
10642
10643 /* Check for version 1 in pr_version. */
10644 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10645 return FALSE;
10646
10647 offset = 4;
10648
10649 /* Skip over pr_psinfosz. */
10650 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10651 offset += 4;
10652 else
10653 {
10654 offset += 4; /* Padding before pr_psinfosz. */
10655 offset += 8;
10656 }
10657
10658 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10659 elf_tdata (abfd)->core->program
10660 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10661 offset += 17;
10662
10663 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10664 elf_tdata (abfd)->core->command
10665 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10666 offset += 81;
10667
10668 /* Padding before pr_pid. */
10669 offset += 2;
10670
10671 /* The pr_pid field was added in version "1a". */
10672 if (note->descsz < offset + 4)
10673 return TRUE;
10674
10675 elf_tdata (abfd)->core->pid
10676 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10677
10678 return TRUE;
10679 }
10680
10681 static bfd_boolean
10682 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10683 {
10684 size_t offset;
10685 size_t size;
10686 size_t min_size;
10687
10688 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10689 Also compute minimum size of this note. */
10690 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10691 {
10692 case ELFCLASS32:
10693 offset = 4 + 4;
10694 min_size = offset + (4 * 2) + 4 + 4 + 4;
10695 break;
10696
10697 case ELFCLASS64:
10698 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10699 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10700 break;
10701
10702 default:
10703 return FALSE;
10704 }
10705
10706 if (note->descsz < min_size)
10707 return FALSE;
10708
10709 /* Check for version 1 in pr_version. */
10710 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10711 return FALSE;
10712
10713 /* Extract size of pr_reg from pr_gregsetsz. */
10714 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10715 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10716 {
10717 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10718 offset += 4 * 2;
10719 }
10720 else
10721 {
10722 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10723 offset += 8 * 2;
10724 }
10725
10726 /* Skip over pr_osreldate. */
10727 offset += 4;
10728
10729 /* Read signal from pr_cursig. */
10730 if (elf_tdata (abfd)->core->signal == 0)
10731 elf_tdata (abfd)->core->signal
10732 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10733 offset += 4;
10734
10735 /* Read TID from pr_pid. */
10736 elf_tdata (abfd)->core->lwpid
10737 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10738 offset += 4;
10739
10740 /* Padding before pr_reg. */
10741 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10742 offset += 4;
10743
10744 /* Make sure that there is enough data remaining in the note. */
10745 if ((note->descsz - offset) < size)
10746 return FALSE;
10747
10748 /* Make a ".reg/999" section and a ".reg" section. */
10749 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10750 size, note->descpos + offset);
10751 }
10752
10753 static bfd_boolean
10754 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10755 {
10756 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10757
10758 switch (note->type)
10759 {
10760 case NT_PRSTATUS:
10761 if (bed->elf_backend_grok_freebsd_prstatus)
10762 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10763 return TRUE;
10764 return elfcore_grok_freebsd_prstatus (abfd, note);
10765
10766 case NT_FPREGSET:
10767 return elfcore_grok_prfpreg (abfd, note);
10768
10769 case NT_PRPSINFO:
10770 return elfcore_grok_freebsd_psinfo (abfd, note);
10771
10772 case NT_FREEBSD_THRMISC:
10773 if (note->namesz == 8)
10774 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10775 else
10776 return TRUE;
10777
10778 case NT_FREEBSD_PROCSTAT_PROC:
10779 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10780 note);
10781
10782 case NT_FREEBSD_PROCSTAT_FILES:
10783 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10784 note);
10785
10786 case NT_FREEBSD_PROCSTAT_VMMAP:
10787 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10788 note);
10789
10790 case NT_FREEBSD_PROCSTAT_AUXV:
10791 return elfcore_make_auxv_note_section (abfd, note, 4);
10792
10793 case NT_X86_XSTATE:
10794 if (note->namesz == 8)
10795 return elfcore_grok_xstatereg (abfd, note);
10796 else
10797 return TRUE;
10798
10799 case NT_FREEBSD_PTLWPINFO:
10800 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10801 note);
10802
10803 case NT_ARM_VFP:
10804 return elfcore_grok_arm_vfp (abfd, note);
10805
10806 default:
10807 return TRUE;
10808 }
10809 }
10810
10811 static bfd_boolean
10812 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10813 {
10814 char *cp;
10815
10816 cp = strchr (note->namedata, '@');
10817 if (cp != NULL)
10818 {
10819 *lwpidp = atoi(cp + 1);
10820 return TRUE;
10821 }
10822 return FALSE;
10823 }
10824
10825 static bfd_boolean
10826 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10827 {
10828 if (note->descsz <= 0x7c + 31)
10829 return FALSE;
10830
10831 /* Signal number at offset 0x08. */
10832 elf_tdata (abfd)->core->signal
10833 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10834
10835 /* Process ID at offset 0x50. */
10836 elf_tdata (abfd)->core->pid
10837 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10838
10839 /* Command name at 0x7c (max 32 bytes, including nul). */
10840 elf_tdata (abfd)->core->command
10841 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10842
10843 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10844 note);
10845 }
10846
10847 static bfd_boolean
10848 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10849 {
10850 int lwp;
10851
10852 if (elfcore_netbsd_get_lwpid (note, &lwp))
10853 elf_tdata (abfd)->core->lwpid = lwp;
10854
10855 switch (note->type)
10856 {
10857 case NT_NETBSDCORE_PROCINFO:
10858 /* NetBSD-specific core "procinfo". Note that we expect to
10859 find this note before any of the others, which is fine,
10860 since the kernel writes this note out first when it
10861 creates a core file. */
10862 return elfcore_grok_netbsd_procinfo (abfd, note);
10863 #ifdef NT_NETBSDCORE_AUXV
10864 case NT_NETBSDCORE_AUXV:
10865 /* NetBSD-specific Elf Auxiliary Vector data. */
10866 return elfcore_make_auxv_note_section (abfd, note, 4);
10867 #endif
10868 #ifdef NT_NETBSDCORE_LWPSTATUS
10869 case NT_NETBSDCORE_LWPSTATUS:
10870 return elfcore_make_note_pseudosection (abfd,
10871 ".note.netbsdcore.lwpstatus",
10872 note);
10873 #endif
10874 default:
10875 break;
10876 }
10877
10878 /* As of March 2020 there are no other machine-independent notes
10879 defined for NetBSD core files. If the note type is less
10880 than the start of the machine-dependent note types, we don't
10881 understand it. */
10882
10883 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10884 return TRUE;
10885
10886
10887 switch (bfd_get_arch (abfd))
10888 {
10889 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10890 PT_GETFPREGS == mach+2. */
10891
10892 case bfd_arch_aarch64:
10893 case bfd_arch_alpha:
10894 case bfd_arch_sparc:
10895 switch (note->type)
10896 {
10897 case NT_NETBSDCORE_FIRSTMACH+0:
10898 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10899
10900 case NT_NETBSDCORE_FIRSTMACH+2:
10901 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10902
10903 default:
10904 return TRUE;
10905 }
10906
10907 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10908 There's also old PT___GETREGS40 == mach + 1 for old reg
10909 structure which lacks GBR. */
10910
10911 case bfd_arch_sh:
10912 switch (note->type)
10913 {
10914 case NT_NETBSDCORE_FIRSTMACH+3:
10915 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10916
10917 case NT_NETBSDCORE_FIRSTMACH+5:
10918 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10919
10920 default:
10921 return TRUE;
10922 }
10923
10924 /* On all other arch's, PT_GETREGS == mach+1 and
10925 PT_GETFPREGS == mach+3. */
10926
10927 default:
10928 switch (note->type)
10929 {
10930 case NT_NETBSDCORE_FIRSTMACH+1:
10931 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10932
10933 case NT_NETBSDCORE_FIRSTMACH+3:
10934 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10935
10936 default:
10937 return TRUE;
10938 }
10939 }
10940 /* NOTREACHED */
10941 }
10942
10943 static bfd_boolean
10944 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10945 {
10946 if (note->descsz <= 0x48 + 31)
10947 return FALSE;
10948
10949 /* Signal number at offset 0x08. */
10950 elf_tdata (abfd)->core->signal
10951 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10952
10953 /* Process ID at offset 0x20. */
10954 elf_tdata (abfd)->core->pid
10955 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10956
10957 /* Command name at 0x48 (max 32 bytes, including nul). */
10958 elf_tdata (abfd)->core->command
10959 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10960
10961 return TRUE;
10962 }
10963
10964 static bfd_boolean
10965 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10966 {
10967 if (note->type == NT_OPENBSD_PROCINFO)
10968 return elfcore_grok_openbsd_procinfo (abfd, note);
10969
10970 if (note->type == NT_OPENBSD_REGS)
10971 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10972
10973 if (note->type == NT_OPENBSD_FPREGS)
10974 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10975
10976 if (note->type == NT_OPENBSD_XFPREGS)
10977 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10978
10979 if (note->type == NT_OPENBSD_AUXV)
10980 return elfcore_make_auxv_note_section (abfd, note, 0);
10981
10982 if (note->type == NT_OPENBSD_WCOOKIE)
10983 {
10984 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10985 SEC_HAS_CONTENTS);
10986
10987 if (sect == NULL)
10988 return FALSE;
10989 sect->size = note->descsz;
10990 sect->filepos = note->descpos;
10991 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10992
10993 return TRUE;
10994 }
10995
10996 return TRUE;
10997 }
10998
10999 static bfd_boolean
11000 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
11001 {
11002 void *ddata = note->descdata;
11003 char buf[100];
11004 char *name;
11005 asection *sect;
11006 short sig;
11007 unsigned flags;
11008
11009 if (note->descsz < 16)
11010 return FALSE;
11011
11012 /* nto_procfs_status 'pid' field is at offset 0. */
11013 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
11014
11015 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
11016 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
11017
11018 /* nto_procfs_status 'flags' field is at offset 8. */
11019 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
11020
11021 /* nto_procfs_status 'what' field is at offset 14. */
11022 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
11023 {
11024 elf_tdata (abfd)->core->signal = sig;
11025 elf_tdata (abfd)->core->lwpid = *tid;
11026 }
11027
11028 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
11029 do not come from signals so we make sure we set the current
11030 thread just in case. */
11031 if (flags & 0x00000080)
11032 elf_tdata (abfd)->core->lwpid = *tid;
11033
11034 /* Make a ".qnx_core_status/%d" section. */
11035 sprintf (buf, ".qnx_core_status/%ld", *tid);
11036
11037 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11038 if (name == NULL)
11039 return FALSE;
11040 strcpy (name, buf);
11041
11042 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11043 if (sect == NULL)
11044 return FALSE;
11045
11046 sect->size = note->descsz;
11047 sect->filepos = note->descpos;
11048 sect->alignment_power = 2;
11049
11050 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
11051 }
11052
11053 static bfd_boolean
11054 elfcore_grok_nto_regs (bfd *abfd,
11055 Elf_Internal_Note *note,
11056 long tid,
11057 char *base)
11058 {
11059 char buf[100];
11060 char *name;
11061 asection *sect;
11062
11063 /* Make a "(base)/%d" section. */
11064 sprintf (buf, "%s/%ld", base, tid);
11065
11066 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11067 if (name == NULL)
11068 return FALSE;
11069 strcpy (name, buf);
11070
11071 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11072 if (sect == NULL)
11073 return FALSE;
11074
11075 sect->size = note->descsz;
11076 sect->filepos = note->descpos;
11077 sect->alignment_power = 2;
11078
11079 /* This is the current thread. */
11080 if (elf_tdata (abfd)->core->lwpid == tid)
11081 return elfcore_maybe_make_sect (abfd, base, sect);
11082
11083 return TRUE;
11084 }
11085
11086 #define BFD_QNT_CORE_INFO 7
11087 #define BFD_QNT_CORE_STATUS 8
11088 #define BFD_QNT_CORE_GREG 9
11089 #define BFD_QNT_CORE_FPREG 10
11090
11091 static bfd_boolean
11092 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
11093 {
11094 /* Every GREG section has a STATUS section before it. Store the
11095 tid from the previous call to pass down to the next gregs
11096 function. */
11097 static long tid = 1;
11098
11099 switch (note->type)
11100 {
11101 case BFD_QNT_CORE_INFO:
11102 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
11103 case BFD_QNT_CORE_STATUS:
11104 return elfcore_grok_nto_status (abfd, note, &tid);
11105 case BFD_QNT_CORE_GREG:
11106 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
11107 case BFD_QNT_CORE_FPREG:
11108 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
11109 default:
11110 return TRUE;
11111 }
11112 }
11113
11114 static bfd_boolean
11115 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
11116 {
11117 char *name;
11118 asection *sect;
11119 size_t len;
11120
11121 /* Use note name as section name. */
11122 len = note->namesz;
11123 name = (char *) bfd_alloc (abfd, len);
11124 if (name == NULL)
11125 return FALSE;
11126 memcpy (name, note->namedata, len);
11127 name[len - 1] = '\0';
11128
11129 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11130 if (sect == NULL)
11131 return FALSE;
11132
11133 sect->size = note->descsz;
11134 sect->filepos = note->descpos;
11135 sect->alignment_power = 1;
11136
11137 return TRUE;
11138 }
11139
11140 /* Function: elfcore_write_note
11141
11142 Inputs:
11143 buffer to hold note, and current size of buffer
11144 name of note
11145 type of note
11146 data for note
11147 size of data for note
11148
11149 Writes note to end of buffer. ELF64 notes are written exactly as
11150 for ELF32, despite the current (as of 2006) ELF gabi specifying
11151 that they ought to have 8-byte namesz and descsz field, and have
11152 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11153
11154 Return:
11155 Pointer to realloc'd buffer, *BUFSIZ updated. */
11156
11157 char *
11158 elfcore_write_note (bfd *abfd,
11159 char *buf,
11160 int *bufsiz,
11161 const char *name,
11162 int type,
11163 const void *input,
11164 int size)
11165 {
11166 Elf_External_Note *xnp;
11167 size_t namesz;
11168 size_t newspace;
11169 char *dest;
11170
11171 namesz = 0;
11172 if (name != NULL)
11173 namesz = strlen (name) + 1;
11174
11175 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11176
11177 buf = (char *) realloc (buf, *bufsiz + newspace);
11178 if (buf == NULL)
11179 return buf;
11180 dest = buf + *bufsiz;
11181 *bufsiz += newspace;
11182 xnp = (Elf_External_Note *) dest;
11183 H_PUT_32 (abfd, namesz, xnp->namesz);
11184 H_PUT_32 (abfd, size, xnp->descsz);
11185 H_PUT_32 (abfd, type, xnp->type);
11186 dest = xnp->name;
11187 if (name != NULL)
11188 {
11189 memcpy (dest, name, namesz);
11190 dest += namesz;
11191 while (namesz & 3)
11192 {
11193 *dest++ = '\0';
11194 ++namesz;
11195 }
11196 }
11197 memcpy (dest, input, size);
11198 dest += size;
11199 while (size & 3)
11200 {
11201 *dest++ = '\0';
11202 ++size;
11203 }
11204 return buf;
11205 }
11206
11207 /* gcc-8 warns (*) on all the strncpy calls in this function about
11208 possible string truncation. The "truncation" is not a bug. We
11209 have an external representation of structs with fields that are not
11210 necessarily NULL terminated and corresponding internal
11211 representation fields that are one larger so that they can always
11212 be NULL terminated.
11213 gcc versions between 4.2 and 4.6 do not allow pragma control of
11214 diagnostics inside functions, giving a hard error if you try to use
11215 the finer control available with later versions.
11216 gcc prior to 4.2 warns about diagnostic push and pop.
11217 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11218 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11219 (*) Depending on your system header files! */
11220 #if GCC_VERSION >= 8000
11221 # pragma GCC diagnostic push
11222 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11223 #endif
11224 char *
11225 elfcore_write_prpsinfo (bfd *abfd,
11226 char *buf,
11227 int *bufsiz,
11228 const char *fname,
11229 const char *psargs)
11230 {
11231 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11232
11233 if (bed->elf_backend_write_core_note != NULL)
11234 {
11235 char *ret;
11236 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11237 NT_PRPSINFO, fname, psargs);
11238 if (ret != NULL)
11239 return ret;
11240 }
11241
11242 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11243 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11244 if (bed->s->elfclass == ELFCLASS32)
11245 {
11246 # if defined (HAVE_PSINFO32_T)
11247 psinfo32_t data;
11248 int note_type = NT_PSINFO;
11249 # else
11250 prpsinfo32_t data;
11251 int note_type = NT_PRPSINFO;
11252 # endif
11253
11254 memset (&data, 0, sizeof (data));
11255 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11256 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11257 return elfcore_write_note (abfd, buf, bufsiz,
11258 "CORE", note_type, &data, sizeof (data));
11259 }
11260 else
11261 # endif
11262 {
11263 # if defined (HAVE_PSINFO_T)
11264 psinfo_t data;
11265 int note_type = NT_PSINFO;
11266 # else
11267 prpsinfo_t data;
11268 int note_type = NT_PRPSINFO;
11269 # endif
11270
11271 memset (&data, 0, sizeof (data));
11272 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11273 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11274 return elfcore_write_note (abfd, buf, bufsiz,
11275 "CORE", note_type, &data, sizeof (data));
11276 }
11277 #endif /* PSINFO_T or PRPSINFO_T */
11278
11279 free (buf);
11280 return NULL;
11281 }
11282 #if GCC_VERSION >= 8000
11283 # pragma GCC diagnostic pop
11284 #endif
11285
11286 char *
11287 elfcore_write_linux_prpsinfo32
11288 (bfd *abfd, char *buf, int *bufsiz,
11289 const struct elf_internal_linux_prpsinfo *prpsinfo)
11290 {
11291 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11292 {
11293 struct elf_external_linux_prpsinfo32_ugid16 data;
11294
11295 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11296 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11297 &data, sizeof (data));
11298 }
11299 else
11300 {
11301 struct elf_external_linux_prpsinfo32_ugid32 data;
11302
11303 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11304 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11305 &data, sizeof (data));
11306 }
11307 }
11308
11309 char *
11310 elfcore_write_linux_prpsinfo64
11311 (bfd *abfd, char *buf, int *bufsiz,
11312 const struct elf_internal_linux_prpsinfo *prpsinfo)
11313 {
11314 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11315 {
11316 struct elf_external_linux_prpsinfo64_ugid16 data;
11317
11318 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11319 return elfcore_write_note (abfd, buf, bufsiz,
11320 "CORE", NT_PRPSINFO, &data, sizeof (data));
11321 }
11322 else
11323 {
11324 struct elf_external_linux_prpsinfo64_ugid32 data;
11325
11326 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11327 return elfcore_write_note (abfd, buf, bufsiz,
11328 "CORE", NT_PRPSINFO, &data, sizeof (data));
11329 }
11330 }
11331
11332 char *
11333 elfcore_write_prstatus (bfd *abfd,
11334 char *buf,
11335 int *bufsiz,
11336 long pid,
11337 int cursig,
11338 const void *gregs)
11339 {
11340 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11341
11342 if (bed->elf_backend_write_core_note != NULL)
11343 {
11344 char *ret;
11345 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11346 NT_PRSTATUS,
11347 pid, cursig, gregs);
11348 if (ret != NULL)
11349 return ret;
11350 }
11351
11352 #if defined (HAVE_PRSTATUS_T)
11353 #if defined (HAVE_PRSTATUS32_T)
11354 if (bed->s->elfclass == ELFCLASS32)
11355 {
11356 prstatus32_t prstat;
11357
11358 memset (&prstat, 0, sizeof (prstat));
11359 prstat.pr_pid = pid;
11360 prstat.pr_cursig = cursig;
11361 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11362 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11363 NT_PRSTATUS, &prstat, sizeof (prstat));
11364 }
11365 else
11366 #endif
11367 {
11368 prstatus_t prstat;
11369
11370 memset (&prstat, 0, sizeof (prstat));
11371 prstat.pr_pid = pid;
11372 prstat.pr_cursig = cursig;
11373 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11374 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11375 NT_PRSTATUS, &prstat, sizeof (prstat));
11376 }
11377 #endif /* HAVE_PRSTATUS_T */
11378
11379 free (buf);
11380 return NULL;
11381 }
11382
11383 #if defined (HAVE_LWPSTATUS_T)
11384 char *
11385 elfcore_write_lwpstatus (bfd *abfd,
11386 char *buf,
11387 int *bufsiz,
11388 long pid,
11389 int cursig,
11390 const void *gregs)
11391 {
11392 lwpstatus_t lwpstat;
11393 const char *note_name = "CORE";
11394
11395 memset (&lwpstat, 0, sizeof (lwpstat));
11396 lwpstat.pr_lwpid = pid >> 16;
11397 lwpstat.pr_cursig = cursig;
11398 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11399 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11400 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11401 #if !defined(gregs)
11402 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11403 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11404 #else
11405 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11406 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11407 #endif
11408 #endif
11409 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11410 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11411 }
11412 #endif /* HAVE_LWPSTATUS_T */
11413
11414 #if defined (HAVE_PSTATUS_T)
11415 char *
11416 elfcore_write_pstatus (bfd *abfd,
11417 char *buf,
11418 int *bufsiz,
11419 long pid,
11420 int cursig ATTRIBUTE_UNUSED,
11421 const void *gregs ATTRIBUTE_UNUSED)
11422 {
11423 const char *note_name = "CORE";
11424 #if defined (HAVE_PSTATUS32_T)
11425 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11426
11427 if (bed->s->elfclass == ELFCLASS32)
11428 {
11429 pstatus32_t pstat;
11430
11431 memset (&pstat, 0, sizeof (pstat));
11432 pstat.pr_pid = pid & 0xffff;
11433 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11434 NT_PSTATUS, &pstat, sizeof (pstat));
11435 return buf;
11436 }
11437 else
11438 #endif
11439 {
11440 pstatus_t pstat;
11441
11442 memset (&pstat, 0, sizeof (pstat));
11443 pstat.pr_pid = pid & 0xffff;
11444 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11445 NT_PSTATUS, &pstat, sizeof (pstat));
11446 return buf;
11447 }
11448 }
11449 #endif /* HAVE_PSTATUS_T */
11450
11451 char *
11452 elfcore_write_prfpreg (bfd *abfd,
11453 char *buf,
11454 int *bufsiz,
11455 const void *fpregs,
11456 int size)
11457 {
11458 const char *note_name = "CORE";
11459 return elfcore_write_note (abfd, buf, bufsiz,
11460 note_name, NT_FPREGSET, fpregs, size);
11461 }
11462
11463 char *
11464 elfcore_write_prxfpreg (bfd *abfd,
11465 char *buf,
11466 int *bufsiz,
11467 const void *xfpregs,
11468 int size)
11469 {
11470 char *note_name = "LINUX";
11471 return elfcore_write_note (abfd, buf, bufsiz,
11472 note_name, NT_PRXFPREG, xfpregs, size);
11473 }
11474
11475 char *
11476 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11477 const void *xfpregs, int size)
11478 {
11479 char *note_name;
11480 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11481 note_name = "FreeBSD";
11482 else
11483 note_name = "LINUX";
11484 return elfcore_write_note (abfd, buf, bufsiz,
11485 note_name, NT_X86_XSTATE, xfpregs, size);
11486 }
11487
11488 char *
11489 elfcore_write_ppc_vmx (bfd *abfd,
11490 char *buf,
11491 int *bufsiz,
11492 const void *ppc_vmx,
11493 int size)
11494 {
11495 char *note_name = "LINUX";
11496 return elfcore_write_note (abfd, buf, bufsiz,
11497 note_name, NT_PPC_VMX, ppc_vmx, size);
11498 }
11499
11500 char *
11501 elfcore_write_ppc_vsx (bfd *abfd,
11502 char *buf,
11503 int *bufsiz,
11504 const void *ppc_vsx,
11505 int size)
11506 {
11507 char *note_name = "LINUX";
11508 return elfcore_write_note (abfd, buf, bufsiz,
11509 note_name, NT_PPC_VSX, ppc_vsx, size);
11510 }
11511
11512 char *
11513 elfcore_write_ppc_tar (bfd *abfd,
11514 char *buf,
11515 int *bufsiz,
11516 const void *ppc_tar,
11517 int size)
11518 {
11519 char *note_name = "LINUX";
11520 return elfcore_write_note (abfd, buf, bufsiz,
11521 note_name, NT_PPC_TAR, ppc_tar, size);
11522 }
11523
11524 char *
11525 elfcore_write_ppc_ppr (bfd *abfd,
11526 char *buf,
11527 int *bufsiz,
11528 const void *ppc_ppr,
11529 int size)
11530 {
11531 char *note_name = "LINUX";
11532 return elfcore_write_note (abfd, buf, bufsiz,
11533 note_name, NT_PPC_PPR, ppc_ppr, size);
11534 }
11535
11536 char *
11537 elfcore_write_ppc_dscr (bfd *abfd,
11538 char *buf,
11539 int *bufsiz,
11540 const void *ppc_dscr,
11541 int size)
11542 {
11543 char *note_name = "LINUX";
11544 return elfcore_write_note (abfd, buf, bufsiz,
11545 note_name, NT_PPC_DSCR, ppc_dscr, size);
11546 }
11547
11548 char *
11549 elfcore_write_ppc_ebb (bfd *abfd,
11550 char *buf,
11551 int *bufsiz,
11552 const void *ppc_ebb,
11553 int size)
11554 {
11555 char *note_name = "LINUX";
11556 return elfcore_write_note (abfd, buf, bufsiz,
11557 note_name, NT_PPC_EBB, ppc_ebb, size);
11558 }
11559
11560 char *
11561 elfcore_write_ppc_pmu (bfd *abfd,
11562 char *buf,
11563 int *bufsiz,
11564 const void *ppc_pmu,
11565 int size)
11566 {
11567 char *note_name = "LINUX";
11568 return elfcore_write_note (abfd, buf, bufsiz,
11569 note_name, NT_PPC_PMU, ppc_pmu, size);
11570 }
11571
11572 char *
11573 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11574 char *buf,
11575 int *bufsiz,
11576 const void *ppc_tm_cgpr,
11577 int size)
11578 {
11579 char *note_name = "LINUX";
11580 return elfcore_write_note (abfd, buf, bufsiz,
11581 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11582 }
11583
11584 char *
11585 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11586 char *buf,
11587 int *bufsiz,
11588 const void *ppc_tm_cfpr,
11589 int size)
11590 {
11591 char *note_name = "LINUX";
11592 return elfcore_write_note (abfd, buf, bufsiz,
11593 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11594 }
11595
11596 char *
11597 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11598 char *buf,
11599 int *bufsiz,
11600 const void *ppc_tm_cvmx,
11601 int size)
11602 {
11603 char *note_name = "LINUX";
11604 return elfcore_write_note (abfd, buf, bufsiz,
11605 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11606 }
11607
11608 char *
11609 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11610 char *buf,
11611 int *bufsiz,
11612 const void *ppc_tm_cvsx,
11613 int size)
11614 {
11615 char *note_name = "LINUX";
11616 return elfcore_write_note (abfd, buf, bufsiz,
11617 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11618 }
11619
11620 char *
11621 elfcore_write_ppc_tm_spr (bfd *abfd,
11622 char *buf,
11623 int *bufsiz,
11624 const void *ppc_tm_spr,
11625 int size)
11626 {
11627 char *note_name = "LINUX";
11628 return elfcore_write_note (abfd, buf, bufsiz,
11629 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11630 }
11631
11632 char *
11633 elfcore_write_ppc_tm_ctar (bfd *abfd,
11634 char *buf,
11635 int *bufsiz,
11636 const void *ppc_tm_ctar,
11637 int size)
11638 {
11639 char *note_name = "LINUX";
11640 return elfcore_write_note (abfd, buf, bufsiz,
11641 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11642 }
11643
11644 char *
11645 elfcore_write_ppc_tm_cppr (bfd *abfd,
11646 char *buf,
11647 int *bufsiz,
11648 const void *ppc_tm_cppr,
11649 int size)
11650 {
11651 char *note_name = "LINUX";
11652 return elfcore_write_note (abfd, buf, bufsiz,
11653 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11654 }
11655
11656 char *
11657 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11658 char *buf,
11659 int *bufsiz,
11660 const void *ppc_tm_cdscr,
11661 int size)
11662 {
11663 char *note_name = "LINUX";
11664 return elfcore_write_note (abfd, buf, bufsiz,
11665 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11666 }
11667
11668 static char *
11669 elfcore_write_s390_high_gprs (bfd *abfd,
11670 char *buf,
11671 int *bufsiz,
11672 const void *s390_high_gprs,
11673 int size)
11674 {
11675 char *note_name = "LINUX";
11676 return elfcore_write_note (abfd, buf, bufsiz,
11677 note_name, NT_S390_HIGH_GPRS,
11678 s390_high_gprs, size);
11679 }
11680
11681 char *
11682 elfcore_write_s390_timer (bfd *abfd,
11683 char *buf,
11684 int *bufsiz,
11685 const void *s390_timer,
11686 int size)
11687 {
11688 char *note_name = "LINUX";
11689 return elfcore_write_note (abfd, buf, bufsiz,
11690 note_name, NT_S390_TIMER, s390_timer, size);
11691 }
11692
11693 char *
11694 elfcore_write_s390_todcmp (bfd *abfd,
11695 char *buf,
11696 int *bufsiz,
11697 const void *s390_todcmp,
11698 int size)
11699 {
11700 char *note_name = "LINUX";
11701 return elfcore_write_note (abfd, buf, bufsiz,
11702 note_name, NT_S390_TODCMP, s390_todcmp, size);
11703 }
11704
11705 char *
11706 elfcore_write_s390_todpreg (bfd *abfd,
11707 char *buf,
11708 int *bufsiz,
11709 const void *s390_todpreg,
11710 int size)
11711 {
11712 char *note_name = "LINUX";
11713 return elfcore_write_note (abfd, buf, bufsiz,
11714 note_name, NT_S390_TODPREG, s390_todpreg, size);
11715 }
11716
11717 char *
11718 elfcore_write_s390_ctrs (bfd *abfd,
11719 char *buf,
11720 int *bufsiz,
11721 const void *s390_ctrs,
11722 int size)
11723 {
11724 char *note_name = "LINUX";
11725 return elfcore_write_note (abfd, buf, bufsiz,
11726 note_name, NT_S390_CTRS, s390_ctrs, size);
11727 }
11728
11729 char *
11730 elfcore_write_s390_prefix (bfd *abfd,
11731 char *buf,
11732 int *bufsiz,
11733 const void *s390_prefix,
11734 int size)
11735 {
11736 char *note_name = "LINUX";
11737 return elfcore_write_note (abfd, buf, bufsiz,
11738 note_name, NT_S390_PREFIX, s390_prefix, size);
11739 }
11740
11741 char *
11742 elfcore_write_s390_last_break (bfd *abfd,
11743 char *buf,
11744 int *bufsiz,
11745 const void *s390_last_break,
11746 int size)
11747 {
11748 char *note_name = "LINUX";
11749 return elfcore_write_note (abfd, buf, bufsiz,
11750 note_name, NT_S390_LAST_BREAK,
11751 s390_last_break, size);
11752 }
11753
11754 char *
11755 elfcore_write_s390_system_call (bfd *abfd,
11756 char *buf,
11757 int *bufsiz,
11758 const void *s390_system_call,
11759 int size)
11760 {
11761 char *note_name = "LINUX";
11762 return elfcore_write_note (abfd, buf, bufsiz,
11763 note_name, NT_S390_SYSTEM_CALL,
11764 s390_system_call, size);
11765 }
11766
11767 char *
11768 elfcore_write_s390_tdb (bfd *abfd,
11769 char *buf,
11770 int *bufsiz,
11771 const void *s390_tdb,
11772 int size)
11773 {
11774 char *note_name = "LINUX";
11775 return elfcore_write_note (abfd, buf, bufsiz,
11776 note_name, NT_S390_TDB, s390_tdb, size);
11777 }
11778
11779 char *
11780 elfcore_write_s390_vxrs_low (bfd *abfd,
11781 char *buf,
11782 int *bufsiz,
11783 const void *s390_vxrs_low,
11784 int size)
11785 {
11786 char *note_name = "LINUX";
11787 return elfcore_write_note (abfd, buf, bufsiz,
11788 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11789 }
11790
11791 char *
11792 elfcore_write_s390_vxrs_high (bfd *abfd,
11793 char *buf,
11794 int *bufsiz,
11795 const void *s390_vxrs_high,
11796 int size)
11797 {
11798 char *note_name = "LINUX";
11799 return elfcore_write_note (abfd, buf, bufsiz,
11800 note_name, NT_S390_VXRS_HIGH,
11801 s390_vxrs_high, size);
11802 }
11803
11804 char *
11805 elfcore_write_s390_gs_cb (bfd *abfd,
11806 char *buf,
11807 int *bufsiz,
11808 const void *s390_gs_cb,
11809 int size)
11810 {
11811 char *note_name = "LINUX";
11812 return elfcore_write_note (abfd, buf, bufsiz,
11813 note_name, NT_S390_GS_CB,
11814 s390_gs_cb, size);
11815 }
11816
11817 char *
11818 elfcore_write_s390_gs_bc (bfd *abfd,
11819 char *buf,
11820 int *bufsiz,
11821 const void *s390_gs_bc,
11822 int size)
11823 {
11824 char *note_name = "LINUX";
11825 return elfcore_write_note (abfd, buf, bufsiz,
11826 note_name, NT_S390_GS_BC,
11827 s390_gs_bc, size);
11828 }
11829
11830 char *
11831 elfcore_write_arm_vfp (bfd *abfd,
11832 char *buf,
11833 int *bufsiz,
11834 const void *arm_vfp,
11835 int size)
11836 {
11837 char *note_name = "LINUX";
11838 return elfcore_write_note (abfd, buf, bufsiz,
11839 note_name, NT_ARM_VFP, arm_vfp, size);
11840 }
11841
11842 char *
11843 elfcore_write_aarch_tls (bfd *abfd,
11844 char *buf,
11845 int *bufsiz,
11846 const void *aarch_tls,
11847 int size)
11848 {
11849 char *note_name = "LINUX";
11850 return elfcore_write_note (abfd, buf, bufsiz,
11851 note_name, NT_ARM_TLS, aarch_tls, size);
11852 }
11853
11854 char *
11855 elfcore_write_aarch_hw_break (bfd *abfd,
11856 char *buf,
11857 int *bufsiz,
11858 const void *aarch_hw_break,
11859 int size)
11860 {
11861 char *note_name = "LINUX";
11862 return elfcore_write_note (abfd, buf, bufsiz,
11863 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11864 }
11865
11866 char *
11867 elfcore_write_aarch_hw_watch (bfd *abfd,
11868 char *buf,
11869 int *bufsiz,
11870 const void *aarch_hw_watch,
11871 int size)
11872 {
11873 char *note_name = "LINUX";
11874 return elfcore_write_note (abfd, buf, bufsiz,
11875 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11876 }
11877
11878 char *
11879 elfcore_write_aarch_sve (bfd *abfd,
11880 char *buf,
11881 int *bufsiz,
11882 const void *aarch_sve,
11883 int size)
11884 {
11885 char *note_name = "LINUX";
11886 return elfcore_write_note (abfd, buf, bufsiz,
11887 note_name, NT_ARM_SVE, aarch_sve, size);
11888 }
11889
11890 char *
11891 elfcore_write_aarch_pauth (bfd *abfd,
11892 char *buf,
11893 int *bufsiz,
11894 const void *aarch_pauth,
11895 int size)
11896 {
11897 char *note_name = "LINUX";
11898 return elfcore_write_note (abfd, buf, bufsiz,
11899 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11900 }
11901
11902 char *
11903 elfcore_write_arc_v2 (bfd *abfd,
11904 char *buf,
11905 int *bufsiz,
11906 const void *arc_v2,
11907 int size)
11908 {
11909 char *note_name = "LINUX";
11910 return elfcore_write_note (abfd, buf, bufsiz,
11911 note_name, NT_ARC_V2, arc_v2, size);
11912 }
11913
11914 char *
11915 elfcore_write_register_note (bfd *abfd,
11916 char *buf,
11917 int *bufsiz,
11918 const char *section,
11919 const void *data,
11920 int size)
11921 {
11922 if (strcmp (section, ".reg2") == 0)
11923 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11924 if (strcmp (section, ".reg-xfp") == 0)
11925 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11926 if (strcmp (section, ".reg-xstate") == 0)
11927 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11928 if (strcmp (section, ".reg-ppc-vmx") == 0)
11929 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11930 if (strcmp (section, ".reg-ppc-vsx") == 0)
11931 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11932 if (strcmp (section, ".reg-ppc-tar") == 0)
11933 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11934 if (strcmp (section, ".reg-ppc-ppr") == 0)
11935 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11936 if (strcmp (section, ".reg-ppc-dscr") == 0)
11937 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11938 if (strcmp (section, ".reg-ppc-ebb") == 0)
11939 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11940 if (strcmp (section, ".reg-ppc-pmu") == 0)
11941 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11942 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11943 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11944 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11945 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11946 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11947 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11948 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11949 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11950 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11951 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11952 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11953 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11954 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11955 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11956 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11957 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11958 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11959 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11960 if (strcmp (section, ".reg-s390-timer") == 0)
11961 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11962 if (strcmp (section, ".reg-s390-todcmp") == 0)
11963 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11964 if (strcmp (section, ".reg-s390-todpreg") == 0)
11965 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11966 if (strcmp (section, ".reg-s390-ctrs") == 0)
11967 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11968 if (strcmp (section, ".reg-s390-prefix") == 0)
11969 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11970 if (strcmp (section, ".reg-s390-last-break") == 0)
11971 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11972 if (strcmp (section, ".reg-s390-system-call") == 0)
11973 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11974 if (strcmp (section, ".reg-s390-tdb") == 0)
11975 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11976 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11977 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11978 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11979 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11980 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11981 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11982 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11983 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11984 if (strcmp (section, ".reg-arm-vfp") == 0)
11985 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11986 if (strcmp (section, ".reg-aarch-tls") == 0)
11987 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11988 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11989 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11990 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11991 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11992 if (strcmp (section, ".reg-aarch-sve") == 0)
11993 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11994 if (strcmp (section, ".reg-aarch-pauth") == 0)
11995 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11996 if (strcmp (section, ".reg-arc-v2") == 0)
11997 return elfcore_write_arc_v2 (abfd, buf, bufsiz, data, size);
11998 return NULL;
11999 }
12000
12001 static bfd_boolean
12002 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
12003 size_t align)
12004 {
12005 char *p;
12006
12007 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
12008 gABI specifies that PT_NOTE alignment should be aligned to 4
12009 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
12010 align is less than 4, we use 4 byte alignment. */
12011 if (align < 4)
12012 align = 4;
12013 if (align != 4 && align != 8)
12014 return FALSE;
12015
12016 p = buf;
12017 while (p < buf + size)
12018 {
12019 Elf_External_Note *xnp = (Elf_External_Note *) p;
12020 Elf_Internal_Note in;
12021
12022 if (offsetof (Elf_External_Note, name) > buf - p + size)
12023 return FALSE;
12024
12025 in.type = H_GET_32 (abfd, xnp->type);
12026
12027 in.namesz = H_GET_32 (abfd, xnp->namesz);
12028 in.namedata = xnp->name;
12029 if (in.namesz > buf - in.namedata + size)
12030 return FALSE;
12031
12032 in.descsz = H_GET_32 (abfd, xnp->descsz);
12033 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
12034 in.descpos = offset + (in.descdata - buf);
12035 if (in.descsz != 0
12036 && (in.descdata >= buf + size
12037 || in.descsz > buf - in.descdata + size))
12038 return FALSE;
12039
12040 switch (bfd_get_format (abfd))
12041 {
12042 default:
12043 return TRUE;
12044
12045 case bfd_core:
12046 {
12047 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
12048 struct
12049 {
12050 const char * string;
12051 size_t len;
12052 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
12053 }
12054 grokers[] =
12055 {
12056 GROKER_ELEMENT ("", elfcore_grok_note),
12057 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
12058 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
12059 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
12060 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
12061 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
12062 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
12063 };
12064 #undef GROKER_ELEMENT
12065 int i;
12066
12067 for (i = ARRAY_SIZE (grokers); i--;)
12068 {
12069 if (in.namesz >= grokers[i].len
12070 && strncmp (in.namedata, grokers[i].string,
12071 grokers[i].len) == 0)
12072 {
12073 if (! grokers[i].func (abfd, & in))
12074 return FALSE;
12075 break;
12076 }
12077 }
12078 break;
12079 }
12080
12081 case bfd_object:
12082 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
12083 {
12084 if (! elfobj_grok_gnu_note (abfd, &in))
12085 return FALSE;
12086 }
12087 else if (in.namesz == sizeof "stapsdt"
12088 && strcmp (in.namedata, "stapsdt") == 0)
12089 {
12090 if (! elfobj_grok_stapsdt_note (abfd, &in))
12091 return FALSE;
12092 }
12093 break;
12094 }
12095
12096 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
12097 }
12098
12099 return TRUE;
12100 }
12101
12102 bfd_boolean
12103 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
12104 size_t align)
12105 {
12106 char *buf;
12107
12108 if (size == 0 || (size + 1) == 0)
12109 return TRUE;
12110
12111 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
12112 return FALSE;
12113
12114 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
12115 if (buf == NULL)
12116 return FALSE;
12117
12118 /* PR 17512: file: ec08f814
12119 0-termintate the buffer so that string searches will not overflow. */
12120 buf[size] = 0;
12121
12122 if (!elf_parse_notes (abfd, buf, size, offset, align))
12123 {
12124 free (buf);
12125 return FALSE;
12126 }
12127
12128 free (buf);
12129 return TRUE;
12130 }
12131 \f
12132 /* Providing external access to the ELF program header table. */
12133
12134 /* Return an upper bound on the number of bytes required to store a
12135 copy of ABFD's program header table entries. Return -1 if an error
12136 occurs; bfd_get_error will return an appropriate code. */
12137
12138 long
12139 bfd_get_elf_phdr_upper_bound (bfd *abfd)
12140 {
12141 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12142 {
12143 bfd_set_error (bfd_error_wrong_format);
12144 return -1;
12145 }
12146
12147 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
12148 }
12149
12150 /* Copy ABFD's program header table entries to *PHDRS. The entries
12151 will be stored as an array of Elf_Internal_Phdr structures, as
12152 defined in include/elf/internal.h. To find out how large the
12153 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12154
12155 Return the number of program header table entries read, or -1 if an
12156 error occurs; bfd_get_error will return an appropriate code. */
12157
12158 int
12159 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12160 {
12161 int num_phdrs;
12162
12163 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12164 {
12165 bfd_set_error (bfd_error_wrong_format);
12166 return -1;
12167 }
12168
12169 num_phdrs = elf_elfheader (abfd)->e_phnum;
12170 if (num_phdrs != 0)
12171 memcpy (phdrs, elf_tdata (abfd)->phdr,
12172 num_phdrs * sizeof (Elf_Internal_Phdr));
12173
12174 return num_phdrs;
12175 }
12176
12177 enum elf_reloc_type_class
12178 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12179 const asection *rel_sec ATTRIBUTE_UNUSED,
12180 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12181 {
12182 return reloc_class_normal;
12183 }
12184
12185 /* For RELA architectures, return the relocation value for a
12186 relocation against a local symbol. */
12187
12188 bfd_vma
12189 _bfd_elf_rela_local_sym (bfd *abfd,
12190 Elf_Internal_Sym *sym,
12191 asection **psec,
12192 Elf_Internal_Rela *rel)
12193 {
12194 asection *sec = *psec;
12195 bfd_vma relocation;
12196
12197 relocation = (sec->output_section->vma
12198 + sec->output_offset
12199 + sym->st_value);
12200 if ((sec->flags & SEC_MERGE)
12201 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12202 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12203 {
12204 rel->r_addend =
12205 _bfd_merged_section_offset (abfd, psec,
12206 elf_section_data (sec)->sec_info,
12207 sym->st_value + rel->r_addend);
12208 if (sec != *psec)
12209 {
12210 /* If we have changed the section, and our original section is
12211 marked with SEC_EXCLUDE, it means that the original
12212 SEC_MERGE section has been completely subsumed in some
12213 other SEC_MERGE section. In this case, we need to leave
12214 some info around for --emit-relocs. */
12215 if ((sec->flags & SEC_EXCLUDE) != 0)
12216 sec->kept_section = *psec;
12217 sec = *psec;
12218 }
12219 rel->r_addend -= relocation;
12220 rel->r_addend += sec->output_section->vma + sec->output_offset;
12221 }
12222 return relocation;
12223 }
12224
12225 bfd_vma
12226 _bfd_elf_rel_local_sym (bfd *abfd,
12227 Elf_Internal_Sym *sym,
12228 asection **psec,
12229 bfd_vma addend)
12230 {
12231 asection *sec = *psec;
12232
12233 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12234 return sym->st_value + addend;
12235
12236 return _bfd_merged_section_offset (abfd, psec,
12237 elf_section_data (sec)->sec_info,
12238 sym->st_value + addend);
12239 }
12240
12241 /* Adjust an address within a section. Given OFFSET within SEC, return
12242 the new offset within the section, based upon changes made to the
12243 section. Returns -1 if the offset is now invalid.
12244 The offset (in abnd out) is in target sized bytes, however big a
12245 byte may be. */
12246
12247 bfd_vma
12248 _bfd_elf_section_offset (bfd *abfd,
12249 struct bfd_link_info *info,
12250 asection *sec,
12251 bfd_vma offset)
12252 {
12253 switch (sec->sec_info_type)
12254 {
12255 case SEC_INFO_TYPE_STABS:
12256 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12257 offset);
12258 case SEC_INFO_TYPE_EH_FRAME:
12259 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12260
12261 default:
12262 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12263 {
12264 /* Reverse the offset. */
12265 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12266 bfd_size_type address_size = bed->s->arch_size / 8;
12267
12268 /* address_size and sec->size are in octets. Convert
12269 to bytes before subtracting the original offset. */
12270 offset = ((sec->size - address_size)
12271 / bfd_octets_per_byte (abfd, sec) - offset);
12272 }
12273 return offset;
12274 }
12275 }
12276 \f
12277 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12278 reconstruct an ELF file by reading the segments out of remote memory
12279 based on the ELF file header at EHDR_VMA and the ELF program headers it
12280 points to. If not null, *LOADBASEP is filled in with the difference
12281 between the VMAs from which the segments were read, and the VMAs the
12282 file headers (and hence BFD's idea of each section's VMA) put them at.
12283
12284 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12285 remote memory at target address VMA into the local buffer at MYADDR; it
12286 should return zero on success or an `errno' code on failure. TEMPL must
12287 be a BFD for an ELF target with the word size and byte order found in
12288 the remote memory. */
12289
12290 bfd *
12291 bfd_elf_bfd_from_remote_memory
12292 (bfd *templ,
12293 bfd_vma ehdr_vma,
12294 bfd_size_type size,
12295 bfd_vma *loadbasep,
12296 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12297 {
12298 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12299 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12300 }
12301 \f
12302 long
12303 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12304 long symcount ATTRIBUTE_UNUSED,
12305 asymbol **syms ATTRIBUTE_UNUSED,
12306 long dynsymcount,
12307 asymbol **dynsyms,
12308 asymbol **ret)
12309 {
12310 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12311 asection *relplt;
12312 asymbol *s;
12313 const char *relplt_name;
12314 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12315 arelent *p;
12316 long count, i, n;
12317 size_t size;
12318 Elf_Internal_Shdr *hdr;
12319 char *names;
12320 asection *plt;
12321
12322 *ret = NULL;
12323
12324 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12325 return 0;
12326
12327 if (dynsymcount <= 0)
12328 return 0;
12329
12330 if (!bed->plt_sym_val)
12331 return 0;
12332
12333 relplt_name = bed->relplt_name;
12334 if (relplt_name == NULL)
12335 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12336 relplt = bfd_get_section_by_name (abfd, relplt_name);
12337 if (relplt == NULL)
12338 return 0;
12339
12340 hdr = &elf_section_data (relplt)->this_hdr;
12341 if (hdr->sh_link != elf_dynsymtab (abfd)
12342 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12343 return 0;
12344
12345 plt = bfd_get_section_by_name (abfd, ".plt");
12346 if (plt == NULL)
12347 return 0;
12348
12349 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12350 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12351 return -1;
12352
12353 count = relplt->size / hdr->sh_entsize;
12354 size = count * sizeof (asymbol);
12355 p = relplt->relocation;
12356 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12357 {
12358 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12359 if (p->addend != 0)
12360 {
12361 #ifdef BFD64
12362 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12363 #else
12364 size += sizeof ("+0x") - 1 + 8;
12365 #endif
12366 }
12367 }
12368
12369 s = *ret = (asymbol *) bfd_malloc (size);
12370 if (s == NULL)
12371 return -1;
12372
12373 names = (char *) (s + count);
12374 p = relplt->relocation;
12375 n = 0;
12376 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12377 {
12378 size_t len;
12379 bfd_vma addr;
12380
12381 addr = bed->plt_sym_val (i, plt, p);
12382 if (addr == (bfd_vma) -1)
12383 continue;
12384
12385 *s = **p->sym_ptr_ptr;
12386 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12387 we are defining a symbol, ensure one of them is set. */
12388 if ((s->flags & BSF_LOCAL) == 0)
12389 s->flags |= BSF_GLOBAL;
12390 s->flags |= BSF_SYNTHETIC;
12391 s->section = plt;
12392 s->value = addr - plt->vma;
12393 s->name = names;
12394 s->udata.p = NULL;
12395 len = strlen ((*p->sym_ptr_ptr)->name);
12396 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12397 names += len;
12398 if (p->addend != 0)
12399 {
12400 char buf[30], *a;
12401
12402 memcpy (names, "+0x", sizeof ("+0x") - 1);
12403 names += sizeof ("+0x") - 1;
12404 bfd_sprintf_vma (abfd, buf, p->addend);
12405 for (a = buf; *a == '0'; ++a)
12406 ;
12407 len = strlen (a);
12408 memcpy (names, a, len);
12409 names += len;
12410 }
12411 memcpy (names, "@plt", sizeof ("@plt"));
12412 names += sizeof ("@plt");
12413 ++s, ++n;
12414 }
12415
12416 return n;
12417 }
12418
12419 /* It is only used by x86-64 so far.
12420 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12421 but current usage would allow all of _bfd_std_section to be zero. */
12422 static const asymbol lcomm_sym
12423 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12424 asection _bfd_elf_large_com_section
12425 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12426 "LARGE_COMMON", 0, SEC_IS_COMMON);
12427
12428 bfd_boolean
12429 _bfd_elf_final_write_processing (bfd *abfd)
12430 {
12431 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12432
12433 i_ehdrp = elf_elfheader (abfd);
12434
12435 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12436 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12437
12438 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12439 SHF_GNU_MBIND or SHF_GNU_RETAIN sections or symbols of STT_GNU_IFUNC type
12440 or STB_GNU_UNIQUE binding. */
12441 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12442 {
12443 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12444 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12445 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12446 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12447 {
12448 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12449 _bfd_error_handler (_("GNU_MBIND section is supported only by GNU "
12450 "and FreeBSD targets"));
12451 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12452 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is supported "
12453 "only by GNU and FreeBSD targets"));
12454 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12455 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is supported "
12456 "only by GNU and FreeBSD targets"));
12457 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_retain)
12458 _bfd_error_handler (_("GNU_RETAIN section is supported "
12459 "only by GNU and FreeBSD targets"));
12460 bfd_set_error (bfd_error_sorry);
12461 return FALSE;
12462 }
12463 }
12464 return TRUE;
12465 }
12466
12467
12468 /* Return TRUE for ELF symbol types that represent functions.
12469 This is the default version of this function, which is sufficient for
12470 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12471
12472 bfd_boolean
12473 _bfd_elf_is_function_type (unsigned int type)
12474 {
12475 return (type == STT_FUNC
12476 || type == STT_GNU_IFUNC);
12477 }
12478
12479 /* If the ELF symbol SYM might be a function in SEC, return the
12480 function size and set *CODE_OFF to the function's entry point,
12481 otherwise return zero. */
12482
12483 bfd_size_type
12484 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12485 bfd_vma *code_off)
12486 {
12487 bfd_size_type size;
12488
12489 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12490 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12491 || sym->section != sec)
12492 return 0;
12493
12494 *code_off = sym->value;
12495 size = 0;
12496 if (!(sym->flags & BSF_SYNTHETIC))
12497 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12498 if (size == 0)
12499 size = 1;
12500 return size;
12501 }
12502
12503 /* Set to non-zero to enable some debug messages. */
12504 #define DEBUG_SECONDARY_RELOCS 0
12505
12506 /* An internal-to-the-bfd-library only section type
12507 used to indicate a cached secondary reloc section. */
12508 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12509
12510 /* Create a BFD section to hold a secondary reloc section. */
12511
12512 bfd_boolean
12513 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
12514 Elf_Internal_Shdr *hdr,
12515 const char * name,
12516 unsigned int shindex)
12517 {
12518 /* We only support RELA secondary relocs. */
12519 if (hdr->sh_type != SHT_RELA)
12520 return FALSE;
12521
12522 #if DEBUG_SECONDARY_RELOCS
12523 fprintf (stderr, "secondary reloc section %s encountered\n", name);
12524 #endif
12525 hdr->sh_type = SHT_SECONDARY_RELOC;
12526 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
12527 }
12528
12529 /* Read in any secondary relocs associated with SEC. */
12530
12531 bfd_boolean
12532 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
12533 asection * sec,
12534 asymbol ** symbols,
12535 bfd_boolean dynamic)
12536 {
12537 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12538 asection * relsec;
12539 bfd_boolean result = TRUE;
12540 bfd_vma (*r_sym) (bfd_vma);
12541
12542 #if BFD_DEFAULT_TARGET_SIZE > 32
12543 if (bfd_arch_bits_per_address (abfd) != 32)
12544 r_sym = elf64_r_sym;
12545 else
12546 #endif
12547 r_sym = elf32_r_sym;
12548
12549 /* Discover if there are any secondary reloc sections
12550 associated with SEC. */
12551 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12552 {
12553 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
12554
12555 if (hdr->sh_type == SHT_SECONDARY_RELOC
12556 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx
12557 && (hdr->sh_entsize == ebd->s->sizeof_rel
12558 || hdr->sh_entsize == ebd->s->sizeof_rela))
12559 {
12560 bfd_byte * native_relocs;
12561 bfd_byte * native_reloc;
12562 arelent * internal_relocs;
12563 arelent * internal_reloc;
12564 unsigned int i;
12565 unsigned int entsize;
12566 unsigned int symcount;
12567 unsigned int reloc_count;
12568 size_t amt;
12569
12570 if (ebd->elf_info_to_howto == NULL)
12571 return FALSE;
12572
12573 #if DEBUG_SECONDARY_RELOCS
12574 fprintf (stderr, "read secondary relocs for %s from %s\n",
12575 sec->name, relsec->name);
12576 #endif
12577 entsize = hdr->sh_entsize;
12578
12579 native_relocs = bfd_malloc (hdr->sh_size);
12580 if (native_relocs == NULL)
12581 {
12582 result = FALSE;
12583 continue;
12584 }
12585
12586 reloc_count = NUM_SHDR_ENTRIES (hdr);
12587 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
12588 {
12589 free (native_relocs);
12590 bfd_set_error (bfd_error_file_too_big);
12591 result = FALSE;
12592 continue;
12593 }
12594
12595 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
12596 if (internal_relocs == NULL)
12597 {
12598 free (native_relocs);
12599 result = FALSE;
12600 continue;
12601 }
12602
12603 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
12604 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
12605 != hdr->sh_size))
12606 {
12607 free (native_relocs);
12608 /* The internal_relocs will be freed when
12609 the memory for the bfd is released. */
12610 result = FALSE;
12611 continue;
12612 }
12613
12614 if (dynamic)
12615 symcount = bfd_get_dynamic_symcount (abfd);
12616 else
12617 symcount = bfd_get_symcount (abfd);
12618
12619 for (i = 0, internal_reloc = internal_relocs,
12620 native_reloc = native_relocs;
12621 i < reloc_count;
12622 i++, internal_reloc++, native_reloc += entsize)
12623 {
12624 bfd_boolean res;
12625 Elf_Internal_Rela rela;
12626
12627 if (entsize == ebd->s->sizeof_rel)
12628 ebd->s->swap_reloc_in (abfd, native_reloc, & rela);
12629 else /* entsize == ebd->s->sizeof_rela */
12630 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
12631
12632 /* The address of an ELF reloc is section relative for an object
12633 file, and absolute for an executable file or shared library.
12634 The address of a normal BFD reloc is always section relative,
12635 and the address of a dynamic reloc is absolute.. */
12636 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
12637 internal_reloc->address = rela.r_offset;
12638 else
12639 internal_reloc->address = rela.r_offset - sec->vma;
12640
12641 if (r_sym (rela.r_info) == STN_UNDEF)
12642 {
12643 /* FIXME: This and the error case below mean that we
12644 have a symbol on relocs that is not elf_symbol_type. */
12645 internal_reloc->sym_ptr_ptr =
12646 bfd_abs_section_ptr->symbol_ptr_ptr;
12647 }
12648 else if (r_sym (rela.r_info) > symcount)
12649 {
12650 _bfd_error_handler
12651 /* xgettext:c-format */
12652 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
12653 abfd, sec, i, (long) r_sym (rela.r_info));
12654 bfd_set_error (bfd_error_bad_value);
12655 internal_reloc->sym_ptr_ptr =
12656 bfd_abs_section_ptr->symbol_ptr_ptr;
12657 result = FALSE;
12658 }
12659 else
12660 {
12661 asymbol **ps;
12662
12663 ps = symbols + r_sym (rela.r_info) - 1;
12664 internal_reloc->sym_ptr_ptr = ps;
12665 /* Make sure that this symbol is not removed by strip. */
12666 (*ps)->flags |= BSF_KEEP;
12667 }
12668
12669 internal_reloc->addend = rela.r_addend;
12670
12671 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
12672 if (! res || internal_reloc->howto == NULL)
12673 {
12674 #if DEBUG_SECONDARY_RELOCS
12675 fprintf (stderr, "there is no howto associated with reloc %lx\n",
12676 rela.r_info);
12677 #endif
12678 result = FALSE;
12679 }
12680 }
12681
12682 free (native_relocs);
12683 /* Store the internal relocs. */
12684 elf_section_data (relsec)->sec_info = internal_relocs;
12685 }
12686 }
12687
12688 return result;
12689 }
12690
12691 /* Set the ELF section header fields of an output secondary reloc section. */
12692
12693 bfd_boolean
12694 _bfd_elf_copy_special_section_fields (const bfd * ibfd ATTRIBUTE_UNUSED,
12695 bfd * obfd ATTRIBUTE_UNUSED,
12696 const Elf_Internal_Shdr * isection,
12697 Elf_Internal_Shdr * osection)
12698 {
12699 asection * isec;
12700 asection * osec;
12701 struct bfd_elf_section_data * esd;
12702
12703 if (isection == NULL)
12704 return FALSE;
12705
12706 if (isection->sh_type != SHT_SECONDARY_RELOC)
12707 return TRUE;
12708
12709 isec = isection->bfd_section;
12710 if (isec == NULL)
12711 return FALSE;
12712
12713 osec = osection->bfd_section;
12714 if (osec == NULL)
12715 return FALSE;
12716
12717 esd = elf_section_data (osec);
12718 BFD_ASSERT (esd->sec_info == NULL);
12719 esd->sec_info = elf_section_data (isec)->sec_info;
12720 osection->sh_type = SHT_RELA;
12721 osection->sh_link = elf_onesymtab (obfd);
12722 if (osection->sh_link == 0)
12723 {
12724 /* There is no symbol table - we are hosed... */
12725 _bfd_error_handler
12726 /* xgettext:c-format */
12727 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
12728 obfd, osec);
12729 bfd_set_error (bfd_error_bad_value);
12730 return FALSE;
12731 }
12732
12733 /* Find the output section that corresponds to the isection's sh_info link. */
12734 if (isection->sh_info == 0
12735 || isection->sh_info >= elf_numsections (ibfd))
12736 {
12737 _bfd_error_handler
12738 /* xgettext:c-format */
12739 (_("%pB(%pA): info section index is invalid"),
12740 obfd, osec);
12741 bfd_set_error (bfd_error_bad_value);
12742 return FALSE;
12743 }
12744
12745 isection = elf_elfsections (ibfd)[isection->sh_info];
12746
12747 if (isection == NULL
12748 || isection->bfd_section == NULL
12749 || isection->bfd_section->output_section == NULL)
12750 {
12751 _bfd_error_handler
12752 /* xgettext:c-format */
12753 (_("%pB(%pA): info section index cannot be set because the section is not in the output"),
12754 obfd, osec);
12755 bfd_set_error (bfd_error_bad_value);
12756 return FALSE;
12757 }
12758
12759 esd = elf_section_data (isection->bfd_section->output_section);
12760 BFD_ASSERT (esd != NULL);
12761 osection->sh_info = esd->this_idx;
12762 esd->has_secondary_relocs = TRUE;
12763 #if DEBUG_SECONDARY_RELOCS
12764 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
12765 osec->name, osection->sh_link, osection->sh_info);
12766 fprintf (stderr, "mark section %s as having secondary relocs\n",
12767 bfd_section_name (isection->bfd_section->output_section));
12768 #endif
12769
12770 return TRUE;
12771 }
12772
12773 /* Write out a secondary reloc section.
12774
12775 FIXME: Currently this function can result in a serious performance penalty
12776 for files with secondary relocs and lots of sections. The proper way to
12777 fix this is for _bfd_elf_copy_special_section_fields() to chain secondary
12778 relocs together and then to have this function just walk that chain. */
12779
12780 bfd_boolean
12781 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
12782 {
12783 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12784 bfd_vma addr_offset;
12785 asection * relsec;
12786 bfd_vma (*r_info) (bfd_vma, bfd_vma);
12787 bfd_boolean result = TRUE;
12788
12789 if (sec == NULL)
12790 return FALSE;
12791
12792 #if BFD_DEFAULT_TARGET_SIZE > 32
12793 if (bfd_arch_bits_per_address (abfd) != 32)
12794 r_info = elf64_r_info;
12795 else
12796 #endif
12797 r_info = elf32_r_info;
12798
12799 /* The address of an ELF reloc is section relative for an object
12800 file, and absolute for an executable file or shared library.
12801 The address of a BFD reloc is always section relative. */
12802 addr_offset = 0;
12803 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
12804 addr_offset = sec->vma;
12805
12806 /* Discover if there are any secondary reloc sections
12807 associated with SEC. */
12808 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12809 {
12810 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
12811 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
12812
12813 if (hdr->sh_type == SHT_RELA
12814 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12815 {
12816 asymbol * last_sym;
12817 int last_sym_idx;
12818 unsigned int reloc_count;
12819 unsigned int idx;
12820 unsigned int entsize;
12821 arelent * src_irel;
12822 bfd_byte * dst_rela;
12823
12824 if (hdr->contents != NULL)
12825 {
12826 _bfd_error_handler
12827 /* xgettext:c-format */
12828 (_("%pB(%pA): error: secondary reloc section processed twice"),
12829 abfd, relsec);
12830 bfd_set_error (bfd_error_bad_value);
12831 result = FALSE;
12832 continue;
12833 }
12834
12835 entsize = hdr->sh_entsize;
12836 if (entsize == 0)
12837 {
12838 _bfd_error_handler
12839 /* xgettext:c-format */
12840 (_("%pB(%pA): error: secondary reloc section has zero sized entries"),
12841 abfd, relsec);
12842 bfd_set_error (bfd_error_bad_value);
12843 result = FALSE;
12844 continue;
12845 }
12846 else if (entsize != ebd->s->sizeof_rel
12847 && entsize != ebd->s->sizeof_rela)
12848 {
12849 _bfd_error_handler
12850 /* xgettext:c-format */
12851 (_("%pB(%pA): error: secondary reloc section has non-standard sized entries"),
12852 abfd, relsec);
12853 bfd_set_error (bfd_error_bad_value);
12854 result = FALSE;
12855 continue;
12856 }
12857
12858 reloc_count = hdr->sh_size / entsize;
12859 if (reloc_count <= 0)
12860 {
12861 _bfd_error_handler
12862 /* xgettext:c-format */
12863 (_("%pB(%pA): error: secondary reloc section is empty!"),
12864 abfd, relsec);
12865 bfd_set_error (bfd_error_bad_value);
12866 result = FALSE;
12867 continue;
12868 }
12869
12870 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
12871 if (hdr->contents == NULL)
12872 continue;
12873
12874 #if DEBUG_SECONDARY_RELOCS
12875 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
12876 reloc_count, sec->name, relsec->name);
12877 #endif
12878 last_sym = NULL;
12879 last_sym_idx = 0;
12880 dst_rela = hdr->contents;
12881 src_irel = (arelent *) esd->sec_info;
12882 if (src_irel == NULL)
12883 {
12884 _bfd_error_handler
12885 /* xgettext:c-format */
12886 (_("%pB(%pA): error: internal relocs missing for secondary reloc section"),
12887 abfd, relsec);
12888 bfd_set_error (bfd_error_bad_value);
12889 result = FALSE;
12890 continue;
12891 }
12892
12893 for (idx = 0; idx < reloc_count; idx++, dst_rela += entsize)
12894 {
12895 Elf_Internal_Rela src_rela;
12896 arelent *ptr;
12897 asymbol *sym;
12898 int n;
12899
12900 ptr = src_irel + idx;
12901 if (ptr == NULL)
12902 {
12903 _bfd_error_handler
12904 /* xgettext:c-format */
12905 (_("%pB(%pA): error: reloc table entry %u is empty"),
12906 abfd, relsec, idx);
12907 bfd_set_error (bfd_error_bad_value);
12908 result = FALSE;
12909 break;
12910 }
12911
12912 if (ptr->sym_ptr_ptr == NULL)
12913 {
12914 /* FIXME: Is this an error ? */
12915 n = 0;
12916 }
12917 else
12918 {
12919 sym = *ptr->sym_ptr_ptr;
12920
12921 if (sym == last_sym)
12922 n = last_sym_idx;
12923 else
12924 {
12925 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
12926 if (n < 0)
12927 {
12928 _bfd_error_handler
12929 /* xgettext:c-format */
12930 (_("%pB(%pA): error: secondary reloc %u references a missing symbol"),
12931 abfd, relsec, idx);
12932 bfd_set_error (bfd_error_bad_value);
12933 result = FALSE;
12934 n = 0;
12935 }
12936
12937 last_sym = sym;
12938 last_sym_idx = n;
12939 }
12940
12941 if (sym->the_bfd != NULL
12942 && sym->the_bfd->xvec != abfd->xvec
12943 && ! _bfd_elf_validate_reloc (abfd, ptr))
12944 {
12945 _bfd_error_handler
12946 /* xgettext:c-format */
12947 (_("%pB(%pA): error: secondary reloc %u references a deleted symbol"),
12948 abfd, relsec, idx);
12949 bfd_set_error (bfd_error_bad_value);
12950 result = FALSE;
12951 n = 0;
12952 }
12953 }
12954
12955 src_rela.r_offset = ptr->address + addr_offset;
12956 if (ptr->howto == NULL)
12957 {
12958 _bfd_error_handler
12959 /* xgettext:c-format */
12960 (_("%pB(%pA): error: secondary reloc %u is of an unknown type"),
12961 abfd, relsec, idx);
12962 bfd_set_error (bfd_error_bad_value);
12963 result = FALSE;
12964 src_rela.r_info = r_info (0, 0);
12965 }
12966 else
12967 src_rela.r_info = r_info (n, ptr->howto->type);
12968 src_rela.r_addend = ptr->addend;
12969
12970 if (entsize == ebd->s->sizeof_rel)
12971 ebd->s->swap_reloc_out (abfd, &src_rela, dst_rela);
12972 else /* entsize == ebd->s->sizeof_rela */
12973 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
12974 }
12975 }
12976 }
12977
12978 return result;
12979 }