Fix assertion failure in the BFD library when linking with --emit-relocs enabled.
[binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
55 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
56 file_ptr offset, size_t align);
57
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62 /* Swap in a Verdef structure. */
63
64 void
65 _bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
68 {
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
76 }
77
78 /* Swap out a Verdef structure. */
79
80 void
81 _bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
84 {
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
92 }
93
94 /* Swap in a Verdaux structure. */
95
96 void
97 _bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
100 {
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
103 }
104
105 /* Swap out a Verdaux structure. */
106
107 void
108 _bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
111 {
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
114 }
115
116 /* Swap in a Verneed structure. */
117
118 void
119 _bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
122 {
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
128 }
129
130 /* Swap out a Verneed structure. */
131
132 void
133 _bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
136 {
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
142 }
143
144 /* Swap in a Vernaux structure. */
145
146 void
147 _bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
150 {
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
156 }
157
158 /* Swap out a Vernaux structure. */
159
160 void
161 _bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
164 {
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
170 }
171
172 /* Swap in a Versym structure. */
173
174 void
175 _bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
178 {
179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
180 }
181
182 /* Swap out a Versym structure. */
183
184 void
185 _bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
188 {
189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
190 }
191
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
194
195 unsigned long
196 bfd_elf_hash (const char *namearg)
197 {
198 const unsigned char *name = (const unsigned char *) namearg;
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
214 return h & 0xffffffff;
215 }
216
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220 unsigned long
221 bfd_elf_gnu_hash (const char *namearg)
222 {
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230 }
231
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
234 bfd_boolean
235 bfd_elf_allocate_object (bfd *abfd,
236 size_t object_size,
237 enum elf_target_id object_id)
238 {
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
243
244 elf_object_id (abfd) = object_id;
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
253 return TRUE;
254 }
255
256
257 bfd_boolean
258 bfd_elf_make_object (bfd *abfd)
259 {
260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
262 bed->target_id);
263 }
264
265 bfd_boolean
266 bfd_elf_mkcorefile (bfd *abfd)
267 {
268 /* I think this can be done just like an object file. */
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
273 }
274
275 char *
276 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
277 {
278 Elf_Internal_Shdr **i_shdrp;
279 bfd_byte *shstrtab = NULL;
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
282
283 i_shdrp = elf_elfsections (abfd);
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
287 return NULL;
288
289 shstrtab = i_shdrp[shindex]->contents;
290 if (shstrtab == NULL)
291 {
292 /* No cached one, attempt to read, and cache what we read. */
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize + 1 <= 1
299 || bfd_seek (abfd, offset, SEEK_SET) != 0
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
310 i_shdrp[shindex]->contents = shstrtab;
311 }
312 return (char *) shstrtab;
313 }
314
315 char *
316 bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
319 {
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
328 hdr = elf_elfsections (abfd)[shindex];
329
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
338 abfd, shindex);
339 return NULL;
340 }
341
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
355
356 if (strindex >= hdr->sh_size)
357 {
358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
359 _bfd_error_handler
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
363 (shindex == shstrndx && strindex == hdr->sh_name
364 ? ".shstrtab"
365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
366 return NULL;
367 }
368
369 return ((char *) hdr->contents) + strindex;
370 }
371
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
379
380 Elf_Internal_Sym *
381 bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
388 {
389 Elf_Internal_Shdr *shndx_hdr;
390 void *alloc_ext;
391 const bfd_byte *esym;
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
394 Elf_Internal_Sym *alloc_intsym;
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
397 const struct elf_backend_data *bed;
398 size_t extsym_size;
399 size_t amt;
400 file_ptr pos;
401
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
442 alloc_intsym = NULL;
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
454 alloc_ext = bfd_malloc (amt);
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
498 intsym_buf = alloc_intsym;
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
506 shndx = extshndx_buf;
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd, (unsigned long) symoffset);
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529 }
530
531 /* Look up a symbol name. */
532 const char *
533 bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
537 {
538 const char *name;
539 unsigned int iname = isym->st_name;
540 unsigned int shindex = symtab_hdr->sh_link;
541
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym->st_shndx < elf_numsections (abfd))
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
554 name = bfd_section_name (sym_sec);
555
556 return name;
557 }
558
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563 typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566 } Elf_Internal_Group;
567
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571 static const char *
572 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 {
574 Elf_Internal_Shdr *hdr;
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
578
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
586 return NULL;
587
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
592 return NULL;
593
594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
595 }
596
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
598
599 static bfd_boolean
600 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 {
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum = elf_numsections (abfd);
613 num_group = 0;
614
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
626 num_group += 1;
627 }
628
629 if (num_group == 0)
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
633 elf_tdata (abfd)->group_sect_ptr = NULL;
634 }
635 else
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
639 size_t amt;
640
641 elf_tdata (abfd)->num_group = num_group;
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
646 return FALSE;
647 num_group = 0;
648
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 {
655 unsigned char *src;
656 Elf_Internal_Group *dest;
657
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 {
676 _bfd_error_handler
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
683 continue;
684 }
685
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->shdr = NULL;
703 dest->flags = idx;
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
707 break;
708 }
709 if (idx < shnum)
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
721 {
722 _bfd_error_handler
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
726 }
727 }
728 }
729 }
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
741 _bfd_error_handler
742 (_("%pB: no valid group sections found"), abfd);
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
753
754 for (j = 0; j < num_group; j++)
755 {
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
760 Elf_Internal_Group *idx;
761 bfd_size_type n_elt;
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
777 n_elt = shdr->sh_size / 4;
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
784 asection *s = NULL;
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
794 && elf_next_in_group (s) != NULL)
795 break;
796 if (n_elt != 0)
797 {
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
803 }
804 else
805 {
806 const char *gname;
807
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
810 return FALSE;
811 elf_group_name (newsect) = gname;
812
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect) = newsect;
815 }
816
817 /* If the group section has been created, point to the
818 new member. */
819 if (shdr->bfd_section != NULL)
820 elf_next_in_group (shdr->bfd_section) = newsect;
821
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
824 break;
825 }
826 }
827 }
828
829 if (elf_group_name (newsect) == NULL)
830 {
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
833 abfd, newsect);
834 return FALSE;
835 }
836 return TRUE;
837 }
838
839 bfd_boolean
840 _bfd_elf_setup_sections (bfd *abfd)
841 {
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
860 bed->link_order_error_handler
861 /* xgettext:c-format */
862 (_("%pB: warning: sh_link not set for section `%pA'"),
863 abfd, s);
864 }
865 else
866 {
867 asection *linksec = NULL;
868
869 if (elfsec < elf_numsections (abfd))
870 {
871 this_hdr = elf_elfsections (abfd)[elfsec];
872 linksec = this_hdr->bfd_section;
873 }
874
875 /* PR 1991, 2008:
876 Some strip/objcopy may leave an incorrect value in
877 sh_link. We don't want to proceed. */
878 if (linksec == NULL)
879 {
880 _bfd_error_handler
881 /* xgettext:c-format */
882 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
883 s->owner, elfsec, s);
884 result = FALSE;
885 }
886
887 elf_linked_to_section (s) = linksec;
888 }
889 }
890 else if (this_hdr->sh_type == SHT_GROUP
891 && elf_next_in_group (s) == NULL)
892 {
893 _bfd_error_handler
894 /* xgettext:c-format */
895 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
896 abfd, elf_section_data (s)->this_idx);
897 result = FALSE;
898 }
899 }
900
901 /* Process section groups. */
902 if (num_group == (unsigned) -1)
903 return result;
904
905 for (i = 0; i < num_group; i++)
906 {
907 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
908 Elf_Internal_Group *idx;
909 unsigned int n_elt;
910
911 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
912 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
913 {
914 _bfd_error_handler
915 /* xgettext:c-format */
916 (_("%pB: section group entry number %u is corrupt"),
917 abfd, i);
918 result = FALSE;
919 continue;
920 }
921
922 idx = (Elf_Internal_Group *) shdr->contents;
923 n_elt = shdr->sh_size / 4;
924
925 while (--n_elt != 0)
926 {
927 ++ idx;
928
929 if (idx->shdr == NULL)
930 continue;
931 else if (idx->shdr->bfd_section)
932 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
933 else if (idx->shdr->sh_type != SHT_RELA
934 && idx->shdr->sh_type != SHT_REL)
935 {
936 /* There are some unknown sections in the group. */
937 _bfd_error_handler
938 /* xgettext:c-format */
939 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
940 abfd,
941 idx->shdr->sh_type,
942 bfd_elf_string_from_elf_section (abfd,
943 (elf_elfheader (abfd)
944 ->e_shstrndx),
945 idx->shdr->sh_name),
946 shdr->bfd_section);
947 result = FALSE;
948 }
949 }
950 }
951
952 return result;
953 }
954
955 bfd_boolean
956 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
957 {
958 return elf_next_in_group (sec) != NULL;
959 }
960
961 const char *
962 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
963 {
964 if (elf_sec_group (sec) != NULL)
965 return elf_group_name (sec);
966 return NULL;
967 }
968
969 static char *
970 convert_debug_to_zdebug (bfd *abfd, const char *name)
971 {
972 unsigned int len = strlen (name);
973 char *new_name = bfd_alloc (abfd, len + 2);
974 if (new_name == NULL)
975 return NULL;
976 new_name[0] = '.';
977 new_name[1] = 'z';
978 memcpy (new_name + 2, name + 1, len);
979 return new_name;
980 }
981
982 static char *
983 convert_zdebug_to_debug (bfd *abfd, const char *name)
984 {
985 unsigned int len = strlen (name);
986 char *new_name = bfd_alloc (abfd, len);
987 if (new_name == NULL)
988 return NULL;
989 new_name[0] = '.';
990 memcpy (new_name + 1, name + 2, len - 1);
991 return new_name;
992 }
993
994 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
995
996 struct lto_section
997 {
998 int16_t major_version;
999 int16_t minor_version;
1000 unsigned char slim_object;
1001
1002 /* Flags is a private field that is not defined publicly. */
1003 uint16_t flags;
1004 };
1005
1006 /* Make a BFD section from an ELF section. We store a pointer to the
1007 BFD section in the bfd_section field of the header. */
1008
1009 bfd_boolean
1010 _bfd_elf_make_section_from_shdr (bfd *abfd,
1011 Elf_Internal_Shdr *hdr,
1012 const char *name,
1013 int shindex)
1014 {
1015 asection *newsect;
1016 flagword flags;
1017 const struct elf_backend_data *bed;
1018 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
1019
1020 if (hdr->bfd_section != NULL)
1021 return TRUE;
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
1025 return FALSE;
1026
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
1029 elf_section_data (newsect)->this_idx = shindex;
1030
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
1035 newsect->filepos = hdr->sh_offset;
1036
1037 flags = SEC_NO_FLAGS;
1038 if (hdr->sh_type != SHT_NOBITS)
1039 flags |= SEC_HAS_CONTENTS;
1040 if (hdr->sh_type == SHT_GROUP)
1041 flags |= SEC_GROUP;
1042 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1043 {
1044 flags |= SEC_ALLOC;
1045 if (hdr->sh_type != SHT_NOBITS)
1046 flags |= SEC_LOAD;
1047 }
1048 if ((hdr->sh_flags & SHF_WRITE) == 0)
1049 flags |= SEC_READONLY;
1050 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1051 flags |= SEC_CODE;
1052 else if ((flags & SEC_LOAD) != 0)
1053 flags |= SEC_DATA;
1054 if ((hdr->sh_flags & SHF_MERGE) != 0)
1055 {
1056 flags |= SEC_MERGE;
1057 newsect->entsize = hdr->sh_entsize;
1058 }
1059 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1060 flags |= SEC_STRINGS;
1061 if (hdr->sh_flags & SHF_GROUP)
1062 if (!setup_group (abfd, hdr, newsect))
1063 return FALSE;
1064 if ((hdr->sh_flags & SHF_TLS) != 0)
1065 flags |= SEC_THREAD_LOCAL;
1066 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1067 flags |= SEC_EXCLUDE;
1068
1069 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1070 {
1071 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1072 but binutils as of 2019-07-23 did not set the EI_OSABI header
1073 byte. */
1074 case ELFOSABI_NONE:
1075 case ELFOSABI_GNU:
1076 case ELFOSABI_FREEBSD:
1077 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1078 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1079 break;
1080 }
1081
1082 if ((flags & SEC_ALLOC) == 0)
1083 {
1084 /* The debugging sections appear to be recognized only by name,
1085 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1086 if (name [0] == '.')
1087 {
1088 if (strncmp (name, ".debug", 6) == 0
1089 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1090 || strncmp (name, ".zdebug", 7) == 0)
1091 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1092 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1093 || strncmp (name, ".note.gnu", 9) == 0)
1094 {
1095 flags |= SEC_ELF_OCTETS;
1096 opb = 1;
1097 }
1098 else if (strncmp (name, ".line", 5) == 0
1099 || strncmp (name, ".stab", 5) == 0
1100 || strcmp (name, ".gdb_index") == 0)
1101 flags |= SEC_DEBUGGING;
1102 }
1103 }
1104
1105 if (!bfd_set_section_vma (newsect, hdr->sh_addr / opb)
1106 || !bfd_set_section_size (newsect, hdr->sh_size)
1107 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1108 return FALSE;
1109
1110 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1111 only link a single copy of the section. This is used to support
1112 g++. g++ will emit each template expansion in its own section.
1113 The symbols will be defined as weak, so that multiple definitions
1114 are permitted. The GNU linker extension is to actually discard
1115 all but one of the sections. */
1116 if (CONST_STRNEQ (name, ".gnu.linkonce")
1117 && elf_next_in_group (newsect) == NULL)
1118 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1119
1120 if (!bfd_set_section_flags (newsect, flags))
1121 return FALSE;
1122
1123 bed = get_elf_backend_data (abfd);
1124 if (bed->elf_backend_section_flags)
1125 if (!bed->elf_backend_section_flags (hdr))
1126 return FALSE;
1127
1128 /* We do not parse the PT_NOTE segments as we are interested even in the
1129 separate debug info files which may have the segments offsets corrupted.
1130 PT_NOTEs from the core files are currently not parsed using BFD. */
1131 if (hdr->sh_type == SHT_NOTE)
1132 {
1133 bfd_byte *contents;
1134
1135 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1136 return FALSE;
1137
1138 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1139 hdr->sh_offset, hdr->sh_addralign);
1140 free (contents);
1141 }
1142
1143 if ((newsect->flags & SEC_ALLOC) != 0)
1144 {
1145 Elf_Internal_Phdr *phdr;
1146 unsigned int i, nload;
1147
1148 /* Some ELF linkers produce binaries with all the program header
1149 p_paddr fields zero. If we have such a binary with more than
1150 one PT_LOAD header, then leave the section lma equal to vma
1151 so that we don't create sections with overlapping lma. */
1152 phdr = elf_tdata (abfd)->phdr;
1153 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1154 if (phdr->p_paddr != 0)
1155 break;
1156 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1157 ++nload;
1158 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1159 return TRUE;
1160
1161 phdr = elf_tdata (abfd)->phdr;
1162 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1163 {
1164 if (((phdr->p_type == PT_LOAD
1165 && (hdr->sh_flags & SHF_TLS) == 0)
1166 || phdr->p_type == PT_TLS)
1167 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1168 {
1169 if ((newsect->flags & SEC_LOAD) == 0)
1170 newsect->lma = (phdr->p_paddr
1171 + hdr->sh_addr - phdr->p_vaddr) / opb;
1172 else
1173 /* We used to use the same adjustment for SEC_LOAD
1174 sections, but that doesn't work if the segment
1175 is packed with code from multiple VMAs.
1176 Instead we calculate the section LMA based on
1177 the segment LMA. It is assumed that the
1178 segment will contain sections with contiguous
1179 LMAs, even if the VMAs are not. */
1180 newsect->lma = (phdr->p_paddr
1181 + hdr->sh_offset - phdr->p_offset) / opb;
1182
1183 /* With contiguous segments, we can't tell from file
1184 offsets whether a section with zero size should
1185 be placed at the end of one segment or the
1186 beginning of the next. Decide based on vaddr. */
1187 if (hdr->sh_addr >= phdr->p_vaddr
1188 && (hdr->sh_addr + hdr->sh_size
1189 <= phdr->p_vaddr + phdr->p_memsz))
1190 break;
1191 }
1192 }
1193 }
1194
1195 /* Compress/decompress DWARF debug sections with names: .debug_* and
1196 .zdebug_*, after the section flags is set. */
1197 if ((newsect->flags & SEC_DEBUGGING)
1198 && ((name[1] == 'd' && name[6] == '_')
1199 || (name[1] == 'z' && name[7] == '_')))
1200 {
1201 enum { nothing, compress, decompress } action = nothing;
1202 int compression_header_size;
1203 bfd_size_type uncompressed_size;
1204 unsigned int uncompressed_align_power;
1205 bfd_boolean compressed
1206 = bfd_is_section_compressed_with_header (abfd, newsect,
1207 &compression_header_size,
1208 &uncompressed_size,
1209 &uncompressed_align_power);
1210 if (compressed)
1211 {
1212 /* Compressed section. Check if we should decompress. */
1213 if ((abfd->flags & BFD_DECOMPRESS))
1214 action = decompress;
1215 }
1216
1217 /* Compress the uncompressed section or convert from/to .zdebug*
1218 section. Check if we should compress. */
1219 if (action == nothing)
1220 {
1221 if (newsect->size != 0
1222 && (abfd->flags & BFD_COMPRESS)
1223 && compression_header_size >= 0
1224 && uncompressed_size > 0
1225 && (!compressed
1226 || ((compression_header_size > 0)
1227 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1228 action = compress;
1229 else
1230 return TRUE;
1231 }
1232
1233 if (action == compress)
1234 {
1235 if (!bfd_init_section_compress_status (abfd, newsect))
1236 {
1237 _bfd_error_handler
1238 /* xgettext:c-format */
1239 (_("%pB: unable to initialize compress status for section %s"),
1240 abfd, name);
1241 return FALSE;
1242 }
1243 }
1244 else
1245 {
1246 if (!bfd_init_section_decompress_status (abfd, newsect))
1247 {
1248 _bfd_error_handler
1249 /* xgettext:c-format */
1250 (_("%pB: unable to initialize decompress status for section %s"),
1251 abfd, name);
1252 return FALSE;
1253 }
1254 }
1255
1256 if (abfd->is_linker_input)
1257 {
1258 if (name[1] == 'z'
1259 && (action == decompress
1260 || (action == compress
1261 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1262 {
1263 /* Convert section name from .zdebug_* to .debug_* so
1264 that linker will consider this section as a debug
1265 section. */
1266 char *new_name = convert_zdebug_to_debug (abfd, name);
1267 if (new_name == NULL)
1268 return FALSE;
1269 bfd_rename_section (newsect, new_name);
1270 }
1271 }
1272 else
1273 /* For objdump, don't rename the section. For objcopy, delay
1274 section rename to elf_fake_sections. */
1275 newsect->flags |= SEC_ELF_RENAME;
1276 }
1277
1278 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1279 section. */
1280 const char *lto_section_name = ".gnu.lto_.lto.";
1281 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1282 {
1283 struct lto_section lsection;
1284 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1285 sizeof (struct lto_section)))
1286 abfd->lto_slim_object = lsection.slim_object;
1287 }
1288
1289 return TRUE;
1290 }
1291
1292 const char *const bfd_elf_section_type_names[] =
1293 {
1294 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1295 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1296 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1297 };
1298
1299 /* ELF relocs are against symbols. If we are producing relocatable
1300 output, and the reloc is against an external symbol, and nothing
1301 has given us any additional addend, the resulting reloc will also
1302 be against the same symbol. In such a case, we don't want to
1303 change anything about the way the reloc is handled, since it will
1304 all be done at final link time. Rather than put special case code
1305 into bfd_perform_relocation, all the reloc types use this howto
1306 function. It just short circuits the reloc if producing
1307 relocatable output against an external symbol. */
1308
1309 bfd_reloc_status_type
1310 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1311 arelent *reloc_entry,
1312 asymbol *symbol,
1313 void *data ATTRIBUTE_UNUSED,
1314 asection *input_section,
1315 bfd *output_bfd,
1316 char **error_message ATTRIBUTE_UNUSED)
1317 {
1318 if (output_bfd != NULL
1319 && (symbol->flags & BSF_SECTION_SYM) == 0
1320 && (! reloc_entry->howto->partial_inplace
1321 || reloc_entry->addend == 0))
1322 {
1323 reloc_entry->address += input_section->output_offset;
1324 return bfd_reloc_ok;
1325 }
1326
1327 return bfd_reloc_continue;
1328 }
1329 \f
1330 /* Returns TRUE if section A matches section B.
1331 Names, addresses and links may be different, but everything else
1332 should be the same. */
1333
1334 static bfd_boolean
1335 section_match (const Elf_Internal_Shdr * a,
1336 const Elf_Internal_Shdr * b)
1337 {
1338 if (a->sh_type != b->sh_type
1339 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1340 || a->sh_addralign != b->sh_addralign
1341 || a->sh_entsize != b->sh_entsize)
1342 return FALSE;
1343 if (a->sh_type == SHT_SYMTAB
1344 || a->sh_type == SHT_STRTAB)
1345 return TRUE;
1346 return a->sh_size == b->sh_size;
1347 }
1348
1349 /* Find a section in OBFD that has the same characteristics
1350 as IHEADER. Return the index of this section or SHN_UNDEF if
1351 none can be found. Check's section HINT first, as this is likely
1352 to be the correct section. */
1353
1354 static unsigned int
1355 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1356 const unsigned int hint)
1357 {
1358 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1359 unsigned int i;
1360
1361 BFD_ASSERT (iheader != NULL);
1362
1363 /* See PR 20922 for a reproducer of the NULL test. */
1364 if (hint < elf_numsections (obfd)
1365 && oheaders[hint] != NULL
1366 && section_match (oheaders[hint], iheader))
1367 return hint;
1368
1369 for (i = 1; i < elf_numsections (obfd); i++)
1370 {
1371 Elf_Internal_Shdr * oheader = oheaders[i];
1372
1373 if (oheader == NULL)
1374 continue;
1375 if (section_match (oheader, iheader))
1376 /* FIXME: Do we care if there is a potential for
1377 multiple matches ? */
1378 return i;
1379 }
1380
1381 return SHN_UNDEF;
1382 }
1383
1384 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1385 Processor specific section, based upon a matching input section.
1386 Returns TRUE upon success, FALSE otherwise. */
1387
1388 static bfd_boolean
1389 copy_special_section_fields (const bfd *ibfd,
1390 bfd *obfd,
1391 const Elf_Internal_Shdr *iheader,
1392 Elf_Internal_Shdr *oheader,
1393 const unsigned int secnum)
1394 {
1395 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1396 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1397 bfd_boolean changed = FALSE;
1398 unsigned int sh_link;
1399
1400 if (oheader->sh_type == SHT_NOBITS)
1401 {
1402 /* This is a feature for objcopy --only-keep-debug:
1403 When a section's type is changed to NOBITS, we preserve
1404 the sh_link and sh_info fields so that they can be
1405 matched up with the original.
1406
1407 Note: Strictly speaking these assignments are wrong.
1408 The sh_link and sh_info fields should point to the
1409 relevent sections in the output BFD, which may not be in
1410 the same location as they were in the input BFD. But
1411 the whole point of this action is to preserve the
1412 original values of the sh_link and sh_info fields, so
1413 that they can be matched up with the section headers in
1414 the original file. So strictly speaking we may be
1415 creating an invalid ELF file, but it is only for a file
1416 that just contains debug info and only for sections
1417 without any contents. */
1418 if (oheader->sh_link == 0)
1419 oheader->sh_link = iheader->sh_link;
1420 if (oheader->sh_info == 0)
1421 oheader->sh_info = iheader->sh_info;
1422 return TRUE;
1423 }
1424
1425 /* Allow the target a chance to decide how these fields should be set. */
1426 if (bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1427 iheader, oheader))
1428 return TRUE;
1429
1430 /* We have an iheader which might match oheader, and which has non-zero
1431 sh_info and/or sh_link fields. Attempt to follow those links and find
1432 the section in the output bfd which corresponds to the linked section
1433 in the input bfd. */
1434 if (iheader->sh_link != SHN_UNDEF)
1435 {
1436 /* See PR 20931 for a reproducer. */
1437 if (iheader->sh_link >= elf_numsections (ibfd))
1438 {
1439 _bfd_error_handler
1440 /* xgettext:c-format */
1441 (_("%pB: invalid sh_link field (%d) in section number %d"),
1442 ibfd, iheader->sh_link, secnum);
1443 return FALSE;
1444 }
1445
1446 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1447 if (sh_link != SHN_UNDEF)
1448 {
1449 oheader->sh_link = sh_link;
1450 changed = TRUE;
1451 }
1452 else
1453 /* FIXME: Should we install iheader->sh_link
1454 if we could not find a match ? */
1455 _bfd_error_handler
1456 /* xgettext:c-format */
1457 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1458 }
1459
1460 if (iheader->sh_info)
1461 {
1462 /* The sh_info field can hold arbitrary information, but if the
1463 SHF_LINK_INFO flag is set then it should be interpreted as a
1464 section index. */
1465 if (iheader->sh_flags & SHF_INFO_LINK)
1466 {
1467 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1468 iheader->sh_info);
1469 if (sh_link != SHN_UNDEF)
1470 oheader->sh_flags |= SHF_INFO_LINK;
1471 }
1472 else
1473 /* No idea what it means - just copy it. */
1474 sh_link = iheader->sh_info;
1475
1476 if (sh_link != SHN_UNDEF)
1477 {
1478 oheader->sh_info = sh_link;
1479 changed = TRUE;
1480 }
1481 else
1482 _bfd_error_handler
1483 /* xgettext:c-format */
1484 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1485 }
1486
1487 return changed;
1488 }
1489
1490 /* Copy the program header and other data from one object module to
1491 another. */
1492
1493 bfd_boolean
1494 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1495 {
1496 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1497 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1498 const struct elf_backend_data *bed;
1499 unsigned int i;
1500
1501 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1502 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1503 return TRUE;
1504
1505 if (!elf_flags_init (obfd))
1506 {
1507 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1508 elf_flags_init (obfd) = TRUE;
1509 }
1510
1511 elf_gp (obfd) = elf_gp (ibfd);
1512
1513 /* Also copy the EI_OSABI field. */
1514 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1515 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1516
1517 /* If set, copy the EI_ABIVERSION field. */
1518 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1519 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1520 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1521
1522 /* Copy object attributes. */
1523 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1524
1525 if (iheaders == NULL || oheaders == NULL)
1526 return TRUE;
1527
1528 bed = get_elf_backend_data (obfd);
1529
1530 /* Possibly copy other fields in the section header. */
1531 for (i = 1; i < elf_numsections (obfd); i++)
1532 {
1533 unsigned int j;
1534 Elf_Internal_Shdr * oheader = oheaders[i];
1535
1536 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1537 because of a special case need for generating separate debug info
1538 files. See below for more details. */
1539 if (oheader == NULL
1540 || (oheader->sh_type != SHT_NOBITS
1541 && oheader->sh_type < SHT_LOOS))
1542 continue;
1543
1544 /* Ignore empty sections, and sections whose
1545 fields have already been initialised. */
1546 if (oheader->sh_size == 0
1547 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1548 continue;
1549
1550 /* Scan for the matching section in the input bfd.
1551 First we try for a direct mapping between the input and output sections. */
1552 for (j = 1; j < elf_numsections (ibfd); j++)
1553 {
1554 const Elf_Internal_Shdr * iheader = iheaders[j];
1555
1556 if (iheader == NULL)
1557 continue;
1558
1559 if (oheader->bfd_section != NULL
1560 && iheader->bfd_section != NULL
1561 && iheader->bfd_section->output_section != NULL
1562 && iheader->bfd_section->output_section == oheader->bfd_section)
1563 {
1564 /* We have found a connection from the input section to the
1565 output section. Attempt to copy the header fields. If
1566 this fails then do not try any further sections - there
1567 should only be a one-to-one mapping between input and output. */
1568 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1569 j = elf_numsections (ibfd);
1570 break;
1571 }
1572 }
1573
1574 if (j < elf_numsections (ibfd))
1575 continue;
1576
1577 /* That failed. So try to deduce the corresponding input section.
1578 Unfortunately we cannot compare names as the output string table
1579 is empty, so instead we check size, address and type. */
1580 for (j = 1; j < elf_numsections (ibfd); j++)
1581 {
1582 const Elf_Internal_Shdr * iheader = iheaders[j];
1583
1584 if (iheader == NULL)
1585 continue;
1586
1587 /* Try matching fields in the input section's header.
1588 Since --only-keep-debug turns all non-debug sections into
1589 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1590 input type. */
1591 if ((oheader->sh_type == SHT_NOBITS
1592 || iheader->sh_type == oheader->sh_type)
1593 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1594 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1595 && iheader->sh_addralign == oheader->sh_addralign
1596 && iheader->sh_entsize == oheader->sh_entsize
1597 && iheader->sh_size == oheader->sh_size
1598 && iheader->sh_addr == oheader->sh_addr
1599 && (iheader->sh_info != oheader->sh_info
1600 || iheader->sh_link != oheader->sh_link))
1601 {
1602 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1603 break;
1604 }
1605 }
1606
1607 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1608 {
1609 /* Final attempt. Call the backend copy function
1610 with a NULL input section. */
1611 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1612 NULL, oheader);
1613 }
1614 }
1615
1616 return TRUE;
1617 }
1618
1619 static const char *
1620 get_segment_type (unsigned int p_type)
1621 {
1622 const char *pt;
1623 switch (p_type)
1624 {
1625 case PT_NULL: pt = "NULL"; break;
1626 case PT_LOAD: pt = "LOAD"; break;
1627 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1628 case PT_INTERP: pt = "INTERP"; break;
1629 case PT_NOTE: pt = "NOTE"; break;
1630 case PT_SHLIB: pt = "SHLIB"; break;
1631 case PT_PHDR: pt = "PHDR"; break;
1632 case PT_TLS: pt = "TLS"; break;
1633 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1634 case PT_GNU_STACK: pt = "STACK"; break;
1635 case PT_GNU_RELRO: pt = "RELRO"; break;
1636 default: pt = NULL; break;
1637 }
1638 return pt;
1639 }
1640
1641 /* Print out the program headers. */
1642
1643 bfd_boolean
1644 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1645 {
1646 FILE *f = (FILE *) farg;
1647 Elf_Internal_Phdr *p;
1648 asection *s;
1649 bfd_byte *dynbuf = NULL;
1650
1651 p = elf_tdata (abfd)->phdr;
1652 if (p != NULL)
1653 {
1654 unsigned int i, c;
1655
1656 fprintf (f, _("\nProgram Header:\n"));
1657 c = elf_elfheader (abfd)->e_phnum;
1658 for (i = 0; i < c; i++, p++)
1659 {
1660 const char *pt = get_segment_type (p->p_type);
1661 char buf[20];
1662
1663 if (pt == NULL)
1664 {
1665 sprintf (buf, "0x%lx", p->p_type);
1666 pt = buf;
1667 }
1668 fprintf (f, "%8s off 0x", pt);
1669 bfd_fprintf_vma (abfd, f, p->p_offset);
1670 fprintf (f, " vaddr 0x");
1671 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1672 fprintf (f, " paddr 0x");
1673 bfd_fprintf_vma (abfd, f, p->p_paddr);
1674 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1675 fprintf (f, " filesz 0x");
1676 bfd_fprintf_vma (abfd, f, p->p_filesz);
1677 fprintf (f, " memsz 0x");
1678 bfd_fprintf_vma (abfd, f, p->p_memsz);
1679 fprintf (f, " flags %c%c%c",
1680 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1681 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1682 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1683 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1684 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1685 fprintf (f, "\n");
1686 }
1687 }
1688
1689 s = bfd_get_section_by_name (abfd, ".dynamic");
1690 if (s != NULL)
1691 {
1692 unsigned int elfsec;
1693 unsigned long shlink;
1694 bfd_byte *extdyn, *extdynend;
1695 size_t extdynsize;
1696 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1697
1698 fprintf (f, _("\nDynamic Section:\n"));
1699
1700 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1701 goto error_return;
1702
1703 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1704 if (elfsec == SHN_BAD)
1705 goto error_return;
1706 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1707
1708 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1709 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1710
1711 extdyn = dynbuf;
1712 /* PR 17512: file: 6f427532. */
1713 if (s->size < extdynsize)
1714 goto error_return;
1715 extdynend = extdyn + s->size;
1716 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1717 Fix range check. */
1718 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1719 {
1720 Elf_Internal_Dyn dyn;
1721 const char *name = "";
1722 char ab[20];
1723 bfd_boolean stringp;
1724 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1725
1726 (*swap_dyn_in) (abfd, extdyn, &dyn);
1727
1728 if (dyn.d_tag == DT_NULL)
1729 break;
1730
1731 stringp = FALSE;
1732 switch (dyn.d_tag)
1733 {
1734 default:
1735 if (bed->elf_backend_get_target_dtag)
1736 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1737
1738 if (!strcmp (name, ""))
1739 {
1740 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1741 name = ab;
1742 }
1743 break;
1744
1745 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1746 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1747 case DT_PLTGOT: name = "PLTGOT"; break;
1748 case DT_HASH: name = "HASH"; break;
1749 case DT_STRTAB: name = "STRTAB"; break;
1750 case DT_SYMTAB: name = "SYMTAB"; break;
1751 case DT_RELA: name = "RELA"; break;
1752 case DT_RELASZ: name = "RELASZ"; break;
1753 case DT_RELAENT: name = "RELAENT"; break;
1754 case DT_STRSZ: name = "STRSZ"; break;
1755 case DT_SYMENT: name = "SYMENT"; break;
1756 case DT_INIT: name = "INIT"; break;
1757 case DT_FINI: name = "FINI"; break;
1758 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1759 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1760 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1761 case DT_REL: name = "REL"; break;
1762 case DT_RELSZ: name = "RELSZ"; break;
1763 case DT_RELENT: name = "RELENT"; break;
1764 case DT_PLTREL: name = "PLTREL"; break;
1765 case DT_DEBUG: name = "DEBUG"; break;
1766 case DT_TEXTREL: name = "TEXTREL"; break;
1767 case DT_JMPREL: name = "JMPREL"; break;
1768 case DT_BIND_NOW: name = "BIND_NOW"; break;
1769 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1770 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1771 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1772 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1773 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1774 case DT_FLAGS: name = "FLAGS"; break;
1775 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1776 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1777 case DT_CHECKSUM: name = "CHECKSUM"; break;
1778 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1779 case DT_MOVEENT: name = "MOVEENT"; break;
1780 case DT_MOVESZ: name = "MOVESZ"; break;
1781 case DT_FEATURE: name = "FEATURE"; break;
1782 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1783 case DT_SYMINSZ: name = "SYMINSZ"; break;
1784 case DT_SYMINENT: name = "SYMINENT"; break;
1785 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1786 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1787 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1788 case DT_PLTPAD: name = "PLTPAD"; break;
1789 case DT_MOVETAB: name = "MOVETAB"; break;
1790 case DT_SYMINFO: name = "SYMINFO"; break;
1791 case DT_RELACOUNT: name = "RELACOUNT"; break;
1792 case DT_RELCOUNT: name = "RELCOUNT"; break;
1793 case DT_FLAGS_1: name = "FLAGS_1"; break;
1794 case DT_VERSYM: name = "VERSYM"; break;
1795 case DT_VERDEF: name = "VERDEF"; break;
1796 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1797 case DT_VERNEED: name = "VERNEED"; break;
1798 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1799 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1800 case DT_USED: name = "USED"; break;
1801 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1802 case DT_GNU_HASH: name = "GNU_HASH"; break;
1803 }
1804
1805 fprintf (f, " %-20s ", name);
1806 if (! stringp)
1807 {
1808 fprintf (f, "0x");
1809 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1810 }
1811 else
1812 {
1813 const char *string;
1814 unsigned int tagv = dyn.d_un.d_val;
1815
1816 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1817 if (string == NULL)
1818 goto error_return;
1819 fprintf (f, "%s", string);
1820 }
1821 fprintf (f, "\n");
1822 }
1823
1824 free (dynbuf);
1825 dynbuf = NULL;
1826 }
1827
1828 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1829 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1830 {
1831 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1832 return FALSE;
1833 }
1834
1835 if (elf_dynverdef (abfd) != 0)
1836 {
1837 Elf_Internal_Verdef *t;
1838
1839 fprintf (f, _("\nVersion definitions:\n"));
1840 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1841 {
1842 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1843 t->vd_flags, t->vd_hash,
1844 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1845 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1846 {
1847 Elf_Internal_Verdaux *a;
1848
1849 fprintf (f, "\t");
1850 for (a = t->vd_auxptr->vda_nextptr;
1851 a != NULL;
1852 a = a->vda_nextptr)
1853 fprintf (f, "%s ",
1854 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1855 fprintf (f, "\n");
1856 }
1857 }
1858 }
1859
1860 if (elf_dynverref (abfd) != 0)
1861 {
1862 Elf_Internal_Verneed *t;
1863
1864 fprintf (f, _("\nVersion References:\n"));
1865 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1866 {
1867 Elf_Internal_Vernaux *a;
1868
1869 fprintf (f, _(" required from %s:\n"),
1870 t->vn_filename ? t->vn_filename : "<corrupt>");
1871 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1872 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1873 a->vna_flags, a->vna_other,
1874 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1875 }
1876 }
1877
1878 return TRUE;
1879
1880 error_return:
1881 if (dynbuf != NULL)
1882 free (dynbuf);
1883 return FALSE;
1884 }
1885
1886 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1887 and return symbol version for symbol version itself. */
1888
1889 const char *
1890 _bfd_elf_get_symbol_version_name (bfd *abfd, asymbol *symbol,
1891 bfd_boolean base_p,
1892 bfd_boolean *hidden)
1893 {
1894 const char *version_string = NULL;
1895 if (elf_dynversym (abfd) != 0
1896 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1897 {
1898 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1899
1900 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1901 vernum &= VERSYM_VERSION;
1902
1903 if (vernum == 0)
1904 version_string = "";
1905 else if (vernum == 1
1906 && (vernum > elf_tdata (abfd)->cverdefs
1907 || (elf_tdata (abfd)->verdef[0].vd_flags
1908 == VER_FLG_BASE)))
1909 version_string = base_p ? "Base" : "";
1910 else if (vernum <= elf_tdata (abfd)->cverdefs)
1911 {
1912 const char *nodename
1913 = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1914 version_string = ((base_p || strcmp (symbol->name, nodename))
1915 ? nodename : "");
1916 }
1917 else
1918 {
1919 Elf_Internal_Verneed *t;
1920
1921 version_string = _("<corrupt>");
1922 for (t = elf_tdata (abfd)->verref;
1923 t != NULL;
1924 t = t->vn_nextref)
1925 {
1926 Elf_Internal_Vernaux *a;
1927
1928 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1929 {
1930 if (a->vna_other == vernum)
1931 {
1932 version_string = a->vna_nodename;
1933 break;
1934 }
1935 }
1936 }
1937 }
1938 }
1939 return version_string;
1940 }
1941
1942 /* Get version string. */
1943
1944 const char *
1945 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1946 bfd_boolean *hidden)
1947 {
1948 return _bfd_elf_get_symbol_version_name (abfd, symbol, TRUE, hidden);
1949 }
1950
1951 /* Display ELF-specific fields of a symbol. */
1952
1953 void
1954 bfd_elf_print_symbol (bfd *abfd,
1955 void *filep,
1956 asymbol *symbol,
1957 bfd_print_symbol_type how)
1958 {
1959 FILE *file = (FILE *) filep;
1960 switch (how)
1961 {
1962 case bfd_print_symbol_name:
1963 fprintf (file, "%s", symbol->name);
1964 break;
1965 case bfd_print_symbol_more:
1966 fprintf (file, "elf ");
1967 bfd_fprintf_vma (abfd, file, symbol->value);
1968 fprintf (file, " %x", symbol->flags);
1969 break;
1970 case bfd_print_symbol_all:
1971 {
1972 const char *section_name;
1973 const char *name = NULL;
1974 const struct elf_backend_data *bed;
1975 unsigned char st_other;
1976 bfd_vma val;
1977 const char *version_string;
1978 bfd_boolean hidden;
1979
1980 section_name = symbol->section ? symbol->section->name : "(*none*)";
1981
1982 bed = get_elf_backend_data (abfd);
1983 if (bed->elf_backend_print_symbol_all)
1984 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1985
1986 if (name == NULL)
1987 {
1988 name = symbol->name;
1989 bfd_print_symbol_vandf (abfd, file, symbol);
1990 }
1991
1992 fprintf (file, " %s\t", section_name);
1993 /* Print the "other" value for a symbol. For common symbols,
1994 we've already printed the size; now print the alignment.
1995 For other symbols, we have no specified alignment, and
1996 we've printed the address; now print the size. */
1997 if (symbol->section && bfd_is_com_section (symbol->section))
1998 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1999 else
2000 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
2001 bfd_fprintf_vma (abfd, file, val);
2002
2003 /* If we have version information, print it. */
2004 version_string = _bfd_elf_get_symbol_version_string (abfd,
2005 symbol,
2006 &hidden);
2007 if (version_string)
2008 {
2009 if (!hidden)
2010 fprintf (file, " %-11s", version_string);
2011 else
2012 {
2013 int i;
2014
2015 fprintf (file, " (%s)", version_string);
2016 for (i = 10 - strlen (version_string); i > 0; --i)
2017 putc (' ', file);
2018 }
2019 }
2020
2021 /* If the st_other field is not zero, print it. */
2022 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2023
2024 switch (st_other)
2025 {
2026 case 0: break;
2027 case STV_INTERNAL: fprintf (file, " .internal"); break;
2028 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2029 case STV_PROTECTED: fprintf (file, " .protected"); break;
2030 default:
2031 /* Some other non-defined flags are also present, so print
2032 everything hex. */
2033 fprintf (file, " 0x%02x", (unsigned int) st_other);
2034 }
2035
2036 fprintf (file, " %s", name);
2037 }
2038 break;
2039 }
2040 }
2041 \f
2042 /* ELF .o/exec file reading */
2043
2044 /* Create a new bfd section from an ELF section header. */
2045
2046 bfd_boolean
2047 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2048 {
2049 Elf_Internal_Shdr *hdr;
2050 Elf_Internal_Ehdr *ehdr;
2051 const struct elf_backend_data *bed;
2052 const char *name;
2053 bfd_boolean ret = TRUE;
2054 static bfd_boolean * sections_being_created = NULL;
2055 static bfd * sections_being_created_abfd = NULL;
2056 static unsigned int nesting = 0;
2057
2058 if (shindex >= elf_numsections (abfd))
2059 return FALSE;
2060
2061 if (++ nesting > 3)
2062 {
2063 /* PR17512: A corrupt ELF binary might contain a recursive group of
2064 sections, with each the string indices pointing to the next in the
2065 loop. Detect this here, by refusing to load a section that we are
2066 already in the process of loading. We only trigger this test if
2067 we have nested at least three sections deep as normal ELF binaries
2068 can expect to recurse at least once.
2069
2070 FIXME: It would be better if this array was attached to the bfd,
2071 rather than being held in a static pointer. */
2072
2073 if (sections_being_created_abfd != abfd)
2074 sections_being_created = NULL;
2075 if (sections_being_created == NULL)
2076 {
2077 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2078 sections_being_created = (bfd_boolean *) bfd_zalloc (abfd, amt);
2079 if (sections_being_created == NULL)
2080 return FALSE;
2081 sections_being_created_abfd = abfd;
2082 }
2083 if (sections_being_created [shindex])
2084 {
2085 _bfd_error_handler
2086 (_("%pB: warning: loop in section dependencies detected"), abfd);
2087 return FALSE;
2088 }
2089 sections_being_created [shindex] = TRUE;
2090 }
2091
2092 hdr = elf_elfsections (abfd)[shindex];
2093 ehdr = elf_elfheader (abfd);
2094 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2095 hdr->sh_name);
2096 if (name == NULL)
2097 goto fail;
2098
2099 bed = get_elf_backend_data (abfd);
2100 switch (hdr->sh_type)
2101 {
2102 case SHT_NULL:
2103 /* Inactive section. Throw it away. */
2104 goto success;
2105
2106 case SHT_PROGBITS: /* Normal section with contents. */
2107 case SHT_NOBITS: /* .bss section. */
2108 case SHT_HASH: /* .hash section. */
2109 case SHT_NOTE: /* .note section. */
2110 case SHT_INIT_ARRAY: /* .init_array section. */
2111 case SHT_FINI_ARRAY: /* .fini_array section. */
2112 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2113 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2114 case SHT_GNU_HASH: /* .gnu.hash section. */
2115 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2116 goto success;
2117
2118 case SHT_DYNAMIC: /* Dynamic linking information. */
2119 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2120 goto fail;
2121
2122 if (hdr->sh_link > elf_numsections (abfd))
2123 {
2124 /* PR 10478: Accept Solaris binaries with a sh_link
2125 field set to SHN_BEFORE or SHN_AFTER. */
2126 switch (bfd_get_arch (abfd))
2127 {
2128 case bfd_arch_i386:
2129 case bfd_arch_sparc:
2130 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2131 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2132 break;
2133 /* Otherwise fall through. */
2134 default:
2135 goto fail;
2136 }
2137 }
2138 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2139 goto fail;
2140 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2141 {
2142 Elf_Internal_Shdr *dynsymhdr;
2143
2144 /* The shared libraries distributed with hpux11 have a bogus
2145 sh_link field for the ".dynamic" section. Find the
2146 string table for the ".dynsym" section instead. */
2147 if (elf_dynsymtab (abfd) != 0)
2148 {
2149 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2150 hdr->sh_link = dynsymhdr->sh_link;
2151 }
2152 else
2153 {
2154 unsigned int i, num_sec;
2155
2156 num_sec = elf_numsections (abfd);
2157 for (i = 1; i < num_sec; i++)
2158 {
2159 dynsymhdr = elf_elfsections (abfd)[i];
2160 if (dynsymhdr->sh_type == SHT_DYNSYM)
2161 {
2162 hdr->sh_link = dynsymhdr->sh_link;
2163 break;
2164 }
2165 }
2166 }
2167 }
2168 goto success;
2169
2170 case SHT_SYMTAB: /* A symbol table. */
2171 if (elf_onesymtab (abfd) == shindex)
2172 goto success;
2173
2174 if (hdr->sh_entsize != bed->s->sizeof_sym)
2175 goto fail;
2176
2177 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2178 {
2179 if (hdr->sh_size != 0)
2180 goto fail;
2181 /* Some assemblers erroneously set sh_info to one with a
2182 zero sh_size. ld sees this as a global symbol count
2183 of (unsigned) -1. Fix it here. */
2184 hdr->sh_info = 0;
2185 goto success;
2186 }
2187
2188 /* PR 18854: A binary might contain more than one symbol table.
2189 Unusual, but possible. Warn, but continue. */
2190 if (elf_onesymtab (abfd) != 0)
2191 {
2192 _bfd_error_handler
2193 /* xgettext:c-format */
2194 (_("%pB: warning: multiple symbol tables detected"
2195 " - ignoring the table in section %u"),
2196 abfd, shindex);
2197 goto success;
2198 }
2199 elf_onesymtab (abfd) = shindex;
2200 elf_symtab_hdr (abfd) = *hdr;
2201 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2202 abfd->flags |= HAS_SYMS;
2203
2204 /* Sometimes a shared object will map in the symbol table. If
2205 SHF_ALLOC is set, and this is a shared object, then we also
2206 treat this section as a BFD section. We can not base the
2207 decision purely on SHF_ALLOC, because that flag is sometimes
2208 set in a relocatable object file, which would confuse the
2209 linker. */
2210 if ((hdr->sh_flags & SHF_ALLOC) != 0
2211 && (abfd->flags & DYNAMIC) != 0
2212 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2213 shindex))
2214 goto fail;
2215
2216 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2217 can't read symbols without that section loaded as well. It
2218 is most likely specified by the next section header. */
2219 {
2220 elf_section_list * entry;
2221 unsigned int i, num_sec;
2222
2223 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2224 if (entry->hdr.sh_link == shindex)
2225 goto success;
2226
2227 num_sec = elf_numsections (abfd);
2228 for (i = shindex + 1; i < num_sec; i++)
2229 {
2230 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2231
2232 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2233 && hdr2->sh_link == shindex)
2234 break;
2235 }
2236
2237 if (i == num_sec)
2238 for (i = 1; i < shindex; i++)
2239 {
2240 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2241
2242 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2243 && hdr2->sh_link == shindex)
2244 break;
2245 }
2246
2247 if (i != shindex)
2248 ret = bfd_section_from_shdr (abfd, i);
2249 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2250 goto success;
2251 }
2252
2253 case SHT_DYNSYM: /* A dynamic symbol table. */
2254 if (elf_dynsymtab (abfd) == shindex)
2255 goto success;
2256
2257 if (hdr->sh_entsize != bed->s->sizeof_sym)
2258 goto fail;
2259
2260 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2261 {
2262 if (hdr->sh_size != 0)
2263 goto fail;
2264
2265 /* Some linkers erroneously set sh_info to one with a
2266 zero sh_size. ld sees this as a global symbol count
2267 of (unsigned) -1. Fix it here. */
2268 hdr->sh_info = 0;
2269 goto success;
2270 }
2271
2272 /* PR 18854: A binary might contain more than one dynamic symbol table.
2273 Unusual, but possible. Warn, but continue. */
2274 if (elf_dynsymtab (abfd) != 0)
2275 {
2276 _bfd_error_handler
2277 /* xgettext:c-format */
2278 (_("%pB: warning: multiple dynamic symbol tables detected"
2279 " - ignoring the table in section %u"),
2280 abfd, shindex);
2281 goto success;
2282 }
2283 elf_dynsymtab (abfd) = shindex;
2284 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2285 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2286 abfd->flags |= HAS_SYMS;
2287
2288 /* Besides being a symbol table, we also treat this as a regular
2289 section, so that objcopy can handle it. */
2290 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2291 goto success;
2292
2293 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2294 {
2295 elf_section_list * entry;
2296
2297 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2298 if (entry->ndx == shindex)
2299 goto success;
2300
2301 entry = bfd_alloc (abfd, sizeof (*entry));
2302 if (entry == NULL)
2303 goto fail;
2304 entry->ndx = shindex;
2305 entry->hdr = * hdr;
2306 entry->next = elf_symtab_shndx_list (abfd);
2307 elf_symtab_shndx_list (abfd) = entry;
2308 elf_elfsections (abfd)[shindex] = & entry->hdr;
2309 goto success;
2310 }
2311
2312 case SHT_STRTAB: /* A string table. */
2313 if (hdr->bfd_section != NULL)
2314 goto success;
2315
2316 if (ehdr->e_shstrndx == shindex)
2317 {
2318 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2319 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2320 goto success;
2321 }
2322
2323 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2324 {
2325 symtab_strtab:
2326 elf_tdata (abfd)->strtab_hdr = *hdr;
2327 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2328 goto success;
2329 }
2330
2331 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2332 {
2333 dynsymtab_strtab:
2334 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2335 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2336 elf_elfsections (abfd)[shindex] = hdr;
2337 /* We also treat this as a regular section, so that objcopy
2338 can handle it. */
2339 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2340 shindex);
2341 goto success;
2342 }
2343
2344 /* If the string table isn't one of the above, then treat it as a
2345 regular section. We need to scan all the headers to be sure,
2346 just in case this strtab section appeared before the above. */
2347 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2348 {
2349 unsigned int i, num_sec;
2350
2351 num_sec = elf_numsections (abfd);
2352 for (i = 1; i < num_sec; i++)
2353 {
2354 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2355 if (hdr2->sh_link == shindex)
2356 {
2357 /* Prevent endless recursion on broken objects. */
2358 if (i == shindex)
2359 goto fail;
2360 if (! bfd_section_from_shdr (abfd, i))
2361 goto fail;
2362 if (elf_onesymtab (abfd) == i)
2363 goto symtab_strtab;
2364 if (elf_dynsymtab (abfd) == i)
2365 goto dynsymtab_strtab;
2366 }
2367 }
2368 }
2369 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2370 goto success;
2371
2372 case SHT_REL:
2373 case SHT_RELA:
2374 /* *These* do a lot of work -- but build no sections! */
2375 {
2376 asection *target_sect;
2377 Elf_Internal_Shdr *hdr2, **p_hdr;
2378 unsigned int num_sec = elf_numsections (abfd);
2379 struct bfd_elf_section_data *esdt;
2380
2381 if (hdr->sh_entsize
2382 != (bfd_size_type) (hdr->sh_type == SHT_REL
2383 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2384 goto fail;
2385
2386 /* Check for a bogus link to avoid crashing. */
2387 if (hdr->sh_link >= num_sec)
2388 {
2389 _bfd_error_handler
2390 /* xgettext:c-format */
2391 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2392 abfd, hdr->sh_link, name, shindex);
2393 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2394 shindex);
2395 goto success;
2396 }
2397
2398 /* For some incomprehensible reason Oracle distributes
2399 libraries for Solaris in which some of the objects have
2400 bogus sh_link fields. It would be nice if we could just
2401 reject them, but, unfortunately, some people need to use
2402 them. We scan through the section headers; if we find only
2403 one suitable symbol table, we clobber the sh_link to point
2404 to it. I hope this doesn't break anything.
2405
2406 Don't do it on executable nor shared library. */
2407 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2408 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2409 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2410 {
2411 unsigned int scan;
2412 int found;
2413
2414 found = 0;
2415 for (scan = 1; scan < num_sec; scan++)
2416 {
2417 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2418 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2419 {
2420 if (found != 0)
2421 {
2422 found = 0;
2423 break;
2424 }
2425 found = scan;
2426 }
2427 }
2428 if (found != 0)
2429 hdr->sh_link = found;
2430 }
2431
2432 /* Get the symbol table. */
2433 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2434 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2435 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2436 goto fail;
2437
2438 /* If this is an alloc section in an executable or shared
2439 library, or the reloc section does not use the main symbol
2440 table we don't treat it as a reloc section. BFD can't
2441 adequately represent such a section, so at least for now,
2442 we don't try. We just present it as a normal section. We
2443 also can't use it as a reloc section if it points to the
2444 null section, an invalid section, another reloc section, or
2445 its sh_link points to the null section. */
2446 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2447 && (hdr->sh_flags & SHF_ALLOC) != 0)
2448 || hdr->sh_link == SHN_UNDEF
2449 || hdr->sh_link != elf_onesymtab (abfd)
2450 || hdr->sh_info == SHN_UNDEF
2451 || hdr->sh_info >= num_sec
2452 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2453 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2454 {
2455 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2456 shindex);
2457 goto success;
2458 }
2459
2460 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2461 goto fail;
2462
2463 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2464 if (target_sect == NULL)
2465 goto fail;
2466
2467 esdt = elf_section_data (target_sect);
2468 if (hdr->sh_type == SHT_RELA)
2469 p_hdr = &esdt->rela.hdr;
2470 else
2471 p_hdr = &esdt->rel.hdr;
2472
2473 /* PR 17512: file: 0b4f81b7.
2474 Also see PR 24456, for a file which deliberately has two reloc
2475 sections. */
2476 if (*p_hdr != NULL)
2477 {
2478 if (!bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2479 {
2480 _bfd_error_handler
2481 /* xgettext:c-format */
2482 (_("%pB: warning: secondary relocation section '%s' "
2483 "for section %pA found - ignoring"),
2484 abfd, name, target_sect);
2485 }
2486 goto success;
2487 }
2488
2489 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2490 if (hdr2 == NULL)
2491 goto fail;
2492 *hdr2 = *hdr;
2493 *p_hdr = hdr2;
2494 elf_elfsections (abfd)[shindex] = hdr2;
2495 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2496 * bed->s->int_rels_per_ext_rel);
2497 target_sect->flags |= SEC_RELOC;
2498 target_sect->relocation = NULL;
2499 target_sect->rel_filepos = hdr->sh_offset;
2500 /* In the section to which the relocations apply, mark whether
2501 its relocations are of the REL or RELA variety. */
2502 if (hdr->sh_size != 0)
2503 {
2504 if (hdr->sh_type == SHT_RELA)
2505 target_sect->use_rela_p = 1;
2506 }
2507 abfd->flags |= HAS_RELOC;
2508 goto success;
2509 }
2510
2511 case SHT_GNU_verdef:
2512 elf_dynverdef (abfd) = shindex;
2513 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2514 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2515 goto success;
2516
2517 case SHT_GNU_versym:
2518 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2519 goto fail;
2520
2521 elf_dynversym (abfd) = shindex;
2522 elf_tdata (abfd)->dynversym_hdr = *hdr;
2523 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2524 goto success;
2525
2526 case SHT_GNU_verneed:
2527 elf_dynverref (abfd) = shindex;
2528 elf_tdata (abfd)->dynverref_hdr = *hdr;
2529 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2530 goto success;
2531
2532 case SHT_SHLIB:
2533 goto success;
2534
2535 case SHT_GROUP:
2536 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2537 goto fail;
2538
2539 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2540 goto fail;
2541
2542 goto success;
2543
2544 default:
2545 /* Possibly an attributes section. */
2546 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2547 || hdr->sh_type == bed->obj_attrs_section_type)
2548 {
2549 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2550 goto fail;
2551 _bfd_elf_parse_attributes (abfd, hdr);
2552 goto success;
2553 }
2554
2555 /* Check for any processor-specific section types. */
2556 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2557 goto success;
2558
2559 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2560 {
2561 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2562 /* FIXME: How to properly handle allocated section reserved
2563 for applications? */
2564 _bfd_error_handler
2565 /* xgettext:c-format */
2566 (_("%pB: unknown type [%#x] section `%s'"),
2567 abfd, hdr->sh_type, name);
2568 else
2569 {
2570 /* Allow sections reserved for applications. */
2571 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2572 shindex);
2573 goto success;
2574 }
2575 }
2576 else if (hdr->sh_type >= SHT_LOPROC
2577 && hdr->sh_type <= SHT_HIPROC)
2578 /* FIXME: We should handle this section. */
2579 _bfd_error_handler
2580 /* xgettext:c-format */
2581 (_("%pB: unknown type [%#x] section `%s'"),
2582 abfd, hdr->sh_type, name);
2583 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2584 {
2585 /* Unrecognised OS-specific sections. */
2586 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2587 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2588 required to correctly process the section and the file should
2589 be rejected with an error message. */
2590 _bfd_error_handler
2591 /* xgettext:c-format */
2592 (_("%pB: unknown type [%#x] section `%s'"),
2593 abfd, hdr->sh_type, name);
2594 else
2595 {
2596 /* Otherwise it should be processed. */
2597 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2598 goto success;
2599 }
2600 }
2601 else
2602 /* FIXME: We should handle this section. */
2603 _bfd_error_handler
2604 /* xgettext:c-format */
2605 (_("%pB: unknown type [%#x] section `%s'"),
2606 abfd, hdr->sh_type, name);
2607
2608 goto fail;
2609 }
2610
2611 fail:
2612 ret = FALSE;
2613 success:
2614 if (sections_being_created && sections_being_created_abfd == abfd)
2615 sections_being_created [shindex] = FALSE;
2616 if (-- nesting == 0)
2617 {
2618 sections_being_created = NULL;
2619 sections_being_created_abfd = abfd;
2620 }
2621 return ret;
2622 }
2623
2624 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2625
2626 Elf_Internal_Sym *
2627 bfd_sym_from_r_symndx (struct sym_cache *cache,
2628 bfd *abfd,
2629 unsigned long r_symndx)
2630 {
2631 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2632
2633 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2634 {
2635 Elf_Internal_Shdr *symtab_hdr;
2636 unsigned char esym[sizeof (Elf64_External_Sym)];
2637 Elf_External_Sym_Shndx eshndx;
2638
2639 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2640 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2641 &cache->sym[ent], esym, &eshndx) == NULL)
2642 return NULL;
2643
2644 if (cache->abfd != abfd)
2645 {
2646 memset (cache->indx, -1, sizeof (cache->indx));
2647 cache->abfd = abfd;
2648 }
2649 cache->indx[ent] = r_symndx;
2650 }
2651
2652 return &cache->sym[ent];
2653 }
2654
2655 /* Given an ELF section number, retrieve the corresponding BFD
2656 section. */
2657
2658 asection *
2659 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2660 {
2661 if (sec_index >= elf_numsections (abfd))
2662 return NULL;
2663 return elf_elfsections (abfd)[sec_index]->bfd_section;
2664 }
2665
2666 static const struct bfd_elf_special_section special_sections_b[] =
2667 {
2668 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2669 { NULL, 0, 0, 0, 0 }
2670 };
2671
2672 static const struct bfd_elf_special_section special_sections_c[] =
2673 {
2674 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2675 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2676 { NULL, 0, 0, 0, 0 }
2677 };
2678
2679 static const struct bfd_elf_special_section special_sections_d[] =
2680 {
2681 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2682 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2683 /* There are more DWARF sections than these, but they needn't be added here
2684 unless you have to cope with broken compilers that don't emit section
2685 attributes or you want to help the user writing assembler. */
2686 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2687 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2688 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2689 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2690 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2691 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2692 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2694 { NULL, 0, 0, 0, 0 }
2695 };
2696
2697 static const struct bfd_elf_special_section special_sections_f[] =
2698 {
2699 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2700 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2701 { NULL, 0 , 0, 0, 0 }
2702 };
2703
2704 static const struct bfd_elf_special_section special_sections_g[] =
2705 {
2706 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2707 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2708 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2709 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2710 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2711 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2712 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2713 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2714 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2715 { NULL, 0, 0, 0, 0 }
2716 };
2717
2718 static const struct bfd_elf_special_section special_sections_h[] =
2719 {
2720 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2721 { NULL, 0, 0, 0, 0 }
2722 };
2723
2724 static const struct bfd_elf_special_section special_sections_i[] =
2725 {
2726 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2727 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2728 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2729 { NULL, 0, 0, 0, 0 }
2730 };
2731
2732 static const struct bfd_elf_special_section special_sections_l[] =
2733 {
2734 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2735 { NULL, 0, 0, 0, 0 }
2736 };
2737
2738 static const struct bfd_elf_special_section special_sections_n[] =
2739 {
2740 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2741 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2742 { NULL, 0, 0, 0, 0 }
2743 };
2744
2745 static const struct bfd_elf_special_section special_sections_p[] =
2746 {
2747 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2748 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2749 { NULL, 0, 0, 0, 0 }
2750 };
2751
2752 static const struct bfd_elf_special_section special_sections_r[] =
2753 {
2754 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2755 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2756 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2757 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2758 { NULL, 0, 0, 0, 0 }
2759 };
2760
2761 static const struct bfd_elf_special_section special_sections_s[] =
2762 {
2763 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2764 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2765 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2766 /* See struct bfd_elf_special_section declaration for the semantics of
2767 this special case where .prefix_length != strlen (.prefix). */
2768 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2769 { NULL, 0, 0, 0, 0 }
2770 };
2771
2772 static const struct bfd_elf_special_section special_sections_t[] =
2773 {
2774 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2775 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2776 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2777 { NULL, 0, 0, 0, 0 }
2778 };
2779
2780 static const struct bfd_elf_special_section special_sections_z[] =
2781 {
2782 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2783 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2784 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2785 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2786 { NULL, 0, 0, 0, 0 }
2787 };
2788
2789 static const struct bfd_elf_special_section * const special_sections[] =
2790 {
2791 special_sections_b, /* 'b' */
2792 special_sections_c, /* 'c' */
2793 special_sections_d, /* 'd' */
2794 NULL, /* 'e' */
2795 special_sections_f, /* 'f' */
2796 special_sections_g, /* 'g' */
2797 special_sections_h, /* 'h' */
2798 special_sections_i, /* 'i' */
2799 NULL, /* 'j' */
2800 NULL, /* 'k' */
2801 special_sections_l, /* 'l' */
2802 NULL, /* 'm' */
2803 special_sections_n, /* 'n' */
2804 NULL, /* 'o' */
2805 special_sections_p, /* 'p' */
2806 NULL, /* 'q' */
2807 special_sections_r, /* 'r' */
2808 special_sections_s, /* 's' */
2809 special_sections_t, /* 't' */
2810 NULL, /* 'u' */
2811 NULL, /* 'v' */
2812 NULL, /* 'w' */
2813 NULL, /* 'x' */
2814 NULL, /* 'y' */
2815 special_sections_z /* 'z' */
2816 };
2817
2818 const struct bfd_elf_special_section *
2819 _bfd_elf_get_special_section (const char *name,
2820 const struct bfd_elf_special_section *spec,
2821 unsigned int rela)
2822 {
2823 int i;
2824 int len;
2825
2826 len = strlen (name);
2827
2828 for (i = 0; spec[i].prefix != NULL; i++)
2829 {
2830 int suffix_len;
2831 int prefix_len = spec[i].prefix_length;
2832
2833 if (len < prefix_len)
2834 continue;
2835 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2836 continue;
2837
2838 suffix_len = spec[i].suffix_length;
2839 if (suffix_len <= 0)
2840 {
2841 if (name[prefix_len] != 0)
2842 {
2843 if (suffix_len == 0)
2844 continue;
2845 if (name[prefix_len] != '.'
2846 && (suffix_len == -2
2847 || (rela && spec[i].type == SHT_REL)))
2848 continue;
2849 }
2850 }
2851 else
2852 {
2853 if (len < prefix_len + suffix_len)
2854 continue;
2855 if (memcmp (name + len - suffix_len,
2856 spec[i].prefix + prefix_len,
2857 suffix_len) != 0)
2858 continue;
2859 }
2860 return &spec[i];
2861 }
2862
2863 return NULL;
2864 }
2865
2866 const struct bfd_elf_special_section *
2867 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2868 {
2869 int i;
2870 const struct bfd_elf_special_section *spec;
2871 const struct elf_backend_data *bed;
2872
2873 /* See if this is one of the special sections. */
2874 if (sec->name == NULL)
2875 return NULL;
2876
2877 bed = get_elf_backend_data (abfd);
2878 spec = bed->special_sections;
2879 if (spec)
2880 {
2881 spec = _bfd_elf_get_special_section (sec->name,
2882 bed->special_sections,
2883 sec->use_rela_p);
2884 if (spec != NULL)
2885 return spec;
2886 }
2887
2888 if (sec->name[0] != '.')
2889 return NULL;
2890
2891 i = sec->name[1] - 'b';
2892 if (i < 0 || i > 'z' - 'b')
2893 return NULL;
2894
2895 spec = special_sections[i];
2896
2897 if (spec == NULL)
2898 return NULL;
2899
2900 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2901 }
2902
2903 bfd_boolean
2904 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2905 {
2906 struct bfd_elf_section_data *sdata;
2907 const struct elf_backend_data *bed;
2908 const struct bfd_elf_special_section *ssect;
2909
2910 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2911 if (sdata == NULL)
2912 {
2913 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2914 sizeof (*sdata));
2915 if (sdata == NULL)
2916 return FALSE;
2917 sec->used_by_bfd = sdata;
2918 }
2919
2920 /* Indicate whether or not this section should use RELA relocations. */
2921 bed = get_elf_backend_data (abfd);
2922 sec->use_rela_p = bed->default_use_rela_p;
2923
2924 /* Set up ELF section type and flags for newly created sections, if
2925 there is an ABI mandated section. */
2926 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2927 if (ssect != NULL)
2928 {
2929 elf_section_type (sec) = ssect->type;
2930 elf_section_flags (sec) = ssect->attr;
2931 }
2932
2933 return _bfd_generic_new_section_hook (abfd, sec);
2934 }
2935
2936 /* Create a new bfd section from an ELF program header.
2937
2938 Since program segments have no names, we generate a synthetic name
2939 of the form segment<NUM>, where NUM is generally the index in the
2940 program header table. For segments that are split (see below) we
2941 generate the names segment<NUM>a and segment<NUM>b.
2942
2943 Note that some program segments may have a file size that is different than
2944 (less than) the memory size. All this means is that at execution the
2945 system must allocate the amount of memory specified by the memory size,
2946 but only initialize it with the first "file size" bytes read from the
2947 file. This would occur for example, with program segments consisting
2948 of combined data+bss.
2949
2950 To handle the above situation, this routine generates TWO bfd sections
2951 for the single program segment. The first has the length specified by
2952 the file size of the segment, and the second has the length specified
2953 by the difference between the two sizes. In effect, the segment is split
2954 into its initialized and uninitialized parts.
2955
2956 */
2957
2958 bfd_boolean
2959 _bfd_elf_make_section_from_phdr (bfd *abfd,
2960 Elf_Internal_Phdr *hdr,
2961 int hdr_index,
2962 const char *type_name)
2963 {
2964 asection *newsect;
2965 char *name;
2966 char namebuf[64];
2967 size_t len;
2968 int split;
2969 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
2970
2971 split = ((hdr->p_memsz > 0)
2972 && (hdr->p_filesz > 0)
2973 && (hdr->p_memsz > hdr->p_filesz));
2974
2975 if (hdr->p_filesz > 0)
2976 {
2977 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2978 len = strlen (namebuf) + 1;
2979 name = (char *) bfd_alloc (abfd, len);
2980 if (!name)
2981 return FALSE;
2982 memcpy (name, namebuf, len);
2983 newsect = bfd_make_section (abfd, name);
2984 if (newsect == NULL)
2985 return FALSE;
2986 newsect->vma = hdr->p_vaddr / opb;
2987 newsect->lma = hdr->p_paddr / opb;
2988 newsect->size = hdr->p_filesz;
2989 newsect->filepos = hdr->p_offset;
2990 newsect->flags |= SEC_HAS_CONTENTS;
2991 newsect->alignment_power = bfd_log2 (hdr->p_align);
2992 if (hdr->p_type == PT_LOAD)
2993 {
2994 newsect->flags |= SEC_ALLOC;
2995 newsect->flags |= SEC_LOAD;
2996 if (hdr->p_flags & PF_X)
2997 {
2998 /* FIXME: all we known is that it has execute PERMISSION,
2999 may be data. */
3000 newsect->flags |= SEC_CODE;
3001 }
3002 }
3003 if (!(hdr->p_flags & PF_W))
3004 {
3005 newsect->flags |= SEC_READONLY;
3006 }
3007 }
3008
3009 if (hdr->p_memsz > hdr->p_filesz)
3010 {
3011 bfd_vma align;
3012
3013 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
3014 len = strlen (namebuf) + 1;
3015 name = (char *) bfd_alloc (abfd, len);
3016 if (!name)
3017 return FALSE;
3018 memcpy (name, namebuf, len);
3019 newsect = bfd_make_section (abfd, name);
3020 if (newsect == NULL)
3021 return FALSE;
3022 newsect->vma = (hdr->p_vaddr + hdr->p_filesz) / opb;
3023 newsect->lma = (hdr->p_paddr + hdr->p_filesz) / opb;
3024 newsect->size = hdr->p_memsz - hdr->p_filesz;
3025 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3026 align = newsect->vma & -newsect->vma;
3027 if (align == 0 || align > hdr->p_align)
3028 align = hdr->p_align;
3029 newsect->alignment_power = bfd_log2 (align);
3030 if (hdr->p_type == PT_LOAD)
3031 {
3032 /* Hack for gdb. Segments that have not been modified do
3033 not have their contents written to a core file, on the
3034 assumption that a debugger can find the contents in the
3035 executable. We flag this case by setting the fake
3036 section size to zero. Note that "real" bss sections will
3037 always have their contents dumped to the core file. */
3038 if (bfd_get_format (abfd) == bfd_core)
3039 newsect->size = 0;
3040 newsect->flags |= SEC_ALLOC;
3041 if (hdr->p_flags & PF_X)
3042 newsect->flags |= SEC_CODE;
3043 }
3044 if (!(hdr->p_flags & PF_W))
3045 newsect->flags |= SEC_READONLY;
3046 }
3047
3048 return TRUE;
3049 }
3050
3051 static bfd_boolean
3052 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3053 {
3054 /* The return value is ignored. Build-ids are considered optional. */
3055 if (templ->xvec->flavour == bfd_target_elf_flavour)
3056 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3057 (templ, offset);
3058 return FALSE;
3059 }
3060
3061 bfd_boolean
3062 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3063 {
3064 const struct elf_backend_data *bed;
3065
3066 switch (hdr->p_type)
3067 {
3068 case PT_NULL:
3069 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3070
3071 case PT_LOAD:
3072 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3073 return FALSE;
3074 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3075 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3076 return TRUE;
3077
3078 case PT_DYNAMIC:
3079 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3080
3081 case PT_INTERP:
3082 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3083
3084 case PT_NOTE:
3085 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3086 return FALSE;
3087 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3088 hdr->p_align))
3089 return FALSE;
3090 return TRUE;
3091
3092 case PT_SHLIB:
3093 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3094
3095 case PT_PHDR:
3096 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3097
3098 case PT_GNU_EH_FRAME:
3099 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3100 "eh_frame_hdr");
3101
3102 case PT_GNU_STACK:
3103 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3104
3105 case PT_GNU_RELRO:
3106 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3107
3108 default:
3109 /* Check for any processor-specific program segment types. */
3110 bed = get_elf_backend_data (abfd);
3111 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3112 }
3113 }
3114
3115 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3116 REL or RELA. */
3117
3118 Elf_Internal_Shdr *
3119 _bfd_elf_single_rel_hdr (asection *sec)
3120 {
3121 if (elf_section_data (sec)->rel.hdr)
3122 {
3123 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3124 return elf_section_data (sec)->rel.hdr;
3125 }
3126 else
3127 return elf_section_data (sec)->rela.hdr;
3128 }
3129
3130 static bfd_boolean
3131 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3132 Elf_Internal_Shdr *rel_hdr,
3133 const char *sec_name,
3134 bfd_boolean use_rela_p)
3135 {
3136 char *name = (char *) bfd_alloc (abfd,
3137 sizeof ".rela" + strlen (sec_name));
3138 if (name == NULL)
3139 return FALSE;
3140
3141 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3142 rel_hdr->sh_name =
3143 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3144 FALSE);
3145 if (rel_hdr->sh_name == (unsigned int) -1)
3146 return FALSE;
3147
3148 return TRUE;
3149 }
3150
3151 /* Allocate and initialize a section-header for a new reloc section,
3152 containing relocations against ASECT. It is stored in RELDATA. If
3153 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3154 relocations. */
3155
3156 static bfd_boolean
3157 _bfd_elf_init_reloc_shdr (bfd *abfd,
3158 struct bfd_elf_section_reloc_data *reldata,
3159 const char *sec_name,
3160 bfd_boolean use_rela_p,
3161 bfd_boolean delay_st_name_p)
3162 {
3163 Elf_Internal_Shdr *rel_hdr;
3164 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3165
3166 BFD_ASSERT (reldata->hdr == NULL);
3167 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3168 reldata->hdr = rel_hdr;
3169
3170 if (delay_st_name_p)
3171 rel_hdr->sh_name = (unsigned int) -1;
3172 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3173 use_rela_p))
3174 return FALSE;
3175 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3176 rel_hdr->sh_entsize = (use_rela_p
3177 ? bed->s->sizeof_rela
3178 : bed->s->sizeof_rel);
3179 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3180 rel_hdr->sh_flags = 0;
3181 rel_hdr->sh_addr = 0;
3182 rel_hdr->sh_size = 0;
3183 rel_hdr->sh_offset = 0;
3184
3185 return TRUE;
3186 }
3187
3188 /* Return the default section type based on the passed in section flags. */
3189
3190 int
3191 bfd_elf_get_default_section_type (flagword flags)
3192 {
3193 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3194 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3195 return SHT_NOBITS;
3196 return SHT_PROGBITS;
3197 }
3198
3199 struct fake_section_arg
3200 {
3201 struct bfd_link_info *link_info;
3202 bfd_boolean failed;
3203 };
3204
3205 /* Set up an ELF internal section header for a section. */
3206
3207 static void
3208 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3209 {
3210 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3211 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3212 struct bfd_elf_section_data *esd = elf_section_data (asect);
3213 Elf_Internal_Shdr *this_hdr;
3214 unsigned int sh_type;
3215 const char *name = asect->name;
3216 bfd_boolean delay_st_name_p = FALSE;
3217 bfd_vma mask;
3218
3219 if (arg->failed)
3220 {
3221 /* We already failed; just get out of the bfd_map_over_sections
3222 loop. */
3223 return;
3224 }
3225
3226 this_hdr = &esd->this_hdr;
3227
3228 if (arg->link_info)
3229 {
3230 /* ld: compress DWARF debug sections with names: .debug_*. */
3231 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3232 && (asect->flags & SEC_DEBUGGING)
3233 && name[1] == 'd'
3234 && name[6] == '_')
3235 {
3236 /* Set SEC_ELF_COMPRESS to indicate this section should be
3237 compressed. */
3238 asect->flags |= SEC_ELF_COMPRESS;
3239 /* If this section will be compressed, delay adding section
3240 name to section name section after it is compressed in
3241 _bfd_elf_assign_file_positions_for_non_load. */
3242 delay_st_name_p = TRUE;
3243 }
3244 }
3245 else if ((asect->flags & SEC_ELF_RENAME))
3246 {
3247 /* objcopy: rename output DWARF debug section. */
3248 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3249 {
3250 /* When we decompress or compress with SHF_COMPRESSED,
3251 convert section name from .zdebug_* to .debug_* if
3252 needed. */
3253 if (name[1] == 'z')
3254 {
3255 char *new_name = convert_zdebug_to_debug (abfd, name);
3256 if (new_name == NULL)
3257 {
3258 arg->failed = TRUE;
3259 return;
3260 }
3261 name = new_name;
3262 }
3263 }
3264 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3265 {
3266 /* PR binutils/18087: Compression does not always make a
3267 section smaller. So only rename the section when
3268 compression has actually taken place. If input section
3269 name is .zdebug_*, we should never compress it again. */
3270 char *new_name = convert_debug_to_zdebug (abfd, name);
3271 if (new_name == NULL)
3272 {
3273 arg->failed = TRUE;
3274 return;
3275 }
3276 BFD_ASSERT (name[1] != 'z');
3277 name = new_name;
3278 }
3279 }
3280
3281 if (delay_st_name_p)
3282 this_hdr->sh_name = (unsigned int) -1;
3283 else
3284 {
3285 this_hdr->sh_name
3286 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3287 name, FALSE);
3288 if (this_hdr->sh_name == (unsigned int) -1)
3289 {
3290 arg->failed = TRUE;
3291 return;
3292 }
3293 }
3294
3295 /* Don't clear sh_flags. Assembler may set additional bits. */
3296
3297 if ((asect->flags & SEC_ALLOC) != 0
3298 || asect->user_set_vma)
3299 this_hdr->sh_addr = asect->vma * bfd_octets_per_byte (abfd, asect);
3300 else
3301 this_hdr->sh_addr = 0;
3302
3303 this_hdr->sh_offset = 0;
3304 this_hdr->sh_size = asect->size;
3305 this_hdr->sh_link = 0;
3306 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3307 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3308 {
3309 _bfd_error_handler
3310 /* xgettext:c-format */
3311 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3312 abfd, asect->alignment_power, asect);
3313 arg->failed = TRUE;
3314 return;
3315 }
3316 /* Set sh_addralign to the highest power of two given by alignment
3317 consistent with the section VMA. Linker scripts can force VMA. */
3318 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3319 this_hdr->sh_addralign = mask & -mask;
3320 /* The sh_entsize and sh_info fields may have been set already by
3321 copy_private_section_data. */
3322
3323 this_hdr->bfd_section = asect;
3324 this_hdr->contents = NULL;
3325
3326 /* If the section type is unspecified, we set it based on
3327 asect->flags. */
3328 if ((asect->flags & SEC_GROUP) != 0)
3329 sh_type = SHT_GROUP;
3330 else
3331 sh_type = bfd_elf_get_default_section_type (asect->flags);
3332
3333 if (this_hdr->sh_type == SHT_NULL)
3334 this_hdr->sh_type = sh_type;
3335 else if (this_hdr->sh_type == SHT_NOBITS
3336 && sh_type == SHT_PROGBITS
3337 && (asect->flags & SEC_ALLOC) != 0)
3338 {
3339 /* Warn if we are changing a NOBITS section to PROGBITS, but
3340 allow the link to proceed. This can happen when users link
3341 non-bss input sections to bss output sections, or emit data
3342 to a bss output section via a linker script. */
3343 _bfd_error_handler
3344 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3345 this_hdr->sh_type = sh_type;
3346 }
3347
3348 switch (this_hdr->sh_type)
3349 {
3350 default:
3351 break;
3352
3353 case SHT_STRTAB:
3354 case SHT_NOTE:
3355 case SHT_NOBITS:
3356 case SHT_PROGBITS:
3357 break;
3358
3359 case SHT_INIT_ARRAY:
3360 case SHT_FINI_ARRAY:
3361 case SHT_PREINIT_ARRAY:
3362 this_hdr->sh_entsize = bed->s->arch_size / 8;
3363 break;
3364
3365 case SHT_HASH:
3366 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3367 break;
3368
3369 case SHT_DYNSYM:
3370 this_hdr->sh_entsize = bed->s->sizeof_sym;
3371 break;
3372
3373 case SHT_DYNAMIC:
3374 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3375 break;
3376
3377 case SHT_RELA:
3378 if (get_elf_backend_data (abfd)->may_use_rela_p)
3379 this_hdr->sh_entsize = bed->s->sizeof_rela;
3380 break;
3381
3382 case SHT_REL:
3383 if (get_elf_backend_data (abfd)->may_use_rel_p)
3384 this_hdr->sh_entsize = bed->s->sizeof_rel;
3385 break;
3386
3387 case SHT_GNU_versym:
3388 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3389 break;
3390
3391 case SHT_GNU_verdef:
3392 this_hdr->sh_entsize = 0;
3393 /* objcopy or strip will copy over sh_info, but may not set
3394 cverdefs. The linker will set cverdefs, but sh_info will be
3395 zero. */
3396 if (this_hdr->sh_info == 0)
3397 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3398 else
3399 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3400 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3401 break;
3402
3403 case SHT_GNU_verneed:
3404 this_hdr->sh_entsize = 0;
3405 /* objcopy or strip will copy over sh_info, but may not set
3406 cverrefs. The linker will set cverrefs, but sh_info will be
3407 zero. */
3408 if (this_hdr->sh_info == 0)
3409 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3410 else
3411 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3412 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3413 break;
3414
3415 case SHT_GROUP:
3416 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3417 break;
3418
3419 case SHT_GNU_HASH:
3420 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3421 break;
3422 }
3423
3424 if ((asect->flags & SEC_ALLOC) != 0)
3425 this_hdr->sh_flags |= SHF_ALLOC;
3426 if ((asect->flags & SEC_READONLY) == 0)
3427 this_hdr->sh_flags |= SHF_WRITE;
3428 if ((asect->flags & SEC_CODE) != 0)
3429 this_hdr->sh_flags |= SHF_EXECINSTR;
3430 if ((asect->flags & SEC_MERGE) != 0)
3431 {
3432 this_hdr->sh_flags |= SHF_MERGE;
3433 this_hdr->sh_entsize = asect->entsize;
3434 }
3435 if ((asect->flags & SEC_STRINGS) != 0)
3436 this_hdr->sh_flags |= SHF_STRINGS;
3437 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3438 this_hdr->sh_flags |= SHF_GROUP;
3439 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3440 {
3441 this_hdr->sh_flags |= SHF_TLS;
3442 if (asect->size == 0
3443 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3444 {
3445 struct bfd_link_order *o = asect->map_tail.link_order;
3446
3447 this_hdr->sh_size = 0;
3448 if (o != NULL)
3449 {
3450 this_hdr->sh_size = o->offset + o->size;
3451 if (this_hdr->sh_size != 0)
3452 this_hdr->sh_type = SHT_NOBITS;
3453 }
3454 }
3455 }
3456 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3457 this_hdr->sh_flags |= SHF_EXCLUDE;
3458
3459 /* If the section has relocs, set up a section header for the
3460 SHT_REL[A] section. If two relocation sections are required for
3461 this section, it is up to the processor-specific back-end to
3462 create the other. */
3463 if ((asect->flags & SEC_RELOC) != 0)
3464 {
3465 /* When doing a relocatable link, create both REL and RELA sections if
3466 needed. */
3467 if (arg->link_info
3468 /* Do the normal setup if we wouldn't create any sections here. */
3469 && esd->rel.count + esd->rela.count > 0
3470 && (bfd_link_relocatable (arg->link_info)
3471 || arg->link_info->emitrelocations))
3472 {
3473 if (esd->rel.count && esd->rel.hdr == NULL
3474 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3475 FALSE, delay_st_name_p))
3476 {
3477 arg->failed = TRUE;
3478 return;
3479 }
3480 if (esd->rela.count && esd->rela.hdr == NULL
3481 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3482 TRUE, delay_st_name_p))
3483 {
3484 arg->failed = TRUE;
3485 return;
3486 }
3487 }
3488 else if (!_bfd_elf_init_reloc_shdr (abfd,
3489 (asect->use_rela_p
3490 ? &esd->rela : &esd->rel),
3491 name,
3492 asect->use_rela_p,
3493 delay_st_name_p))
3494 {
3495 arg->failed = TRUE;
3496 return;
3497 }
3498 }
3499
3500 /* Check for processor-specific section types. */
3501 sh_type = this_hdr->sh_type;
3502 if (bed->elf_backend_fake_sections
3503 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3504 {
3505 arg->failed = TRUE;
3506 return;
3507 }
3508
3509 if (sh_type == SHT_NOBITS && asect->size != 0)
3510 {
3511 /* Don't change the header type from NOBITS if we are being
3512 called for objcopy --only-keep-debug. */
3513 this_hdr->sh_type = sh_type;
3514 }
3515 }
3516
3517 /* Fill in the contents of a SHT_GROUP section. Called from
3518 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3519 when ELF targets use the generic linker, ld. Called for ld -r
3520 from bfd_elf_final_link. */
3521
3522 void
3523 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3524 {
3525 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3526 asection *elt, *first;
3527 unsigned char *loc;
3528 bfd_boolean gas;
3529
3530 /* Ignore linker created group section. See elfNN_ia64_object_p in
3531 elfxx-ia64.c. */
3532 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3533 || sec->size == 0
3534 || *failedptr)
3535 return;
3536
3537 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3538 {
3539 unsigned long symindx = 0;
3540
3541 /* elf_group_id will have been set up by objcopy and the
3542 generic linker. */
3543 if (elf_group_id (sec) != NULL)
3544 symindx = elf_group_id (sec)->udata.i;
3545
3546 if (symindx == 0)
3547 {
3548 /* If called from the assembler, swap_out_syms will have set up
3549 elf_section_syms.
3550 PR 25699: A corrupt input file could contain bogus group info. */
3551 if (elf_section_syms (abfd) == NULL)
3552 {
3553 *failedptr = TRUE;
3554 return;
3555 }
3556 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3557 }
3558 elf_section_data (sec)->this_hdr.sh_info = symindx;
3559 }
3560 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3561 {
3562 /* The ELF backend linker sets sh_info to -2 when the group
3563 signature symbol is global, and thus the index can't be
3564 set until all local symbols are output. */
3565 asection *igroup;
3566 struct bfd_elf_section_data *sec_data;
3567 unsigned long symndx;
3568 unsigned long extsymoff;
3569 struct elf_link_hash_entry *h;
3570
3571 /* The point of this little dance to the first SHF_GROUP section
3572 then back to the SHT_GROUP section is that this gets us to
3573 the SHT_GROUP in the input object. */
3574 igroup = elf_sec_group (elf_next_in_group (sec));
3575 sec_data = elf_section_data (igroup);
3576 symndx = sec_data->this_hdr.sh_info;
3577 extsymoff = 0;
3578 if (!elf_bad_symtab (igroup->owner))
3579 {
3580 Elf_Internal_Shdr *symtab_hdr;
3581
3582 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3583 extsymoff = symtab_hdr->sh_info;
3584 }
3585 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3586 while (h->root.type == bfd_link_hash_indirect
3587 || h->root.type == bfd_link_hash_warning)
3588 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3589
3590 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3591 }
3592
3593 /* The contents won't be allocated for "ld -r" or objcopy. */
3594 gas = TRUE;
3595 if (sec->contents == NULL)
3596 {
3597 gas = FALSE;
3598 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3599
3600 /* Arrange for the section to be written out. */
3601 elf_section_data (sec)->this_hdr.contents = sec->contents;
3602 if (sec->contents == NULL)
3603 {
3604 *failedptr = TRUE;
3605 return;
3606 }
3607 }
3608
3609 loc = sec->contents + sec->size;
3610
3611 /* Get the pointer to the first section in the group that gas
3612 squirreled away here. objcopy arranges for this to be set to the
3613 start of the input section group. */
3614 first = elt = elf_next_in_group (sec);
3615
3616 /* First element is a flag word. Rest of section is elf section
3617 indices for all the sections of the group. Write them backwards
3618 just to keep the group in the same order as given in .section
3619 directives, not that it matters. */
3620 while (elt != NULL)
3621 {
3622 asection *s;
3623
3624 s = elt;
3625 if (!gas)
3626 s = s->output_section;
3627 if (s != NULL
3628 && !bfd_is_abs_section (s))
3629 {
3630 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3631 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3632
3633 if (elf_sec->rel.hdr != NULL
3634 && (gas
3635 || (input_elf_sec->rel.hdr != NULL
3636 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3637 {
3638 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3639 loc -= 4;
3640 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3641 }
3642 if (elf_sec->rela.hdr != NULL
3643 && (gas
3644 || (input_elf_sec->rela.hdr != NULL
3645 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3646 {
3647 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3648 loc -= 4;
3649 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3650 }
3651 loc -= 4;
3652 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3653 }
3654 elt = elf_next_in_group (elt);
3655 if (elt == first)
3656 break;
3657 }
3658
3659 loc -= 4;
3660 BFD_ASSERT (loc == sec->contents);
3661
3662 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3663 }
3664
3665 /* Given NAME, the name of a relocation section stripped of its
3666 .rel/.rela prefix, return the section in ABFD to which the
3667 relocations apply. */
3668
3669 asection *
3670 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3671 {
3672 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3673 section likely apply to .got.plt or .got section. */
3674 if (get_elf_backend_data (abfd)->want_got_plt
3675 && strcmp (name, ".plt") == 0)
3676 {
3677 asection *sec;
3678
3679 name = ".got.plt";
3680 sec = bfd_get_section_by_name (abfd, name);
3681 if (sec != NULL)
3682 return sec;
3683 name = ".got";
3684 }
3685
3686 return bfd_get_section_by_name (abfd, name);
3687 }
3688
3689 /* Return the section to which RELOC_SEC applies. */
3690
3691 static asection *
3692 elf_get_reloc_section (asection *reloc_sec)
3693 {
3694 const char *name;
3695 unsigned int type;
3696 bfd *abfd;
3697 const struct elf_backend_data *bed;
3698
3699 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3700 if (type != SHT_REL && type != SHT_RELA)
3701 return NULL;
3702
3703 /* We look up the section the relocs apply to by name. */
3704 name = reloc_sec->name;
3705 if (strncmp (name, ".rel", 4) != 0)
3706 return NULL;
3707 name += 4;
3708 if (type == SHT_RELA && *name++ != 'a')
3709 return NULL;
3710
3711 abfd = reloc_sec->owner;
3712 bed = get_elf_backend_data (abfd);
3713 return bed->get_reloc_section (abfd, name);
3714 }
3715
3716 /* Assign all ELF section numbers. The dummy first section is handled here
3717 too. The link/info pointers for the standard section types are filled
3718 in here too, while we're at it. */
3719
3720 static bfd_boolean
3721 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3722 {
3723 struct elf_obj_tdata *t = elf_tdata (abfd);
3724 asection *sec;
3725 unsigned int section_number;
3726 Elf_Internal_Shdr **i_shdrp;
3727 struct bfd_elf_section_data *d;
3728 bfd_boolean need_symtab;
3729 size_t amt;
3730
3731 section_number = 1;
3732
3733 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3734
3735 /* SHT_GROUP sections are in relocatable files only. */
3736 if (link_info == NULL || !link_info->resolve_section_groups)
3737 {
3738 size_t reloc_count = 0;
3739
3740 /* Put SHT_GROUP sections first. */
3741 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3742 {
3743 d = elf_section_data (sec);
3744
3745 if (d->this_hdr.sh_type == SHT_GROUP)
3746 {
3747 if (sec->flags & SEC_LINKER_CREATED)
3748 {
3749 /* Remove the linker created SHT_GROUP sections. */
3750 bfd_section_list_remove (abfd, sec);
3751 abfd->section_count--;
3752 }
3753 else
3754 d->this_idx = section_number++;
3755 }
3756
3757 /* Count relocations. */
3758 reloc_count += sec->reloc_count;
3759 }
3760
3761 /* Clear HAS_RELOC if there are no relocations. */
3762 if (reloc_count == 0)
3763 abfd->flags &= ~HAS_RELOC;
3764 }
3765
3766 for (sec = abfd->sections; sec; sec = sec->next)
3767 {
3768 d = elf_section_data (sec);
3769
3770 if (d->this_hdr.sh_type != SHT_GROUP)
3771 d->this_idx = section_number++;
3772 if (d->this_hdr.sh_name != (unsigned int) -1)
3773 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3774 if (d->rel.hdr)
3775 {
3776 d->rel.idx = section_number++;
3777 if (d->rel.hdr->sh_name != (unsigned int) -1)
3778 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3779 }
3780 else
3781 d->rel.idx = 0;
3782
3783 if (d->rela.hdr)
3784 {
3785 d->rela.idx = section_number++;
3786 if (d->rela.hdr->sh_name != (unsigned int) -1)
3787 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3788 }
3789 else
3790 d->rela.idx = 0;
3791 }
3792
3793 need_symtab = (bfd_get_symcount (abfd) > 0
3794 || (link_info == NULL
3795 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3796 == HAS_RELOC)));
3797 if (need_symtab)
3798 {
3799 elf_onesymtab (abfd) = section_number++;
3800 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3801 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3802 {
3803 elf_section_list *entry;
3804
3805 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3806
3807 entry = bfd_zalloc (abfd, sizeof (*entry));
3808 entry->ndx = section_number++;
3809 elf_symtab_shndx_list (abfd) = entry;
3810 entry->hdr.sh_name
3811 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3812 ".symtab_shndx", FALSE);
3813 if (entry->hdr.sh_name == (unsigned int) -1)
3814 return FALSE;
3815 }
3816 elf_strtab_sec (abfd) = section_number++;
3817 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3818 }
3819
3820 elf_shstrtab_sec (abfd) = section_number++;
3821 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3822 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3823
3824 if (section_number >= SHN_LORESERVE)
3825 {
3826 /* xgettext:c-format */
3827 _bfd_error_handler (_("%pB: too many sections: %u"),
3828 abfd, section_number);
3829 return FALSE;
3830 }
3831
3832 elf_numsections (abfd) = section_number;
3833 elf_elfheader (abfd)->e_shnum = section_number;
3834
3835 /* Set up the list of section header pointers, in agreement with the
3836 indices. */
3837 amt = section_number * sizeof (Elf_Internal_Shdr *);
3838 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3839 if (i_shdrp == NULL)
3840 return FALSE;
3841
3842 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3843 sizeof (Elf_Internal_Shdr));
3844 if (i_shdrp[0] == NULL)
3845 {
3846 bfd_release (abfd, i_shdrp);
3847 return FALSE;
3848 }
3849
3850 elf_elfsections (abfd) = i_shdrp;
3851
3852 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3853 if (need_symtab)
3854 {
3855 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3856 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3857 {
3858 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3859 BFD_ASSERT (entry != NULL);
3860 i_shdrp[entry->ndx] = & entry->hdr;
3861 entry->hdr.sh_link = elf_onesymtab (abfd);
3862 }
3863 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3864 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3865 }
3866
3867 for (sec = abfd->sections; sec; sec = sec->next)
3868 {
3869 asection *s;
3870
3871 d = elf_section_data (sec);
3872
3873 i_shdrp[d->this_idx] = &d->this_hdr;
3874 if (d->rel.idx != 0)
3875 i_shdrp[d->rel.idx] = d->rel.hdr;
3876 if (d->rela.idx != 0)
3877 i_shdrp[d->rela.idx] = d->rela.hdr;
3878
3879 /* Fill in the sh_link and sh_info fields while we're at it. */
3880
3881 /* sh_link of a reloc section is the section index of the symbol
3882 table. sh_info is the section index of the section to which
3883 the relocation entries apply. */
3884 if (d->rel.idx != 0)
3885 {
3886 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3887 d->rel.hdr->sh_info = d->this_idx;
3888 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3889 }
3890 if (d->rela.idx != 0)
3891 {
3892 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3893 d->rela.hdr->sh_info = d->this_idx;
3894 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3895 }
3896
3897 /* We need to set up sh_link for SHF_LINK_ORDER. */
3898 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3899 {
3900 s = elf_linked_to_section (sec);
3901 if (s)
3902 {
3903 /* elf_linked_to_section points to the input section. */
3904 if (link_info != NULL)
3905 {
3906 /* Check discarded linkonce section. */
3907 if (discarded_section (s))
3908 {
3909 asection *kept;
3910 _bfd_error_handler
3911 /* xgettext:c-format */
3912 (_("%pB: sh_link of section `%pA' points to"
3913 " discarded section `%pA' of `%pB'"),
3914 abfd, d->this_hdr.bfd_section,
3915 s, s->owner);
3916 /* Point to the kept section if it has the same
3917 size as the discarded one. */
3918 kept = _bfd_elf_check_kept_section (s, link_info);
3919 if (kept == NULL)
3920 {
3921 bfd_set_error (bfd_error_bad_value);
3922 return FALSE;
3923 }
3924 s = kept;
3925 }
3926
3927 s = s->output_section;
3928 BFD_ASSERT (s != NULL);
3929 }
3930 else
3931 {
3932 /* Handle objcopy. */
3933 if (s->output_section == NULL)
3934 {
3935 _bfd_error_handler
3936 /* xgettext:c-format */
3937 (_("%pB: sh_link of section `%pA' points to"
3938 " removed section `%pA' of `%pB'"),
3939 abfd, d->this_hdr.bfd_section, s, s->owner);
3940 bfd_set_error (bfd_error_bad_value);
3941 return FALSE;
3942 }
3943 s = s->output_section;
3944 }
3945 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3946 }
3947 else
3948 {
3949 /* PR 290:
3950 The Intel C compiler generates SHT_IA_64_UNWIND with
3951 SHF_LINK_ORDER. But it doesn't set the sh_link or
3952 sh_info fields. Hence we could get the situation
3953 where s is NULL. */
3954 const struct elf_backend_data *bed
3955 = get_elf_backend_data (abfd);
3956 bed->link_order_error_handler
3957 /* xgettext:c-format */
3958 (_("%pB: warning: sh_link not set for section `%pA'"),
3959 abfd, sec);
3960 }
3961 }
3962
3963 switch (d->this_hdr.sh_type)
3964 {
3965 case SHT_REL:
3966 case SHT_RELA:
3967 /* A reloc section which we are treating as a normal BFD
3968 section. sh_link is the section index of the symbol
3969 table. sh_info is the section index of the section to
3970 which the relocation entries apply. We assume that an
3971 allocated reloc section uses the dynamic symbol table.
3972 FIXME: How can we be sure? */
3973 s = bfd_get_section_by_name (abfd, ".dynsym");
3974 if (s != NULL)
3975 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3976
3977 s = elf_get_reloc_section (sec);
3978 if (s != NULL)
3979 {
3980 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3981 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3982 }
3983 break;
3984
3985 case SHT_STRTAB:
3986 /* We assume that a section named .stab*str is a stabs
3987 string section. We look for a section with the same name
3988 but without the trailing ``str'', and set its sh_link
3989 field to point to this section. */
3990 if (CONST_STRNEQ (sec->name, ".stab")
3991 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3992 {
3993 size_t len;
3994 char *alc;
3995
3996 len = strlen (sec->name);
3997 alc = (char *) bfd_malloc (len - 2);
3998 if (alc == NULL)
3999 return FALSE;
4000 memcpy (alc, sec->name, len - 3);
4001 alc[len - 3] = '\0';
4002 s = bfd_get_section_by_name (abfd, alc);
4003 free (alc);
4004 if (s != NULL)
4005 {
4006 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
4007
4008 /* This is a .stab section. */
4009 if (elf_section_data (s)->this_hdr.sh_entsize == 0)
4010 elf_section_data (s)->this_hdr.sh_entsize
4011 = 4 + 2 * bfd_get_arch_size (abfd) / 8;
4012 }
4013 }
4014 break;
4015
4016 case SHT_DYNAMIC:
4017 case SHT_DYNSYM:
4018 case SHT_GNU_verneed:
4019 case SHT_GNU_verdef:
4020 /* sh_link is the section header index of the string table
4021 used for the dynamic entries, or the symbol table, or the
4022 version strings. */
4023 s = bfd_get_section_by_name (abfd, ".dynstr");
4024 if (s != NULL)
4025 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4026 break;
4027
4028 case SHT_GNU_LIBLIST:
4029 /* sh_link is the section header index of the prelink library
4030 list used for the dynamic entries, or the symbol table, or
4031 the version strings. */
4032 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4033 ? ".dynstr" : ".gnu.libstr");
4034 if (s != NULL)
4035 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4036 break;
4037
4038 case SHT_HASH:
4039 case SHT_GNU_HASH:
4040 case SHT_GNU_versym:
4041 /* sh_link is the section header index of the symbol table
4042 this hash table or version table is for. */
4043 s = bfd_get_section_by_name (abfd, ".dynsym");
4044 if (s != NULL)
4045 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4046 break;
4047
4048 case SHT_GROUP:
4049 d->this_hdr.sh_link = elf_onesymtab (abfd);
4050 }
4051 }
4052
4053 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4054 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4055 debug section name from .debug_* to .zdebug_* if needed. */
4056
4057 return TRUE;
4058 }
4059
4060 static bfd_boolean
4061 sym_is_global (bfd *abfd, asymbol *sym)
4062 {
4063 /* If the backend has a special mapping, use it. */
4064 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4065 if (bed->elf_backend_sym_is_global)
4066 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4067
4068 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4069 || bfd_is_und_section (bfd_asymbol_section (sym))
4070 || bfd_is_com_section (bfd_asymbol_section (sym)));
4071 }
4072
4073 /* Filter global symbols of ABFD to include in the import library. All
4074 SYMCOUNT symbols of ABFD can be examined from their pointers in
4075 SYMS. Pointers of symbols to keep should be stored contiguously at
4076 the beginning of that array.
4077
4078 Returns the number of symbols to keep. */
4079
4080 unsigned int
4081 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4082 asymbol **syms, long symcount)
4083 {
4084 long src_count, dst_count = 0;
4085
4086 for (src_count = 0; src_count < symcount; src_count++)
4087 {
4088 asymbol *sym = syms[src_count];
4089 char *name = (char *) bfd_asymbol_name (sym);
4090 struct bfd_link_hash_entry *h;
4091
4092 if (!sym_is_global (abfd, sym))
4093 continue;
4094
4095 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4096 if (h == NULL)
4097 continue;
4098 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4099 continue;
4100 if (h->linker_def || h->ldscript_def)
4101 continue;
4102
4103 syms[dst_count++] = sym;
4104 }
4105
4106 syms[dst_count] = NULL;
4107
4108 return dst_count;
4109 }
4110
4111 /* Don't output section symbols for sections that are not going to be
4112 output, that are duplicates or there is no BFD section. */
4113
4114 static bfd_boolean
4115 ignore_section_sym (bfd *abfd, asymbol *sym)
4116 {
4117 elf_symbol_type *type_ptr;
4118
4119 if (sym == NULL)
4120 return FALSE;
4121
4122 if ((sym->flags & BSF_SECTION_SYM) == 0)
4123 return FALSE;
4124
4125 if (sym->section == NULL)
4126 return TRUE;
4127
4128 type_ptr = elf_symbol_from (abfd, sym);
4129 return ((type_ptr != NULL
4130 && type_ptr->internal_elf_sym.st_shndx != 0
4131 && bfd_is_abs_section (sym->section))
4132 || !(sym->section->owner == abfd
4133 || (sym->section->output_section != NULL
4134 && sym->section->output_section->owner == abfd
4135 && sym->section->output_offset == 0)
4136 || bfd_is_abs_section (sym->section)));
4137 }
4138
4139 /* Map symbol from it's internal number to the external number, moving
4140 all local symbols to be at the head of the list. */
4141
4142 static bfd_boolean
4143 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4144 {
4145 unsigned int symcount = bfd_get_symcount (abfd);
4146 asymbol **syms = bfd_get_outsymbols (abfd);
4147 asymbol **sect_syms;
4148 unsigned int num_locals = 0;
4149 unsigned int num_globals = 0;
4150 unsigned int num_locals2 = 0;
4151 unsigned int num_globals2 = 0;
4152 unsigned int max_index = 0;
4153 unsigned int idx;
4154 asection *asect;
4155 asymbol **new_syms;
4156 size_t amt;
4157
4158 #ifdef DEBUG
4159 fprintf (stderr, "elf_map_symbols\n");
4160 fflush (stderr);
4161 #endif
4162
4163 for (asect = abfd->sections; asect; asect = asect->next)
4164 {
4165 if (max_index < asect->index)
4166 max_index = asect->index;
4167 }
4168
4169 max_index++;
4170 amt = max_index * sizeof (asymbol *);
4171 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4172 if (sect_syms == NULL)
4173 return FALSE;
4174 elf_section_syms (abfd) = sect_syms;
4175 elf_num_section_syms (abfd) = max_index;
4176
4177 /* Init sect_syms entries for any section symbols we have already
4178 decided to output. */
4179 for (idx = 0; idx < symcount; idx++)
4180 {
4181 asymbol *sym = syms[idx];
4182
4183 if ((sym->flags & BSF_SECTION_SYM) != 0
4184 && sym->value == 0
4185 && !ignore_section_sym (abfd, sym)
4186 && !bfd_is_abs_section (sym->section))
4187 {
4188 asection *sec = sym->section;
4189
4190 if (sec->owner != abfd)
4191 sec = sec->output_section;
4192
4193 sect_syms[sec->index] = syms[idx];
4194 }
4195 }
4196
4197 /* Classify all of the symbols. */
4198 for (idx = 0; idx < symcount; idx++)
4199 {
4200 if (sym_is_global (abfd, syms[idx]))
4201 num_globals++;
4202 else if (!ignore_section_sym (abfd, syms[idx]))
4203 num_locals++;
4204 }
4205
4206 /* We will be adding a section symbol for each normal BFD section. Most
4207 sections will already have a section symbol in outsymbols, but
4208 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4209 at least in that case. */
4210 for (asect = abfd->sections; asect; asect = asect->next)
4211 {
4212 if (sect_syms[asect->index] == NULL)
4213 {
4214 if (!sym_is_global (abfd, asect->symbol))
4215 num_locals++;
4216 else
4217 num_globals++;
4218 }
4219 }
4220
4221 /* Now sort the symbols so the local symbols are first. */
4222 amt = (num_locals + num_globals) * sizeof (asymbol *);
4223 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4224 if (new_syms == NULL)
4225 return FALSE;
4226
4227 for (idx = 0; idx < symcount; idx++)
4228 {
4229 asymbol *sym = syms[idx];
4230 unsigned int i;
4231
4232 if (sym_is_global (abfd, sym))
4233 i = num_locals + num_globals2++;
4234 else if (!ignore_section_sym (abfd, sym))
4235 i = num_locals2++;
4236 else
4237 continue;
4238 new_syms[i] = sym;
4239 sym->udata.i = i + 1;
4240 }
4241 for (asect = abfd->sections; asect; asect = asect->next)
4242 {
4243 if (sect_syms[asect->index] == NULL)
4244 {
4245 asymbol *sym = asect->symbol;
4246 unsigned int i;
4247
4248 sect_syms[asect->index] = sym;
4249 if (!sym_is_global (abfd, sym))
4250 i = num_locals2++;
4251 else
4252 i = num_locals + num_globals2++;
4253 new_syms[i] = sym;
4254 sym->udata.i = i + 1;
4255 }
4256 }
4257
4258 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4259
4260 *pnum_locals = num_locals;
4261 return TRUE;
4262 }
4263
4264 /* Align to the maximum file alignment that could be required for any
4265 ELF data structure. */
4266
4267 static inline file_ptr
4268 align_file_position (file_ptr off, int align)
4269 {
4270 return (off + align - 1) & ~(align - 1);
4271 }
4272
4273 /* Assign a file position to a section, optionally aligning to the
4274 required section alignment. */
4275
4276 file_ptr
4277 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4278 file_ptr offset,
4279 bfd_boolean align)
4280 {
4281 if (align && i_shdrp->sh_addralign > 1)
4282 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4283 i_shdrp->sh_offset = offset;
4284 if (i_shdrp->bfd_section != NULL)
4285 i_shdrp->bfd_section->filepos = offset;
4286 if (i_shdrp->sh_type != SHT_NOBITS)
4287 offset += i_shdrp->sh_size;
4288 return offset;
4289 }
4290
4291 /* Compute the file positions we are going to put the sections at, and
4292 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4293 is not NULL, this is being called by the ELF backend linker. */
4294
4295 bfd_boolean
4296 _bfd_elf_compute_section_file_positions (bfd *abfd,
4297 struct bfd_link_info *link_info)
4298 {
4299 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4300 struct fake_section_arg fsargs;
4301 bfd_boolean failed;
4302 struct elf_strtab_hash *strtab = NULL;
4303 Elf_Internal_Shdr *shstrtab_hdr;
4304 bfd_boolean need_symtab;
4305
4306 if (abfd->output_has_begun)
4307 return TRUE;
4308
4309 /* Do any elf backend specific processing first. */
4310 if (bed->elf_backend_begin_write_processing)
4311 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4312
4313 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4314 return FALSE;
4315
4316 fsargs.failed = FALSE;
4317 fsargs.link_info = link_info;
4318 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4319 if (fsargs.failed)
4320 return FALSE;
4321
4322 if (!assign_section_numbers (abfd, link_info))
4323 return FALSE;
4324
4325 /* The backend linker builds symbol table information itself. */
4326 need_symtab = (link_info == NULL
4327 && (bfd_get_symcount (abfd) > 0
4328 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4329 == HAS_RELOC)));
4330 if (need_symtab)
4331 {
4332 /* Non-zero if doing a relocatable link. */
4333 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4334
4335 if (! swap_out_syms (abfd, &strtab, relocatable_p))
4336 return FALSE;
4337 }
4338
4339 failed = FALSE;
4340 if (link_info == NULL)
4341 {
4342 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4343 if (failed)
4344 return FALSE;
4345 }
4346
4347 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4348 /* sh_name was set in init_file_header. */
4349 shstrtab_hdr->sh_type = SHT_STRTAB;
4350 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4351 shstrtab_hdr->sh_addr = 0;
4352 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4353 shstrtab_hdr->sh_entsize = 0;
4354 shstrtab_hdr->sh_link = 0;
4355 shstrtab_hdr->sh_info = 0;
4356 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4357 shstrtab_hdr->sh_addralign = 1;
4358
4359 if (!assign_file_positions_except_relocs (abfd, link_info))
4360 return FALSE;
4361
4362 if (need_symtab)
4363 {
4364 file_ptr off;
4365 Elf_Internal_Shdr *hdr;
4366
4367 off = elf_next_file_pos (abfd);
4368
4369 hdr = & elf_symtab_hdr (abfd);
4370 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4371
4372 if (elf_symtab_shndx_list (abfd) != NULL)
4373 {
4374 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4375 if (hdr->sh_size != 0)
4376 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4377 /* FIXME: What about other symtab_shndx sections in the list ? */
4378 }
4379
4380 hdr = &elf_tdata (abfd)->strtab_hdr;
4381 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4382
4383 elf_next_file_pos (abfd) = off;
4384
4385 /* Now that we know where the .strtab section goes, write it
4386 out. */
4387 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4388 || ! _bfd_elf_strtab_emit (abfd, strtab))
4389 return FALSE;
4390 _bfd_elf_strtab_free (strtab);
4391 }
4392
4393 abfd->output_has_begun = TRUE;
4394
4395 return TRUE;
4396 }
4397
4398 /* Make an initial estimate of the size of the program header. If we
4399 get the number wrong here, we'll redo section placement. */
4400
4401 static bfd_size_type
4402 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4403 {
4404 size_t segs;
4405 asection *s;
4406 const struct elf_backend_data *bed;
4407
4408 /* Assume we will need exactly two PT_LOAD segments: one for text
4409 and one for data. */
4410 segs = 2;
4411
4412 s = bfd_get_section_by_name (abfd, ".interp");
4413 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4414 {
4415 /* If we have a loadable interpreter section, we need a
4416 PT_INTERP segment. In this case, assume we also need a
4417 PT_PHDR segment, although that may not be true for all
4418 targets. */
4419 segs += 2;
4420 }
4421
4422 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4423 {
4424 /* We need a PT_DYNAMIC segment. */
4425 ++segs;
4426 }
4427
4428 if (info != NULL && info->relro)
4429 {
4430 /* We need a PT_GNU_RELRO segment. */
4431 ++segs;
4432 }
4433
4434 if (elf_eh_frame_hdr (abfd))
4435 {
4436 /* We need a PT_GNU_EH_FRAME segment. */
4437 ++segs;
4438 }
4439
4440 if (elf_stack_flags (abfd))
4441 {
4442 /* We need a PT_GNU_STACK segment. */
4443 ++segs;
4444 }
4445
4446 s = bfd_get_section_by_name (abfd,
4447 NOTE_GNU_PROPERTY_SECTION_NAME);
4448 if (s != NULL && s->size != 0)
4449 {
4450 /* We need a PT_GNU_PROPERTY segment. */
4451 ++segs;
4452 }
4453
4454 for (s = abfd->sections; s != NULL; s = s->next)
4455 {
4456 if ((s->flags & SEC_LOAD) != 0
4457 && elf_section_type (s) == SHT_NOTE)
4458 {
4459 unsigned int alignment_power;
4460 /* We need a PT_NOTE segment. */
4461 ++segs;
4462 /* Try to create just one PT_NOTE segment for all adjacent
4463 loadable SHT_NOTE sections. gABI requires that within a
4464 PT_NOTE segment (and also inside of each SHT_NOTE section)
4465 each note should have the same alignment. So we check
4466 whether the sections are correctly aligned. */
4467 alignment_power = s->alignment_power;
4468 while (s->next != NULL
4469 && s->next->alignment_power == alignment_power
4470 && (s->next->flags & SEC_LOAD) != 0
4471 && elf_section_type (s->next) == SHT_NOTE)
4472 s = s->next;
4473 }
4474 }
4475
4476 for (s = abfd->sections; s != NULL; s = s->next)
4477 {
4478 if (s->flags & SEC_THREAD_LOCAL)
4479 {
4480 /* We need a PT_TLS segment. */
4481 ++segs;
4482 break;
4483 }
4484 }
4485
4486 bed = get_elf_backend_data (abfd);
4487
4488 if ((abfd->flags & D_PAGED) != 0
4489 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4490 {
4491 /* Add a PT_GNU_MBIND segment for each mbind section. */
4492 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4493 for (s = abfd->sections; s != NULL; s = s->next)
4494 if (elf_section_flags (s) & SHF_GNU_MBIND)
4495 {
4496 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4497 {
4498 _bfd_error_handler
4499 /* xgettext:c-format */
4500 (_("%pB: GNU_MBIND section `%pA' has invalid "
4501 "sh_info field: %d"),
4502 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4503 continue;
4504 }
4505 /* Align mbind section to page size. */
4506 if (s->alignment_power < page_align_power)
4507 s->alignment_power = page_align_power;
4508 segs ++;
4509 }
4510 }
4511
4512 /* Let the backend count up any program headers it might need. */
4513 if (bed->elf_backend_additional_program_headers)
4514 {
4515 int a;
4516
4517 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4518 if (a == -1)
4519 abort ();
4520 segs += a;
4521 }
4522
4523 return segs * bed->s->sizeof_phdr;
4524 }
4525
4526 /* Find the segment that contains the output_section of section. */
4527
4528 Elf_Internal_Phdr *
4529 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4530 {
4531 struct elf_segment_map *m;
4532 Elf_Internal_Phdr *p;
4533
4534 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4535 m != NULL;
4536 m = m->next, p++)
4537 {
4538 int i;
4539
4540 for (i = m->count - 1; i >= 0; i--)
4541 if (m->sections[i] == section)
4542 return p;
4543 }
4544
4545 return NULL;
4546 }
4547
4548 /* Create a mapping from a set of sections to a program segment. */
4549
4550 static struct elf_segment_map *
4551 make_mapping (bfd *abfd,
4552 asection **sections,
4553 unsigned int from,
4554 unsigned int to,
4555 bfd_boolean phdr)
4556 {
4557 struct elf_segment_map *m;
4558 unsigned int i;
4559 asection **hdrpp;
4560 size_t amt;
4561
4562 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4563 amt += (to - from) * sizeof (asection *);
4564 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4565 if (m == NULL)
4566 return NULL;
4567 m->next = NULL;
4568 m->p_type = PT_LOAD;
4569 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4570 m->sections[i - from] = *hdrpp;
4571 m->count = to - from;
4572
4573 if (from == 0 && phdr)
4574 {
4575 /* Include the headers in the first PT_LOAD segment. */
4576 m->includes_filehdr = 1;
4577 m->includes_phdrs = 1;
4578 }
4579
4580 return m;
4581 }
4582
4583 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4584 on failure. */
4585
4586 struct elf_segment_map *
4587 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4588 {
4589 struct elf_segment_map *m;
4590
4591 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4592 sizeof (struct elf_segment_map));
4593 if (m == NULL)
4594 return NULL;
4595 m->next = NULL;
4596 m->p_type = PT_DYNAMIC;
4597 m->count = 1;
4598 m->sections[0] = dynsec;
4599
4600 return m;
4601 }
4602
4603 /* Possibly add or remove segments from the segment map. */
4604
4605 static bfd_boolean
4606 elf_modify_segment_map (bfd *abfd,
4607 struct bfd_link_info *info,
4608 bfd_boolean remove_empty_load)
4609 {
4610 struct elf_segment_map **m;
4611 const struct elf_backend_data *bed;
4612
4613 /* The placement algorithm assumes that non allocated sections are
4614 not in PT_LOAD segments. We ensure this here by removing such
4615 sections from the segment map. We also remove excluded
4616 sections. Finally, any PT_LOAD segment without sections is
4617 removed. */
4618 m = &elf_seg_map (abfd);
4619 while (*m)
4620 {
4621 unsigned int i, new_count;
4622
4623 for (new_count = 0, i = 0; i < (*m)->count; i++)
4624 {
4625 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4626 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4627 || (*m)->p_type != PT_LOAD))
4628 {
4629 (*m)->sections[new_count] = (*m)->sections[i];
4630 new_count++;
4631 }
4632 }
4633 (*m)->count = new_count;
4634
4635 if (remove_empty_load
4636 && (*m)->p_type == PT_LOAD
4637 && (*m)->count == 0
4638 && !(*m)->includes_phdrs)
4639 *m = (*m)->next;
4640 else
4641 m = &(*m)->next;
4642 }
4643
4644 bed = get_elf_backend_data (abfd);
4645 if (bed->elf_backend_modify_segment_map != NULL)
4646 {
4647 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4648 return FALSE;
4649 }
4650
4651 return TRUE;
4652 }
4653
4654 #define IS_TBSS(s) \
4655 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4656
4657 /* Set up a mapping from BFD sections to program segments. */
4658
4659 bfd_boolean
4660 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4661 {
4662 unsigned int count;
4663 struct elf_segment_map *m;
4664 asection **sections = NULL;
4665 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4666 bfd_boolean no_user_phdrs;
4667
4668 no_user_phdrs = elf_seg_map (abfd) == NULL;
4669
4670 if (info != NULL)
4671 info->user_phdrs = !no_user_phdrs;
4672
4673 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4674 {
4675 asection *s;
4676 unsigned int i;
4677 struct elf_segment_map *mfirst;
4678 struct elf_segment_map **pm;
4679 asection *last_hdr;
4680 bfd_vma last_size;
4681 unsigned int hdr_index;
4682 bfd_vma maxpagesize;
4683 asection **hdrpp;
4684 bfd_boolean phdr_in_segment;
4685 bfd_boolean writable;
4686 bfd_boolean executable;
4687 unsigned int tls_count = 0;
4688 asection *first_tls = NULL;
4689 asection *first_mbind = NULL;
4690 asection *dynsec, *eh_frame_hdr;
4691 size_t amt;
4692 bfd_vma addr_mask, wrap_to = 0; /* Bytes. */
4693 bfd_size_type phdr_size; /* Octets/bytes. */
4694 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
4695
4696 /* Select the allocated sections, and sort them. */
4697
4698 amt = bfd_count_sections (abfd) * sizeof (asection *);
4699 sections = (asection **) bfd_malloc (amt);
4700 if (sections == NULL)
4701 goto error_return;
4702
4703 /* Calculate top address, avoiding undefined behaviour of shift
4704 left operator when shift count is equal to size of type
4705 being shifted. */
4706 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4707 addr_mask = (addr_mask << 1) + 1;
4708
4709 i = 0;
4710 for (s = abfd->sections; s != NULL; s = s->next)
4711 {
4712 if ((s->flags & SEC_ALLOC) != 0)
4713 {
4714 /* target_index is unused until bfd_elf_final_link
4715 starts output of section symbols. Use it to make
4716 qsort stable. */
4717 s->target_index = i;
4718 sections[i] = s;
4719 ++i;
4720 /* A wrapping section potentially clashes with header. */
4721 if (((s->lma + s->size / opb) & addr_mask) < (s->lma & addr_mask))
4722 wrap_to = (s->lma + s->size / opb) & addr_mask;
4723 }
4724 }
4725 BFD_ASSERT (i <= bfd_count_sections (abfd));
4726 count = i;
4727
4728 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4729
4730 phdr_size = elf_program_header_size (abfd);
4731 if (phdr_size == (bfd_size_type) -1)
4732 phdr_size = get_program_header_size (abfd, info);
4733 phdr_size += bed->s->sizeof_ehdr;
4734 /* phdr_size is compared to LMA values which are in bytes. */
4735 phdr_size /= opb;
4736 maxpagesize = bed->maxpagesize;
4737 if (maxpagesize == 0)
4738 maxpagesize = 1;
4739 phdr_in_segment = info != NULL && info->load_phdrs;
4740 if (count != 0
4741 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4742 >= (phdr_size & (maxpagesize - 1))))
4743 /* For compatibility with old scripts that may not be using
4744 SIZEOF_HEADERS, add headers when it looks like space has
4745 been left for them. */
4746 phdr_in_segment = TRUE;
4747
4748 /* Build the mapping. */
4749 mfirst = NULL;
4750 pm = &mfirst;
4751
4752 /* If we have a .interp section, then create a PT_PHDR segment for
4753 the program headers and a PT_INTERP segment for the .interp
4754 section. */
4755 s = bfd_get_section_by_name (abfd, ".interp");
4756 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4757 {
4758 amt = sizeof (struct elf_segment_map);
4759 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4760 if (m == NULL)
4761 goto error_return;
4762 m->next = NULL;
4763 m->p_type = PT_PHDR;
4764 m->p_flags = PF_R;
4765 m->p_flags_valid = 1;
4766 m->includes_phdrs = 1;
4767 phdr_in_segment = TRUE;
4768 *pm = m;
4769 pm = &m->next;
4770
4771 amt = sizeof (struct elf_segment_map);
4772 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4773 if (m == NULL)
4774 goto error_return;
4775 m->next = NULL;
4776 m->p_type = PT_INTERP;
4777 m->count = 1;
4778 m->sections[0] = s;
4779
4780 *pm = m;
4781 pm = &m->next;
4782 }
4783
4784 /* Look through the sections. We put sections in the same program
4785 segment when the start of the second section can be placed within
4786 a few bytes of the end of the first section. */
4787 last_hdr = NULL;
4788 last_size = 0;
4789 hdr_index = 0;
4790 writable = FALSE;
4791 executable = FALSE;
4792 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4793 if (dynsec != NULL
4794 && (dynsec->flags & SEC_LOAD) == 0)
4795 dynsec = NULL;
4796
4797 if ((abfd->flags & D_PAGED) == 0)
4798 phdr_in_segment = FALSE;
4799
4800 /* Deal with -Ttext or something similar such that the first section
4801 is not adjacent to the program headers. This is an
4802 approximation, since at this point we don't know exactly how many
4803 program headers we will need. */
4804 if (phdr_in_segment && count > 0)
4805 {
4806 bfd_vma phdr_lma; /* Bytes. */
4807 bfd_boolean separate_phdr = FALSE;
4808
4809 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4810 if (info != NULL
4811 && info->separate_code
4812 && (sections[0]->flags & SEC_CODE) != 0)
4813 {
4814 /* If data sections should be separate from code and
4815 thus not executable, and the first section is
4816 executable then put the file and program headers in
4817 their own PT_LOAD. */
4818 separate_phdr = TRUE;
4819 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4820 == (sections[0]->lma & addr_mask & -maxpagesize)))
4821 {
4822 /* The file and program headers are currently on the
4823 same page as the first section. Put them on the
4824 previous page if we can. */
4825 if (phdr_lma >= maxpagesize)
4826 phdr_lma -= maxpagesize;
4827 else
4828 separate_phdr = FALSE;
4829 }
4830 }
4831 if ((sections[0]->lma & addr_mask) < phdr_lma
4832 || (sections[0]->lma & addr_mask) < phdr_size)
4833 /* If file and program headers would be placed at the end
4834 of memory then it's probably better to omit them. */
4835 phdr_in_segment = FALSE;
4836 else if (phdr_lma < wrap_to)
4837 /* If a section wraps around to where we'll be placing
4838 file and program headers, then the headers will be
4839 overwritten. */
4840 phdr_in_segment = FALSE;
4841 else if (separate_phdr)
4842 {
4843 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4844 if (m == NULL)
4845 goto error_return;
4846 m->p_paddr = phdr_lma * opb;
4847 m->p_vaddr_offset
4848 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4849 m->p_paddr_valid = 1;
4850 *pm = m;
4851 pm = &m->next;
4852 phdr_in_segment = FALSE;
4853 }
4854 }
4855
4856 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4857 {
4858 asection *hdr;
4859 bfd_boolean new_segment;
4860
4861 hdr = *hdrpp;
4862
4863 /* See if this section and the last one will fit in the same
4864 segment. */
4865
4866 if (last_hdr == NULL)
4867 {
4868 /* If we don't have a segment yet, then we don't need a new
4869 one (we build the last one after this loop). */
4870 new_segment = FALSE;
4871 }
4872 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4873 {
4874 /* If this section has a different relation between the
4875 virtual address and the load address, then we need a new
4876 segment. */
4877 new_segment = TRUE;
4878 }
4879 else if (hdr->lma < last_hdr->lma + last_size
4880 || last_hdr->lma + last_size < last_hdr->lma)
4881 {
4882 /* If this section has a load address that makes it overlap
4883 the previous section, then we need a new segment. */
4884 new_segment = TRUE;
4885 }
4886 else if ((abfd->flags & D_PAGED) != 0
4887 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4888 == (hdr->lma & -maxpagesize)))
4889 {
4890 /* If we are demand paged then we can't map two disk
4891 pages onto the same memory page. */
4892 new_segment = FALSE;
4893 }
4894 /* In the next test we have to be careful when last_hdr->lma is close
4895 to the end of the address space. If the aligned address wraps
4896 around to the start of the address space, then there are no more
4897 pages left in memory and it is OK to assume that the current
4898 section can be included in the current segment. */
4899 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4900 + maxpagesize > last_hdr->lma)
4901 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4902 + maxpagesize <= hdr->lma))
4903 {
4904 /* If putting this section in this segment would force us to
4905 skip a page in the segment, then we need a new segment. */
4906 new_segment = TRUE;
4907 }
4908 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4909 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4910 {
4911 /* We don't want to put a loaded section after a
4912 nonloaded (ie. bss style) section in the same segment
4913 as that will force the non-loaded section to be loaded.
4914 Consider .tbss sections as loaded for this purpose. */
4915 new_segment = TRUE;
4916 }
4917 else if ((abfd->flags & D_PAGED) == 0)
4918 {
4919 /* If the file is not demand paged, which means that we
4920 don't require the sections to be correctly aligned in the
4921 file, then there is no other reason for a new segment. */
4922 new_segment = FALSE;
4923 }
4924 else if (info != NULL
4925 && info->separate_code
4926 && executable != ((hdr->flags & SEC_CODE) != 0))
4927 {
4928 new_segment = TRUE;
4929 }
4930 else if (! writable
4931 && (hdr->flags & SEC_READONLY) == 0)
4932 {
4933 /* We don't want to put a writable section in a read only
4934 segment. */
4935 new_segment = TRUE;
4936 }
4937 else
4938 {
4939 /* Otherwise, we can use the same segment. */
4940 new_segment = FALSE;
4941 }
4942
4943 /* Allow interested parties a chance to override our decision. */
4944 if (last_hdr != NULL
4945 && info != NULL
4946 && info->callbacks->override_segment_assignment != NULL)
4947 new_segment
4948 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4949 last_hdr,
4950 new_segment);
4951
4952 if (! new_segment)
4953 {
4954 if ((hdr->flags & SEC_READONLY) == 0)
4955 writable = TRUE;
4956 if ((hdr->flags & SEC_CODE) != 0)
4957 executable = TRUE;
4958 last_hdr = hdr;
4959 /* .tbss sections effectively have zero size. */
4960 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4961 continue;
4962 }
4963
4964 /* We need a new program segment. We must create a new program
4965 header holding all the sections from hdr_index until hdr. */
4966
4967 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4968 if (m == NULL)
4969 goto error_return;
4970
4971 *pm = m;
4972 pm = &m->next;
4973
4974 if ((hdr->flags & SEC_READONLY) == 0)
4975 writable = TRUE;
4976 else
4977 writable = FALSE;
4978
4979 if ((hdr->flags & SEC_CODE) == 0)
4980 executable = FALSE;
4981 else
4982 executable = TRUE;
4983
4984 last_hdr = hdr;
4985 /* .tbss sections effectively have zero size. */
4986 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4987 hdr_index = i;
4988 phdr_in_segment = FALSE;
4989 }
4990
4991 /* Create a final PT_LOAD program segment, but not if it's just
4992 for .tbss. */
4993 if (last_hdr != NULL
4994 && (i - hdr_index != 1
4995 || !IS_TBSS (last_hdr)))
4996 {
4997 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4998 if (m == NULL)
4999 goto error_return;
5000
5001 *pm = m;
5002 pm = &m->next;
5003 }
5004
5005 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
5006 if (dynsec != NULL)
5007 {
5008 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5009 if (m == NULL)
5010 goto error_return;
5011 *pm = m;
5012 pm = &m->next;
5013 }
5014
5015 /* For each batch of consecutive loadable SHT_NOTE sections,
5016 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
5017 because if we link together nonloadable .note sections and
5018 loadable .note sections, we will generate two .note sections
5019 in the output file. */
5020 for (s = abfd->sections; s != NULL; s = s->next)
5021 {
5022 if ((s->flags & SEC_LOAD) != 0
5023 && elf_section_type (s) == SHT_NOTE)
5024 {
5025 asection *s2;
5026 unsigned int alignment_power = s->alignment_power;
5027
5028 count = 1;
5029 for (s2 = s; s2->next != NULL; s2 = s2->next)
5030 {
5031 if (s2->next->alignment_power == alignment_power
5032 && (s2->next->flags & SEC_LOAD) != 0
5033 && elf_section_type (s2->next) == SHT_NOTE
5034 && align_power (s2->lma + s2->size / opb,
5035 alignment_power)
5036 == s2->next->lma)
5037 count++;
5038 else
5039 break;
5040 }
5041 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5042 amt += count * sizeof (asection *);
5043 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5044 if (m == NULL)
5045 goto error_return;
5046 m->next = NULL;
5047 m->p_type = PT_NOTE;
5048 m->count = count;
5049 while (count > 1)
5050 {
5051 m->sections[m->count - count--] = s;
5052 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5053 s = s->next;
5054 }
5055 m->sections[m->count - 1] = s;
5056 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5057 *pm = m;
5058 pm = &m->next;
5059 }
5060 if (s->flags & SEC_THREAD_LOCAL)
5061 {
5062 if (! tls_count)
5063 first_tls = s;
5064 tls_count++;
5065 }
5066 if (first_mbind == NULL
5067 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5068 first_mbind = s;
5069 }
5070
5071 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5072 if (tls_count > 0)
5073 {
5074 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5075 amt += tls_count * sizeof (asection *);
5076 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5077 if (m == NULL)
5078 goto error_return;
5079 m->next = NULL;
5080 m->p_type = PT_TLS;
5081 m->count = tls_count;
5082 /* Mandated PF_R. */
5083 m->p_flags = PF_R;
5084 m->p_flags_valid = 1;
5085 s = first_tls;
5086 for (i = 0; i < tls_count; ++i)
5087 {
5088 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5089 {
5090 _bfd_error_handler
5091 (_("%pB: TLS sections are not adjacent:"), abfd);
5092 s = first_tls;
5093 i = 0;
5094 while (i < tls_count)
5095 {
5096 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5097 {
5098 _bfd_error_handler (_(" TLS: %pA"), s);
5099 i++;
5100 }
5101 else
5102 _bfd_error_handler (_(" non-TLS: %pA"), s);
5103 s = s->next;
5104 }
5105 bfd_set_error (bfd_error_bad_value);
5106 goto error_return;
5107 }
5108 m->sections[i] = s;
5109 s = s->next;
5110 }
5111
5112 *pm = m;
5113 pm = &m->next;
5114 }
5115
5116 if (first_mbind
5117 && (abfd->flags & D_PAGED) != 0
5118 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5119 for (s = first_mbind; s != NULL; s = s->next)
5120 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5121 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5122 {
5123 /* Mandated PF_R. */
5124 unsigned long p_flags = PF_R;
5125 if ((s->flags & SEC_READONLY) == 0)
5126 p_flags |= PF_W;
5127 if ((s->flags & SEC_CODE) != 0)
5128 p_flags |= PF_X;
5129
5130 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5131 m = bfd_zalloc (abfd, amt);
5132 if (m == NULL)
5133 goto error_return;
5134 m->next = NULL;
5135 m->p_type = (PT_GNU_MBIND_LO
5136 + elf_section_data (s)->this_hdr.sh_info);
5137 m->count = 1;
5138 m->p_flags_valid = 1;
5139 m->sections[0] = s;
5140 m->p_flags = p_flags;
5141
5142 *pm = m;
5143 pm = &m->next;
5144 }
5145
5146 s = bfd_get_section_by_name (abfd,
5147 NOTE_GNU_PROPERTY_SECTION_NAME);
5148 if (s != NULL && s->size != 0)
5149 {
5150 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5151 m = bfd_zalloc (abfd, amt);
5152 if (m == NULL)
5153 goto error_return;
5154 m->next = NULL;
5155 m->p_type = PT_GNU_PROPERTY;
5156 m->count = 1;
5157 m->p_flags_valid = 1;
5158 m->sections[0] = s;
5159 m->p_flags = PF_R;
5160 *pm = m;
5161 pm = &m->next;
5162 }
5163
5164 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5165 segment. */
5166 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5167 if (eh_frame_hdr != NULL
5168 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5169 {
5170 amt = sizeof (struct elf_segment_map);
5171 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5172 if (m == NULL)
5173 goto error_return;
5174 m->next = NULL;
5175 m->p_type = PT_GNU_EH_FRAME;
5176 m->count = 1;
5177 m->sections[0] = eh_frame_hdr->output_section;
5178
5179 *pm = m;
5180 pm = &m->next;
5181 }
5182
5183 if (elf_stack_flags (abfd))
5184 {
5185 amt = sizeof (struct elf_segment_map);
5186 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5187 if (m == NULL)
5188 goto error_return;
5189 m->next = NULL;
5190 m->p_type = PT_GNU_STACK;
5191 m->p_flags = elf_stack_flags (abfd);
5192 m->p_align = bed->stack_align;
5193 m->p_flags_valid = 1;
5194 m->p_align_valid = m->p_align != 0;
5195 if (info->stacksize > 0)
5196 {
5197 m->p_size = info->stacksize;
5198 m->p_size_valid = 1;
5199 }
5200
5201 *pm = m;
5202 pm = &m->next;
5203 }
5204
5205 if (info != NULL && info->relro)
5206 {
5207 for (m = mfirst; m != NULL; m = m->next)
5208 {
5209 if (m->p_type == PT_LOAD
5210 && m->count != 0
5211 && m->sections[0]->vma >= info->relro_start
5212 && m->sections[0]->vma < info->relro_end)
5213 {
5214 i = m->count;
5215 while (--i != (unsigned) -1)
5216 {
5217 if (m->sections[i]->size > 0
5218 && (m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5219 == (SEC_LOAD | SEC_HAS_CONTENTS))
5220 break;
5221 }
5222
5223 if (i != (unsigned) -1)
5224 break;
5225 }
5226 }
5227
5228 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5229 if (m != NULL)
5230 {
5231 amt = sizeof (struct elf_segment_map);
5232 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5233 if (m == NULL)
5234 goto error_return;
5235 m->next = NULL;
5236 m->p_type = PT_GNU_RELRO;
5237 *pm = m;
5238 pm = &m->next;
5239 }
5240 }
5241
5242 free (sections);
5243 elf_seg_map (abfd) = mfirst;
5244 }
5245
5246 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5247 return FALSE;
5248
5249 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5250 ++count;
5251 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5252
5253 return TRUE;
5254
5255 error_return:
5256 if (sections != NULL)
5257 free (sections);
5258 return FALSE;
5259 }
5260
5261 /* Sort sections by address. */
5262
5263 static int
5264 elf_sort_sections (const void *arg1, const void *arg2)
5265 {
5266 const asection *sec1 = *(const asection **) arg1;
5267 const asection *sec2 = *(const asection **) arg2;
5268 bfd_size_type size1, size2;
5269
5270 /* Sort by LMA first, since this is the address used to
5271 place the section into a segment. */
5272 if (sec1->lma < sec2->lma)
5273 return -1;
5274 else if (sec1->lma > sec2->lma)
5275 return 1;
5276
5277 /* Then sort by VMA. Normally the LMA and the VMA will be
5278 the same, and this will do nothing. */
5279 if (sec1->vma < sec2->vma)
5280 return -1;
5281 else if (sec1->vma > sec2->vma)
5282 return 1;
5283
5284 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5285
5286 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5287
5288 if (TOEND (sec1))
5289 {
5290 if (!TOEND (sec2))
5291 return 1;
5292 }
5293 else if (TOEND (sec2))
5294 return -1;
5295
5296 #undef TOEND
5297
5298 /* Sort by size, to put zero sized sections
5299 before others at the same address. */
5300
5301 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5302 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5303
5304 if (size1 < size2)
5305 return -1;
5306 if (size1 > size2)
5307 return 1;
5308
5309 return sec1->target_index - sec2->target_index;
5310 }
5311
5312 /* This qsort comparison functions sorts PT_LOAD segments first and
5313 by p_paddr, for assign_file_positions_for_load_sections. */
5314
5315 static int
5316 elf_sort_segments (const void *arg1, const void *arg2)
5317 {
5318 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5319 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5320
5321 if (m1->p_type != m2->p_type)
5322 {
5323 if (m1->p_type == PT_NULL)
5324 return 1;
5325 if (m2->p_type == PT_NULL)
5326 return -1;
5327 return m1->p_type < m2->p_type ? -1 : 1;
5328 }
5329 if (m1->includes_filehdr != m2->includes_filehdr)
5330 return m1->includes_filehdr ? -1 : 1;
5331 if (m1->no_sort_lma != m2->no_sort_lma)
5332 return m1->no_sort_lma ? -1 : 1;
5333 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5334 {
5335 bfd_vma lma1, lma2; /* Octets. */
5336 lma1 = 0;
5337 if (m1->p_paddr_valid)
5338 lma1 = m1->p_paddr;
5339 else if (m1->count != 0)
5340 {
5341 unsigned int opb = bfd_octets_per_byte (m1->sections[0]->owner,
5342 m1->sections[0]);
5343 lma1 = (m1->sections[0]->lma + m1->p_vaddr_offset) * opb;
5344 }
5345 lma2 = 0;
5346 if (m2->p_paddr_valid)
5347 lma2 = m2->p_paddr;
5348 else if (m2->count != 0)
5349 {
5350 unsigned int opb = bfd_octets_per_byte (m2->sections[0]->owner,
5351 m2->sections[0]);
5352 lma2 = (m2->sections[0]->lma + m2->p_vaddr_offset) * opb;
5353 }
5354 if (lma1 != lma2)
5355 return lma1 < lma2 ? -1 : 1;
5356 }
5357 if (m1->idx != m2->idx)
5358 return m1->idx < m2->idx ? -1 : 1;
5359 return 0;
5360 }
5361
5362 /* Ian Lance Taylor writes:
5363
5364 We shouldn't be using % with a negative signed number. That's just
5365 not good. We have to make sure either that the number is not
5366 negative, or that the number has an unsigned type. When the types
5367 are all the same size they wind up as unsigned. When file_ptr is a
5368 larger signed type, the arithmetic winds up as signed long long,
5369 which is wrong.
5370
5371 What we're trying to say here is something like ``increase OFF by
5372 the least amount that will cause it to be equal to the VMA modulo
5373 the page size.'' */
5374 /* In other words, something like:
5375
5376 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5377 off_offset = off % bed->maxpagesize;
5378 if (vma_offset < off_offset)
5379 adjustment = vma_offset + bed->maxpagesize - off_offset;
5380 else
5381 adjustment = vma_offset - off_offset;
5382
5383 which can be collapsed into the expression below. */
5384
5385 static file_ptr
5386 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5387 {
5388 /* PR binutils/16199: Handle an alignment of zero. */
5389 if (maxpagesize == 0)
5390 maxpagesize = 1;
5391 return ((vma - off) % maxpagesize);
5392 }
5393
5394 static void
5395 print_segment_map (const struct elf_segment_map *m)
5396 {
5397 unsigned int j;
5398 const char *pt = get_segment_type (m->p_type);
5399 char buf[32];
5400
5401 if (pt == NULL)
5402 {
5403 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5404 sprintf (buf, "LOPROC+%7.7x",
5405 (unsigned int) (m->p_type - PT_LOPROC));
5406 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5407 sprintf (buf, "LOOS+%7.7x",
5408 (unsigned int) (m->p_type - PT_LOOS));
5409 else
5410 snprintf (buf, sizeof (buf), "%8.8x",
5411 (unsigned int) m->p_type);
5412 pt = buf;
5413 }
5414 fflush (stdout);
5415 fprintf (stderr, "%s:", pt);
5416 for (j = 0; j < m->count; j++)
5417 fprintf (stderr, " %s", m->sections [j]->name);
5418 putc ('\n',stderr);
5419 fflush (stderr);
5420 }
5421
5422 static bfd_boolean
5423 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5424 {
5425 void *buf;
5426 bfd_boolean ret;
5427
5428 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5429 return FALSE;
5430 buf = bfd_zmalloc (len);
5431 if (buf == NULL)
5432 return FALSE;
5433 ret = bfd_bwrite (buf, len, abfd) == len;
5434 free (buf);
5435 return ret;
5436 }
5437
5438 /* Assign file positions to the sections based on the mapping from
5439 sections to segments. This function also sets up some fields in
5440 the file header. */
5441
5442 static bfd_boolean
5443 assign_file_positions_for_load_sections (bfd *abfd,
5444 struct bfd_link_info *link_info)
5445 {
5446 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5447 struct elf_segment_map *m;
5448 struct elf_segment_map *phdr_load_seg;
5449 Elf_Internal_Phdr *phdrs;
5450 Elf_Internal_Phdr *p;
5451 file_ptr off; /* Octets. */
5452 bfd_size_type maxpagesize;
5453 unsigned int alloc, actual;
5454 unsigned int i, j;
5455 struct elf_segment_map **sorted_seg_map;
5456 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
5457
5458 if (link_info == NULL
5459 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5460 return FALSE;
5461
5462 alloc = 0;
5463 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5464 m->idx = alloc++;
5465
5466 if (alloc)
5467 {
5468 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5469 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5470 }
5471 else
5472 {
5473 /* PR binutils/12467. */
5474 elf_elfheader (abfd)->e_phoff = 0;
5475 elf_elfheader (abfd)->e_phentsize = 0;
5476 }
5477
5478 elf_elfheader (abfd)->e_phnum = alloc;
5479
5480 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5481 {
5482 actual = alloc;
5483 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5484 }
5485 else
5486 {
5487 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5488 BFD_ASSERT (elf_program_header_size (abfd)
5489 == actual * bed->s->sizeof_phdr);
5490 BFD_ASSERT (actual >= alloc);
5491 }
5492
5493 if (alloc == 0)
5494 {
5495 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5496 return TRUE;
5497 }
5498
5499 /* We're writing the size in elf_program_header_size (abfd),
5500 see assign_file_positions_except_relocs, so make sure we have
5501 that amount allocated, with trailing space cleared.
5502 The variable alloc contains the computed need, while
5503 elf_program_header_size (abfd) contains the size used for the
5504 layout.
5505 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5506 where the layout is forced to according to a larger size in the
5507 last iterations for the testcase ld-elf/header. */
5508 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5509 + alloc * sizeof (*sorted_seg_map)));
5510 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5511 elf_tdata (abfd)->phdr = phdrs;
5512 if (phdrs == NULL)
5513 return FALSE;
5514
5515 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5516 {
5517 sorted_seg_map[j] = m;
5518 /* If elf_segment_map is not from map_sections_to_segments, the
5519 sections may not be correctly ordered. NOTE: sorting should
5520 not be done to the PT_NOTE section of a corefile, which may
5521 contain several pseudo-sections artificially created by bfd.
5522 Sorting these pseudo-sections breaks things badly. */
5523 if (m->count > 1
5524 && !(elf_elfheader (abfd)->e_type == ET_CORE
5525 && m->p_type == PT_NOTE))
5526 {
5527 for (i = 0; i < m->count; i++)
5528 m->sections[i]->target_index = i;
5529 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5530 elf_sort_sections);
5531 }
5532 }
5533 if (alloc > 1)
5534 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5535 elf_sort_segments);
5536
5537 maxpagesize = 1;
5538 if ((abfd->flags & D_PAGED) != 0)
5539 maxpagesize = bed->maxpagesize;
5540
5541 /* Sections must map to file offsets past the ELF file header. */
5542 off = bed->s->sizeof_ehdr;
5543 /* And if one of the PT_LOAD headers doesn't include the program
5544 headers then we'll be mapping program headers in the usual
5545 position after the ELF file header. */
5546 phdr_load_seg = NULL;
5547 for (j = 0; j < alloc; j++)
5548 {
5549 m = sorted_seg_map[j];
5550 if (m->p_type != PT_LOAD)
5551 break;
5552 if (m->includes_phdrs)
5553 {
5554 phdr_load_seg = m;
5555 break;
5556 }
5557 }
5558 if (phdr_load_seg == NULL)
5559 off += actual * bed->s->sizeof_phdr;
5560
5561 for (j = 0; j < alloc; j++)
5562 {
5563 asection **secpp;
5564 bfd_vma off_adjust; /* Octets. */
5565 bfd_boolean no_contents;
5566
5567 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5568 number of sections with contents contributing to both p_filesz
5569 and p_memsz, followed by a number of sections with no contents
5570 that just contribute to p_memsz. In this loop, OFF tracks next
5571 available file offset for PT_LOAD and PT_NOTE segments. */
5572 m = sorted_seg_map[j];
5573 p = phdrs + m->idx;
5574 p->p_type = m->p_type;
5575 p->p_flags = m->p_flags;
5576
5577 if (m->count == 0)
5578 p->p_vaddr = m->p_vaddr_offset * opb;
5579 else
5580 p->p_vaddr = (m->sections[0]->vma + m->p_vaddr_offset) * opb;
5581
5582 if (m->p_paddr_valid)
5583 p->p_paddr = m->p_paddr;
5584 else if (m->count == 0)
5585 p->p_paddr = 0;
5586 else
5587 p->p_paddr = (m->sections[0]->lma + m->p_vaddr_offset) * opb;
5588
5589 if (p->p_type == PT_LOAD
5590 && (abfd->flags & D_PAGED) != 0)
5591 {
5592 /* p_align in demand paged PT_LOAD segments effectively stores
5593 the maximum page size. When copying an executable with
5594 objcopy, we set m->p_align from the input file. Use this
5595 value for maxpagesize rather than bed->maxpagesize, which
5596 may be different. Note that we use maxpagesize for PT_TLS
5597 segment alignment later in this function, so we are relying
5598 on at least one PT_LOAD segment appearing before a PT_TLS
5599 segment. */
5600 if (m->p_align_valid)
5601 maxpagesize = m->p_align;
5602
5603 p->p_align = maxpagesize;
5604 }
5605 else if (m->p_align_valid)
5606 p->p_align = m->p_align;
5607 else if (m->count == 0)
5608 p->p_align = 1 << bed->s->log_file_align;
5609
5610 if (m == phdr_load_seg)
5611 {
5612 if (!m->includes_filehdr)
5613 p->p_offset = off;
5614 off += actual * bed->s->sizeof_phdr;
5615 }
5616
5617 no_contents = FALSE;
5618 off_adjust = 0;
5619 if (p->p_type == PT_LOAD
5620 && m->count > 0)
5621 {
5622 bfd_size_type align; /* Bytes. */
5623 unsigned int align_power = 0;
5624
5625 if (m->p_align_valid)
5626 align = p->p_align;
5627 else
5628 {
5629 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5630 {
5631 unsigned int secalign;
5632
5633 secalign = bfd_section_alignment (*secpp);
5634 if (secalign > align_power)
5635 align_power = secalign;
5636 }
5637 align = (bfd_size_type) 1 << align_power;
5638 if (align < maxpagesize)
5639 align = maxpagesize;
5640 }
5641
5642 for (i = 0; i < m->count; i++)
5643 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5644 /* If we aren't making room for this section, then
5645 it must be SHT_NOBITS regardless of what we've
5646 set via struct bfd_elf_special_section. */
5647 elf_section_type (m->sections[i]) = SHT_NOBITS;
5648
5649 /* Find out whether this segment contains any loadable
5650 sections. */
5651 no_contents = TRUE;
5652 for (i = 0; i < m->count; i++)
5653 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5654 {
5655 no_contents = FALSE;
5656 break;
5657 }
5658
5659 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align * opb);
5660
5661 /* Broken hardware and/or kernel require that files do not
5662 map the same page with different permissions on some hppa
5663 processors. */
5664 if (j != 0
5665 && (abfd->flags & D_PAGED) != 0
5666 && bed->no_page_alias
5667 && (off & (maxpagesize - 1)) != 0
5668 && ((off & -maxpagesize)
5669 == ((off + off_adjust) & -maxpagesize)))
5670 off_adjust += maxpagesize;
5671 off += off_adjust;
5672 if (no_contents)
5673 {
5674 /* We shouldn't need to align the segment on disk since
5675 the segment doesn't need file space, but the gABI
5676 arguably requires the alignment and glibc ld.so
5677 checks it. So to comply with the alignment
5678 requirement but not waste file space, we adjust
5679 p_offset for just this segment. (OFF_ADJUST is
5680 subtracted from OFF later.) This may put p_offset
5681 past the end of file, but that shouldn't matter. */
5682 }
5683 else
5684 off_adjust = 0;
5685 }
5686 /* Make sure the .dynamic section is the first section in the
5687 PT_DYNAMIC segment. */
5688 else if (p->p_type == PT_DYNAMIC
5689 && m->count > 1
5690 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5691 {
5692 _bfd_error_handler
5693 (_("%pB: The first section in the PT_DYNAMIC segment"
5694 " is not the .dynamic section"),
5695 abfd);
5696 bfd_set_error (bfd_error_bad_value);
5697 return FALSE;
5698 }
5699 /* Set the note section type to SHT_NOTE. */
5700 else if (p->p_type == PT_NOTE)
5701 for (i = 0; i < m->count; i++)
5702 elf_section_type (m->sections[i]) = SHT_NOTE;
5703
5704 if (m->includes_filehdr)
5705 {
5706 if (!m->p_flags_valid)
5707 p->p_flags |= PF_R;
5708 p->p_filesz = bed->s->sizeof_ehdr;
5709 p->p_memsz = bed->s->sizeof_ehdr;
5710 if (p->p_type == PT_LOAD)
5711 {
5712 if (m->count > 0)
5713 {
5714 if (p->p_vaddr < (bfd_vma) off
5715 || (!m->p_paddr_valid
5716 && p->p_paddr < (bfd_vma) off))
5717 {
5718 _bfd_error_handler
5719 (_("%pB: not enough room for program headers,"
5720 " try linking with -N"),
5721 abfd);
5722 bfd_set_error (bfd_error_bad_value);
5723 return FALSE;
5724 }
5725 p->p_vaddr -= off;
5726 if (!m->p_paddr_valid)
5727 p->p_paddr -= off;
5728 }
5729 }
5730 else if (sorted_seg_map[0]->includes_filehdr)
5731 {
5732 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5733 p->p_vaddr = filehdr->p_vaddr;
5734 if (!m->p_paddr_valid)
5735 p->p_paddr = filehdr->p_paddr;
5736 }
5737 }
5738
5739 if (m->includes_phdrs)
5740 {
5741 if (!m->p_flags_valid)
5742 p->p_flags |= PF_R;
5743 p->p_filesz += actual * bed->s->sizeof_phdr;
5744 p->p_memsz += actual * bed->s->sizeof_phdr;
5745 if (!m->includes_filehdr)
5746 {
5747 if (p->p_type == PT_LOAD)
5748 {
5749 elf_elfheader (abfd)->e_phoff = p->p_offset;
5750 if (m->count > 0)
5751 {
5752 p->p_vaddr -= off - p->p_offset;
5753 if (!m->p_paddr_valid)
5754 p->p_paddr -= off - p->p_offset;
5755 }
5756 }
5757 else if (phdr_load_seg != NULL)
5758 {
5759 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5760 bfd_vma phdr_off = 0; /* Octets. */
5761 if (phdr_load_seg->includes_filehdr)
5762 phdr_off = bed->s->sizeof_ehdr;
5763 p->p_vaddr = phdr->p_vaddr + phdr_off;
5764 if (!m->p_paddr_valid)
5765 p->p_paddr = phdr->p_paddr + phdr_off;
5766 p->p_offset = phdr->p_offset + phdr_off;
5767 }
5768 else
5769 p->p_offset = bed->s->sizeof_ehdr;
5770 }
5771 }
5772
5773 if (p->p_type == PT_LOAD
5774 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5775 {
5776 if (!m->includes_filehdr && !m->includes_phdrs)
5777 {
5778 p->p_offset = off;
5779 if (no_contents)
5780 {
5781 /* Put meaningless p_offset for PT_LOAD segments
5782 without file contents somewhere within the first
5783 page, in an attempt to not point past EOF. */
5784 bfd_size_type align = maxpagesize;
5785 if (align < p->p_align)
5786 align = p->p_align;
5787 if (align < 1)
5788 align = 1;
5789 p->p_offset = off % align;
5790 }
5791 }
5792 else
5793 {
5794 file_ptr adjust; /* Octets. */
5795
5796 adjust = off - (p->p_offset + p->p_filesz);
5797 if (!no_contents)
5798 p->p_filesz += adjust;
5799 p->p_memsz += adjust;
5800 }
5801 }
5802
5803 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5804 maps. Set filepos for sections in PT_LOAD segments, and in
5805 core files, for sections in PT_NOTE segments.
5806 assign_file_positions_for_non_load_sections will set filepos
5807 for other sections and update p_filesz for other segments. */
5808 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5809 {
5810 asection *sec;
5811 bfd_size_type align;
5812 Elf_Internal_Shdr *this_hdr;
5813
5814 sec = *secpp;
5815 this_hdr = &elf_section_data (sec)->this_hdr;
5816 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5817
5818 if ((p->p_type == PT_LOAD
5819 || p->p_type == PT_TLS)
5820 && (this_hdr->sh_type != SHT_NOBITS
5821 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5822 && ((this_hdr->sh_flags & SHF_TLS) == 0
5823 || p->p_type == PT_TLS))))
5824 {
5825 bfd_vma p_start = p->p_paddr; /* Octets. */
5826 bfd_vma p_end = p_start + p->p_memsz; /* Octets. */
5827 bfd_vma s_start = sec->lma * opb; /* Octets. */
5828 bfd_vma adjust = s_start - p_end; /* Octets. */
5829
5830 if (adjust != 0
5831 && (s_start < p_end
5832 || p_end < p_start))
5833 {
5834 _bfd_error_handler
5835 /* xgettext:c-format */
5836 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5837 abfd, sec, (uint64_t) s_start / opb,
5838 (uint64_t) p_end / opb);
5839 adjust = 0;
5840 sec->lma = p_end / opb;
5841 }
5842 p->p_memsz += adjust;
5843
5844 if (this_hdr->sh_type != SHT_NOBITS)
5845 {
5846 if (p->p_type == PT_LOAD)
5847 {
5848 if (p->p_filesz + adjust < p->p_memsz)
5849 {
5850 /* We have a PROGBITS section following NOBITS ones.
5851 Allocate file space for the NOBITS section(s) and
5852 zero it. */
5853 adjust = p->p_memsz - p->p_filesz;
5854 if (!write_zeros (abfd, off, adjust))
5855 return FALSE;
5856 }
5857 off += adjust;
5858 }
5859 p->p_filesz += adjust;
5860 }
5861 }
5862
5863 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5864 {
5865 /* The section at i == 0 is the one that actually contains
5866 everything. */
5867 if (i == 0)
5868 {
5869 this_hdr->sh_offset = sec->filepos = off;
5870 off += this_hdr->sh_size;
5871 p->p_filesz = this_hdr->sh_size;
5872 p->p_memsz = 0;
5873 p->p_align = 1;
5874 }
5875 else
5876 {
5877 /* The rest are fake sections that shouldn't be written. */
5878 sec->filepos = 0;
5879 sec->size = 0;
5880 sec->flags = 0;
5881 continue;
5882 }
5883 }
5884 else
5885 {
5886 if (p->p_type == PT_LOAD)
5887 {
5888 this_hdr->sh_offset = sec->filepos = off;
5889 if (this_hdr->sh_type != SHT_NOBITS)
5890 off += this_hdr->sh_size;
5891 }
5892 else if (this_hdr->sh_type == SHT_NOBITS
5893 && (this_hdr->sh_flags & SHF_TLS) != 0
5894 && this_hdr->sh_offset == 0)
5895 {
5896 /* This is a .tbss section that didn't get a PT_LOAD.
5897 (See _bfd_elf_map_sections_to_segments "Create a
5898 final PT_LOAD".) Set sh_offset to the value it
5899 would have if we had created a zero p_filesz and
5900 p_memsz PT_LOAD header for the section. This
5901 also makes the PT_TLS header have the same
5902 p_offset value. */
5903 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5904 off, align);
5905 this_hdr->sh_offset = sec->filepos = off + adjust;
5906 }
5907
5908 if (this_hdr->sh_type != SHT_NOBITS)
5909 {
5910 p->p_filesz += this_hdr->sh_size;
5911 /* A load section without SHF_ALLOC is something like
5912 a note section in a PT_NOTE segment. These take
5913 file space but are not loaded into memory. */
5914 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5915 p->p_memsz += this_hdr->sh_size;
5916 }
5917 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5918 {
5919 if (p->p_type == PT_TLS)
5920 p->p_memsz += this_hdr->sh_size;
5921
5922 /* .tbss is special. It doesn't contribute to p_memsz of
5923 normal segments. */
5924 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5925 p->p_memsz += this_hdr->sh_size;
5926 }
5927
5928 if (align > p->p_align
5929 && !m->p_align_valid
5930 && (p->p_type != PT_LOAD
5931 || (abfd->flags & D_PAGED) == 0))
5932 p->p_align = align;
5933 }
5934
5935 if (!m->p_flags_valid)
5936 {
5937 p->p_flags |= PF_R;
5938 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5939 p->p_flags |= PF_X;
5940 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5941 p->p_flags |= PF_W;
5942 }
5943 }
5944
5945 off -= off_adjust;
5946
5947 /* PR ld/20815 - Check that the program header segment, if
5948 present, will be loaded into memory. */
5949 if (p->p_type == PT_PHDR
5950 && phdr_load_seg == NULL
5951 && !(bed->elf_backend_allow_non_load_phdr != NULL
5952 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5953 {
5954 /* The fix for this error is usually to edit the linker script being
5955 used and set up the program headers manually. Either that or
5956 leave room for the headers at the start of the SECTIONS. */
5957 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5958 " by LOAD segment"),
5959 abfd);
5960 if (link_info == NULL)
5961 return FALSE;
5962 /* Arrange for the linker to exit with an error, deleting
5963 the output file unless --noinhibit-exec is given. */
5964 link_info->callbacks->info ("%X");
5965 }
5966
5967 /* Check that all sections are in a PT_LOAD segment.
5968 Don't check funky gdb generated core files. */
5969 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5970 {
5971 bfd_boolean check_vma = TRUE;
5972
5973 for (i = 1; i < m->count; i++)
5974 if (m->sections[i]->vma == m->sections[i - 1]->vma
5975 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5976 ->this_hdr), p) != 0
5977 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5978 ->this_hdr), p) != 0)
5979 {
5980 /* Looks like we have overlays packed into the segment. */
5981 check_vma = FALSE;
5982 break;
5983 }
5984
5985 for (i = 0; i < m->count; i++)
5986 {
5987 Elf_Internal_Shdr *this_hdr;
5988 asection *sec;
5989
5990 sec = m->sections[i];
5991 this_hdr = &(elf_section_data(sec)->this_hdr);
5992 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5993 && !ELF_TBSS_SPECIAL (this_hdr, p))
5994 {
5995 _bfd_error_handler
5996 /* xgettext:c-format */
5997 (_("%pB: section `%pA' can't be allocated in segment %d"),
5998 abfd, sec, j);
5999 print_segment_map (m);
6000 }
6001 }
6002 }
6003 }
6004
6005 elf_next_file_pos (abfd) = off;
6006
6007 if (link_info != NULL
6008 && phdr_load_seg != NULL
6009 && phdr_load_seg->includes_filehdr)
6010 {
6011 /* There is a segment that contains both the file headers and the
6012 program headers, so provide a symbol __ehdr_start pointing there.
6013 A program can use this to examine itself robustly. */
6014
6015 struct elf_link_hash_entry *hash
6016 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
6017 FALSE, FALSE, TRUE);
6018 /* If the symbol was referenced and not defined, define it. */
6019 if (hash != NULL
6020 && (hash->root.type == bfd_link_hash_new
6021 || hash->root.type == bfd_link_hash_undefined
6022 || hash->root.type == bfd_link_hash_undefweak
6023 || hash->root.type == bfd_link_hash_common))
6024 {
6025 asection *s = NULL;
6026 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr / opb;
6027
6028 if (phdr_load_seg->count != 0)
6029 /* The segment contains sections, so use the first one. */
6030 s = phdr_load_seg->sections[0];
6031 else
6032 /* Use the first (i.e. lowest-addressed) section in any segment. */
6033 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
6034 if (m->p_type == PT_LOAD && m->count != 0)
6035 {
6036 s = m->sections[0];
6037 break;
6038 }
6039
6040 if (s != NULL)
6041 {
6042 hash->root.u.def.value = filehdr_vaddr - s->vma;
6043 hash->root.u.def.section = s;
6044 }
6045 else
6046 {
6047 hash->root.u.def.value = filehdr_vaddr;
6048 hash->root.u.def.section = bfd_abs_section_ptr;
6049 }
6050
6051 hash->root.type = bfd_link_hash_defined;
6052 hash->def_regular = 1;
6053 hash->non_elf = 0;
6054 }
6055 }
6056
6057 return TRUE;
6058 }
6059
6060 /* Determine if a bfd is a debuginfo file. Unfortunately there
6061 is no defined method for detecting such files, so we have to
6062 use heuristics instead. */
6063
6064 bfd_boolean
6065 is_debuginfo_file (bfd *abfd)
6066 {
6067 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6068 return FALSE;
6069
6070 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6071 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6072 Elf_Internal_Shdr **headerp;
6073
6074 for (headerp = start_headers; headerp < end_headers; headerp ++)
6075 {
6076 Elf_Internal_Shdr *header = * headerp;
6077
6078 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6079 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6080 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6081 && header->sh_type != SHT_NOBITS
6082 && header->sh_type != SHT_NOTE)
6083 return FALSE;
6084 }
6085
6086 return TRUE;
6087 }
6088
6089 /* Assign file positions for the other sections, except for compressed debugging
6090 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6091
6092 static bfd_boolean
6093 assign_file_positions_for_non_load_sections (bfd *abfd,
6094 struct bfd_link_info *link_info)
6095 {
6096 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6097 Elf_Internal_Shdr **i_shdrpp;
6098 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6099 Elf_Internal_Phdr *phdrs;
6100 Elf_Internal_Phdr *p;
6101 struct elf_segment_map *m;
6102 file_ptr off;
6103 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
6104
6105 i_shdrpp = elf_elfsections (abfd);
6106 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6107 off = elf_next_file_pos (abfd);
6108 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6109 {
6110 Elf_Internal_Shdr *hdr;
6111
6112 hdr = *hdrpp;
6113 if (hdr->bfd_section != NULL
6114 && (hdr->bfd_section->filepos != 0
6115 || (hdr->sh_type == SHT_NOBITS
6116 && hdr->contents == NULL)))
6117 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6118 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6119 {
6120 if (hdr->sh_size != 0
6121 /* PR 24717 - debuginfo files are known to be not strictly
6122 compliant with the ELF standard. In particular they often
6123 have .note.gnu.property sections that are outside of any
6124 loadable segment. This is not a problem for such files,
6125 so do not warn about them. */
6126 && ! is_debuginfo_file (abfd))
6127 _bfd_error_handler
6128 /* xgettext:c-format */
6129 (_("%pB: warning: allocated section `%s' not in segment"),
6130 abfd,
6131 (hdr->bfd_section == NULL
6132 ? "*unknown*"
6133 : hdr->bfd_section->name));
6134 /* We don't need to page align empty sections. */
6135 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6136 off += vma_page_aligned_bias (hdr->sh_addr, off,
6137 bed->maxpagesize);
6138 else
6139 off += vma_page_aligned_bias (hdr->sh_addr, off,
6140 hdr->sh_addralign);
6141 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6142 FALSE);
6143 }
6144 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6145 && hdr->bfd_section == NULL)
6146 /* We don't know the offset of these sections yet: their size has
6147 not been decided. */
6148 || (hdr->bfd_section != NULL
6149 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6150 || (bfd_section_is_ctf (hdr->bfd_section)
6151 && abfd->is_linker_output)))
6152 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6153 || (elf_symtab_shndx_list (abfd) != NULL
6154 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6155 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6156 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6157 hdr->sh_offset = -1;
6158 else
6159 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6160 }
6161 elf_next_file_pos (abfd) = off;
6162
6163 /* Now that we have set the section file positions, we can set up
6164 the file positions for the non PT_LOAD segments. */
6165 phdrs = elf_tdata (abfd)->phdr;
6166 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6167 {
6168 if (p->p_type == PT_GNU_RELRO)
6169 {
6170 bfd_vma start, end; /* Bytes. */
6171 bfd_boolean ok;
6172
6173 if (link_info != NULL)
6174 {
6175 /* During linking the range of the RELRO segment is passed
6176 in link_info. Note that there may be padding between
6177 relro_start and the first RELRO section. */
6178 start = link_info->relro_start;
6179 end = link_info->relro_end;
6180 }
6181 else if (m->count != 0)
6182 {
6183 if (!m->p_size_valid)
6184 abort ();
6185 start = m->sections[0]->vma;
6186 end = start + m->p_size / opb;
6187 }
6188 else
6189 {
6190 start = 0;
6191 end = 0;
6192 }
6193
6194 ok = FALSE;
6195 if (start < end)
6196 {
6197 struct elf_segment_map *lm;
6198 const Elf_Internal_Phdr *lp;
6199 unsigned int i;
6200
6201 /* Find a LOAD segment containing a section in the RELRO
6202 segment. */
6203 for (lm = elf_seg_map (abfd), lp = phdrs;
6204 lm != NULL;
6205 lm = lm->next, lp++)
6206 {
6207 if (lp->p_type == PT_LOAD
6208 && lm->count != 0
6209 && (lm->sections[lm->count - 1]->vma
6210 + (!IS_TBSS (lm->sections[lm->count - 1])
6211 ? lm->sections[lm->count - 1]->size / opb
6212 : 0)) > start
6213 && lm->sections[0]->vma < end)
6214 break;
6215 }
6216
6217 if (lm != NULL)
6218 {
6219 /* Find the section starting the RELRO segment. */
6220 for (i = 0; i < lm->count; i++)
6221 {
6222 asection *s = lm->sections[i];
6223 if (s->vma >= start
6224 && s->vma < end
6225 && s->size != 0)
6226 break;
6227 }
6228
6229 if (i < lm->count)
6230 {
6231 p->p_vaddr = lm->sections[i]->vma * opb;
6232 p->p_paddr = lm->sections[i]->lma * opb;
6233 p->p_offset = lm->sections[i]->filepos;
6234 p->p_memsz = end * opb - p->p_vaddr;
6235 p->p_filesz = p->p_memsz;
6236
6237 /* The RELRO segment typically ends a few bytes
6238 into .got.plt but other layouts are possible.
6239 In cases where the end does not match any
6240 loaded section (for instance is in file
6241 padding), trim p_filesz back to correspond to
6242 the end of loaded section contents. */
6243 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6244 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6245
6246 /* Preserve the alignment and flags if they are
6247 valid. The gold linker generates RW/4 for
6248 the PT_GNU_RELRO section. It is better for
6249 objcopy/strip to honor these attributes
6250 otherwise gdb will choke when using separate
6251 debug files. */
6252 if (!m->p_align_valid)
6253 p->p_align = 1;
6254 if (!m->p_flags_valid)
6255 p->p_flags = PF_R;
6256 ok = TRUE;
6257 }
6258 }
6259 }
6260 if (link_info != NULL)
6261 BFD_ASSERT (ok);
6262 if (!ok)
6263 memset (p, 0, sizeof *p);
6264 }
6265 else if (p->p_type == PT_GNU_STACK)
6266 {
6267 if (m->p_size_valid)
6268 p->p_memsz = m->p_size;
6269 }
6270 else if (m->count != 0)
6271 {
6272 unsigned int i;
6273
6274 if (p->p_type != PT_LOAD
6275 && (p->p_type != PT_NOTE
6276 || bfd_get_format (abfd) != bfd_core))
6277 {
6278 /* A user specified segment layout may include a PHDR
6279 segment that overlaps with a LOAD segment... */
6280 if (p->p_type == PT_PHDR)
6281 {
6282 m->count = 0;
6283 continue;
6284 }
6285
6286 if (m->includes_filehdr || m->includes_phdrs)
6287 {
6288 /* PR 17512: file: 2195325e. */
6289 _bfd_error_handler
6290 (_("%pB: error: non-load segment %d includes file header "
6291 "and/or program header"),
6292 abfd, (int) (p - phdrs));
6293 return FALSE;
6294 }
6295
6296 p->p_filesz = 0;
6297 p->p_offset = m->sections[0]->filepos;
6298 for (i = m->count; i-- != 0;)
6299 {
6300 asection *sect = m->sections[i];
6301 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6302 if (hdr->sh_type != SHT_NOBITS)
6303 {
6304 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6305 + hdr->sh_size);
6306 break;
6307 }
6308 }
6309 }
6310 }
6311 }
6312
6313 return TRUE;
6314 }
6315
6316 static elf_section_list *
6317 find_section_in_list (unsigned int i, elf_section_list * list)
6318 {
6319 for (;list != NULL; list = list->next)
6320 if (list->ndx == i)
6321 break;
6322 return list;
6323 }
6324
6325 /* Work out the file positions of all the sections. This is called by
6326 _bfd_elf_compute_section_file_positions. All the section sizes and
6327 VMAs must be known before this is called.
6328
6329 Reloc sections come in two flavours: Those processed specially as
6330 "side-channel" data attached to a section to which they apply, and those that
6331 bfd doesn't process as relocations. The latter sort are stored in a normal
6332 bfd section by bfd_section_from_shdr. We don't consider the former sort
6333 here, unless they form part of the loadable image. Reloc sections not
6334 assigned here (and compressed debugging sections and CTF sections which
6335 nothing else in the file can rely upon) will be handled later by
6336 assign_file_positions_for_relocs.
6337
6338 We also don't set the positions of the .symtab and .strtab here. */
6339
6340 static bfd_boolean
6341 assign_file_positions_except_relocs (bfd *abfd,
6342 struct bfd_link_info *link_info)
6343 {
6344 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6345 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6346 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6347 unsigned int alloc;
6348
6349 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6350 && bfd_get_format (abfd) != bfd_core)
6351 {
6352 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6353 unsigned int num_sec = elf_numsections (abfd);
6354 Elf_Internal_Shdr **hdrpp;
6355 unsigned int i;
6356 file_ptr off;
6357
6358 /* Start after the ELF header. */
6359 off = i_ehdrp->e_ehsize;
6360
6361 /* We are not creating an executable, which means that we are
6362 not creating a program header, and that the actual order of
6363 the sections in the file is unimportant. */
6364 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6365 {
6366 Elf_Internal_Shdr *hdr;
6367
6368 hdr = *hdrpp;
6369 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6370 && hdr->bfd_section == NULL)
6371 /* Do not assign offsets for these sections yet: we don't know
6372 their sizes. */
6373 || (hdr->bfd_section != NULL
6374 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6375 || (bfd_section_is_ctf (hdr->bfd_section)
6376 && abfd->is_linker_output)))
6377 || i == elf_onesymtab (abfd)
6378 || (elf_symtab_shndx_list (abfd) != NULL
6379 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6380 || i == elf_strtab_sec (abfd)
6381 || i == elf_shstrtab_sec (abfd))
6382 {
6383 hdr->sh_offset = -1;
6384 }
6385 else
6386 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6387 }
6388
6389 elf_next_file_pos (abfd) = off;
6390 elf_program_header_size (abfd) = 0;
6391 }
6392 else
6393 {
6394 /* Assign file positions for the loaded sections based on the
6395 assignment of sections to segments. */
6396 if (!assign_file_positions_for_load_sections (abfd, link_info))
6397 return FALSE;
6398
6399 /* And for non-load sections. */
6400 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6401 return FALSE;
6402 }
6403
6404 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6405 return FALSE;
6406
6407 /* Write out the program headers. */
6408 alloc = i_ehdrp->e_phnum;
6409 if (alloc != 0)
6410 {
6411 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6412 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6413 return FALSE;
6414 }
6415
6416 return TRUE;
6417 }
6418
6419 bfd_boolean
6420 _bfd_elf_init_file_header (bfd *abfd,
6421 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6422 {
6423 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6424 struct elf_strtab_hash *shstrtab;
6425 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6426
6427 i_ehdrp = elf_elfheader (abfd);
6428
6429 shstrtab = _bfd_elf_strtab_init ();
6430 if (shstrtab == NULL)
6431 return FALSE;
6432
6433 elf_shstrtab (abfd) = shstrtab;
6434
6435 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6436 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6437 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6438 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6439
6440 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6441 i_ehdrp->e_ident[EI_DATA] =
6442 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6443 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6444
6445 if ((abfd->flags & DYNAMIC) != 0)
6446 i_ehdrp->e_type = ET_DYN;
6447 else if ((abfd->flags & EXEC_P) != 0)
6448 i_ehdrp->e_type = ET_EXEC;
6449 else if (bfd_get_format (abfd) == bfd_core)
6450 i_ehdrp->e_type = ET_CORE;
6451 else
6452 i_ehdrp->e_type = ET_REL;
6453
6454 switch (bfd_get_arch (abfd))
6455 {
6456 case bfd_arch_unknown:
6457 i_ehdrp->e_machine = EM_NONE;
6458 break;
6459
6460 /* There used to be a long list of cases here, each one setting
6461 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6462 in the corresponding bfd definition. To avoid duplication,
6463 the switch was removed. Machines that need special handling
6464 can generally do it in elf_backend_final_write_processing(),
6465 unless they need the information earlier than the final write.
6466 Such need can generally be supplied by replacing the tests for
6467 e_machine with the conditions used to determine it. */
6468 default:
6469 i_ehdrp->e_machine = bed->elf_machine_code;
6470 }
6471
6472 i_ehdrp->e_version = bed->s->ev_current;
6473 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6474
6475 /* No program header, for now. */
6476 i_ehdrp->e_phoff = 0;
6477 i_ehdrp->e_phentsize = 0;
6478 i_ehdrp->e_phnum = 0;
6479
6480 /* Each bfd section is section header entry. */
6481 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6482 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6483
6484 elf_tdata (abfd)->symtab_hdr.sh_name =
6485 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6486 elf_tdata (abfd)->strtab_hdr.sh_name =
6487 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6488 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6489 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6490 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6491 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6492 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6493 return FALSE;
6494
6495 return TRUE;
6496 }
6497
6498 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6499
6500 FIXME: We used to have code here to sort the PT_LOAD segments into
6501 ascending order, as per the ELF spec. But this breaks some programs,
6502 including the Linux kernel. But really either the spec should be
6503 changed or the programs updated. */
6504
6505 bfd_boolean
6506 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6507 {
6508 if (link_info != NULL && bfd_link_pie (link_info))
6509 {
6510 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6511 unsigned int num_segments = i_ehdrp->e_phnum;
6512 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6513 Elf_Internal_Phdr *segment = tdata->phdr;
6514 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6515
6516 /* Find the lowest p_vaddr in PT_LOAD segments. */
6517 bfd_vma p_vaddr = (bfd_vma) -1;
6518 for (; segment < end_segment; segment++)
6519 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6520 p_vaddr = segment->p_vaddr;
6521
6522 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6523 segments is non-zero. */
6524 if (p_vaddr)
6525 i_ehdrp->e_type = ET_EXEC;
6526 }
6527 return TRUE;
6528 }
6529
6530 /* Assign file positions for all the reloc sections which are not part
6531 of the loadable file image, and the file position of section headers. */
6532
6533 static bfd_boolean
6534 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6535 {
6536 file_ptr off;
6537 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6538 Elf_Internal_Shdr *shdrp;
6539 Elf_Internal_Ehdr *i_ehdrp;
6540 const struct elf_backend_data *bed;
6541
6542 off = elf_next_file_pos (abfd);
6543
6544 shdrpp = elf_elfsections (abfd);
6545 end_shdrpp = shdrpp + elf_numsections (abfd);
6546 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6547 {
6548 shdrp = *shdrpp;
6549 if (shdrp->sh_offset == -1)
6550 {
6551 asection *sec = shdrp->bfd_section;
6552 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6553 || shdrp->sh_type == SHT_RELA);
6554 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6555 if (is_rel
6556 || is_ctf
6557 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6558 {
6559 if (!is_rel && !is_ctf)
6560 {
6561 const char *name = sec->name;
6562 struct bfd_elf_section_data *d;
6563
6564 /* Compress DWARF debug sections. */
6565 if (!bfd_compress_section (abfd, sec,
6566 shdrp->contents))
6567 return FALSE;
6568
6569 if (sec->compress_status == COMPRESS_SECTION_DONE
6570 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6571 {
6572 /* If section is compressed with zlib-gnu, convert
6573 section name from .debug_* to .zdebug_*. */
6574 char *new_name
6575 = convert_debug_to_zdebug (abfd, name);
6576 if (new_name == NULL)
6577 return FALSE;
6578 name = new_name;
6579 }
6580 /* Add section name to section name section. */
6581 if (shdrp->sh_name != (unsigned int) -1)
6582 abort ();
6583 shdrp->sh_name
6584 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6585 name, FALSE);
6586 d = elf_section_data (sec);
6587
6588 /* Add reloc section name to section name section. */
6589 if (d->rel.hdr
6590 && !_bfd_elf_set_reloc_sh_name (abfd,
6591 d->rel.hdr,
6592 name, FALSE))
6593 return FALSE;
6594 if (d->rela.hdr
6595 && !_bfd_elf_set_reloc_sh_name (abfd,
6596 d->rela.hdr,
6597 name, TRUE))
6598 return FALSE;
6599
6600 /* Update section size and contents. */
6601 shdrp->sh_size = sec->size;
6602 shdrp->contents = sec->contents;
6603 shdrp->bfd_section->contents = NULL;
6604 }
6605 else if (is_ctf)
6606 {
6607 /* Update section size and contents. */
6608 shdrp->sh_size = sec->size;
6609 shdrp->contents = sec->contents;
6610 }
6611
6612 off = _bfd_elf_assign_file_position_for_section (shdrp,
6613 off,
6614 TRUE);
6615 }
6616 }
6617 }
6618
6619 /* Place section name section after DWARF debug sections have been
6620 compressed. */
6621 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6622 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6623 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6624 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6625
6626 /* Place the section headers. */
6627 i_ehdrp = elf_elfheader (abfd);
6628 bed = get_elf_backend_data (abfd);
6629 off = align_file_position (off, 1 << bed->s->log_file_align);
6630 i_ehdrp->e_shoff = off;
6631 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6632 elf_next_file_pos (abfd) = off;
6633
6634 return TRUE;
6635 }
6636
6637 bfd_boolean
6638 _bfd_elf_write_object_contents (bfd *abfd)
6639 {
6640 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6641 Elf_Internal_Shdr **i_shdrp;
6642 bfd_boolean failed;
6643 unsigned int count, num_sec;
6644 struct elf_obj_tdata *t;
6645
6646 if (! abfd->output_has_begun
6647 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6648 return FALSE;
6649 /* Do not rewrite ELF data when the BFD has been opened for update.
6650 abfd->output_has_begun was set to TRUE on opening, so creation of new
6651 sections, and modification of existing section sizes was restricted.
6652 This means the ELF header, program headers and section headers can't have
6653 changed.
6654 If the contents of any sections has been modified, then those changes have
6655 already been written to the BFD. */
6656 else if (abfd->direction == both_direction)
6657 {
6658 BFD_ASSERT (abfd->output_has_begun);
6659 return TRUE;
6660 }
6661
6662 i_shdrp = elf_elfsections (abfd);
6663
6664 failed = FALSE;
6665 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6666 if (failed)
6667 return FALSE;
6668
6669 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6670 return FALSE;
6671
6672 /* After writing the headers, we need to write the sections too... */
6673 num_sec = elf_numsections (abfd);
6674 for (count = 1; count < num_sec; count++)
6675 {
6676 i_shdrp[count]->sh_name
6677 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6678 i_shdrp[count]->sh_name);
6679 if (bed->elf_backend_section_processing)
6680 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6681 return FALSE;
6682 if (i_shdrp[count]->contents)
6683 {
6684 bfd_size_type amt = i_shdrp[count]->sh_size;
6685
6686 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6687 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6688 return FALSE;
6689 }
6690 }
6691
6692 /* Write out the section header names. */
6693 t = elf_tdata (abfd);
6694 if (elf_shstrtab (abfd) != NULL
6695 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6696 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6697 return FALSE;
6698
6699 if (!(*bed->elf_backend_final_write_processing) (abfd))
6700 return FALSE;
6701
6702 if (!bed->s->write_shdrs_and_ehdr (abfd))
6703 return FALSE;
6704
6705 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6706 if (t->o->build_id.after_write_object_contents != NULL)
6707 return (*t->o->build_id.after_write_object_contents) (abfd);
6708
6709 return TRUE;
6710 }
6711
6712 bfd_boolean
6713 _bfd_elf_write_corefile_contents (bfd *abfd)
6714 {
6715 /* Hopefully this can be done just like an object file. */
6716 return _bfd_elf_write_object_contents (abfd);
6717 }
6718
6719 /* Given a section, search the header to find them. */
6720
6721 unsigned int
6722 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6723 {
6724 const struct elf_backend_data *bed;
6725 unsigned int sec_index;
6726
6727 if (elf_section_data (asect) != NULL
6728 && elf_section_data (asect)->this_idx != 0)
6729 return elf_section_data (asect)->this_idx;
6730
6731 if (bfd_is_abs_section (asect))
6732 sec_index = SHN_ABS;
6733 else if (bfd_is_com_section (asect))
6734 sec_index = SHN_COMMON;
6735 else if (bfd_is_und_section (asect))
6736 sec_index = SHN_UNDEF;
6737 else
6738 sec_index = SHN_BAD;
6739
6740 bed = get_elf_backend_data (abfd);
6741 if (bed->elf_backend_section_from_bfd_section)
6742 {
6743 int retval = sec_index;
6744
6745 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6746 return retval;
6747 }
6748
6749 if (sec_index == SHN_BAD)
6750 bfd_set_error (bfd_error_nonrepresentable_section);
6751
6752 return sec_index;
6753 }
6754
6755 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6756 on error. */
6757
6758 int
6759 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6760 {
6761 asymbol *asym_ptr = *asym_ptr_ptr;
6762 int idx;
6763 flagword flags = asym_ptr->flags;
6764
6765 /* When gas creates relocations against local labels, it creates its
6766 own symbol for the section, but does put the symbol into the
6767 symbol chain, so udata is 0. When the linker is generating
6768 relocatable output, this section symbol may be for one of the
6769 input sections rather than the output section. */
6770 if (asym_ptr->udata.i == 0
6771 && (flags & BSF_SECTION_SYM)
6772 && asym_ptr->section)
6773 {
6774 asection *sec;
6775 int indx;
6776
6777 sec = asym_ptr->section;
6778 if (sec->owner != abfd && sec->output_section != NULL)
6779 sec = sec->output_section;
6780 if (sec->owner == abfd
6781 && (indx = sec->index) < elf_num_section_syms (abfd)
6782 && elf_section_syms (abfd)[indx] != NULL)
6783 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6784 }
6785
6786 idx = asym_ptr->udata.i;
6787
6788 if (idx == 0)
6789 {
6790 /* This case can occur when using --strip-symbol on a symbol
6791 which is used in a relocation entry. */
6792 _bfd_error_handler
6793 /* xgettext:c-format */
6794 (_("%pB: symbol `%s' required but not present"),
6795 abfd, bfd_asymbol_name (asym_ptr));
6796 bfd_set_error (bfd_error_no_symbols);
6797 return -1;
6798 }
6799
6800 #if DEBUG & 4
6801 {
6802 fprintf (stderr,
6803 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6804 (long) asym_ptr, asym_ptr->name, idx, flags);
6805 fflush (stderr);
6806 }
6807 #endif
6808
6809 return idx;
6810 }
6811
6812 /* Rewrite program header information. */
6813
6814 static bfd_boolean
6815 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6816 {
6817 Elf_Internal_Ehdr *iehdr;
6818 struct elf_segment_map *map;
6819 struct elf_segment_map *map_first;
6820 struct elf_segment_map **pointer_to_map;
6821 Elf_Internal_Phdr *segment;
6822 asection *section;
6823 unsigned int i;
6824 unsigned int num_segments;
6825 bfd_boolean phdr_included = FALSE;
6826 bfd_boolean p_paddr_valid;
6827 bfd_vma maxpagesize;
6828 struct elf_segment_map *phdr_adjust_seg = NULL;
6829 unsigned int phdr_adjust_num = 0;
6830 const struct elf_backend_data *bed;
6831 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
6832
6833 bed = get_elf_backend_data (ibfd);
6834 iehdr = elf_elfheader (ibfd);
6835
6836 map_first = NULL;
6837 pointer_to_map = &map_first;
6838
6839 num_segments = elf_elfheader (ibfd)->e_phnum;
6840 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6841
6842 /* Returns the end address of the segment + 1. */
6843 #define SEGMENT_END(segment, start) \
6844 (start + (segment->p_memsz > segment->p_filesz \
6845 ? segment->p_memsz : segment->p_filesz))
6846
6847 #define SECTION_SIZE(section, segment) \
6848 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6849 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6850 ? section->size : 0)
6851
6852 /* Returns TRUE if the given section is contained within
6853 the given segment. VMA addresses are compared. */
6854 #define IS_CONTAINED_BY_VMA(section, segment, opb) \
6855 (section->vma * (opb) >= segment->p_vaddr \
6856 && (section->vma * (opb) + SECTION_SIZE (section, segment) \
6857 <= (SEGMENT_END (segment, segment->p_vaddr))))
6858
6859 /* Returns TRUE if the given section is contained within
6860 the given segment. LMA addresses are compared. */
6861 #define IS_CONTAINED_BY_LMA(section, segment, base, opb) \
6862 (section->lma * (opb) >= base \
6863 && (section->lma + SECTION_SIZE (section, segment) / (opb) >= section->lma) \
6864 && (section->lma * (opb) + SECTION_SIZE (section, segment) \
6865 <= SEGMENT_END (segment, base)))
6866
6867 /* Handle PT_NOTE segment. */
6868 #define IS_NOTE(p, s) \
6869 (p->p_type == PT_NOTE \
6870 && elf_section_type (s) == SHT_NOTE \
6871 && (bfd_vma) s->filepos >= p->p_offset \
6872 && ((bfd_vma) s->filepos + s->size \
6873 <= p->p_offset + p->p_filesz))
6874
6875 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6876 etc. */
6877 #define IS_COREFILE_NOTE(p, s) \
6878 (IS_NOTE (p, s) \
6879 && bfd_get_format (ibfd) == bfd_core \
6880 && s->vma == 0 \
6881 && s->lma == 0)
6882
6883 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6884 linker, which generates a PT_INTERP section with p_vaddr and
6885 p_memsz set to 0. */
6886 #define IS_SOLARIS_PT_INTERP(p, s) \
6887 (p->p_vaddr == 0 \
6888 && p->p_paddr == 0 \
6889 && p->p_memsz == 0 \
6890 && p->p_filesz > 0 \
6891 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6892 && s->size > 0 \
6893 && (bfd_vma) s->filepos >= p->p_offset \
6894 && ((bfd_vma) s->filepos + s->size \
6895 <= p->p_offset + p->p_filesz))
6896
6897 /* Decide if the given section should be included in the given segment.
6898 A section will be included if:
6899 1. It is within the address space of the segment -- we use the LMA
6900 if that is set for the segment and the VMA otherwise,
6901 2. It is an allocated section or a NOTE section in a PT_NOTE
6902 segment.
6903 3. There is an output section associated with it,
6904 4. The section has not already been allocated to a previous segment.
6905 5. PT_GNU_STACK segments do not include any sections.
6906 6. PT_TLS segment includes only SHF_TLS sections.
6907 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6908 8. PT_DYNAMIC should not contain empty sections at the beginning
6909 (with the possible exception of .dynamic). */
6910 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6911 ((((segment->p_paddr \
6912 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr, opb) \
6913 : IS_CONTAINED_BY_VMA (section, segment, opb)) \
6914 && (section->flags & SEC_ALLOC) != 0) \
6915 || IS_NOTE (segment, section)) \
6916 && segment->p_type != PT_GNU_STACK \
6917 && (segment->p_type != PT_TLS \
6918 || (section->flags & SEC_THREAD_LOCAL)) \
6919 && (segment->p_type == PT_LOAD \
6920 || segment->p_type == PT_TLS \
6921 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6922 && (segment->p_type != PT_DYNAMIC \
6923 || SECTION_SIZE (section, segment) > 0 \
6924 || (segment->p_paddr \
6925 ? segment->p_paddr != section->lma * (opb) \
6926 : segment->p_vaddr != section->vma * (opb)) \
6927 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6928 && (segment->p_type != PT_LOAD || !section->segment_mark))
6929
6930 /* If the output section of a section in the input segment is NULL,
6931 it is removed from the corresponding output segment. */
6932 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
6933 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
6934 && section->output_section != NULL)
6935
6936 /* Returns TRUE iff seg1 starts after the end of seg2. */
6937 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6938 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6939
6940 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6941 their VMA address ranges and their LMA address ranges overlap.
6942 It is possible to have overlapping VMA ranges without overlapping LMA
6943 ranges. RedBoot images for example can have both .data and .bss mapped
6944 to the same VMA range, but with the .data section mapped to a different
6945 LMA. */
6946 #define SEGMENT_OVERLAPS(seg1, seg2) \
6947 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6948 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6949 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6950 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6951
6952 /* Initialise the segment mark field. */
6953 for (section = ibfd->sections; section != NULL; section = section->next)
6954 section->segment_mark = FALSE;
6955
6956 /* The Solaris linker creates program headers in which all the
6957 p_paddr fields are zero. When we try to objcopy or strip such a
6958 file, we get confused. Check for this case, and if we find it
6959 don't set the p_paddr_valid fields. */
6960 p_paddr_valid = FALSE;
6961 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6962 i < num_segments;
6963 i++, segment++)
6964 if (segment->p_paddr != 0)
6965 {
6966 p_paddr_valid = TRUE;
6967 break;
6968 }
6969
6970 /* Scan through the segments specified in the program header
6971 of the input BFD. For this first scan we look for overlaps
6972 in the loadable segments. These can be created by weird
6973 parameters to objcopy. Also, fix some solaris weirdness. */
6974 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6975 i < num_segments;
6976 i++, segment++)
6977 {
6978 unsigned int j;
6979 Elf_Internal_Phdr *segment2;
6980
6981 if (segment->p_type == PT_INTERP)
6982 for (section = ibfd->sections; section; section = section->next)
6983 if (IS_SOLARIS_PT_INTERP (segment, section))
6984 {
6985 /* Mininal change so that the normal section to segment
6986 assignment code will work. */
6987 segment->p_vaddr = section->vma * opb;
6988 break;
6989 }
6990
6991 if (segment->p_type != PT_LOAD)
6992 {
6993 /* Remove PT_GNU_RELRO segment. */
6994 if (segment->p_type == PT_GNU_RELRO)
6995 segment->p_type = PT_NULL;
6996 continue;
6997 }
6998
6999 /* Determine if this segment overlaps any previous segments. */
7000 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
7001 {
7002 bfd_signed_vma extra_length;
7003
7004 if (segment2->p_type != PT_LOAD
7005 || !SEGMENT_OVERLAPS (segment, segment2))
7006 continue;
7007
7008 /* Merge the two segments together. */
7009 if (segment2->p_vaddr < segment->p_vaddr)
7010 {
7011 /* Extend SEGMENT2 to include SEGMENT and then delete
7012 SEGMENT. */
7013 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
7014 - SEGMENT_END (segment2, segment2->p_vaddr));
7015
7016 if (extra_length > 0)
7017 {
7018 segment2->p_memsz += extra_length;
7019 segment2->p_filesz += extra_length;
7020 }
7021
7022 segment->p_type = PT_NULL;
7023
7024 /* Since we have deleted P we must restart the outer loop. */
7025 i = 0;
7026 segment = elf_tdata (ibfd)->phdr;
7027 break;
7028 }
7029 else
7030 {
7031 /* Extend SEGMENT to include SEGMENT2 and then delete
7032 SEGMENT2. */
7033 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
7034 - SEGMENT_END (segment, segment->p_vaddr));
7035
7036 if (extra_length > 0)
7037 {
7038 segment->p_memsz += extra_length;
7039 segment->p_filesz += extra_length;
7040 }
7041
7042 segment2->p_type = PT_NULL;
7043 }
7044 }
7045 }
7046
7047 /* The second scan attempts to assign sections to segments. */
7048 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7049 i < num_segments;
7050 i++, segment++)
7051 {
7052 unsigned int section_count;
7053 asection **sections;
7054 asection *output_section;
7055 unsigned int isec;
7056 asection *matching_lma;
7057 asection *suggested_lma;
7058 unsigned int j;
7059 size_t amt;
7060 asection *first_section;
7061
7062 if (segment->p_type == PT_NULL)
7063 continue;
7064
7065 first_section = NULL;
7066 /* Compute how many sections might be placed into this segment. */
7067 for (section = ibfd->sections, section_count = 0;
7068 section != NULL;
7069 section = section->next)
7070 {
7071 /* Find the first section in the input segment, which may be
7072 removed from the corresponding output segment. */
7073 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb))
7074 {
7075 if (first_section == NULL)
7076 first_section = section;
7077 if (section->output_section != NULL)
7078 ++section_count;
7079 }
7080 }
7081
7082 /* Allocate a segment map big enough to contain
7083 all of the sections we have selected. */
7084 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7085 amt += section_count * sizeof (asection *);
7086 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7087 if (map == NULL)
7088 return FALSE;
7089
7090 /* Initialise the fields of the segment map. Default to
7091 using the physical address of the segment in the input BFD. */
7092 map->next = NULL;
7093 map->p_type = segment->p_type;
7094 map->p_flags = segment->p_flags;
7095 map->p_flags_valid = 1;
7096
7097 /* If the first section in the input segment is removed, there is
7098 no need to preserve segment physical address in the corresponding
7099 output segment. */
7100 if (!first_section || first_section->output_section != NULL)
7101 {
7102 map->p_paddr = segment->p_paddr;
7103 map->p_paddr_valid = p_paddr_valid;
7104 }
7105
7106 /* Determine if this segment contains the ELF file header
7107 and if it contains the program headers themselves. */
7108 map->includes_filehdr = (segment->p_offset == 0
7109 && segment->p_filesz >= iehdr->e_ehsize);
7110 map->includes_phdrs = 0;
7111
7112 if (!phdr_included || segment->p_type != PT_LOAD)
7113 {
7114 map->includes_phdrs =
7115 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7116 && (segment->p_offset + segment->p_filesz
7117 >= ((bfd_vma) iehdr->e_phoff
7118 + iehdr->e_phnum * iehdr->e_phentsize)));
7119
7120 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7121 phdr_included = TRUE;
7122 }
7123
7124 if (section_count == 0)
7125 {
7126 /* Special segments, such as the PT_PHDR segment, may contain
7127 no sections, but ordinary, loadable segments should contain
7128 something. They are allowed by the ELF spec however, so only
7129 a warning is produced.
7130 There is however the valid use case of embedded systems which
7131 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7132 flash memory with zeros. No warning is shown for that case. */
7133 if (segment->p_type == PT_LOAD
7134 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7135 /* xgettext:c-format */
7136 _bfd_error_handler
7137 (_("%pB: warning: empty loadable segment detected"
7138 " at vaddr=%#" PRIx64 ", is this intentional?"),
7139 ibfd, (uint64_t) segment->p_vaddr);
7140
7141 map->p_vaddr_offset = segment->p_vaddr / opb;
7142 map->count = 0;
7143 *pointer_to_map = map;
7144 pointer_to_map = &map->next;
7145
7146 continue;
7147 }
7148
7149 /* Now scan the sections in the input BFD again and attempt
7150 to add their corresponding output sections to the segment map.
7151 The problem here is how to handle an output section which has
7152 been moved (ie had its LMA changed). There are four possibilities:
7153
7154 1. None of the sections have been moved.
7155 In this case we can continue to use the segment LMA from the
7156 input BFD.
7157
7158 2. All of the sections have been moved by the same amount.
7159 In this case we can change the segment's LMA to match the LMA
7160 of the first section.
7161
7162 3. Some of the sections have been moved, others have not.
7163 In this case those sections which have not been moved can be
7164 placed in the current segment which will have to have its size,
7165 and possibly its LMA changed, and a new segment or segments will
7166 have to be created to contain the other sections.
7167
7168 4. The sections have been moved, but not by the same amount.
7169 In this case we can change the segment's LMA to match the LMA
7170 of the first section and we will have to create a new segment
7171 or segments to contain the other sections.
7172
7173 In order to save time, we allocate an array to hold the section
7174 pointers that we are interested in. As these sections get assigned
7175 to a segment, they are removed from this array. */
7176
7177 amt = section_count * sizeof (asection *);
7178 sections = (asection **) bfd_malloc (amt);
7179 if (sections == NULL)
7180 return FALSE;
7181
7182 /* Step One: Scan for segment vs section LMA conflicts.
7183 Also add the sections to the section array allocated above.
7184 Also add the sections to the current segment. In the common
7185 case, where the sections have not been moved, this means that
7186 we have completely filled the segment, and there is nothing
7187 more to do. */
7188 isec = 0;
7189 matching_lma = NULL;
7190 suggested_lma = NULL;
7191
7192 for (section = first_section, j = 0;
7193 section != NULL;
7194 section = section->next)
7195 {
7196 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed, opb))
7197 {
7198 output_section = section->output_section;
7199
7200 sections[j++] = section;
7201
7202 /* The Solaris native linker always sets p_paddr to 0.
7203 We try to catch that case here, and set it to the
7204 correct value. Note - some backends require that
7205 p_paddr be left as zero. */
7206 if (!p_paddr_valid
7207 && segment->p_vaddr != 0
7208 && !bed->want_p_paddr_set_to_zero
7209 && isec == 0
7210 && output_section->lma != 0
7211 && (align_power (segment->p_vaddr
7212 + (map->includes_filehdr
7213 ? iehdr->e_ehsize : 0)
7214 + (map->includes_phdrs
7215 ? iehdr->e_phnum * iehdr->e_phentsize
7216 : 0),
7217 output_section->alignment_power * opb)
7218 == (output_section->vma * opb)))
7219 map->p_paddr = segment->p_vaddr;
7220
7221 /* Match up the physical address of the segment with the
7222 LMA address of the output section. */
7223 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7224 opb)
7225 || IS_COREFILE_NOTE (segment, section)
7226 || (bed->want_p_paddr_set_to_zero
7227 && IS_CONTAINED_BY_VMA (output_section, segment, opb)))
7228 {
7229 if (matching_lma == NULL
7230 || output_section->lma < matching_lma->lma)
7231 matching_lma = output_section;
7232
7233 /* We assume that if the section fits within the segment
7234 then it does not overlap any other section within that
7235 segment. */
7236 map->sections[isec++] = output_section;
7237 }
7238 else if (suggested_lma == NULL)
7239 suggested_lma = output_section;
7240
7241 if (j == section_count)
7242 break;
7243 }
7244 }
7245
7246 BFD_ASSERT (j == section_count);
7247
7248 /* Step Two: Adjust the physical address of the current segment,
7249 if necessary. */
7250 if (isec == section_count)
7251 {
7252 /* All of the sections fitted within the segment as currently
7253 specified. This is the default case. Add the segment to
7254 the list of built segments and carry on to process the next
7255 program header in the input BFD. */
7256 map->count = section_count;
7257 *pointer_to_map = map;
7258 pointer_to_map = &map->next;
7259
7260 if (p_paddr_valid
7261 && !bed->want_p_paddr_set_to_zero)
7262 {
7263 bfd_vma hdr_size = 0;
7264 if (map->includes_filehdr)
7265 hdr_size = iehdr->e_ehsize;
7266 if (map->includes_phdrs)
7267 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7268
7269 /* Account for padding before the first section in the
7270 segment. */
7271 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7272 - matching_lma->lma);
7273 }
7274
7275 free (sections);
7276 continue;
7277 }
7278 else
7279 {
7280 /* Change the current segment's physical address to match
7281 the LMA of the first section that fitted, or if no
7282 section fitted, the first section. */
7283 if (matching_lma == NULL)
7284 matching_lma = suggested_lma;
7285
7286 map->p_paddr = matching_lma->lma * opb;
7287
7288 /* Offset the segment physical address from the lma
7289 to allow for space taken up by elf headers. */
7290 if (map->includes_phdrs)
7291 {
7292 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7293
7294 /* iehdr->e_phnum is just an estimate of the number
7295 of program headers that we will need. Make a note
7296 here of the number we used and the segment we chose
7297 to hold these headers, so that we can adjust the
7298 offset when we know the correct value. */
7299 phdr_adjust_num = iehdr->e_phnum;
7300 phdr_adjust_seg = map;
7301 }
7302
7303 if (map->includes_filehdr)
7304 {
7305 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7306 map->p_paddr -= iehdr->e_ehsize;
7307 /* We've subtracted off the size of headers from the
7308 first section lma, but there may have been some
7309 alignment padding before that section too. Try to
7310 account for that by adjusting the segment lma down to
7311 the same alignment. */
7312 if (segment->p_align != 0 && segment->p_align < align)
7313 align = segment->p_align;
7314 map->p_paddr &= -(align * opb);
7315 }
7316 }
7317
7318 /* Step Three: Loop over the sections again, this time assigning
7319 those that fit to the current segment and removing them from the
7320 sections array; but making sure not to leave large gaps. Once all
7321 possible sections have been assigned to the current segment it is
7322 added to the list of built segments and if sections still remain
7323 to be assigned, a new segment is constructed before repeating
7324 the loop. */
7325 isec = 0;
7326 do
7327 {
7328 map->count = 0;
7329 suggested_lma = NULL;
7330
7331 /* Fill the current segment with sections that fit. */
7332 for (j = 0; j < section_count; j++)
7333 {
7334 section = sections[j];
7335
7336 if (section == NULL)
7337 continue;
7338
7339 output_section = section->output_section;
7340
7341 BFD_ASSERT (output_section != NULL);
7342
7343 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7344 opb)
7345 || IS_COREFILE_NOTE (segment, section))
7346 {
7347 if (map->count == 0)
7348 {
7349 /* If the first section in a segment does not start at
7350 the beginning of the segment, then something is
7351 wrong. */
7352 if (align_power (map->p_paddr
7353 + (map->includes_filehdr
7354 ? iehdr->e_ehsize : 0)
7355 + (map->includes_phdrs
7356 ? iehdr->e_phnum * iehdr->e_phentsize
7357 : 0),
7358 output_section->alignment_power * opb)
7359 != output_section->lma * opb)
7360 goto sorry;
7361 }
7362 else
7363 {
7364 asection *prev_sec;
7365
7366 prev_sec = map->sections[map->count - 1];
7367
7368 /* If the gap between the end of the previous section
7369 and the start of this section is more than
7370 maxpagesize then we need to start a new segment. */
7371 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7372 maxpagesize)
7373 < BFD_ALIGN (output_section->lma, maxpagesize))
7374 || (prev_sec->lma + prev_sec->size
7375 > output_section->lma))
7376 {
7377 if (suggested_lma == NULL)
7378 suggested_lma = output_section;
7379
7380 continue;
7381 }
7382 }
7383
7384 map->sections[map->count++] = output_section;
7385 ++isec;
7386 sections[j] = NULL;
7387 if (segment->p_type == PT_LOAD)
7388 section->segment_mark = TRUE;
7389 }
7390 else if (suggested_lma == NULL)
7391 suggested_lma = output_section;
7392 }
7393
7394 /* PR 23932. A corrupt input file may contain sections that cannot
7395 be assigned to any segment - because for example they have a
7396 negative size - or segments that do not contain any sections.
7397 But there are also valid reasons why a segment can be empty.
7398 So allow a count of zero. */
7399
7400 /* Add the current segment to the list of built segments. */
7401 *pointer_to_map = map;
7402 pointer_to_map = &map->next;
7403
7404 if (isec < section_count)
7405 {
7406 /* We still have not allocated all of the sections to
7407 segments. Create a new segment here, initialise it
7408 and carry on looping. */
7409 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7410 amt += section_count * sizeof (asection *);
7411 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7412 if (map == NULL)
7413 {
7414 free (sections);
7415 return FALSE;
7416 }
7417
7418 /* Initialise the fields of the segment map. Set the physical
7419 physical address to the LMA of the first section that has
7420 not yet been assigned. */
7421 map->next = NULL;
7422 map->p_type = segment->p_type;
7423 map->p_flags = segment->p_flags;
7424 map->p_flags_valid = 1;
7425 map->p_paddr = suggested_lma->lma * opb;
7426 map->p_paddr_valid = p_paddr_valid;
7427 map->includes_filehdr = 0;
7428 map->includes_phdrs = 0;
7429 }
7430
7431 continue;
7432 sorry:
7433 bfd_set_error (bfd_error_sorry);
7434 free (sections);
7435 return FALSE;
7436 }
7437 while (isec < section_count);
7438
7439 free (sections);
7440 }
7441
7442 elf_seg_map (obfd) = map_first;
7443
7444 /* If we had to estimate the number of program headers that were
7445 going to be needed, then check our estimate now and adjust
7446 the offset if necessary. */
7447 if (phdr_adjust_seg != NULL)
7448 {
7449 unsigned int count;
7450
7451 for (count = 0, map = map_first; map != NULL; map = map->next)
7452 count++;
7453
7454 if (count > phdr_adjust_num)
7455 phdr_adjust_seg->p_paddr
7456 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7457
7458 for (map = map_first; map != NULL; map = map->next)
7459 if (map->p_type == PT_PHDR)
7460 {
7461 bfd_vma adjust
7462 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7463 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7464 break;
7465 }
7466 }
7467
7468 #undef SEGMENT_END
7469 #undef SECTION_SIZE
7470 #undef IS_CONTAINED_BY_VMA
7471 #undef IS_CONTAINED_BY_LMA
7472 #undef IS_NOTE
7473 #undef IS_COREFILE_NOTE
7474 #undef IS_SOLARIS_PT_INTERP
7475 #undef IS_SECTION_IN_INPUT_SEGMENT
7476 #undef INCLUDE_SECTION_IN_SEGMENT
7477 #undef SEGMENT_AFTER_SEGMENT
7478 #undef SEGMENT_OVERLAPS
7479 return TRUE;
7480 }
7481
7482 /* Copy ELF program header information. */
7483
7484 static bfd_boolean
7485 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7486 {
7487 Elf_Internal_Ehdr *iehdr;
7488 struct elf_segment_map *map;
7489 struct elf_segment_map *map_first;
7490 struct elf_segment_map **pointer_to_map;
7491 Elf_Internal_Phdr *segment;
7492 unsigned int i;
7493 unsigned int num_segments;
7494 bfd_boolean phdr_included = FALSE;
7495 bfd_boolean p_paddr_valid;
7496 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
7497
7498 iehdr = elf_elfheader (ibfd);
7499
7500 map_first = NULL;
7501 pointer_to_map = &map_first;
7502
7503 /* If all the segment p_paddr fields are zero, don't set
7504 map->p_paddr_valid. */
7505 p_paddr_valid = FALSE;
7506 num_segments = elf_elfheader (ibfd)->e_phnum;
7507 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7508 i < num_segments;
7509 i++, segment++)
7510 if (segment->p_paddr != 0)
7511 {
7512 p_paddr_valid = TRUE;
7513 break;
7514 }
7515
7516 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7517 i < num_segments;
7518 i++, segment++)
7519 {
7520 asection *section;
7521 unsigned int section_count;
7522 size_t amt;
7523 Elf_Internal_Shdr *this_hdr;
7524 asection *first_section = NULL;
7525 asection *lowest_section;
7526
7527 /* Compute how many sections are in this segment. */
7528 for (section = ibfd->sections, section_count = 0;
7529 section != NULL;
7530 section = section->next)
7531 {
7532 this_hdr = &(elf_section_data(section)->this_hdr);
7533 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7534 {
7535 if (first_section == NULL)
7536 first_section = section;
7537 section_count++;
7538 }
7539 }
7540
7541 /* Allocate a segment map big enough to contain
7542 all of the sections we have selected. */
7543 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7544 amt += section_count * sizeof (asection *);
7545 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7546 if (map == NULL)
7547 return FALSE;
7548
7549 /* Initialize the fields of the output segment map with the
7550 input segment. */
7551 map->next = NULL;
7552 map->p_type = segment->p_type;
7553 map->p_flags = segment->p_flags;
7554 map->p_flags_valid = 1;
7555 map->p_paddr = segment->p_paddr;
7556 map->p_paddr_valid = p_paddr_valid;
7557 map->p_align = segment->p_align;
7558 map->p_align_valid = 1;
7559 map->p_vaddr_offset = 0;
7560
7561 if (map->p_type == PT_GNU_RELRO
7562 || map->p_type == PT_GNU_STACK)
7563 {
7564 /* The PT_GNU_RELRO segment may contain the first a few
7565 bytes in the .got.plt section even if the whole .got.plt
7566 section isn't in the PT_GNU_RELRO segment. We won't
7567 change the size of the PT_GNU_RELRO segment.
7568 Similarly, PT_GNU_STACK size is significant on uclinux
7569 systems. */
7570 map->p_size = segment->p_memsz;
7571 map->p_size_valid = 1;
7572 }
7573
7574 /* Determine if this segment contains the ELF file header
7575 and if it contains the program headers themselves. */
7576 map->includes_filehdr = (segment->p_offset == 0
7577 && segment->p_filesz >= iehdr->e_ehsize);
7578
7579 map->includes_phdrs = 0;
7580 if (! phdr_included || segment->p_type != PT_LOAD)
7581 {
7582 map->includes_phdrs =
7583 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7584 && (segment->p_offset + segment->p_filesz
7585 >= ((bfd_vma) iehdr->e_phoff
7586 + iehdr->e_phnum * iehdr->e_phentsize)));
7587
7588 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7589 phdr_included = TRUE;
7590 }
7591
7592 lowest_section = NULL;
7593 if (section_count != 0)
7594 {
7595 unsigned int isec = 0;
7596
7597 for (section = first_section;
7598 section != NULL;
7599 section = section->next)
7600 {
7601 this_hdr = &(elf_section_data(section)->this_hdr);
7602 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7603 {
7604 map->sections[isec++] = section->output_section;
7605 if ((section->flags & SEC_ALLOC) != 0)
7606 {
7607 bfd_vma seg_off;
7608
7609 if (lowest_section == NULL
7610 || section->lma < lowest_section->lma)
7611 lowest_section = section;
7612
7613 /* Section lmas are set up from PT_LOAD header
7614 p_paddr in _bfd_elf_make_section_from_shdr.
7615 If this header has a p_paddr that disagrees
7616 with the section lma, flag the p_paddr as
7617 invalid. */
7618 if ((section->flags & SEC_LOAD) != 0)
7619 seg_off = this_hdr->sh_offset - segment->p_offset;
7620 else
7621 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7622 if (section->lma * opb - segment->p_paddr != seg_off)
7623 map->p_paddr_valid = FALSE;
7624 }
7625 if (isec == section_count)
7626 break;
7627 }
7628 }
7629 }
7630
7631 if (section_count == 0)
7632 map->p_vaddr_offset = segment->p_vaddr / opb;
7633 else if (map->p_paddr_valid)
7634 {
7635 /* Account for padding before the first section in the segment. */
7636 bfd_vma hdr_size = 0;
7637 if (map->includes_filehdr)
7638 hdr_size = iehdr->e_ehsize;
7639 if (map->includes_phdrs)
7640 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7641
7642 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7643 - (lowest_section ? lowest_section->lma : 0));
7644 }
7645
7646 map->count = section_count;
7647 *pointer_to_map = map;
7648 pointer_to_map = &map->next;
7649 }
7650
7651 elf_seg_map (obfd) = map_first;
7652 return TRUE;
7653 }
7654
7655 /* Copy private BFD data. This copies or rewrites ELF program header
7656 information. */
7657
7658 static bfd_boolean
7659 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7660 {
7661 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7662 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7663 return TRUE;
7664
7665 if (elf_tdata (ibfd)->phdr == NULL)
7666 return TRUE;
7667
7668 if (ibfd->xvec == obfd->xvec)
7669 {
7670 /* Check to see if any sections in the input BFD
7671 covered by ELF program header have changed. */
7672 Elf_Internal_Phdr *segment;
7673 asection *section, *osec;
7674 unsigned int i, num_segments;
7675 Elf_Internal_Shdr *this_hdr;
7676 const struct elf_backend_data *bed;
7677
7678 bed = get_elf_backend_data (ibfd);
7679
7680 /* Regenerate the segment map if p_paddr is set to 0. */
7681 if (bed->want_p_paddr_set_to_zero)
7682 goto rewrite;
7683
7684 /* Initialize the segment mark field. */
7685 for (section = obfd->sections; section != NULL;
7686 section = section->next)
7687 section->segment_mark = FALSE;
7688
7689 num_segments = elf_elfheader (ibfd)->e_phnum;
7690 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7691 i < num_segments;
7692 i++, segment++)
7693 {
7694 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7695 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7696 which severly confuses things, so always regenerate the segment
7697 map in this case. */
7698 if (segment->p_paddr == 0
7699 && segment->p_memsz == 0
7700 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7701 goto rewrite;
7702
7703 for (section = ibfd->sections;
7704 section != NULL; section = section->next)
7705 {
7706 /* We mark the output section so that we know it comes
7707 from the input BFD. */
7708 osec = section->output_section;
7709 if (osec)
7710 osec->segment_mark = TRUE;
7711
7712 /* Check if this section is covered by the segment. */
7713 this_hdr = &(elf_section_data(section)->this_hdr);
7714 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7715 {
7716 /* FIXME: Check if its output section is changed or
7717 removed. What else do we need to check? */
7718 if (osec == NULL
7719 || section->flags != osec->flags
7720 || section->lma != osec->lma
7721 || section->vma != osec->vma
7722 || section->size != osec->size
7723 || section->rawsize != osec->rawsize
7724 || section->alignment_power != osec->alignment_power)
7725 goto rewrite;
7726 }
7727 }
7728 }
7729
7730 /* Check to see if any output section do not come from the
7731 input BFD. */
7732 for (section = obfd->sections; section != NULL;
7733 section = section->next)
7734 {
7735 if (!section->segment_mark)
7736 goto rewrite;
7737 else
7738 section->segment_mark = FALSE;
7739 }
7740
7741 return copy_elf_program_header (ibfd, obfd);
7742 }
7743
7744 rewrite:
7745 if (ibfd->xvec == obfd->xvec)
7746 {
7747 /* When rewriting program header, set the output maxpagesize to
7748 the maximum alignment of input PT_LOAD segments. */
7749 Elf_Internal_Phdr *segment;
7750 unsigned int i;
7751 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7752 bfd_vma maxpagesize = 0;
7753
7754 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7755 i < num_segments;
7756 i++, segment++)
7757 if (segment->p_type == PT_LOAD
7758 && maxpagesize < segment->p_align)
7759 {
7760 /* PR 17512: file: f17299af. */
7761 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7762 /* xgettext:c-format */
7763 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7764 PRIx64 " is too large"),
7765 ibfd, (uint64_t) segment->p_align);
7766 else
7767 maxpagesize = segment->p_align;
7768 }
7769
7770 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7771 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7772 }
7773
7774 return rewrite_elf_program_header (ibfd, obfd);
7775 }
7776
7777 /* Initialize private output section information from input section. */
7778
7779 bfd_boolean
7780 _bfd_elf_init_private_section_data (bfd *ibfd,
7781 asection *isec,
7782 bfd *obfd,
7783 asection *osec,
7784 struct bfd_link_info *link_info)
7785
7786 {
7787 Elf_Internal_Shdr *ihdr, *ohdr;
7788 bfd_boolean final_link = (link_info != NULL
7789 && !bfd_link_relocatable (link_info));
7790
7791 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7792 || obfd->xvec->flavour != bfd_target_elf_flavour)
7793 return TRUE;
7794
7795 BFD_ASSERT (elf_section_data (osec) != NULL);
7796
7797 /* If this is a known ABI section, ELF section type and flags may
7798 have been set up when OSEC was created. For normal sections we
7799 allow the user to override the type and flags other than
7800 SHF_MASKOS and SHF_MASKPROC. */
7801 if (elf_section_type (osec) == SHT_PROGBITS
7802 || elf_section_type (osec) == SHT_NOTE
7803 || elf_section_type (osec) == SHT_NOBITS)
7804 elf_section_type (osec) = SHT_NULL;
7805 /* For objcopy and relocatable link, copy the ELF section type from
7806 the input file if the BFD section flags are the same. (If they
7807 are different the user may be doing something like
7808 "objcopy --set-section-flags .text=alloc,data".) For a final
7809 link allow some flags that the linker clears to differ. */
7810 if (elf_section_type (osec) == SHT_NULL
7811 && (osec->flags == isec->flags
7812 || (final_link
7813 && ((osec->flags ^ isec->flags)
7814 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7815 elf_section_type (osec) = elf_section_type (isec);
7816
7817 /* FIXME: Is this correct for all OS/PROC specific flags? */
7818 elf_section_flags (osec) = (elf_section_flags (isec)
7819 & (SHF_MASKOS | SHF_MASKPROC));
7820
7821 /* Copy sh_info from input for mbind section. */
7822 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7823 && elf_section_flags (isec) & SHF_GNU_MBIND)
7824 elf_section_data (osec)->this_hdr.sh_info
7825 = elf_section_data (isec)->this_hdr.sh_info;
7826
7827 /* Set things up for objcopy and relocatable link. The output
7828 SHT_GROUP section will have its elf_next_in_group pointing back
7829 to the input group members. Ignore linker created group section.
7830 See elfNN_ia64_object_p in elfxx-ia64.c. */
7831 if ((link_info == NULL
7832 || !link_info->resolve_section_groups)
7833 && (elf_sec_group (isec) == NULL
7834 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7835 {
7836 if (elf_section_flags (isec) & SHF_GROUP)
7837 elf_section_flags (osec) |= SHF_GROUP;
7838 elf_next_in_group (osec) = elf_next_in_group (isec);
7839 elf_section_data (osec)->group = elf_section_data (isec)->group;
7840 }
7841
7842 /* If not decompress, preserve SHF_COMPRESSED. */
7843 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7844 elf_section_flags (osec) |= (elf_section_flags (isec)
7845 & SHF_COMPRESSED);
7846
7847 ihdr = &elf_section_data (isec)->this_hdr;
7848
7849 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7850 don't use the output section of the linked-to section since it
7851 may be NULL at this point. */
7852 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7853 {
7854 ohdr = &elf_section_data (osec)->this_hdr;
7855 ohdr->sh_flags |= SHF_LINK_ORDER;
7856 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7857 }
7858
7859 osec->use_rela_p = isec->use_rela_p;
7860
7861 return TRUE;
7862 }
7863
7864 /* Copy private section information. This copies over the entsize
7865 field, and sometimes the info field. */
7866
7867 bfd_boolean
7868 _bfd_elf_copy_private_section_data (bfd *ibfd,
7869 asection *isec,
7870 bfd *obfd,
7871 asection *osec)
7872 {
7873 Elf_Internal_Shdr *ihdr, *ohdr;
7874
7875 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7876 || obfd->xvec->flavour != bfd_target_elf_flavour)
7877 return TRUE;
7878
7879 ihdr = &elf_section_data (isec)->this_hdr;
7880 ohdr = &elf_section_data (osec)->this_hdr;
7881
7882 ohdr->sh_entsize = ihdr->sh_entsize;
7883
7884 if (ihdr->sh_type == SHT_SYMTAB
7885 || ihdr->sh_type == SHT_DYNSYM
7886 || ihdr->sh_type == SHT_GNU_verneed
7887 || ihdr->sh_type == SHT_GNU_verdef)
7888 ohdr->sh_info = ihdr->sh_info;
7889
7890 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7891 NULL);
7892 }
7893
7894 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7895 necessary if we are removing either the SHT_GROUP section or any of
7896 the group member sections. DISCARDED is the value that a section's
7897 output_section has if the section will be discarded, NULL when this
7898 function is called from objcopy, bfd_abs_section_ptr when called
7899 from the linker. */
7900
7901 bfd_boolean
7902 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7903 {
7904 asection *isec;
7905
7906 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7907 if (elf_section_type (isec) == SHT_GROUP)
7908 {
7909 asection *first = elf_next_in_group (isec);
7910 asection *s = first;
7911 bfd_size_type removed = 0;
7912
7913 while (s != NULL)
7914 {
7915 /* If this member section is being output but the
7916 SHT_GROUP section is not, then clear the group info
7917 set up by _bfd_elf_copy_private_section_data. */
7918 if (s->output_section != discarded
7919 && isec->output_section == discarded)
7920 {
7921 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7922 elf_group_name (s->output_section) = NULL;
7923 }
7924 /* Conversely, if the member section is not being output
7925 but the SHT_GROUP section is, then adjust its size. */
7926 else if (s->output_section == discarded
7927 && isec->output_section != discarded)
7928 {
7929 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7930 removed += 4;
7931 if (elf_sec->rel.hdr != NULL
7932 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7933 removed += 4;
7934 if (elf_sec->rela.hdr != NULL
7935 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7936 removed += 4;
7937 }
7938 s = elf_next_in_group (s);
7939 if (s == first)
7940 break;
7941 }
7942 if (removed != 0)
7943 {
7944 if (discarded != NULL)
7945 {
7946 /* If we've been called for ld -r, then we need to
7947 adjust the input section size. */
7948 if (isec->rawsize == 0)
7949 isec->rawsize = isec->size;
7950 isec->size = isec->rawsize - removed;
7951 if (isec->size <= 4)
7952 {
7953 isec->size = 0;
7954 isec->flags |= SEC_EXCLUDE;
7955 }
7956 }
7957 else
7958 {
7959 /* Adjust the output section size when called from
7960 objcopy. */
7961 isec->output_section->size -= removed;
7962 if (isec->output_section->size <= 4)
7963 {
7964 isec->output_section->size = 0;
7965 isec->output_section->flags |= SEC_EXCLUDE;
7966 }
7967 }
7968 }
7969 }
7970
7971 return TRUE;
7972 }
7973
7974 /* Copy private header information. */
7975
7976 bfd_boolean
7977 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
7978 {
7979 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7980 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7981 return TRUE;
7982
7983 /* Copy over private BFD data if it has not already been copied.
7984 This must be done here, rather than in the copy_private_bfd_data
7985 entry point, because the latter is called after the section
7986 contents have been set, which means that the program headers have
7987 already been worked out. */
7988 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
7989 {
7990 if (! copy_private_bfd_data (ibfd, obfd))
7991 return FALSE;
7992 }
7993
7994 return _bfd_elf_fixup_group_sections (ibfd, NULL);
7995 }
7996
7997 /* Copy private symbol information. If this symbol is in a section
7998 which we did not map into a BFD section, try to map the section
7999 index correctly. We use special macro definitions for the mapped
8000 section indices; these definitions are interpreted by the
8001 swap_out_syms function. */
8002
8003 #define MAP_ONESYMTAB (SHN_HIOS + 1)
8004 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
8005 #define MAP_STRTAB (SHN_HIOS + 3)
8006 #define MAP_SHSTRTAB (SHN_HIOS + 4)
8007 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
8008
8009 bfd_boolean
8010 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
8011 asymbol *isymarg,
8012 bfd *obfd,
8013 asymbol *osymarg)
8014 {
8015 elf_symbol_type *isym, *osym;
8016
8017 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8018 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8019 return TRUE;
8020
8021 isym = elf_symbol_from (ibfd, isymarg);
8022 osym = elf_symbol_from (obfd, osymarg);
8023
8024 if (isym != NULL
8025 && isym->internal_elf_sym.st_shndx != 0
8026 && osym != NULL
8027 && bfd_is_abs_section (isym->symbol.section))
8028 {
8029 unsigned int shndx;
8030
8031 shndx = isym->internal_elf_sym.st_shndx;
8032 if (shndx == elf_onesymtab (ibfd))
8033 shndx = MAP_ONESYMTAB;
8034 else if (shndx == elf_dynsymtab (ibfd))
8035 shndx = MAP_DYNSYMTAB;
8036 else if (shndx == elf_strtab_sec (ibfd))
8037 shndx = MAP_STRTAB;
8038 else if (shndx == elf_shstrtab_sec (ibfd))
8039 shndx = MAP_SHSTRTAB;
8040 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
8041 shndx = MAP_SYM_SHNDX;
8042 osym->internal_elf_sym.st_shndx = shndx;
8043 }
8044
8045 return TRUE;
8046 }
8047
8048 /* Swap out the symbols. */
8049
8050 static bfd_boolean
8051 swap_out_syms (bfd *abfd,
8052 struct elf_strtab_hash **sttp,
8053 int relocatable_p)
8054 {
8055 const struct elf_backend_data *bed;
8056 unsigned int symcount;
8057 asymbol **syms;
8058 struct elf_strtab_hash *stt;
8059 Elf_Internal_Shdr *symtab_hdr;
8060 Elf_Internal_Shdr *symtab_shndx_hdr;
8061 Elf_Internal_Shdr *symstrtab_hdr;
8062 struct elf_sym_strtab *symstrtab;
8063 bfd_byte *outbound_syms;
8064 bfd_byte *outbound_shndx;
8065 unsigned long outbound_syms_index;
8066 unsigned long outbound_shndx_index;
8067 unsigned int idx;
8068 unsigned int num_locals;
8069 size_t amt;
8070 bfd_boolean name_local_sections;
8071
8072 if (!elf_map_symbols (abfd, &num_locals))
8073 return FALSE;
8074
8075 /* Dump out the symtabs. */
8076 stt = _bfd_elf_strtab_init ();
8077 if (stt == NULL)
8078 return FALSE;
8079
8080 bed = get_elf_backend_data (abfd);
8081 symcount = bfd_get_symcount (abfd);
8082 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8083 symtab_hdr->sh_type = SHT_SYMTAB;
8084 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8085 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8086 symtab_hdr->sh_info = num_locals + 1;
8087 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8088
8089 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8090 symstrtab_hdr->sh_type = SHT_STRTAB;
8091
8092 /* Allocate buffer to swap out the .strtab section. */
8093 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8094 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8095 {
8096 bfd_set_error (bfd_error_no_memory);
8097 _bfd_elf_strtab_free (stt);
8098 return FALSE;
8099 }
8100
8101 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8102 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8103 {
8104 error_no_mem:
8105 bfd_set_error (bfd_error_no_memory);
8106 error_return:
8107 free (symstrtab);
8108 _bfd_elf_strtab_free (stt);
8109 return FALSE;
8110 }
8111 symtab_hdr->contents = outbound_syms;
8112 outbound_syms_index = 0;
8113
8114 outbound_shndx = NULL;
8115 outbound_shndx_index = 0;
8116
8117 if (elf_symtab_shndx_list (abfd))
8118 {
8119 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8120 if (symtab_shndx_hdr->sh_name != 0)
8121 {
8122 if (_bfd_mul_overflow (symcount + 1,
8123 sizeof (Elf_External_Sym_Shndx), &amt))
8124 goto error_no_mem;
8125 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8126 if (outbound_shndx == NULL)
8127 goto error_return;
8128
8129 symtab_shndx_hdr->contents = outbound_shndx;
8130 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8131 symtab_shndx_hdr->sh_size = amt;
8132 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8133 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8134 }
8135 /* FIXME: What about any other headers in the list ? */
8136 }
8137
8138 /* Now generate the data (for "contents"). */
8139 {
8140 /* Fill in zeroth symbol and swap it out. */
8141 Elf_Internal_Sym sym;
8142 sym.st_name = 0;
8143 sym.st_value = 0;
8144 sym.st_size = 0;
8145 sym.st_info = 0;
8146 sym.st_other = 0;
8147 sym.st_shndx = SHN_UNDEF;
8148 sym.st_target_internal = 0;
8149 symstrtab[0].sym = sym;
8150 symstrtab[0].dest_index = outbound_syms_index;
8151 symstrtab[0].destshndx_index = outbound_shndx_index;
8152 outbound_syms_index++;
8153 if (outbound_shndx != NULL)
8154 outbound_shndx_index++;
8155 }
8156
8157 name_local_sections
8158 = (bed->elf_backend_name_local_section_symbols
8159 && bed->elf_backend_name_local_section_symbols (abfd));
8160
8161 syms = bfd_get_outsymbols (abfd);
8162 for (idx = 0; idx < symcount;)
8163 {
8164 Elf_Internal_Sym sym;
8165 bfd_vma value = syms[idx]->value;
8166 elf_symbol_type *type_ptr;
8167 flagword flags = syms[idx]->flags;
8168 int type;
8169
8170 if (!name_local_sections
8171 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8172 {
8173 /* Local section symbols have no name. */
8174 sym.st_name = (unsigned long) -1;
8175 }
8176 else
8177 {
8178 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8179 to get the final offset for st_name. */
8180 sym.st_name
8181 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8182 FALSE);
8183 if (sym.st_name == (unsigned long) -1)
8184 goto error_return;
8185 }
8186
8187 type_ptr = elf_symbol_from (abfd, syms[idx]);
8188
8189 if ((flags & BSF_SECTION_SYM) == 0
8190 && bfd_is_com_section (syms[idx]->section))
8191 {
8192 /* ELF common symbols put the alignment into the `value' field,
8193 and the size into the `size' field. This is backwards from
8194 how BFD handles it, so reverse it here. */
8195 sym.st_size = value;
8196 if (type_ptr == NULL
8197 || type_ptr->internal_elf_sym.st_value == 0)
8198 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8199 else
8200 sym.st_value = type_ptr->internal_elf_sym.st_value;
8201 sym.st_shndx = _bfd_elf_section_from_bfd_section
8202 (abfd, syms[idx]->section);
8203 }
8204 else
8205 {
8206 asection *sec = syms[idx]->section;
8207 unsigned int shndx;
8208
8209 if (sec->output_section)
8210 {
8211 value += sec->output_offset;
8212 sec = sec->output_section;
8213 }
8214
8215 /* Don't add in the section vma for relocatable output. */
8216 if (! relocatable_p)
8217 value += sec->vma;
8218 sym.st_value = value;
8219 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8220
8221 if (bfd_is_abs_section (sec)
8222 && type_ptr != NULL
8223 && type_ptr->internal_elf_sym.st_shndx != 0)
8224 {
8225 /* This symbol is in a real ELF section which we did
8226 not create as a BFD section. Undo the mapping done
8227 by copy_private_symbol_data. */
8228 shndx = type_ptr->internal_elf_sym.st_shndx;
8229 switch (shndx)
8230 {
8231 case MAP_ONESYMTAB:
8232 shndx = elf_onesymtab (abfd);
8233 break;
8234 case MAP_DYNSYMTAB:
8235 shndx = elf_dynsymtab (abfd);
8236 break;
8237 case MAP_STRTAB:
8238 shndx = elf_strtab_sec (abfd);
8239 break;
8240 case MAP_SHSTRTAB:
8241 shndx = elf_shstrtab_sec (abfd);
8242 break;
8243 case MAP_SYM_SHNDX:
8244 if (elf_symtab_shndx_list (abfd))
8245 shndx = elf_symtab_shndx_list (abfd)->ndx;
8246 break;
8247 case SHN_COMMON:
8248 case SHN_ABS:
8249 shndx = SHN_ABS;
8250 break;
8251 default:
8252 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8253 {
8254 if (bed->symbol_section_index)
8255 shndx = bed->symbol_section_index (abfd, type_ptr);
8256 /* Otherwise just leave the index alone. */
8257 }
8258 else
8259 {
8260 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8261 _bfd_error_handler (_("%pB: \
8262 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8263 abfd, shndx);
8264 shndx = SHN_ABS;
8265 }
8266 break;
8267 }
8268 }
8269 else
8270 {
8271 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8272
8273 if (shndx == SHN_BAD)
8274 {
8275 asection *sec2;
8276
8277 /* Writing this would be a hell of a lot easier if
8278 we had some decent documentation on bfd, and
8279 knew what to expect of the library, and what to
8280 demand of applications. For example, it
8281 appears that `objcopy' might not set the
8282 section of a symbol to be a section that is
8283 actually in the output file. */
8284 sec2 = bfd_get_section_by_name (abfd, sec->name);
8285 if (sec2 != NULL)
8286 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8287 if (shndx == SHN_BAD)
8288 {
8289 /* xgettext:c-format */
8290 _bfd_error_handler
8291 (_("unable to find equivalent output section"
8292 " for symbol '%s' from section '%s'"),
8293 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8294 sec->name);
8295 bfd_set_error (bfd_error_invalid_operation);
8296 goto error_return;
8297 }
8298 }
8299 }
8300
8301 sym.st_shndx = shndx;
8302 }
8303
8304 if ((flags & BSF_THREAD_LOCAL) != 0)
8305 type = STT_TLS;
8306 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8307 type = STT_GNU_IFUNC;
8308 else if ((flags & BSF_FUNCTION) != 0)
8309 type = STT_FUNC;
8310 else if ((flags & BSF_OBJECT) != 0)
8311 type = STT_OBJECT;
8312 else if ((flags & BSF_RELC) != 0)
8313 type = STT_RELC;
8314 else if ((flags & BSF_SRELC) != 0)
8315 type = STT_SRELC;
8316 else
8317 type = STT_NOTYPE;
8318
8319 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8320 type = STT_TLS;
8321
8322 /* Processor-specific types. */
8323 if (type_ptr != NULL
8324 && bed->elf_backend_get_symbol_type)
8325 type = ((*bed->elf_backend_get_symbol_type)
8326 (&type_ptr->internal_elf_sym, type));
8327
8328 if (flags & BSF_SECTION_SYM)
8329 {
8330 if (flags & BSF_GLOBAL)
8331 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8332 else
8333 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8334 }
8335 else if (bfd_is_com_section (syms[idx]->section))
8336 {
8337 if (type != STT_TLS)
8338 {
8339 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8340 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8341 ? STT_COMMON : STT_OBJECT);
8342 else
8343 type = ((flags & BSF_ELF_COMMON) != 0
8344 ? STT_COMMON : STT_OBJECT);
8345 }
8346 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8347 }
8348 else if (bfd_is_und_section (syms[idx]->section))
8349 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8350 ? STB_WEAK
8351 : STB_GLOBAL),
8352 type);
8353 else if (flags & BSF_FILE)
8354 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8355 else
8356 {
8357 int bind = STB_LOCAL;
8358
8359 if (flags & BSF_LOCAL)
8360 bind = STB_LOCAL;
8361 else if (flags & BSF_GNU_UNIQUE)
8362 bind = STB_GNU_UNIQUE;
8363 else if (flags & BSF_WEAK)
8364 bind = STB_WEAK;
8365 else if (flags & BSF_GLOBAL)
8366 bind = STB_GLOBAL;
8367
8368 sym.st_info = ELF_ST_INFO (bind, type);
8369 }
8370
8371 if (type_ptr != NULL)
8372 {
8373 sym.st_other = type_ptr->internal_elf_sym.st_other;
8374 sym.st_target_internal
8375 = type_ptr->internal_elf_sym.st_target_internal;
8376 }
8377 else
8378 {
8379 sym.st_other = 0;
8380 sym.st_target_internal = 0;
8381 }
8382
8383 idx++;
8384 symstrtab[idx].sym = sym;
8385 symstrtab[idx].dest_index = outbound_syms_index;
8386 symstrtab[idx].destshndx_index = outbound_shndx_index;
8387
8388 outbound_syms_index++;
8389 if (outbound_shndx != NULL)
8390 outbound_shndx_index++;
8391 }
8392
8393 /* Finalize the .strtab section. */
8394 _bfd_elf_strtab_finalize (stt);
8395
8396 /* Swap out the .strtab section. */
8397 for (idx = 0; idx <= symcount; idx++)
8398 {
8399 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8400 if (elfsym->sym.st_name == (unsigned long) -1)
8401 elfsym->sym.st_name = 0;
8402 else
8403 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8404 elfsym->sym.st_name);
8405 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8406 (outbound_syms
8407 + (elfsym->dest_index
8408 * bed->s->sizeof_sym)),
8409 (outbound_shndx
8410 + (elfsym->destshndx_index
8411 * sizeof (Elf_External_Sym_Shndx))));
8412 }
8413 free (symstrtab);
8414
8415 *sttp = stt;
8416 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8417 symstrtab_hdr->sh_type = SHT_STRTAB;
8418 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8419 symstrtab_hdr->sh_addr = 0;
8420 symstrtab_hdr->sh_entsize = 0;
8421 symstrtab_hdr->sh_link = 0;
8422 symstrtab_hdr->sh_info = 0;
8423 symstrtab_hdr->sh_addralign = 1;
8424
8425 return TRUE;
8426 }
8427
8428 /* Return the number of bytes required to hold the symtab vector.
8429
8430 Note that we base it on the count plus 1, since we will null terminate
8431 the vector allocated based on this size. However, the ELF symbol table
8432 always has a dummy entry as symbol #0, so it ends up even. */
8433
8434 long
8435 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8436 {
8437 bfd_size_type symcount;
8438 long symtab_size;
8439 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8440
8441 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8442 if (symcount >= LONG_MAX / sizeof (asymbol *))
8443 {
8444 bfd_set_error (bfd_error_file_too_big);
8445 return -1;
8446 }
8447 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8448 if (symcount > 0)
8449 symtab_size -= sizeof (asymbol *);
8450
8451 return symtab_size;
8452 }
8453
8454 long
8455 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8456 {
8457 bfd_size_type symcount;
8458 long symtab_size;
8459 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8460
8461 if (elf_dynsymtab (abfd) == 0)
8462 {
8463 bfd_set_error (bfd_error_invalid_operation);
8464 return -1;
8465 }
8466
8467 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8468 if (symcount >= LONG_MAX / sizeof (asymbol *))
8469 {
8470 bfd_set_error (bfd_error_file_too_big);
8471 return -1;
8472 }
8473 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8474 if (symcount > 0)
8475 symtab_size -= sizeof (asymbol *);
8476
8477 return symtab_size;
8478 }
8479
8480 long
8481 _bfd_elf_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED,
8482 sec_ptr asect)
8483 {
8484 #if SIZEOF_LONG == SIZEOF_INT
8485 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8486 {
8487 bfd_set_error (bfd_error_file_too_big);
8488 return -1;
8489 }
8490 #endif
8491 return (asect->reloc_count + 1) * sizeof (arelent *);
8492 }
8493
8494 /* Canonicalize the relocs. */
8495
8496 long
8497 _bfd_elf_canonicalize_reloc (bfd *abfd,
8498 sec_ptr section,
8499 arelent **relptr,
8500 asymbol **symbols)
8501 {
8502 arelent *tblptr;
8503 unsigned int i;
8504 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8505
8506 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8507 return -1;
8508
8509 tblptr = section->relocation;
8510 for (i = 0; i < section->reloc_count; i++)
8511 *relptr++ = tblptr++;
8512
8513 *relptr = NULL;
8514
8515 return section->reloc_count;
8516 }
8517
8518 long
8519 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8520 {
8521 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8522 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8523
8524 if (symcount >= 0)
8525 abfd->symcount = symcount;
8526 return symcount;
8527 }
8528
8529 long
8530 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8531 asymbol **allocation)
8532 {
8533 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8534 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8535
8536 if (symcount >= 0)
8537 abfd->dynsymcount = symcount;
8538 return symcount;
8539 }
8540
8541 /* Return the size required for the dynamic reloc entries. Any loadable
8542 section that was actually installed in the BFD, and has type SHT_REL
8543 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8544 dynamic reloc section. */
8545
8546 long
8547 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8548 {
8549 bfd_size_type count;
8550 asection *s;
8551
8552 if (elf_dynsymtab (abfd) == 0)
8553 {
8554 bfd_set_error (bfd_error_invalid_operation);
8555 return -1;
8556 }
8557
8558 count = 1;
8559 for (s = abfd->sections; s != NULL; s = s->next)
8560 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8561 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8562 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8563 {
8564 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8565 if (count > LONG_MAX / sizeof (arelent *))
8566 {
8567 bfd_set_error (bfd_error_file_too_big);
8568 return -1;
8569 }
8570 }
8571 return count * sizeof (arelent *);
8572 }
8573
8574 /* Canonicalize the dynamic relocation entries. Note that we return the
8575 dynamic relocations as a single block, although they are actually
8576 associated with particular sections; the interface, which was
8577 designed for SunOS style shared libraries, expects that there is only
8578 one set of dynamic relocs. Any loadable section that was actually
8579 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8580 dynamic symbol table, is considered to be a dynamic reloc section. */
8581
8582 long
8583 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8584 arelent **storage,
8585 asymbol **syms)
8586 {
8587 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8588 asection *s;
8589 long ret;
8590
8591 if (elf_dynsymtab (abfd) == 0)
8592 {
8593 bfd_set_error (bfd_error_invalid_operation);
8594 return -1;
8595 }
8596
8597 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8598 ret = 0;
8599 for (s = abfd->sections; s != NULL; s = s->next)
8600 {
8601 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8602 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8603 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8604 {
8605 arelent *p;
8606 long count, i;
8607
8608 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8609 return -1;
8610 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8611 p = s->relocation;
8612 for (i = 0; i < count; i++)
8613 *storage++ = p++;
8614 ret += count;
8615 }
8616 }
8617
8618 *storage = NULL;
8619
8620 return ret;
8621 }
8622 \f
8623 /* Read in the version information. */
8624
8625 bfd_boolean
8626 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8627 {
8628 bfd_byte *contents = NULL;
8629 unsigned int freeidx = 0;
8630 size_t amt;
8631
8632 if (elf_dynverref (abfd) != 0)
8633 {
8634 Elf_Internal_Shdr *hdr;
8635 Elf_External_Verneed *everneed;
8636 Elf_Internal_Verneed *iverneed;
8637 unsigned int i;
8638 bfd_byte *contents_end;
8639
8640 hdr = &elf_tdata (abfd)->dynverref_hdr;
8641
8642 if (hdr->sh_info == 0
8643 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8644 {
8645 error_return_bad_verref:
8646 _bfd_error_handler
8647 (_("%pB: .gnu.version_r invalid entry"), abfd);
8648 bfd_set_error (bfd_error_bad_value);
8649 error_return_verref:
8650 elf_tdata (abfd)->verref = NULL;
8651 elf_tdata (abfd)->cverrefs = 0;
8652 goto error_return;
8653 }
8654
8655 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8656 goto error_return_verref;
8657 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8658 if (contents == NULL)
8659 goto error_return_verref;
8660
8661 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8662 {
8663 bfd_set_error (bfd_error_file_too_big);
8664 goto error_return_verref;
8665 }
8666 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8667 if (elf_tdata (abfd)->verref == NULL)
8668 goto error_return_verref;
8669
8670 BFD_ASSERT (sizeof (Elf_External_Verneed)
8671 == sizeof (Elf_External_Vernaux));
8672 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8673 everneed = (Elf_External_Verneed *) contents;
8674 iverneed = elf_tdata (abfd)->verref;
8675 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8676 {
8677 Elf_External_Vernaux *evernaux;
8678 Elf_Internal_Vernaux *ivernaux;
8679 unsigned int j;
8680
8681 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8682
8683 iverneed->vn_bfd = abfd;
8684
8685 iverneed->vn_filename =
8686 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8687 iverneed->vn_file);
8688 if (iverneed->vn_filename == NULL)
8689 goto error_return_bad_verref;
8690
8691 if (iverneed->vn_cnt == 0)
8692 iverneed->vn_auxptr = NULL;
8693 else
8694 {
8695 if (_bfd_mul_overflow (iverneed->vn_cnt,
8696 sizeof (Elf_Internal_Vernaux), &amt))
8697 {
8698 bfd_set_error (bfd_error_file_too_big);
8699 goto error_return_verref;
8700 }
8701 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8702 bfd_alloc (abfd, amt);
8703 if (iverneed->vn_auxptr == NULL)
8704 goto error_return_verref;
8705 }
8706
8707 if (iverneed->vn_aux
8708 > (size_t) (contents_end - (bfd_byte *) everneed))
8709 goto error_return_bad_verref;
8710
8711 evernaux = ((Elf_External_Vernaux *)
8712 ((bfd_byte *) everneed + iverneed->vn_aux));
8713 ivernaux = iverneed->vn_auxptr;
8714 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8715 {
8716 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8717
8718 ivernaux->vna_nodename =
8719 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8720 ivernaux->vna_name);
8721 if (ivernaux->vna_nodename == NULL)
8722 goto error_return_bad_verref;
8723
8724 if (ivernaux->vna_other > freeidx)
8725 freeidx = ivernaux->vna_other;
8726
8727 ivernaux->vna_nextptr = NULL;
8728 if (ivernaux->vna_next == 0)
8729 {
8730 iverneed->vn_cnt = j + 1;
8731 break;
8732 }
8733 if (j + 1 < iverneed->vn_cnt)
8734 ivernaux->vna_nextptr = ivernaux + 1;
8735
8736 if (ivernaux->vna_next
8737 > (size_t) (contents_end - (bfd_byte *) evernaux))
8738 goto error_return_bad_verref;
8739
8740 evernaux = ((Elf_External_Vernaux *)
8741 ((bfd_byte *) evernaux + ivernaux->vna_next));
8742 }
8743
8744 iverneed->vn_nextref = NULL;
8745 if (iverneed->vn_next == 0)
8746 break;
8747 if (i + 1 < hdr->sh_info)
8748 iverneed->vn_nextref = iverneed + 1;
8749
8750 if (iverneed->vn_next
8751 > (size_t) (contents_end - (bfd_byte *) everneed))
8752 goto error_return_bad_verref;
8753
8754 everneed = ((Elf_External_Verneed *)
8755 ((bfd_byte *) everneed + iverneed->vn_next));
8756 }
8757 elf_tdata (abfd)->cverrefs = i;
8758
8759 free (contents);
8760 contents = NULL;
8761 }
8762
8763 if (elf_dynverdef (abfd) != 0)
8764 {
8765 Elf_Internal_Shdr *hdr;
8766 Elf_External_Verdef *everdef;
8767 Elf_Internal_Verdef *iverdef;
8768 Elf_Internal_Verdef *iverdefarr;
8769 Elf_Internal_Verdef iverdefmem;
8770 unsigned int i;
8771 unsigned int maxidx;
8772 bfd_byte *contents_end_def, *contents_end_aux;
8773
8774 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8775
8776 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8777 {
8778 error_return_bad_verdef:
8779 _bfd_error_handler
8780 (_("%pB: .gnu.version_d invalid entry"), abfd);
8781 bfd_set_error (bfd_error_bad_value);
8782 error_return_verdef:
8783 elf_tdata (abfd)->verdef = NULL;
8784 elf_tdata (abfd)->cverdefs = 0;
8785 goto error_return;
8786 }
8787
8788 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8789 goto error_return_verdef;
8790 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8791 if (contents == NULL)
8792 goto error_return_verdef;
8793
8794 BFD_ASSERT (sizeof (Elf_External_Verdef)
8795 >= sizeof (Elf_External_Verdaux));
8796 contents_end_def = contents + hdr->sh_size
8797 - sizeof (Elf_External_Verdef);
8798 contents_end_aux = contents + hdr->sh_size
8799 - sizeof (Elf_External_Verdaux);
8800
8801 /* We know the number of entries in the section but not the maximum
8802 index. Therefore we have to run through all entries and find
8803 the maximum. */
8804 everdef = (Elf_External_Verdef *) contents;
8805 maxidx = 0;
8806 for (i = 0; i < hdr->sh_info; ++i)
8807 {
8808 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8809
8810 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8811 goto error_return_bad_verdef;
8812 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8813 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8814
8815 if (iverdefmem.vd_next == 0)
8816 break;
8817
8818 if (iverdefmem.vd_next
8819 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8820 goto error_return_bad_verdef;
8821
8822 everdef = ((Elf_External_Verdef *)
8823 ((bfd_byte *) everdef + iverdefmem.vd_next));
8824 }
8825
8826 if (default_imported_symver)
8827 {
8828 if (freeidx > maxidx)
8829 maxidx = ++freeidx;
8830 else
8831 freeidx = ++maxidx;
8832 }
8833 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8834 {
8835 bfd_set_error (bfd_error_file_too_big);
8836 goto error_return_verdef;
8837 }
8838 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8839 if (elf_tdata (abfd)->verdef == NULL)
8840 goto error_return_verdef;
8841
8842 elf_tdata (abfd)->cverdefs = maxidx;
8843
8844 everdef = (Elf_External_Verdef *) contents;
8845 iverdefarr = elf_tdata (abfd)->verdef;
8846 for (i = 0; i < hdr->sh_info; i++)
8847 {
8848 Elf_External_Verdaux *everdaux;
8849 Elf_Internal_Verdaux *iverdaux;
8850 unsigned int j;
8851
8852 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8853
8854 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8855 goto error_return_bad_verdef;
8856
8857 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8858 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8859
8860 iverdef->vd_bfd = abfd;
8861
8862 if (iverdef->vd_cnt == 0)
8863 iverdef->vd_auxptr = NULL;
8864 else
8865 {
8866 if (_bfd_mul_overflow (iverdef->vd_cnt,
8867 sizeof (Elf_Internal_Verdaux), &amt))
8868 {
8869 bfd_set_error (bfd_error_file_too_big);
8870 goto error_return_verdef;
8871 }
8872 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8873 bfd_alloc (abfd, amt);
8874 if (iverdef->vd_auxptr == NULL)
8875 goto error_return_verdef;
8876 }
8877
8878 if (iverdef->vd_aux
8879 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8880 goto error_return_bad_verdef;
8881
8882 everdaux = ((Elf_External_Verdaux *)
8883 ((bfd_byte *) everdef + iverdef->vd_aux));
8884 iverdaux = iverdef->vd_auxptr;
8885 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8886 {
8887 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8888
8889 iverdaux->vda_nodename =
8890 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8891 iverdaux->vda_name);
8892 if (iverdaux->vda_nodename == NULL)
8893 goto error_return_bad_verdef;
8894
8895 iverdaux->vda_nextptr = NULL;
8896 if (iverdaux->vda_next == 0)
8897 {
8898 iverdef->vd_cnt = j + 1;
8899 break;
8900 }
8901 if (j + 1 < iverdef->vd_cnt)
8902 iverdaux->vda_nextptr = iverdaux + 1;
8903
8904 if (iverdaux->vda_next
8905 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8906 goto error_return_bad_verdef;
8907
8908 everdaux = ((Elf_External_Verdaux *)
8909 ((bfd_byte *) everdaux + iverdaux->vda_next));
8910 }
8911
8912 iverdef->vd_nodename = NULL;
8913 if (iverdef->vd_cnt)
8914 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8915
8916 iverdef->vd_nextdef = NULL;
8917 if (iverdef->vd_next == 0)
8918 break;
8919 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8920 iverdef->vd_nextdef = iverdef + 1;
8921
8922 everdef = ((Elf_External_Verdef *)
8923 ((bfd_byte *) everdef + iverdef->vd_next));
8924 }
8925
8926 free (contents);
8927 contents = NULL;
8928 }
8929 else if (default_imported_symver)
8930 {
8931 if (freeidx < 3)
8932 freeidx = 3;
8933 else
8934 freeidx++;
8935
8936 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8937 {
8938 bfd_set_error (bfd_error_file_too_big);
8939 goto error_return;
8940 }
8941 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8942 if (elf_tdata (abfd)->verdef == NULL)
8943 goto error_return;
8944
8945 elf_tdata (abfd)->cverdefs = freeidx;
8946 }
8947
8948 /* Create a default version based on the soname. */
8949 if (default_imported_symver)
8950 {
8951 Elf_Internal_Verdef *iverdef;
8952 Elf_Internal_Verdaux *iverdaux;
8953
8954 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
8955
8956 iverdef->vd_version = VER_DEF_CURRENT;
8957 iverdef->vd_flags = 0;
8958 iverdef->vd_ndx = freeidx;
8959 iverdef->vd_cnt = 1;
8960
8961 iverdef->vd_bfd = abfd;
8962
8963 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
8964 if (iverdef->vd_nodename == NULL)
8965 goto error_return_verdef;
8966 iverdef->vd_nextdef = NULL;
8967 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
8968 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
8969 if (iverdef->vd_auxptr == NULL)
8970 goto error_return_verdef;
8971
8972 iverdaux = iverdef->vd_auxptr;
8973 iverdaux->vda_nodename = iverdef->vd_nodename;
8974 }
8975
8976 return TRUE;
8977
8978 error_return:
8979 if (contents != NULL)
8980 free (contents);
8981 return FALSE;
8982 }
8983 \f
8984 asymbol *
8985 _bfd_elf_make_empty_symbol (bfd *abfd)
8986 {
8987 elf_symbol_type *newsym;
8988
8989 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
8990 if (!newsym)
8991 return NULL;
8992 newsym->symbol.the_bfd = abfd;
8993 return &newsym->symbol;
8994 }
8995
8996 void
8997 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
8998 asymbol *symbol,
8999 symbol_info *ret)
9000 {
9001 bfd_symbol_info (symbol, ret);
9002 }
9003
9004 /* Return whether a symbol name implies a local symbol. Most targets
9005 use this function for the is_local_label_name entry point, but some
9006 override it. */
9007
9008 bfd_boolean
9009 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
9010 const char *name)
9011 {
9012 /* Normal local symbols start with ``.L''. */
9013 if (name[0] == '.' && name[1] == 'L')
9014 return TRUE;
9015
9016 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9017 DWARF debugging symbols starting with ``..''. */
9018 if (name[0] == '.' && name[1] == '.')
9019 return TRUE;
9020
9021 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9022 emitting DWARF debugging output. I suspect this is actually a
9023 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9024 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9025 underscore to be emitted on some ELF targets). For ease of use,
9026 we treat such symbols as local. */
9027 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
9028 return TRUE;
9029
9030 /* Treat assembler generated fake symbols, dollar local labels and
9031 forward-backward labels (aka local labels) as locals.
9032 These labels have the form:
9033
9034 L0^A.* (fake symbols)
9035
9036 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9037
9038 Versions which start with .L will have already been matched above,
9039 so we only need to match the rest. */
9040 if (name[0] == 'L' && ISDIGIT (name[1]))
9041 {
9042 bfd_boolean ret = FALSE;
9043 const char * p;
9044 char c;
9045
9046 for (p = name + 2; (c = *p); p++)
9047 {
9048 if (c == 1 || c == 2)
9049 {
9050 if (c == 1 && p == name + 2)
9051 /* A fake symbol. */
9052 return TRUE;
9053
9054 /* FIXME: We are being paranoid here and treating symbols like
9055 L0^Bfoo as if there were non-local, on the grounds that the
9056 assembler will never generate them. But can any symbol
9057 containing an ASCII value in the range 1-31 ever be anything
9058 other than some kind of local ? */
9059 ret = TRUE;
9060 }
9061
9062 if (! ISDIGIT (c))
9063 {
9064 ret = FALSE;
9065 break;
9066 }
9067 }
9068 return ret;
9069 }
9070
9071 return FALSE;
9072 }
9073
9074 alent *
9075 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9076 asymbol *symbol ATTRIBUTE_UNUSED)
9077 {
9078 abort ();
9079 return NULL;
9080 }
9081
9082 bfd_boolean
9083 _bfd_elf_set_arch_mach (bfd *abfd,
9084 enum bfd_architecture arch,
9085 unsigned long machine)
9086 {
9087 /* If this isn't the right architecture for this backend, and this
9088 isn't the generic backend, fail. */
9089 if (arch != get_elf_backend_data (abfd)->arch
9090 && arch != bfd_arch_unknown
9091 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9092 return FALSE;
9093
9094 return bfd_default_set_arch_mach (abfd, arch, machine);
9095 }
9096
9097 /* Find the nearest line to a particular section and offset,
9098 for error reporting. */
9099
9100 bfd_boolean
9101 _bfd_elf_find_nearest_line (bfd *abfd,
9102 asymbol **symbols,
9103 asection *section,
9104 bfd_vma offset,
9105 const char **filename_ptr,
9106 const char **functionname_ptr,
9107 unsigned int *line_ptr,
9108 unsigned int *discriminator_ptr)
9109 {
9110 bfd_boolean found;
9111
9112 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9113 filename_ptr, functionname_ptr,
9114 line_ptr, discriminator_ptr,
9115 dwarf_debug_sections,
9116 &elf_tdata (abfd)->dwarf2_find_line_info))
9117 return TRUE;
9118
9119 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9120 filename_ptr, functionname_ptr, line_ptr))
9121 {
9122 if (!*functionname_ptr)
9123 _bfd_elf_find_function (abfd, symbols, section, offset,
9124 *filename_ptr ? NULL : filename_ptr,
9125 functionname_ptr);
9126 return TRUE;
9127 }
9128
9129 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9130 &found, filename_ptr,
9131 functionname_ptr, line_ptr,
9132 &elf_tdata (abfd)->line_info))
9133 return FALSE;
9134 if (found && (*functionname_ptr || *line_ptr))
9135 return TRUE;
9136
9137 if (symbols == NULL)
9138 return FALSE;
9139
9140 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9141 filename_ptr, functionname_ptr))
9142 return FALSE;
9143
9144 *line_ptr = 0;
9145 return TRUE;
9146 }
9147
9148 /* Find the line for a symbol. */
9149
9150 bfd_boolean
9151 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9152 const char **filename_ptr, unsigned int *line_ptr)
9153 {
9154 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9155 filename_ptr, NULL, line_ptr, NULL,
9156 dwarf_debug_sections,
9157 &elf_tdata (abfd)->dwarf2_find_line_info);
9158 }
9159
9160 /* After a call to bfd_find_nearest_line, successive calls to
9161 bfd_find_inliner_info can be used to get source information about
9162 each level of function inlining that terminated at the address
9163 passed to bfd_find_nearest_line. Currently this is only supported
9164 for DWARF2 with appropriate DWARF3 extensions. */
9165
9166 bfd_boolean
9167 _bfd_elf_find_inliner_info (bfd *abfd,
9168 const char **filename_ptr,
9169 const char **functionname_ptr,
9170 unsigned int *line_ptr)
9171 {
9172 bfd_boolean found;
9173 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9174 functionname_ptr, line_ptr,
9175 & elf_tdata (abfd)->dwarf2_find_line_info);
9176 return found;
9177 }
9178
9179 int
9180 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9181 {
9182 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9183 int ret = bed->s->sizeof_ehdr;
9184
9185 if (!bfd_link_relocatable (info))
9186 {
9187 bfd_size_type phdr_size = elf_program_header_size (abfd);
9188
9189 if (phdr_size == (bfd_size_type) -1)
9190 {
9191 struct elf_segment_map *m;
9192
9193 phdr_size = 0;
9194 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9195 phdr_size += bed->s->sizeof_phdr;
9196
9197 if (phdr_size == 0)
9198 phdr_size = get_program_header_size (abfd, info);
9199 }
9200
9201 elf_program_header_size (abfd) = phdr_size;
9202 ret += phdr_size;
9203 }
9204
9205 return ret;
9206 }
9207
9208 bfd_boolean
9209 _bfd_elf_set_section_contents (bfd *abfd,
9210 sec_ptr section,
9211 const void *location,
9212 file_ptr offset,
9213 bfd_size_type count)
9214 {
9215 Elf_Internal_Shdr *hdr;
9216 file_ptr pos;
9217
9218 if (! abfd->output_has_begun
9219 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9220 return FALSE;
9221
9222 if (!count)
9223 return TRUE;
9224
9225 hdr = &elf_section_data (section)->this_hdr;
9226 if (hdr->sh_offset == (file_ptr) -1)
9227 {
9228 unsigned char *contents;
9229
9230 if (bfd_section_is_ctf (section))
9231 /* Nothing to do with this section: the contents are generated
9232 later. */
9233 return TRUE;
9234
9235 if ((section->flags & SEC_ELF_COMPRESS) == 0)
9236 {
9237 _bfd_error_handler
9238 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9239 abfd, section);
9240 bfd_set_error (bfd_error_invalid_operation);
9241 return FALSE;
9242 }
9243
9244 if ((offset + count) > hdr->sh_size)
9245 {
9246 _bfd_error_handler
9247 (_("%pB:%pA: error: attempting to write over the end of the section"),
9248 abfd, section);
9249
9250 bfd_set_error (bfd_error_invalid_operation);
9251 return FALSE;
9252 }
9253
9254 contents = hdr->contents;
9255 if (contents == NULL)
9256 {
9257 _bfd_error_handler
9258 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9259 abfd, section);
9260
9261 bfd_set_error (bfd_error_invalid_operation);
9262 return FALSE;
9263 }
9264
9265 memcpy (contents + offset, location, count);
9266 return TRUE;
9267 }
9268
9269 pos = hdr->sh_offset + offset;
9270 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9271 || bfd_bwrite (location, count, abfd) != count)
9272 return FALSE;
9273
9274 return TRUE;
9275 }
9276
9277 bfd_boolean
9278 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9279 arelent *cache_ptr ATTRIBUTE_UNUSED,
9280 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9281 {
9282 abort ();
9283 return FALSE;
9284 }
9285
9286 /* Try to convert a non-ELF reloc into an ELF one. */
9287
9288 bfd_boolean
9289 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9290 {
9291 /* Check whether we really have an ELF howto. */
9292
9293 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9294 {
9295 bfd_reloc_code_real_type code;
9296 reloc_howto_type *howto;
9297
9298 /* Alien reloc: Try to determine its type to replace it with an
9299 equivalent ELF reloc. */
9300
9301 if (areloc->howto->pc_relative)
9302 {
9303 switch (areloc->howto->bitsize)
9304 {
9305 case 8:
9306 code = BFD_RELOC_8_PCREL;
9307 break;
9308 case 12:
9309 code = BFD_RELOC_12_PCREL;
9310 break;
9311 case 16:
9312 code = BFD_RELOC_16_PCREL;
9313 break;
9314 case 24:
9315 code = BFD_RELOC_24_PCREL;
9316 break;
9317 case 32:
9318 code = BFD_RELOC_32_PCREL;
9319 break;
9320 case 64:
9321 code = BFD_RELOC_64_PCREL;
9322 break;
9323 default:
9324 goto fail;
9325 }
9326
9327 howto = bfd_reloc_type_lookup (abfd, code);
9328
9329 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9330 {
9331 if (howto->pcrel_offset)
9332 areloc->addend += areloc->address;
9333 else
9334 areloc->addend -= areloc->address; /* addend is unsigned!! */
9335 }
9336 }
9337 else
9338 {
9339 switch (areloc->howto->bitsize)
9340 {
9341 case 8:
9342 code = BFD_RELOC_8;
9343 break;
9344 case 14:
9345 code = BFD_RELOC_14;
9346 break;
9347 case 16:
9348 code = BFD_RELOC_16;
9349 break;
9350 case 26:
9351 code = BFD_RELOC_26;
9352 break;
9353 case 32:
9354 code = BFD_RELOC_32;
9355 break;
9356 case 64:
9357 code = BFD_RELOC_64;
9358 break;
9359 default:
9360 goto fail;
9361 }
9362
9363 howto = bfd_reloc_type_lookup (abfd, code);
9364 }
9365
9366 if (howto)
9367 areloc->howto = howto;
9368 else
9369 goto fail;
9370 }
9371
9372 return TRUE;
9373
9374 fail:
9375 /* xgettext:c-format */
9376 _bfd_error_handler (_("%pB: %s unsupported"),
9377 abfd, areloc->howto->name);
9378 bfd_set_error (bfd_error_sorry);
9379 return FALSE;
9380 }
9381
9382 bfd_boolean
9383 _bfd_elf_close_and_cleanup (bfd *abfd)
9384 {
9385 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9386 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
9387 {
9388 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9389 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9390 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9391 }
9392
9393 return _bfd_generic_close_and_cleanup (abfd);
9394 }
9395
9396 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9397 in the relocation's offset. Thus we cannot allow any sort of sanity
9398 range-checking to interfere. There is nothing else to do in processing
9399 this reloc. */
9400
9401 bfd_reloc_status_type
9402 _bfd_elf_rel_vtable_reloc_fn
9403 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9404 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9405 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9406 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9407 {
9408 return bfd_reloc_ok;
9409 }
9410 \f
9411 /* Elf core file support. Much of this only works on native
9412 toolchains, since we rely on knowing the
9413 machine-dependent procfs structure in order to pick
9414 out details about the corefile. */
9415
9416 #ifdef HAVE_SYS_PROCFS_H
9417 /* Needed for new procfs interface on sparc-solaris. */
9418 # define _STRUCTURED_PROC 1
9419 # include <sys/procfs.h>
9420 #endif
9421
9422 /* Return a PID that identifies a "thread" for threaded cores, or the
9423 PID of the main process for non-threaded cores. */
9424
9425 static int
9426 elfcore_make_pid (bfd *abfd)
9427 {
9428 int pid;
9429
9430 pid = elf_tdata (abfd)->core->lwpid;
9431 if (pid == 0)
9432 pid = elf_tdata (abfd)->core->pid;
9433
9434 return pid;
9435 }
9436
9437 /* If there isn't a section called NAME, make one, using
9438 data from SECT. Note, this function will generate a
9439 reference to NAME, so you shouldn't deallocate or
9440 overwrite it. */
9441
9442 static bfd_boolean
9443 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9444 {
9445 asection *sect2;
9446
9447 if (bfd_get_section_by_name (abfd, name) != NULL)
9448 return TRUE;
9449
9450 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9451 if (sect2 == NULL)
9452 return FALSE;
9453
9454 sect2->size = sect->size;
9455 sect2->filepos = sect->filepos;
9456 sect2->alignment_power = sect->alignment_power;
9457 return TRUE;
9458 }
9459
9460 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9461 actually creates up to two pseudosections:
9462 - For the single-threaded case, a section named NAME, unless
9463 such a section already exists.
9464 - For the multi-threaded case, a section named "NAME/PID", where
9465 PID is elfcore_make_pid (abfd).
9466 Both pseudosections have identical contents. */
9467 bfd_boolean
9468 _bfd_elfcore_make_pseudosection (bfd *abfd,
9469 char *name,
9470 size_t size,
9471 ufile_ptr filepos)
9472 {
9473 char buf[100];
9474 char *threaded_name;
9475 size_t len;
9476 asection *sect;
9477
9478 /* Build the section name. */
9479
9480 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9481 len = strlen (buf) + 1;
9482 threaded_name = (char *) bfd_alloc (abfd, len);
9483 if (threaded_name == NULL)
9484 return FALSE;
9485 memcpy (threaded_name, buf, len);
9486
9487 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9488 SEC_HAS_CONTENTS);
9489 if (sect == NULL)
9490 return FALSE;
9491 sect->size = size;
9492 sect->filepos = filepos;
9493 sect->alignment_power = 2;
9494
9495 return elfcore_maybe_make_sect (abfd, name, sect);
9496 }
9497
9498 static bfd_boolean
9499 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9500 size_t offs)
9501 {
9502 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9503 SEC_HAS_CONTENTS);
9504
9505 if (sect == NULL)
9506 return FALSE;
9507
9508 sect->size = note->descsz - offs;
9509 sect->filepos = note->descpos + offs;
9510 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9511
9512 return TRUE;
9513 }
9514
9515 /* prstatus_t exists on:
9516 solaris 2.5+
9517 linux 2.[01] + glibc
9518 unixware 4.2
9519 */
9520
9521 #if defined (HAVE_PRSTATUS_T)
9522
9523 static bfd_boolean
9524 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9525 {
9526 size_t size;
9527 int offset;
9528
9529 if (note->descsz == sizeof (prstatus_t))
9530 {
9531 prstatus_t prstat;
9532
9533 size = sizeof (prstat.pr_reg);
9534 offset = offsetof (prstatus_t, pr_reg);
9535 memcpy (&prstat, note->descdata, sizeof (prstat));
9536
9537 /* Do not overwrite the core signal if it
9538 has already been set by another thread. */
9539 if (elf_tdata (abfd)->core->signal == 0)
9540 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9541 if (elf_tdata (abfd)->core->pid == 0)
9542 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9543
9544 /* pr_who exists on:
9545 solaris 2.5+
9546 unixware 4.2
9547 pr_who doesn't exist on:
9548 linux 2.[01]
9549 */
9550 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9551 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9552 #else
9553 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9554 #endif
9555 }
9556 #if defined (HAVE_PRSTATUS32_T)
9557 else if (note->descsz == sizeof (prstatus32_t))
9558 {
9559 /* 64-bit host, 32-bit corefile */
9560 prstatus32_t prstat;
9561
9562 size = sizeof (prstat.pr_reg);
9563 offset = offsetof (prstatus32_t, pr_reg);
9564 memcpy (&prstat, note->descdata, sizeof (prstat));
9565
9566 /* Do not overwrite the core signal if it
9567 has already been set by another thread. */
9568 if (elf_tdata (abfd)->core->signal == 0)
9569 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9570 if (elf_tdata (abfd)->core->pid == 0)
9571 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9572
9573 /* pr_who exists on:
9574 solaris 2.5+
9575 unixware 4.2
9576 pr_who doesn't exist on:
9577 linux 2.[01]
9578 */
9579 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9580 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9581 #else
9582 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9583 #endif
9584 }
9585 #endif /* HAVE_PRSTATUS32_T */
9586 else
9587 {
9588 /* Fail - we don't know how to handle any other
9589 note size (ie. data object type). */
9590 return TRUE;
9591 }
9592
9593 /* Make a ".reg/999" section and a ".reg" section. */
9594 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9595 size, note->descpos + offset);
9596 }
9597 #endif /* defined (HAVE_PRSTATUS_T) */
9598
9599 /* Create a pseudosection containing the exact contents of NOTE. */
9600 static bfd_boolean
9601 elfcore_make_note_pseudosection (bfd *abfd,
9602 char *name,
9603 Elf_Internal_Note *note)
9604 {
9605 return _bfd_elfcore_make_pseudosection (abfd, name,
9606 note->descsz, note->descpos);
9607 }
9608
9609 /* There isn't a consistent prfpregset_t across platforms,
9610 but it doesn't matter, because we don't have to pick this
9611 data structure apart. */
9612
9613 static bfd_boolean
9614 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9615 {
9616 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9617 }
9618
9619 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9620 type of NT_PRXFPREG. Just include the whole note's contents
9621 literally. */
9622
9623 static bfd_boolean
9624 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9625 {
9626 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9627 }
9628
9629 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9630 with a note type of NT_X86_XSTATE. Just include the whole note's
9631 contents literally. */
9632
9633 static bfd_boolean
9634 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9635 {
9636 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9637 }
9638
9639 static bfd_boolean
9640 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9641 {
9642 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9643 }
9644
9645 static bfd_boolean
9646 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9647 {
9648 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9649 }
9650
9651 static bfd_boolean
9652 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9653 {
9654 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9655 }
9656
9657 static bfd_boolean
9658 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9659 {
9660 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9661 }
9662
9663 static bfd_boolean
9664 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9665 {
9666 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9667 }
9668
9669 static bfd_boolean
9670 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9671 {
9672 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9673 }
9674
9675 static bfd_boolean
9676 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9677 {
9678 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9679 }
9680
9681 static bfd_boolean
9682 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9683 {
9684 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9685 }
9686
9687 static bfd_boolean
9688 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9689 {
9690 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9691 }
9692
9693 static bfd_boolean
9694 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9695 {
9696 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9697 }
9698
9699 static bfd_boolean
9700 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9701 {
9702 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9703 }
9704
9705 static bfd_boolean
9706 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9707 {
9708 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9709 }
9710
9711 static bfd_boolean
9712 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9713 {
9714 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9715 }
9716
9717 static bfd_boolean
9718 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9719 {
9720 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9721 }
9722
9723 static bfd_boolean
9724 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9725 {
9726 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9727 }
9728
9729 static bfd_boolean
9730 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9731 {
9732 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9733 }
9734
9735 static bfd_boolean
9736 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9737 {
9738 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9739 }
9740
9741 static bfd_boolean
9742 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9743 {
9744 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9745 }
9746
9747 static bfd_boolean
9748 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9749 {
9750 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9751 }
9752
9753 static bfd_boolean
9754 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9755 {
9756 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9757 }
9758
9759 static bfd_boolean
9760 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9761 {
9762 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9763 }
9764
9765 static bfd_boolean
9766 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9767 {
9768 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9769 }
9770
9771 static bfd_boolean
9772 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9773 {
9774 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9775 }
9776
9777 static bfd_boolean
9778 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9779 {
9780 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9781 }
9782
9783 static bfd_boolean
9784 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9785 {
9786 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9787 }
9788
9789 static bfd_boolean
9790 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9791 {
9792 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9793 }
9794
9795 static bfd_boolean
9796 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9797 {
9798 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9799 }
9800
9801 static bfd_boolean
9802 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9803 {
9804 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9805 }
9806
9807 static bfd_boolean
9808 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9809 {
9810 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9811 }
9812
9813 static bfd_boolean
9814 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9815 {
9816 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9817 }
9818
9819 static bfd_boolean
9820 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9821 {
9822 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9823 }
9824
9825 static bfd_boolean
9826 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9827 {
9828 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9829 }
9830
9831 static bfd_boolean
9832 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9833 {
9834 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9835 }
9836
9837 static bfd_boolean
9838 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9839 {
9840 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9841 }
9842
9843 #if defined (HAVE_PRPSINFO_T)
9844 typedef prpsinfo_t elfcore_psinfo_t;
9845 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9846 typedef prpsinfo32_t elfcore_psinfo32_t;
9847 #endif
9848 #endif
9849
9850 #if defined (HAVE_PSINFO_T)
9851 typedef psinfo_t elfcore_psinfo_t;
9852 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9853 typedef psinfo32_t elfcore_psinfo32_t;
9854 #endif
9855 #endif
9856
9857 /* return a malloc'ed copy of a string at START which is at
9858 most MAX bytes long, possibly without a terminating '\0'.
9859 the copy will always have a terminating '\0'. */
9860
9861 char *
9862 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9863 {
9864 char *dups;
9865 char *end = (char *) memchr (start, '\0', max);
9866 size_t len;
9867
9868 if (end == NULL)
9869 len = max;
9870 else
9871 len = end - start;
9872
9873 dups = (char *) bfd_alloc (abfd, len + 1);
9874 if (dups == NULL)
9875 return NULL;
9876
9877 memcpy (dups, start, len);
9878 dups[len] = '\0';
9879
9880 return dups;
9881 }
9882
9883 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9884 static bfd_boolean
9885 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9886 {
9887 if (note->descsz == sizeof (elfcore_psinfo_t))
9888 {
9889 elfcore_psinfo_t psinfo;
9890
9891 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9892
9893 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9894 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9895 #endif
9896 elf_tdata (abfd)->core->program
9897 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9898 sizeof (psinfo.pr_fname));
9899
9900 elf_tdata (abfd)->core->command
9901 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9902 sizeof (psinfo.pr_psargs));
9903 }
9904 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9905 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9906 {
9907 /* 64-bit host, 32-bit corefile */
9908 elfcore_psinfo32_t psinfo;
9909
9910 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9911
9912 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9913 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9914 #endif
9915 elf_tdata (abfd)->core->program
9916 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9917 sizeof (psinfo.pr_fname));
9918
9919 elf_tdata (abfd)->core->command
9920 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9921 sizeof (psinfo.pr_psargs));
9922 }
9923 #endif
9924
9925 else
9926 {
9927 /* Fail - we don't know how to handle any other
9928 note size (ie. data object type). */
9929 return TRUE;
9930 }
9931
9932 /* Note that for some reason, a spurious space is tacked
9933 onto the end of the args in some (at least one anyway)
9934 implementations, so strip it off if it exists. */
9935
9936 {
9937 char *command = elf_tdata (abfd)->core->command;
9938 int n = strlen (command);
9939
9940 if (0 < n && command[n - 1] == ' ')
9941 command[n - 1] = '\0';
9942 }
9943
9944 return TRUE;
9945 }
9946 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9947
9948 #if defined (HAVE_PSTATUS_T)
9949 static bfd_boolean
9950 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
9951 {
9952 if (note->descsz == sizeof (pstatus_t)
9953 #if defined (HAVE_PXSTATUS_T)
9954 || note->descsz == sizeof (pxstatus_t)
9955 #endif
9956 )
9957 {
9958 pstatus_t pstat;
9959
9960 memcpy (&pstat, note->descdata, sizeof (pstat));
9961
9962 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9963 }
9964 #if defined (HAVE_PSTATUS32_T)
9965 else if (note->descsz == sizeof (pstatus32_t))
9966 {
9967 /* 64-bit host, 32-bit corefile */
9968 pstatus32_t pstat;
9969
9970 memcpy (&pstat, note->descdata, sizeof (pstat));
9971
9972 elf_tdata (abfd)->core->pid = pstat.pr_pid;
9973 }
9974 #endif
9975 /* Could grab some more details from the "representative"
9976 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
9977 NT_LWPSTATUS note, presumably. */
9978
9979 return TRUE;
9980 }
9981 #endif /* defined (HAVE_PSTATUS_T) */
9982
9983 #if defined (HAVE_LWPSTATUS_T)
9984 static bfd_boolean
9985 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
9986 {
9987 lwpstatus_t lwpstat;
9988 char buf[100];
9989 char *name;
9990 size_t len;
9991 asection *sect;
9992
9993 if (note->descsz != sizeof (lwpstat)
9994 #if defined (HAVE_LWPXSTATUS_T)
9995 && note->descsz != sizeof (lwpxstatus_t)
9996 #endif
9997 )
9998 return TRUE;
9999
10000 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
10001
10002 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
10003 /* Do not overwrite the core signal if it has already been set by
10004 another thread. */
10005 if (elf_tdata (abfd)->core->signal == 0)
10006 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
10007
10008 /* Make a ".reg/999" section. */
10009
10010 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
10011 len = strlen (buf) + 1;
10012 name = bfd_alloc (abfd, len);
10013 if (name == NULL)
10014 return FALSE;
10015 memcpy (name, buf, len);
10016
10017 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10018 if (sect == NULL)
10019 return FALSE;
10020
10021 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10022 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
10023 sect->filepos = note->descpos
10024 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
10025 #endif
10026
10027 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10028 sect->size = sizeof (lwpstat.pr_reg);
10029 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
10030 #endif
10031
10032 sect->alignment_power = 2;
10033
10034 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
10035 return FALSE;
10036
10037 /* Make a ".reg2/999" section */
10038
10039 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
10040 len = strlen (buf) + 1;
10041 name = bfd_alloc (abfd, len);
10042 if (name == NULL)
10043 return FALSE;
10044 memcpy (name, buf, len);
10045
10046 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10047 if (sect == NULL)
10048 return FALSE;
10049
10050 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10051 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10052 sect->filepos = note->descpos
10053 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10054 #endif
10055
10056 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10057 sect->size = sizeof (lwpstat.pr_fpreg);
10058 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10059 #endif
10060
10061 sect->alignment_power = 2;
10062
10063 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10064 }
10065 #endif /* defined (HAVE_LWPSTATUS_T) */
10066
10067 static bfd_boolean
10068 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10069 {
10070 char buf[30];
10071 char *name;
10072 size_t len;
10073 asection *sect;
10074 int type;
10075 int is_active_thread;
10076 bfd_vma base_addr;
10077
10078 if (note->descsz < 728)
10079 return TRUE;
10080
10081 if (! CONST_STRNEQ (note->namedata, "win32"))
10082 return TRUE;
10083
10084 type = bfd_get_32 (abfd, note->descdata);
10085
10086 switch (type)
10087 {
10088 case 1 /* NOTE_INFO_PROCESS */:
10089 /* FIXME: need to add ->core->command. */
10090 /* process_info.pid */
10091 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
10092 /* process_info.signal */
10093 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
10094 break;
10095
10096 case 2 /* NOTE_INFO_THREAD */:
10097 /* Make a ".reg/999" section. */
10098 /* thread_info.tid */
10099 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
10100
10101 len = strlen (buf) + 1;
10102 name = (char *) bfd_alloc (abfd, len);
10103 if (name == NULL)
10104 return FALSE;
10105
10106 memcpy (name, buf, len);
10107
10108 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10109 if (sect == NULL)
10110 return FALSE;
10111
10112 /* sizeof (thread_info.thread_context) */
10113 sect->size = 716;
10114 /* offsetof (thread_info.thread_context) */
10115 sect->filepos = note->descpos + 12;
10116 sect->alignment_power = 2;
10117
10118 /* thread_info.is_active_thread */
10119 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10120
10121 if (is_active_thread)
10122 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10123 return FALSE;
10124 break;
10125
10126 case 3 /* NOTE_INFO_MODULE */:
10127 /* Make a ".module/xxxxxxxx" section. */
10128 /* module_info.base_address */
10129 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10130 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10131
10132 len = strlen (buf) + 1;
10133 name = (char *) bfd_alloc (abfd, len);
10134 if (name == NULL)
10135 return FALSE;
10136
10137 memcpy (name, buf, len);
10138
10139 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10140
10141 if (sect == NULL)
10142 return FALSE;
10143
10144 sect->size = note->descsz;
10145 sect->filepos = note->descpos;
10146 sect->alignment_power = 2;
10147 break;
10148
10149 default:
10150 return TRUE;
10151 }
10152
10153 return TRUE;
10154 }
10155
10156 static bfd_boolean
10157 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10158 {
10159 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10160
10161 switch (note->type)
10162 {
10163 default:
10164 return TRUE;
10165
10166 case NT_PRSTATUS:
10167 if (bed->elf_backend_grok_prstatus)
10168 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10169 return TRUE;
10170 #if defined (HAVE_PRSTATUS_T)
10171 return elfcore_grok_prstatus (abfd, note);
10172 #else
10173 return TRUE;
10174 #endif
10175
10176 #if defined (HAVE_PSTATUS_T)
10177 case NT_PSTATUS:
10178 return elfcore_grok_pstatus (abfd, note);
10179 #endif
10180
10181 #if defined (HAVE_LWPSTATUS_T)
10182 case NT_LWPSTATUS:
10183 return elfcore_grok_lwpstatus (abfd, note);
10184 #endif
10185
10186 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10187 return elfcore_grok_prfpreg (abfd, note);
10188
10189 case NT_WIN32PSTATUS:
10190 return elfcore_grok_win32pstatus (abfd, note);
10191
10192 case NT_PRXFPREG: /* Linux SSE extension */
10193 if (note->namesz == 6
10194 && strcmp (note->namedata, "LINUX") == 0)
10195 return elfcore_grok_prxfpreg (abfd, note);
10196 else
10197 return TRUE;
10198
10199 case NT_X86_XSTATE: /* Linux XSAVE extension */
10200 if (note->namesz == 6
10201 && strcmp (note->namedata, "LINUX") == 0)
10202 return elfcore_grok_xstatereg (abfd, note);
10203 else
10204 return TRUE;
10205
10206 case NT_PPC_VMX:
10207 if (note->namesz == 6
10208 && strcmp (note->namedata, "LINUX") == 0)
10209 return elfcore_grok_ppc_vmx (abfd, note);
10210 else
10211 return TRUE;
10212
10213 case NT_PPC_VSX:
10214 if (note->namesz == 6
10215 && strcmp (note->namedata, "LINUX") == 0)
10216 return elfcore_grok_ppc_vsx (abfd, note);
10217 else
10218 return TRUE;
10219
10220 case NT_PPC_TAR:
10221 if (note->namesz == 6
10222 && strcmp (note->namedata, "LINUX") == 0)
10223 return elfcore_grok_ppc_tar (abfd, note);
10224 else
10225 return TRUE;
10226
10227 case NT_PPC_PPR:
10228 if (note->namesz == 6
10229 && strcmp (note->namedata, "LINUX") == 0)
10230 return elfcore_grok_ppc_ppr (abfd, note);
10231 else
10232 return TRUE;
10233
10234 case NT_PPC_DSCR:
10235 if (note->namesz == 6
10236 && strcmp (note->namedata, "LINUX") == 0)
10237 return elfcore_grok_ppc_dscr (abfd, note);
10238 else
10239 return TRUE;
10240
10241 case NT_PPC_EBB:
10242 if (note->namesz == 6
10243 && strcmp (note->namedata, "LINUX") == 0)
10244 return elfcore_grok_ppc_ebb (abfd, note);
10245 else
10246 return TRUE;
10247
10248 case NT_PPC_PMU:
10249 if (note->namesz == 6
10250 && strcmp (note->namedata, "LINUX") == 0)
10251 return elfcore_grok_ppc_pmu (abfd, note);
10252 else
10253 return TRUE;
10254
10255 case NT_PPC_TM_CGPR:
10256 if (note->namesz == 6
10257 && strcmp (note->namedata, "LINUX") == 0)
10258 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10259 else
10260 return TRUE;
10261
10262 case NT_PPC_TM_CFPR:
10263 if (note->namesz == 6
10264 && strcmp (note->namedata, "LINUX") == 0)
10265 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10266 else
10267 return TRUE;
10268
10269 case NT_PPC_TM_CVMX:
10270 if (note->namesz == 6
10271 && strcmp (note->namedata, "LINUX") == 0)
10272 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10273 else
10274 return TRUE;
10275
10276 case NT_PPC_TM_CVSX:
10277 if (note->namesz == 6
10278 && strcmp (note->namedata, "LINUX") == 0)
10279 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10280 else
10281 return TRUE;
10282
10283 case NT_PPC_TM_SPR:
10284 if (note->namesz == 6
10285 && strcmp (note->namedata, "LINUX") == 0)
10286 return elfcore_grok_ppc_tm_spr (abfd, note);
10287 else
10288 return TRUE;
10289
10290 case NT_PPC_TM_CTAR:
10291 if (note->namesz == 6
10292 && strcmp (note->namedata, "LINUX") == 0)
10293 return elfcore_grok_ppc_tm_ctar (abfd, note);
10294 else
10295 return TRUE;
10296
10297 case NT_PPC_TM_CPPR:
10298 if (note->namesz == 6
10299 && strcmp (note->namedata, "LINUX") == 0)
10300 return elfcore_grok_ppc_tm_cppr (abfd, note);
10301 else
10302 return TRUE;
10303
10304 case NT_PPC_TM_CDSCR:
10305 if (note->namesz == 6
10306 && strcmp (note->namedata, "LINUX") == 0)
10307 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10308 else
10309 return TRUE;
10310
10311 case NT_S390_HIGH_GPRS:
10312 if (note->namesz == 6
10313 && strcmp (note->namedata, "LINUX") == 0)
10314 return elfcore_grok_s390_high_gprs (abfd, note);
10315 else
10316 return TRUE;
10317
10318 case NT_S390_TIMER:
10319 if (note->namesz == 6
10320 && strcmp (note->namedata, "LINUX") == 0)
10321 return elfcore_grok_s390_timer (abfd, note);
10322 else
10323 return TRUE;
10324
10325 case NT_S390_TODCMP:
10326 if (note->namesz == 6
10327 && strcmp (note->namedata, "LINUX") == 0)
10328 return elfcore_grok_s390_todcmp (abfd, note);
10329 else
10330 return TRUE;
10331
10332 case NT_S390_TODPREG:
10333 if (note->namesz == 6
10334 && strcmp (note->namedata, "LINUX") == 0)
10335 return elfcore_grok_s390_todpreg (abfd, note);
10336 else
10337 return TRUE;
10338
10339 case NT_S390_CTRS:
10340 if (note->namesz == 6
10341 && strcmp (note->namedata, "LINUX") == 0)
10342 return elfcore_grok_s390_ctrs (abfd, note);
10343 else
10344 return TRUE;
10345
10346 case NT_S390_PREFIX:
10347 if (note->namesz == 6
10348 && strcmp (note->namedata, "LINUX") == 0)
10349 return elfcore_grok_s390_prefix (abfd, note);
10350 else
10351 return TRUE;
10352
10353 case NT_S390_LAST_BREAK:
10354 if (note->namesz == 6
10355 && strcmp (note->namedata, "LINUX") == 0)
10356 return elfcore_grok_s390_last_break (abfd, note);
10357 else
10358 return TRUE;
10359
10360 case NT_S390_SYSTEM_CALL:
10361 if (note->namesz == 6
10362 && strcmp (note->namedata, "LINUX") == 0)
10363 return elfcore_grok_s390_system_call (abfd, note);
10364 else
10365 return TRUE;
10366
10367 case NT_S390_TDB:
10368 if (note->namesz == 6
10369 && strcmp (note->namedata, "LINUX") == 0)
10370 return elfcore_grok_s390_tdb (abfd, note);
10371 else
10372 return TRUE;
10373
10374 case NT_S390_VXRS_LOW:
10375 if (note->namesz == 6
10376 && strcmp (note->namedata, "LINUX") == 0)
10377 return elfcore_grok_s390_vxrs_low (abfd, note);
10378 else
10379 return TRUE;
10380
10381 case NT_S390_VXRS_HIGH:
10382 if (note->namesz == 6
10383 && strcmp (note->namedata, "LINUX") == 0)
10384 return elfcore_grok_s390_vxrs_high (abfd, note);
10385 else
10386 return TRUE;
10387
10388 case NT_S390_GS_CB:
10389 if (note->namesz == 6
10390 && strcmp (note->namedata, "LINUX") == 0)
10391 return elfcore_grok_s390_gs_cb (abfd, note);
10392 else
10393 return TRUE;
10394
10395 case NT_S390_GS_BC:
10396 if (note->namesz == 6
10397 && strcmp (note->namedata, "LINUX") == 0)
10398 return elfcore_grok_s390_gs_bc (abfd, note);
10399 else
10400 return TRUE;
10401
10402 case NT_ARM_VFP:
10403 if (note->namesz == 6
10404 && strcmp (note->namedata, "LINUX") == 0)
10405 return elfcore_grok_arm_vfp (abfd, note);
10406 else
10407 return TRUE;
10408
10409 case NT_ARM_TLS:
10410 if (note->namesz == 6
10411 && strcmp (note->namedata, "LINUX") == 0)
10412 return elfcore_grok_aarch_tls (abfd, note);
10413 else
10414 return TRUE;
10415
10416 case NT_ARM_HW_BREAK:
10417 if (note->namesz == 6
10418 && strcmp (note->namedata, "LINUX") == 0)
10419 return elfcore_grok_aarch_hw_break (abfd, note);
10420 else
10421 return TRUE;
10422
10423 case NT_ARM_HW_WATCH:
10424 if (note->namesz == 6
10425 && strcmp (note->namedata, "LINUX") == 0)
10426 return elfcore_grok_aarch_hw_watch (abfd, note);
10427 else
10428 return TRUE;
10429
10430 case NT_ARM_SVE:
10431 if (note->namesz == 6
10432 && strcmp (note->namedata, "LINUX") == 0)
10433 return elfcore_grok_aarch_sve (abfd, note);
10434 else
10435 return TRUE;
10436
10437 case NT_ARM_PAC_MASK:
10438 if (note->namesz == 6
10439 && strcmp (note->namedata, "LINUX") == 0)
10440 return elfcore_grok_aarch_pauth (abfd, note);
10441 else
10442 return TRUE;
10443
10444 case NT_PRPSINFO:
10445 case NT_PSINFO:
10446 if (bed->elf_backend_grok_psinfo)
10447 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10448 return TRUE;
10449 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10450 return elfcore_grok_psinfo (abfd, note);
10451 #else
10452 return TRUE;
10453 #endif
10454
10455 case NT_AUXV:
10456 return elfcore_make_auxv_note_section (abfd, note, 0);
10457
10458 case NT_FILE:
10459 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10460 note);
10461
10462 case NT_SIGINFO:
10463 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10464 note);
10465
10466 }
10467 }
10468
10469 static bfd_boolean
10470 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10471 {
10472 struct bfd_build_id* build_id;
10473
10474 if (note->descsz == 0)
10475 return FALSE;
10476
10477 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10478 if (build_id == NULL)
10479 return FALSE;
10480
10481 build_id->size = note->descsz;
10482 memcpy (build_id->data, note->descdata, note->descsz);
10483 abfd->build_id = build_id;
10484
10485 return TRUE;
10486 }
10487
10488 static bfd_boolean
10489 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10490 {
10491 switch (note->type)
10492 {
10493 default:
10494 return TRUE;
10495
10496 case NT_GNU_PROPERTY_TYPE_0:
10497 return _bfd_elf_parse_gnu_properties (abfd, note);
10498
10499 case NT_GNU_BUILD_ID:
10500 return elfobj_grok_gnu_build_id (abfd, note);
10501 }
10502 }
10503
10504 static bfd_boolean
10505 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10506 {
10507 struct sdt_note *cur =
10508 (struct sdt_note *) bfd_alloc (abfd,
10509 sizeof (struct sdt_note) + note->descsz);
10510
10511 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10512 cur->size = (bfd_size_type) note->descsz;
10513 memcpy (cur->data, note->descdata, note->descsz);
10514
10515 elf_tdata (abfd)->sdt_note_head = cur;
10516
10517 return TRUE;
10518 }
10519
10520 static bfd_boolean
10521 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10522 {
10523 switch (note->type)
10524 {
10525 case NT_STAPSDT:
10526 return elfobj_grok_stapsdt_note_1 (abfd, note);
10527
10528 default:
10529 return TRUE;
10530 }
10531 }
10532
10533 static bfd_boolean
10534 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10535 {
10536 size_t offset;
10537
10538 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10539 {
10540 case ELFCLASS32:
10541 if (note->descsz < 108)
10542 return FALSE;
10543 break;
10544
10545 case ELFCLASS64:
10546 if (note->descsz < 120)
10547 return FALSE;
10548 break;
10549
10550 default:
10551 return FALSE;
10552 }
10553
10554 /* Check for version 1 in pr_version. */
10555 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10556 return FALSE;
10557
10558 offset = 4;
10559
10560 /* Skip over pr_psinfosz. */
10561 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10562 offset += 4;
10563 else
10564 {
10565 offset += 4; /* Padding before pr_psinfosz. */
10566 offset += 8;
10567 }
10568
10569 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10570 elf_tdata (abfd)->core->program
10571 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10572 offset += 17;
10573
10574 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10575 elf_tdata (abfd)->core->command
10576 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10577 offset += 81;
10578
10579 /* Padding before pr_pid. */
10580 offset += 2;
10581
10582 /* The pr_pid field was added in version "1a". */
10583 if (note->descsz < offset + 4)
10584 return TRUE;
10585
10586 elf_tdata (abfd)->core->pid
10587 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10588
10589 return TRUE;
10590 }
10591
10592 static bfd_boolean
10593 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10594 {
10595 size_t offset;
10596 size_t size;
10597 size_t min_size;
10598
10599 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10600 Also compute minimum size of this note. */
10601 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10602 {
10603 case ELFCLASS32:
10604 offset = 4 + 4;
10605 min_size = offset + (4 * 2) + 4 + 4 + 4;
10606 break;
10607
10608 case ELFCLASS64:
10609 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10610 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10611 break;
10612
10613 default:
10614 return FALSE;
10615 }
10616
10617 if (note->descsz < min_size)
10618 return FALSE;
10619
10620 /* Check for version 1 in pr_version. */
10621 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10622 return FALSE;
10623
10624 /* Extract size of pr_reg from pr_gregsetsz. */
10625 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10626 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10627 {
10628 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10629 offset += 4 * 2;
10630 }
10631 else
10632 {
10633 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10634 offset += 8 * 2;
10635 }
10636
10637 /* Skip over pr_osreldate. */
10638 offset += 4;
10639
10640 /* Read signal from pr_cursig. */
10641 if (elf_tdata (abfd)->core->signal == 0)
10642 elf_tdata (abfd)->core->signal
10643 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10644 offset += 4;
10645
10646 /* Read TID from pr_pid. */
10647 elf_tdata (abfd)->core->lwpid
10648 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10649 offset += 4;
10650
10651 /* Padding before pr_reg. */
10652 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10653 offset += 4;
10654
10655 /* Make sure that there is enough data remaining in the note. */
10656 if ((note->descsz - offset) < size)
10657 return FALSE;
10658
10659 /* Make a ".reg/999" section and a ".reg" section. */
10660 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10661 size, note->descpos + offset);
10662 }
10663
10664 static bfd_boolean
10665 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10666 {
10667 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10668
10669 switch (note->type)
10670 {
10671 case NT_PRSTATUS:
10672 if (bed->elf_backend_grok_freebsd_prstatus)
10673 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10674 return TRUE;
10675 return elfcore_grok_freebsd_prstatus (abfd, note);
10676
10677 case NT_FPREGSET:
10678 return elfcore_grok_prfpreg (abfd, note);
10679
10680 case NT_PRPSINFO:
10681 return elfcore_grok_freebsd_psinfo (abfd, note);
10682
10683 case NT_FREEBSD_THRMISC:
10684 if (note->namesz == 8)
10685 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10686 else
10687 return TRUE;
10688
10689 case NT_FREEBSD_PROCSTAT_PROC:
10690 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10691 note);
10692
10693 case NT_FREEBSD_PROCSTAT_FILES:
10694 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10695 note);
10696
10697 case NT_FREEBSD_PROCSTAT_VMMAP:
10698 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10699 note);
10700
10701 case NT_FREEBSD_PROCSTAT_AUXV:
10702 return elfcore_make_auxv_note_section (abfd, note, 4);
10703
10704 case NT_X86_XSTATE:
10705 if (note->namesz == 8)
10706 return elfcore_grok_xstatereg (abfd, note);
10707 else
10708 return TRUE;
10709
10710 case NT_FREEBSD_PTLWPINFO:
10711 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10712 note);
10713
10714 case NT_ARM_VFP:
10715 return elfcore_grok_arm_vfp (abfd, note);
10716
10717 default:
10718 return TRUE;
10719 }
10720 }
10721
10722 static bfd_boolean
10723 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10724 {
10725 char *cp;
10726
10727 cp = strchr (note->namedata, '@');
10728 if (cp != NULL)
10729 {
10730 *lwpidp = atoi(cp + 1);
10731 return TRUE;
10732 }
10733 return FALSE;
10734 }
10735
10736 static bfd_boolean
10737 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10738 {
10739 if (note->descsz <= 0x7c + 31)
10740 return FALSE;
10741
10742 /* Signal number at offset 0x08. */
10743 elf_tdata (abfd)->core->signal
10744 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10745
10746 /* Process ID at offset 0x50. */
10747 elf_tdata (abfd)->core->pid
10748 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10749
10750 /* Command name at 0x7c (max 32 bytes, including nul). */
10751 elf_tdata (abfd)->core->command
10752 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10753
10754 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10755 note);
10756 }
10757
10758 static bfd_boolean
10759 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10760 {
10761 int lwp;
10762
10763 if (elfcore_netbsd_get_lwpid (note, &lwp))
10764 elf_tdata (abfd)->core->lwpid = lwp;
10765
10766 switch (note->type)
10767 {
10768 case NT_NETBSDCORE_PROCINFO:
10769 /* NetBSD-specific core "procinfo". Note that we expect to
10770 find this note before any of the others, which is fine,
10771 since the kernel writes this note out first when it
10772 creates a core file. */
10773 return elfcore_grok_netbsd_procinfo (abfd, note);
10774 #ifdef NT_NETBSDCORE_AUXV
10775 case NT_NETBSDCORE_AUXV:
10776 /* NetBSD-specific Elf Auxiliary Vector data. */
10777 return elfcore_make_auxv_note_section (abfd, note, 4);
10778 #endif
10779 #ifdef NT_NETBSDCORE_LWPSTATUS
10780 case NT_NETBSDCORE_LWPSTATUS:
10781 return elfcore_make_note_pseudosection (abfd,
10782 ".note.netbsdcore.lwpstatus",
10783 note);
10784 #endif
10785 default:
10786 break;
10787 }
10788
10789 /* As of March 2020 there are no other machine-independent notes
10790 defined for NetBSD core files. If the note type is less
10791 than the start of the machine-dependent note types, we don't
10792 understand it. */
10793
10794 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10795 return TRUE;
10796
10797
10798 switch (bfd_get_arch (abfd))
10799 {
10800 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10801 PT_GETFPREGS == mach+2. */
10802
10803 case bfd_arch_aarch64:
10804 case bfd_arch_alpha:
10805 case bfd_arch_sparc:
10806 switch (note->type)
10807 {
10808 case NT_NETBSDCORE_FIRSTMACH+0:
10809 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10810
10811 case NT_NETBSDCORE_FIRSTMACH+2:
10812 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10813
10814 default:
10815 return TRUE;
10816 }
10817
10818 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10819 There's also old PT___GETREGS40 == mach + 1 for old reg
10820 structure which lacks GBR. */
10821
10822 case bfd_arch_sh:
10823 switch (note->type)
10824 {
10825 case NT_NETBSDCORE_FIRSTMACH+3:
10826 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10827
10828 case NT_NETBSDCORE_FIRSTMACH+5:
10829 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10830
10831 default:
10832 return TRUE;
10833 }
10834
10835 /* On all other arch's, PT_GETREGS == mach+1 and
10836 PT_GETFPREGS == mach+3. */
10837
10838 default:
10839 switch (note->type)
10840 {
10841 case NT_NETBSDCORE_FIRSTMACH+1:
10842 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10843
10844 case NT_NETBSDCORE_FIRSTMACH+3:
10845 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10846
10847 default:
10848 return TRUE;
10849 }
10850 }
10851 /* NOTREACHED */
10852 }
10853
10854 static bfd_boolean
10855 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10856 {
10857 if (note->descsz <= 0x48 + 31)
10858 return FALSE;
10859
10860 /* Signal number at offset 0x08. */
10861 elf_tdata (abfd)->core->signal
10862 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10863
10864 /* Process ID at offset 0x20. */
10865 elf_tdata (abfd)->core->pid
10866 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10867
10868 /* Command name at 0x48 (max 32 bytes, including nul). */
10869 elf_tdata (abfd)->core->command
10870 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10871
10872 return TRUE;
10873 }
10874
10875 static bfd_boolean
10876 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10877 {
10878 if (note->type == NT_OPENBSD_PROCINFO)
10879 return elfcore_grok_openbsd_procinfo (abfd, note);
10880
10881 if (note->type == NT_OPENBSD_REGS)
10882 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10883
10884 if (note->type == NT_OPENBSD_FPREGS)
10885 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10886
10887 if (note->type == NT_OPENBSD_XFPREGS)
10888 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10889
10890 if (note->type == NT_OPENBSD_AUXV)
10891 return elfcore_make_auxv_note_section (abfd, note, 0);
10892
10893 if (note->type == NT_OPENBSD_WCOOKIE)
10894 {
10895 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10896 SEC_HAS_CONTENTS);
10897
10898 if (sect == NULL)
10899 return FALSE;
10900 sect->size = note->descsz;
10901 sect->filepos = note->descpos;
10902 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10903
10904 return TRUE;
10905 }
10906
10907 return TRUE;
10908 }
10909
10910 static bfd_boolean
10911 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
10912 {
10913 void *ddata = note->descdata;
10914 char buf[100];
10915 char *name;
10916 asection *sect;
10917 short sig;
10918 unsigned flags;
10919
10920 if (note->descsz < 16)
10921 return FALSE;
10922
10923 /* nto_procfs_status 'pid' field is at offset 0. */
10924 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
10925
10926 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10927 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
10928
10929 /* nto_procfs_status 'flags' field is at offset 8. */
10930 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
10931
10932 /* nto_procfs_status 'what' field is at offset 14. */
10933 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
10934 {
10935 elf_tdata (abfd)->core->signal = sig;
10936 elf_tdata (abfd)->core->lwpid = *tid;
10937 }
10938
10939 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10940 do not come from signals so we make sure we set the current
10941 thread just in case. */
10942 if (flags & 0x00000080)
10943 elf_tdata (abfd)->core->lwpid = *tid;
10944
10945 /* Make a ".qnx_core_status/%d" section. */
10946 sprintf (buf, ".qnx_core_status/%ld", *tid);
10947
10948 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10949 if (name == NULL)
10950 return FALSE;
10951 strcpy (name, buf);
10952
10953 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10954 if (sect == NULL)
10955 return FALSE;
10956
10957 sect->size = note->descsz;
10958 sect->filepos = note->descpos;
10959 sect->alignment_power = 2;
10960
10961 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
10962 }
10963
10964 static bfd_boolean
10965 elfcore_grok_nto_regs (bfd *abfd,
10966 Elf_Internal_Note *note,
10967 long tid,
10968 char *base)
10969 {
10970 char buf[100];
10971 char *name;
10972 asection *sect;
10973
10974 /* Make a "(base)/%d" section. */
10975 sprintf (buf, "%s/%ld", base, tid);
10976
10977 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
10978 if (name == NULL)
10979 return FALSE;
10980 strcpy (name, buf);
10981
10982 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10983 if (sect == NULL)
10984 return FALSE;
10985
10986 sect->size = note->descsz;
10987 sect->filepos = note->descpos;
10988 sect->alignment_power = 2;
10989
10990 /* This is the current thread. */
10991 if (elf_tdata (abfd)->core->lwpid == tid)
10992 return elfcore_maybe_make_sect (abfd, base, sect);
10993
10994 return TRUE;
10995 }
10996
10997 #define BFD_QNT_CORE_INFO 7
10998 #define BFD_QNT_CORE_STATUS 8
10999 #define BFD_QNT_CORE_GREG 9
11000 #define BFD_QNT_CORE_FPREG 10
11001
11002 static bfd_boolean
11003 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
11004 {
11005 /* Every GREG section has a STATUS section before it. Store the
11006 tid from the previous call to pass down to the next gregs
11007 function. */
11008 static long tid = 1;
11009
11010 switch (note->type)
11011 {
11012 case BFD_QNT_CORE_INFO:
11013 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
11014 case BFD_QNT_CORE_STATUS:
11015 return elfcore_grok_nto_status (abfd, note, &tid);
11016 case BFD_QNT_CORE_GREG:
11017 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
11018 case BFD_QNT_CORE_FPREG:
11019 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
11020 default:
11021 return TRUE;
11022 }
11023 }
11024
11025 static bfd_boolean
11026 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
11027 {
11028 char *name;
11029 asection *sect;
11030 size_t len;
11031
11032 /* Use note name as section name. */
11033 len = note->namesz;
11034 name = (char *) bfd_alloc (abfd, len);
11035 if (name == NULL)
11036 return FALSE;
11037 memcpy (name, note->namedata, len);
11038 name[len - 1] = '\0';
11039
11040 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11041 if (sect == NULL)
11042 return FALSE;
11043
11044 sect->size = note->descsz;
11045 sect->filepos = note->descpos;
11046 sect->alignment_power = 1;
11047
11048 return TRUE;
11049 }
11050
11051 /* Function: elfcore_write_note
11052
11053 Inputs:
11054 buffer to hold note, and current size of buffer
11055 name of note
11056 type of note
11057 data for note
11058 size of data for note
11059
11060 Writes note to end of buffer. ELF64 notes are written exactly as
11061 for ELF32, despite the current (as of 2006) ELF gabi specifying
11062 that they ought to have 8-byte namesz and descsz field, and have
11063 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11064
11065 Return:
11066 Pointer to realloc'd buffer, *BUFSIZ updated. */
11067
11068 char *
11069 elfcore_write_note (bfd *abfd,
11070 char *buf,
11071 int *bufsiz,
11072 const char *name,
11073 int type,
11074 const void *input,
11075 int size)
11076 {
11077 Elf_External_Note *xnp;
11078 size_t namesz;
11079 size_t newspace;
11080 char *dest;
11081
11082 namesz = 0;
11083 if (name != NULL)
11084 namesz = strlen (name) + 1;
11085
11086 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11087
11088 buf = (char *) realloc (buf, *bufsiz + newspace);
11089 if (buf == NULL)
11090 return buf;
11091 dest = buf + *bufsiz;
11092 *bufsiz += newspace;
11093 xnp = (Elf_External_Note *) dest;
11094 H_PUT_32 (abfd, namesz, xnp->namesz);
11095 H_PUT_32 (abfd, size, xnp->descsz);
11096 H_PUT_32 (abfd, type, xnp->type);
11097 dest = xnp->name;
11098 if (name != NULL)
11099 {
11100 memcpy (dest, name, namesz);
11101 dest += namesz;
11102 while (namesz & 3)
11103 {
11104 *dest++ = '\0';
11105 ++namesz;
11106 }
11107 }
11108 memcpy (dest, input, size);
11109 dest += size;
11110 while (size & 3)
11111 {
11112 *dest++ = '\0';
11113 ++size;
11114 }
11115 return buf;
11116 }
11117
11118 /* gcc-8 warns (*) on all the strncpy calls in this function about
11119 possible string truncation. The "truncation" is not a bug. We
11120 have an external representation of structs with fields that are not
11121 necessarily NULL terminated and corresponding internal
11122 representation fields that are one larger so that they can always
11123 be NULL terminated.
11124 gcc versions between 4.2 and 4.6 do not allow pragma control of
11125 diagnostics inside functions, giving a hard error if you try to use
11126 the finer control available with later versions.
11127 gcc prior to 4.2 warns about diagnostic push and pop.
11128 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11129 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11130 (*) Depending on your system header files! */
11131 #if GCC_VERSION >= 8000
11132 # pragma GCC diagnostic push
11133 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11134 #endif
11135 char *
11136 elfcore_write_prpsinfo (bfd *abfd,
11137 char *buf,
11138 int *bufsiz,
11139 const char *fname,
11140 const char *psargs)
11141 {
11142 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11143
11144 if (bed->elf_backend_write_core_note != NULL)
11145 {
11146 char *ret;
11147 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11148 NT_PRPSINFO, fname, psargs);
11149 if (ret != NULL)
11150 return ret;
11151 }
11152
11153 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11154 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11155 if (bed->s->elfclass == ELFCLASS32)
11156 {
11157 # if defined (HAVE_PSINFO32_T)
11158 psinfo32_t data;
11159 int note_type = NT_PSINFO;
11160 # else
11161 prpsinfo32_t data;
11162 int note_type = NT_PRPSINFO;
11163 # endif
11164
11165 memset (&data, 0, sizeof (data));
11166 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11167 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11168 return elfcore_write_note (abfd, buf, bufsiz,
11169 "CORE", note_type, &data, sizeof (data));
11170 }
11171 else
11172 # endif
11173 {
11174 # if defined (HAVE_PSINFO_T)
11175 psinfo_t data;
11176 int note_type = NT_PSINFO;
11177 # else
11178 prpsinfo_t data;
11179 int note_type = NT_PRPSINFO;
11180 # endif
11181
11182 memset (&data, 0, sizeof (data));
11183 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11184 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11185 return elfcore_write_note (abfd, buf, bufsiz,
11186 "CORE", note_type, &data, sizeof (data));
11187 }
11188 #endif /* PSINFO_T or PRPSINFO_T */
11189
11190 free (buf);
11191 return NULL;
11192 }
11193 #if GCC_VERSION >= 8000
11194 # pragma GCC diagnostic pop
11195 #endif
11196
11197 char *
11198 elfcore_write_linux_prpsinfo32
11199 (bfd *abfd, char *buf, int *bufsiz,
11200 const struct elf_internal_linux_prpsinfo *prpsinfo)
11201 {
11202 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11203 {
11204 struct elf_external_linux_prpsinfo32_ugid16 data;
11205
11206 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11207 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11208 &data, sizeof (data));
11209 }
11210 else
11211 {
11212 struct elf_external_linux_prpsinfo32_ugid32 data;
11213
11214 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11215 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11216 &data, sizeof (data));
11217 }
11218 }
11219
11220 char *
11221 elfcore_write_linux_prpsinfo64
11222 (bfd *abfd, char *buf, int *bufsiz,
11223 const struct elf_internal_linux_prpsinfo *prpsinfo)
11224 {
11225 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11226 {
11227 struct elf_external_linux_prpsinfo64_ugid16 data;
11228
11229 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11230 return elfcore_write_note (abfd, buf, bufsiz,
11231 "CORE", NT_PRPSINFO, &data, sizeof (data));
11232 }
11233 else
11234 {
11235 struct elf_external_linux_prpsinfo64_ugid32 data;
11236
11237 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11238 return elfcore_write_note (abfd, buf, bufsiz,
11239 "CORE", NT_PRPSINFO, &data, sizeof (data));
11240 }
11241 }
11242
11243 char *
11244 elfcore_write_prstatus (bfd *abfd,
11245 char *buf,
11246 int *bufsiz,
11247 long pid,
11248 int cursig,
11249 const void *gregs)
11250 {
11251 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11252
11253 if (bed->elf_backend_write_core_note != NULL)
11254 {
11255 char *ret;
11256 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11257 NT_PRSTATUS,
11258 pid, cursig, gregs);
11259 if (ret != NULL)
11260 return ret;
11261 }
11262
11263 #if defined (HAVE_PRSTATUS_T)
11264 #if defined (HAVE_PRSTATUS32_T)
11265 if (bed->s->elfclass == ELFCLASS32)
11266 {
11267 prstatus32_t prstat;
11268
11269 memset (&prstat, 0, sizeof (prstat));
11270 prstat.pr_pid = pid;
11271 prstat.pr_cursig = cursig;
11272 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11273 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11274 NT_PRSTATUS, &prstat, sizeof (prstat));
11275 }
11276 else
11277 #endif
11278 {
11279 prstatus_t prstat;
11280
11281 memset (&prstat, 0, sizeof (prstat));
11282 prstat.pr_pid = pid;
11283 prstat.pr_cursig = cursig;
11284 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11285 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11286 NT_PRSTATUS, &prstat, sizeof (prstat));
11287 }
11288 #endif /* HAVE_PRSTATUS_T */
11289
11290 free (buf);
11291 return NULL;
11292 }
11293
11294 #if defined (HAVE_LWPSTATUS_T)
11295 char *
11296 elfcore_write_lwpstatus (bfd *abfd,
11297 char *buf,
11298 int *bufsiz,
11299 long pid,
11300 int cursig,
11301 const void *gregs)
11302 {
11303 lwpstatus_t lwpstat;
11304 const char *note_name = "CORE";
11305
11306 memset (&lwpstat, 0, sizeof (lwpstat));
11307 lwpstat.pr_lwpid = pid >> 16;
11308 lwpstat.pr_cursig = cursig;
11309 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11310 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11311 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11312 #if !defined(gregs)
11313 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11314 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11315 #else
11316 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11317 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11318 #endif
11319 #endif
11320 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11321 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11322 }
11323 #endif /* HAVE_LWPSTATUS_T */
11324
11325 #if defined (HAVE_PSTATUS_T)
11326 char *
11327 elfcore_write_pstatus (bfd *abfd,
11328 char *buf,
11329 int *bufsiz,
11330 long pid,
11331 int cursig ATTRIBUTE_UNUSED,
11332 const void *gregs ATTRIBUTE_UNUSED)
11333 {
11334 const char *note_name = "CORE";
11335 #if defined (HAVE_PSTATUS32_T)
11336 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11337
11338 if (bed->s->elfclass == ELFCLASS32)
11339 {
11340 pstatus32_t pstat;
11341
11342 memset (&pstat, 0, sizeof (pstat));
11343 pstat.pr_pid = pid & 0xffff;
11344 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11345 NT_PSTATUS, &pstat, sizeof (pstat));
11346 return buf;
11347 }
11348 else
11349 #endif
11350 {
11351 pstatus_t pstat;
11352
11353 memset (&pstat, 0, sizeof (pstat));
11354 pstat.pr_pid = pid & 0xffff;
11355 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11356 NT_PSTATUS, &pstat, sizeof (pstat));
11357 return buf;
11358 }
11359 }
11360 #endif /* HAVE_PSTATUS_T */
11361
11362 char *
11363 elfcore_write_prfpreg (bfd *abfd,
11364 char *buf,
11365 int *bufsiz,
11366 const void *fpregs,
11367 int size)
11368 {
11369 const char *note_name = "CORE";
11370 return elfcore_write_note (abfd, buf, bufsiz,
11371 note_name, NT_FPREGSET, fpregs, size);
11372 }
11373
11374 char *
11375 elfcore_write_prxfpreg (bfd *abfd,
11376 char *buf,
11377 int *bufsiz,
11378 const void *xfpregs,
11379 int size)
11380 {
11381 char *note_name = "LINUX";
11382 return elfcore_write_note (abfd, buf, bufsiz,
11383 note_name, NT_PRXFPREG, xfpregs, size);
11384 }
11385
11386 char *
11387 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11388 const void *xfpregs, int size)
11389 {
11390 char *note_name;
11391 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11392 note_name = "FreeBSD";
11393 else
11394 note_name = "LINUX";
11395 return elfcore_write_note (abfd, buf, bufsiz,
11396 note_name, NT_X86_XSTATE, xfpregs, size);
11397 }
11398
11399 char *
11400 elfcore_write_ppc_vmx (bfd *abfd,
11401 char *buf,
11402 int *bufsiz,
11403 const void *ppc_vmx,
11404 int size)
11405 {
11406 char *note_name = "LINUX";
11407 return elfcore_write_note (abfd, buf, bufsiz,
11408 note_name, NT_PPC_VMX, ppc_vmx, size);
11409 }
11410
11411 char *
11412 elfcore_write_ppc_vsx (bfd *abfd,
11413 char *buf,
11414 int *bufsiz,
11415 const void *ppc_vsx,
11416 int size)
11417 {
11418 char *note_name = "LINUX";
11419 return elfcore_write_note (abfd, buf, bufsiz,
11420 note_name, NT_PPC_VSX, ppc_vsx, size);
11421 }
11422
11423 char *
11424 elfcore_write_ppc_tar (bfd *abfd,
11425 char *buf,
11426 int *bufsiz,
11427 const void *ppc_tar,
11428 int size)
11429 {
11430 char *note_name = "LINUX";
11431 return elfcore_write_note (abfd, buf, bufsiz,
11432 note_name, NT_PPC_TAR, ppc_tar, size);
11433 }
11434
11435 char *
11436 elfcore_write_ppc_ppr (bfd *abfd,
11437 char *buf,
11438 int *bufsiz,
11439 const void *ppc_ppr,
11440 int size)
11441 {
11442 char *note_name = "LINUX";
11443 return elfcore_write_note (abfd, buf, bufsiz,
11444 note_name, NT_PPC_PPR, ppc_ppr, size);
11445 }
11446
11447 char *
11448 elfcore_write_ppc_dscr (bfd *abfd,
11449 char *buf,
11450 int *bufsiz,
11451 const void *ppc_dscr,
11452 int size)
11453 {
11454 char *note_name = "LINUX";
11455 return elfcore_write_note (abfd, buf, bufsiz,
11456 note_name, NT_PPC_DSCR, ppc_dscr, size);
11457 }
11458
11459 char *
11460 elfcore_write_ppc_ebb (bfd *abfd,
11461 char *buf,
11462 int *bufsiz,
11463 const void *ppc_ebb,
11464 int size)
11465 {
11466 char *note_name = "LINUX";
11467 return elfcore_write_note (abfd, buf, bufsiz,
11468 note_name, NT_PPC_EBB, ppc_ebb, size);
11469 }
11470
11471 char *
11472 elfcore_write_ppc_pmu (bfd *abfd,
11473 char *buf,
11474 int *bufsiz,
11475 const void *ppc_pmu,
11476 int size)
11477 {
11478 char *note_name = "LINUX";
11479 return elfcore_write_note (abfd, buf, bufsiz,
11480 note_name, NT_PPC_PMU, ppc_pmu, size);
11481 }
11482
11483 char *
11484 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11485 char *buf,
11486 int *bufsiz,
11487 const void *ppc_tm_cgpr,
11488 int size)
11489 {
11490 char *note_name = "LINUX";
11491 return elfcore_write_note (abfd, buf, bufsiz,
11492 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11493 }
11494
11495 char *
11496 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11497 char *buf,
11498 int *bufsiz,
11499 const void *ppc_tm_cfpr,
11500 int size)
11501 {
11502 char *note_name = "LINUX";
11503 return elfcore_write_note (abfd, buf, bufsiz,
11504 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11505 }
11506
11507 char *
11508 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11509 char *buf,
11510 int *bufsiz,
11511 const void *ppc_tm_cvmx,
11512 int size)
11513 {
11514 char *note_name = "LINUX";
11515 return elfcore_write_note (abfd, buf, bufsiz,
11516 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11517 }
11518
11519 char *
11520 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11521 char *buf,
11522 int *bufsiz,
11523 const void *ppc_tm_cvsx,
11524 int size)
11525 {
11526 char *note_name = "LINUX";
11527 return elfcore_write_note (abfd, buf, bufsiz,
11528 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11529 }
11530
11531 char *
11532 elfcore_write_ppc_tm_spr (bfd *abfd,
11533 char *buf,
11534 int *bufsiz,
11535 const void *ppc_tm_spr,
11536 int size)
11537 {
11538 char *note_name = "LINUX";
11539 return elfcore_write_note (abfd, buf, bufsiz,
11540 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11541 }
11542
11543 char *
11544 elfcore_write_ppc_tm_ctar (bfd *abfd,
11545 char *buf,
11546 int *bufsiz,
11547 const void *ppc_tm_ctar,
11548 int size)
11549 {
11550 char *note_name = "LINUX";
11551 return elfcore_write_note (abfd, buf, bufsiz,
11552 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11553 }
11554
11555 char *
11556 elfcore_write_ppc_tm_cppr (bfd *abfd,
11557 char *buf,
11558 int *bufsiz,
11559 const void *ppc_tm_cppr,
11560 int size)
11561 {
11562 char *note_name = "LINUX";
11563 return elfcore_write_note (abfd, buf, bufsiz,
11564 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11565 }
11566
11567 char *
11568 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11569 char *buf,
11570 int *bufsiz,
11571 const void *ppc_tm_cdscr,
11572 int size)
11573 {
11574 char *note_name = "LINUX";
11575 return elfcore_write_note (abfd, buf, bufsiz,
11576 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11577 }
11578
11579 static char *
11580 elfcore_write_s390_high_gprs (bfd *abfd,
11581 char *buf,
11582 int *bufsiz,
11583 const void *s390_high_gprs,
11584 int size)
11585 {
11586 char *note_name = "LINUX";
11587 return elfcore_write_note (abfd, buf, bufsiz,
11588 note_name, NT_S390_HIGH_GPRS,
11589 s390_high_gprs, size);
11590 }
11591
11592 char *
11593 elfcore_write_s390_timer (bfd *abfd,
11594 char *buf,
11595 int *bufsiz,
11596 const void *s390_timer,
11597 int size)
11598 {
11599 char *note_name = "LINUX";
11600 return elfcore_write_note (abfd, buf, bufsiz,
11601 note_name, NT_S390_TIMER, s390_timer, size);
11602 }
11603
11604 char *
11605 elfcore_write_s390_todcmp (bfd *abfd,
11606 char *buf,
11607 int *bufsiz,
11608 const void *s390_todcmp,
11609 int size)
11610 {
11611 char *note_name = "LINUX";
11612 return elfcore_write_note (abfd, buf, bufsiz,
11613 note_name, NT_S390_TODCMP, s390_todcmp, size);
11614 }
11615
11616 char *
11617 elfcore_write_s390_todpreg (bfd *abfd,
11618 char *buf,
11619 int *bufsiz,
11620 const void *s390_todpreg,
11621 int size)
11622 {
11623 char *note_name = "LINUX";
11624 return elfcore_write_note (abfd, buf, bufsiz,
11625 note_name, NT_S390_TODPREG, s390_todpreg, size);
11626 }
11627
11628 char *
11629 elfcore_write_s390_ctrs (bfd *abfd,
11630 char *buf,
11631 int *bufsiz,
11632 const void *s390_ctrs,
11633 int size)
11634 {
11635 char *note_name = "LINUX";
11636 return elfcore_write_note (abfd, buf, bufsiz,
11637 note_name, NT_S390_CTRS, s390_ctrs, size);
11638 }
11639
11640 char *
11641 elfcore_write_s390_prefix (bfd *abfd,
11642 char *buf,
11643 int *bufsiz,
11644 const void *s390_prefix,
11645 int size)
11646 {
11647 char *note_name = "LINUX";
11648 return elfcore_write_note (abfd, buf, bufsiz,
11649 note_name, NT_S390_PREFIX, s390_prefix, size);
11650 }
11651
11652 char *
11653 elfcore_write_s390_last_break (bfd *abfd,
11654 char *buf,
11655 int *bufsiz,
11656 const void *s390_last_break,
11657 int size)
11658 {
11659 char *note_name = "LINUX";
11660 return elfcore_write_note (abfd, buf, bufsiz,
11661 note_name, NT_S390_LAST_BREAK,
11662 s390_last_break, size);
11663 }
11664
11665 char *
11666 elfcore_write_s390_system_call (bfd *abfd,
11667 char *buf,
11668 int *bufsiz,
11669 const void *s390_system_call,
11670 int size)
11671 {
11672 char *note_name = "LINUX";
11673 return elfcore_write_note (abfd, buf, bufsiz,
11674 note_name, NT_S390_SYSTEM_CALL,
11675 s390_system_call, size);
11676 }
11677
11678 char *
11679 elfcore_write_s390_tdb (bfd *abfd,
11680 char *buf,
11681 int *bufsiz,
11682 const void *s390_tdb,
11683 int size)
11684 {
11685 char *note_name = "LINUX";
11686 return elfcore_write_note (abfd, buf, bufsiz,
11687 note_name, NT_S390_TDB, s390_tdb, size);
11688 }
11689
11690 char *
11691 elfcore_write_s390_vxrs_low (bfd *abfd,
11692 char *buf,
11693 int *bufsiz,
11694 const void *s390_vxrs_low,
11695 int size)
11696 {
11697 char *note_name = "LINUX";
11698 return elfcore_write_note (abfd, buf, bufsiz,
11699 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11700 }
11701
11702 char *
11703 elfcore_write_s390_vxrs_high (bfd *abfd,
11704 char *buf,
11705 int *bufsiz,
11706 const void *s390_vxrs_high,
11707 int size)
11708 {
11709 char *note_name = "LINUX";
11710 return elfcore_write_note (abfd, buf, bufsiz,
11711 note_name, NT_S390_VXRS_HIGH,
11712 s390_vxrs_high, size);
11713 }
11714
11715 char *
11716 elfcore_write_s390_gs_cb (bfd *abfd,
11717 char *buf,
11718 int *bufsiz,
11719 const void *s390_gs_cb,
11720 int size)
11721 {
11722 char *note_name = "LINUX";
11723 return elfcore_write_note (abfd, buf, bufsiz,
11724 note_name, NT_S390_GS_CB,
11725 s390_gs_cb, size);
11726 }
11727
11728 char *
11729 elfcore_write_s390_gs_bc (bfd *abfd,
11730 char *buf,
11731 int *bufsiz,
11732 const void *s390_gs_bc,
11733 int size)
11734 {
11735 char *note_name = "LINUX";
11736 return elfcore_write_note (abfd, buf, bufsiz,
11737 note_name, NT_S390_GS_BC,
11738 s390_gs_bc, size);
11739 }
11740
11741 char *
11742 elfcore_write_arm_vfp (bfd *abfd,
11743 char *buf,
11744 int *bufsiz,
11745 const void *arm_vfp,
11746 int size)
11747 {
11748 char *note_name = "LINUX";
11749 return elfcore_write_note (abfd, buf, bufsiz,
11750 note_name, NT_ARM_VFP, arm_vfp, size);
11751 }
11752
11753 char *
11754 elfcore_write_aarch_tls (bfd *abfd,
11755 char *buf,
11756 int *bufsiz,
11757 const void *aarch_tls,
11758 int size)
11759 {
11760 char *note_name = "LINUX";
11761 return elfcore_write_note (abfd, buf, bufsiz,
11762 note_name, NT_ARM_TLS, aarch_tls, size);
11763 }
11764
11765 char *
11766 elfcore_write_aarch_hw_break (bfd *abfd,
11767 char *buf,
11768 int *bufsiz,
11769 const void *aarch_hw_break,
11770 int size)
11771 {
11772 char *note_name = "LINUX";
11773 return elfcore_write_note (abfd, buf, bufsiz,
11774 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11775 }
11776
11777 char *
11778 elfcore_write_aarch_hw_watch (bfd *abfd,
11779 char *buf,
11780 int *bufsiz,
11781 const void *aarch_hw_watch,
11782 int size)
11783 {
11784 char *note_name = "LINUX";
11785 return elfcore_write_note (abfd, buf, bufsiz,
11786 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11787 }
11788
11789 char *
11790 elfcore_write_aarch_sve (bfd *abfd,
11791 char *buf,
11792 int *bufsiz,
11793 const void *aarch_sve,
11794 int size)
11795 {
11796 char *note_name = "LINUX";
11797 return elfcore_write_note (abfd, buf, bufsiz,
11798 note_name, NT_ARM_SVE, aarch_sve, size);
11799 }
11800
11801 char *
11802 elfcore_write_aarch_pauth (bfd *abfd,
11803 char *buf,
11804 int *bufsiz,
11805 const void *aarch_pauth,
11806 int size)
11807 {
11808 char *note_name = "LINUX";
11809 return elfcore_write_note (abfd, buf, bufsiz,
11810 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11811 }
11812
11813 char *
11814 elfcore_write_register_note (bfd *abfd,
11815 char *buf,
11816 int *bufsiz,
11817 const char *section,
11818 const void *data,
11819 int size)
11820 {
11821 if (strcmp (section, ".reg2") == 0)
11822 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11823 if (strcmp (section, ".reg-xfp") == 0)
11824 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11825 if (strcmp (section, ".reg-xstate") == 0)
11826 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11827 if (strcmp (section, ".reg-ppc-vmx") == 0)
11828 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11829 if (strcmp (section, ".reg-ppc-vsx") == 0)
11830 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11831 if (strcmp (section, ".reg-ppc-tar") == 0)
11832 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11833 if (strcmp (section, ".reg-ppc-ppr") == 0)
11834 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11835 if (strcmp (section, ".reg-ppc-dscr") == 0)
11836 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11837 if (strcmp (section, ".reg-ppc-ebb") == 0)
11838 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11839 if (strcmp (section, ".reg-ppc-pmu") == 0)
11840 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11841 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11842 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11843 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11844 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11845 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11846 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11847 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11848 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11849 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11850 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11851 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11852 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11853 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11854 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11855 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11856 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11857 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11858 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11859 if (strcmp (section, ".reg-s390-timer") == 0)
11860 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11861 if (strcmp (section, ".reg-s390-todcmp") == 0)
11862 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11863 if (strcmp (section, ".reg-s390-todpreg") == 0)
11864 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11865 if (strcmp (section, ".reg-s390-ctrs") == 0)
11866 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11867 if (strcmp (section, ".reg-s390-prefix") == 0)
11868 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11869 if (strcmp (section, ".reg-s390-last-break") == 0)
11870 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11871 if (strcmp (section, ".reg-s390-system-call") == 0)
11872 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11873 if (strcmp (section, ".reg-s390-tdb") == 0)
11874 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11875 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11876 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11877 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11878 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11879 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11880 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11881 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11882 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11883 if (strcmp (section, ".reg-arm-vfp") == 0)
11884 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11885 if (strcmp (section, ".reg-aarch-tls") == 0)
11886 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11887 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11888 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11889 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11890 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11891 if (strcmp (section, ".reg-aarch-sve") == 0)
11892 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11893 if (strcmp (section, ".reg-aarch-pauth") == 0)
11894 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11895 return NULL;
11896 }
11897
11898 static bfd_boolean
11899 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11900 size_t align)
11901 {
11902 char *p;
11903
11904 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11905 gABI specifies that PT_NOTE alignment should be aligned to 4
11906 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11907 align is less than 4, we use 4 byte alignment. */
11908 if (align < 4)
11909 align = 4;
11910 if (align != 4 && align != 8)
11911 return FALSE;
11912
11913 p = buf;
11914 while (p < buf + size)
11915 {
11916 Elf_External_Note *xnp = (Elf_External_Note *) p;
11917 Elf_Internal_Note in;
11918
11919 if (offsetof (Elf_External_Note, name) > buf - p + size)
11920 return FALSE;
11921
11922 in.type = H_GET_32 (abfd, xnp->type);
11923
11924 in.namesz = H_GET_32 (abfd, xnp->namesz);
11925 in.namedata = xnp->name;
11926 if (in.namesz > buf - in.namedata + size)
11927 return FALSE;
11928
11929 in.descsz = H_GET_32 (abfd, xnp->descsz);
11930 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
11931 in.descpos = offset + (in.descdata - buf);
11932 if (in.descsz != 0
11933 && (in.descdata >= buf + size
11934 || in.descsz > buf - in.descdata + size))
11935 return FALSE;
11936
11937 switch (bfd_get_format (abfd))
11938 {
11939 default:
11940 return TRUE;
11941
11942 case bfd_core:
11943 {
11944 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
11945 struct
11946 {
11947 const char * string;
11948 size_t len;
11949 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
11950 }
11951 grokers[] =
11952 {
11953 GROKER_ELEMENT ("", elfcore_grok_note),
11954 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
11955 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
11956 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
11957 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
11958 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
11959 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
11960 };
11961 #undef GROKER_ELEMENT
11962 int i;
11963
11964 for (i = ARRAY_SIZE (grokers); i--;)
11965 {
11966 if (in.namesz >= grokers[i].len
11967 && strncmp (in.namedata, grokers[i].string,
11968 grokers[i].len) == 0)
11969 {
11970 if (! grokers[i].func (abfd, & in))
11971 return FALSE;
11972 break;
11973 }
11974 }
11975 break;
11976 }
11977
11978 case bfd_object:
11979 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
11980 {
11981 if (! elfobj_grok_gnu_note (abfd, &in))
11982 return FALSE;
11983 }
11984 else if (in.namesz == sizeof "stapsdt"
11985 && strcmp (in.namedata, "stapsdt") == 0)
11986 {
11987 if (! elfobj_grok_stapsdt_note (abfd, &in))
11988 return FALSE;
11989 }
11990 break;
11991 }
11992
11993 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
11994 }
11995
11996 return TRUE;
11997 }
11998
11999 bfd_boolean
12000 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
12001 size_t align)
12002 {
12003 char *buf;
12004
12005 if (size == 0 || (size + 1) == 0)
12006 return TRUE;
12007
12008 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
12009 return FALSE;
12010
12011 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
12012 if (buf == NULL)
12013 return FALSE;
12014
12015 /* PR 17512: file: ec08f814
12016 0-termintate the buffer so that string searches will not overflow. */
12017 buf[size] = 0;
12018
12019 if (!elf_parse_notes (abfd, buf, size, offset, align))
12020 {
12021 free (buf);
12022 return FALSE;
12023 }
12024
12025 free (buf);
12026 return TRUE;
12027 }
12028 \f
12029 /* Providing external access to the ELF program header table. */
12030
12031 /* Return an upper bound on the number of bytes required to store a
12032 copy of ABFD's program header table entries. Return -1 if an error
12033 occurs; bfd_get_error will return an appropriate code. */
12034
12035 long
12036 bfd_get_elf_phdr_upper_bound (bfd *abfd)
12037 {
12038 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12039 {
12040 bfd_set_error (bfd_error_wrong_format);
12041 return -1;
12042 }
12043
12044 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
12045 }
12046
12047 /* Copy ABFD's program header table entries to *PHDRS. The entries
12048 will be stored as an array of Elf_Internal_Phdr structures, as
12049 defined in include/elf/internal.h. To find out how large the
12050 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12051
12052 Return the number of program header table entries read, or -1 if an
12053 error occurs; bfd_get_error will return an appropriate code. */
12054
12055 int
12056 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12057 {
12058 int num_phdrs;
12059
12060 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12061 {
12062 bfd_set_error (bfd_error_wrong_format);
12063 return -1;
12064 }
12065
12066 num_phdrs = elf_elfheader (abfd)->e_phnum;
12067 if (num_phdrs != 0)
12068 memcpy (phdrs, elf_tdata (abfd)->phdr,
12069 num_phdrs * sizeof (Elf_Internal_Phdr));
12070
12071 return num_phdrs;
12072 }
12073
12074 enum elf_reloc_type_class
12075 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12076 const asection *rel_sec ATTRIBUTE_UNUSED,
12077 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12078 {
12079 return reloc_class_normal;
12080 }
12081
12082 /* For RELA architectures, return the relocation value for a
12083 relocation against a local symbol. */
12084
12085 bfd_vma
12086 _bfd_elf_rela_local_sym (bfd *abfd,
12087 Elf_Internal_Sym *sym,
12088 asection **psec,
12089 Elf_Internal_Rela *rel)
12090 {
12091 asection *sec = *psec;
12092 bfd_vma relocation;
12093
12094 relocation = (sec->output_section->vma
12095 + sec->output_offset
12096 + sym->st_value);
12097 if ((sec->flags & SEC_MERGE)
12098 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12099 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12100 {
12101 rel->r_addend =
12102 _bfd_merged_section_offset (abfd, psec,
12103 elf_section_data (sec)->sec_info,
12104 sym->st_value + rel->r_addend);
12105 if (sec != *psec)
12106 {
12107 /* If we have changed the section, and our original section is
12108 marked with SEC_EXCLUDE, it means that the original
12109 SEC_MERGE section has been completely subsumed in some
12110 other SEC_MERGE section. In this case, we need to leave
12111 some info around for --emit-relocs. */
12112 if ((sec->flags & SEC_EXCLUDE) != 0)
12113 sec->kept_section = *psec;
12114 sec = *psec;
12115 }
12116 rel->r_addend -= relocation;
12117 rel->r_addend += sec->output_section->vma + sec->output_offset;
12118 }
12119 return relocation;
12120 }
12121
12122 bfd_vma
12123 _bfd_elf_rel_local_sym (bfd *abfd,
12124 Elf_Internal_Sym *sym,
12125 asection **psec,
12126 bfd_vma addend)
12127 {
12128 asection *sec = *psec;
12129
12130 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12131 return sym->st_value + addend;
12132
12133 return _bfd_merged_section_offset (abfd, psec,
12134 elf_section_data (sec)->sec_info,
12135 sym->st_value + addend);
12136 }
12137
12138 /* Adjust an address within a section. Given OFFSET within SEC, return
12139 the new offset within the section, based upon changes made to the
12140 section. Returns -1 if the offset is now invalid.
12141 The offset (in abnd out) is in target sized bytes, however big a
12142 byte may be. */
12143
12144 bfd_vma
12145 _bfd_elf_section_offset (bfd *abfd,
12146 struct bfd_link_info *info,
12147 asection *sec,
12148 bfd_vma offset)
12149 {
12150 switch (sec->sec_info_type)
12151 {
12152 case SEC_INFO_TYPE_STABS:
12153 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12154 offset);
12155 case SEC_INFO_TYPE_EH_FRAME:
12156 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12157
12158 default:
12159 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12160 {
12161 /* Reverse the offset. */
12162 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12163 bfd_size_type address_size = bed->s->arch_size / 8;
12164
12165 /* address_size and sec->size are in octets. Convert
12166 to bytes before subtracting the original offset. */
12167 offset = ((sec->size - address_size)
12168 / bfd_octets_per_byte (abfd, sec) - offset);
12169 }
12170 return offset;
12171 }
12172 }
12173 \f
12174 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12175 reconstruct an ELF file by reading the segments out of remote memory
12176 based on the ELF file header at EHDR_VMA and the ELF program headers it
12177 points to. If not null, *LOADBASEP is filled in with the difference
12178 between the VMAs from which the segments were read, and the VMAs the
12179 file headers (and hence BFD's idea of each section's VMA) put them at.
12180
12181 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12182 remote memory at target address VMA into the local buffer at MYADDR; it
12183 should return zero on success or an `errno' code on failure. TEMPL must
12184 be a BFD for an ELF target with the word size and byte order found in
12185 the remote memory. */
12186
12187 bfd *
12188 bfd_elf_bfd_from_remote_memory
12189 (bfd *templ,
12190 bfd_vma ehdr_vma,
12191 bfd_size_type size,
12192 bfd_vma *loadbasep,
12193 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12194 {
12195 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12196 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12197 }
12198 \f
12199 long
12200 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12201 long symcount ATTRIBUTE_UNUSED,
12202 asymbol **syms ATTRIBUTE_UNUSED,
12203 long dynsymcount,
12204 asymbol **dynsyms,
12205 asymbol **ret)
12206 {
12207 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12208 asection *relplt;
12209 asymbol *s;
12210 const char *relplt_name;
12211 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12212 arelent *p;
12213 long count, i, n;
12214 size_t size;
12215 Elf_Internal_Shdr *hdr;
12216 char *names;
12217 asection *plt;
12218
12219 *ret = NULL;
12220
12221 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12222 return 0;
12223
12224 if (dynsymcount <= 0)
12225 return 0;
12226
12227 if (!bed->plt_sym_val)
12228 return 0;
12229
12230 relplt_name = bed->relplt_name;
12231 if (relplt_name == NULL)
12232 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12233 relplt = bfd_get_section_by_name (abfd, relplt_name);
12234 if (relplt == NULL)
12235 return 0;
12236
12237 hdr = &elf_section_data (relplt)->this_hdr;
12238 if (hdr->sh_link != elf_dynsymtab (abfd)
12239 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12240 return 0;
12241
12242 plt = bfd_get_section_by_name (abfd, ".plt");
12243 if (plt == NULL)
12244 return 0;
12245
12246 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12247 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12248 return -1;
12249
12250 count = relplt->size / hdr->sh_entsize;
12251 size = count * sizeof (asymbol);
12252 p = relplt->relocation;
12253 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12254 {
12255 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12256 if (p->addend != 0)
12257 {
12258 #ifdef BFD64
12259 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12260 #else
12261 size += sizeof ("+0x") - 1 + 8;
12262 #endif
12263 }
12264 }
12265
12266 s = *ret = (asymbol *) bfd_malloc (size);
12267 if (s == NULL)
12268 return -1;
12269
12270 names = (char *) (s + count);
12271 p = relplt->relocation;
12272 n = 0;
12273 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12274 {
12275 size_t len;
12276 bfd_vma addr;
12277
12278 addr = bed->plt_sym_val (i, plt, p);
12279 if (addr == (bfd_vma) -1)
12280 continue;
12281
12282 *s = **p->sym_ptr_ptr;
12283 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12284 we are defining a symbol, ensure one of them is set. */
12285 if ((s->flags & BSF_LOCAL) == 0)
12286 s->flags |= BSF_GLOBAL;
12287 s->flags |= BSF_SYNTHETIC;
12288 s->section = plt;
12289 s->value = addr - plt->vma;
12290 s->name = names;
12291 s->udata.p = NULL;
12292 len = strlen ((*p->sym_ptr_ptr)->name);
12293 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12294 names += len;
12295 if (p->addend != 0)
12296 {
12297 char buf[30], *a;
12298
12299 memcpy (names, "+0x", sizeof ("+0x") - 1);
12300 names += sizeof ("+0x") - 1;
12301 bfd_sprintf_vma (abfd, buf, p->addend);
12302 for (a = buf; *a == '0'; ++a)
12303 ;
12304 len = strlen (a);
12305 memcpy (names, a, len);
12306 names += len;
12307 }
12308 memcpy (names, "@plt", sizeof ("@plt"));
12309 names += sizeof ("@plt");
12310 ++s, ++n;
12311 }
12312
12313 return n;
12314 }
12315
12316 /* It is only used by x86-64 so far.
12317 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12318 but current usage would allow all of _bfd_std_section to be zero. */
12319 static const asymbol lcomm_sym
12320 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12321 asection _bfd_elf_large_com_section
12322 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12323 "LARGE_COMMON", 0, SEC_IS_COMMON);
12324
12325 bfd_boolean
12326 _bfd_elf_final_write_processing (bfd *abfd)
12327 {
12328 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12329
12330 i_ehdrp = elf_elfheader (abfd);
12331
12332 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12333 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12334
12335 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12336 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12337 STB_GNU_UNIQUE binding. */
12338 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12339 {
12340 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12341 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12342 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12343 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12344 {
12345 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12346 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12347 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12348 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12349 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12350 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12351 bfd_set_error (bfd_error_sorry);
12352 return FALSE;
12353 }
12354 }
12355 return TRUE;
12356 }
12357
12358
12359 /* Return TRUE for ELF symbol types that represent functions.
12360 This is the default version of this function, which is sufficient for
12361 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12362
12363 bfd_boolean
12364 _bfd_elf_is_function_type (unsigned int type)
12365 {
12366 return (type == STT_FUNC
12367 || type == STT_GNU_IFUNC);
12368 }
12369
12370 /* If the ELF symbol SYM might be a function in SEC, return the
12371 function size and set *CODE_OFF to the function's entry point,
12372 otherwise return zero. */
12373
12374 bfd_size_type
12375 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12376 bfd_vma *code_off)
12377 {
12378 bfd_size_type size;
12379
12380 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12381 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12382 || sym->section != sec)
12383 return 0;
12384
12385 *code_off = sym->value;
12386 size = 0;
12387 if (!(sym->flags & BSF_SYNTHETIC))
12388 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12389 if (size == 0)
12390 size = 1;
12391 return size;
12392 }
12393
12394 /* Set to non-zero to enable some debug messages. */
12395 #define DEBUG_SECONDARY_RELOCS 0
12396
12397 /* An internal-to-the-bfd-library only section type
12398 used to indicate a cached secondary reloc section. */
12399 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12400
12401 /* Create a BFD section to hold a secondary reloc section. */
12402
12403 bfd_boolean
12404 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
12405 Elf_Internal_Shdr *hdr,
12406 const char * name,
12407 unsigned int shindex)
12408 {
12409 /* We only support RELA secondary relocs. */
12410 if (hdr->sh_type != SHT_RELA)
12411 return FALSE;
12412
12413 #if DEBUG_SECONDARY_RELOCS
12414 fprintf (stderr, "secondary reloc section %s encountered\n", name);
12415 #endif
12416 hdr->sh_type = SHT_SECONDARY_RELOC;
12417 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
12418 }
12419
12420 /* Read in any secondary relocs associated with SEC. */
12421
12422 bfd_boolean
12423 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
12424 asection * sec,
12425 asymbol ** symbols)
12426 {
12427 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12428 asection * relsec;
12429 bfd_boolean result = TRUE;
12430 bfd_vma (*r_sym) (bfd_vma);
12431
12432 #if BFD_DEFAULT_TARGET_SIZE > 32
12433 if (bfd_arch_bits_per_address (abfd) != 32)
12434 r_sym = elf64_r_sym;
12435 else
12436 #endif
12437 r_sym = elf32_r_sym;
12438
12439 /* Discover if there are any secondary reloc sections
12440 associated with SEC. */
12441 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12442 {
12443 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
12444
12445 if (hdr->sh_type == SHT_SECONDARY_RELOC
12446 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12447 {
12448 bfd_byte * native_relocs;
12449 bfd_byte * native_reloc;
12450 arelent * internal_relocs;
12451 arelent * internal_reloc;
12452 unsigned int i;
12453 unsigned int entsize;
12454 unsigned int symcount;
12455 unsigned int reloc_count;
12456 size_t amt;
12457
12458 if (ebd->elf_info_to_howto == NULL)
12459 return FALSE;
12460
12461 #if DEBUG_SECONDARY_RELOCS
12462 fprintf (stderr, "read secondary relocs for %s from %s\n",
12463 sec->name, relsec->name);
12464 #endif
12465 entsize = hdr->sh_entsize;
12466
12467 native_relocs = bfd_malloc (hdr->sh_size);
12468 if (native_relocs == NULL)
12469 {
12470 result = FALSE;
12471 continue;
12472 }
12473
12474 reloc_count = NUM_SHDR_ENTRIES (hdr);
12475 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
12476 {
12477 free (native_relocs);
12478 bfd_set_error (bfd_error_file_too_big);
12479 result = FALSE;
12480 continue;
12481 }
12482
12483 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
12484 if (internal_relocs == NULL)
12485 {
12486 free (native_relocs);
12487 result = FALSE;
12488 continue;
12489 }
12490
12491 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
12492 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
12493 != hdr->sh_size))
12494 {
12495 free (native_relocs);
12496 /* The internal_relocs will be freed when
12497 the memory for the bfd is released. */
12498 result = FALSE;
12499 continue;
12500 }
12501
12502 symcount = bfd_get_symcount (abfd);
12503
12504 for (i = 0, internal_reloc = internal_relocs,
12505 native_reloc = native_relocs;
12506 i < reloc_count;
12507 i++, internal_reloc++, native_reloc += entsize)
12508 {
12509 bfd_boolean res;
12510 Elf_Internal_Rela rela;
12511
12512 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
12513
12514 /* The address of an ELF reloc is section relative for an object
12515 file, and absolute for an executable file or shared library.
12516 The address of a normal BFD reloc is always section relative,
12517 and the address of a dynamic reloc is absolute.. */
12518 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
12519 internal_reloc->address = rela.r_offset;
12520 else
12521 internal_reloc->address = rela.r_offset - sec->vma;
12522
12523 if (r_sym (rela.r_info) == STN_UNDEF)
12524 {
12525 /* FIXME: This and the error case below mean that we
12526 have a symbol on relocs that is not elf_symbol_type. */
12527 internal_reloc->sym_ptr_ptr =
12528 bfd_abs_section_ptr->symbol_ptr_ptr;
12529 }
12530 else if (r_sym (rela.r_info) > symcount)
12531 {
12532 _bfd_error_handler
12533 /* xgettext:c-format */
12534 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
12535 abfd, sec, i, (long) r_sym (rela.r_info));
12536 bfd_set_error (bfd_error_bad_value);
12537 internal_reloc->sym_ptr_ptr =
12538 bfd_abs_section_ptr->symbol_ptr_ptr;
12539 result = FALSE;
12540 }
12541 else
12542 {
12543 asymbol **ps;
12544
12545 ps = symbols + r_sym (rela.r_info) - 1;
12546
12547 internal_reloc->sym_ptr_ptr = ps;
12548 /* Make sure that this symbol is not removed by strip. */
12549 (*ps)->flags |= BSF_KEEP;
12550 }
12551
12552 internal_reloc->addend = rela.r_addend;
12553
12554 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
12555 if (! res || internal_reloc->howto == NULL)
12556 {
12557 #if DEBUG_SECONDARY_RELOCS
12558 fprintf (stderr, "there is no howto associated with reloc %lx\n",
12559 rela.r_info);
12560 #endif
12561 result = FALSE;
12562 }
12563 }
12564
12565 free (native_relocs);
12566 /* Store the internal relocs. */
12567 elf_section_data (relsec)->sec_info = internal_relocs;
12568 }
12569 }
12570
12571 return result;
12572 }
12573
12574 /* Set the ELF section header fields of an output secondary reloc section. */
12575
12576 bfd_boolean
12577 _bfd_elf_copy_special_section_fields (const bfd * ibfd ATTRIBUTE_UNUSED,
12578 bfd * obfd ATTRIBUTE_UNUSED,
12579 const Elf_Internal_Shdr * isection,
12580 Elf_Internal_Shdr * osection)
12581 {
12582 asection * isec;
12583 asection * osec;
12584
12585 if (isection == NULL)
12586 return FALSE;
12587
12588 if (isection->sh_type != SHT_SECONDARY_RELOC)
12589 return TRUE;
12590
12591 isec = isection->bfd_section;
12592 if (isec == NULL)
12593 return FALSE;
12594
12595 osec = osection->bfd_section;
12596 if (osec == NULL)
12597 return FALSE;
12598
12599 BFD_ASSERT (elf_section_data (osec)->sec_info == NULL);
12600 elf_section_data (osec)->sec_info = elf_section_data (isec)->sec_info;
12601 osection->sh_type = SHT_RELA;
12602 osection->sh_link = elf_onesymtab (obfd);
12603 if (osection->sh_link == 0)
12604 {
12605 /* There is no symbol table - we are hosed... */
12606 _bfd_error_handler
12607 /* xgettext:c-format */
12608 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
12609 obfd, osec);
12610 bfd_set_error (bfd_error_bad_value);
12611 return FALSE;
12612 }
12613
12614 /* Find the output section that corresponds to the isection's sh_info link. */
12615 if (isection->sh_info == 0
12616 || isection->sh_info >= elf_numsections (ibfd))
12617 {
12618 _bfd_error_handler
12619 /* xgettext:c-format */
12620 (_("%pB(%pA): info section index is invalid"),
12621 obfd, osec);
12622 bfd_set_error (bfd_error_bad_value);
12623 return FALSE;
12624 }
12625
12626 isection = elf_elfsections (ibfd)[isection->sh_info];
12627
12628 if (isection == NULL
12629 || isection->bfd_section == NULL
12630 || isection->bfd_section->output_section == NULL)
12631 {
12632 _bfd_error_handler
12633 /* xgettext:c-format */
12634 (_("%pB(%pA): info section index cannot be set because the section is not in the output"),
12635 obfd, osec);
12636 bfd_set_error (bfd_error_bad_value);
12637 return FALSE;
12638 }
12639
12640 osection->sh_info =
12641 elf_section_data (isection->bfd_section->output_section)->this_idx;
12642
12643 #if DEBUG_SECONDARY_RELOCS
12644 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
12645 osec->name, osection->sh_link, osection->sh_info);
12646 #endif
12647
12648 return TRUE;
12649 }
12650
12651 /* Write out a secondary reloc section. */
12652
12653 bfd_boolean
12654 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
12655 {
12656 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12657 bfd_vma addr_offset;
12658 asection * relsec;
12659 bfd_vma (*r_info) (bfd_vma, bfd_vma);
12660 bfd_boolean result = TRUE;
12661
12662 if (sec == NULL)
12663 return FALSE;
12664
12665 #if BFD_DEFAULT_TARGET_SIZE > 32
12666 if (bfd_arch_bits_per_address (abfd) != 32)
12667 r_info = elf64_r_info;
12668 else
12669 #endif
12670 r_info = elf32_r_info;
12671
12672 /* The address of an ELF reloc is section relative for an object
12673 file, and absolute for an executable file or shared library.
12674 The address of a BFD reloc is always section relative. */
12675 addr_offset = 0;
12676 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
12677 addr_offset = sec->vma;
12678
12679 /* Discover if there are any secondary reloc sections
12680 associated with SEC. */
12681 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12682 {
12683 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
12684 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
12685
12686 if (hdr->sh_type == SHT_RELA
12687 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12688 {
12689 asymbol * last_sym;
12690 int last_sym_idx;
12691 unsigned int reloc_count;
12692 unsigned int idx;
12693 arelent * src_irel;
12694 bfd_byte * dst_rela;
12695
12696 if (hdr->contents != NULL)
12697 {
12698 _bfd_error_handler
12699 /* xgettext:c-format */
12700 (_("%pB(%pA): error: secondary reloc section processed twice"),
12701 abfd, relsec);
12702 bfd_set_error (bfd_error_bad_value);
12703 result = FALSE;
12704 continue;
12705 }
12706
12707 reloc_count = hdr->sh_size / hdr->sh_entsize;
12708 if (reloc_count <= 0)
12709 {
12710 _bfd_error_handler
12711 /* xgettext:c-format */
12712 (_("%pB(%pA): error: secondary reloc section is empty!"),
12713 abfd, relsec);
12714 bfd_set_error (bfd_error_bad_value);
12715 result = FALSE;
12716 continue;
12717 }
12718
12719 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
12720 if (hdr->contents == NULL)
12721 continue;
12722
12723 #if DEBUG_SECONDARY_RELOCS
12724 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
12725 reloc_count, sec->name, relsec->name);
12726 #endif
12727 last_sym = NULL;
12728 last_sym_idx = 0;
12729 dst_rela = hdr->contents;
12730 src_irel = (arelent *) esd->sec_info;
12731 if (src_irel == NULL)
12732 {
12733 _bfd_error_handler
12734 /* xgettext:c-format */
12735 (_("%pB(%pA): error: internal relocs missing for secondary reloc section"),
12736 abfd, relsec);
12737 bfd_set_error (bfd_error_bad_value);
12738 result = FALSE;
12739 continue;
12740 }
12741
12742 for (idx = 0; idx < reloc_count; idx++, dst_rela += hdr->sh_entsize)
12743 {
12744 Elf_Internal_Rela src_rela;
12745 arelent *ptr;
12746 asymbol *sym;
12747 int n;
12748
12749 ptr = src_irel + idx;
12750 if (ptr == NULL)
12751 {
12752 _bfd_error_handler
12753 /* xgettext:c-format */
12754 (_("%pB(%pA): error: reloc table entry %u is empty"),
12755 abfd, relsec, idx);
12756 bfd_set_error (bfd_error_bad_value);
12757 result = FALSE;
12758 break;
12759 }
12760
12761 if (ptr->sym_ptr_ptr == NULL)
12762 {
12763 /* FIXME: Is this an error ? */
12764 n = 0;
12765 }
12766 else
12767 {
12768 sym = *ptr->sym_ptr_ptr;
12769
12770 if (sym == last_sym)
12771 n = last_sym_idx;
12772 else
12773 {
12774 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
12775 if (n < 0)
12776 {
12777 _bfd_error_handler
12778 /* xgettext:c-format */
12779 (_("%pB(%pA): error: secondary reloc %u references a missing symbol"),
12780 abfd, relsec, idx);
12781 bfd_set_error (bfd_error_bad_value);
12782 result = FALSE;
12783 n = 0;
12784 }
12785
12786 last_sym = sym;
12787 last_sym_idx = n;
12788 }
12789
12790 if (sym->the_bfd != NULL
12791 && sym->the_bfd->xvec != abfd->xvec
12792 && ! _bfd_elf_validate_reloc (abfd, ptr))
12793 {
12794 _bfd_error_handler
12795 /* xgettext:c-format */
12796 (_("%pB(%pA): error: secondary reloc %u references a deleted symbol"),
12797 abfd, relsec, idx);
12798 bfd_set_error (bfd_error_bad_value);
12799 result = FALSE;
12800 n = 0;
12801 }
12802 }
12803
12804 src_rela.r_offset = ptr->address + addr_offset;
12805 if (ptr->howto == NULL)
12806 {
12807 _bfd_error_handler
12808 /* xgettext:c-format */
12809 (_("%pB(%pA): error: secondary reloc %u is of an unknown type"),
12810 abfd, relsec, idx);
12811 bfd_set_error (bfd_error_bad_value);
12812 result = FALSE;
12813 src_rela.r_info = r_info (0, 0);
12814 }
12815 else
12816 src_rela.r_info = r_info (n, ptr->howto->type);
12817 src_rela.r_addend = ptr->addend;
12818 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
12819 }
12820 }
12821 }
12822
12823 return result;
12824 }