1 /* ELF executable support for BFD.
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
35 /* For sparc64-cross-sparc32. */
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean
assign_file_positions_except_relocs (bfd
*, struct bfd_link_info
*);
54 static bfd_boolean
swap_out_syms (bfd
*, struct elf_strtab_hash
**, int) ;
55 static bfd_boolean
elf_parse_notes (bfd
*abfd
, char *buf
, size_t size
,
56 file_ptr offset
, size_t align
);
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
62 /* Swap in a Verdef structure. */
65 _bfd_elf_swap_verdef_in (bfd
*abfd
,
66 const Elf_External_Verdef
*src
,
67 Elf_Internal_Verdef
*dst
)
69 dst
->vd_version
= H_GET_16 (abfd
, src
->vd_version
);
70 dst
->vd_flags
= H_GET_16 (abfd
, src
->vd_flags
);
71 dst
->vd_ndx
= H_GET_16 (abfd
, src
->vd_ndx
);
72 dst
->vd_cnt
= H_GET_16 (abfd
, src
->vd_cnt
);
73 dst
->vd_hash
= H_GET_32 (abfd
, src
->vd_hash
);
74 dst
->vd_aux
= H_GET_32 (abfd
, src
->vd_aux
);
75 dst
->vd_next
= H_GET_32 (abfd
, src
->vd_next
);
78 /* Swap out a Verdef structure. */
81 _bfd_elf_swap_verdef_out (bfd
*abfd
,
82 const Elf_Internal_Verdef
*src
,
83 Elf_External_Verdef
*dst
)
85 H_PUT_16 (abfd
, src
->vd_version
, dst
->vd_version
);
86 H_PUT_16 (abfd
, src
->vd_flags
, dst
->vd_flags
);
87 H_PUT_16 (abfd
, src
->vd_ndx
, dst
->vd_ndx
);
88 H_PUT_16 (abfd
, src
->vd_cnt
, dst
->vd_cnt
);
89 H_PUT_32 (abfd
, src
->vd_hash
, dst
->vd_hash
);
90 H_PUT_32 (abfd
, src
->vd_aux
, dst
->vd_aux
);
91 H_PUT_32 (abfd
, src
->vd_next
, dst
->vd_next
);
94 /* Swap in a Verdaux structure. */
97 _bfd_elf_swap_verdaux_in (bfd
*abfd
,
98 const Elf_External_Verdaux
*src
,
99 Elf_Internal_Verdaux
*dst
)
101 dst
->vda_name
= H_GET_32 (abfd
, src
->vda_name
);
102 dst
->vda_next
= H_GET_32 (abfd
, src
->vda_next
);
105 /* Swap out a Verdaux structure. */
108 _bfd_elf_swap_verdaux_out (bfd
*abfd
,
109 const Elf_Internal_Verdaux
*src
,
110 Elf_External_Verdaux
*dst
)
112 H_PUT_32 (abfd
, src
->vda_name
, dst
->vda_name
);
113 H_PUT_32 (abfd
, src
->vda_next
, dst
->vda_next
);
116 /* Swap in a Verneed structure. */
119 _bfd_elf_swap_verneed_in (bfd
*abfd
,
120 const Elf_External_Verneed
*src
,
121 Elf_Internal_Verneed
*dst
)
123 dst
->vn_version
= H_GET_16 (abfd
, src
->vn_version
);
124 dst
->vn_cnt
= H_GET_16 (abfd
, src
->vn_cnt
);
125 dst
->vn_file
= H_GET_32 (abfd
, src
->vn_file
);
126 dst
->vn_aux
= H_GET_32 (abfd
, src
->vn_aux
);
127 dst
->vn_next
= H_GET_32 (abfd
, src
->vn_next
);
130 /* Swap out a Verneed structure. */
133 _bfd_elf_swap_verneed_out (bfd
*abfd
,
134 const Elf_Internal_Verneed
*src
,
135 Elf_External_Verneed
*dst
)
137 H_PUT_16 (abfd
, src
->vn_version
, dst
->vn_version
);
138 H_PUT_16 (abfd
, src
->vn_cnt
, dst
->vn_cnt
);
139 H_PUT_32 (abfd
, src
->vn_file
, dst
->vn_file
);
140 H_PUT_32 (abfd
, src
->vn_aux
, dst
->vn_aux
);
141 H_PUT_32 (abfd
, src
->vn_next
, dst
->vn_next
);
144 /* Swap in a Vernaux structure. */
147 _bfd_elf_swap_vernaux_in (bfd
*abfd
,
148 const Elf_External_Vernaux
*src
,
149 Elf_Internal_Vernaux
*dst
)
151 dst
->vna_hash
= H_GET_32 (abfd
, src
->vna_hash
);
152 dst
->vna_flags
= H_GET_16 (abfd
, src
->vna_flags
);
153 dst
->vna_other
= H_GET_16 (abfd
, src
->vna_other
);
154 dst
->vna_name
= H_GET_32 (abfd
, src
->vna_name
);
155 dst
->vna_next
= H_GET_32 (abfd
, src
->vna_next
);
158 /* Swap out a Vernaux structure. */
161 _bfd_elf_swap_vernaux_out (bfd
*abfd
,
162 const Elf_Internal_Vernaux
*src
,
163 Elf_External_Vernaux
*dst
)
165 H_PUT_32 (abfd
, src
->vna_hash
, dst
->vna_hash
);
166 H_PUT_16 (abfd
, src
->vna_flags
, dst
->vna_flags
);
167 H_PUT_16 (abfd
, src
->vna_other
, dst
->vna_other
);
168 H_PUT_32 (abfd
, src
->vna_name
, dst
->vna_name
);
169 H_PUT_32 (abfd
, src
->vna_next
, dst
->vna_next
);
172 /* Swap in a Versym structure. */
175 _bfd_elf_swap_versym_in (bfd
*abfd
,
176 const Elf_External_Versym
*src
,
177 Elf_Internal_Versym
*dst
)
179 dst
->vs_vers
= H_GET_16 (abfd
, src
->vs_vers
);
182 /* Swap out a Versym structure. */
185 _bfd_elf_swap_versym_out (bfd
*abfd
,
186 const Elf_Internal_Versym
*src
,
187 Elf_External_Versym
*dst
)
189 H_PUT_16 (abfd
, src
->vs_vers
, dst
->vs_vers
);
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
196 bfd_elf_hash (const char *namearg
)
198 const unsigned char *name
= (const unsigned char *) namearg
;
203 while ((ch
= *name
++) != '\0')
206 if ((g
= (h
& 0xf0000000)) != 0)
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
214 return h
& 0xffffffff;
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
221 bfd_elf_gnu_hash (const char *namearg
)
223 const unsigned char *name
= (const unsigned char *) namearg
;
224 unsigned long h
= 5381;
227 while ((ch
= *name
++) != '\0')
228 h
= (h
<< 5) + h
+ ch
;
229 return h
& 0xffffffff;
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
235 bfd_elf_allocate_object (bfd
*abfd
,
237 enum elf_target_id object_id
)
239 BFD_ASSERT (object_size
>= sizeof (struct elf_obj_tdata
));
240 abfd
->tdata
.any
= bfd_zalloc (abfd
, object_size
);
241 if (abfd
->tdata
.any
== NULL
)
244 elf_object_id (abfd
) = object_id
;
245 if (abfd
->direction
!= read_direction
)
247 struct output_elf_obj_tdata
*o
= bfd_zalloc (abfd
, sizeof *o
);
250 elf_tdata (abfd
)->o
= o
;
251 elf_program_header_size (abfd
) = (bfd_size_type
) -1;
258 bfd_elf_make_object (bfd
*abfd
)
260 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
261 return bfd_elf_allocate_object (abfd
, sizeof (struct elf_obj_tdata
),
266 bfd_elf_mkcorefile (bfd
*abfd
)
268 /* I think this can be done just like an object file. */
269 if (!abfd
->xvec
->_bfd_set_format
[(int) bfd_object
] (abfd
))
271 elf_tdata (abfd
)->core
= bfd_zalloc (abfd
, sizeof (*elf_tdata (abfd
)->core
));
272 return elf_tdata (abfd
)->core
!= NULL
;
276 bfd_elf_get_str_section (bfd
*abfd
, unsigned int shindex
)
278 Elf_Internal_Shdr
**i_shdrp
;
279 bfd_byte
*shstrtab
= NULL
;
281 bfd_size_type shstrtabsize
;
283 i_shdrp
= elf_elfsections (abfd
);
285 || shindex
>= elf_numsections (abfd
)
286 || i_shdrp
[shindex
] == 0)
289 shstrtab
= i_shdrp
[shindex
]->contents
;
290 if (shstrtab
== NULL
)
292 /* No cached one, attempt to read, and cache what we read. */
293 offset
= i_shdrp
[shindex
]->sh_offset
;
294 shstrtabsize
= i_shdrp
[shindex
]->sh_size
;
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize
+ 1 <= 1
299 || bfd_seek (abfd
, offset
, SEEK_SET
) != 0
300 || (shstrtab
= _bfd_alloc_and_read (abfd
, shstrtabsize
+ 1,
301 shstrtabsize
)) == NULL
)
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp
[shindex
]->sh_size
= 0;
309 shstrtab
[shstrtabsize
] = '\0';
310 i_shdrp
[shindex
]->contents
= shstrtab
;
312 return (char *) shstrtab
;
316 bfd_elf_string_from_elf_section (bfd
*abfd
,
317 unsigned int shindex
,
318 unsigned int strindex
)
320 Elf_Internal_Shdr
*hdr
;
325 if (elf_elfsections (abfd
) == NULL
|| shindex
>= elf_numsections (abfd
))
328 hdr
= elf_elfsections (abfd
)[shindex
];
330 if (hdr
->contents
== NULL
)
332 if (hdr
->sh_type
!= SHT_STRTAB
&& hdr
->sh_type
< SHT_LOOS
)
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
342 if (bfd_elf_get_str_section (abfd
, shindex
) == NULL
)
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr
->sh_size
== 0 || hdr
->contents
[hdr
->sh_size
- 1] != 0)
356 if (strindex
>= hdr
->sh_size
)
358 unsigned int shstrndx
= elf_elfheader(abfd
)->e_shstrndx
;
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64
" for section `%s'"),
362 abfd
, strindex
, (uint64_t) hdr
->sh_size
,
363 (shindex
== shstrndx
&& strindex
== hdr
->sh_name
365 : bfd_elf_string_from_elf_section (abfd
, shstrndx
, hdr
->sh_name
)));
369 return ((char *) hdr
->contents
) + strindex
;
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
381 bfd_elf_get_elf_syms (bfd
*ibfd
,
382 Elf_Internal_Shdr
*symtab_hdr
,
385 Elf_Internal_Sym
*intsym_buf
,
387 Elf_External_Sym_Shndx
*extshndx_buf
)
389 Elf_Internal_Shdr
*shndx_hdr
;
391 const bfd_byte
*esym
;
392 Elf_External_Sym_Shndx
*alloc_extshndx
;
393 Elf_External_Sym_Shndx
*shndx
;
394 Elf_Internal_Sym
*alloc_intsym
;
395 Elf_Internal_Sym
*isym
;
396 Elf_Internal_Sym
*isymend
;
397 const struct elf_backend_data
*bed
;
402 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
)
408 /* Normal syms might have section extension entries. */
410 if (elf_symtab_shndx_list (ibfd
) != NULL
)
412 elf_section_list
* entry
;
413 Elf_Internal_Shdr
**sections
= elf_elfsections (ibfd
);
415 /* Find an index section that is linked to this symtab section. */
416 for (entry
= elf_symtab_shndx_list (ibfd
); entry
!= NULL
; entry
= entry
->next
)
419 if (entry
->hdr
.sh_link
>= elf_numsections (ibfd
))
422 if (sections
[entry
->hdr
.sh_link
] == symtab_hdr
)
424 shndx_hdr
= & entry
->hdr
;
429 if (shndx_hdr
== NULL
)
431 if (symtab_hdr
== & elf_symtab_hdr (ibfd
))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr
= & elf_symtab_shndx_list (ibfd
)->hdr
;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
439 /* Read the symbols. */
441 alloc_extshndx
= NULL
;
443 bed
= get_elf_backend_data (ibfd
);
444 extsym_size
= bed
->s
->sizeof_sym
;
445 if (_bfd_mul_overflow (symcount
, extsym_size
, &amt
))
447 bfd_set_error (bfd_error_file_too_big
);
451 pos
= symtab_hdr
->sh_offset
+ symoffset
* extsym_size
;
452 if (extsym_buf
== NULL
)
454 alloc_ext
= bfd_malloc (amt
);
455 extsym_buf
= alloc_ext
;
457 if (extsym_buf
== NULL
458 || bfd_seek (ibfd
, pos
, SEEK_SET
) != 0
459 || bfd_bread (extsym_buf
, amt
, ibfd
) != amt
)
465 if (shndx_hdr
== NULL
|| shndx_hdr
->sh_size
== 0)
469 if (_bfd_mul_overflow (symcount
, sizeof (Elf_External_Sym_Shndx
), &amt
))
471 bfd_set_error (bfd_error_file_too_big
);
475 pos
= shndx_hdr
->sh_offset
+ symoffset
* sizeof (Elf_External_Sym_Shndx
);
476 if (extshndx_buf
== NULL
)
478 alloc_extshndx
= (Elf_External_Sym_Shndx
*) bfd_malloc (amt
);
479 extshndx_buf
= alloc_extshndx
;
481 if (extshndx_buf
== NULL
482 || bfd_seek (ibfd
, pos
, SEEK_SET
) != 0
483 || bfd_bread (extshndx_buf
, amt
, ibfd
) != amt
)
490 if (intsym_buf
== NULL
)
492 if (_bfd_mul_overflow (symcount
, sizeof (Elf_Internal_Sym
), &amt
))
494 bfd_set_error (bfd_error_file_too_big
);
497 alloc_intsym
= (Elf_Internal_Sym
*) bfd_malloc (amt
);
498 intsym_buf
= alloc_intsym
;
499 if (intsym_buf
== NULL
)
503 /* Convert the symbols to internal form. */
504 isymend
= intsym_buf
+ symcount
;
505 for (esym
= (const bfd_byte
*) extsym_buf
, isym
= intsym_buf
,
506 shndx
= extshndx_buf
;
508 esym
+= extsym_size
, isym
++, shndx
= shndx
!= NULL
? shndx
+ 1 : NULL
)
509 if (!(*bed
->s
->swap_symbol_in
) (ibfd
, esym
, shndx
, isym
))
511 symoffset
+= (esym
- (bfd_byte
*) extsym_buf
) / extsym_size
;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd
, (unsigned long) symoffset
);
516 if (alloc_intsym
!= NULL
)
523 if (alloc_ext
!= NULL
)
525 if (alloc_extshndx
!= NULL
)
526 free (alloc_extshndx
);
531 /* Look up a symbol name. */
533 bfd_elf_sym_name (bfd
*abfd
,
534 Elf_Internal_Shdr
*symtab_hdr
,
535 Elf_Internal_Sym
*isym
,
539 unsigned int iname
= isym
->st_name
;
540 unsigned int shindex
= symtab_hdr
->sh_link
;
542 if (iname
== 0 && ELF_ST_TYPE (isym
->st_info
) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym
->st_shndx
< elf_numsections (abfd
))
546 iname
= elf_elfsections (abfd
)[isym
->st_shndx
]->sh_name
;
547 shindex
= elf_elfheader (abfd
)->e_shstrndx
;
550 name
= bfd_elf_string_from_elf_section (abfd
, shindex
, iname
);
553 else if (sym_sec
&& *name
== '\0')
554 name
= bfd_section_name (sym_sec
);
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
563 typedef union elf_internal_group
{
564 Elf_Internal_Shdr
*shdr
;
566 } Elf_Internal_Group
;
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
572 group_signature (bfd
*abfd
, Elf_Internal_Shdr
*ghdr
)
574 Elf_Internal_Shdr
*hdr
;
575 unsigned char esym
[sizeof (Elf64_External_Sym
)];
576 Elf_External_Sym_Shndx eshndx
;
577 Elf_Internal_Sym isym
;
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr
->sh_link
>= elf_numsections (abfd
))
583 hdr
= elf_elfsections (abfd
) [ghdr
->sh_link
];
584 if (hdr
->sh_type
!= SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd
, ghdr
->sh_link
))
588 /* Go read the symbol. */
589 hdr
= &elf_tdata (abfd
)->symtab_hdr
;
590 if (bfd_elf_get_elf_syms (abfd
, hdr
, 1, ghdr
->sh_info
,
591 &isym
, esym
, &eshndx
) == NULL
)
594 return bfd_elf_sym_name (abfd
, hdr
, &isym
, NULL
);
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
600 setup_group (bfd
*abfd
, Elf_Internal_Shdr
*hdr
, asection
*newsect
)
602 unsigned int num_group
= elf_tdata (abfd
)->num_group
;
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
608 unsigned int i
, shnum
;
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum
= elf_numsections (abfd
);
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
621 for (i
= 0; i
< shnum
; i
++)
623 Elf_Internal_Shdr
*shdr
= elf_elfsections (abfd
)[i
];
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr
, 2 * GRP_ENTRY_SIZE
))
631 num_group
= (unsigned) -1;
632 elf_tdata (abfd
)->num_group
= num_group
;
633 elf_tdata (abfd
)->group_sect_ptr
= NULL
;
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
641 elf_tdata (abfd
)->num_group
= num_group
;
642 amt
= num_group
* sizeof (Elf_Internal_Shdr
*);
643 elf_tdata (abfd
)->group_sect_ptr
644 = (Elf_Internal_Shdr
**) bfd_zalloc (abfd
, amt
);
645 if (elf_tdata (abfd
)->group_sect_ptr
== NULL
)
649 for (i
= 0; i
< shnum
; i
++)
651 Elf_Internal_Shdr
*shdr
= elf_elfsections (abfd
)[i
];
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr
, 2 * GRP_ENTRY_SIZE
))
656 Elf_Internal_Group
*dest
;
658 /* Make sure the group section has a BFD section
660 if (!bfd_section_from_shdr (abfd
, i
))
663 /* Add to list of sections. */
664 elf_tdata (abfd
)->group_sect_ptr
[num_group
] = shdr
;
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest
) >= 4 && sizeof (*dest
) % 4 == 0);
669 shdr
->contents
= NULL
;
670 if (_bfd_mul_overflow (shdr
->sh_size
,
671 sizeof (*dest
) / 4, &amt
)
672 || bfd_seek (abfd
, shdr
->sh_offset
, SEEK_SET
) != 0
674 = _bfd_alloc_and_read (abfd
, amt
, shdr
->sh_size
)))
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64
""),
680 abfd
, (uint64_t) shdr
->sh_size
);
681 bfd_set_error (bfd_error_bad_value
);
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
690 src
= shdr
->contents
+ shdr
->sh_size
;
691 dest
= (Elf_Internal_Group
*) (shdr
->contents
+ amt
);
699 idx
= H_GET_32 (abfd
, src
);
700 if (src
== shdr
->contents
)
704 if (shdr
->bfd_section
!= NULL
&& (idx
& GRP_COMDAT
))
705 shdr
->bfd_section
->flags
706 |= SEC_LINK_ONCE
| SEC_LINK_DUPLICATES_DISCARD
;
711 dest
->shdr
= elf_elfsections (abfd
)[idx
];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
717 dest
->shdr
->sh_flags
|= SHF_GROUP
;
720 || dest
->shdr
->sh_type
== SHT_GROUP
)
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group
!= (unsigned) elf_tdata (abfd
)->num_group
)
734 elf_tdata (abfd
)->num_group
= num_group
;
736 /* If all groups are invalid then fail. */
739 elf_tdata (abfd
)->group_sect_ptr
= NULL
;
740 elf_tdata (abfd
)->num_group
= num_group
= -1;
742 (_("%pB: no valid group sections found"), abfd
);
743 bfd_set_error (bfd_error_bad_value
);
749 if (num_group
!= (unsigned) -1)
751 unsigned int search_offset
= elf_tdata (abfd
)->group_search_offset
;
754 for (j
= 0; j
< num_group
; j
++)
756 /* Begin search from previous found group. */
757 unsigned i
= (j
+ search_offset
) % num_group
;
759 Elf_Internal_Shdr
*shdr
= elf_tdata (abfd
)->group_sect_ptr
[i
];
760 Elf_Internal_Group
*idx
;
766 idx
= (Elf_Internal_Group
*) shdr
->contents
;
767 if (idx
== NULL
|| shdr
->sh_size
< 4)
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd
, shdr
->bfd_section
);
773 elf_tdata (abfd
)->group_sect_ptr
[i
] = NULL
;
774 bfd_set_error (bfd_error_bad_value
);
777 n_elt
= shdr
->sh_size
/ 4;
779 /* Look through this group's sections to see if current
780 section is a member. */
782 if ((++idx
)->shdr
== hdr
)
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
789 idx
= (Elf_Internal_Group
*) shdr
->contents
;
790 n_elt
= shdr
->sh_size
/ 4;
792 if ((++idx
)->shdr
!= NULL
793 && (s
= idx
->shdr
->bfd_section
) != NULL
794 && elf_next_in_group (s
) != NULL
)
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect
) = elf_group_name (s
);
801 elf_next_in_group (newsect
) = elf_next_in_group (s
);
802 elf_next_in_group (s
) = newsect
;
808 gname
= group_signature (abfd
, shdr
);
811 elf_group_name (newsect
) = gname
;
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect
) = newsect
;
817 /* If the group section has been created, point to the
819 if (shdr
->bfd_section
!= NULL
)
820 elf_next_in_group (shdr
->bfd_section
) = newsect
;
822 elf_tdata (abfd
)->group_search_offset
= i
;
829 if (elf_group_name (newsect
) == NULL
)
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
840 _bfd_elf_setup_sections (bfd
*abfd
)
843 unsigned int num_group
= elf_tdata (abfd
)->num_group
;
844 bfd_boolean result
= TRUE
;
847 /* Process SHF_LINK_ORDER. */
848 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
850 Elf_Internal_Shdr
*this_hdr
= &elf_section_data (s
)->this_hdr
;
851 if ((this_hdr
->sh_flags
& SHF_LINK_ORDER
) != 0)
853 unsigned int elfsec
= this_hdr
->sh_link
;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
859 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
860 bed
->link_order_error_handler
861 /* xgettext:c-format */
862 (_("%pB: warning: sh_link not set for section `%pA'"),
867 asection
*linksec
= NULL
;
869 if (elfsec
< elf_numsections (abfd
))
871 this_hdr
= elf_elfsections (abfd
)[elfsec
];
872 linksec
= this_hdr
->bfd_section
;
876 Some strip/objcopy may leave an incorrect value in
877 sh_link. We don't want to proceed. */
881 /* xgettext:c-format */
882 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
883 s
->owner
, elfsec
, s
);
887 elf_linked_to_section (s
) = linksec
;
890 else if (this_hdr
->sh_type
== SHT_GROUP
891 && elf_next_in_group (s
) == NULL
)
894 /* xgettext:c-format */
895 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
896 abfd
, elf_section_data (s
)->this_idx
);
901 /* Process section groups. */
902 if (num_group
== (unsigned) -1)
905 for (i
= 0; i
< num_group
; i
++)
907 Elf_Internal_Shdr
*shdr
= elf_tdata (abfd
)->group_sect_ptr
[i
];
908 Elf_Internal_Group
*idx
;
911 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
912 if (shdr
== NULL
|| shdr
->bfd_section
== NULL
|| shdr
->contents
== NULL
)
915 /* xgettext:c-format */
916 (_("%pB: section group entry number %u is corrupt"),
922 idx
= (Elf_Internal_Group
*) shdr
->contents
;
923 n_elt
= shdr
->sh_size
/ 4;
929 if (idx
->shdr
== NULL
)
931 else if (idx
->shdr
->bfd_section
)
932 elf_sec_group (idx
->shdr
->bfd_section
) = shdr
->bfd_section
;
933 else if (idx
->shdr
->sh_type
!= SHT_RELA
934 && idx
->shdr
->sh_type
!= SHT_REL
)
936 /* There are some unknown sections in the group. */
938 /* xgettext:c-format */
939 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
942 bfd_elf_string_from_elf_section (abfd
,
943 (elf_elfheader (abfd
)
956 bfd_elf_is_group_section (bfd
*abfd ATTRIBUTE_UNUSED
, const asection
*sec
)
958 return elf_next_in_group (sec
) != NULL
;
962 bfd_elf_group_name (bfd
*abfd ATTRIBUTE_UNUSED
, const asection
*sec
)
964 if (elf_sec_group (sec
) != NULL
)
965 return elf_group_name (sec
);
970 convert_debug_to_zdebug (bfd
*abfd
, const char *name
)
972 unsigned int len
= strlen (name
);
973 char *new_name
= bfd_alloc (abfd
, len
+ 2);
974 if (new_name
== NULL
)
978 memcpy (new_name
+ 2, name
+ 1, len
);
983 convert_zdebug_to_debug (bfd
*abfd
, const char *name
)
985 unsigned int len
= strlen (name
);
986 char *new_name
= bfd_alloc (abfd
, len
);
987 if (new_name
== NULL
)
990 memcpy (new_name
+ 1, name
+ 2, len
- 1);
994 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
998 int16_t major_version
;
999 int16_t minor_version
;
1000 unsigned char slim_object
;
1002 /* Flags is a private field that is not defined publicly. */
1006 /* Make a BFD section from an ELF section. We store a pointer to the
1007 BFD section in the bfd_section field of the header. */
1010 _bfd_elf_make_section_from_shdr (bfd
*abfd
,
1011 Elf_Internal_Shdr
*hdr
,
1017 const struct elf_backend_data
*bed
;
1018 unsigned int opb
= bfd_octets_per_byte (abfd
, NULL
);
1020 if (hdr
->bfd_section
!= NULL
)
1023 newsect
= bfd_make_section_anyway (abfd
, name
);
1024 if (newsect
== NULL
)
1027 hdr
->bfd_section
= newsect
;
1028 elf_section_data (newsect
)->this_hdr
= *hdr
;
1029 elf_section_data (newsect
)->this_idx
= shindex
;
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect
) = hdr
->sh_type
;
1033 elf_section_flags (newsect
) = hdr
->sh_flags
;
1035 newsect
->filepos
= hdr
->sh_offset
;
1037 flags
= SEC_NO_FLAGS
;
1038 if (hdr
->sh_type
!= SHT_NOBITS
)
1039 flags
|= SEC_HAS_CONTENTS
;
1040 if (hdr
->sh_type
== SHT_GROUP
)
1042 if ((hdr
->sh_flags
& SHF_ALLOC
) != 0)
1045 if (hdr
->sh_type
!= SHT_NOBITS
)
1048 if ((hdr
->sh_flags
& SHF_WRITE
) == 0)
1049 flags
|= SEC_READONLY
;
1050 if ((hdr
->sh_flags
& SHF_EXECINSTR
) != 0)
1052 else if ((flags
& SEC_LOAD
) != 0)
1054 if ((hdr
->sh_flags
& SHF_MERGE
) != 0)
1057 newsect
->entsize
= hdr
->sh_entsize
;
1059 if ((hdr
->sh_flags
& SHF_STRINGS
) != 0)
1060 flags
|= SEC_STRINGS
;
1061 if (hdr
->sh_flags
& SHF_GROUP
)
1062 if (!setup_group (abfd
, hdr
, newsect
))
1064 if ((hdr
->sh_flags
& SHF_TLS
) != 0)
1065 flags
|= SEC_THREAD_LOCAL
;
1066 if ((hdr
->sh_flags
& SHF_EXCLUDE
) != 0)
1067 flags
|= SEC_EXCLUDE
;
1069 switch (elf_elfheader (abfd
)->e_ident
[EI_OSABI
])
1071 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1072 but binutils as of 2019-07-23 did not set the EI_OSABI header
1076 case ELFOSABI_FREEBSD
:
1077 if ((hdr
->sh_flags
& SHF_GNU_MBIND
) != 0)
1078 elf_tdata (abfd
)->has_gnu_osabi
|= elf_gnu_osabi_mbind
;
1082 if ((flags
& SEC_ALLOC
) == 0)
1084 /* The debugging sections appear to be recognized only by name,
1085 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1086 if (name
[0] == '.')
1088 if (strncmp (name
, ".debug", 6) == 0
1089 || strncmp (name
, ".gnu.linkonce.wi.", 17) == 0
1090 || strncmp (name
, ".zdebug", 7) == 0)
1091 flags
|= SEC_DEBUGGING
| SEC_ELF_OCTETS
;
1092 else if (strncmp (name
, GNU_BUILD_ATTRS_SECTION_NAME
, 21) == 0
1093 || strncmp (name
, ".note.gnu", 9) == 0)
1095 flags
|= SEC_ELF_OCTETS
;
1098 else if (strncmp (name
, ".line", 5) == 0
1099 || strncmp (name
, ".stab", 5) == 0
1100 || strcmp (name
, ".gdb_index") == 0)
1101 flags
|= SEC_DEBUGGING
;
1105 if (!bfd_set_section_vma (newsect
, hdr
->sh_addr
/ opb
)
1106 || !bfd_set_section_size (newsect
, hdr
->sh_size
)
1107 || !bfd_set_section_alignment (newsect
, bfd_log2 (hdr
->sh_addralign
)))
1110 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1111 only link a single copy of the section. This is used to support
1112 g++. g++ will emit each template expansion in its own section.
1113 The symbols will be defined as weak, so that multiple definitions
1114 are permitted. The GNU linker extension is to actually discard
1115 all but one of the sections. */
1116 if (CONST_STRNEQ (name
, ".gnu.linkonce")
1117 && elf_next_in_group (newsect
) == NULL
)
1118 flags
|= SEC_LINK_ONCE
| SEC_LINK_DUPLICATES_DISCARD
;
1120 if (!bfd_set_section_flags (newsect
, flags
))
1123 bed
= get_elf_backend_data (abfd
);
1124 if (bed
->elf_backend_section_flags
)
1125 if (!bed
->elf_backend_section_flags (hdr
))
1128 /* We do not parse the PT_NOTE segments as we are interested even in the
1129 separate debug info files which may have the segments offsets corrupted.
1130 PT_NOTEs from the core files are currently not parsed using BFD. */
1131 if (hdr
->sh_type
== SHT_NOTE
)
1135 if (!bfd_malloc_and_get_section (abfd
, newsect
, &contents
))
1138 elf_parse_notes (abfd
, (char *) contents
, hdr
->sh_size
,
1139 hdr
->sh_offset
, hdr
->sh_addralign
);
1143 if ((newsect
->flags
& SEC_ALLOC
) != 0)
1145 Elf_Internal_Phdr
*phdr
;
1146 unsigned int i
, nload
;
1148 /* Some ELF linkers produce binaries with all the program header
1149 p_paddr fields zero. If we have such a binary with more than
1150 one PT_LOAD header, then leave the section lma equal to vma
1151 so that we don't create sections with overlapping lma. */
1152 phdr
= elf_tdata (abfd
)->phdr
;
1153 for (nload
= 0, i
= 0; i
< elf_elfheader (abfd
)->e_phnum
; i
++, phdr
++)
1154 if (phdr
->p_paddr
!= 0)
1156 else if (phdr
->p_type
== PT_LOAD
&& phdr
->p_memsz
!= 0)
1158 if (i
>= elf_elfheader (abfd
)->e_phnum
&& nload
> 1)
1161 phdr
= elf_tdata (abfd
)->phdr
;
1162 for (i
= 0; i
< elf_elfheader (abfd
)->e_phnum
; i
++, phdr
++)
1164 if (((phdr
->p_type
== PT_LOAD
1165 && (hdr
->sh_flags
& SHF_TLS
) == 0)
1166 || phdr
->p_type
== PT_TLS
)
1167 && ELF_SECTION_IN_SEGMENT (hdr
, phdr
))
1169 if ((newsect
->flags
& SEC_LOAD
) == 0)
1170 newsect
->lma
= (phdr
->p_paddr
1171 + hdr
->sh_addr
- phdr
->p_vaddr
) / opb
;
1173 /* We used to use the same adjustment for SEC_LOAD
1174 sections, but that doesn't work if the segment
1175 is packed with code from multiple VMAs.
1176 Instead we calculate the section LMA based on
1177 the segment LMA. It is assumed that the
1178 segment will contain sections with contiguous
1179 LMAs, even if the VMAs are not. */
1180 newsect
->lma
= (phdr
->p_paddr
1181 + hdr
->sh_offset
- phdr
->p_offset
) / opb
;
1183 /* With contiguous segments, we can't tell from file
1184 offsets whether a section with zero size should
1185 be placed at the end of one segment or the
1186 beginning of the next. Decide based on vaddr. */
1187 if (hdr
->sh_addr
>= phdr
->p_vaddr
1188 && (hdr
->sh_addr
+ hdr
->sh_size
1189 <= phdr
->p_vaddr
+ phdr
->p_memsz
))
1195 /* Compress/decompress DWARF debug sections with names: .debug_* and
1196 .zdebug_*, after the section flags is set. */
1197 if ((newsect
->flags
& SEC_DEBUGGING
)
1198 && ((name
[1] == 'd' && name
[6] == '_')
1199 || (name
[1] == 'z' && name
[7] == '_')))
1201 enum { nothing
, compress
, decompress
} action
= nothing
;
1202 int compression_header_size
;
1203 bfd_size_type uncompressed_size
;
1204 unsigned int uncompressed_align_power
;
1205 bfd_boolean compressed
1206 = bfd_is_section_compressed_with_header (abfd
, newsect
,
1207 &compression_header_size
,
1209 &uncompressed_align_power
);
1212 /* Compressed section. Check if we should decompress. */
1213 if ((abfd
->flags
& BFD_DECOMPRESS
))
1214 action
= decompress
;
1217 /* Compress the uncompressed section or convert from/to .zdebug*
1218 section. Check if we should compress. */
1219 if (action
== nothing
)
1221 if (newsect
->size
!= 0
1222 && (abfd
->flags
& BFD_COMPRESS
)
1223 && compression_header_size
>= 0
1224 && uncompressed_size
> 0
1226 || ((compression_header_size
> 0)
1227 != ((abfd
->flags
& BFD_COMPRESS_GABI
) != 0))))
1233 if (action
== compress
)
1235 if (!bfd_init_section_compress_status (abfd
, newsect
))
1238 /* xgettext:c-format */
1239 (_("%pB: unable to initialize compress status for section %s"),
1246 if (!bfd_init_section_decompress_status (abfd
, newsect
))
1249 /* xgettext:c-format */
1250 (_("%pB: unable to initialize decompress status for section %s"),
1256 if (abfd
->is_linker_input
)
1259 && (action
== decompress
1260 || (action
== compress
1261 && (abfd
->flags
& BFD_COMPRESS_GABI
) != 0)))
1263 /* Convert section name from .zdebug_* to .debug_* so
1264 that linker will consider this section as a debug
1266 char *new_name
= convert_zdebug_to_debug (abfd
, name
);
1267 if (new_name
== NULL
)
1269 bfd_rename_section (newsect
, new_name
);
1273 /* For objdump, don't rename the section. For objcopy, delay
1274 section rename to elf_fake_sections. */
1275 newsect
->flags
|= SEC_ELF_RENAME
;
1278 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1280 const char *lto_section_name
= ".gnu.lto_.lto.";
1281 if (strncmp (name
, lto_section_name
, strlen (lto_section_name
)) == 0)
1283 struct lto_section lsection
;
1284 if (bfd_get_section_contents (abfd
, newsect
, &lsection
, 0,
1285 sizeof (struct lto_section
)))
1286 abfd
->lto_slim_object
= lsection
.slim_object
;
1292 const char *const bfd_elf_section_type_names
[] =
1294 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1295 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1296 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1299 /* ELF relocs are against symbols. If we are producing relocatable
1300 output, and the reloc is against an external symbol, and nothing
1301 has given us any additional addend, the resulting reloc will also
1302 be against the same symbol. In such a case, we don't want to
1303 change anything about the way the reloc is handled, since it will
1304 all be done at final link time. Rather than put special case code
1305 into bfd_perform_relocation, all the reloc types use this howto
1306 function. It just short circuits the reloc if producing
1307 relocatable output against an external symbol. */
1309 bfd_reloc_status_type
1310 bfd_elf_generic_reloc (bfd
*abfd ATTRIBUTE_UNUSED
,
1311 arelent
*reloc_entry
,
1313 void *data ATTRIBUTE_UNUSED
,
1314 asection
*input_section
,
1316 char **error_message ATTRIBUTE_UNUSED
)
1318 if (output_bfd
!= NULL
1319 && (symbol
->flags
& BSF_SECTION_SYM
) == 0
1320 && (! reloc_entry
->howto
->partial_inplace
1321 || reloc_entry
->addend
== 0))
1323 reloc_entry
->address
+= input_section
->output_offset
;
1324 return bfd_reloc_ok
;
1327 return bfd_reloc_continue
;
1330 /* Returns TRUE if section A matches section B.
1331 Names, addresses and links may be different, but everything else
1332 should be the same. */
1335 section_match (const Elf_Internal_Shdr
* a
,
1336 const Elf_Internal_Shdr
* b
)
1338 if (a
->sh_type
!= b
->sh_type
1339 || ((a
->sh_flags
^ b
->sh_flags
) & ~SHF_INFO_LINK
) != 0
1340 || a
->sh_addralign
!= b
->sh_addralign
1341 || a
->sh_entsize
!= b
->sh_entsize
)
1343 if (a
->sh_type
== SHT_SYMTAB
1344 || a
->sh_type
== SHT_STRTAB
)
1346 return a
->sh_size
== b
->sh_size
;
1349 /* Find a section in OBFD that has the same characteristics
1350 as IHEADER. Return the index of this section or SHN_UNDEF if
1351 none can be found. Check's section HINT first, as this is likely
1352 to be the correct section. */
1355 find_link (const bfd
*obfd
, const Elf_Internal_Shdr
*iheader
,
1356 const unsigned int hint
)
1358 Elf_Internal_Shdr
** oheaders
= elf_elfsections (obfd
);
1361 BFD_ASSERT (iheader
!= NULL
);
1363 /* See PR 20922 for a reproducer of the NULL test. */
1364 if (hint
< elf_numsections (obfd
)
1365 && oheaders
[hint
] != NULL
1366 && section_match (oheaders
[hint
], iheader
))
1369 for (i
= 1; i
< elf_numsections (obfd
); i
++)
1371 Elf_Internal_Shdr
* oheader
= oheaders
[i
];
1373 if (oheader
== NULL
)
1375 if (section_match (oheader
, iheader
))
1376 /* FIXME: Do we care if there is a potential for
1377 multiple matches ? */
1384 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1385 Processor specific section, based upon a matching input section.
1386 Returns TRUE upon success, FALSE otherwise. */
1389 copy_special_section_fields (const bfd
*ibfd
,
1391 const Elf_Internal_Shdr
*iheader
,
1392 Elf_Internal_Shdr
*oheader
,
1393 const unsigned int secnum
)
1395 const struct elf_backend_data
*bed
= get_elf_backend_data (obfd
);
1396 const Elf_Internal_Shdr
**iheaders
= (const Elf_Internal_Shdr
**) elf_elfsections (ibfd
);
1397 bfd_boolean changed
= FALSE
;
1398 unsigned int sh_link
;
1400 if (oheader
->sh_type
== SHT_NOBITS
)
1402 /* This is a feature for objcopy --only-keep-debug:
1403 When a section's type is changed to NOBITS, we preserve
1404 the sh_link and sh_info fields so that they can be
1405 matched up with the original.
1407 Note: Strictly speaking these assignments are wrong.
1408 The sh_link and sh_info fields should point to the
1409 relevent sections in the output BFD, which may not be in
1410 the same location as they were in the input BFD. But
1411 the whole point of this action is to preserve the
1412 original values of the sh_link and sh_info fields, so
1413 that they can be matched up with the section headers in
1414 the original file. So strictly speaking we may be
1415 creating an invalid ELF file, but it is only for a file
1416 that just contains debug info and only for sections
1417 without any contents. */
1418 if (oheader
->sh_link
== 0)
1419 oheader
->sh_link
= iheader
->sh_link
;
1420 if (oheader
->sh_info
== 0)
1421 oheader
->sh_info
= iheader
->sh_info
;
1425 /* Allow the target a chance to decide how these fields should be set. */
1426 if (bed
->elf_backend_copy_special_section_fields (ibfd
, obfd
,
1430 /* We have an iheader which might match oheader, and which has non-zero
1431 sh_info and/or sh_link fields. Attempt to follow those links and find
1432 the section in the output bfd which corresponds to the linked section
1433 in the input bfd. */
1434 if (iheader
->sh_link
!= SHN_UNDEF
)
1436 /* See PR 20931 for a reproducer. */
1437 if (iheader
->sh_link
>= elf_numsections (ibfd
))
1440 /* xgettext:c-format */
1441 (_("%pB: invalid sh_link field (%d) in section number %d"),
1442 ibfd
, iheader
->sh_link
, secnum
);
1446 sh_link
= find_link (obfd
, iheaders
[iheader
->sh_link
], iheader
->sh_link
);
1447 if (sh_link
!= SHN_UNDEF
)
1449 oheader
->sh_link
= sh_link
;
1453 /* FIXME: Should we install iheader->sh_link
1454 if we could not find a match ? */
1456 /* xgettext:c-format */
1457 (_("%pB: failed to find link section for section %d"), obfd
, secnum
);
1460 if (iheader
->sh_info
)
1462 /* The sh_info field can hold arbitrary information, but if the
1463 SHF_LINK_INFO flag is set then it should be interpreted as a
1465 if (iheader
->sh_flags
& SHF_INFO_LINK
)
1467 sh_link
= find_link (obfd
, iheaders
[iheader
->sh_info
],
1469 if (sh_link
!= SHN_UNDEF
)
1470 oheader
->sh_flags
|= SHF_INFO_LINK
;
1473 /* No idea what it means - just copy it. */
1474 sh_link
= iheader
->sh_info
;
1476 if (sh_link
!= SHN_UNDEF
)
1478 oheader
->sh_info
= sh_link
;
1483 /* xgettext:c-format */
1484 (_("%pB: failed to find info section for section %d"), obfd
, secnum
);
1490 /* Copy the program header and other data from one object module to
1494 _bfd_elf_copy_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
1496 const Elf_Internal_Shdr
**iheaders
= (const Elf_Internal_Shdr
**) elf_elfsections (ibfd
);
1497 Elf_Internal_Shdr
**oheaders
= elf_elfsections (obfd
);
1498 const struct elf_backend_data
*bed
;
1501 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
1502 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
1505 if (!elf_flags_init (obfd
))
1507 elf_elfheader (obfd
)->e_flags
= elf_elfheader (ibfd
)->e_flags
;
1508 elf_flags_init (obfd
) = TRUE
;
1511 elf_gp (obfd
) = elf_gp (ibfd
);
1513 /* Also copy the EI_OSABI field. */
1514 elf_elfheader (obfd
)->e_ident
[EI_OSABI
] =
1515 elf_elfheader (ibfd
)->e_ident
[EI_OSABI
];
1517 /* If set, copy the EI_ABIVERSION field. */
1518 if (elf_elfheader (ibfd
)->e_ident
[EI_ABIVERSION
])
1519 elf_elfheader (obfd
)->e_ident
[EI_ABIVERSION
]
1520 = elf_elfheader (ibfd
)->e_ident
[EI_ABIVERSION
];
1522 /* Copy object attributes. */
1523 _bfd_elf_copy_obj_attributes (ibfd
, obfd
);
1525 if (iheaders
== NULL
|| oheaders
== NULL
)
1528 bed
= get_elf_backend_data (obfd
);
1530 /* Possibly copy other fields in the section header. */
1531 for (i
= 1; i
< elf_numsections (obfd
); i
++)
1534 Elf_Internal_Shdr
* oheader
= oheaders
[i
];
1536 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1537 because of a special case need for generating separate debug info
1538 files. See below for more details. */
1540 || (oheader
->sh_type
!= SHT_NOBITS
1541 && oheader
->sh_type
< SHT_LOOS
))
1544 /* Ignore empty sections, and sections whose
1545 fields have already been initialised. */
1546 if (oheader
->sh_size
== 0
1547 || (oheader
->sh_info
!= 0 && oheader
->sh_link
!= 0))
1550 /* Scan for the matching section in the input bfd.
1551 First we try for a direct mapping between the input and output sections. */
1552 for (j
= 1; j
< elf_numsections (ibfd
); j
++)
1554 const Elf_Internal_Shdr
* iheader
= iheaders
[j
];
1556 if (iheader
== NULL
)
1559 if (oheader
->bfd_section
!= NULL
1560 && iheader
->bfd_section
!= NULL
1561 && iheader
->bfd_section
->output_section
!= NULL
1562 && iheader
->bfd_section
->output_section
== oheader
->bfd_section
)
1564 /* We have found a connection from the input section to the
1565 output section. Attempt to copy the header fields. If
1566 this fails then do not try any further sections - there
1567 should only be a one-to-one mapping between input and output. */
1568 if (! copy_special_section_fields (ibfd
, obfd
, iheader
, oheader
, i
))
1569 j
= elf_numsections (ibfd
);
1574 if (j
< elf_numsections (ibfd
))
1577 /* That failed. So try to deduce the corresponding input section.
1578 Unfortunately we cannot compare names as the output string table
1579 is empty, so instead we check size, address and type. */
1580 for (j
= 1; j
< elf_numsections (ibfd
); j
++)
1582 const Elf_Internal_Shdr
* iheader
= iheaders
[j
];
1584 if (iheader
== NULL
)
1587 /* Try matching fields in the input section's header.
1588 Since --only-keep-debug turns all non-debug sections into
1589 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1591 if ((oheader
->sh_type
== SHT_NOBITS
1592 || iheader
->sh_type
== oheader
->sh_type
)
1593 && (iheader
->sh_flags
& ~ SHF_INFO_LINK
)
1594 == (oheader
->sh_flags
& ~ SHF_INFO_LINK
)
1595 && iheader
->sh_addralign
== oheader
->sh_addralign
1596 && iheader
->sh_entsize
== oheader
->sh_entsize
1597 && iheader
->sh_size
== oheader
->sh_size
1598 && iheader
->sh_addr
== oheader
->sh_addr
1599 && (iheader
->sh_info
!= oheader
->sh_info
1600 || iheader
->sh_link
!= oheader
->sh_link
))
1602 if (copy_special_section_fields (ibfd
, obfd
, iheader
, oheader
, i
))
1607 if (j
== elf_numsections (ibfd
) && oheader
->sh_type
>= SHT_LOOS
)
1609 /* Final attempt. Call the backend copy function
1610 with a NULL input section. */
1611 (void) bed
->elf_backend_copy_special_section_fields (ibfd
, obfd
,
1620 get_segment_type (unsigned int p_type
)
1625 case PT_NULL
: pt
= "NULL"; break;
1626 case PT_LOAD
: pt
= "LOAD"; break;
1627 case PT_DYNAMIC
: pt
= "DYNAMIC"; break;
1628 case PT_INTERP
: pt
= "INTERP"; break;
1629 case PT_NOTE
: pt
= "NOTE"; break;
1630 case PT_SHLIB
: pt
= "SHLIB"; break;
1631 case PT_PHDR
: pt
= "PHDR"; break;
1632 case PT_TLS
: pt
= "TLS"; break;
1633 case PT_GNU_EH_FRAME
: pt
= "EH_FRAME"; break;
1634 case PT_GNU_STACK
: pt
= "STACK"; break;
1635 case PT_GNU_RELRO
: pt
= "RELRO"; break;
1636 default: pt
= NULL
; break;
1641 /* Print out the program headers. */
1644 _bfd_elf_print_private_bfd_data (bfd
*abfd
, void *farg
)
1646 FILE *f
= (FILE *) farg
;
1647 Elf_Internal_Phdr
*p
;
1649 bfd_byte
*dynbuf
= NULL
;
1651 p
= elf_tdata (abfd
)->phdr
;
1656 fprintf (f
, _("\nProgram Header:\n"));
1657 c
= elf_elfheader (abfd
)->e_phnum
;
1658 for (i
= 0; i
< c
; i
++, p
++)
1660 const char *pt
= get_segment_type (p
->p_type
);
1665 sprintf (buf
, "0x%lx", p
->p_type
);
1668 fprintf (f
, "%8s off 0x", pt
);
1669 bfd_fprintf_vma (abfd
, f
, p
->p_offset
);
1670 fprintf (f
, " vaddr 0x");
1671 bfd_fprintf_vma (abfd
, f
, p
->p_vaddr
);
1672 fprintf (f
, " paddr 0x");
1673 bfd_fprintf_vma (abfd
, f
, p
->p_paddr
);
1674 fprintf (f
, " align 2**%u\n", bfd_log2 (p
->p_align
));
1675 fprintf (f
, " filesz 0x");
1676 bfd_fprintf_vma (abfd
, f
, p
->p_filesz
);
1677 fprintf (f
, " memsz 0x");
1678 bfd_fprintf_vma (abfd
, f
, p
->p_memsz
);
1679 fprintf (f
, " flags %c%c%c",
1680 (p
->p_flags
& PF_R
) != 0 ? 'r' : '-',
1681 (p
->p_flags
& PF_W
) != 0 ? 'w' : '-',
1682 (p
->p_flags
& PF_X
) != 0 ? 'x' : '-');
1683 if ((p
->p_flags
&~ (unsigned) (PF_R
| PF_W
| PF_X
)) != 0)
1684 fprintf (f
, " %lx", p
->p_flags
&~ (unsigned) (PF_R
| PF_W
| PF_X
));
1689 s
= bfd_get_section_by_name (abfd
, ".dynamic");
1692 unsigned int elfsec
;
1693 unsigned long shlink
;
1694 bfd_byte
*extdyn
, *extdynend
;
1696 void (*swap_dyn_in
) (bfd
*, const void *, Elf_Internal_Dyn
*);
1698 fprintf (f
, _("\nDynamic Section:\n"));
1700 if (!bfd_malloc_and_get_section (abfd
, s
, &dynbuf
))
1703 elfsec
= _bfd_elf_section_from_bfd_section (abfd
, s
);
1704 if (elfsec
== SHN_BAD
)
1706 shlink
= elf_elfsections (abfd
)[elfsec
]->sh_link
;
1708 extdynsize
= get_elf_backend_data (abfd
)->s
->sizeof_dyn
;
1709 swap_dyn_in
= get_elf_backend_data (abfd
)->s
->swap_dyn_in
;
1712 /* PR 17512: file: 6f427532. */
1713 if (s
->size
< extdynsize
)
1715 extdynend
= extdyn
+ s
->size
;
1716 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1718 for (; extdyn
<= (extdynend
- extdynsize
); extdyn
+= extdynsize
)
1720 Elf_Internal_Dyn dyn
;
1721 const char *name
= "";
1723 bfd_boolean stringp
;
1724 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
1726 (*swap_dyn_in
) (abfd
, extdyn
, &dyn
);
1728 if (dyn
.d_tag
== DT_NULL
)
1735 if (bed
->elf_backend_get_target_dtag
)
1736 name
= (*bed
->elf_backend_get_target_dtag
) (dyn
.d_tag
);
1738 if (!strcmp (name
, ""))
1740 sprintf (ab
, "%#" BFD_VMA_FMT
"x", dyn
.d_tag
);
1745 case DT_NEEDED
: name
= "NEEDED"; stringp
= TRUE
; break;
1746 case DT_PLTRELSZ
: name
= "PLTRELSZ"; break;
1747 case DT_PLTGOT
: name
= "PLTGOT"; break;
1748 case DT_HASH
: name
= "HASH"; break;
1749 case DT_STRTAB
: name
= "STRTAB"; break;
1750 case DT_SYMTAB
: name
= "SYMTAB"; break;
1751 case DT_RELA
: name
= "RELA"; break;
1752 case DT_RELASZ
: name
= "RELASZ"; break;
1753 case DT_RELAENT
: name
= "RELAENT"; break;
1754 case DT_STRSZ
: name
= "STRSZ"; break;
1755 case DT_SYMENT
: name
= "SYMENT"; break;
1756 case DT_INIT
: name
= "INIT"; break;
1757 case DT_FINI
: name
= "FINI"; break;
1758 case DT_SONAME
: name
= "SONAME"; stringp
= TRUE
; break;
1759 case DT_RPATH
: name
= "RPATH"; stringp
= TRUE
; break;
1760 case DT_SYMBOLIC
: name
= "SYMBOLIC"; break;
1761 case DT_REL
: name
= "REL"; break;
1762 case DT_RELSZ
: name
= "RELSZ"; break;
1763 case DT_RELENT
: name
= "RELENT"; break;
1764 case DT_PLTREL
: name
= "PLTREL"; break;
1765 case DT_DEBUG
: name
= "DEBUG"; break;
1766 case DT_TEXTREL
: name
= "TEXTREL"; break;
1767 case DT_JMPREL
: name
= "JMPREL"; break;
1768 case DT_BIND_NOW
: name
= "BIND_NOW"; break;
1769 case DT_INIT_ARRAY
: name
= "INIT_ARRAY"; break;
1770 case DT_FINI_ARRAY
: name
= "FINI_ARRAY"; break;
1771 case DT_INIT_ARRAYSZ
: name
= "INIT_ARRAYSZ"; break;
1772 case DT_FINI_ARRAYSZ
: name
= "FINI_ARRAYSZ"; break;
1773 case DT_RUNPATH
: name
= "RUNPATH"; stringp
= TRUE
; break;
1774 case DT_FLAGS
: name
= "FLAGS"; break;
1775 case DT_PREINIT_ARRAY
: name
= "PREINIT_ARRAY"; break;
1776 case DT_PREINIT_ARRAYSZ
: name
= "PREINIT_ARRAYSZ"; break;
1777 case DT_CHECKSUM
: name
= "CHECKSUM"; break;
1778 case DT_PLTPADSZ
: name
= "PLTPADSZ"; break;
1779 case DT_MOVEENT
: name
= "MOVEENT"; break;
1780 case DT_MOVESZ
: name
= "MOVESZ"; break;
1781 case DT_FEATURE
: name
= "FEATURE"; break;
1782 case DT_POSFLAG_1
: name
= "POSFLAG_1"; break;
1783 case DT_SYMINSZ
: name
= "SYMINSZ"; break;
1784 case DT_SYMINENT
: name
= "SYMINENT"; break;
1785 case DT_CONFIG
: name
= "CONFIG"; stringp
= TRUE
; break;
1786 case DT_DEPAUDIT
: name
= "DEPAUDIT"; stringp
= TRUE
; break;
1787 case DT_AUDIT
: name
= "AUDIT"; stringp
= TRUE
; break;
1788 case DT_PLTPAD
: name
= "PLTPAD"; break;
1789 case DT_MOVETAB
: name
= "MOVETAB"; break;
1790 case DT_SYMINFO
: name
= "SYMINFO"; break;
1791 case DT_RELACOUNT
: name
= "RELACOUNT"; break;
1792 case DT_RELCOUNT
: name
= "RELCOUNT"; break;
1793 case DT_FLAGS_1
: name
= "FLAGS_1"; break;
1794 case DT_VERSYM
: name
= "VERSYM"; break;
1795 case DT_VERDEF
: name
= "VERDEF"; break;
1796 case DT_VERDEFNUM
: name
= "VERDEFNUM"; break;
1797 case DT_VERNEED
: name
= "VERNEED"; break;
1798 case DT_VERNEEDNUM
: name
= "VERNEEDNUM"; break;
1799 case DT_AUXILIARY
: name
= "AUXILIARY"; stringp
= TRUE
; break;
1800 case DT_USED
: name
= "USED"; break;
1801 case DT_FILTER
: name
= "FILTER"; stringp
= TRUE
; break;
1802 case DT_GNU_HASH
: name
= "GNU_HASH"; break;
1805 fprintf (f
, " %-20s ", name
);
1809 bfd_fprintf_vma (abfd
, f
, dyn
.d_un
.d_val
);
1814 unsigned int tagv
= dyn
.d_un
.d_val
;
1816 string
= bfd_elf_string_from_elf_section (abfd
, shlink
, tagv
);
1819 fprintf (f
, "%s", string
);
1828 if ((elf_dynverdef (abfd
) != 0 && elf_tdata (abfd
)->verdef
== NULL
)
1829 || (elf_dynverref (abfd
) != 0 && elf_tdata (abfd
)->verref
== NULL
))
1831 if (! _bfd_elf_slurp_version_tables (abfd
, FALSE
))
1835 if (elf_dynverdef (abfd
) != 0)
1837 Elf_Internal_Verdef
*t
;
1839 fprintf (f
, _("\nVersion definitions:\n"));
1840 for (t
= elf_tdata (abfd
)->verdef
; t
!= NULL
; t
= t
->vd_nextdef
)
1842 fprintf (f
, "%d 0x%2.2x 0x%8.8lx %s\n", t
->vd_ndx
,
1843 t
->vd_flags
, t
->vd_hash
,
1844 t
->vd_nodename
? t
->vd_nodename
: "<corrupt>");
1845 if (t
->vd_auxptr
!= NULL
&& t
->vd_auxptr
->vda_nextptr
!= NULL
)
1847 Elf_Internal_Verdaux
*a
;
1850 for (a
= t
->vd_auxptr
->vda_nextptr
;
1854 a
->vda_nodename
? a
->vda_nodename
: "<corrupt>");
1860 if (elf_dynverref (abfd
) != 0)
1862 Elf_Internal_Verneed
*t
;
1864 fprintf (f
, _("\nVersion References:\n"));
1865 for (t
= elf_tdata (abfd
)->verref
; t
!= NULL
; t
= t
->vn_nextref
)
1867 Elf_Internal_Vernaux
*a
;
1869 fprintf (f
, _(" required from %s:\n"),
1870 t
->vn_filename
? t
->vn_filename
: "<corrupt>");
1871 for (a
= t
->vn_auxptr
; a
!= NULL
; a
= a
->vna_nextptr
)
1872 fprintf (f
, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a
->vna_hash
,
1873 a
->vna_flags
, a
->vna_other
,
1874 a
->vna_nodename
? a
->vna_nodename
: "<corrupt>");
1886 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1887 and return symbol version for symbol version itself. */
1890 _bfd_elf_get_symbol_version_name (bfd
*abfd
, asymbol
*symbol
,
1892 bfd_boolean
*hidden
)
1894 const char *version_string
= NULL
;
1895 if (elf_dynversym (abfd
) != 0
1896 && (elf_dynverdef (abfd
) != 0 || elf_dynverref (abfd
) != 0))
1898 unsigned int vernum
= ((elf_symbol_type
*) symbol
)->version
;
1900 *hidden
= (vernum
& VERSYM_HIDDEN
) != 0;
1901 vernum
&= VERSYM_VERSION
;
1904 version_string
= "";
1905 else if (vernum
== 1
1906 && (vernum
> elf_tdata (abfd
)->cverdefs
1907 || (elf_tdata (abfd
)->verdef
[0].vd_flags
1909 version_string
= base_p
? "Base" : "";
1910 else if (vernum
<= elf_tdata (abfd
)->cverdefs
)
1912 const char *nodename
1913 = elf_tdata (abfd
)->verdef
[vernum
- 1].vd_nodename
;
1914 version_string
= ((base_p
|| strcmp (symbol
->name
, nodename
))
1919 Elf_Internal_Verneed
*t
;
1921 version_string
= _("<corrupt>");
1922 for (t
= elf_tdata (abfd
)->verref
;
1926 Elf_Internal_Vernaux
*a
;
1928 for (a
= t
->vn_auxptr
; a
!= NULL
; a
= a
->vna_nextptr
)
1930 if (a
->vna_other
== vernum
)
1932 version_string
= a
->vna_nodename
;
1939 return version_string
;
1942 /* Get version string. */
1945 _bfd_elf_get_symbol_version_string (bfd
*abfd
, asymbol
*symbol
,
1946 bfd_boolean
*hidden
)
1948 return _bfd_elf_get_symbol_version_name (abfd
, symbol
, TRUE
, hidden
);
1951 /* Display ELF-specific fields of a symbol. */
1954 bfd_elf_print_symbol (bfd
*abfd
,
1957 bfd_print_symbol_type how
)
1959 FILE *file
= (FILE *) filep
;
1962 case bfd_print_symbol_name
:
1963 fprintf (file
, "%s", symbol
->name
);
1965 case bfd_print_symbol_more
:
1966 fprintf (file
, "elf ");
1967 bfd_fprintf_vma (abfd
, file
, symbol
->value
);
1968 fprintf (file
, " %x", symbol
->flags
);
1970 case bfd_print_symbol_all
:
1972 const char *section_name
;
1973 const char *name
= NULL
;
1974 const struct elf_backend_data
*bed
;
1975 unsigned char st_other
;
1977 const char *version_string
;
1980 section_name
= symbol
->section
? symbol
->section
->name
: "(*none*)";
1982 bed
= get_elf_backend_data (abfd
);
1983 if (bed
->elf_backend_print_symbol_all
)
1984 name
= (*bed
->elf_backend_print_symbol_all
) (abfd
, filep
, symbol
);
1988 name
= symbol
->name
;
1989 bfd_print_symbol_vandf (abfd
, file
, symbol
);
1992 fprintf (file
, " %s\t", section_name
);
1993 /* Print the "other" value for a symbol. For common symbols,
1994 we've already printed the size; now print the alignment.
1995 For other symbols, we have no specified alignment, and
1996 we've printed the address; now print the size. */
1997 if (symbol
->section
&& bfd_is_com_section (symbol
->section
))
1998 val
= ((elf_symbol_type
*) symbol
)->internal_elf_sym
.st_value
;
2000 val
= ((elf_symbol_type
*) symbol
)->internal_elf_sym
.st_size
;
2001 bfd_fprintf_vma (abfd
, file
, val
);
2003 /* If we have version information, print it. */
2004 version_string
= _bfd_elf_get_symbol_version_string (abfd
,
2010 fprintf (file
, " %-11s", version_string
);
2015 fprintf (file
, " (%s)", version_string
);
2016 for (i
= 10 - strlen (version_string
); i
> 0; --i
)
2021 /* If the st_other field is not zero, print it. */
2022 st_other
= ((elf_symbol_type
*) symbol
)->internal_elf_sym
.st_other
;
2027 case STV_INTERNAL
: fprintf (file
, " .internal"); break;
2028 case STV_HIDDEN
: fprintf (file
, " .hidden"); break;
2029 case STV_PROTECTED
: fprintf (file
, " .protected"); break;
2031 /* Some other non-defined flags are also present, so print
2033 fprintf (file
, " 0x%02x", (unsigned int) st_other
);
2036 fprintf (file
, " %s", name
);
2042 /* ELF .o/exec file reading */
2044 /* Create a new bfd section from an ELF section header. */
2047 bfd_section_from_shdr (bfd
*abfd
, unsigned int shindex
)
2049 Elf_Internal_Shdr
*hdr
;
2050 Elf_Internal_Ehdr
*ehdr
;
2051 const struct elf_backend_data
*bed
;
2053 bfd_boolean ret
= TRUE
;
2054 static bfd_boolean
* sections_being_created
= NULL
;
2055 static bfd
* sections_being_created_abfd
= NULL
;
2056 static unsigned int nesting
= 0;
2058 if (shindex
>= elf_numsections (abfd
))
2063 /* PR17512: A corrupt ELF binary might contain a recursive group of
2064 sections, with each the string indices pointing to the next in the
2065 loop. Detect this here, by refusing to load a section that we are
2066 already in the process of loading. We only trigger this test if
2067 we have nested at least three sections deep as normal ELF binaries
2068 can expect to recurse at least once.
2070 FIXME: It would be better if this array was attached to the bfd,
2071 rather than being held in a static pointer. */
2073 if (sections_being_created_abfd
!= abfd
)
2074 sections_being_created
= NULL
;
2075 if (sections_being_created
== NULL
)
2077 size_t amt
= elf_numsections (abfd
) * sizeof (bfd_boolean
);
2078 sections_being_created
= (bfd_boolean
*) bfd_zalloc (abfd
, amt
);
2079 if (sections_being_created
== NULL
)
2081 sections_being_created_abfd
= abfd
;
2083 if (sections_being_created
[shindex
])
2086 (_("%pB: warning: loop in section dependencies detected"), abfd
);
2089 sections_being_created
[shindex
] = TRUE
;
2092 hdr
= elf_elfsections (abfd
)[shindex
];
2093 ehdr
= elf_elfheader (abfd
);
2094 name
= bfd_elf_string_from_elf_section (abfd
, ehdr
->e_shstrndx
,
2099 bed
= get_elf_backend_data (abfd
);
2100 switch (hdr
->sh_type
)
2103 /* Inactive section. Throw it away. */
2106 case SHT_PROGBITS
: /* Normal section with contents. */
2107 case SHT_NOBITS
: /* .bss section. */
2108 case SHT_HASH
: /* .hash section. */
2109 case SHT_NOTE
: /* .note section. */
2110 case SHT_INIT_ARRAY
: /* .init_array section. */
2111 case SHT_FINI_ARRAY
: /* .fini_array section. */
2112 case SHT_PREINIT_ARRAY
: /* .preinit_array section. */
2113 case SHT_GNU_LIBLIST
: /* .gnu.liblist section. */
2114 case SHT_GNU_HASH
: /* .gnu.hash section. */
2115 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2118 case SHT_DYNAMIC
: /* Dynamic linking information. */
2119 if (! _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
))
2122 if (hdr
->sh_link
> elf_numsections (abfd
))
2124 /* PR 10478: Accept Solaris binaries with a sh_link
2125 field set to SHN_BEFORE or SHN_AFTER. */
2126 switch (bfd_get_arch (abfd
))
2129 case bfd_arch_sparc
:
2130 if (hdr
->sh_link
== (SHN_LORESERVE
& 0xffff) /* SHN_BEFORE */
2131 || hdr
->sh_link
== ((SHN_LORESERVE
+ 1) & 0xffff) /* SHN_AFTER */)
2133 /* Otherwise fall through. */
2138 else if (elf_elfsections (abfd
)[hdr
->sh_link
] == NULL
)
2140 else if (elf_elfsections (abfd
)[hdr
->sh_link
]->sh_type
!= SHT_STRTAB
)
2142 Elf_Internal_Shdr
*dynsymhdr
;
2144 /* The shared libraries distributed with hpux11 have a bogus
2145 sh_link field for the ".dynamic" section. Find the
2146 string table for the ".dynsym" section instead. */
2147 if (elf_dynsymtab (abfd
) != 0)
2149 dynsymhdr
= elf_elfsections (abfd
)[elf_dynsymtab (abfd
)];
2150 hdr
->sh_link
= dynsymhdr
->sh_link
;
2154 unsigned int i
, num_sec
;
2156 num_sec
= elf_numsections (abfd
);
2157 for (i
= 1; i
< num_sec
; i
++)
2159 dynsymhdr
= elf_elfsections (abfd
)[i
];
2160 if (dynsymhdr
->sh_type
== SHT_DYNSYM
)
2162 hdr
->sh_link
= dynsymhdr
->sh_link
;
2170 case SHT_SYMTAB
: /* A symbol table. */
2171 if (elf_onesymtab (abfd
) == shindex
)
2174 if (hdr
->sh_entsize
!= bed
->s
->sizeof_sym
)
2177 if (hdr
->sh_info
* hdr
->sh_entsize
> hdr
->sh_size
)
2179 if (hdr
->sh_size
!= 0)
2181 /* Some assemblers erroneously set sh_info to one with a
2182 zero sh_size. ld sees this as a global symbol count
2183 of (unsigned) -1. Fix it here. */
2188 /* PR 18854: A binary might contain more than one symbol table.
2189 Unusual, but possible. Warn, but continue. */
2190 if (elf_onesymtab (abfd
) != 0)
2193 /* xgettext:c-format */
2194 (_("%pB: warning: multiple symbol tables detected"
2195 " - ignoring the table in section %u"),
2199 elf_onesymtab (abfd
) = shindex
;
2200 elf_symtab_hdr (abfd
) = *hdr
;
2201 elf_elfsections (abfd
)[shindex
] = hdr
= & elf_symtab_hdr (abfd
);
2202 abfd
->flags
|= HAS_SYMS
;
2204 /* Sometimes a shared object will map in the symbol table. If
2205 SHF_ALLOC is set, and this is a shared object, then we also
2206 treat this section as a BFD section. We can not base the
2207 decision purely on SHF_ALLOC, because that flag is sometimes
2208 set in a relocatable object file, which would confuse the
2210 if ((hdr
->sh_flags
& SHF_ALLOC
) != 0
2211 && (abfd
->flags
& DYNAMIC
) != 0
2212 && ! _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
,
2216 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2217 can't read symbols without that section loaded as well. It
2218 is most likely specified by the next section header. */
2220 elf_section_list
* entry
;
2221 unsigned int i
, num_sec
;
2223 for (entry
= elf_symtab_shndx_list (abfd
); entry
!= NULL
; entry
= entry
->next
)
2224 if (entry
->hdr
.sh_link
== shindex
)
2227 num_sec
= elf_numsections (abfd
);
2228 for (i
= shindex
+ 1; i
< num_sec
; i
++)
2230 Elf_Internal_Shdr
*hdr2
= elf_elfsections (abfd
)[i
];
2232 if (hdr2
->sh_type
== SHT_SYMTAB_SHNDX
2233 && hdr2
->sh_link
== shindex
)
2238 for (i
= 1; i
< shindex
; i
++)
2240 Elf_Internal_Shdr
*hdr2
= elf_elfsections (abfd
)[i
];
2242 if (hdr2
->sh_type
== SHT_SYMTAB_SHNDX
2243 && hdr2
->sh_link
== shindex
)
2248 ret
= bfd_section_from_shdr (abfd
, i
);
2249 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2253 case SHT_DYNSYM
: /* A dynamic symbol table. */
2254 if (elf_dynsymtab (abfd
) == shindex
)
2257 if (hdr
->sh_entsize
!= bed
->s
->sizeof_sym
)
2260 if (hdr
->sh_info
* hdr
->sh_entsize
> hdr
->sh_size
)
2262 if (hdr
->sh_size
!= 0)
2265 /* Some linkers erroneously set sh_info to one with a
2266 zero sh_size. ld sees this as a global symbol count
2267 of (unsigned) -1. Fix it here. */
2272 /* PR 18854: A binary might contain more than one dynamic symbol table.
2273 Unusual, but possible. Warn, but continue. */
2274 if (elf_dynsymtab (abfd
) != 0)
2277 /* xgettext:c-format */
2278 (_("%pB: warning: multiple dynamic symbol tables detected"
2279 " - ignoring the table in section %u"),
2283 elf_dynsymtab (abfd
) = shindex
;
2284 elf_tdata (abfd
)->dynsymtab_hdr
= *hdr
;
2285 elf_elfsections (abfd
)[shindex
] = hdr
= &elf_tdata (abfd
)->dynsymtab_hdr
;
2286 abfd
->flags
|= HAS_SYMS
;
2288 /* Besides being a symbol table, we also treat this as a regular
2289 section, so that objcopy can handle it. */
2290 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2293 case SHT_SYMTAB_SHNDX
: /* Symbol section indices when >64k sections. */
2295 elf_section_list
* entry
;
2297 for (entry
= elf_symtab_shndx_list (abfd
); entry
!= NULL
; entry
= entry
->next
)
2298 if (entry
->ndx
== shindex
)
2301 entry
= bfd_alloc (abfd
, sizeof (*entry
));
2304 entry
->ndx
= shindex
;
2306 entry
->next
= elf_symtab_shndx_list (abfd
);
2307 elf_symtab_shndx_list (abfd
) = entry
;
2308 elf_elfsections (abfd
)[shindex
] = & entry
->hdr
;
2312 case SHT_STRTAB
: /* A string table. */
2313 if (hdr
->bfd_section
!= NULL
)
2316 if (ehdr
->e_shstrndx
== shindex
)
2318 elf_tdata (abfd
)->shstrtab_hdr
= *hdr
;
2319 elf_elfsections (abfd
)[shindex
] = &elf_tdata (abfd
)->shstrtab_hdr
;
2323 if (elf_elfsections (abfd
)[elf_onesymtab (abfd
)]->sh_link
== shindex
)
2326 elf_tdata (abfd
)->strtab_hdr
= *hdr
;
2327 elf_elfsections (abfd
)[shindex
] = &elf_tdata (abfd
)->strtab_hdr
;
2331 if (elf_elfsections (abfd
)[elf_dynsymtab (abfd
)]->sh_link
== shindex
)
2334 elf_tdata (abfd
)->dynstrtab_hdr
= *hdr
;
2335 hdr
= &elf_tdata (abfd
)->dynstrtab_hdr
;
2336 elf_elfsections (abfd
)[shindex
] = hdr
;
2337 /* We also treat this as a regular section, so that objcopy
2339 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
,
2344 /* If the string table isn't one of the above, then treat it as a
2345 regular section. We need to scan all the headers to be sure,
2346 just in case this strtab section appeared before the above. */
2347 if (elf_onesymtab (abfd
) == 0 || elf_dynsymtab (abfd
) == 0)
2349 unsigned int i
, num_sec
;
2351 num_sec
= elf_numsections (abfd
);
2352 for (i
= 1; i
< num_sec
; i
++)
2354 Elf_Internal_Shdr
*hdr2
= elf_elfsections (abfd
)[i
];
2355 if (hdr2
->sh_link
== shindex
)
2357 /* Prevent endless recursion on broken objects. */
2360 if (! bfd_section_from_shdr (abfd
, i
))
2362 if (elf_onesymtab (abfd
) == i
)
2364 if (elf_dynsymtab (abfd
) == i
)
2365 goto dynsymtab_strtab
;
2369 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2374 /* *These* do a lot of work -- but build no sections! */
2376 asection
*target_sect
;
2377 Elf_Internal_Shdr
*hdr2
, **p_hdr
;
2378 unsigned int num_sec
= elf_numsections (abfd
);
2379 struct bfd_elf_section_data
*esdt
;
2382 != (bfd_size_type
) (hdr
->sh_type
== SHT_REL
2383 ? bed
->s
->sizeof_rel
: bed
->s
->sizeof_rela
))
2386 /* Check for a bogus link to avoid crashing. */
2387 if (hdr
->sh_link
>= num_sec
)
2390 /* xgettext:c-format */
2391 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2392 abfd
, hdr
->sh_link
, name
, shindex
);
2393 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
,
2398 /* For some incomprehensible reason Oracle distributes
2399 libraries for Solaris in which some of the objects have
2400 bogus sh_link fields. It would be nice if we could just
2401 reject them, but, unfortunately, some people need to use
2402 them. We scan through the section headers; if we find only
2403 one suitable symbol table, we clobber the sh_link to point
2404 to it. I hope this doesn't break anything.
2406 Don't do it on executable nor shared library. */
2407 if ((abfd
->flags
& (DYNAMIC
| EXEC_P
)) == 0
2408 && elf_elfsections (abfd
)[hdr
->sh_link
]->sh_type
!= SHT_SYMTAB
2409 && elf_elfsections (abfd
)[hdr
->sh_link
]->sh_type
!= SHT_DYNSYM
)
2415 for (scan
= 1; scan
< num_sec
; scan
++)
2417 if (elf_elfsections (abfd
)[scan
]->sh_type
== SHT_SYMTAB
2418 || elf_elfsections (abfd
)[scan
]->sh_type
== SHT_DYNSYM
)
2429 hdr
->sh_link
= found
;
2432 /* Get the symbol table. */
2433 if ((elf_elfsections (abfd
)[hdr
->sh_link
]->sh_type
== SHT_SYMTAB
2434 || elf_elfsections (abfd
)[hdr
->sh_link
]->sh_type
== SHT_DYNSYM
)
2435 && ! bfd_section_from_shdr (abfd
, hdr
->sh_link
))
2438 /* If this is an alloc section in an executable or shared
2439 library, or the reloc section does not use the main symbol
2440 table we don't treat it as a reloc section. BFD can't
2441 adequately represent such a section, so at least for now,
2442 we don't try. We just present it as a normal section. We
2443 also can't use it as a reloc section if it points to the
2444 null section, an invalid section, another reloc section, or
2445 its sh_link points to the null section. */
2446 if (((abfd
->flags
& (DYNAMIC
| EXEC_P
)) != 0
2447 && (hdr
->sh_flags
& SHF_ALLOC
) != 0)
2448 || hdr
->sh_link
== SHN_UNDEF
2449 || hdr
->sh_link
!= elf_onesymtab (abfd
)
2450 || hdr
->sh_info
== SHN_UNDEF
2451 || hdr
->sh_info
>= num_sec
2452 || elf_elfsections (abfd
)[hdr
->sh_info
]->sh_type
== SHT_REL
2453 || elf_elfsections (abfd
)[hdr
->sh_info
]->sh_type
== SHT_RELA
)
2455 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
,
2460 if (! bfd_section_from_shdr (abfd
, hdr
->sh_info
))
2463 target_sect
= bfd_section_from_elf_index (abfd
, hdr
->sh_info
);
2464 if (target_sect
== NULL
)
2467 esdt
= elf_section_data (target_sect
);
2468 if (hdr
->sh_type
== SHT_RELA
)
2469 p_hdr
= &esdt
->rela
.hdr
;
2471 p_hdr
= &esdt
->rel
.hdr
;
2473 /* PR 17512: file: 0b4f81b7.
2474 Also see PR 24456, for a file which deliberately has two reloc
2478 if (!bed
->init_secondary_reloc_section (abfd
, hdr
, name
, shindex
))
2481 /* xgettext:c-format */
2482 (_("%pB: warning: secondary relocation section '%s' "
2483 "for section %pA found - ignoring"),
2484 abfd
, name
, target_sect
);
2489 hdr2
= (Elf_Internal_Shdr
*) bfd_alloc (abfd
, sizeof (*hdr2
));
2494 elf_elfsections (abfd
)[shindex
] = hdr2
;
2495 target_sect
->reloc_count
+= (NUM_SHDR_ENTRIES (hdr
)
2496 * bed
->s
->int_rels_per_ext_rel
);
2497 target_sect
->flags
|= SEC_RELOC
;
2498 target_sect
->relocation
= NULL
;
2499 target_sect
->rel_filepos
= hdr
->sh_offset
;
2500 /* In the section to which the relocations apply, mark whether
2501 its relocations are of the REL or RELA variety. */
2502 if (hdr
->sh_size
!= 0)
2504 if (hdr
->sh_type
== SHT_RELA
)
2505 target_sect
->use_rela_p
= 1;
2507 abfd
->flags
|= HAS_RELOC
;
2511 case SHT_GNU_verdef
:
2512 elf_dynverdef (abfd
) = shindex
;
2513 elf_tdata (abfd
)->dynverdef_hdr
= *hdr
;
2514 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2517 case SHT_GNU_versym
:
2518 if (hdr
->sh_entsize
!= sizeof (Elf_External_Versym
))
2521 elf_dynversym (abfd
) = shindex
;
2522 elf_tdata (abfd
)->dynversym_hdr
= *hdr
;
2523 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2526 case SHT_GNU_verneed
:
2527 elf_dynverref (abfd
) = shindex
;
2528 elf_tdata (abfd
)->dynverref_hdr
= *hdr
;
2529 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2536 if (! IS_VALID_GROUP_SECTION_HEADER (hdr
, GRP_ENTRY_SIZE
))
2539 if (!_bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
))
2545 /* Possibly an attributes section. */
2546 if (hdr
->sh_type
== SHT_GNU_ATTRIBUTES
2547 || hdr
->sh_type
== bed
->obj_attrs_section_type
)
2549 if (! _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
))
2551 _bfd_elf_parse_attributes (abfd
, hdr
);
2555 /* Check for any processor-specific section types. */
2556 if (bed
->elf_backend_section_from_shdr (abfd
, hdr
, name
, shindex
))
2559 if (hdr
->sh_type
>= SHT_LOUSER
&& hdr
->sh_type
<= SHT_HIUSER
)
2561 if ((hdr
->sh_flags
& SHF_ALLOC
) != 0)
2562 /* FIXME: How to properly handle allocated section reserved
2563 for applications? */
2565 /* xgettext:c-format */
2566 (_("%pB: unknown type [%#x] section `%s'"),
2567 abfd
, hdr
->sh_type
, name
);
2570 /* Allow sections reserved for applications. */
2571 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
,
2576 else if (hdr
->sh_type
>= SHT_LOPROC
2577 && hdr
->sh_type
<= SHT_HIPROC
)
2578 /* FIXME: We should handle this section. */
2580 /* xgettext:c-format */
2581 (_("%pB: unknown type [%#x] section `%s'"),
2582 abfd
, hdr
->sh_type
, name
);
2583 else if (hdr
->sh_type
>= SHT_LOOS
&& hdr
->sh_type
<= SHT_HIOS
)
2585 /* Unrecognised OS-specific sections. */
2586 if ((hdr
->sh_flags
& SHF_OS_NONCONFORMING
) != 0)
2587 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2588 required to correctly process the section and the file should
2589 be rejected with an error message. */
2591 /* xgettext:c-format */
2592 (_("%pB: unknown type [%#x] section `%s'"),
2593 abfd
, hdr
->sh_type
, name
);
2596 /* Otherwise it should be processed. */
2597 ret
= _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
2602 /* FIXME: We should handle this section. */
2604 /* xgettext:c-format */
2605 (_("%pB: unknown type [%#x] section `%s'"),
2606 abfd
, hdr
->sh_type
, name
);
2614 if (sections_being_created
&& sections_being_created_abfd
== abfd
)
2615 sections_being_created
[shindex
] = FALSE
;
2616 if (-- nesting
== 0)
2618 sections_being_created
= NULL
;
2619 sections_being_created_abfd
= abfd
;
2624 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2627 bfd_sym_from_r_symndx (struct sym_cache
*cache
,
2629 unsigned long r_symndx
)
2631 unsigned int ent
= r_symndx
% LOCAL_SYM_CACHE_SIZE
;
2633 if (cache
->abfd
!= abfd
|| cache
->indx
[ent
] != r_symndx
)
2635 Elf_Internal_Shdr
*symtab_hdr
;
2636 unsigned char esym
[sizeof (Elf64_External_Sym
)];
2637 Elf_External_Sym_Shndx eshndx
;
2639 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
2640 if (bfd_elf_get_elf_syms (abfd
, symtab_hdr
, 1, r_symndx
,
2641 &cache
->sym
[ent
], esym
, &eshndx
) == NULL
)
2644 if (cache
->abfd
!= abfd
)
2646 memset (cache
->indx
, -1, sizeof (cache
->indx
));
2649 cache
->indx
[ent
] = r_symndx
;
2652 return &cache
->sym
[ent
];
2655 /* Given an ELF section number, retrieve the corresponding BFD
2659 bfd_section_from_elf_index (bfd
*abfd
, unsigned int sec_index
)
2661 if (sec_index
>= elf_numsections (abfd
))
2663 return elf_elfsections (abfd
)[sec_index
]->bfd_section
;
2666 static const struct bfd_elf_special_section special_sections_b
[] =
2668 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS
, SHF_ALLOC
+ SHF_WRITE
},
2669 { NULL
, 0, 0, 0, 0 }
2672 static const struct bfd_elf_special_section special_sections_c
[] =
2674 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS
, 0 },
2675 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS
, 0 },
2676 { NULL
, 0, 0, 0, 0 }
2679 static const struct bfd_elf_special_section special_sections_d
[] =
2681 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
2682 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
2683 /* There are more DWARF sections than these, but they needn't be added here
2684 unless you have to cope with broken compilers that don't emit section
2685 attributes or you want to help the user writing assembler. */
2686 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS
, 0 },
2687 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS
, 0 },
2688 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS
, 0 },
2689 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS
, 0 },
2690 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS
, 0 },
2691 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC
, SHF_ALLOC
},
2692 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB
, SHF_ALLOC
},
2693 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM
, SHF_ALLOC
},
2694 { NULL
, 0, 0, 0, 0 }
2697 static const struct bfd_elf_special_section special_sections_f
[] =
2699 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
2700 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY
, SHF_ALLOC
+ SHF_WRITE
},
2701 { NULL
, 0 , 0, 0, 0 }
2704 static const struct bfd_elf_special_section special_sections_g
[] =
2706 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS
, SHF_ALLOC
+ SHF_WRITE
},
2707 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS
, SHF_EXCLUDE
},
2708 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
2709 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym
, 0 },
2710 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef
, 0 },
2711 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed
, 0 },
2712 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST
, SHF_ALLOC
},
2713 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA
, SHF_ALLOC
},
2714 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH
, SHF_ALLOC
},
2715 { NULL
, 0, 0, 0, 0 }
2718 static const struct bfd_elf_special_section special_sections_h
[] =
2720 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH
, SHF_ALLOC
},
2721 { NULL
, 0, 0, 0, 0 }
2724 static const struct bfd_elf_special_section special_sections_i
[] =
2726 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
2727 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY
, SHF_ALLOC
+ SHF_WRITE
},
2728 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS
, 0 },
2729 { NULL
, 0, 0, 0, 0 }
2732 static const struct bfd_elf_special_section special_sections_l
[] =
2734 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS
, 0 },
2735 { NULL
, 0, 0, 0, 0 }
2738 static const struct bfd_elf_special_section special_sections_n
[] =
2740 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS
, 0 },
2741 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE
, 0 },
2742 { NULL
, 0, 0, 0, 0 }
2745 static const struct bfd_elf_special_section special_sections_p
[] =
2747 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY
, SHF_ALLOC
+ SHF_WRITE
},
2748 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
2749 { NULL
, 0, 0, 0, 0 }
2752 static const struct bfd_elf_special_section special_sections_r
[] =
2754 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS
, SHF_ALLOC
},
2755 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS
, SHF_ALLOC
},
2756 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA
, 0 },
2757 { STRING_COMMA_LEN (".rel"), -1, SHT_REL
, 0 },
2758 { NULL
, 0, 0, 0, 0 }
2761 static const struct bfd_elf_special_section special_sections_s
[] =
2763 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB
, 0 },
2764 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB
, 0 },
2765 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB
, 0 },
2766 /* See struct bfd_elf_special_section declaration for the semantics of
2767 this special case where .prefix_length != strlen (.prefix). */
2768 { ".stabstr", 5, 3, SHT_STRTAB
, 0 },
2769 { NULL
, 0, 0, 0, 0 }
2772 static const struct bfd_elf_special_section special_sections_t
[] =
2774 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_EXECINSTR
},
2775 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS
, SHF_ALLOC
+ SHF_WRITE
+ SHF_TLS
},
2776 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
+ SHF_TLS
},
2777 { NULL
, 0, 0, 0, 0 }
2780 static const struct bfd_elf_special_section special_sections_z
[] =
2782 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS
, 0 },
2783 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS
, 0 },
2784 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS
, 0 },
2785 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS
, 0 },
2786 { NULL
, 0, 0, 0, 0 }
2789 static const struct bfd_elf_special_section
* const special_sections
[] =
2791 special_sections_b
, /* 'b' */
2792 special_sections_c
, /* 'c' */
2793 special_sections_d
, /* 'd' */
2795 special_sections_f
, /* 'f' */
2796 special_sections_g
, /* 'g' */
2797 special_sections_h
, /* 'h' */
2798 special_sections_i
, /* 'i' */
2801 special_sections_l
, /* 'l' */
2803 special_sections_n
, /* 'n' */
2805 special_sections_p
, /* 'p' */
2807 special_sections_r
, /* 'r' */
2808 special_sections_s
, /* 's' */
2809 special_sections_t
, /* 't' */
2815 special_sections_z
/* 'z' */
2818 const struct bfd_elf_special_section
*
2819 _bfd_elf_get_special_section (const char *name
,
2820 const struct bfd_elf_special_section
*spec
,
2826 len
= strlen (name
);
2828 for (i
= 0; spec
[i
].prefix
!= NULL
; i
++)
2831 int prefix_len
= spec
[i
].prefix_length
;
2833 if (len
< prefix_len
)
2835 if (memcmp (name
, spec
[i
].prefix
, prefix_len
) != 0)
2838 suffix_len
= spec
[i
].suffix_length
;
2839 if (suffix_len
<= 0)
2841 if (name
[prefix_len
] != 0)
2843 if (suffix_len
== 0)
2845 if (name
[prefix_len
] != '.'
2846 && (suffix_len
== -2
2847 || (rela
&& spec
[i
].type
== SHT_REL
)))
2853 if (len
< prefix_len
+ suffix_len
)
2855 if (memcmp (name
+ len
- suffix_len
,
2856 spec
[i
].prefix
+ prefix_len
,
2866 const struct bfd_elf_special_section
*
2867 _bfd_elf_get_sec_type_attr (bfd
*abfd
, asection
*sec
)
2870 const struct bfd_elf_special_section
*spec
;
2871 const struct elf_backend_data
*bed
;
2873 /* See if this is one of the special sections. */
2874 if (sec
->name
== NULL
)
2877 bed
= get_elf_backend_data (abfd
);
2878 spec
= bed
->special_sections
;
2881 spec
= _bfd_elf_get_special_section (sec
->name
,
2882 bed
->special_sections
,
2888 if (sec
->name
[0] != '.')
2891 i
= sec
->name
[1] - 'b';
2892 if (i
< 0 || i
> 'z' - 'b')
2895 spec
= special_sections
[i
];
2900 return _bfd_elf_get_special_section (sec
->name
, spec
, sec
->use_rela_p
);
2904 _bfd_elf_new_section_hook (bfd
*abfd
, asection
*sec
)
2906 struct bfd_elf_section_data
*sdata
;
2907 const struct elf_backend_data
*bed
;
2908 const struct bfd_elf_special_section
*ssect
;
2910 sdata
= (struct bfd_elf_section_data
*) sec
->used_by_bfd
;
2913 sdata
= (struct bfd_elf_section_data
*) bfd_zalloc (abfd
,
2917 sec
->used_by_bfd
= sdata
;
2920 /* Indicate whether or not this section should use RELA relocations. */
2921 bed
= get_elf_backend_data (abfd
);
2922 sec
->use_rela_p
= bed
->default_use_rela_p
;
2924 /* Set up ELF section type and flags for newly created sections, if
2925 there is an ABI mandated section. */
2926 ssect
= (*bed
->get_sec_type_attr
) (abfd
, sec
);
2929 elf_section_type (sec
) = ssect
->type
;
2930 elf_section_flags (sec
) = ssect
->attr
;
2933 return _bfd_generic_new_section_hook (abfd
, sec
);
2936 /* Create a new bfd section from an ELF program header.
2938 Since program segments have no names, we generate a synthetic name
2939 of the form segment<NUM>, where NUM is generally the index in the
2940 program header table. For segments that are split (see below) we
2941 generate the names segment<NUM>a and segment<NUM>b.
2943 Note that some program segments may have a file size that is different than
2944 (less than) the memory size. All this means is that at execution the
2945 system must allocate the amount of memory specified by the memory size,
2946 but only initialize it with the first "file size" bytes read from the
2947 file. This would occur for example, with program segments consisting
2948 of combined data+bss.
2950 To handle the above situation, this routine generates TWO bfd sections
2951 for the single program segment. The first has the length specified by
2952 the file size of the segment, and the second has the length specified
2953 by the difference between the two sizes. In effect, the segment is split
2954 into its initialized and uninitialized parts.
2959 _bfd_elf_make_section_from_phdr (bfd
*abfd
,
2960 Elf_Internal_Phdr
*hdr
,
2962 const char *type_name
)
2969 unsigned int opb
= bfd_octets_per_byte (abfd
, NULL
);
2971 split
= ((hdr
->p_memsz
> 0)
2972 && (hdr
->p_filesz
> 0)
2973 && (hdr
->p_memsz
> hdr
->p_filesz
));
2975 if (hdr
->p_filesz
> 0)
2977 sprintf (namebuf
, "%s%d%s", type_name
, hdr_index
, split
? "a" : "");
2978 len
= strlen (namebuf
) + 1;
2979 name
= (char *) bfd_alloc (abfd
, len
);
2982 memcpy (name
, namebuf
, len
);
2983 newsect
= bfd_make_section (abfd
, name
);
2984 if (newsect
== NULL
)
2986 newsect
->vma
= hdr
->p_vaddr
/ opb
;
2987 newsect
->lma
= hdr
->p_paddr
/ opb
;
2988 newsect
->size
= hdr
->p_filesz
;
2989 newsect
->filepos
= hdr
->p_offset
;
2990 newsect
->flags
|= SEC_HAS_CONTENTS
;
2991 newsect
->alignment_power
= bfd_log2 (hdr
->p_align
);
2992 if (hdr
->p_type
== PT_LOAD
)
2994 newsect
->flags
|= SEC_ALLOC
;
2995 newsect
->flags
|= SEC_LOAD
;
2996 if (hdr
->p_flags
& PF_X
)
2998 /* FIXME: all we known is that it has execute PERMISSION,
3000 newsect
->flags
|= SEC_CODE
;
3003 if (!(hdr
->p_flags
& PF_W
))
3005 newsect
->flags
|= SEC_READONLY
;
3009 if (hdr
->p_memsz
> hdr
->p_filesz
)
3013 sprintf (namebuf
, "%s%d%s", type_name
, hdr_index
, split
? "b" : "");
3014 len
= strlen (namebuf
) + 1;
3015 name
= (char *) bfd_alloc (abfd
, len
);
3018 memcpy (name
, namebuf
, len
);
3019 newsect
= bfd_make_section (abfd
, name
);
3020 if (newsect
== NULL
)
3022 newsect
->vma
= (hdr
->p_vaddr
+ hdr
->p_filesz
) / opb
;
3023 newsect
->lma
= (hdr
->p_paddr
+ hdr
->p_filesz
) / opb
;
3024 newsect
->size
= hdr
->p_memsz
- hdr
->p_filesz
;
3025 newsect
->filepos
= hdr
->p_offset
+ hdr
->p_filesz
;
3026 align
= newsect
->vma
& -newsect
->vma
;
3027 if (align
== 0 || align
> hdr
->p_align
)
3028 align
= hdr
->p_align
;
3029 newsect
->alignment_power
= bfd_log2 (align
);
3030 if (hdr
->p_type
== PT_LOAD
)
3032 /* Hack for gdb. Segments that have not been modified do
3033 not have their contents written to a core file, on the
3034 assumption that a debugger can find the contents in the
3035 executable. We flag this case by setting the fake
3036 section size to zero. Note that "real" bss sections will
3037 always have their contents dumped to the core file. */
3038 if (bfd_get_format (abfd
) == bfd_core
)
3040 newsect
->flags
|= SEC_ALLOC
;
3041 if (hdr
->p_flags
& PF_X
)
3042 newsect
->flags
|= SEC_CODE
;
3044 if (!(hdr
->p_flags
& PF_W
))
3045 newsect
->flags
|= SEC_READONLY
;
3052 _bfd_elf_core_find_build_id (bfd
*templ
, bfd_vma offset
)
3054 /* The return value is ignored. Build-ids are considered optional. */
3055 if (templ
->xvec
->flavour
== bfd_target_elf_flavour
)
3056 return (*get_elf_backend_data (templ
)->elf_backend_core_find_build_id
)
3062 bfd_section_from_phdr (bfd
*abfd
, Elf_Internal_Phdr
*hdr
, int hdr_index
)
3064 const struct elf_backend_data
*bed
;
3066 switch (hdr
->p_type
)
3069 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "null");
3072 if (! _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "load"))
3074 if (bfd_get_format (abfd
) == bfd_core
&& abfd
->build_id
== NULL
)
3075 _bfd_elf_core_find_build_id (abfd
, hdr
->p_offset
);
3079 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "dynamic");
3082 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "interp");
3085 if (! _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "note"))
3087 if (! elf_read_notes (abfd
, hdr
->p_offset
, hdr
->p_filesz
,
3093 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "shlib");
3096 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "phdr");
3098 case PT_GNU_EH_FRAME
:
3099 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
,
3103 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "stack");
3106 return _bfd_elf_make_section_from_phdr (abfd
, hdr
, hdr_index
, "relro");
3109 /* Check for any processor-specific program segment types. */
3110 bed
= get_elf_backend_data (abfd
);
3111 return bed
->elf_backend_section_from_phdr (abfd
, hdr
, hdr_index
, "proc");
3115 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3119 _bfd_elf_single_rel_hdr (asection
*sec
)
3121 if (elf_section_data (sec
)->rel
.hdr
)
3123 BFD_ASSERT (elf_section_data (sec
)->rela
.hdr
== NULL
);
3124 return elf_section_data (sec
)->rel
.hdr
;
3127 return elf_section_data (sec
)->rela
.hdr
;
3131 _bfd_elf_set_reloc_sh_name (bfd
*abfd
,
3132 Elf_Internal_Shdr
*rel_hdr
,
3133 const char *sec_name
,
3134 bfd_boolean use_rela_p
)
3136 char *name
= (char *) bfd_alloc (abfd
,
3137 sizeof ".rela" + strlen (sec_name
));
3141 sprintf (name
, "%s%s", use_rela_p
? ".rela" : ".rel", sec_name
);
3143 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd
), name
,
3145 if (rel_hdr
->sh_name
== (unsigned int) -1)
3151 /* Allocate and initialize a section-header for a new reloc section,
3152 containing relocations against ASECT. It is stored in RELDATA. If
3153 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3157 _bfd_elf_init_reloc_shdr (bfd
*abfd
,
3158 struct bfd_elf_section_reloc_data
*reldata
,
3159 const char *sec_name
,
3160 bfd_boolean use_rela_p
,
3161 bfd_boolean delay_st_name_p
)
3163 Elf_Internal_Shdr
*rel_hdr
;
3164 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
3166 BFD_ASSERT (reldata
->hdr
== NULL
);
3167 rel_hdr
= bfd_zalloc (abfd
, sizeof (*rel_hdr
));
3168 reldata
->hdr
= rel_hdr
;
3170 if (delay_st_name_p
)
3171 rel_hdr
->sh_name
= (unsigned int) -1;
3172 else if (!_bfd_elf_set_reloc_sh_name (abfd
, rel_hdr
, sec_name
,
3175 rel_hdr
->sh_type
= use_rela_p
? SHT_RELA
: SHT_REL
;
3176 rel_hdr
->sh_entsize
= (use_rela_p
3177 ? bed
->s
->sizeof_rela
3178 : bed
->s
->sizeof_rel
);
3179 rel_hdr
->sh_addralign
= (bfd_vma
) 1 << bed
->s
->log_file_align
;
3180 rel_hdr
->sh_flags
= 0;
3181 rel_hdr
->sh_addr
= 0;
3182 rel_hdr
->sh_size
= 0;
3183 rel_hdr
->sh_offset
= 0;
3188 /* Return the default section type based on the passed in section flags. */
3191 bfd_elf_get_default_section_type (flagword flags
)
3193 if ((flags
& (SEC_ALLOC
| SEC_IS_COMMON
)) != 0
3194 && (flags
& (SEC_LOAD
| SEC_HAS_CONTENTS
)) == 0)
3196 return SHT_PROGBITS
;
3199 struct fake_section_arg
3201 struct bfd_link_info
*link_info
;
3205 /* Set up an ELF internal section header for a section. */
3208 elf_fake_sections (bfd
*abfd
, asection
*asect
, void *fsarg
)
3210 struct fake_section_arg
*arg
= (struct fake_section_arg
*)fsarg
;
3211 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
3212 struct bfd_elf_section_data
*esd
= elf_section_data (asect
);
3213 Elf_Internal_Shdr
*this_hdr
;
3214 unsigned int sh_type
;
3215 const char *name
= asect
->name
;
3216 bfd_boolean delay_st_name_p
= FALSE
;
3221 /* We already failed; just get out of the bfd_map_over_sections
3226 this_hdr
= &esd
->this_hdr
;
3230 /* ld: compress DWARF debug sections with names: .debug_*. */
3231 if ((arg
->link_info
->compress_debug
& COMPRESS_DEBUG
)
3232 && (asect
->flags
& SEC_DEBUGGING
)
3236 /* Set SEC_ELF_COMPRESS to indicate this section should be
3238 asect
->flags
|= SEC_ELF_COMPRESS
;
3239 /* If this section will be compressed, delay adding section
3240 name to section name section after it is compressed in
3241 _bfd_elf_assign_file_positions_for_non_load. */
3242 delay_st_name_p
= TRUE
;
3245 else if ((asect
->flags
& SEC_ELF_RENAME
))
3247 /* objcopy: rename output DWARF debug section. */
3248 if ((abfd
->flags
& (BFD_DECOMPRESS
| BFD_COMPRESS_GABI
)))
3250 /* When we decompress or compress with SHF_COMPRESSED,
3251 convert section name from .zdebug_* to .debug_* if
3255 char *new_name
= convert_zdebug_to_debug (abfd
, name
);
3256 if (new_name
== NULL
)
3264 else if (asect
->compress_status
== COMPRESS_SECTION_DONE
)
3266 /* PR binutils/18087: Compression does not always make a
3267 section smaller. So only rename the section when
3268 compression has actually taken place. If input section
3269 name is .zdebug_*, we should never compress it again. */
3270 char *new_name
= convert_debug_to_zdebug (abfd
, name
);
3271 if (new_name
== NULL
)
3276 BFD_ASSERT (name
[1] != 'z');
3281 if (delay_st_name_p
)
3282 this_hdr
->sh_name
= (unsigned int) -1;
3286 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd
),
3288 if (this_hdr
->sh_name
== (unsigned int) -1)
3295 /* Don't clear sh_flags. Assembler may set additional bits. */
3297 if ((asect
->flags
& SEC_ALLOC
) != 0
3298 || asect
->user_set_vma
)
3299 this_hdr
->sh_addr
= asect
->vma
* bfd_octets_per_byte (abfd
, asect
);
3301 this_hdr
->sh_addr
= 0;
3303 this_hdr
->sh_offset
= 0;
3304 this_hdr
->sh_size
= asect
->size
;
3305 this_hdr
->sh_link
= 0;
3306 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3307 if (asect
->alignment_power
>= (sizeof (bfd_vma
) * 8) - 1)
3310 /* xgettext:c-format */
3311 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3312 abfd
, asect
->alignment_power
, asect
);
3316 /* Set sh_addralign to the highest power of two given by alignment
3317 consistent with the section VMA. Linker scripts can force VMA. */
3318 mask
= ((bfd_vma
) 1 << asect
->alignment_power
) | this_hdr
->sh_addr
;
3319 this_hdr
->sh_addralign
= mask
& -mask
;
3320 /* The sh_entsize and sh_info fields may have been set already by
3321 copy_private_section_data. */
3323 this_hdr
->bfd_section
= asect
;
3324 this_hdr
->contents
= NULL
;
3326 /* If the section type is unspecified, we set it based on
3328 if ((asect
->flags
& SEC_GROUP
) != 0)
3329 sh_type
= SHT_GROUP
;
3331 sh_type
= bfd_elf_get_default_section_type (asect
->flags
);
3333 if (this_hdr
->sh_type
== SHT_NULL
)
3334 this_hdr
->sh_type
= sh_type
;
3335 else if (this_hdr
->sh_type
== SHT_NOBITS
3336 && sh_type
== SHT_PROGBITS
3337 && (asect
->flags
& SEC_ALLOC
) != 0)
3339 /* Warn if we are changing a NOBITS section to PROGBITS, but
3340 allow the link to proceed. This can happen when users link
3341 non-bss input sections to bss output sections, or emit data
3342 to a bss output section via a linker script. */
3344 (_("warning: section `%pA' type changed to PROGBITS"), asect
);
3345 this_hdr
->sh_type
= sh_type
;
3348 switch (this_hdr
->sh_type
)
3359 case SHT_INIT_ARRAY
:
3360 case SHT_FINI_ARRAY
:
3361 case SHT_PREINIT_ARRAY
:
3362 this_hdr
->sh_entsize
= bed
->s
->arch_size
/ 8;
3366 this_hdr
->sh_entsize
= bed
->s
->sizeof_hash_entry
;
3370 this_hdr
->sh_entsize
= bed
->s
->sizeof_sym
;
3374 this_hdr
->sh_entsize
= bed
->s
->sizeof_dyn
;
3378 if (get_elf_backend_data (abfd
)->may_use_rela_p
)
3379 this_hdr
->sh_entsize
= bed
->s
->sizeof_rela
;
3383 if (get_elf_backend_data (abfd
)->may_use_rel_p
)
3384 this_hdr
->sh_entsize
= bed
->s
->sizeof_rel
;
3387 case SHT_GNU_versym
:
3388 this_hdr
->sh_entsize
= sizeof (Elf_External_Versym
);
3391 case SHT_GNU_verdef
:
3392 this_hdr
->sh_entsize
= 0;
3393 /* objcopy or strip will copy over sh_info, but may not set
3394 cverdefs. The linker will set cverdefs, but sh_info will be
3396 if (this_hdr
->sh_info
== 0)
3397 this_hdr
->sh_info
= elf_tdata (abfd
)->cverdefs
;
3399 BFD_ASSERT (elf_tdata (abfd
)->cverdefs
== 0
3400 || this_hdr
->sh_info
== elf_tdata (abfd
)->cverdefs
);
3403 case SHT_GNU_verneed
:
3404 this_hdr
->sh_entsize
= 0;
3405 /* objcopy or strip will copy over sh_info, but may not set
3406 cverrefs. The linker will set cverrefs, but sh_info will be
3408 if (this_hdr
->sh_info
== 0)
3409 this_hdr
->sh_info
= elf_tdata (abfd
)->cverrefs
;
3411 BFD_ASSERT (elf_tdata (abfd
)->cverrefs
== 0
3412 || this_hdr
->sh_info
== elf_tdata (abfd
)->cverrefs
);
3416 this_hdr
->sh_entsize
= GRP_ENTRY_SIZE
;
3420 this_hdr
->sh_entsize
= bed
->s
->arch_size
== 64 ? 0 : 4;
3424 if ((asect
->flags
& SEC_ALLOC
) != 0)
3425 this_hdr
->sh_flags
|= SHF_ALLOC
;
3426 if ((asect
->flags
& SEC_READONLY
) == 0)
3427 this_hdr
->sh_flags
|= SHF_WRITE
;
3428 if ((asect
->flags
& SEC_CODE
) != 0)
3429 this_hdr
->sh_flags
|= SHF_EXECINSTR
;
3430 if ((asect
->flags
& SEC_MERGE
) != 0)
3432 this_hdr
->sh_flags
|= SHF_MERGE
;
3433 this_hdr
->sh_entsize
= asect
->entsize
;
3435 if ((asect
->flags
& SEC_STRINGS
) != 0)
3436 this_hdr
->sh_flags
|= SHF_STRINGS
;
3437 if ((asect
->flags
& SEC_GROUP
) == 0 && elf_group_name (asect
) != NULL
)
3438 this_hdr
->sh_flags
|= SHF_GROUP
;
3439 if ((asect
->flags
& SEC_THREAD_LOCAL
) != 0)
3441 this_hdr
->sh_flags
|= SHF_TLS
;
3442 if (asect
->size
== 0
3443 && (asect
->flags
& SEC_HAS_CONTENTS
) == 0)
3445 struct bfd_link_order
*o
= asect
->map_tail
.link_order
;
3447 this_hdr
->sh_size
= 0;
3450 this_hdr
->sh_size
= o
->offset
+ o
->size
;
3451 if (this_hdr
->sh_size
!= 0)
3452 this_hdr
->sh_type
= SHT_NOBITS
;
3456 if ((asect
->flags
& (SEC_GROUP
| SEC_EXCLUDE
)) == SEC_EXCLUDE
)
3457 this_hdr
->sh_flags
|= SHF_EXCLUDE
;
3459 /* If the section has relocs, set up a section header for the
3460 SHT_REL[A] section. If two relocation sections are required for
3461 this section, it is up to the processor-specific back-end to
3462 create the other. */
3463 if ((asect
->flags
& SEC_RELOC
) != 0)
3465 /* When doing a relocatable link, create both REL and RELA sections if
3468 /* Do the normal setup if we wouldn't create any sections here. */
3469 && esd
->rel
.count
+ esd
->rela
.count
> 0
3470 && (bfd_link_relocatable (arg
->link_info
)
3471 || arg
->link_info
->emitrelocations
))
3473 if (esd
->rel
.count
&& esd
->rel
.hdr
== NULL
3474 && !_bfd_elf_init_reloc_shdr (abfd
, &esd
->rel
, name
,
3475 FALSE
, delay_st_name_p
))
3480 if (esd
->rela
.count
&& esd
->rela
.hdr
== NULL
3481 && !_bfd_elf_init_reloc_shdr (abfd
, &esd
->rela
, name
,
3482 TRUE
, delay_st_name_p
))
3488 else if (!_bfd_elf_init_reloc_shdr (abfd
,
3490 ? &esd
->rela
: &esd
->rel
),
3500 /* Check for processor-specific section types. */
3501 sh_type
= this_hdr
->sh_type
;
3502 if (bed
->elf_backend_fake_sections
3503 && !(*bed
->elf_backend_fake_sections
) (abfd
, this_hdr
, asect
))
3509 if (sh_type
== SHT_NOBITS
&& asect
->size
!= 0)
3511 /* Don't change the header type from NOBITS if we are being
3512 called for objcopy --only-keep-debug. */
3513 this_hdr
->sh_type
= sh_type
;
3517 /* Fill in the contents of a SHT_GROUP section. Called from
3518 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3519 when ELF targets use the generic linker, ld. Called for ld -r
3520 from bfd_elf_final_link. */
3523 bfd_elf_set_group_contents (bfd
*abfd
, asection
*sec
, void *failedptrarg
)
3525 bfd_boolean
*failedptr
= (bfd_boolean
*) failedptrarg
;
3526 asection
*elt
, *first
;
3530 /* Ignore linker created group section. See elfNN_ia64_object_p in
3532 if ((sec
->flags
& (SEC_GROUP
| SEC_LINKER_CREATED
)) != SEC_GROUP
3537 if (elf_section_data (sec
)->this_hdr
.sh_info
== 0)
3539 unsigned long symindx
= 0;
3541 /* elf_group_id will have been set up by objcopy and the
3543 if (elf_group_id (sec
) != NULL
)
3544 symindx
= elf_group_id (sec
)->udata
.i
;
3548 /* If called from the assembler, swap_out_syms will have set up
3550 PR 25699: A corrupt input file could contain bogus group info. */
3551 if (elf_section_syms (abfd
) == NULL
)
3556 symindx
= elf_section_syms (abfd
)[sec
->index
]->udata
.i
;
3558 elf_section_data (sec
)->this_hdr
.sh_info
= symindx
;
3560 else if (elf_section_data (sec
)->this_hdr
.sh_info
== (unsigned int) -2)
3562 /* The ELF backend linker sets sh_info to -2 when the group
3563 signature symbol is global, and thus the index can't be
3564 set until all local symbols are output. */
3566 struct bfd_elf_section_data
*sec_data
;
3567 unsigned long symndx
;
3568 unsigned long extsymoff
;
3569 struct elf_link_hash_entry
*h
;
3571 /* The point of this little dance to the first SHF_GROUP section
3572 then back to the SHT_GROUP section is that this gets us to
3573 the SHT_GROUP in the input object. */
3574 igroup
= elf_sec_group (elf_next_in_group (sec
));
3575 sec_data
= elf_section_data (igroup
);
3576 symndx
= sec_data
->this_hdr
.sh_info
;
3578 if (!elf_bad_symtab (igroup
->owner
))
3580 Elf_Internal_Shdr
*symtab_hdr
;
3582 symtab_hdr
= &elf_tdata (igroup
->owner
)->symtab_hdr
;
3583 extsymoff
= symtab_hdr
->sh_info
;
3585 h
= elf_sym_hashes (igroup
->owner
)[symndx
- extsymoff
];
3586 while (h
->root
.type
== bfd_link_hash_indirect
3587 || h
->root
.type
== bfd_link_hash_warning
)
3588 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
3590 elf_section_data (sec
)->this_hdr
.sh_info
= h
->indx
;
3593 /* The contents won't be allocated for "ld -r" or objcopy. */
3595 if (sec
->contents
== NULL
)
3598 sec
->contents
= (unsigned char *) bfd_alloc (abfd
, sec
->size
);
3600 /* Arrange for the section to be written out. */
3601 elf_section_data (sec
)->this_hdr
.contents
= sec
->contents
;
3602 if (sec
->contents
== NULL
)
3609 loc
= sec
->contents
+ sec
->size
;
3611 /* Get the pointer to the first section in the group that gas
3612 squirreled away here. objcopy arranges for this to be set to the
3613 start of the input section group. */
3614 first
= elt
= elf_next_in_group (sec
);
3616 /* First element is a flag word. Rest of section is elf section
3617 indices for all the sections of the group. Write them backwards
3618 just to keep the group in the same order as given in .section
3619 directives, not that it matters. */
3626 s
= s
->output_section
;
3628 && !bfd_is_abs_section (s
))
3630 struct bfd_elf_section_data
*elf_sec
= elf_section_data (s
);
3631 struct bfd_elf_section_data
*input_elf_sec
= elf_section_data (elt
);
3633 if (elf_sec
->rel
.hdr
!= NULL
3635 || (input_elf_sec
->rel
.hdr
!= NULL
3636 && input_elf_sec
->rel
.hdr
->sh_flags
& SHF_GROUP
) != 0))
3638 elf_sec
->rel
.hdr
->sh_flags
|= SHF_GROUP
;
3640 H_PUT_32 (abfd
, elf_sec
->rel
.idx
, loc
);
3642 if (elf_sec
->rela
.hdr
!= NULL
3644 || (input_elf_sec
->rela
.hdr
!= NULL
3645 && input_elf_sec
->rela
.hdr
->sh_flags
& SHF_GROUP
) != 0))
3647 elf_sec
->rela
.hdr
->sh_flags
|= SHF_GROUP
;
3649 H_PUT_32 (abfd
, elf_sec
->rela
.idx
, loc
);
3652 H_PUT_32 (abfd
, elf_sec
->this_idx
, loc
);
3654 elt
= elf_next_in_group (elt
);
3660 BFD_ASSERT (loc
== sec
->contents
);
3662 H_PUT_32 (abfd
, sec
->flags
& SEC_LINK_ONCE
? GRP_COMDAT
: 0, loc
);
3665 /* Given NAME, the name of a relocation section stripped of its
3666 .rel/.rela prefix, return the section in ABFD to which the
3667 relocations apply. */
3670 _bfd_elf_plt_get_reloc_section (bfd
*abfd
, const char *name
)
3672 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3673 section likely apply to .got.plt or .got section. */
3674 if (get_elf_backend_data (abfd
)->want_got_plt
3675 && strcmp (name
, ".plt") == 0)
3680 sec
= bfd_get_section_by_name (abfd
, name
);
3686 return bfd_get_section_by_name (abfd
, name
);
3689 /* Return the section to which RELOC_SEC applies. */
3692 elf_get_reloc_section (asection
*reloc_sec
)
3697 const struct elf_backend_data
*bed
;
3699 type
= elf_section_data (reloc_sec
)->this_hdr
.sh_type
;
3700 if (type
!= SHT_REL
&& type
!= SHT_RELA
)
3703 /* We look up the section the relocs apply to by name. */
3704 name
= reloc_sec
->name
;
3705 if (strncmp (name
, ".rel", 4) != 0)
3708 if (type
== SHT_RELA
&& *name
++ != 'a')
3711 abfd
= reloc_sec
->owner
;
3712 bed
= get_elf_backend_data (abfd
);
3713 return bed
->get_reloc_section (abfd
, name
);
3716 /* Assign all ELF section numbers. The dummy first section is handled here
3717 too. The link/info pointers for the standard section types are filled
3718 in here too, while we're at it. */
3721 assign_section_numbers (bfd
*abfd
, struct bfd_link_info
*link_info
)
3723 struct elf_obj_tdata
*t
= elf_tdata (abfd
);
3725 unsigned int section_number
;
3726 Elf_Internal_Shdr
**i_shdrp
;
3727 struct bfd_elf_section_data
*d
;
3728 bfd_boolean need_symtab
;
3733 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd
));
3735 /* SHT_GROUP sections are in relocatable files only. */
3736 if (link_info
== NULL
|| !link_info
->resolve_section_groups
)
3738 size_t reloc_count
= 0;
3740 /* Put SHT_GROUP sections first. */
3741 for (sec
= abfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
3743 d
= elf_section_data (sec
);
3745 if (d
->this_hdr
.sh_type
== SHT_GROUP
)
3747 if (sec
->flags
& SEC_LINKER_CREATED
)
3749 /* Remove the linker created SHT_GROUP sections. */
3750 bfd_section_list_remove (abfd
, sec
);
3751 abfd
->section_count
--;
3754 d
->this_idx
= section_number
++;
3757 /* Count relocations. */
3758 reloc_count
+= sec
->reloc_count
;
3761 /* Clear HAS_RELOC if there are no relocations. */
3762 if (reloc_count
== 0)
3763 abfd
->flags
&= ~HAS_RELOC
;
3766 for (sec
= abfd
->sections
; sec
; sec
= sec
->next
)
3768 d
= elf_section_data (sec
);
3770 if (d
->this_hdr
.sh_type
!= SHT_GROUP
)
3771 d
->this_idx
= section_number
++;
3772 if (d
->this_hdr
.sh_name
!= (unsigned int) -1)
3773 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), d
->this_hdr
.sh_name
);
3776 d
->rel
.idx
= section_number
++;
3777 if (d
->rel
.hdr
->sh_name
!= (unsigned int) -1)
3778 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), d
->rel
.hdr
->sh_name
);
3785 d
->rela
.idx
= section_number
++;
3786 if (d
->rela
.hdr
->sh_name
!= (unsigned int) -1)
3787 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), d
->rela
.hdr
->sh_name
);
3793 need_symtab
= (bfd_get_symcount (abfd
) > 0
3794 || (link_info
== NULL
3795 && ((abfd
->flags
& (EXEC_P
| DYNAMIC
| HAS_RELOC
))
3799 elf_onesymtab (abfd
) = section_number
++;
3800 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), t
->symtab_hdr
.sh_name
);
3801 if (section_number
> ((SHN_LORESERVE
- 2) & 0xFFFF))
3803 elf_section_list
*entry
;
3805 BFD_ASSERT (elf_symtab_shndx_list (abfd
) == NULL
);
3807 entry
= bfd_zalloc (abfd
, sizeof (*entry
));
3808 entry
->ndx
= section_number
++;
3809 elf_symtab_shndx_list (abfd
) = entry
;
3811 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd
),
3812 ".symtab_shndx", FALSE
);
3813 if (entry
->hdr
.sh_name
== (unsigned int) -1)
3816 elf_strtab_sec (abfd
) = section_number
++;
3817 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), t
->strtab_hdr
.sh_name
);
3820 elf_shstrtab_sec (abfd
) = section_number
++;
3821 _bfd_elf_strtab_addref (elf_shstrtab (abfd
), t
->shstrtab_hdr
.sh_name
);
3822 elf_elfheader (abfd
)->e_shstrndx
= elf_shstrtab_sec (abfd
);
3824 if (section_number
>= SHN_LORESERVE
)
3826 /* xgettext:c-format */
3827 _bfd_error_handler (_("%pB: too many sections: %u"),
3828 abfd
, section_number
);
3832 elf_numsections (abfd
) = section_number
;
3833 elf_elfheader (abfd
)->e_shnum
= section_number
;
3835 /* Set up the list of section header pointers, in agreement with the
3837 amt
= section_number
* sizeof (Elf_Internal_Shdr
*);
3838 i_shdrp
= (Elf_Internal_Shdr
**) bfd_zalloc (abfd
, amt
);
3839 if (i_shdrp
== NULL
)
3842 i_shdrp
[0] = (Elf_Internal_Shdr
*) bfd_zalloc (abfd
,
3843 sizeof (Elf_Internal_Shdr
));
3844 if (i_shdrp
[0] == NULL
)
3846 bfd_release (abfd
, i_shdrp
);
3850 elf_elfsections (abfd
) = i_shdrp
;
3852 i_shdrp
[elf_shstrtab_sec (abfd
)] = &t
->shstrtab_hdr
;
3855 i_shdrp
[elf_onesymtab (abfd
)] = &t
->symtab_hdr
;
3856 if (elf_numsections (abfd
) > (SHN_LORESERVE
& 0xFFFF))
3858 elf_section_list
* entry
= elf_symtab_shndx_list (abfd
);
3859 BFD_ASSERT (entry
!= NULL
);
3860 i_shdrp
[entry
->ndx
] = & entry
->hdr
;
3861 entry
->hdr
.sh_link
= elf_onesymtab (abfd
);
3863 i_shdrp
[elf_strtab_sec (abfd
)] = &t
->strtab_hdr
;
3864 t
->symtab_hdr
.sh_link
= elf_strtab_sec (abfd
);
3867 for (sec
= abfd
->sections
; sec
; sec
= sec
->next
)
3871 d
= elf_section_data (sec
);
3873 i_shdrp
[d
->this_idx
] = &d
->this_hdr
;
3874 if (d
->rel
.idx
!= 0)
3875 i_shdrp
[d
->rel
.idx
] = d
->rel
.hdr
;
3876 if (d
->rela
.idx
!= 0)
3877 i_shdrp
[d
->rela
.idx
] = d
->rela
.hdr
;
3879 /* Fill in the sh_link and sh_info fields while we're at it. */
3881 /* sh_link of a reloc section is the section index of the symbol
3882 table. sh_info is the section index of the section to which
3883 the relocation entries apply. */
3884 if (d
->rel
.idx
!= 0)
3886 d
->rel
.hdr
->sh_link
= elf_onesymtab (abfd
);
3887 d
->rel
.hdr
->sh_info
= d
->this_idx
;
3888 d
->rel
.hdr
->sh_flags
|= SHF_INFO_LINK
;
3890 if (d
->rela
.idx
!= 0)
3892 d
->rela
.hdr
->sh_link
= elf_onesymtab (abfd
);
3893 d
->rela
.hdr
->sh_info
= d
->this_idx
;
3894 d
->rela
.hdr
->sh_flags
|= SHF_INFO_LINK
;
3897 /* We need to set up sh_link for SHF_LINK_ORDER. */
3898 if ((d
->this_hdr
.sh_flags
& SHF_LINK_ORDER
) != 0)
3900 s
= elf_linked_to_section (sec
);
3903 /* elf_linked_to_section points to the input section. */
3904 if (link_info
!= NULL
)
3906 /* Check discarded linkonce section. */
3907 if (discarded_section (s
))
3911 /* xgettext:c-format */
3912 (_("%pB: sh_link of section `%pA' points to"
3913 " discarded section `%pA' of `%pB'"),
3914 abfd
, d
->this_hdr
.bfd_section
,
3916 /* Point to the kept section if it has the same
3917 size as the discarded one. */
3918 kept
= _bfd_elf_check_kept_section (s
, link_info
);
3921 bfd_set_error (bfd_error_bad_value
);
3927 s
= s
->output_section
;
3928 BFD_ASSERT (s
!= NULL
);
3932 /* Handle objcopy. */
3933 if (s
->output_section
== NULL
)
3936 /* xgettext:c-format */
3937 (_("%pB: sh_link of section `%pA' points to"
3938 " removed section `%pA' of `%pB'"),
3939 abfd
, d
->this_hdr
.bfd_section
, s
, s
->owner
);
3940 bfd_set_error (bfd_error_bad_value
);
3943 s
= s
->output_section
;
3945 d
->this_hdr
.sh_link
= elf_section_data (s
)->this_idx
;
3950 The Intel C compiler generates SHT_IA_64_UNWIND with
3951 SHF_LINK_ORDER. But it doesn't set the sh_link or
3952 sh_info fields. Hence we could get the situation
3954 const struct elf_backend_data
*bed
3955 = get_elf_backend_data (abfd
);
3956 bed
->link_order_error_handler
3957 /* xgettext:c-format */
3958 (_("%pB: warning: sh_link not set for section `%pA'"),
3963 switch (d
->this_hdr
.sh_type
)
3967 /* A reloc section which we are treating as a normal BFD
3968 section. sh_link is the section index of the symbol
3969 table. sh_info is the section index of the section to
3970 which the relocation entries apply. We assume that an
3971 allocated reloc section uses the dynamic symbol table.
3972 FIXME: How can we be sure? */
3973 s
= bfd_get_section_by_name (abfd
, ".dynsym");
3975 d
->this_hdr
.sh_link
= elf_section_data (s
)->this_idx
;
3977 s
= elf_get_reloc_section (sec
);
3980 d
->this_hdr
.sh_info
= elf_section_data (s
)->this_idx
;
3981 d
->this_hdr
.sh_flags
|= SHF_INFO_LINK
;
3986 /* We assume that a section named .stab*str is a stabs
3987 string section. We look for a section with the same name
3988 but without the trailing ``str'', and set its sh_link
3989 field to point to this section. */
3990 if (CONST_STRNEQ (sec
->name
, ".stab")
3991 && strcmp (sec
->name
+ strlen (sec
->name
) - 3, "str") == 0)
3996 len
= strlen (sec
->name
);
3997 alc
= (char *) bfd_malloc (len
- 2);
4000 memcpy (alc
, sec
->name
, len
- 3);
4001 alc
[len
- 3] = '\0';
4002 s
= bfd_get_section_by_name (abfd
, alc
);
4006 elf_section_data (s
)->this_hdr
.sh_link
= d
->this_idx
;
4008 /* This is a .stab section. */
4009 if (elf_section_data (s
)->this_hdr
.sh_entsize
== 0)
4010 elf_section_data (s
)->this_hdr
.sh_entsize
4011 = 4 + 2 * bfd_get_arch_size (abfd
) / 8;
4018 case SHT_GNU_verneed
:
4019 case SHT_GNU_verdef
:
4020 /* sh_link is the section header index of the string table
4021 used for the dynamic entries, or the symbol table, or the
4023 s
= bfd_get_section_by_name (abfd
, ".dynstr");
4025 d
->this_hdr
.sh_link
= elf_section_data (s
)->this_idx
;
4028 case SHT_GNU_LIBLIST
:
4029 /* sh_link is the section header index of the prelink library
4030 list used for the dynamic entries, or the symbol table, or
4031 the version strings. */
4032 s
= bfd_get_section_by_name (abfd
, (sec
->flags
& SEC_ALLOC
)
4033 ? ".dynstr" : ".gnu.libstr");
4035 d
->this_hdr
.sh_link
= elf_section_data (s
)->this_idx
;
4040 case SHT_GNU_versym
:
4041 /* sh_link is the section header index of the symbol table
4042 this hash table or version table is for. */
4043 s
= bfd_get_section_by_name (abfd
, ".dynsym");
4045 d
->this_hdr
.sh_link
= elf_section_data (s
)->this_idx
;
4049 d
->this_hdr
.sh_link
= elf_onesymtab (abfd
);
4053 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4054 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4055 debug section name from .debug_* to .zdebug_* if needed. */
4061 sym_is_global (bfd
*abfd
, asymbol
*sym
)
4063 /* If the backend has a special mapping, use it. */
4064 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
4065 if (bed
->elf_backend_sym_is_global
)
4066 return (*bed
->elf_backend_sym_is_global
) (abfd
, sym
);
4068 return ((sym
->flags
& (BSF_GLOBAL
| BSF_WEAK
| BSF_GNU_UNIQUE
)) != 0
4069 || bfd_is_und_section (bfd_asymbol_section (sym
))
4070 || bfd_is_com_section (bfd_asymbol_section (sym
)));
4073 /* Filter global symbols of ABFD to include in the import library. All
4074 SYMCOUNT symbols of ABFD can be examined from their pointers in
4075 SYMS. Pointers of symbols to keep should be stored contiguously at
4076 the beginning of that array.
4078 Returns the number of symbols to keep. */
4081 _bfd_elf_filter_global_symbols (bfd
*abfd
, struct bfd_link_info
*info
,
4082 asymbol
**syms
, long symcount
)
4084 long src_count
, dst_count
= 0;
4086 for (src_count
= 0; src_count
< symcount
; src_count
++)
4088 asymbol
*sym
= syms
[src_count
];
4089 char *name
= (char *) bfd_asymbol_name (sym
);
4090 struct bfd_link_hash_entry
*h
;
4092 if (!sym_is_global (abfd
, sym
))
4095 h
= bfd_link_hash_lookup (info
->hash
, name
, FALSE
, FALSE
, FALSE
);
4098 if (h
->type
!= bfd_link_hash_defined
&& h
->type
!= bfd_link_hash_defweak
)
4100 if (h
->linker_def
|| h
->ldscript_def
)
4103 syms
[dst_count
++] = sym
;
4106 syms
[dst_count
] = NULL
;
4111 /* Don't output section symbols for sections that are not going to be
4112 output, that are duplicates or there is no BFD section. */
4115 ignore_section_sym (bfd
*abfd
, asymbol
*sym
)
4117 elf_symbol_type
*type_ptr
;
4122 if ((sym
->flags
& BSF_SECTION_SYM
) == 0)
4125 if (sym
->section
== NULL
)
4128 type_ptr
= elf_symbol_from (abfd
, sym
);
4129 return ((type_ptr
!= NULL
4130 && type_ptr
->internal_elf_sym
.st_shndx
!= 0
4131 && bfd_is_abs_section (sym
->section
))
4132 || !(sym
->section
->owner
== abfd
4133 || (sym
->section
->output_section
!= NULL
4134 && sym
->section
->output_section
->owner
== abfd
4135 && sym
->section
->output_offset
== 0)
4136 || bfd_is_abs_section (sym
->section
)));
4139 /* Map symbol from it's internal number to the external number, moving
4140 all local symbols to be at the head of the list. */
4143 elf_map_symbols (bfd
*abfd
, unsigned int *pnum_locals
)
4145 unsigned int symcount
= bfd_get_symcount (abfd
);
4146 asymbol
**syms
= bfd_get_outsymbols (abfd
);
4147 asymbol
**sect_syms
;
4148 unsigned int num_locals
= 0;
4149 unsigned int num_globals
= 0;
4150 unsigned int num_locals2
= 0;
4151 unsigned int num_globals2
= 0;
4152 unsigned int max_index
= 0;
4159 fprintf (stderr
, "elf_map_symbols\n");
4163 for (asect
= abfd
->sections
; asect
; asect
= asect
->next
)
4165 if (max_index
< asect
->index
)
4166 max_index
= asect
->index
;
4170 amt
= max_index
* sizeof (asymbol
*);
4171 sect_syms
= (asymbol
**) bfd_zalloc (abfd
, amt
);
4172 if (sect_syms
== NULL
)
4174 elf_section_syms (abfd
) = sect_syms
;
4175 elf_num_section_syms (abfd
) = max_index
;
4177 /* Init sect_syms entries for any section symbols we have already
4178 decided to output. */
4179 for (idx
= 0; idx
< symcount
; idx
++)
4181 asymbol
*sym
= syms
[idx
];
4183 if ((sym
->flags
& BSF_SECTION_SYM
) != 0
4185 && !ignore_section_sym (abfd
, sym
)
4186 && !bfd_is_abs_section (sym
->section
))
4188 asection
*sec
= sym
->section
;
4190 if (sec
->owner
!= abfd
)
4191 sec
= sec
->output_section
;
4193 sect_syms
[sec
->index
] = syms
[idx
];
4197 /* Classify all of the symbols. */
4198 for (idx
= 0; idx
< symcount
; idx
++)
4200 if (sym_is_global (abfd
, syms
[idx
]))
4202 else if (!ignore_section_sym (abfd
, syms
[idx
]))
4206 /* We will be adding a section symbol for each normal BFD section. Most
4207 sections will already have a section symbol in outsymbols, but
4208 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4209 at least in that case. */
4210 for (asect
= abfd
->sections
; asect
; asect
= asect
->next
)
4212 if (sect_syms
[asect
->index
] == NULL
)
4214 if (!sym_is_global (abfd
, asect
->symbol
))
4221 /* Now sort the symbols so the local symbols are first. */
4222 amt
= (num_locals
+ num_globals
) * sizeof (asymbol
*);
4223 new_syms
= (asymbol
**) bfd_alloc (abfd
, amt
);
4224 if (new_syms
== NULL
)
4227 for (idx
= 0; idx
< symcount
; idx
++)
4229 asymbol
*sym
= syms
[idx
];
4232 if (sym_is_global (abfd
, sym
))
4233 i
= num_locals
+ num_globals2
++;
4234 else if (!ignore_section_sym (abfd
, sym
))
4239 sym
->udata
.i
= i
+ 1;
4241 for (asect
= abfd
->sections
; asect
; asect
= asect
->next
)
4243 if (sect_syms
[asect
->index
] == NULL
)
4245 asymbol
*sym
= asect
->symbol
;
4248 sect_syms
[asect
->index
] = sym
;
4249 if (!sym_is_global (abfd
, sym
))
4252 i
= num_locals
+ num_globals2
++;
4254 sym
->udata
.i
= i
+ 1;
4258 bfd_set_symtab (abfd
, new_syms
, num_locals
+ num_globals
);
4260 *pnum_locals
= num_locals
;
4264 /* Align to the maximum file alignment that could be required for any
4265 ELF data structure. */
4267 static inline file_ptr
4268 align_file_position (file_ptr off
, int align
)
4270 return (off
+ align
- 1) & ~(align
- 1);
4273 /* Assign a file position to a section, optionally aligning to the
4274 required section alignment. */
4277 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr
*i_shdrp
,
4281 if (align
&& i_shdrp
->sh_addralign
> 1)
4282 offset
= BFD_ALIGN (offset
, i_shdrp
->sh_addralign
);
4283 i_shdrp
->sh_offset
= offset
;
4284 if (i_shdrp
->bfd_section
!= NULL
)
4285 i_shdrp
->bfd_section
->filepos
= offset
;
4286 if (i_shdrp
->sh_type
!= SHT_NOBITS
)
4287 offset
+= i_shdrp
->sh_size
;
4291 /* Compute the file positions we are going to put the sections at, and
4292 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4293 is not NULL, this is being called by the ELF backend linker. */
4296 _bfd_elf_compute_section_file_positions (bfd
*abfd
,
4297 struct bfd_link_info
*link_info
)
4299 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
4300 struct fake_section_arg fsargs
;
4302 struct elf_strtab_hash
*strtab
= NULL
;
4303 Elf_Internal_Shdr
*shstrtab_hdr
;
4304 bfd_boolean need_symtab
;
4306 if (abfd
->output_has_begun
)
4309 /* Do any elf backend specific processing first. */
4310 if (bed
->elf_backend_begin_write_processing
)
4311 (*bed
->elf_backend_begin_write_processing
) (abfd
, link_info
);
4313 if (!(*bed
->elf_backend_init_file_header
) (abfd
, link_info
))
4316 fsargs
.failed
= FALSE
;
4317 fsargs
.link_info
= link_info
;
4318 bfd_map_over_sections (abfd
, elf_fake_sections
, &fsargs
);
4322 if (!assign_section_numbers (abfd
, link_info
))
4325 /* The backend linker builds symbol table information itself. */
4326 need_symtab
= (link_info
== NULL
4327 && (bfd_get_symcount (abfd
) > 0
4328 || ((abfd
->flags
& (EXEC_P
| DYNAMIC
| HAS_RELOC
))
4332 /* Non-zero if doing a relocatable link. */
4333 int relocatable_p
= ! (abfd
->flags
& (EXEC_P
| DYNAMIC
));
4335 if (! swap_out_syms (abfd
, &strtab
, relocatable_p
))
4340 if (link_info
== NULL
)
4342 bfd_map_over_sections (abfd
, bfd_elf_set_group_contents
, &failed
);
4347 shstrtab_hdr
= &elf_tdata (abfd
)->shstrtab_hdr
;
4348 /* sh_name was set in init_file_header. */
4349 shstrtab_hdr
->sh_type
= SHT_STRTAB
;
4350 shstrtab_hdr
->sh_flags
= bed
->elf_strtab_flags
;
4351 shstrtab_hdr
->sh_addr
= 0;
4352 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4353 shstrtab_hdr
->sh_entsize
= 0;
4354 shstrtab_hdr
->sh_link
= 0;
4355 shstrtab_hdr
->sh_info
= 0;
4356 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4357 shstrtab_hdr
->sh_addralign
= 1;
4359 if (!assign_file_positions_except_relocs (abfd
, link_info
))
4365 Elf_Internal_Shdr
*hdr
;
4367 off
= elf_next_file_pos (abfd
);
4369 hdr
= & elf_symtab_hdr (abfd
);
4370 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
, TRUE
);
4372 if (elf_symtab_shndx_list (abfd
) != NULL
)
4374 hdr
= & elf_symtab_shndx_list (abfd
)->hdr
;
4375 if (hdr
->sh_size
!= 0)
4376 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
, TRUE
);
4377 /* FIXME: What about other symtab_shndx sections in the list ? */
4380 hdr
= &elf_tdata (abfd
)->strtab_hdr
;
4381 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
, TRUE
);
4383 elf_next_file_pos (abfd
) = off
;
4385 /* Now that we know where the .strtab section goes, write it
4387 if (bfd_seek (abfd
, hdr
->sh_offset
, SEEK_SET
) != 0
4388 || ! _bfd_elf_strtab_emit (abfd
, strtab
))
4390 _bfd_elf_strtab_free (strtab
);
4393 abfd
->output_has_begun
= TRUE
;
4398 /* Make an initial estimate of the size of the program header. If we
4399 get the number wrong here, we'll redo section placement. */
4401 static bfd_size_type
4402 get_program_header_size (bfd
*abfd
, struct bfd_link_info
*info
)
4406 const struct elf_backend_data
*bed
;
4408 /* Assume we will need exactly two PT_LOAD segments: one for text
4409 and one for data. */
4412 s
= bfd_get_section_by_name (abfd
, ".interp");
4413 if (s
!= NULL
&& (s
->flags
& SEC_LOAD
) != 0 && s
->size
!= 0)
4415 /* If we have a loadable interpreter section, we need a
4416 PT_INTERP segment. In this case, assume we also need a
4417 PT_PHDR segment, although that may not be true for all
4422 if (bfd_get_section_by_name (abfd
, ".dynamic") != NULL
)
4424 /* We need a PT_DYNAMIC segment. */
4428 if (info
!= NULL
&& info
->relro
)
4430 /* We need a PT_GNU_RELRO segment. */
4434 if (elf_eh_frame_hdr (abfd
))
4436 /* We need a PT_GNU_EH_FRAME segment. */
4440 if (elf_stack_flags (abfd
))
4442 /* We need a PT_GNU_STACK segment. */
4446 s
= bfd_get_section_by_name (abfd
,
4447 NOTE_GNU_PROPERTY_SECTION_NAME
);
4448 if (s
!= NULL
&& s
->size
!= 0)
4450 /* We need a PT_GNU_PROPERTY segment. */
4454 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
4456 if ((s
->flags
& SEC_LOAD
) != 0
4457 && elf_section_type (s
) == SHT_NOTE
)
4459 unsigned int alignment_power
;
4460 /* We need a PT_NOTE segment. */
4462 /* Try to create just one PT_NOTE segment for all adjacent
4463 loadable SHT_NOTE sections. gABI requires that within a
4464 PT_NOTE segment (and also inside of each SHT_NOTE section)
4465 each note should have the same alignment. So we check
4466 whether the sections are correctly aligned. */
4467 alignment_power
= s
->alignment_power
;
4468 while (s
->next
!= NULL
4469 && s
->next
->alignment_power
== alignment_power
4470 && (s
->next
->flags
& SEC_LOAD
) != 0
4471 && elf_section_type (s
->next
) == SHT_NOTE
)
4476 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
4478 if (s
->flags
& SEC_THREAD_LOCAL
)
4480 /* We need a PT_TLS segment. */
4486 bed
= get_elf_backend_data (abfd
);
4488 if ((abfd
->flags
& D_PAGED
) != 0
4489 && (elf_tdata (abfd
)->has_gnu_osabi
& elf_gnu_osabi_mbind
) != 0)
4491 /* Add a PT_GNU_MBIND segment for each mbind section. */
4492 unsigned int page_align_power
= bfd_log2 (bed
->commonpagesize
);
4493 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
4494 if (elf_section_flags (s
) & SHF_GNU_MBIND
)
4496 if (elf_section_data (s
)->this_hdr
.sh_info
> PT_GNU_MBIND_NUM
)
4499 /* xgettext:c-format */
4500 (_("%pB: GNU_MBIND section `%pA' has invalid "
4501 "sh_info field: %d"),
4502 abfd
, s
, elf_section_data (s
)->this_hdr
.sh_info
);
4505 /* Align mbind section to page size. */
4506 if (s
->alignment_power
< page_align_power
)
4507 s
->alignment_power
= page_align_power
;
4512 /* Let the backend count up any program headers it might need. */
4513 if (bed
->elf_backend_additional_program_headers
)
4517 a
= (*bed
->elf_backend_additional_program_headers
) (abfd
, info
);
4523 return segs
* bed
->s
->sizeof_phdr
;
4526 /* Find the segment that contains the output_section of section. */
4529 _bfd_elf_find_segment_containing_section (bfd
* abfd
, asection
* section
)
4531 struct elf_segment_map
*m
;
4532 Elf_Internal_Phdr
*p
;
4534 for (m
= elf_seg_map (abfd
), p
= elf_tdata (abfd
)->phdr
;
4540 for (i
= m
->count
- 1; i
>= 0; i
--)
4541 if (m
->sections
[i
] == section
)
4548 /* Create a mapping from a set of sections to a program segment. */
4550 static struct elf_segment_map
*
4551 make_mapping (bfd
*abfd
,
4552 asection
**sections
,
4557 struct elf_segment_map
*m
;
4562 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
4563 amt
+= (to
- from
) * sizeof (asection
*);
4564 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
4568 m
->p_type
= PT_LOAD
;
4569 for (i
= from
, hdrpp
= sections
+ from
; i
< to
; i
++, hdrpp
++)
4570 m
->sections
[i
- from
] = *hdrpp
;
4571 m
->count
= to
- from
;
4573 if (from
== 0 && phdr
)
4575 /* Include the headers in the first PT_LOAD segment. */
4576 m
->includes_filehdr
= 1;
4577 m
->includes_phdrs
= 1;
4583 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4586 struct elf_segment_map
*
4587 _bfd_elf_make_dynamic_segment (bfd
*abfd
, asection
*dynsec
)
4589 struct elf_segment_map
*m
;
4591 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
,
4592 sizeof (struct elf_segment_map
));
4596 m
->p_type
= PT_DYNAMIC
;
4598 m
->sections
[0] = dynsec
;
4603 /* Possibly add or remove segments from the segment map. */
4606 elf_modify_segment_map (bfd
*abfd
,
4607 struct bfd_link_info
*info
,
4608 bfd_boolean remove_empty_load
)
4610 struct elf_segment_map
**m
;
4611 const struct elf_backend_data
*bed
;
4613 /* The placement algorithm assumes that non allocated sections are
4614 not in PT_LOAD segments. We ensure this here by removing such
4615 sections from the segment map. We also remove excluded
4616 sections. Finally, any PT_LOAD segment without sections is
4618 m
= &elf_seg_map (abfd
);
4621 unsigned int i
, new_count
;
4623 for (new_count
= 0, i
= 0; i
< (*m
)->count
; i
++)
4625 if (((*m
)->sections
[i
]->flags
& SEC_EXCLUDE
) == 0
4626 && (((*m
)->sections
[i
]->flags
& SEC_ALLOC
) != 0
4627 || (*m
)->p_type
!= PT_LOAD
))
4629 (*m
)->sections
[new_count
] = (*m
)->sections
[i
];
4633 (*m
)->count
= new_count
;
4635 if (remove_empty_load
4636 && (*m
)->p_type
== PT_LOAD
4638 && !(*m
)->includes_phdrs
)
4644 bed
= get_elf_backend_data (abfd
);
4645 if (bed
->elf_backend_modify_segment_map
!= NULL
)
4647 if (!(*bed
->elf_backend_modify_segment_map
) (abfd
, info
))
4654 #define IS_TBSS(s) \
4655 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4657 /* Set up a mapping from BFD sections to program segments. */
4660 _bfd_elf_map_sections_to_segments (bfd
*abfd
, struct bfd_link_info
*info
)
4663 struct elf_segment_map
*m
;
4664 asection
**sections
= NULL
;
4665 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
4666 bfd_boolean no_user_phdrs
;
4668 no_user_phdrs
= elf_seg_map (abfd
) == NULL
;
4671 info
->user_phdrs
= !no_user_phdrs
;
4673 if (no_user_phdrs
&& bfd_count_sections (abfd
) != 0)
4677 struct elf_segment_map
*mfirst
;
4678 struct elf_segment_map
**pm
;
4681 unsigned int hdr_index
;
4682 bfd_vma maxpagesize
;
4684 bfd_boolean phdr_in_segment
;
4685 bfd_boolean writable
;
4686 bfd_boolean executable
;
4687 unsigned int tls_count
= 0;
4688 asection
*first_tls
= NULL
;
4689 asection
*first_mbind
= NULL
;
4690 asection
*dynsec
, *eh_frame_hdr
;
4692 bfd_vma addr_mask
, wrap_to
= 0; /* Bytes. */
4693 bfd_size_type phdr_size
; /* Octets/bytes. */
4694 unsigned int opb
= bfd_octets_per_byte (abfd
, NULL
);
4696 /* Select the allocated sections, and sort them. */
4698 amt
= bfd_count_sections (abfd
) * sizeof (asection
*);
4699 sections
= (asection
**) bfd_malloc (amt
);
4700 if (sections
== NULL
)
4703 /* Calculate top address, avoiding undefined behaviour of shift
4704 left operator when shift count is equal to size of type
4706 addr_mask
= ((bfd_vma
) 1 << (bfd_arch_bits_per_address (abfd
) - 1)) - 1;
4707 addr_mask
= (addr_mask
<< 1) + 1;
4710 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
4712 if ((s
->flags
& SEC_ALLOC
) != 0)
4714 /* target_index is unused until bfd_elf_final_link
4715 starts output of section symbols. Use it to make
4717 s
->target_index
= i
;
4720 /* A wrapping section potentially clashes with header. */
4721 if (((s
->lma
+ s
->size
/ opb
) & addr_mask
) < (s
->lma
& addr_mask
))
4722 wrap_to
= (s
->lma
+ s
->size
/ opb
) & addr_mask
;
4725 BFD_ASSERT (i
<= bfd_count_sections (abfd
));
4728 qsort (sections
, (size_t) count
, sizeof (asection
*), elf_sort_sections
);
4730 phdr_size
= elf_program_header_size (abfd
);
4731 if (phdr_size
== (bfd_size_type
) -1)
4732 phdr_size
= get_program_header_size (abfd
, info
);
4733 phdr_size
+= bed
->s
->sizeof_ehdr
;
4734 /* phdr_size is compared to LMA values which are in bytes. */
4736 maxpagesize
= bed
->maxpagesize
;
4737 if (maxpagesize
== 0)
4739 phdr_in_segment
= info
!= NULL
&& info
->load_phdrs
;
4741 && (((sections
[0]->lma
& addr_mask
) & (maxpagesize
- 1))
4742 >= (phdr_size
& (maxpagesize
- 1))))
4743 /* For compatibility with old scripts that may not be using
4744 SIZEOF_HEADERS, add headers when it looks like space has
4745 been left for them. */
4746 phdr_in_segment
= TRUE
;
4748 /* Build the mapping. */
4752 /* If we have a .interp section, then create a PT_PHDR segment for
4753 the program headers and a PT_INTERP segment for the .interp
4755 s
= bfd_get_section_by_name (abfd
, ".interp");
4756 if (s
!= NULL
&& (s
->flags
& SEC_LOAD
) != 0 && s
->size
!= 0)
4758 amt
= sizeof (struct elf_segment_map
);
4759 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
4763 m
->p_type
= PT_PHDR
;
4765 m
->p_flags_valid
= 1;
4766 m
->includes_phdrs
= 1;
4767 phdr_in_segment
= TRUE
;
4771 amt
= sizeof (struct elf_segment_map
);
4772 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
4776 m
->p_type
= PT_INTERP
;
4784 /* Look through the sections. We put sections in the same program
4785 segment when the start of the second section can be placed within
4786 a few bytes of the end of the first section. */
4792 dynsec
= bfd_get_section_by_name (abfd
, ".dynamic");
4794 && (dynsec
->flags
& SEC_LOAD
) == 0)
4797 if ((abfd
->flags
& D_PAGED
) == 0)
4798 phdr_in_segment
= FALSE
;
4800 /* Deal with -Ttext or something similar such that the first section
4801 is not adjacent to the program headers. This is an
4802 approximation, since at this point we don't know exactly how many
4803 program headers we will need. */
4804 if (phdr_in_segment
&& count
> 0)
4806 bfd_vma phdr_lma
; /* Bytes. */
4807 bfd_boolean separate_phdr
= FALSE
;
4809 phdr_lma
= (sections
[0]->lma
- phdr_size
) & addr_mask
& -maxpagesize
;
4811 && info
->separate_code
4812 && (sections
[0]->flags
& SEC_CODE
) != 0)
4814 /* If data sections should be separate from code and
4815 thus not executable, and the first section is
4816 executable then put the file and program headers in
4817 their own PT_LOAD. */
4818 separate_phdr
= TRUE
;
4819 if ((((phdr_lma
+ phdr_size
- 1) & addr_mask
& -maxpagesize
)
4820 == (sections
[0]->lma
& addr_mask
& -maxpagesize
)))
4822 /* The file and program headers are currently on the
4823 same page as the first section. Put them on the
4824 previous page if we can. */
4825 if (phdr_lma
>= maxpagesize
)
4826 phdr_lma
-= maxpagesize
;
4828 separate_phdr
= FALSE
;
4831 if ((sections
[0]->lma
& addr_mask
) < phdr_lma
4832 || (sections
[0]->lma
& addr_mask
) < phdr_size
)
4833 /* If file and program headers would be placed at the end
4834 of memory then it's probably better to omit them. */
4835 phdr_in_segment
= FALSE
;
4836 else if (phdr_lma
< wrap_to
)
4837 /* If a section wraps around to where we'll be placing
4838 file and program headers, then the headers will be
4840 phdr_in_segment
= FALSE
;
4841 else if (separate_phdr
)
4843 m
= make_mapping (abfd
, sections
, 0, 0, phdr_in_segment
);
4846 m
->p_paddr
= phdr_lma
* opb
;
4848 = (sections
[0]->vma
- phdr_size
) & addr_mask
& -maxpagesize
;
4849 m
->p_paddr_valid
= 1;
4852 phdr_in_segment
= FALSE
;
4856 for (i
= 0, hdrpp
= sections
; i
< count
; i
++, hdrpp
++)
4859 bfd_boolean new_segment
;
4863 /* See if this section and the last one will fit in the same
4866 if (last_hdr
== NULL
)
4868 /* If we don't have a segment yet, then we don't need a new
4869 one (we build the last one after this loop). */
4870 new_segment
= FALSE
;
4872 else if (last_hdr
->lma
- last_hdr
->vma
!= hdr
->lma
- hdr
->vma
)
4874 /* If this section has a different relation between the
4875 virtual address and the load address, then we need a new
4879 else if (hdr
->lma
< last_hdr
->lma
+ last_size
4880 || last_hdr
->lma
+ last_size
< last_hdr
->lma
)
4882 /* If this section has a load address that makes it overlap
4883 the previous section, then we need a new segment. */
4886 else if ((abfd
->flags
& D_PAGED
) != 0
4887 && (((last_hdr
->lma
+ last_size
- 1) & -maxpagesize
)
4888 == (hdr
->lma
& -maxpagesize
)))
4890 /* If we are demand paged then we can't map two disk
4891 pages onto the same memory page. */
4892 new_segment
= FALSE
;
4894 /* In the next test we have to be careful when last_hdr->lma is close
4895 to the end of the address space. If the aligned address wraps
4896 around to the start of the address space, then there are no more
4897 pages left in memory and it is OK to assume that the current
4898 section can be included in the current segment. */
4899 else if ((BFD_ALIGN (last_hdr
->lma
+ last_size
, maxpagesize
)
4900 + maxpagesize
> last_hdr
->lma
)
4901 && (BFD_ALIGN (last_hdr
->lma
+ last_size
, maxpagesize
)
4902 + maxpagesize
<= hdr
->lma
))
4904 /* If putting this section in this segment would force us to
4905 skip a page in the segment, then we need a new segment. */
4908 else if ((last_hdr
->flags
& (SEC_LOAD
| SEC_THREAD_LOCAL
)) == 0
4909 && (hdr
->flags
& (SEC_LOAD
| SEC_THREAD_LOCAL
)) != 0)
4911 /* We don't want to put a loaded section after a
4912 nonloaded (ie. bss style) section in the same segment
4913 as that will force the non-loaded section to be loaded.
4914 Consider .tbss sections as loaded for this purpose. */
4917 else if ((abfd
->flags
& D_PAGED
) == 0)
4919 /* If the file is not demand paged, which means that we
4920 don't require the sections to be correctly aligned in the
4921 file, then there is no other reason for a new segment. */
4922 new_segment
= FALSE
;
4924 else if (info
!= NULL
4925 && info
->separate_code
4926 && executable
!= ((hdr
->flags
& SEC_CODE
) != 0))
4931 && (hdr
->flags
& SEC_READONLY
) == 0)
4933 /* We don't want to put a writable section in a read only
4939 /* Otherwise, we can use the same segment. */
4940 new_segment
= FALSE
;
4943 /* Allow interested parties a chance to override our decision. */
4944 if (last_hdr
!= NULL
4946 && info
->callbacks
->override_segment_assignment
!= NULL
)
4948 = info
->callbacks
->override_segment_assignment (info
, abfd
, hdr
,
4954 if ((hdr
->flags
& SEC_READONLY
) == 0)
4956 if ((hdr
->flags
& SEC_CODE
) != 0)
4959 /* .tbss sections effectively have zero size. */
4960 last_size
= (!IS_TBSS (hdr
) ? hdr
->size
: 0) / opb
;
4964 /* We need a new program segment. We must create a new program
4965 header holding all the sections from hdr_index until hdr. */
4967 m
= make_mapping (abfd
, sections
, hdr_index
, i
, phdr_in_segment
);
4974 if ((hdr
->flags
& SEC_READONLY
) == 0)
4979 if ((hdr
->flags
& SEC_CODE
) == 0)
4985 /* .tbss sections effectively have zero size. */
4986 last_size
= (!IS_TBSS (hdr
) ? hdr
->size
: 0) / opb
;
4988 phdr_in_segment
= FALSE
;
4991 /* Create a final PT_LOAD program segment, but not if it's just
4993 if (last_hdr
!= NULL
4994 && (i
- hdr_index
!= 1
4995 || !IS_TBSS (last_hdr
)))
4997 m
= make_mapping (abfd
, sections
, hdr_index
, i
, phdr_in_segment
);
5005 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
5008 m
= _bfd_elf_make_dynamic_segment (abfd
, dynsec
);
5015 /* For each batch of consecutive loadable SHT_NOTE sections,
5016 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
5017 because if we link together nonloadable .note sections and
5018 loadable .note sections, we will generate two .note sections
5019 in the output file. */
5020 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
5022 if ((s
->flags
& SEC_LOAD
) != 0
5023 && elf_section_type (s
) == SHT_NOTE
)
5026 unsigned int alignment_power
= s
->alignment_power
;
5029 for (s2
= s
; s2
->next
!= NULL
; s2
= s2
->next
)
5031 if (s2
->next
->alignment_power
== alignment_power
5032 && (s2
->next
->flags
& SEC_LOAD
) != 0
5033 && elf_section_type (s2
->next
) == SHT_NOTE
5034 && align_power (s2
->lma
+ s2
->size
/ opb
,
5041 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
5042 amt
+= count
* sizeof (asection
*);
5043 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
5047 m
->p_type
= PT_NOTE
;
5051 m
->sections
[m
->count
- count
--] = s
;
5052 BFD_ASSERT ((s
->flags
& SEC_THREAD_LOCAL
) == 0);
5055 m
->sections
[m
->count
- 1] = s
;
5056 BFD_ASSERT ((s
->flags
& SEC_THREAD_LOCAL
) == 0);
5060 if (s
->flags
& SEC_THREAD_LOCAL
)
5066 if (first_mbind
== NULL
5067 && (elf_section_flags (s
) & SHF_GNU_MBIND
) != 0)
5071 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5074 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
5075 amt
+= tls_count
* sizeof (asection
*);
5076 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
5081 m
->count
= tls_count
;
5082 /* Mandated PF_R. */
5084 m
->p_flags_valid
= 1;
5086 for (i
= 0; i
< tls_count
; ++i
)
5088 if ((s
->flags
& SEC_THREAD_LOCAL
) == 0)
5091 (_("%pB: TLS sections are not adjacent:"), abfd
);
5094 while (i
< tls_count
)
5096 if ((s
->flags
& SEC_THREAD_LOCAL
) != 0)
5098 _bfd_error_handler (_(" TLS: %pA"), s
);
5102 _bfd_error_handler (_(" non-TLS: %pA"), s
);
5105 bfd_set_error (bfd_error_bad_value
);
5117 && (abfd
->flags
& D_PAGED
) != 0
5118 && (elf_tdata (abfd
)->has_gnu_osabi
& elf_gnu_osabi_mbind
) != 0)
5119 for (s
= first_mbind
; s
!= NULL
; s
= s
->next
)
5120 if ((elf_section_flags (s
) & SHF_GNU_MBIND
) != 0
5121 && elf_section_data (s
)->this_hdr
.sh_info
<= PT_GNU_MBIND_NUM
)
5123 /* Mandated PF_R. */
5124 unsigned long p_flags
= PF_R
;
5125 if ((s
->flags
& SEC_READONLY
) == 0)
5127 if ((s
->flags
& SEC_CODE
) != 0)
5130 amt
= sizeof (struct elf_segment_map
) + sizeof (asection
*);
5131 m
= bfd_zalloc (abfd
, amt
);
5135 m
->p_type
= (PT_GNU_MBIND_LO
5136 + elf_section_data (s
)->this_hdr
.sh_info
);
5138 m
->p_flags_valid
= 1;
5140 m
->p_flags
= p_flags
;
5146 s
= bfd_get_section_by_name (abfd
,
5147 NOTE_GNU_PROPERTY_SECTION_NAME
);
5148 if (s
!= NULL
&& s
->size
!= 0)
5150 amt
= sizeof (struct elf_segment_map
) + sizeof (asection
*);
5151 m
= bfd_zalloc (abfd
, amt
);
5155 m
->p_type
= PT_GNU_PROPERTY
;
5157 m
->p_flags_valid
= 1;
5164 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5166 eh_frame_hdr
= elf_eh_frame_hdr (abfd
);
5167 if (eh_frame_hdr
!= NULL
5168 && (eh_frame_hdr
->output_section
->flags
& SEC_LOAD
) != 0)
5170 amt
= sizeof (struct elf_segment_map
);
5171 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
5175 m
->p_type
= PT_GNU_EH_FRAME
;
5177 m
->sections
[0] = eh_frame_hdr
->output_section
;
5183 if (elf_stack_flags (abfd
))
5185 amt
= sizeof (struct elf_segment_map
);
5186 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
5190 m
->p_type
= PT_GNU_STACK
;
5191 m
->p_flags
= elf_stack_flags (abfd
);
5192 m
->p_align
= bed
->stack_align
;
5193 m
->p_flags_valid
= 1;
5194 m
->p_align_valid
= m
->p_align
!= 0;
5195 if (info
->stacksize
> 0)
5197 m
->p_size
= info
->stacksize
;
5198 m
->p_size_valid
= 1;
5205 if (info
!= NULL
&& info
->relro
)
5207 for (m
= mfirst
; m
!= NULL
; m
= m
->next
)
5209 if (m
->p_type
== PT_LOAD
5211 && m
->sections
[0]->vma
>= info
->relro_start
5212 && m
->sections
[0]->vma
< info
->relro_end
)
5215 while (--i
!= (unsigned) -1)
5217 if (m
->sections
[i
]->size
> 0
5218 && (m
->sections
[i
]->flags
& (SEC_LOAD
| SEC_HAS_CONTENTS
))
5219 == (SEC_LOAD
| SEC_HAS_CONTENTS
))
5223 if (i
!= (unsigned) -1)
5228 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5231 amt
= sizeof (struct elf_segment_map
);
5232 m
= (struct elf_segment_map
*) bfd_zalloc (abfd
, amt
);
5236 m
->p_type
= PT_GNU_RELRO
;
5243 elf_seg_map (abfd
) = mfirst
;
5246 if (!elf_modify_segment_map (abfd
, info
, no_user_phdrs
))
5249 for (count
= 0, m
= elf_seg_map (abfd
); m
!= NULL
; m
= m
->next
)
5251 elf_program_header_size (abfd
) = count
* bed
->s
->sizeof_phdr
;
5256 if (sections
!= NULL
)
5261 /* Sort sections by address. */
5264 elf_sort_sections (const void *arg1
, const void *arg2
)
5266 const asection
*sec1
= *(const asection
**) arg1
;
5267 const asection
*sec2
= *(const asection
**) arg2
;
5268 bfd_size_type size1
, size2
;
5270 /* Sort by LMA first, since this is the address used to
5271 place the section into a segment. */
5272 if (sec1
->lma
< sec2
->lma
)
5274 else if (sec1
->lma
> sec2
->lma
)
5277 /* Then sort by VMA. Normally the LMA and the VMA will be
5278 the same, and this will do nothing. */
5279 if (sec1
->vma
< sec2
->vma
)
5281 else if (sec1
->vma
> sec2
->vma
)
5284 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5286 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5293 else if (TOEND (sec2
))
5298 /* Sort by size, to put zero sized sections
5299 before others at the same address. */
5301 size1
= (sec1
->flags
& SEC_LOAD
) ? sec1
->size
: 0;
5302 size2
= (sec2
->flags
& SEC_LOAD
) ? sec2
->size
: 0;
5309 return sec1
->target_index
- sec2
->target_index
;
5312 /* This qsort comparison functions sorts PT_LOAD segments first and
5313 by p_paddr, for assign_file_positions_for_load_sections. */
5316 elf_sort_segments (const void *arg1
, const void *arg2
)
5318 const struct elf_segment_map
*m1
= *(const struct elf_segment_map
**) arg1
;
5319 const struct elf_segment_map
*m2
= *(const struct elf_segment_map
**) arg2
;
5321 if (m1
->p_type
!= m2
->p_type
)
5323 if (m1
->p_type
== PT_NULL
)
5325 if (m2
->p_type
== PT_NULL
)
5327 return m1
->p_type
< m2
->p_type
? -1 : 1;
5329 if (m1
->includes_filehdr
!= m2
->includes_filehdr
)
5330 return m1
->includes_filehdr
? -1 : 1;
5331 if (m1
->no_sort_lma
!= m2
->no_sort_lma
)
5332 return m1
->no_sort_lma
? -1 : 1;
5333 if (m1
->p_type
== PT_LOAD
&& !m1
->no_sort_lma
)
5335 bfd_vma lma1
, lma2
; /* Octets. */
5337 if (m1
->p_paddr_valid
)
5339 else if (m1
->count
!= 0)
5341 unsigned int opb
= bfd_octets_per_byte (m1
->sections
[0]->owner
,
5343 lma1
= (m1
->sections
[0]->lma
+ m1
->p_vaddr_offset
) * opb
;
5346 if (m2
->p_paddr_valid
)
5348 else if (m2
->count
!= 0)
5350 unsigned int opb
= bfd_octets_per_byte (m2
->sections
[0]->owner
,
5352 lma2
= (m2
->sections
[0]->lma
+ m2
->p_vaddr_offset
) * opb
;
5355 return lma1
< lma2
? -1 : 1;
5357 if (m1
->idx
!= m2
->idx
)
5358 return m1
->idx
< m2
->idx
? -1 : 1;
5362 /* Ian Lance Taylor writes:
5364 We shouldn't be using % with a negative signed number. That's just
5365 not good. We have to make sure either that the number is not
5366 negative, or that the number has an unsigned type. When the types
5367 are all the same size they wind up as unsigned. When file_ptr is a
5368 larger signed type, the arithmetic winds up as signed long long,
5371 What we're trying to say here is something like ``increase OFF by
5372 the least amount that will cause it to be equal to the VMA modulo
5374 /* In other words, something like:
5376 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5377 off_offset = off % bed->maxpagesize;
5378 if (vma_offset < off_offset)
5379 adjustment = vma_offset + bed->maxpagesize - off_offset;
5381 adjustment = vma_offset - off_offset;
5383 which can be collapsed into the expression below. */
5386 vma_page_aligned_bias (bfd_vma vma
, ufile_ptr off
, bfd_vma maxpagesize
)
5388 /* PR binutils/16199: Handle an alignment of zero. */
5389 if (maxpagesize
== 0)
5391 return ((vma
- off
) % maxpagesize
);
5395 print_segment_map (const struct elf_segment_map
*m
)
5398 const char *pt
= get_segment_type (m
->p_type
);
5403 if (m
->p_type
>= PT_LOPROC
&& m
->p_type
<= PT_HIPROC
)
5404 sprintf (buf
, "LOPROC+%7.7x",
5405 (unsigned int) (m
->p_type
- PT_LOPROC
));
5406 else if (m
->p_type
>= PT_LOOS
&& m
->p_type
<= PT_HIOS
)
5407 sprintf (buf
, "LOOS+%7.7x",
5408 (unsigned int) (m
->p_type
- PT_LOOS
));
5410 snprintf (buf
, sizeof (buf
), "%8.8x",
5411 (unsigned int) m
->p_type
);
5415 fprintf (stderr
, "%s:", pt
);
5416 for (j
= 0; j
< m
->count
; j
++)
5417 fprintf (stderr
, " %s", m
->sections
[j
]->name
);
5423 write_zeros (bfd
*abfd
, file_ptr pos
, bfd_size_type len
)
5428 if (bfd_seek (abfd
, pos
, SEEK_SET
) != 0)
5430 buf
= bfd_zmalloc (len
);
5433 ret
= bfd_bwrite (buf
, len
, abfd
) == len
;
5438 /* Assign file positions to the sections based on the mapping from
5439 sections to segments. This function also sets up some fields in
5443 assign_file_positions_for_load_sections (bfd
*abfd
,
5444 struct bfd_link_info
*link_info
)
5446 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
5447 struct elf_segment_map
*m
;
5448 struct elf_segment_map
*phdr_load_seg
;
5449 Elf_Internal_Phdr
*phdrs
;
5450 Elf_Internal_Phdr
*p
;
5451 file_ptr off
; /* Octets. */
5452 bfd_size_type maxpagesize
;
5453 unsigned int alloc
, actual
;
5455 struct elf_segment_map
**sorted_seg_map
;
5456 unsigned int opb
= bfd_octets_per_byte (abfd
, NULL
);
5458 if (link_info
== NULL
5459 && !_bfd_elf_map_sections_to_segments (abfd
, link_info
))
5463 for (m
= elf_seg_map (abfd
); m
!= NULL
; m
= m
->next
)
5468 elf_elfheader (abfd
)->e_phoff
= bed
->s
->sizeof_ehdr
;
5469 elf_elfheader (abfd
)->e_phentsize
= bed
->s
->sizeof_phdr
;
5473 /* PR binutils/12467. */
5474 elf_elfheader (abfd
)->e_phoff
= 0;
5475 elf_elfheader (abfd
)->e_phentsize
= 0;
5478 elf_elfheader (abfd
)->e_phnum
= alloc
;
5480 if (elf_program_header_size (abfd
) == (bfd_size_type
) -1)
5483 elf_program_header_size (abfd
) = alloc
* bed
->s
->sizeof_phdr
;
5487 actual
= elf_program_header_size (abfd
) / bed
->s
->sizeof_phdr
;
5488 BFD_ASSERT (elf_program_header_size (abfd
)
5489 == actual
* bed
->s
->sizeof_phdr
);
5490 BFD_ASSERT (actual
>= alloc
);
5495 elf_next_file_pos (abfd
) = bed
->s
->sizeof_ehdr
;
5499 /* We're writing the size in elf_program_header_size (abfd),
5500 see assign_file_positions_except_relocs, so make sure we have
5501 that amount allocated, with trailing space cleared.
5502 The variable alloc contains the computed need, while
5503 elf_program_header_size (abfd) contains the size used for the
5505 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5506 where the layout is forced to according to a larger size in the
5507 last iterations for the testcase ld-elf/header. */
5508 phdrs
= bfd_zalloc (abfd
, (actual
* sizeof (*phdrs
)
5509 + alloc
* sizeof (*sorted_seg_map
)));
5510 sorted_seg_map
= (struct elf_segment_map
**) (phdrs
+ actual
);
5511 elf_tdata (abfd
)->phdr
= phdrs
;
5515 for (m
= elf_seg_map (abfd
), j
= 0; m
!= NULL
; m
= m
->next
, j
++)
5517 sorted_seg_map
[j
] = m
;
5518 /* If elf_segment_map is not from map_sections_to_segments, the
5519 sections may not be correctly ordered. NOTE: sorting should
5520 not be done to the PT_NOTE section of a corefile, which may
5521 contain several pseudo-sections artificially created by bfd.
5522 Sorting these pseudo-sections breaks things badly. */
5524 && !(elf_elfheader (abfd
)->e_type
== ET_CORE
5525 && m
->p_type
== PT_NOTE
))
5527 for (i
= 0; i
< m
->count
; i
++)
5528 m
->sections
[i
]->target_index
= i
;
5529 qsort (m
->sections
, (size_t) m
->count
, sizeof (asection
*),
5534 qsort (sorted_seg_map
, alloc
, sizeof (*sorted_seg_map
),
5538 if ((abfd
->flags
& D_PAGED
) != 0)
5539 maxpagesize
= bed
->maxpagesize
;
5541 /* Sections must map to file offsets past the ELF file header. */
5542 off
= bed
->s
->sizeof_ehdr
;
5543 /* And if one of the PT_LOAD headers doesn't include the program
5544 headers then we'll be mapping program headers in the usual
5545 position after the ELF file header. */
5546 phdr_load_seg
= NULL
;
5547 for (j
= 0; j
< alloc
; j
++)
5549 m
= sorted_seg_map
[j
];
5550 if (m
->p_type
!= PT_LOAD
)
5552 if (m
->includes_phdrs
)
5558 if (phdr_load_seg
== NULL
)
5559 off
+= actual
* bed
->s
->sizeof_phdr
;
5561 for (j
= 0; j
< alloc
; j
++)
5564 bfd_vma off_adjust
; /* Octets. */
5565 bfd_boolean no_contents
;
5567 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5568 number of sections with contents contributing to both p_filesz
5569 and p_memsz, followed by a number of sections with no contents
5570 that just contribute to p_memsz. In this loop, OFF tracks next
5571 available file offset for PT_LOAD and PT_NOTE segments. */
5572 m
= sorted_seg_map
[j
];
5574 p
->p_type
= m
->p_type
;
5575 p
->p_flags
= m
->p_flags
;
5578 p
->p_vaddr
= m
->p_vaddr_offset
* opb
;
5580 p
->p_vaddr
= (m
->sections
[0]->vma
+ m
->p_vaddr_offset
) * opb
;
5582 if (m
->p_paddr_valid
)
5583 p
->p_paddr
= m
->p_paddr
;
5584 else if (m
->count
== 0)
5587 p
->p_paddr
= (m
->sections
[0]->lma
+ m
->p_vaddr_offset
) * opb
;
5589 if (p
->p_type
== PT_LOAD
5590 && (abfd
->flags
& D_PAGED
) != 0)
5592 /* p_align in demand paged PT_LOAD segments effectively stores
5593 the maximum page size. When copying an executable with
5594 objcopy, we set m->p_align from the input file. Use this
5595 value for maxpagesize rather than bed->maxpagesize, which
5596 may be different. Note that we use maxpagesize for PT_TLS
5597 segment alignment later in this function, so we are relying
5598 on at least one PT_LOAD segment appearing before a PT_TLS
5600 if (m
->p_align_valid
)
5601 maxpagesize
= m
->p_align
;
5603 p
->p_align
= maxpagesize
;
5605 else if (m
->p_align_valid
)
5606 p
->p_align
= m
->p_align
;
5607 else if (m
->count
== 0)
5608 p
->p_align
= 1 << bed
->s
->log_file_align
;
5610 if (m
== phdr_load_seg
)
5612 if (!m
->includes_filehdr
)
5614 off
+= actual
* bed
->s
->sizeof_phdr
;
5617 no_contents
= FALSE
;
5619 if (p
->p_type
== PT_LOAD
5622 bfd_size_type align
; /* Bytes. */
5623 unsigned int align_power
= 0;
5625 if (m
->p_align_valid
)
5629 for (i
= 0, secpp
= m
->sections
; i
< m
->count
; i
++, secpp
++)
5631 unsigned int secalign
;
5633 secalign
= bfd_section_alignment (*secpp
);
5634 if (secalign
> align_power
)
5635 align_power
= secalign
;
5637 align
= (bfd_size_type
) 1 << align_power
;
5638 if (align
< maxpagesize
)
5639 align
= maxpagesize
;
5642 for (i
= 0; i
< m
->count
; i
++)
5643 if ((m
->sections
[i
]->flags
& (SEC_LOAD
| SEC_HAS_CONTENTS
)) == 0)
5644 /* If we aren't making room for this section, then
5645 it must be SHT_NOBITS regardless of what we've
5646 set via struct bfd_elf_special_section. */
5647 elf_section_type (m
->sections
[i
]) = SHT_NOBITS
;
5649 /* Find out whether this segment contains any loadable
5652 for (i
= 0; i
< m
->count
; i
++)
5653 if (elf_section_type (m
->sections
[i
]) != SHT_NOBITS
)
5655 no_contents
= FALSE
;
5659 off_adjust
= vma_page_aligned_bias (p
->p_vaddr
, off
, align
* opb
);
5661 /* Broken hardware and/or kernel require that files do not
5662 map the same page with different permissions on some hppa
5665 && (abfd
->flags
& D_PAGED
) != 0
5666 && bed
->no_page_alias
5667 && (off
& (maxpagesize
- 1)) != 0
5668 && ((off
& -maxpagesize
)
5669 == ((off
+ off_adjust
) & -maxpagesize
)))
5670 off_adjust
+= maxpagesize
;
5674 /* We shouldn't need to align the segment on disk since
5675 the segment doesn't need file space, but the gABI
5676 arguably requires the alignment and glibc ld.so
5677 checks it. So to comply with the alignment
5678 requirement but not waste file space, we adjust
5679 p_offset for just this segment. (OFF_ADJUST is
5680 subtracted from OFF later.) This may put p_offset
5681 past the end of file, but that shouldn't matter. */
5686 /* Make sure the .dynamic section is the first section in the
5687 PT_DYNAMIC segment. */
5688 else if (p
->p_type
== PT_DYNAMIC
5690 && strcmp (m
->sections
[0]->name
, ".dynamic") != 0)
5693 (_("%pB: The first section in the PT_DYNAMIC segment"
5694 " is not the .dynamic section"),
5696 bfd_set_error (bfd_error_bad_value
);
5699 /* Set the note section type to SHT_NOTE. */
5700 else if (p
->p_type
== PT_NOTE
)
5701 for (i
= 0; i
< m
->count
; i
++)
5702 elf_section_type (m
->sections
[i
]) = SHT_NOTE
;
5704 if (m
->includes_filehdr
)
5706 if (!m
->p_flags_valid
)
5708 p
->p_filesz
= bed
->s
->sizeof_ehdr
;
5709 p
->p_memsz
= bed
->s
->sizeof_ehdr
;
5710 if (p
->p_type
== PT_LOAD
)
5714 if (p
->p_vaddr
< (bfd_vma
) off
5715 || (!m
->p_paddr_valid
5716 && p
->p_paddr
< (bfd_vma
) off
))
5719 (_("%pB: not enough room for program headers,"
5720 " try linking with -N"),
5722 bfd_set_error (bfd_error_bad_value
);
5726 if (!m
->p_paddr_valid
)
5730 else if (sorted_seg_map
[0]->includes_filehdr
)
5732 Elf_Internal_Phdr
*filehdr
= phdrs
+ sorted_seg_map
[0]->idx
;
5733 p
->p_vaddr
= filehdr
->p_vaddr
;
5734 if (!m
->p_paddr_valid
)
5735 p
->p_paddr
= filehdr
->p_paddr
;
5739 if (m
->includes_phdrs
)
5741 if (!m
->p_flags_valid
)
5743 p
->p_filesz
+= actual
* bed
->s
->sizeof_phdr
;
5744 p
->p_memsz
+= actual
* bed
->s
->sizeof_phdr
;
5745 if (!m
->includes_filehdr
)
5747 if (p
->p_type
== PT_LOAD
)
5749 elf_elfheader (abfd
)->e_phoff
= p
->p_offset
;
5752 p
->p_vaddr
-= off
- p
->p_offset
;
5753 if (!m
->p_paddr_valid
)
5754 p
->p_paddr
-= off
- p
->p_offset
;
5757 else if (phdr_load_seg
!= NULL
)
5759 Elf_Internal_Phdr
*phdr
= phdrs
+ phdr_load_seg
->idx
;
5760 bfd_vma phdr_off
= 0; /* Octets. */
5761 if (phdr_load_seg
->includes_filehdr
)
5762 phdr_off
= bed
->s
->sizeof_ehdr
;
5763 p
->p_vaddr
= phdr
->p_vaddr
+ phdr_off
;
5764 if (!m
->p_paddr_valid
)
5765 p
->p_paddr
= phdr
->p_paddr
+ phdr_off
;
5766 p
->p_offset
= phdr
->p_offset
+ phdr_off
;
5769 p
->p_offset
= bed
->s
->sizeof_ehdr
;
5773 if (p
->p_type
== PT_LOAD
5774 || (p
->p_type
== PT_NOTE
&& bfd_get_format (abfd
) == bfd_core
))
5776 if (!m
->includes_filehdr
&& !m
->includes_phdrs
)
5781 /* Put meaningless p_offset for PT_LOAD segments
5782 without file contents somewhere within the first
5783 page, in an attempt to not point past EOF. */
5784 bfd_size_type align
= maxpagesize
;
5785 if (align
< p
->p_align
)
5789 p
->p_offset
= off
% align
;
5794 file_ptr adjust
; /* Octets. */
5796 adjust
= off
- (p
->p_offset
+ p
->p_filesz
);
5798 p
->p_filesz
+= adjust
;
5799 p
->p_memsz
+= adjust
;
5803 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5804 maps. Set filepos for sections in PT_LOAD segments, and in
5805 core files, for sections in PT_NOTE segments.
5806 assign_file_positions_for_non_load_sections will set filepos
5807 for other sections and update p_filesz for other segments. */
5808 for (i
= 0, secpp
= m
->sections
; i
< m
->count
; i
++, secpp
++)
5811 bfd_size_type align
;
5812 Elf_Internal_Shdr
*this_hdr
;
5815 this_hdr
= &elf_section_data (sec
)->this_hdr
;
5816 align
= (bfd_size_type
) 1 << bfd_section_alignment (sec
);
5818 if ((p
->p_type
== PT_LOAD
5819 || p
->p_type
== PT_TLS
)
5820 && (this_hdr
->sh_type
!= SHT_NOBITS
5821 || ((this_hdr
->sh_flags
& SHF_ALLOC
) != 0
5822 && ((this_hdr
->sh_flags
& SHF_TLS
) == 0
5823 || p
->p_type
== PT_TLS
))))
5825 bfd_vma p_start
= p
->p_paddr
; /* Octets. */
5826 bfd_vma p_end
= p_start
+ p
->p_memsz
; /* Octets. */
5827 bfd_vma s_start
= sec
->lma
* opb
; /* Octets. */
5828 bfd_vma adjust
= s_start
- p_end
; /* Octets. */
5832 || p_end
< p_start
))
5835 /* xgettext:c-format */
5836 (_("%pB: section %pA lma %#" PRIx64
" adjusted to %#" PRIx64
),
5837 abfd
, sec
, (uint64_t) s_start
/ opb
,
5838 (uint64_t) p_end
/ opb
);
5840 sec
->lma
= p_end
/ opb
;
5842 p
->p_memsz
+= adjust
;
5844 if (this_hdr
->sh_type
!= SHT_NOBITS
)
5846 if (p
->p_type
== PT_LOAD
)
5848 if (p
->p_filesz
+ adjust
< p
->p_memsz
)
5850 /* We have a PROGBITS section following NOBITS ones.
5851 Allocate file space for the NOBITS section(s) and
5853 adjust
= p
->p_memsz
- p
->p_filesz
;
5854 if (!write_zeros (abfd
, off
, adjust
))
5859 p
->p_filesz
+= adjust
;
5863 if (p
->p_type
== PT_NOTE
&& bfd_get_format (abfd
) == bfd_core
)
5865 /* The section at i == 0 is the one that actually contains
5869 this_hdr
->sh_offset
= sec
->filepos
= off
;
5870 off
+= this_hdr
->sh_size
;
5871 p
->p_filesz
= this_hdr
->sh_size
;
5877 /* The rest are fake sections that shouldn't be written. */
5886 if (p
->p_type
== PT_LOAD
)
5888 this_hdr
->sh_offset
= sec
->filepos
= off
;
5889 if (this_hdr
->sh_type
!= SHT_NOBITS
)
5890 off
+= this_hdr
->sh_size
;
5892 else if (this_hdr
->sh_type
== SHT_NOBITS
5893 && (this_hdr
->sh_flags
& SHF_TLS
) != 0
5894 && this_hdr
->sh_offset
== 0)
5896 /* This is a .tbss section that didn't get a PT_LOAD.
5897 (See _bfd_elf_map_sections_to_segments "Create a
5898 final PT_LOAD".) Set sh_offset to the value it
5899 would have if we had created a zero p_filesz and
5900 p_memsz PT_LOAD header for the section. This
5901 also makes the PT_TLS header have the same
5903 bfd_vma adjust
= vma_page_aligned_bias (this_hdr
->sh_addr
,
5905 this_hdr
->sh_offset
= sec
->filepos
= off
+ adjust
;
5908 if (this_hdr
->sh_type
!= SHT_NOBITS
)
5910 p
->p_filesz
+= this_hdr
->sh_size
;
5911 /* A load section without SHF_ALLOC is something like
5912 a note section in a PT_NOTE segment. These take
5913 file space but are not loaded into memory. */
5914 if ((this_hdr
->sh_flags
& SHF_ALLOC
) != 0)
5915 p
->p_memsz
+= this_hdr
->sh_size
;
5917 else if ((this_hdr
->sh_flags
& SHF_ALLOC
) != 0)
5919 if (p
->p_type
== PT_TLS
)
5920 p
->p_memsz
+= this_hdr
->sh_size
;
5922 /* .tbss is special. It doesn't contribute to p_memsz of
5924 else if ((this_hdr
->sh_flags
& SHF_TLS
) == 0)
5925 p
->p_memsz
+= this_hdr
->sh_size
;
5928 if (align
> p
->p_align
5929 && !m
->p_align_valid
5930 && (p
->p_type
!= PT_LOAD
5931 || (abfd
->flags
& D_PAGED
) == 0))
5935 if (!m
->p_flags_valid
)
5938 if ((this_hdr
->sh_flags
& SHF_EXECINSTR
) != 0)
5940 if ((this_hdr
->sh_flags
& SHF_WRITE
) != 0)
5947 /* PR ld/20815 - Check that the program header segment, if
5948 present, will be loaded into memory. */
5949 if (p
->p_type
== PT_PHDR
5950 && phdr_load_seg
== NULL
5951 && !(bed
->elf_backend_allow_non_load_phdr
!= NULL
5952 && bed
->elf_backend_allow_non_load_phdr (abfd
, phdrs
, alloc
)))
5954 /* The fix for this error is usually to edit the linker script being
5955 used and set up the program headers manually. Either that or
5956 leave room for the headers at the start of the SECTIONS. */
5957 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5958 " by LOAD segment"),
5960 if (link_info
== NULL
)
5962 /* Arrange for the linker to exit with an error, deleting
5963 the output file unless --noinhibit-exec is given. */
5964 link_info
->callbacks
->info ("%X");
5967 /* Check that all sections are in a PT_LOAD segment.
5968 Don't check funky gdb generated core files. */
5969 if (p
->p_type
== PT_LOAD
&& bfd_get_format (abfd
) != bfd_core
)
5971 bfd_boolean check_vma
= TRUE
;
5973 for (i
= 1; i
< m
->count
; i
++)
5974 if (m
->sections
[i
]->vma
== m
->sections
[i
- 1]->vma
5975 && ELF_SECTION_SIZE (&(elf_section_data (m
->sections
[i
])
5976 ->this_hdr
), p
) != 0
5977 && ELF_SECTION_SIZE (&(elf_section_data (m
->sections
[i
- 1])
5978 ->this_hdr
), p
) != 0)
5980 /* Looks like we have overlays packed into the segment. */
5985 for (i
= 0; i
< m
->count
; i
++)
5987 Elf_Internal_Shdr
*this_hdr
;
5990 sec
= m
->sections
[i
];
5991 this_hdr
= &(elf_section_data(sec
)->this_hdr
);
5992 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr
, p
, check_vma
, 0)
5993 && !ELF_TBSS_SPECIAL (this_hdr
, p
))
5996 /* xgettext:c-format */
5997 (_("%pB: section `%pA' can't be allocated in segment %d"),
5999 print_segment_map (m
);
6005 elf_next_file_pos (abfd
) = off
;
6007 if (link_info
!= NULL
6008 && phdr_load_seg
!= NULL
6009 && phdr_load_seg
->includes_filehdr
)
6011 /* There is a segment that contains both the file headers and the
6012 program headers, so provide a symbol __ehdr_start pointing there.
6013 A program can use this to examine itself robustly. */
6015 struct elf_link_hash_entry
*hash
6016 = elf_link_hash_lookup (elf_hash_table (link_info
), "__ehdr_start",
6017 FALSE
, FALSE
, TRUE
);
6018 /* If the symbol was referenced and not defined, define it. */
6020 && (hash
->root
.type
== bfd_link_hash_new
6021 || hash
->root
.type
== bfd_link_hash_undefined
6022 || hash
->root
.type
== bfd_link_hash_undefweak
6023 || hash
->root
.type
== bfd_link_hash_common
))
6026 bfd_vma filehdr_vaddr
= phdrs
[phdr_load_seg
->idx
].p_vaddr
/ opb
;
6028 if (phdr_load_seg
->count
!= 0)
6029 /* The segment contains sections, so use the first one. */
6030 s
= phdr_load_seg
->sections
[0];
6032 /* Use the first (i.e. lowest-addressed) section in any segment. */
6033 for (m
= elf_seg_map (abfd
); m
!= NULL
; m
= m
->next
)
6034 if (m
->p_type
== PT_LOAD
&& m
->count
!= 0)
6042 hash
->root
.u
.def
.value
= filehdr_vaddr
- s
->vma
;
6043 hash
->root
.u
.def
.section
= s
;
6047 hash
->root
.u
.def
.value
= filehdr_vaddr
;
6048 hash
->root
.u
.def
.section
= bfd_abs_section_ptr
;
6051 hash
->root
.type
= bfd_link_hash_defined
;
6052 hash
->def_regular
= 1;
6060 /* Determine if a bfd is a debuginfo file. Unfortunately there
6061 is no defined method for detecting such files, so we have to
6062 use heuristics instead. */
6065 is_debuginfo_file (bfd
*abfd
)
6067 if (abfd
== NULL
|| bfd_get_flavour (abfd
) != bfd_target_elf_flavour
)
6070 Elf_Internal_Shdr
**start_headers
= elf_elfsections (abfd
);
6071 Elf_Internal_Shdr
**end_headers
= start_headers
+ elf_numsections (abfd
);
6072 Elf_Internal_Shdr
**headerp
;
6074 for (headerp
= start_headers
; headerp
< end_headers
; headerp
++)
6076 Elf_Internal_Shdr
*header
= * headerp
;
6078 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6079 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6080 if ((header
->sh_flags
& SHF_ALLOC
) == SHF_ALLOC
6081 && header
->sh_type
!= SHT_NOBITS
6082 && header
->sh_type
!= SHT_NOTE
)
6089 /* Assign file positions for the other sections, except for compressed debugging
6090 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6093 assign_file_positions_for_non_load_sections (bfd
*abfd
,
6094 struct bfd_link_info
*link_info
)
6096 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
6097 Elf_Internal_Shdr
**i_shdrpp
;
6098 Elf_Internal_Shdr
**hdrpp
, **end_hdrpp
;
6099 Elf_Internal_Phdr
*phdrs
;
6100 Elf_Internal_Phdr
*p
;
6101 struct elf_segment_map
*m
;
6103 unsigned int opb
= bfd_octets_per_byte (abfd
, NULL
);
6105 i_shdrpp
= elf_elfsections (abfd
);
6106 end_hdrpp
= i_shdrpp
+ elf_numsections (abfd
);
6107 off
= elf_next_file_pos (abfd
);
6108 for (hdrpp
= i_shdrpp
+ 1; hdrpp
< end_hdrpp
; hdrpp
++)
6110 Elf_Internal_Shdr
*hdr
;
6113 if (hdr
->bfd_section
!= NULL
6114 && (hdr
->bfd_section
->filepos
!= 0
6115 || (hdr
->sh_type
== SHT_NOBITS
6116 && hdr
->contents
== NULL
)))
6117 BFD_ASSERT (hdr
->sh_offset
== hdr
->bfd_section
->filepos
);
6118 else if ((hdr
->sh_flags
& SHF_ALLOC
) != 0)
6120 if (hdr
->sh_size
!= 0
6121 /* PR 24717 - debuginfo files are known to be not strictly
6122 compliant with the ELF standard. In particular they often
6123 have .note.gnu.property sections that are outside of any
6124 loadable segment. This is not a problem for such files,
6125 so do not warn about them. */
6126 && ! is_debuginfo_file (abfd
))
6128 /* xgettext:c-format */
6129 (_("%pB: warning: allocated section `%s' not in segment"),
6131 (hdr
->bfd_section
== NULL
6133 : hdr
->bfd_section
->name
));
6134 /* We don't need to page align empty sections. */
6135 if ((abfd
->flags
& D_PAGED
) != 0 && hdr
->sh_size
!= 0)
6136 off
+= vma_page_aligned_bias (hdr
->sh_addr
, off
,
6139 off
+= vma_page_aligned_bias (hdr
->sh_addr
, off
,
6141 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
,
6144 else if (((hdr
->sh_type
== SHT_REL
|| hdr
->sh_type
== SHT_RELA
)
6145 && hdr
->bfd_section
== NULL
)
6146 /* We don't know the offset of these sections yet: their size has
6147 not been decided. */
6148 || (hdr
->bfd_section
!= NULL
6149 && (hdr
->bfd_section
->flags
& SEC_ELF_COMPRESS
6150 || (bfd_section_is_ctf (hdr
->bfd_section
)
6151 && abfd
->is_linker_output
)))
6152 || hdr
== i_shdrpp
[elf_onesymtab (abfd
)]
6153 || (elf_symtab_shndx_list (abfd
) != NULL
6154 && hdr
== i_shdrpp
[elf_symtab_shndx_list (abfd
)->ndx
])
6155 || hdr
== i_shdrpp
[elf_strtab_sec (abfd
)]
6156 || hdr
== i_shdrpp
[elf_shstrtab_sec (abfd
)])
6157 hdr
->sh_offset
= -1;
6159 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
, TRUE
);
6161 elf_next_file_pos (abfd
) = off
;
6163 /* Now that we have set the section file positions, we can set up
6164 the file positions for the non PT_LOAD segments. */
6165 phdrs
= elf_tdata (abfd
)->phdr
;
6166 for (m
= elf_seg_map (abfd
), p
= phdrs
; m
!= NULL
; m
= m
->next
, p
++)
6168 if (p
->p_type
== PT_GNU_RELRO
)
6170 bfd_vma start
, end
; /* Bytes. */
6173 if (link_info
!= NULL
)
6175 /* During linking the range of the RELRO segment is passed
6176 in link_info. Note that there may be padding between
6177 relro_start and the first RELRO section. */
6178 start
= link_info
->relro_start
;
6179 end
= link_info
->relro_end
;
6181 else if (m
->count
!= 0)
6183 if (!m
->p_size_valid
)
6185 start
= m
->sections
[0]->vma
;
6186 end
= start
+ m
->p_size
/ opb
;
6197 struct elf_segment_map
*lm
;
6198 const Elf_Internal_Phdr
*lp
;
6201 /* Find a LOAD segment containing a section in the RELRO
6203 for (lm
= elf_seg_map (abfd
), lp
= phdrs
;
6205 lm
= lm
->next
, lp
++)
6207 if (lp
->p_type
== PT_LOAD
6209 && (lm
->sections
[lm
->count
- 1]->vma
6210 + (!IS_TBSS (lm
->sections
[lm
->count
- 1])
6211 ? lm
->sections
[lm
->count
- 1]->size
/ opb
6213 && lm
->sections
[0]->vma
< end
)
6219 /* Find the section starting the RELRO segment. */
6220 for (i
= 0; i
< lm
->count
; i
++)
6222 asection
*s
= lm
->sections
[i
];
6231 p
->p_vaddr
= lm
->sections
[i
]->vma
* opb
;
6232 p
->p_paddr
= lm
->sections
[i
]->lma
* opb
;
6233 p
->p_offset
= lm
->sections
[i
]->filepos
;
6234 p
->p_memsz
= end
* opb
- p
->p_vaddr
;
6235 p
->p_filesz
= p
->p_memsz
;
6237 /* The RELRO segment typically ends a few bytes
6238 into .got.plt but other layouts are possible.
6239 In cases where the end does not match any
6240 loaded section (for instance is in file
6241 padding), trim p_filesz back to correspond to
6242 the end of loaded section contents. */
6243 if (p
->p_filesz
> lp
->p_vaddr
+ lp
->p_filesz
- p
->p_vaddr
)
6244 p
->p_filesz
= lp
->p_vaddr
+ lp
->p_filesz
- p
->p_vaddr
;
6246 /* Preserve the alignment and flags if they are
6247 valid. The gold linker generates RW/4 for
6248 the PT_GNU_RELRO section. It is better for
6249 objcopy/strip to honor these attributes
6250 otherwise gdb will choke when using separate
6252 if (!m
->p_align_valid
)
6254 if (!m
->p_flags_valid
)
6260 if (link_info
!= NULL
)
6263 memset (p
, 0, sizeof *p
);
6265 else if (p
->p_type
== PT_GNU_STACK
)
6267 if (m
->p_size_valid
)
6268 p
->p_memsz
= m
->p_size
;
6270 else if (m
->count
!= 0)
6274 if (p
->p_type
!= PT_LOAD
6275 && (p
->p_type
!= PT_NOTE
6276 || bfd_get_format (abfd
) != bfd_core
))
6278 /* A user specified segment layout may include a PHDR
6279 segment that overlaps with a LOAD segment... */
6280 if (p
->p_type
== PT_PHDR
)
6286 if (m
->includes_filehdr
|| m
->includes_phdrs
)
6288 /* PR 17512: file: 2195325e. */
6290 (_("%pB: error: non-load segment %d includes file header "
6291 "and/or program header"),
6292 abfd
, (int) (p
- phdrs
));
6297 p
->p_offset
= m
->sections
[0]->filepos
;
6298 for (i
= m
->count
; i
-- != 0;)
6300 asection
*sect
= m
->sections
[i
];
6301 Elf_Internal_Shdr
*hdr
= &elf_section_data (sect
)->this_hdr
;
6302 if (hdr
->sh_type
!= SHT_NOBITS
)
6304 p
->p_filesz
= (sect
->filepos
- m
->sections
[0]->filepos
6316 static elf_section_list
*
6317 find_section_in_list (unsigned int i
, elf_section_list
* list
)
6319 for (;list
!= NULL
; list
= list
->next
)
6325 /* Work out the file positions of all the sections. This is called by
6326 _bfd_elf_compute_section_file_positions. All the section sizes and
6327 VMAs must be known before this is called.
6329 Reloc sections come in two flavours: Those processed specially as
6330 "side-channel" data attached to a section to which they apply, and those that
6331 bfd doesn't process as relocations. The latter sort are stored in a normal
6332 bfd section by bfd_section_from_shdr. We don't consider the former sort
6333 here, unless they form part of the loadable image. Reloc sections not
6334 assigned here (and compressed debugging sections and CTF sections which
6335 nothing else in the file can rely upon) will be handled later by
6336 assign_file_positions_for_relocs.
6338 We also don't set the positions of the .symtab and .strtab here. */
6341 assign_file_positions_except_relocs (bfd
*abfd
,
6342 struct bfd_link_info
*link_info
)
6344 struct elf_obj_tdata
*tdata
= elf_tdata (abfd
);
6345 Elf_Internal_Ehdr
*i_ehdrp
= elf_elfheader (abfd
);
6346 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
6349 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) == 0
6350 && bfd_get_format (abfd
) != bfd_core
)
6352 Elf_Internal_Shdr
** const i_shdrpp
= elf_elfsections (abfd
);
6353 unsigned int num_sec
= elf_numsections (abfd
);
6354 Elf_Internal_Shdr
**hdrpp
;
6358 /* Start after the ELF header. */
6359 off
= i_ehdrp
->e_ehsize
;
6361 /* We are not creating an executable, which means that we are
6362 not creating a program header, and that the actual order of
6363 the sections in the file is unimportant. */
6364 for (i
= 1, hdrpp
= i_shdrpp
+ 1; i
< num_sec
; i
++, hdrpp
++)
6366 Elf_Internal_Shdr
*hdr
;
6369 if (((hdr
->sh_type
== SHT_REL
|| hdr
->sh_type
== SHT_RELA
)
6370 && hdr
->bfd_section
== NULL
)
6371 /* Do not assign offsets for these sections yet: we don't know
6373 || (hdr
->bfd_section
!= NULL
6374 && (hdr
->bfd_section
->flags
& SEC_ELF_COMPRESS
6375 || (bfd_section_is_ctf (hdr
->bfd_section
)
6376 && abfd
->is_linker_output
)))
6377 || i
== elf_onesymtab (abfd
)
6378 || (elf_symtab_shndx_list (abfd
) != NULL
6379 && hdr
== i_shdrpp
[elf_symtab_shndx_list (abfd
)->ndx
])
6380 || i
== elf_strtab_sec (abfd
)
6381 || i
== elf_shstrtab_sec (abfd
))
6383 hdr
->sh_offset
= -1;
6386 off
= _bfd_elf_assign_file_position_for_section (hdr
, off
, TRUE
);
6389 elf_next_file_pos (abfd
) = off
;
6390 elf_program_header_size (abfd
) = 0;
6394 /* Assign file positions for the loaded sections based on the
6395 assignment of sections to segments. */
6396 if (!assign_file_positions_for_load_sections (abfd
, link_info
))
6399 /* And for non-load sections. */
6400 if (!assign_file_positions_for_non_load_sections (abfd
, link_info
))
6404 if (!(*bed
->elf_backend_modify_headers
) (abfd
, link_info
))
6407 /* Write out the program headers. */
6408 alloc
= i_ehdrp
->e_phnum
;
6411 if (bfd_seek (abfd
, i_ehdrp
->e_phoff
, SEEK_SET
) != 0
6412 || bed
->s
->write_out_phdrs (abfd
, tdata
->phdr
, alloc
) != 0)
6420 _bfd_elf_init_file_header (bfd
*abfd
,
6421 struct bfd_link_info
*info ATTRIBUTE_UNUSED
)
6423 Elf_Internal_Ehdr
*i_ehdrp
; /* Elf file header, internal form. */
6424 struct elf_strtab_hash
*shstrtab
;
6425 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
6427 i_ehdrp
= elf_elfheader (abfd
);
6429 shstrtab
= _bfd_elf_strtab_init ();
6430 if (shstrtab
== NULL
)
6433 elf_shstrtab (abfd
) = shstrtab
;
6435 i_ehdrp
->e_ident
[EI_MAG0
] = ELFMAG0
;
6436 i_ehdrp
->e_ident
[EI_MAG1
] = ELFMAG1
;
6437 i_ehdrp
->e_ident
[EI_MAG2
] = ELFMAG2
;
6438 i_ehdrp
->e_ident
[EI_MAG3
] = ELFMAG3
;
6440 i_ehdrp
->e_ident
[EI_CLASS
] = bed
->s
->elfclass
;
6441 i_ehdrp
->e_ident
[EI_DATA
] =
6442 bfd_big_endian (abfd
) ? ELFDATA2MSB
: ELFDATA2LSB
;
6443 i_ehdrp
->e_ident
[EI_VERSION
] = bed
->s
->ev_current
;
6445 if ((abfd
->flags
& DYNAMIC
) != 0)
6446 i_ehdrp
->e_type
= ET_DYN
;
6447 else if ((abfd
->flags
& EXEC_P
) != 0)
6448 i_ehdrp
->e_type
= ET_EXEC
;
6449 else if (bfd_get_format (abfd
) == bfd_core
)
6450 i_ehdrp
->e_type
= ET_CORE
;
6452 i_ehdrp
->e_type
= ET_REL
;
6454 switch (bfd_get_arch (abfd
))
6456 case bfd_arch_unknown
:
6457 i_ehdrp
->e_machine
= EM_NONE
;
6460 /* There used to be a long list of cases here, each one setting
6461 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6462 in the corresponding bfd definition. To avoid duplication,
6463 the switch was removed. Machines that need special handling
6464 can generally do it in elf_backend_final_write_processing(),
6465 unless they need the information earlier than the final write.
6466 Such need can generally be supplied by replacing the tests for
6467 e_machine with the conditions used to determine it. */
6469 i_ehdrp
->e_machine
= bed
->elf_machine_code
;
6472 i_ehdrp
->e_version
= bed
->s
->ev_current
;
6473 i_ehdrp
->e_ehsize
= bed
->s
->sizeof_ehdr
;
6475 /* No program header, for now. */
6476 i_ehdrp
->e_phoff
= 0;
6477 i_ehdrp
->e_phentsize
= 0;
6478 i_ehdrp
->e_phnum
= 0;
6480 /* Each bfd section is section header entry. */
6481 i_ehdrp
->e_entry
= bfd_get_start_address (abfd
);
6482 i_ehdrp
->e_shentsize
= bed
->s
->sizeof_shdr
;
6484 elf_tdata (abfd
)->symtab_hdr
.sh_name
=
6485 (unsigned int) _bfd_elf_strtab_add (shstrtab
, ".symtab", FALSE
);
6486 elf_tdata (abfd
)->strtab_hdr
.sh_name
=
6487 (unsigned int) _bfd_elf_strtab_add (shstrtab
, ".strtab", FALSE
);
6488 elf_tdata (abfd
)->shstrtab_hdr
.sh_name
=
6489 (unsigned int) _bfd_elf_strtab_add (shstrtab
, ".shstrtab", FALSE
);
6490 if (elf_tdata (abfd
)->symtab_hdr
.sh_name
== (unsigned int) -1
6491 || elf_tdata (abfd
)->strtab_hdr
.sh_name
== (unsigned int) -1
6492 || elf_tdata (abfd
)->shstrtab_hdr
.sh_name
== (unsigned int) -1)
6498 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6500 FIXME: We used to have code here to sort the PT_LOAD segments into
6501 ascending order, as per the ELF spec. But this breaks some programs,
6502 including the Linux kernel. But really either the spec should be
6503 changed or the programs updated. */
6506 _bfd_elf_modify_headers (bfd
*obfd
, struct bfd_link_info
*link_info
)
6508 if (link_info
!= NULL
&& bfd_link_pie (link_info
))
6510 Elf_Internal_Ehdr
*i_ehdrp
= elf_elfheader (obfd
);
6511 unsigned int num_segments
= i_ehdrp
->e_phnum
;
6512 struct elf_obj_tdata
*tdata
= elf_tdata (obfd
);
6513 Elf_Internal_Phdr
*segment
= tdata
->phdr
;
6514 Elf_Internal_Phdr
*end_segment
= &segment
[num_segments
];
6516 /* Find the lowest p_vaddr in PT_LOAD segments. */
6517 bfd_vma p_vaddr
= (bfd_vma
) -1;
6518 for (; segment
< end_segment
; segment
++)
6519 if (segment
->p_type
== PT_LOAD
&& p_vaddr
> segment
->p_vaddr
)
6520 p_vaddr
= segment
->p_vaddr
;
6522 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6523 segments is non-zero. */
6525 i_ehdrp
->e_type
= ET_EXEC
;
6530 /* Assign file positions for all the reloc sections which are not part
6531 of the loadable file image, and the file position of section headers. */
6534 _bfd_elf_assign_file_positions_for_non_load (bfd
*abfd
)
6537 Elf_Internal_Shdr
**shdrpp
, **end_shdrpp
;
6538 Elf_Internal_Shdr
*shdrp
;
6539 Elf_Internal_Ehdr
*i_ehdrp
;
6540 const struct elf_backend_data
*bed
;
6542 off
= elf_next_file_pos (abfd
);
6544 shdrpp
= elf_elfsections (abfd
);
6545 end_shdrpp
= shdrpp
+ elf_numsections (abfd
);
6546 for (shdrpp
++; shdrpp
< end_shdrpp
; shdrpp
++)
6549 if (shdrp
->sh_offset
== -1)
6551 asection
*sec
= shdrp
->bfd_section
;
6552 bfd_boolean is_rel
= (shdrp
->sh_type
== SHT_REL
6553 || shdrp
->sh_type
== SHT_RELA
);
6554 bfd_boolean is_ctf
= sec
&& bfd_section_is_ctf (sec
);
6557 || (sec
!= NULL
&& (sec
->flags
& SEC_ELF_COMPRESS
)))
6559 if (!is_rel
&& !is_ctf
)
6561 const char *name
= sec
->name
;
6562 struct bfd_elf_section_data
*d
;
6564 /* Compress DWARF debug sections. */
6565 if (!bfd_compress_section (abfd
, sec
,
6569 if (sec
->compress_status
== COMPRESS_SECTION_DONE
6570 && (abfd
->flags
& BFD_COMPRESS_GABI
) == 0)
6572 /* If section is compressed with zlib-gnu, convert
6573 section name from .debug_* to .zdebug_*. */
6575 = convert_debug_to_zdebug (abfd
, name
);
6576 if (new_name
== NULL
)
6580 /* Add section name to section name section. */
6581 if (shdrp
->sh_name
!= (unsigned int) -1)
6584 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd
),
6586 d
= elf_section_data (sec
);
6588 /* Add reloc section name to section name section. */
6590 && !_bfd_elf_set_reloc_sh_name (abfd
,
6595 && !_bfd_elf_set_reloc_sh_name (abfd
,
6600 /* Update section size and contents. */
6601 shdrp
->sh_size
= sec
->size
;
6602 shdrp
->contents
= sec
->contents
;
6603 shdrp
->bfd_section
->contents
= NULL
;
6607 /* Update section size and contents. */
6608 shdrp
->sh_size
= sec
->size
;
6609 shdrp
->contents
= sec
->contents
;
6612 off
= _bfd_elf_assign_file_position_for_section (shdrp
,
6619 /* Place section name section after DWARF debug sections have been
6621 _bfd_elf_strtab_finalize (elf_shstrtab (abfd
));
6622 shdrp
= &elf_tdata (abfd
)->shstrtab_hdr
;
6623 shdrp
->sh_size
= _bfd_elf_strtab_size (elf_shstrtab (abfd
));
6624 off
= _bfd_elf_assign_file_position_for_section (shdrp
, off
, TRUE
);
6626 /* Place the section headers. */
6627 i_ehdrp
= elf_elfheader (abfd
);
6628 bed
= get_elf_backend_data (abfd
);
6629 off
= align_file_position (off
, 1 << bed
->s
->log_file_align
);
6630 i_ehdrp
->e_shoff
= off
;
6631 off
+= i_ehdrp
->e_shnum
* i_ehdrp
->e_shentsize
;
6632 elf_next_file_pos (abfd
) = off
;
6638 _bfd_elf_write_object_contents (bfd
*abfd
)
6640 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
6641 Elf_Internal_Shdr
**i_shdrp
;
6643 unsigned int count
, num_sec
;
6644 struct elf_obj_tdata
*t
;
6646 if (! abfd
->output_has_begun
6647 && ! _bfd_elf_compute_section_file_positions (abfd
, NULL
))
6649 /* Do not rewrite ELF data when the BFD has been opened for update.
6650 abfd->output_has_begun was set to TRUE on opening, so creation of new
6651 sections, and modification of existing section sizes was restricted.
6652 This means the ELF header, program headers and section headers can't have
6654 If the contents of any sections has been modified, then those changes have
6655 already been written to the BFD. */
6656 else if (abfd
->direction
== both_direction
)
6658 BFD_ASSERT (abfd
->output_has_begun
);
6662 i_shdrp
= elf_elfsections (abfd
);
6665 bfd_map_over_sections (abfd
, bed
->s
->write_relocs
, &failed
);
6669 if (!_bfd_elf_assign_file_positions_for_non_load (abfd
))
6672 /* After writing the headers, we need to write the sections too... */
6673 num_sec
= elf_numsections (abfd
);
6674 for (count
= 1; count
< num_sec
; count
++)
6676 i_shdrp
[count
]->sh_name
6677 = _bfd_elf_strtab_offset (elf_shstrtab (abfd
),
6678 i_shdrp
[count
]->sh_name
);
6679 if (bed
->elf_backend_section_processing
)
6680 if (!(*bed
->elf_backend_section_processing
) (abfd
, i_shdrp
[count
]))
6682 if (i_shdrp
[count
]->contents
)
6684 bfd_size_type amt
= i_shdrp
[count
]->sh_size
;
6686 if (bfd_seek (abfd
, i_shdrp
[count
]->sh_offset
, SEEK_SET
) != 0
6687 || bfd_bwrite (i_shdrp
[count
]->contents
, amt
, abfd
) != amt
)
6692 /* Write out the section header names. */
6693 t
= elf_tdata (abfd
);
6694 if (elf_shstrtab (abfd
) != NULL
6695 && (bfd_seek (abfd
, t
->shstrtab_hdr
.sh_offset
, SEEK_SET
) != 0
6696 || !_bfd_elf_strtab_emit (abfd
, elf_shstrtab (abfd
))))
6699 if (!(*bed
->elf_backend_final_write_processing
) (abfd
))
6702 if (!bed
->s
->write_shdrs_and_ehdr (abfd
))
6705 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6706 if (t
->o
->build_id
.after_write_object_contents
!= NULL
)
6707 return (*t
->o
->build_id
.after_write_object_contents
) (abfd
);
6713 _bfd_elf_write_corefile_contents (bfd
*abfd
)
6715 /* Hopefully this can be done just like an object file. */
6716 return _bfd_elf_write_object_contents (abfd
);
6719 /* Given a section, search the header to find them. */
6722 _bfd_elf_section_from_bfd_section (bfd
*abfd
, struct bfd_section
*asect
)
6724 const struct elf_backend_data
*bed
;
6725 unsigned int sec_index
;
6727 if (elf_section_data (asect
) != NULL
6728 && elf_section_data (asect
)->this_idx
!= 0)
6729 return elf_section_data (asect
)->this_idx
;
6731 if (bfd_is_abs_section (asect
))
6732 sec_index
= SHN_ABS
;
6733 else if (bfd_is_com_section (asect
))
6734 sec_index
= SHN_COMMON
;
6735 else if (bfd_is_und_section (asect
))
6736 sec_index
= SHN_UNDEF
;
6738 sec_index
= SHN_BAD
;
6740 bed
= get_elf_backend_data (abfd
);
6741 if (bed
->elf_backend_section_from_bfd_section
)
6743 int retval
= sec_index
;
6745 if ((*bed
->elf_backend_section_from_bfd_section
) (abfd
, asect
, &retval
))
6749 if (sec_index
== SHN_BAD
)
6750 bfd_set_error (bfd_error_nonrepresentable_section
);
6755 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6759 _bfd_elf_symbol_from_bfd_symbol (bfd
*abfd
, asymbol
**asym_ptr_ptr
)
6761 asymbol
*asym_ptr
= *asym_ptr_ptr
;
6763 flagword flags
= asym_ptr
->flags
;
6765 /* When gas creates relocations against local labels, it creates its
6766 own symbol for the section, but does put the symbol into the
6767 symbol chain, so udata is 0. When the linker is generating
6768 relocatable output, this section symbol may be for one of the
6769 input sections rather than the output section. */
6770 if (asym_ptr
->udata
.i
== 0
6771 && (flags
& BSF_SECTION_SYM
)
6772 && asym_ptr
->section
)
6777 sec
= asym_ptr
->section
;
6778 if (sec
->owner
!= abfd
&& sec
->output_section
!= NULL
)
6779 sec
= sec
->output_section
;
6780 if (sec
->owner
== abfd
6781 && (indx
= sec
->index
) < elf_num_section_syms (abfd
)
6782 && elf_section_syms (abfd
)[indx
] != NULL
)
6783 asym_ptr
->udata
.i
= elf_section_syms (abfd
)[indx
]->udata
.i
;
6786 idx
= asym_ptr
->udata
.i
;
6790 /* This case can occur when using --strip-symbol on a symbol
6791 which is used in a relocation entry. */
6793 /* xgettext:c-format */
6794 (_("%pB: symbol `%s' required but not present"),
6795 abfd
, bfd_asymbol_name (asym_ptr
));
6796 bfd_set_error (bfd_error_no_symbols
);
6803 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6804 (long) asym_ptr
, asym_ptr
->name
, idx
, flags
);
6812 /* Rewrite program header information. */
6815 rewrite_elf_program_header (bfd
*ibfd
, bfd
*obfd
)
6817 Elf_Internal_Ehdr
*iehdr
;
6818 struct elf_segment_map
*map
;
6819 struct elf_segment_map
*map_first
;
6820 struct elf_segment_map
**pointer_to_map
;
6821 Elf_Internal_Phdr
*segment
;
6824 unsigned int num_segments
;
6825 bfd_boolean phdr_included
= FALSE
;
6826 bfd_boolean p_paddr_valid
;
6827 bfd_vma maxpagesize
;
6828 struct elf_segment_map
*phdr_adjust_seg
= NULL
;
6829 unsigned int phdr_adjust_num
= 0;
6830 const struct elf_backend_data
*bed
;
6831 unsigned int opb
= bfd_octets_per_byte (ibfd
, NULL
);
6833 bed
= get_elf_backend_data (ibfd
);
6834 iehdr
= elf_elfheader (ibfd
);
6837 pointer_to_map
= &map_first
;
6839 num_segments
= elf_elfheader (ibfd
)->e_phnum
;
6840 maxpagesize
= get_elf_backend_data (obfd
)->maxpagesize
;
6842 /* Returns the end address of the segment + 1. */
6843 #define SEGMENT_END(segment, start) \
6844 (start + (segment->p_memsz > segment->p_filesz \
6845 ? segment->p_memsz : segment->p_filesz))
6847 #define SECTION_SIZE(section, segment) \
6848 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6849 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6850 ? section->size : 0)
6852 /* Returns TRUE if the given section is contained within
6853 the given segment. VMA addresses are compared. */
6854 #define IS_CONTAINED_BY_VMA(section, segment, opb) \
6855 (section->vma * (opb) >= segment->p_vaddr \
6856 && (section->vma * (opb) + SECTION_SIZE (section, segment) \
6857 <= (SEGMENT_END (segment, segment->p_vaddr))))
6859 /* Returns TRUE if the given section is contained within
6860 the given segment. LMA addresses are compared. */
6861 #define IS_CONTAINED_BY_LMA(section, segment, base, opb) \
6862 (section->lma * (opb) >= base \
6863 && (section->lma + SECTION_SIZE (section, segment) / (opb) >= section->lma) \
6864 && (section->lma * (opb) + SECTION_SIZE (section, segment) \
6865 <= SEGMENT_END (segment, base)))
6867 /* Handle PT_NOTE segment. */
6868 #define IS_NOTE(p, s) \
6869 (p->p_type == PT_NOTE \
6870 && elf_section_type (s) == SHT_NOTE \
6871 && (bfd_vma) s->filepos >= p->p_offset \
6872 && ((bfd_vma) s->filepos + s->size \
6873 <= p->p_offset + p->p_filesz))
6875 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6877 #define IS_COREFILE_NOTE(p, s) \
6879 && bfd_get_format (ibfd) == bfd_core \
6883 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6884 linker, which generates a PT_INTERP section with p_vaddr and
6885 p_memsz set to 0. */
6886 #define IS_SOLARIS_PT_INTERP(p, s) \
6888 && p->p_paddr == 0 \
6889 && p->p_memsz == 0 \
6890 && p->p_filesz > 0 \
6891 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6893 && (bfd_vma) s->filepos >= p->p_offset \
6894 && ((bfd_vma) s->filepos + s->size \
6895 <= p->p_offset + p->p_filesz))
6897 /* Decide if the given section should be included in the given segment.
6898 A section will be included if:
6899 1. It is within the address space of the segment -- we use the LMA
6900 if that is set for the segment and the VMA otherwise,
6901 2. It is an allocated section or a NOTE section in a PT_NOTE
6903 3. There is an output section associated with it,
6904 4. The section has not already been allocated to a previous segment.
6905 5. PT_GNU_STACK segments do not include any sections.
6906 6. PT_TLS segment includes only SHF_TLS sections.
6907 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6908 8. PT_DYNAMIC should not contain empty sections at the beginning
6909 (with the possible exception of .dynamic). */
6910 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6911 ((((segment->p_paddr \
6912 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr, opb) \
6913 : IS_CONTAINED_BY_VMA (section, segment, opb)) \
6914 && (section->flags & SEC_ALLOC) != 0) \
6915 || IS_NOTE (segment, section)) \
6916 && segment->p_type != PT_GNU_STACK \
6917 && (segment->p_type != PT_TLS \
6918 || (section->flags & SEC_THREAD_LOCAL)) \
6919 && (segment->p_type == PT_LOAD \
6920 || segment->p_type == PT_TLS \
6921 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6922 && (segment->p_type != PT_DYNAMIC \
6923 || SECTION_SIZE (section, segment) > 0 \
6924 || (segment->p_paddr \
6925 ? segment->p_paddr != section->lma * (opb) \
6926 : segment->p_vaddr != section->vma * (opb)) \
6927 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6928 && (segment->p_type != PT_LOAD || !section->segment_mark))
6930 /* If the output section of a section in the input segment is NULL,
6931 it is removed from the corresponding output segment. */
6932 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
6933 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
6934 && section->output_section != NULL)
6936 /* Returns TRUE iff seg1 starts after the end of seg2. */
6937 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6938 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6940 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6941 their VMA address ranges and their LMA address ranges overlap.
6942 It is possible to have overlapping VMA ranges without overlapping LMA
6943 ranges. RedBoot images for example can have both .data and .bss mapped
6944 to the same VMA range, but with the .data section mapped to a different
6946 #define SEGMENT_OVERLAPS(seg1, seg2) \
6947 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6948 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6949 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6950 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6952 /* Initialise the segment mark field. */
6953 for (section
= ibfd
->sections
; section
!= NULL
; section
= section
->next
)
6954 section
->segment_mark
= FALSE
;
6956 /* The Solaris linker creates program headers in which all the
6957 p_paddr fields are zero. When we try to objcopy or strip such a
6958 file, we get confused. Check for this case, and if we find it
6959 don't set the p_paddr_valid fields. */
6960 p_paddr_valid
= FALSE
;
6961 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
6964 if (segment
->p_paddr
!= 0)
6966 p_paddr_valid
= TRUE
;
6970 /* Scan through the segments specified in the program header
6971 of the input BFD. For this first scan we look for overlaps
6972 in the loadable segments. These can be created by weird
6973 parameters to objcopy. Also, fix some solaris weirdness. */
6974 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
6979 Elf_Internal_Phdr
*segment2
;
6981 if (segment
->p_type
== PT_INTERP
)
6982 for (section
= ibfd
->sections
; section
; section
= section
->next
)
6983 if (IS_SOLARIS_PT_INTERP (segment
, section
))
6985 /* Mininal change so that the normal section to segment
6986 assignment code will work. */
6987 segment
->p_vaddr
= section
->vma
* opb
;
6991 if (segment
->p_type
!= PT_LOAD
)
6993 /* Remove PT_GNU_RELRO segment. */
6994 if (segment
->p_type
== PT_GNU_RELRO
)
6995 segment
->p_type
= PT_NULL
;
6999 /* Determine if this segment overlaps any previous segments. */
7000 for (j
= 0, segment2
= elf_tdata (ibfd
)->phdr
; j
< i
; j
++, segment2
++)
7002 bfd_signed_vma extra_length
;
7004 if (segment2
->p_type
!= PT_LOAD
7005 || !SEGMENT_OVERLAPS (segment
, segment2
))
7008 /* Merge the two segments together. */
7009 if (segment2
->p_vaddr
< segment
->p_vaddr
)
7011 /* Extend SEGMENT2 to include SEGMENT and then delete
7013 extra_length
= (SEGMENT_END (segment
, segment
->p_vaddr
)
7014 - SEGMENT_END (segment2
, segment2
->p_vaddr
));
7016 if (extra_length
> 0)
7018 segment2
->p_memsz
+= extra_length
;
7019 segment2
->p_filesz
+= extra_length
;
7022 segment
->p_type
= PT_NULL
;
7024 /* Since we have deleted P we must restart the outer loop. */
7026 segment
= elf_tdata (ibfd
)->phdr
;
7031 /* Extend SEGMENT to include SEGMENT2 and then delete
7033 extra_length
= (SEGMENT_END (segment2
, segment2
->p_vaddr
)
7034 - SEGMENT_END (segment
, segment
->p_vaddr
));
7036 if (extra_length
> 0)
7038 segment
->p_memsz
+= extra_length
;
7039 segment
->p_filesz
+= extra_length
;
7042 segment2
->p_type
= PT_NULL
;
7047 /* The second scan attempts to assign sections to segments. */
7048 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
7052 unsigned int section_count
;
7053 asection
**sections
;
7054 asection
*output_section
;
7056 asection
*matching_lma
;
7057 asection
*suggested_lma
;
7060 asection
*first_section
;
7062 if (segment
->p_type
== PT_NULL
)
7065 first_section
= NULL
;
7066 /* Compute how many sections might be placed into this segment. */
7067 for (section
= ibfd
->sections
, section_count
= 0;
7069 section
= section
->next
)
7071 /* Find the first section in the input segment, which may be
7072 removed from the corresponding output segment. */
7073 if (IS_SECTION_IN_INPUT_SEGMENT (section
, segment
, bed
, opb
))
7075 if (first_section
== NULL
)
7076 first_section
= section
;
7077 if (section
->output_section
!= NULL
)
7082 /* Allocate a segment map big enough to contain
7083 all of the sections we have selected. */
7084 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
7085 amt
+= section_count
* sizeof (asection
*);
7086 map
= (struct elf_segment_map
*) bfd_zalloc (obfd
, amt
);
7090 /* Initialise the fields of the segment map. Default to
7091 using the physical address of the segment in the input BFD. */
7093 map
->p_type
= segment
->p_type
;
7094 map
->p_flags
= segment
->p_flags
;
7095 map
->p_flags_valid
= 1;
7097 /* If the first section in the input segment is removed, there is
7098 no need to preserve segment physical address in the corresponding
7100 if (!first_section
|| first_section
->output_section
!= NULL
)
7102 map
->p_paddr
= segment
->p_paddr
;
7103 map
->p_paddr_valid
= p_paddr_valid
;
7106 /* Determine if this segment contains the ELF file header
7107 and if it contains the program headers themselves. */
7108 map
->includes_filehdr
= (segment
->p_offset
== 0
7109 && segment
->p_filesz
>= iehdr
->e_ehsize
);
7110 map
->includes_phdrs
= 0;
7112 if (!phdr_included
|| segment
->p_type
!= PT_LOAD
)
7114 map
->includes_phdrs
=
7115 (segment
->p_offset
<= (bfd_vma
) iehdr
->e_phoff
7116 && (segment
->p_offset
+ segment
->p_filesz
7117 >= ((bfd_vma
) iehdr
->e_phoff
7118 + iehdr
->e_phnum
* iehdr
->e_phentsize
)));
7120 if (segment
->p_type
== PT_LOAD
&& map
->includes_phdrs
)
7121 phdr_included
= TRUE
;
7124 if (section_count
== 0)
7126 /* Special segments, such as the PT_PHDR segment, may contain
7127 no sections, but ordinary, loadable segments should contain
7128 something. They are allowed by the ELF spec however, so only
7129 a warning is produced.
7130 There is however the valid use case of embedded systems which
7131 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7132 flash memory with zeros. No warning is shown for that case. */
7133 if (segment
->p_type
== PT_LOAD
7134 && (segment
->p_filesz
> 0 || segment
->p_memsz
== 0))
7135 /* xgettext:c-format */
7137 (_("%pB: warning: empty loadable segment detected"
7138 " at vaddr=%#" PRIx64
", is this intentional?"),
7139 ibfd
, (uint64_t) segment
->p_vaddr
);
7141 map
->p_vaddr_offset
= segment
->p_vaddr
/ opb
;
7143 *pointer_to_map
= map
;
7144 pointer_to_map
= &map
->next
;
7149 /* Now scan the sections in the input BFD again and attempt
7150 to add their corresponding output sections to the segment map.
7151 The problem here is how to handle an output section which has
7152 been moved (ie had its LMA changed). There are four possibilities:
7154 1. None of the sections have been moved.
7155 In this case we can continue to use the segment LMA from the
7158 2. All of the sections have been moved by the same amount.
7159 In this case we can change the segment's LMA to match the LMA
7160 of the first section.
7162 3. Some of the sections have been moved, others have not.
7163 In this case those sections which have not been moved can be
7164 placed in the current segment which will have to have its size,
7165 and possibly its LMA changed, and a new segment or segments will
7166 have to be created to contain the other sections.
7168 4. The sections have been moved, but not by the same amount.
7169 In this case we can change the segment's LMA to match the LMA
7170 of the first section and we will have to create a new segment
7171 or segments to contain the other sections.
7173 In order to save time, we allocate an array to hold the section
7174 pointers that we are interested in. As these sections get assigned
7175 to a segment, they are removed from this array. */
7177 amt
= section_count
* sizeof (asection
*);
7178 sections
= (asection
**) bfd_malloc (amt
);
7179 if (sections
== NULL
)
7182 /* Step One: Scan for segment vs section LMA conflicts.
7183 Also add the sections to the section array allocated above.
7184 Also add the sections to the current segment. In the common
7185 case, where the sections have not been moved, this means that
7186 we have completely filled the segment, and there is nothing
7189 matching_lma
= NULL
;
7190 suggested_lma
= NULL
;
7192 for (section
= first_section
, j
= 0;
7194 section
= section
->next
)
7196 if (INCLUDE_SECTION_IN_SEGMENT (section
, segment
, bed
, opb
))
7198 output_section
= section
->output_section
;
7200 sections
[j
++] = section
;
7202 /* The Solaris native linker always sets p_paddr to 0.
7203 We try to catch that case here, and set it to the
7204 correct value. Note - some backends require that
7205 p_paddr be left as zero. */
7207 && segment
->p_vaddr
!= 0
7208 && !bed
->want_p_paddr_set_to_zero
7210 && output_section
->lma
!= 0
7211 && (align_power (segment
->p_vaddr
7212 + (map
->includes_filehdr
7213 ? iehdr
->e_ehsize
: 0)
7214 + (map
->includes_phdrs
7215 ? iehdr
->e_phnum
* iehdr
->e_phentsize
7217 output_section
->alignment_power
* opb
)
7218 == (output_section
->vma
* opb
)))
7219 map
->p_paddr
= segment
->p_vaddr
;
7221 /* Match up the physical address of the segment with the
7222 LMA address of the output section. */
7223 if (IS_CONTAINED_BY_LMA (output_section
, segment
, map
->p_paddr
,
7225 || IS_COREFILE_NOTE (segment
, section
)
7226 || (bed
->want_p_paddr_set_to_zero
7227 && IS_CONTAINED_BY_VMA (output_section
, segment
, opb
)))
7229 if (matching_lma
== NULL
7230 || output_section
->lma
< matching_lma
->lma
)
7231 matching_lma
= output_section
;
7233 /* We assume that if the section fits within the segment
7234 then it does not overlap any other section within that
7236 map
->sections
[isec
++] = output_section
;
7238 else if (suggested_lma
== NULL
)
7239 suggested_lma
= output_section
;
7241 if (j
== section_count
)
7246 BFD_ASSERT (j
== section_count
);
7248 /* Step Two: Adjust the physical address of the current segment,
7250 if (isec
== section_count
)
7252 /* All of the sections fitted within the segment as currently
7253 specified. This is the default case. Add the segment to
7254 the list of built segments and carry on to process the next
7255 program header in the input BFD. */
7256 map
->count
= section_count
;
7257 *pointer_to_map
= map
;
7258 pointer_to_map
= &map
->next
;
7261 && !bed
->want_p_paddr_set_to_zero
)
7263 bfd_vma hdr_size
= 0;
7264 if (map
->includes_filehdr
)
7265 hdr_size
= iehdr
->e_ehsize
;
7266 if (map
->includes_phdrs
)
7267 hdr_size
+= iehdr
->e_phnum
* iehdr
->e_phentsize
;
7269 /* Account for padding before the first section in the
7271 map
->p_vaddr_offset
= ((map
->p_paddr
+ hdr_size
) / opb
7272 - matching_lma
->lma
);
7280 /* Change the current segment's physical address to match
7281 the LMA of the first section that fitted, or if no
7282 section fitted, the first section. */
7283 if (matching_lma
== NULL
)
7284 matching_lma
= suggested_lma
;
7286 map
->p_paddr
= matching_lma
->lma
* opb
;
7288 /* Offset the segment physical address from the lma
7289 to allow for space taken up by elf headers. */
7290 if (map
->includes_phdrs
)
7292 map
->p_paddr
-= iehdr
->e_phnum
* iehdr
->e_phentsize
;
7294 /* iehdr->e_phnum is just an estimate of the number
7295 of program headers that we will need. Make a note
7296 here of the number we used and the segment we chose
7297 to hold these headers, so that we can adjust the
7298 offset when we know the correct value. */
7299 phdr_adjust_num
= iehdr
->e_phnum
;
7300 phdr_adjust_seg
= map
;
7303 if (map
->includes_filehdr
)
7305 bfd_vma align
= (bfd_vma
) 1 << matching_lma
->alignment_power
;
7306 map
->p_paddr
-= iehdr
->e_ehsize
;
7307 /* We've subtracted off the size of headers from the
7308 first section lma, but there may have been some
7309 alignment padding before that section too. Try to
7310 account for that by adjusting the segment lma down to
7311 the same alignment. */
7312 if (segment
->p_align
!= 0 && segment
->p_align
< align
)
7313 align
= segment
->p_align
;
7314 map
->p_paddr
&= -(align
* opb
);
7318 /* Step Three: Loop over the sections again, this time assigning
7319 those that fit to the current segment and removing them from the
7320 sections array; but making sure not to leave large gaps. Once all
7321 possible sections have been assigned to the current segment it is
7322 added to the list of built segments and if sections still remain
7323 to be assigned, a new segment is constructed before repeating
7329 suggested_lma
= NULL
;
7331 /* Fill the current segment with sections that fit. */
7332 for (j
= 0; j
< section_count
; j
++)
7334 section
= sections
[j
];
7336 if (section
== NULL
)
7339 output_section
= section
->output_section
;
7341 BFD_ASSERT (output_section
!= NULL
);
7343 if (IS_CONTAINED_BY_LMA (output_section
, segment
, map
->p_paddr
,
7345 || IS_COREFILE_NOTE (segment
, section
))
7347 if (map
->count
== 0)
7349 /* If the first section in a segment does not start at
7350 the beginning of the segment, then something is
7352 if (align_power (map
->p_paddr
7353 + (map
->includes_filehdr
7354 ? iehdr
->e_ehsize
: 0)
7355 + (map
->includes_phdrs
7356 ? iehdr
->e_phnum
* iehdr
->e_phentsize
7358 output_section
->alignment_power
* opb
)
7359 != output_section
->lma
* opb
)
7366 prev_sec
= map
->sections
[map
->count
- 1];
7368 /* If the gap between the end of the previous section
7369 and the start of this section is more than
7370 maxpagesize then we need to start a new segment. */
7371 if ((BFD_ALIGN (prev_sec
->lma
+ prev_sec
->size
,
7373 < BFD_ALIGN (output_section
->lma
, maxpagesize
))
7374 || (prev_sec
->lma
+ prev_sec
->size
7375 > output_section
->lma
))
7377 if (suggested_lma
== NULL
)
7378 suggested_lma
= output_section
;
7384 map
->sections
[map
->count
++] = output_section
;
7387 if (segment
->p_type
== PT_LOAD
)
7388 section
->segment_mark
= TRUE
;
7390 else if (suggested_lma
== NULL
)
7391 suggested_lma
= output_section
;
7394 /* PR 23932. A corrupt input file may contain sections that cannot
7395 be assigned to any segment - because for example they have a
7396 negative size - or segments that do not contain any sections.
7397 But there are also valid reasons why a segment can be empty.
7398 So allow a count of zero. */
7400 /* Add the current segment to the list of built segments. */
7401 *pointer_to_map
= map
;
7402 pointer_to_map
= &map
->next
;
7404 if (isec
< section_count
)
7406 /* We still have not allocated all of the sections to
7407 segments. Create a new segment here, initialise it
7408 and carry on looping. */
7409 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
7410 amt
+= section_count
* sizeof (asection
*);
7411 map
= (struct elf_segment_map
*) bfd_zalloc (obfd
, amt
);
7418 /* Initialise the fields of the segment map. Set the physical
7419 physical address to the LMA of the first section that has
7420 not yet been assigned. */
7422 map
->p_type
= segment
->p_type
;
7423 map
->p_flags
= segment
->p_flags
;
7424 map
->p_flags_valid
= 1;
7425 map
->p_paddr
= suggested_lma
->lma
* opb
;
7426 map
->p_paddr_valid
= p_paddr_valid
;
7427 map
->includes_filehdr
= 0;
7428 map
->includes_phdrs
= 0;
7433 bfd_set_error (bfd_error_sorry
);
7437 while (isec
< section_count
);
7442 elf_seg_map (obfd
) = map_first
;
7444 /* If we had to estimate the number of program headers that were
7445 going to be needed, then check our estimate now and adjust
7446 the offset if necessary. */
7447 if (phdr_adjust_seg
!= NULL
)
7451 for (count
= 0, map
= map_first
; map
!= NULL
; map
= map
->next
)
7454 if (count
> phdr_adjust_num
)
7455 phdr_adjust_seg
->p_paddr
7456 -= (count
- phdr_adjust_num
) * iehdr
->e_phentsize
;
7458 for (map
= map_first
; map
!= NULL
; map
= map
->next
)
7459 if (map
->p_type
== PT_PHDR
)
7462 = phdr_adjust_seg
->includes_filehdr
? iehdr
->e_ehsize
: 0;
7463 map
->p_paddr
= phdr_adjust_seg
->p_paddr
+ adjust
;
7470 #undef IS_CONTAINED_BY_VMA
7471 #undef IS_CONTAINED_BY_LMA
7473 #undef IS_COREFILE_NOTE
7474 #undef IS_SOLARIS_PT_INTERP
7475 #undef IS_SECTION_IN_INPUT_SEGMENT
7476 #undef INCLUDE_SECTION_IN_SEGMENT
7477 #undef SEGMENT_AFTER_SEGMENT
7478 #undef SEGMENT_OVERLAPS
7482 /* Copy ELF program header information. */
7485 copy_elf_program_header (bfd
*ibfd
, bfd
*obfd
)
7487 Elf_Internal_Ehdr
*iehdr
;
7488 struct elf_segment_map
*map
;
7489 struct elf_segment_map
*map_first
;
7490 struct elf_segment_map
**pointer_to_map
;
7491 Elf_Internal_Phdr
*segment
;
7493 unsigned int num_segments
;
7494 bfd_boolean phdr_included
= FALSE
;
7495 bfd_boolean p_paddr_valid
;
7496 unsigned int opb
= bfd_octets_per_byte (ibfd
, NULL
);
7498 iehdr
= elf_elfheader (ibfd
);
7501 pointer_to_map
= &map_first
;
7503 /* If all the segment p_paddr fields are zero, don't set
7504 map->p_paddr_valid. */
7505 p_paddr_valid
= FALSE
;
7506 num_segments
= elf_elfheader (ibfd
)->e_phnum
;
7507 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
7510 if (segment
->p_paddr
!= 0)
7512 p_paddr_valid
= TRUE
;
7516 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
7521 unsigned int section_count
;
7523 Elf_Internal_Shdr
*this_hdr
;
7524 asection
*first_section
= NULL
;
7525 asection
*lowest_section
;
7527 /* Compute how many sections are in this segment. */
7528 for (section
= ibfd
->sections
, section_count
= 0;
7530 section
= section
->next
)
7532 this_hdr
= &(elf_section_data(section
)->this_hdr
);
7533 if (ELF_SECTION_IN_SEGMENT (this_hdr
, segment
))
7535 if (first_section
== NULL
)
7536 first_section
= section
;
7541 /* Allocate a segment map big enough to contain
7542 all of the sections we have selected. */
7543 amt
= sizeof (struct elf_segment_map
) - sizeof (asection
*);
7544 amt
+= section_count
* sizeof (asection
*);
7545 map
= (struct elf_segment_map
*) bfd_zalloc (obfd
, amt
);
7549 /* Initialize the fields of the output segment map with the
7552 map
->p_type
= segment
->p_type
;
7553 map
->p_flags
= segment
->p_flags
;
7554 map
->p_flags_valid
= 1;
7555 map
->p_paddr
= segment
->p_paddr
;
7556 map
->p_paddr_valid
= p_paddr_valid
;
7557 map
->p_align
= segment
->p_align
;
7558 map
->p_align_valid
= 1;
7559 map
->p_vaddr_offset
= 0;
7561 if (map
->p_type
== PT_GNU_RELRO
7562 || map
->p_type
== PT_GNU_STACK
)
7564 /* The PT_GNU_RELRO segment may contain the first a few
7565 bytes in the .got.plt section even if the whole .got.plt
7566 section isn't in the PT_GNU_RELRO segment. We won't
7567 change the size of the PT_GNU_RELRO segment.
7568 Similarly, PT_GNU_STACK size is significant on uclinux
7570 map
->p_size
= segment
->p_memsz
;
7571 map
->p_size_valid
= 1;
7574 /* Determine if this segment contains the ELF file header
7575 and if it contains the program headers themselves. */
7576 map
->includes_filehdr
= (segment
->p_offset
== 0
7577 && segment
->p_filesz
>= iehdr
->e_ehsize
);
7579 map
->includes_phdrs
= 0;
7580 if (! phdr_included
|| segment
->p_type
!= PT_LOAD
)
7582 map
->includes_phdrs
=
7583 (segment
->p_offset
<= (bfd_vma
) iehdr
->e_phoff
7584 && (segment
->p_offset
+ segment
->p_filesz
7585 >= ((bfd_vma
) iehdr
->e_phoff
7586 + iehdr
->e_phnum
* iehdr
->e_phentsize
)));
7588 if (segment
->p_type
== PT_LOAD
&& map
->includes_phdrs
)
7589 phdr_included
= TRUE
;
7592 lowest_section
= NULL
;
7593 if (section_count
!= 0)
7595 unsigned int isec
= 0;
7597 for (section
= first_section
;
7599 section
= section
->next
)
7601 this_hdr
= &(elf_section_data(section
)->this_hdr
);
7602 if (ELF_SECTION_IN_SEGMENT (this_hdr
, segment
))
7604 map
->sections
[isec
++] = section
->output_section
;
7605 if ((section
->flags
& SEC_ALLOC
) != 0)
7609 if (lowest_section
== NULL
7610 || section
->lma
< lowest_section
->lma
)
7611 lowest_section
= section
;
7613 /* Section lmas are set up from PT_LOAD header
7614 p_paddr in _bfd_elf_make_section_from_shdr.
7615 If this header has a p_paddr that disagrees
7616 with the section lma, flag the p_paddr as
7618 if ((section
->flags
& SEC_LOAD
) != 0)
7619 seg_off
= this_hdr
->sh_offset
- segment
->p_offset
;
7621 seg_off
= this_hdr
->sh_addr
- segment
->p_vaddr
;
7622 if (section
->lma
* opb
- segment
->p_paddr
!= seg_off
)
7623 map
->p_paddr_valid
= FALSE
;
7625 if (isec
== section_count
)
7631 if (section_count
== 0)
7632 map
->p_vaddr_offset
= segment
->p_vaddr
/ opb
;
7633 else if (map
->p_paddr_valid
)
7635 /* Account for padding before the first section in the segment. */
7636 bfd_vma hdr_size
= 0;
7637 if (map
->includes_filehdr
)
7638 hdr_size
= iehdr
->e_ehsize
;
7639 if (map
->includes_phdrs
)
7640 hdr_size
+= iehdr
->e_phnum
* iehdr
->e_phentsize
;
7642 map
->p_vaddr_offset
= ((map
->p_paddr
+ hdr_size
) / opb
7643 - (lowest_section
? lowest_section
->lma
: 0));
7646 map
->count
= section_count
;
7647 *pointer_to_map
= map
;
7648 pointer_to_map
= &map
->next
;
7651 elf_seg_map (obfd
) = map_first
;
7655 /* Copy private BFD data. This copies or rewrites ELF program header
7659 copy_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
7661 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
7662 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
7665 if (elf_tdata (ibfd
)->phdr
== NULL
)
7668 if (ibfd
->xvec
== obfd
->xvec
)
7670 /* Check to see if any sections in the input BFD
7671 covered by ELF program header have changed. */
7672 Elf_Internal_Phdr
*segment
;
7673 asection
*section
, *osec
;
7674 unsigned int i
, num_segments
;
7675 Elf_Internal_Shdr
*this_hdr
;
7676 const struct elf_backend_data
*bed
;
7678 bed
= get_elf_backend_data (ibfd
);
7680 /* Regenerate the segment map if p_paddr is set to 0. */
7681 if (bed
->want_p_paddr_set_to_zero
)
7684 /* Initialize the segment mark field. */
7685 for (section
= obfd
->sections
; section
!= NULL
;
7686 section
= section
->next
)
7687 section
->segment_mark
= FALSE
;
7689 num_segments
= elf_elfheader (ibfd
)->e_phnum
;
7690 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
7694 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7695 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7696 which severly confuses things, so always regenerate the segment
7697 map in this case. */
7698 if (segment
->p_paddr
== 0
7699 && segment
->p_memsz
== 0
7700 && (segment
->p_type
== PT_INTERP
|| segment
->p_type
== PT_DYNAMIC
))
7703 for (section
= ibfd
->sections
;
7704 section
!= NULL
; section
= section
->next
)
7706 /* We mark the output section so that we know it comes
7707 from the input BFD. */
7708 osec
= section
->output_section
;
7710 osec
->segment_mark
= TRUE
;
7712 /* Check if this section is covered by the segment. */
7713 this_hdr
= &(elf_section_data(section
)->this_hdr
);
7714 if (ELF_SECTION_IN_SEGMENT (this_hdr
, segment
))
7716 /* FIXME: Check if its output section is changed or
7717 removed. What else do we need to check? */
7719 || section
->flags
!= osec
->flags
7720 || section
->lma
!= osec
->lma
7721 || section
->vma
!= osec
->vma
7722 || section
->size
!= osec
->size
7723 || section
->rawsize
!= osec
->rawsize
7724 || section
->alignment_power
!= osec
->alignment_power
)
7730 /* Check to see if any output section do not come from the
7732 for (section
= obfd
->sections
; section
!= NULL
;
7733 section
= section
->next
)
7735 if (!section
->segment_mark
)
7738 section
->segment_mark
= FALSE
;
7741 return copy_elf_program_header (ibfd
, obfd
);
7745 if (ibfd
->xvec
== obfd
->xvec
)
7747 /* When rewriting program header, set the output maxpagesize to
7748 the maximum alignment of input PT_LOAD segments. */
7749 Elf_Internal_Phdr
*segment
;
7751 unsigned int num_segments
= elf_elfheader (ibfd
)->e_phnum
;
7752 bfd_vma maxpagesize
= 0;
7754 for (i
= 0, segment
= elf_tdata (ibfd
)->phdr
;
7757 if (segment
->p_type
== PT_LOAD
7758 && maxpagesize
< segment
->p_align
)
7760 /* PR 17512: file: f17299af. */
7761 if (segment
->p_align
> (bfd_vma
) 1 << ((sizeof (bfd_vma
) * 8) - 2))
7762 /* xgettext:c-format */
7763 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7764 PRIx64
" is too large"),
7765 ibfd
, (uint64_t) segment
->p_align
);
7767 maxpagesize
= segment
->p_align
;
7770 if (maxpagesize
!= get_elf_backend_data (obfd
)->maxpagesize
)
7771 bfd_emul_set_maxpagesize (bfd_get_target (obfd
), maxpagesize
);
7774 return rewrite_elf_program_header (ibfd
, obfd
);
7777 /* Initialize private output section information from input section. */
7780 _bfd_elf_init_private_section_data (bfd
*ibfd
,
7784 struct bfd_link_info
*link_info
)
7787 Elf_Internal_Shdr
*ihdr
, *ohdr
;
7788 bfd_boolean final_link
= (link_info
!= NULL
7789 && !bfd_link_relocatable (link_info
));
7791 if (ibfd
->xvec
->flavour
!= bfd_target_elf_flavour
7792 || obfd
->xvec
->flavour
!= bfd_target_elf_flavour
)
7795 BFD_ASSERT (elf_section_data (osec
) != NULL
);
7797 /* If this is a known ABI section, ELF section type and flags may
7798 have been set up when OSEC was created. For normal sections we
7799 allow the user to override the type and flags other than
7800 SHF_MASKOS and SHF_MASKPROC. */
7801 if (elf_section_type (osec
) == SHT_PROGBITS
7802 || elf_section_type (osec
) == SHT_NOTE
7803 || elf_section_type (osec
) == SHT_NOBITS
)
7804 elf_section_type (osec
) = SHT_NULL
;
7805 /* For objcopy and relocatable link, copy the ELF section type from
7806 the input file if the BFD section flags are the same. (If they
7807 are different the user may be doing something like
7808 "objcopy --set-section-flags .text=alloc,data".) For a final
7809 link allow some flags that the linker clears to differ. */
7810 if (elf_section_type (osec
) == SHT_NULL
7811 && (osec
->flags
== isec
->flags
7813 && ((osec
->flags
^ isec
->flags
)
7814 & ~(SEC_LINK_ONCE
| SEC_LINK_DUPLICATES
| SEC_RELOC
)) == 0)))
7815 elf_section_type (osec
) = elf_section_type (isec
);
7817 /* FIXME: Is this correct for all OS/PROC specific flags? */
7818 elf_section_flags (osec
) = (elf_section_flags (isec
)
7819 & (SHF_MASKOS
| SHF_MASKPROC
));
7821 /* Copy sh_info from input for mbind section. */
7822 if ((elf_tdata (ibfd
)->has_gnu_osabi
& elf_gnu_osabi_mbind
) != 0
7823 && elf_section_flags (isec
) & SHF_GNU_MBIND
)
7824 elf_section_data (osec
)->this_hdr
.sh_info
7825 = elf_section_data (isec
)->this_hdr
.sh_info
;
7827 /* Set things up for objcopy and relocatable link. The output
7828 SHT_GROUP section will have its elf_next_in_group pointing back
7829 to the input group members. Ignore linker created group section.
7830 See elfNN_ia64_object_p in elfxx-ia64.c. */
7831 if ((link_info
== NULL
7832 || !link_info
->resolve_section_groups
)
7833 && (elf_sec_group (isec
) == NULL
7834 || (elf_sec_group (isec
)->flags
& SEC_LINKER_CREATED
) == 0))
7836 if (elf_section_flags (isec
) & SHF_GROUP
)
7837 elf_section_flags (osec
) |= SHF_GROUP
;
7838 elf_next_in_group (osec
) = elf_next_in_group (isec
);
7839 elf_section_data (osec
)->group
= elf_section_data (isec
)->group
;
7842 /* If not decompress, preserve SHF_COMPRESSED. */
7843 if (!final_link
&& (ibfd
->flags
& BFD_DECOMPRESS
) == 0)
7844 elf_section_flags (osec
) |= (elf_section_flags (isec
)
7847 ihdr
= &elf_section_data (isec
)->this_hdr
;
7849 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7850 don't use the output section of the linked-to section since it
7851 may be NULL at this point. */
7852 if ((ihdr
->sh_flags
& SHF_LINK_ORDER
) != 0)
7854 ohdr
= &elf_section_data (osec
)->this_hdr
;
7855 ohdr
->sh_flags
|= SHF_LINK_ORDER
;
7856 elf_linked_to_section (osec
) = elf_linked_to_section (isec
);
7859 osec
->use_rela_p
= isec
->use_rela_p
;
7864 /* Copy private section information. This copies over the entsize
7865 field, and sometimes the info field. */
7868 _bfd_elf_copy_private_section_data (bfd
*ibfd
,
7873 Elf_Internal_Shdr
*ihdr
, *ohdr
;
7875 if (ibfd
->xvec
->flavour
!= bfd_target_elf_flavour
7876 || obfd
->xvec
->flavour
!= bfd_target_elf_flavour
)
7879 ihdr
= &elf_section_data (isec
)->this_hdr
;
7880 ohdr
= &elf_section_data (osec
)->this_hdr
;
7882 ohdr
->sh_entsize
= ihdr
->sh_entsize
;
7884 if (ihdr
->sh_type
== SHT_SYMTAB
7885 || ihdr
->sh_type
== SHT_DYNSYM
7886 || ihdr
->sh_type
== SHT_GNU_verneed
7887 || ihdr
->sh_type
== SHT_GNU_verdef
)
7888 ohdr
->sh_info
= ihdr
->sh_info
;
7890 return _bfd_elf_init_private_section_data (ibfd
, isec
, obfd
, osec
,
7894 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7895 necessary if we are removing either the SHT_GROUP section or any of
7896 the group member sections. DISCARDED is the value that a section's
7897 output_section has if the section will be discarded, NULL when this
7898 function is called from objcopy, bfd_abs_section_ptr when called
7902 _bfd_elf_fixup_group_sections (bfd
*ibfd
, asection
*discarded
)
7906 for (isec
= ibfd
->sections
; isec
!= NULL
; isec
= isec
->next
)
7907 if (elf_section_type (isec
) == SHT_GROUP
)
7909 asection
*first
= elf_next_in_group (isec
);
7910 asection
*s
= first
;
7911 bfd_size_type removed
= 0;
7915 /* If this member section is being output but the
7916 SHT_GROUP section is not, then clear the group info
7917 set up by _bfd_elf_copy_private_section_data. */
7918 if (s
->output_section
!= discarded
7919 && isec
->output_section
== discarded
)
7921 elf_section_flags (s
->output_section
) &= ~SHF_GROUP
;
7922 elf_group_name (s
->output_section
) = NULL
;
7924 /* Conversely, if the member section is not being output
7925 but the SHT_GROUP section is, then adjust its size. */
7926 else if (s
->output_section
== discarded
7927 && isec
->output_section
!= discarded
)
7929 struct bfd_elf_section_data
*elf_sec
= elf_section_data (s
);
7931 if (elf_sec
->rel
.hdr
!= NULL
7932 && (elf_sec
->rel
.hdr
->sh_flags
& SHF_GROUP
) != 0)
7934 if (elf_sec
->rela
.hdr
!= NULL
7935 && (elf_sec
->rela
.hdr
->sh_flags
& SHF_GROUP
) != 0)
7938 s
= elf_next_in_group (s
);
7944 if (discarded
!= NULL
)
7946 /* If we've been called for ld -r, then we need to
7947 adjust the input section size. */
7948 if (isec
->rawsize
== 0)
7949 isec
->rawsize
= isec
->size
;
7950 isec
->size
= isec
->rawsize
- removed
;
7951 if (isec
->size
<= 4)
7954 isec
->flags
|= SEC_EXCLUDE
;
7959 /* Adjust the output section size when called from
7961 isec
->output_section
->size
-= removed
;
7962 if (isec
->output_section
->size
<= 4)
7964 isec
->output_section
->size
= 0;
7965 isec
->output_section
->flags
|= SEC_EXCLUDE
;
7974 /* Copy private header information. */
7977 _bfd_elf_copy_private_header_data (bfd
*ibfd
, bfd
*obfd
)
7979 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
7980 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
7983 /* Copy over private BFD data if it has not already been copied.
7984 This must be done here, rather than in the copy_private_bfd_data
7985 entry point, because the latter is called after the section
7986 contents have been set, which means that the program headers have
7987 already been worked out. */
7988 if (elf_seg_map (obfd
) == NULL
&& elf_tdata (ibfd
)->phdr
!= NULL
)
7990 if (! copy_private_bfd_data (ibfd
, obfd
))
7994 return _bfd_elf_fixup_group_sections (ibfd
, NULL
);
7997 /* Copy private symbol information. If this symbol is in a section
7998 which we did not map into a BFD section, try to map the section
7999 index correctly. We use special macro definitions for the mapped
8000 section indices; these definitions are interpreted by the
8001 swap_out_syms function. */
8003 #define MAP_ONESYMTAB (SHN_HIOS + 1)
8004 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
8005 #define MAP_STRTAB (SHN_HIOS + 3)
8006 #define MAP_SHSTRTAB (SHN_HIOS + 4)
8007 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
8010 _bfd_elf_copy_private_symbol_data (bfd
*ibfd
,
8015 elf_symbol_type
*isym
, *osym
;
8017 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
8018 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
8021 isym
= elf_symbol_from (ibfd
, isymarg
);
8022 osym
= elf_symbol_from (obfd
, osymarg
);
8025 && isym
->internal_elf_sym
.st_shndx
!= 0
8027 && bfd_is_abs_section (isym
->symbol
.section
))
8031 shndx
= isym
->internal_elf_sym
.st_shndx
;
8032 if (shndx
== elf_onesymtab (ibfd
))
8033 shndx
= MAP_ONESYMTAB
;
8034 else if (shndx
== elf_dynsymtab (ibfd
))
8035 shndx
= MAP_DYNSYMTAB
;
8036 else if (shndx
== elf_strtab_sec (ibfd
))
8038 else if (shndx
== elf_shstrtab_sec (ibfd
))
8039 shndx
= MAP_SHSTRTAB
;
8040 else if (find_section_in_list (shndx
, elf_symtab_shndx_list (ibfd
)))
8041 shndx
= MAP_SYM_SHNDX
;
8042 osym
->internal_elf_sym
.st_shndx
= shndx
;
8048 /* Swap out the symbols. */
8051 swap_out_syms (bfd
*abfd
,
8052 struct elf_strtab_hash
**sttp
,
8055 const struct elf_backend_data
*bed
;
8056 unsigned int symcount
;
8058 struct elf_strtab_hash
*stt
;
8059 Elf_Internal_Shdr
*symtab_hdr
;
8060 Elf_Internal_Shdr
*symtab_shndx_hdr
;
8061 Elf_Internal_Shdr
*symstrtab_hdr
;
8062 struct elf_sym_strtab
*symstrtab
;
8063 bfd_byte
*outbound_syms
;
8064 bfd_byte
*outbound_shndx
;
8065 unsigned long outbound_syms_index
;
8066 unsigned long outbound_shndx_index
;
8068 unsigned int num_locals
;
8070 bfd_boolean name_local_sections
;
8072 if (!elf_map_symbols (abfd
, &num_locals
))
8075 /* Dump out the symtabs. */
8076 stt
= _bfd_elf_strtab_init ();
8080 bed
= get_elf_backend_data (abfd
);
8081 symcount
= bfd_get_symcount (abfd
);
8082 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
8083 symtab_hdr
->sh_type
= SHT_SYMTAB
;
8084 symtab_hdr
->sh_entsize
= bed
->s
->sizeof_sym
;
8085 symtab_hdr
->sh_size
= symtab_hdr
->sh_entsize
* (symcount
+ 1);
8086 symtab_hdr
->sh_info
= num_locals
+ 1;
8087 symtab_hdr
->sh_addralign
= (bfd_vma
) 1 << bed
->s
->log_file_align
;
8089 symstrtab_hdr
= &elf_tdata (abfd
)->strtab_hdr
;
8090 symstrtab_hdr
->sh_type
= SHT_STRTAB
;
8092 /* Allocate buffer to swap out the .strtab section. */
8093 if (_bfd_mul_overflow (symcount
+ 1, sizeof (*symstrtab
), &amt
)
8094 || (symstrtab
= (struct elf_sym_strtab
*) bfd_malloc (amt
)) == NULL
)
8096 bfd_set_error (bfd_error_no_memory
);
8097 _bfd_elf_strtab_free (stt
);
8101 if (_bfd_mul_overflow (symcount
+ 1, bed
->s
->sizeof_sym
, &amt
)
8102 || (outbound_syms
= (bfd_byte
*) bfd_alloc (abfd
, amt
)) == NULL
)
8105 bfd_set_error (bfd_error_no_memory
);
8108 _bfd_elf_strtab_free (stt
);
8111 symtab_hdr
->contents
= outbound_syms
;
8112 outbound_syms_index
= 0;
8114 outbound_shndx
= NULL
;
8115 outbound_shndx_index
= 0;
8117 if (elf_symtab_shndx_list (abfd
))
8119 symtab_shndx_hdr
= & elf_symtab_shndx_list (abfd
)->hdr
;
8120 if (symtab_shndx_hdr
->sh_name
!= 0)
8122 if (_bfd_mul_overflow (symcount
+ 1,
8123 sizeof (Elf_External_Sym_Shndx
), &amt
))
8125 outbound_shndx
= (bfd_byte
*) bfd_zalloc (abfd
, amt
);
8126 if (outbound_shndx
== NULL
)
8129 symtab_shndx_hdr
->contents
= outbound_shndx
;
8130 symtab_shndx_hdr
->sh_type
= SHT_SYMTAB_SHNDX
;
8131 symtab_shndx_hdr
->sh_size
= amt
;
8132 symtab_shndx_hdr
->sh_addralign
= sizeof (Elf_External_Sym_Shndx
);
8133 symtab_shndx_hdr
->sh_entsize
= sizeof (Elf_External_Sym_Shndx
);
8135 /* FIXME: What about any other headers in the list ? */
8138 /* Now generate the data (for "contents"). */
8140 /* Fill in zeroth symbol and swap it out. */
8141 Elf_Internal_Sym sym
;
8147 sym
.st_shndx
= SHN_UNDEF
;
8148 sym
.st_target_internal
= 0;
8149 symstrtab
[0].sym
= sym
;
8150 symstrtab
[0].dest_index
= outbound_syms_index
;
8151 symstrtab
[0].destshndx_index
= outbound_shndx_index
;
8152 outbound_syms_index
++;
8153 if (outbound_shndx
!= NULL
)
8154 outbound_shndx_index
++;
8158 = (bed
->elf_backend_name_local_section_symbols
8159 && bed
->elf_backend_name_local_section_symbols (abfd
));
8161 syms
= bfd_get_outsymbols (abfd
);
8162 for (idx
= 0; idx
< symcount
;)
8164 Elf_Internal_Sym sym
;
8165 bfd_vma value
= syms
[idx
]->value
;
8166 elf_symbol_type
*type_ptr
;
8167 flagword flags
= syms
[idx
]->flags
;
8170 if (!name_local_sections
8171 && (flags
& (BSF_SECTION_SYM
| BSF_GLOBAL
)) == BSF_SECTION_SYM
)
8173 /* Local section symbols have no name. */
8174 sym
.st_name
= (unsigned long) -1;
8178 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8179 to get the final offset for st_name. */
8181 = (unsigned long) _bfd_elf_strtab_add (stt
, syms
[idx
]->name
,
8183 if (sym
.st_name
== (unsigned long) -1)
8187 type_ptr
= elf_symbol_from (abfd
, syms
[idx
]);
8189 if ((flags
& BSF_SECTION_SYM
) == 0
8190 && bfd_is_com_section (syms
[idx
]->section
))
8192 /* ELF common symbols put the alignment into the `value' field,
8193 and the size into the `size' field. This is backwards from
8194 how BFD handles it, so reverse it here. */
8195 sym
.st_size
= value
;
8196 if (type_ptr
== NULL
8197 || type_ptr
->internal_elf_sym
.st_value
== 0)
8198 sym
.st_value
= value
>= 16 ? 16 : (1 << bfd_log2 (value
));
8200 sym
.st_value
= type_ptr
->internal_elf_sym
.st_value
;
8201 sym
.st_shndx
= _bfd_elf_section_from_bfd_section
8202 (abfd
, syms
[idx
]->section
);
8206 asection
*sec
= syms
[idx
]->section
;
8209 if (sec
->output_section
)
8211 value
+= sec
->output_offset
;
8212 sec
= sec
->output_section
;
8215 /* Don't add in the section vma for relocatable output. */
8216 if (! relocatable_p
)
8218 sym
.st_value
= value
;
8219 sym
.st_size
= type_ptr
? type_ptr
->internal_elf_sym
.st_size
: 0;
8221 if (bfd_is_abs_section (sec
)
8223 && type_ptr
->internal_elf_sym
.st_shndx
!= 0)
8225 /* This symbol is in a real ELF section which we did
8226 not create as a BFD section. Undo the mapping done
8227 by copy_private_symbol_data. */
8228 shndx
= type_ptr
->internal_elf_sym
.st_shndx
;
8232 shndx
= elf_onesymtab (abfd
);
8235 shndx
= elf_dynsymtab (abfd
);
8238 shndx
= elf_strtab_sec (abfd
);
8241 shndx
= elf_shstrtab_sec (abfd
);
8244 if (elf_symtab_shndx_list (abfd
))
8245 shndx
= elf_symtab_shndx_list (abfd
)->ndx
;
8252 if (shndx
>= SHN_LOPROC
&& shndx
<= SHN_HIOS
)
8254 if (bed
->symbol_section_index
)
8255 shndx
= bed
->symbol_section_index (abfd
, type_ptr
);
8256 /* Otherwise just leave the index alone. */
8260 if (shndx
> SHN_HIOS
&& shndx
< SHN_HIRESERVE
)
8261 _bfd_error_handler (_("%pB: \
8262 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8271 shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec
);
8273 if (shndx
== SHN_BAD
)
8277 /* Writing this would be a hell of a lot easier if
8278 we had some decent documentation on bfd, and
8279 knew what to expect of the library, and what to
8280 demand of applications. For example, it
8281 appears that `objcopy' might not set the
8282 section of a symbol to be a section that is
8283 actually in the output file. */
8284 sec2
= bfd_get_section_by_name (abfd
, sec
->name
);
8286 shndx
= _bfd_elf_section_from_bfd_section (abfd
, sec2
);
8287 if (shndx
== SHN_BAD
)
8289 /* xgettext:c-format */
8291 (_("unable to find equivalent output section"
8292 " for symbol '%s' from section '%s'"),
8293 syms
[idx
]->name
? syms
[idx
]->name
: "<Local sym>",
8295 bfd_set_error (bfd_error_invalid_operation
);
8301 sym
.st_shndx
= shndx
;
8304 if ((flags
& BSF_THREAD_LOCAL
) != 0)
8306 else if ((flags
& BSF_GNU_INDIRECT_FUNCTION
) != 0)
8307 type
= STT_GNU_IFUNC
;
8308 else if ((flags
& BSF_FUNCTION
) != 0)
8310 else if ((flags
& BSF_OBJECT
) != 0)
8312 else if ((flags
& BSF_RELC
) != 0)
8314 else if ((flags
& BSF_SRELC
) != 0)
8319 if (syms
[idx
]->section
->flags
& SEC_THREAD_LOCAL
)
8322 /* Processor-specific types. */
8323 if (type_ptr
!= NULL
8324 && bed
->elf_backend_get_symbol_type
)
8325 type
= ((*bed
->elf_backend_get_symbol_type
)
8326 (&type_ptr
->internal_elf_sym
, type
));
8328 if (flags
& BSF_SECTION_SYM
)
8330 if (flags
& BSF_GLOBAL
)
8331 sym
.st_info
= ELF_ST_INFO (STB_GLOBAL
, STT_SECTION
);
8333 sym
.st_info
= ELF_ST_INFO (STB_LOCAL
, STT_SECTION
);
8335 else if (bfd_is_com_section (syms
[idx
]->section
))
8337 if (type
!= STT_TLS
)
8339 if ((abfd
->flags
& BFD_CONVERT_ELF_COMMON
))
8340 type
= ((abfd
->flags
& BFD_USE_ELF_STT_COMMON
)
8341 ? STT_COMMON
: STT_OBJECT
);
8343 type
= ((flags
& BSF_ELF_COMMON
) != 0
8344 ? STT_COMMON
: STT_OBJECT
);
8346 sym
.st_info
= ELF_ST_INFO (STB_GLOBAL
, type
);
8348 else if (bfd_is_und_section (syms
[idx
]->section
))
8349 sym
.st_info
= ELF_ST_INFO (((flags
& BSF_WEAK
)
8353 else if (flags
& BSF_FILE
)
8354 sym
.st_info
= ELF_ST_INFO (STB_LOCAL
, STT_FILE
);
8357 int bind
= STB_LOCAL
;
8359 if (flags
& BSF_LOCAL
)
8361 else if (flags
& BSF_GNU_UNIQUE
)
8362 bind
= STB_GNU_UNIQUE
;
8363 else if (flags
& BSF_WEAK
)
8365 else if (flags
& BSF_GLOBAL
)
8368 sym
.st_info
= ELF_ST_INFO (bind
, type
);
8371 if (type_ptr
!= NULL
)
8373 sym
.st_other
= type_ptr
->internal_elf_sym
.st_other
;
8374 sym
.st_target_internal
8375 = type_ptr
->internal_elf_sym
.st_target_internal
;
8380 sym
.st_target_internal
= 0;
8384 symstrtab
[idx
].sym
= sym
;
8385 symstrtab
[idx
].dest_index
= outbound_syms_index
;
8386 symstrtab
[idx
].destshndx_index
= outbound_shndx_index
;
8388 outbound_syms_index
++;
8389 if (outbound_shndx
!= NULL
)
8390 outbound_shndx_index
++;
8393 /* Finalize the .strtab section. */
8394 _bfd_elf_strtab_finalize (stt
);
8396 /* Swap out the .strtab section. */
8397 for (idx
= 0; idx
<= symcount
; idx
++)
8399 struct elf_sym_strtab
*elfsym
= &symstrtab
[idx
];
8400 if (elfsym
->sym
.st_name
== (unsigned long) -1)
8401 elfsym
->sym
.st_name
= 0;
8403 elfsym
->sym
.st_name
= _bfd_elf_strtab_offset (stt
,
8404 elfsym
->sym
.st_name
);
8405 bed
->s
->swap_symbol_out (abfd
, &elfsym
->sym
,
8407 + (elfsym
->dest_index
8408 * bed
->s
->sizeof_sym
)),
8410 + (elfsym
->destshndx_index
8411 * sizeof (Elf_External_Sym_Shndx
))));
8416 symstrtab_hdr
->sh_size
= _bfd_elf_strtab_size (stt
);
8417 symstrtab_hdr
->sh_type
= SHT_STRTAB
;
8418 symstrtab_hdr
->sh_flags
= bed
->elf_strtab_flags
;
8419 symstrtab_hdr
->sh_addr
= 0;
8420 symstrtab_hdr
->sh_entsize
= 0;
8421 symstrtab_hdr
->sh_link
= 0;
8422 symstrtab_hdr
->sh_info
= 0;
8423 symstrtab_hdr
->sh_addralign
= 1;
8428 /* Return the number of bytes required to hold the symtab vector.
8430 Note that we base it on the count plus 1, since we will null terminate
8431 the vector allocated based on this size. However, the ELF symbol table
8432 always has a dummy entry as symbol #0, so it ends up even. */
8435 _bfd_elf_get_symtab_upper_bound (bfd
*abfd
)
8437 bfd_size_type symcount
;
8439 Elf_Internal_Shdr
*hdr
= &elf_tdata (abfd
)->symtab_hdr
;
8441 symcount
= hdr
->sh_size
/ get_elf_backend_data (abfd
)->s
->sizeof_sym
;
8442 if (symcount
>= LONG_MAX
/ sizeof (asymbol
*))
8444 bfd_set_error (bfd_error_file_too_big
);
8447 symtab_size
= (symcount
+ 1) * (sizeof (asymbol
*));
8449 symtab_size
-= sizeof (asymbol
*);
8455 _bfd_elf_get_dynamic_symtab_upper_bound (bfd
*abfd
)
8457 bfd_size_type symcount
;
8459 Elf_Internal_Shdr
*hdr
= &elf_tdata (abfd
)->dynsymtab_hdr
;
8461 if (elf_dynsymtab (abfd
) == 0)
8463 bfd_set_error (bfd_error_invalid_operation
);
8467 symcount
= hdr
->sh_size
/ get_elf_backend_data (abfd
)->s
->sizeof_sym
;
8468 if (symcount
>= LONG_MAX
/ sizeof (asymbol
*))
8470 bfd_set_error (bfd_error_file_too_big
);
8473 symtab_size
= (symcount
+ 1) * (sizeof (asymbol
*));
8475 symtab_size
-= sizeof (asymbol
*);
8481 _bfd_elf_get_reloc_upper_bound (bfd
*abfd ATTRIBUTE_UNUSED
,
8484 #if SIZEOF_LONG == SIZEOF_INT
8485 if (asect
->reloc_count
>= LONG_MAX
/ sizeof (arelent
*))
8487 bfd_set_error (bfd_error_file_too_big
);
8491 return (asect
->reloc_count
+ 1) * sizeof (arelent
*);
8494 /* Canonicalize the relocs. */
8497 _bfd_elf_canonicalize_reloc (bfd
*abfd
,
8504 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
8506 if (! bed
->s
->slurp_reloc_table (abfd
, section
, symbols
, FALSE
))
8509 tblptr
= section
->relocation
;
8510 for (i
= 0; i
< section
->reloc_count
; i
++)
8511 *relptr
++ = tblptr
++;
8515 return section
->reloc_count
;
8519 _bfd_elf_canonicalize_symtab (bfd
*abfd
, asymbol
**allocation
)
8521 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
8522 long symcount
= bed
->s
->slurp_symbol_table (abfd
, allocation
, FALSE
);
8525 abfd
->symcount
= symcount
;
8530 _bfd_elf_canonicalize_dynamic_symtab (bfd
*abfd
,
8531 asymbol
**allocation
)
8533 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
8534 long symcount
= bed
->s
->slurp_symbol_table (abfd
, allocation
, TRUE
);
8537 abfd
->dynsymcount
= symcount
;
8541 /* Return the size required for the dynamic reloc entries. Any loadable
8542 section that was actually installed in the BFD, and has type SHT_REL
8543 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8544 dynamic reloc section. */
8547 _bfd_elf_get_dynamic_reloc_upper_bound (bfd
*abfd
)
8549 bfd_size_type count
;
8552 if (elf_dynsymtab (abfd
) == 0)
8554 bfd_set_error (bfd_error_invalid_operation
);
8559 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
8560 if (elf_section_data (s
)->this_hdr
.sh_link
== elf_dynsymtab (abfd
)
8561 && (elf_section_data (s
)->this_hdr
.sh_type
== SHT_REL
8562 || elf_section_data (s
)->this_hdr
.sh_type
== SHT_RELA
))
8564 count
+= s
->size
/ elf_section_data (s
)->this_hdr
.sh_entsize
;
8565 if (count
> LONG_MAX
/ sizeof (arelent
*))
8567 bfd_set_error (bfd_error_file_too_big
);
8571 return count
* sizeof (arelent
*);
8574 /* Canonicalize the dynamic relocation entries. Note that we return the
8575 dynamic relocations as a single block, although they are actually
8576 associated with particular sections; the interface, which was
8577 designed for SunOS style shared libraries, expects that there is only
8578 one set of dynamic relocs. Any loadable section that was actually
8579 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8580 dynamic symbol table, is considered to be a dynamic reloc section. */
8583 _bfd_elf_canonicalize_dynamic_reloc (bfd
*abfd
,
8587 bfd_boolean (*slurp_relocs
) (bfd
*, asection
*, asymbol
**, bfd_boolean
);
8591 if (elf_dynsymtab (abfd
) == 0)
8593 bfd_set_error (bfd_error_invalid_operation
);
8597 slurp_relocs
= get_elf_backend_data (abfd
)->s
->slurp_reloc_table
;
8599 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
8601 if (elf_section_data (s
)->this_hdr
.sh_link
== elf_dynsymtab (abfd
)
8602 && (elf_section_data (s
)->this_hdr
.sh_type
== SHT_REL
8603 || elf_section_data (s
)->this_hdr
.sh_type
== SHT_RELA
))
8608 if (! (*slurp_relocs
) (abfd
, s
, syms
, TRUE
))
8610 count
= s
->size
/ elf_section_data (s
)->this_hdr
.sh_entsize
;
8612 for (i
= 0; i
< count
; i
++)
8623 /* Read in the version information. */
8626 _bfd_elf_slurp_version_tables (bfd
*abfd
, bfd_boolean default_imported_symver
)
8628 bfd_byte
*contents
= NULL
;
8629 unsigned int freeidx
= 0;
8632 if (elf_dynverref (abfd
) != 0)
8634 Elf_Internal_Shdr
*hdr
;
8635 Elf_External_Verneed
*everneed
;
8636 Elf_Internal_Verneed
*iverneed
;
8638 bfd_byte
*contents_end
;
8640 hdr
= &elf_tdata (abfd
)->dynverref_hdr
;
8642 if (hdr
->sh_info
== 0
8643 || hdr
->sh_info
> hdr
->sh_size
/ sizeof (Elf_External_Verneed
))
8645 error_return_bad_verref
:
8647 (_("%pB: .gnu.version_r invalid entry"), abfd
);
8648 bfd_set_error (bfd_error_bad_value
);
8649 error_return_verref
:
8650 elf_tdata (abfd
)->verref
= NULL
;
8651 elf_tdata (abfd
)->cverrefs
= 0;
8655 if (bfd_seek (abfd
, hdr
->sh_offset
, SEEK_SET
) != 0)
8656 goto error_return_verref
;
8657 contents
= _bfd_malloc_and_read (abfd
, hdr
->sh_size
, hdr
->sh_size
);
8658 if (contents
== NULL
)
8659 goto error_return_verref
;
8661 if (_bfd_mul_overflow (hdr
->sh_info
, sizeof (Elf_Internal_Verneed
), &amt
))
8663 bfd_set_error (bfd_error_file_too_big
);
8664 goto error_return_verref
;
8666 elf_tdata (abfd
)->verref
= (Elf_Internal_Verneed
*) bfd_alloc (abfd
, amt
);
8667 if (elf_tdata (abfd
)->verref
== NULL
)
8668 goto error_return_verref
;
8670 BFD_ASSERT (sizeof (Elf_External_Verneed
)
8671 == sizeof (Elf_External_Vernaux
));
8672 contents_end
= contents
+ hdr
->sh_size
- sizeof (Elf_External_Verneed
);
8673 everneed
= (Elf_External_Verneed
*) contents
;
8674 iverneed
= elf_tdata (abfd
)->verref
;
8675 for (i
= 0; i
< hdr
->sh_info
; i
++, iverneed
++)
8677 Elf_External_Vernaux
*evernaux
;
8678 Elf_Internal_Vernaux
*ivernaux
;
8681 _bfd_elf_swap_verneed_in (abfd
, everneed
, iverneed
);
8683 iverneed
->vn_bfd
= abfd
;
8685 iverneed
->vn_filename
=
8686 bfd_elf_string_from_elf_section (abfd
, hdr
->sh_link
,
8688 if (iverneed
->vn_filename
== NULL
)
8689 goto error_return_bad_verref
;
8691 if (iverneed
->vn_cnt
== 0)
8692 iverneed
->vn_auxptr
= NULL
;
8695 if (_bfd_mul_overflow (iverneed
->vn_cnt
,
8696 sizeof (Elf_Internal_Vernaux
), &amt
))
8698 bfd_set_error (bfd_error_file_too_big
);
8699 goto error_return_verref
;
8701 iverneed
->vn_auxptr
= (struct elf_internal_vernaux
*)
8702 bfd_alloc (abfd
, amt
);
8703 if (iverneed
->vn_auxptr
== NULL
)
8704 goto error_return_verref
;
8707 if (iverneed
->vn_aux
8708 > (size_t) (contents_end
- (bfd_byte
*) everneed
))
8709 goto error_return_bad_verref
;
8711 evernaux
= ((Elf_External_Vernaux
*)
8712 ((bfd_byte
*) everneed
+ iverneed
->vn_aux
));
8713 ivernaux
= iverneed
->vn_auxptr
;
8714 for (j
= 0; j
< iverneed
->vn_cnt
; j
++, ivernaux
++)
8716 _bfd_elf_swap_vernaux_in (abfd
, evernaux
, ivernaux
);
8718 ivernaux
->vna_nodename
=
8719 bfd_elf_string_from_elf_section (abfd
, hdr
->sh_link
,
8720 ivernaux
->vna_name
);
8721 if (ivernaux
->vna_nodename
== NULL
)
8722 goto error_return_bad_verref
;
8724 if (ivernaux
->vna_other
> freeidx
)
8725 freeidx
= ivernaux
->vna_other
;
8727 ivernaux
->vna_nextptr
= NULL
;
8728 if (ivernaux
->vna_next
== 0)
8730 iverneed
->vn_cnt
= j
+ 1;
8733 if (j
+ 1 < iverneed
->vn_cnt
)
8734 ivernaux
->vna_nextptr
= ivernaux
+ 1;
8736 if (ivernaux
->vna_next
8737 > (size_t) (contents_end
- (bfd_byte
*) evernaux
))
8738 goto error_return_bad_verref
;
8740 evernaux
= ((Elf_External_Vernaux
*)
8741 ((bfd_byte
*) evernaux
+ ivernaux
->vna_next
));
8744 iverneed
->vn_nextref
= NULL
;
8745 if (iverneed
->vn_next
== 0)
8747 if (i
+ 1 < hdr
->sh_info
)
8748 iverneed
->vn_nextref
= iverneed
+ 1;
8750 if (iverneed
->vn_next
8751 > (size_t) (contents_end
- (bfd_byte
*) everneed
))
8752 goto error_return_bad_verref
;
8754 everneed
= ((Elf_External_Verneed
*)
8755 ((bfd_byte
*) everneed
+ iverneed
->vn_next
));
8757 elf_tdata (abfd
)->cverrefs
= i
;
8763 if (elf_dynverdef (abfd
) != 0)
8765 Elf_Internal_Shdr
*hdr
;
8766 Elf_External_Verdef
*everdef
;
8767 Elf_Internal_Verdef
*iverdef
;
8768 Elf_Internal_Verdef
*iverdefarr
;
8769 Elf_Internal_Verdef iverdefmem
;
8771 unsigned int maxidx
;
8772 bfd_byte
*contents_end_def
, *contents_end_aux
;
8774 hdr
= &elf_tdata (abfd
)->dynverdef_hdr
;
8776 if (hdr
->sh_info
== 0 || hdr
->sh_size
< sizeof (Elf_External_Verdef
))
8778 error_return_bad_verdef
:
8780 (_("%pB: .gnu.version_d invalid entry"), abfd
);
8781 bfd_set_error (bfd_error_bad_value
);
8782 error_return_verdef
:
8783 elf_tdata (abfd
)->verdef
= NULL
;
8784 elf_tdata (abfd
)->cverdefs
= 0;
8788 if (bfd_seek (abfd
, hdr
->sh_offset
, SEEK_SET
) != 0)
8789 goto error_return_verdef
;
8790 contents
= _bfd_malloc_and_read (abfd
, hdr
->sh_size
, hdr
->sh_size
);
8791 if (contents
== NULL
)
8792 goto error_return_verdef
;
8794 BFD_ASSERT (sizeof (Elf_External_Verdef
)
8795 >= sizeof (Elf_External_Verdaux
));
8796 contents_end_def
= contents
+ hdr
->sh_size
8797 - sizeof (Elf_External_Verdef
);
8798 contents_end_aux
= contents
+ hdr
->sh_size
8799 - sizeof (Elf_External_Verdaux
);
8801 /* We know the number of entries in the section but not the maximum
8802 index. Therefore we have to run through all entries and find
8804 everdef
= (Elf_External_Verdef
*) contents
;
8806 for (i
= 0; i
< hdr
->sh_info
; ++i
)
8808 _bfd_elf_swap_verdef_in (abfd
, everdef
, &iverdefmem
);
8810 if ((iverdefmem
.vd_ndx
& ((unsigned) VERSYM_VERSION
)) == 0)
8811 goto error_return_bad_verdef
;
8812 if ((iverdefmem
.vd_ndx
& ((unsigned) VERSYM_VERSION
)) > maxidx
)
8813 maxidx
= iverdefmem
.vd_ndx
& ((unsigned) VERSYM_VERSION
);
8815 if (iverdefmem
.vd_next
== 0)
8818 if (iverdefmem
.vd_next
8819 > (size_t) (contents_end_def
- (bfd_byte
*) everdef
))
8820 goto error_return_bad_verdef
;
8822 everdef
= ((Elf_External_Verdef
*)
8823 ((bfd_byte
*) everdef
+ iverdefmem
.vd_next
));
8826 if (default_imported_symver
)
8828 if (freeidx
> maxidx
)
8833 if (_bfd_mul_overflow (maxidx
, sizeof (Elf_Internal_Verdef
), &amt
))
8835 bfd_set_error (bfd_error_file_too_big
);
8836 goto error_return_verdef
;
8838 elf_tdata (abfd
)->verdef
= (Elf_Internal_Verdef
*) bfd_zalloc (abfd
, amt
);
8839 if (elf_tdata (abfd
)->verdef
== NULL
)
8840 goto error_return_verdef
;
8842 elf_tdata (abfd
)->cverdefs
= maxidx
;
8844 everdef
= (Elf_External_Verdef
*) contents
;
8845 iverdefarr
= elf_tdata (abfd
)->verdef
;
8846 for (i
= 0; i
< hdr
->sh_info
; i
++)
8848 Elf_External_Verdaux
*everdaux
;
8849 Elf_Internal_Verdaux
*iverdaux
;
8852 _bfd_elf_swap_verdef_in (abfd
, everdef
, &iverdefmem
);
8854 if ((iverdefmem
.vd_ndx
& VERSYM_VERSION
) == 0)
8855 goto error_return_bad_verdef
;
8857 iverdef
= &iverdefarr
[(iverdefmem
.vd_ndx
& VERSYM_VERSION
) - 1];
8858 memcpy (iverdef
, &iverdefmem
, offsetof (Elf_Internal_Verdef
, vd_bfd
));
8860 iverdef
->vd_bfd
= abfd
;
8862 if (iverdef
->vd_cnt
== 0)
8863 iverdef
->vd_auxptr
= NULL
;
8866 if (_bfd_mul_overflow (iverdef
->vd_cnt
,
8867 sizeof (Elf_Internal_Verdaux
), &amt
))
8869 bfd_set_error (bfd_error_file_too_big
);
8870 goto error_return_verdef
;
8872 iverdef
->vd_auxptr
= (struct elf_internal_verdaux
*)
8873 bfd_alloc (abfd
, amt
);
8874 if (iverdef
->vd_auxptr
== NULL
)
8875 goto error_return_verdef
;
8879 > (size_t) (contents_end_aux
- (bfd_byte
*) everdef
))
8880 goto error_return_bad_verdef
;
8882 everdaux
= ((Elf_External_Verdaux
*)
8883 ((bfd_byte
*) everdef
+ iverdef
->vd_aux
));
8884 iverdaux
= iverdef
->vd_auxptr
;
8885 for (j
= 0; j
< iverdef
->vd_cnt
; j
++, iverdaux
++)
8887 _bfd_elf_swap_verdaux_in (abfd
, everdaux
, iverdaux
);
8889 iverdaux
->vda_nodename
=
8890 bfd_elf_string_from_elf_section (abfd
, hdr
->sh_link
,
8891 iverdaux
->vda_name
);
8892 if (iverdaux
->vda_nodename
== NULL
)
8893 goto error_return_bad_verdef
;
8895 iverdaux
->vda_nextptr
= NULL
;
8896 if (iverdaux
->vda_next
== 0)
8898 iverdef
->vd_cnt
= j
+ 1;
8901 if (j
+ 1 < iverdef
->vd_cnt
)
8902 iverdaux
->vda_nextptr
= iverdaux
+ 1;
8904 if (iverdaux
->vda_next
8905 > (size_t) (contents_end_aux
- (bfd_byte
*) everdaux
))
8906 goto error_return_bad_verdef
;
8908 everdaux
= ((Elf_External_Verdaux
*)
8909 ((bfd_byte
*) everdaux
+ iverdaux
->vda_next
));
8912 iverdef
->vd_nodename
= NULL
;
8913 if (iverdef
->vd_cnt
)
8914 iverdef
->vd_nodename
= iverdef
->vd_auxptr
->vda_nodename
;
8916 iverdef
->vd_nextdef
= NULL
;
8917 if (iverdef
->vd_next
== 0)
8919 if ((size_t) (iverdef
- iverdefarr
) + 1 < maxidx
)
8920 iverdef
->vd_nextdef
= iverdef
+ 1;
8922 everdef
= ((Elf_External_Verdef
*)
8923 ((bfd_byte
*) everdef
+ iverdef
->vd_next
));
8929 else if (default_imported_symver
)
8936 if (_bfd_mul_overflow (freeidx
, sizeof (Elf_Internal_Verdef
), &amt
))
8938 bfd_set_error (bfd_error_file_too_big
);
8941 elf_tdata (abfd
)->verdef
= (Elf_Internal_Verdef
*) bfd_zalloc (abfd
, amt
);
8942 if (elf_tdata (abfd
)->verdef
== NULL
)
8945 elf_tdata (abfd
)->cverdefs
= freeidx
;
8948 /* Create a default version based on the soname. */
8949 if (default_imported_symver
)
8951 Elf_Internal_Verdef
*iverdef
;
8952 Elf_Internal_Verdaux
*iverdaux
;
8954 iverdef
= &elf_tdata (abfd
)->verdef
[freeidx
- 1];
8956 iverdef
->vd_version
= VER_DEF_CURRENT
;
8957 iverdef
->vd_flags
= 0;
8958 iverdef
->vd_ndx
= freeidx
;
8959 iverdef
->vd_cnt
= 1;
8961 iverdef
->vd_bfd
= abfd
;
8963 iverdef
->vd_nodename
= bfd_elf_get_dt_soname (abfd
);
8964 if (iverdef
->vd_nodename
== NULL
)
8965 goto error_return_verdef
;
8966 iverdef
->vd_nextdef
= NULL
;
8967 iverdef
->vd_auxptr
= ((struct elf_internal_verdaux
*)
8968 bfd_zalloc (abfd
, sizeof (Elf_Internal_Verdaux
)));
8969 if (iverdef
->vd_auxptr
== NULL
)
8970 goto error_return_verdef
;
8972 iverdaux
= iverdef
->vd_auxptr
;
8973 iverdaux
->vda_nodename
= iverdef
->vd_nodename
;
8979 if (contents
!= NULL
)
8985 _bfd_elf_make_empty_symbol (bfd
*abfd
)
8987 elf_symbol_type
*newsym
;
8989 newsym
= (elf_symbol_type
*) bfd_zalloc (abfd
, sizeof (*newsym
));
8992 newsym
->symbol
.the_bfd
= abfd
;
8993 return &newsym
->symbol
;
8997 _bfd_elf_get_symbol_info (bfd
*abfd ATTRIBUTE_UNUSED
,
9001 bfd_symbol_info (symbol
, ret
);
9004 /* Return whether a symbol name implies a local symbol. Most targets
9005 use this function for the is_local_label_name entry point, but some
9009 _bfd_elf_is_local_label_name (bfd
*abfd ATTRIBUTE_UNUSED
,
9012 /* Normal local symbols start with ``.L''. */
9013 if (name
[0] == '.' && name
[1] == 'L')
9016 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9017 DWARF debugging symbols starting with ``..''. */
9018 if (name
[0] == '.' && name
[1] == '.')
9021 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9022 emitting DWARF debugging output. I suspect this is actually a
9023 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9024 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9025 underscore to be emitted on some ELF targets). For ease of use,
9026 we treat such symbols as local. */
9027 if (name
[0] == '_' && name
[1] == '.' && name
[2] == 'L' && name
[3] == '_')
9030 /* Treat assembler generated fake symbols, dollar local labels and
9031 forward-backward labels (aka local labels) as locals.
9032 These labels have the form:
9034 L0^A.* (fake symbols)
9036 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9038 Versions which start with .L will have already been matched above,
9039 so we only need to match the rest. */
9040 if (name
[0] == 'L' && ISDIGIT (name
[1]))
9042 bfd_boolean ret
= FALSE
;
9046 for (p
= name
+ 2; (c
= *p
); p
++)
9048 if (c
== 1 || c
== 2)
9050 if (c
== 1 && p
== name
+ 2)
9051 /* A fake symbol. */
9054 /* FIXME: We are being paranoid here and treating symbols like
9055 L0^Bfoo as if there were non-local, on the grounds that the
9056 assembler will never generate them. But can any symbol
9057 containing an ASCII value in the range 1-31 ever be anything
9058 other than some kind of local ? */
9075 _bfd_elf_get_lineno (bfd
*abfd ATTRIBUTE_UNUSED
,
9076 asymbol
*symbol ATTRIBUTE_UNUSED
)
9083 _bfd_elf_set_arch_mach (bfd
*abfd
,
9084 enum bfd_architecture arch
,
9085 unsigned long machine
)
9087 /* If this isn't the right architecture for this backend, and this
9088 isn't the generic backend, fail. */
9089 if (arch
!= get_elf_backend_data (abfd
)->arch
9090 && arch
!= bfd_arch_unknown
9091 && get_elf_backend_data (abfd
)->arch
!= bfd_arch_unknown
)
9094 return bfd_default_set_arch_mach (abfd
, arch
, machine
);
9097 /* Find the nearest line to a particular section and offset,
9098 for error reporting. */
9101 _bfd_elf_find_nearest_line (bfd
*abfd
,
9105 const char **filename_ptr
,
9106 const char **functionname_ptr
,
9107 unsigned int *line_ptr
,
9108 unsigned int *discriminator_ptr
)
9112 if (_bfd_dwarf2_find_nearest_line (abfd
, symbols
, NULL
, section
, offset
,
9113 filename_ptr
, functionname_ptr
,
9114 line_ptr
, discriminator_ptr
,
9115 dwarf_debug_sections
,
9116 &elf_tdata (abfd
)->dwarf2_find_line_info
))
9119 if (_bfd_dwarf1_find_nearest_line (abfd
, symbols
, section
, offset
,
9120 filename_ptr
, functionname_ptr
, line_ptr
))
9122 if (!*functionname_ptr
)
9123 _bfd_elf_find_function (abfd
, symbols
, section
, offset
,
9124 *filename_ptr
? NULL
: filename_ptr
,
9129 if (! _bfd_stab_section_find_nearest_line (abfd
, symbols
, section
, offset
,
9130 &found
, filename_ptr
,
9131 functionname_ptr
, line_ptr
,
9132 &elf_tdata (abfd
)->line_info
))
9134 if (found
&& (*functionname_ptr
|| *line_ptr
))
9137 if (symbols
== NULL
)
9140 if (! _bfd_elf_find_function (abfd
, symbols
, section
, offset
,
9141 filename_ptr
, functionname_ptr
))
9148 /* Find the line for a symbol. */
9151 _bfd_elf_find_line (bfd
*abfd
, asymbol
**symbols
, asymbol
*symbol
,
9152 const char **filename_ptr
, unsigned int *line_ptr
)
9154 return _bfd_dwarf2_find_nearest_line (abfd
, symbols
, symbol
, NULL
, 0,
9155 filename_ptr
, NULL
, line_ptr
, NULL
,
9156 dwarf_debug_sections
,
9157 &elf_tdata (abfd
)->dwarf2_find_line_info
);
9160 /* After a call to bfd_find_nearest_line, successive calls to
9161 bfd_find_inliner_info can be used to get source information about
9162 each level of function inlining that terminated at the address
9163 passed to bfd_find_nearest_line. Currently this is only supported
9164 for DWARF2 with appropriate DWARF3 extensions. */
9167 _bfd_elf_find_inliner_info (bfd
*abfd
,
9168 const char **filename_ptr
,
9169 const char **functionname_ptr
,
9170 unsigned int *line_ptr
)
9173 found
= _bfd_dwarf2_find_inliner_info (abfd
, filename_ptr
,
9174 functionname_ptr
, line_ptr
,
9175 & elf_tdata (abfd
)->dwarf2_find_line_info
);
9180 _bfd_elf_sizeof_headers (bfd
*abfd
, struct bfd_link_info
*info
)
9182 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
9183 int ret
= bed
->s
->sizeof_ehdr
;
9185 if (!bfd_link_relocatable (info
))
9187 bfd_size_type phdr_size
= elf_program_header_size (abfd
);
9189 if (phdr_size
== (bfd_size_type
) -1)
9191 struct elf_segment_map
*m
;
9194 for (m
= elf_seg_map (abfd
); m
!= NULL
; m
= m
->next
)
9195 phdr_size
+= bed
->s
->sizeof_phdr
;
9198 phdr_size
= get_program_header_size (abfd
, info
);
9201 elf_program_header_size (abfd
) = phdr_size
;
9209 _bfd_elf_set_section_contents (bfd
*abfd
,
9211 const void *location
,
9213 bfd_size_type count
)
9215 Elf_Internal_Shdr
*hdr
;
9218 if (! abfd
->output_has_begun
9219 && ! _bfd_elf_compute_section_file_positions (abfd
, NULL
))
9225 hdr
= &elf_section_data (section
)->this_hdr
;
9226 if (hdr
->sh_offset
== (file_ptr
) -1)
9228 unsigned char *contents
;
9230 if (bfd_section_is_ctf (section
))
9231 /* Nothing to do with this section: the contents are generated
9235 if ((section
->flags
& SEC_ELF_COMPRESS
) == 0)
9238 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9240 bfd_set_error (bfd_error_invalid_operation
);
9244 if ((offset
+ count
) > hdr
->sh_size
)
9247 (_("%pB:%pA: error: attempting to write over the end of the section"),
9250 bfd_set_error (bfd_error_invalid_operation
);
9254 contents
= hdr
->contents
;
9255 if (contents
== NULL
)
9258 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9261 bfd_set_error (bfd_error_invalid_operation
);
9265 memcpy (contents
+ offset
, location
, count
);
9269 pos
= hdr
->sh_offset
+ offset
;
9270 if (bfd_seek (abfd
, pos
, SEEK_SET
) != 0
9271 || bfd_bwrite (location
, count
, abfd
) != count
)
9278 _bfd_elf_no_info_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
,
9279 arelent
*cache_ptr ATTRIBUTE_UNUSED
,
9280 Elf_Internal_Rela
*dst ATTRIBUTE_UNUSED
)
9286 /* Try to convert a non-ELF reloc into an ELF one. */
9289 _bfd_elf_validate_reloc (bfd
*abfd
, arelent
*areloc
)
9291 /* Check whether we really have an ELF howto. */
9293 if ((*areloc
->sym_ptr_ptr
)->the_bfd
->xvec
!= abfd
->xvec
)
9295 bfd_reloc_code_real_type code
;
9296 reloc_howto_type
*howto
;
9298 /* Alien reloc: Try to determine its type to replace it with an
9299 equivalent ELF reloc. */
9301 if (areloc
->howto
->pc_relative
)
9303 switch (areloc
->howto
->bitsize
)
9306 code
= BFD_RELOC_8_PCREL
;
9309 code
= BFD_RELOC_12_PCREL
;
9312 code
= BFD_RELOC_16_PCREL
;
9315 code
= BFD_RELOC_24_PCREL
;
9318 code
= BFD_RELOC_32_PCREL
;
9321 code
= BFD_RELOC_64_PCREL
;
9327 howto
= bfd_reloc_type_lookup (abfd
, code
);
9329 if (howto
&& areloc
->howto
->pcrel_offset
!= howto
->pcrel_offset
)
9331 if (howto
->pcrel_offset
)
9332 areloc
->addend
+= areloc
->address
;
9334 areloc
->addend
-= areloc
->address
; /* addend is unsigned!! */
9339 switch (areloc
->howto
->bitsize
)
9345 code
= BFD_RELOC_14
;
9348 code
= BFD_RELOC_16
;
9351 code
= BFD_RELOC_26
;
9354 code
= BFD_RELOC_32
;
9357 code
= BFD_RELOC_64
;
9363 howto
= bfd_reloc_type_lookup (abfd
, code
);
9367 areloc
->howto
= howto
;
9375 /* xgettext:c-format */
9376 _bfd_error_handler (_("%pB: %s unsupported"),
9377 abfd
, areloc
->howto
->name
);
9378 bfd_set_error (bfd_error_sorry
);
9383 _bfd_elf_close_and_cleanup (bfd
*abfd
)
9385 struct elf_obj_tdata
*tdata
= elf_tdata (abfd
);
9386 if (bfd_get_format (abfd
) == bfd_object
&& tdata
!= NULL
)
9388 if (elf_tdata (abfd
)->o
!= NULL
&& elf_shstrtab (abfd
) != NULL
)
9389 _bfd_elf_strtab_free (elf_shstrtab (abfd
));
9390 _bfd_dwarf2_cleanup_debug_info (abfd
, &tdata
->dwarf2_find_line_info
);
9393 return _bfd_generic_close_and_cleanup (abfd
);
9396 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9397 in the relocation's offset. Thus we cannot allow any sort of sanity
9398 range-checking to interfere. There is nothing else to do in processing
9401 bfd_reloc_status_type
9402 _bfd_elf_rel_vtable_reloc_fn
9403 (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*re ATTRIBUTE_UNUSED
,
9404 struct bfd_symbol
*symbol ATTRIBUTE_UNUSED
,
9405 void *data ATTRIBUTE_UNUSED
, asection
*is ATTRIBUTE_UNUSED
,
9406 bfd
*obfd ATTRIBUTE_UNUSED
, char **errmsg ATTRIBUTE_UNUSED
)
9408 return bfd_reloc_ok
;
9411 /* Elf core file support. Much of this only works on native
9412 toolchains, since we rely on knowing the
9413 machine-dependent procfs structure in order to pick
9414 out details about the corefile. */
9416 #ifdef HAVE_SYS_PROCFS_H
9417 /* Needed for new procfs interface on sparc-solaris. */
9418 # define _STRUCTURED_PROC 1
9419 # include <sys/procfs.h>
9422 /* Return a PID that identifies a "thread" for threaded cores, or the
9423 PID of the main process for non-threaded cores. */
9426 elfcore_make_pid (bfd
*abfd
)
9430 pid
= elf_tdata (abfd
)->core
->lwpid
;
9432 pid
= elf_tdata (abfd
)->core
->pid
;
9437 /* If there isn't a section called NAME, make one, using
9438 data from SECT. Note, this function will generate a
9439 reference to NAME, so you shouldn't deallocate or
9443 elfcore_maybe_make_sect (bfd
*abfd
, char *name
, asection
*sect
)
9447 if (bfd_get_section_by_name (abfd
, name
) != NULL
)
9450 sect2
= bfd_make_section_with_flags (abfd
, name
, sect
->flags
);
9454 sect2
->size
= sect
->size
;
9455 sect2
->filepos
= sect
->filepos
;
9456 sect2
->alignment_power
= sect
->alignment_power
;
9460 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9461 actually creates up to two pseudosections:
9462 - For the single-threaded case, a section named NAME, unless
9463 such a section already exists.
9464 - For the multi-threaded case, a section named "NAME/PID", where
9465 PID is elfcore_make_pid (abfd).
9466 Both pseudosections have identical contents. */
9468 _bfd_elfcore_make_pseudosection (bfd
*abfd
,
9474 char *threaded_name
;
9478 /* Build the section name. */
9480 sprintf (buf
, "%s/%d", name
, elfcore_make_pid (abfd
));
9481 len
= strlen (buf
) + 1;
9482 threaded_name
= (char *) bfd_alloc (abfd
, len
);
9483 if (threaded_name
== NULL
)
9485 memcpy (threaded_name
, buf
, len
);
9487 sect
= bfd_make_section_anyway_with_flags (abfd
, threaded_name
,
9492 sect
->filepos
= filepos
;
9493 sect
->alignment_power
= 2;
9495 return elfcore_maybe_make_sect (abfd
, name
, sect
);
9499 elfcore_make_auxv_note_section (bfd
*abfd
, Elf_Internal_Note
*note
,
9502 asection
*sect
= bfd_make_section_anyway_with_flags (abfd
, ".auxv",
9508 sect
->size
= note
->descsz
- offs
;
9509 sect
->filepos
= note
->descpos
+ offs
;
9510 sect
->alignment_power
= 1 + bfd_get_arch_size (abfd
) / 32;
9515 /* prstatus_t exists on:
9517 linux 2.[01] + glibc
9521 #if defined (HAVE_PRSTATUS_T)
9524 elfcore_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
9529 if (note
->descsz
== sizeof (prstatus_t
))
9533 size
= sizeof (prstat
.pr_reg
);
9534 offset
= offsetof (prstatus_t
, pr_reg
);
9535 memcpy (&prstat
, note
->descdata
, sizeof (prstat
));
9537 /* Do not overwrite the core signal if it
9538 has already been set by another thread. */
9539 if (elf_tdata (abfd
)->core
->signal
== 0)
9540 elf_tdata (abfd
)->core
->signal
= prstat
.pr_cursig
;
9541 if (elf_tdata (abfd
)->core
->pid
== 0)
9542 elf_tdata (abfd
)->core
->pid
= prstat
.pr_pid
;
9544 /* pr_who exists on:
9547 pr_who doesn't exist on:
9550 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9551 elf_tdata (abfd
)->core
->lwpid
= prstat
.pr_who
;
9553 elf_tdata (abfd
)->core
->lwpid
= prstat
.pr_pid
;
9556 #if defined (HAVE_PRSTATUS32_T)
9557 else if (note
->descsz
== sizeof (prstatus32_t
))
9559 /* 64-bit host, 32-bit corefile */
9560 prstatus32_t prstat
;
9562 size
= sizeof (prstat
.pr_reg
);
9563 offset
= offsetof (prstatus32_t
, pr_reg
);
9564 memcpy (&prstat
, note
->descdata
, sizeof (prstat
));
9566 /* Do not overwrite the core signal if it
9567 has already been set by another thread. */
9568 if (elf_tdata (abfd
)->core
->signal
== 0)
9569 elf_tdata (abfd
)->core
->signal
= prstat
.pr_cursig
;
9570 if (elf_tdata (abfd
)->core
->pid
== 0)
9571 elf_tdata (abfd
)->core
->pid
= prstat
.pr_pid
;
9573 /* pr_who exists on:
9576 pr_who doesn't exist on:
9579 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9580 elf_tdata (abfd
)->core
->lwpid
= prstat
.pr_who
;
9582 elf_tdata (abfd
)->core
->lwpid
= prstat
.pr_pid
;
9585 #endif /* HAVE_PRSTATUS32_T */
9588 /* Fail - we don't know how to handle any other
9589 note size (ie. data object type). */
9593 /* Make a ".reg/999" section and a ".reg" section. */
9594 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
9595 size
, note
->descpos
+ offset
);
9597 #endif /* defined (HAVE_PRSTATUS_T) */
9599 /* Create a pseudosection containing the exact contents of NOTE. */
9601 elfcore_make_note_pseudosection (bfd
*abfd
,
9603 Elf_Internal_Note
*note
)
9605 return _bfd_elfcore_make_pseudosection (abfd
, name
,
9606 note
->descsz
, note
->descpos
);
9609 /* There isn't a consistent prfpregset_t across platforms,
9610 but it doesn't matter, because we don't have to pick this
9611 data structure apart. */
9614 elfcore_grok_prfpreg (bfd
*abfd
, Elf_Internal_Note
*note
)
9616 return elfcore_make_note_pseudosection (abfd
, ".reg2", note
);
9619 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9620 type of NT_PRXFPREG. Just include the whole note's contents
9624 elfcore_grok_prxfpreg (bfd
*abfd
, Elf_Internal_Note
*note
)
9626 return elfcore_make_note_pseudosection (abfd
, ".reg-xfp", note
);
9629 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9630 with a note type of NT_X86_XSTATE. Just include the whole note's
9631 contents literally. */
9634 elfcore_grok_xstatereg (bfd
*abfd
, Elf_Internal_Note
*note
)
9636 return elfcore_make_note_pseudosection (abfd
, ".reg-xstate", note
);
9640 elfcore_grok_ppc_vmx (bfd
*abfd
, Elf_Internal_Note
*note
)
9642 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-vmx", note
);
9646 elfcore_grok_ppc_vsx (bfd
*abfd
, Elf_Internal_Note
*note
)
9648 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-vsx", note
);
9652 elfcore_grok_ppc_tar (bfd
*abfd
, Elf_Internal_Note
*note
)
9654 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tar", note
);
9658 elfcore_grok_ppc_ppr (bfd
*abfd
, Elf_Internal_Note
*note
)
9660 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-ppr", note
);
9664 elfcore_grok_ppc_dscr (bfd
*abfd
, Elf_Internal_Note
*note
)
9666 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-dscr", note
);
9670 elfcore_grok_ppc_ebb (bfd
*abfd
, Elf_Internal_Note
*note
)
9672 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-ebb", note
);
9676 elfcore_grok_ppc_pmu (bfd
*abfd
, Elf_Internal_Note
*note
)
9678 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-pmu", note
);
9682 elfcore_grok_ppc_tm_cgpr (bfd
*abfd
, Elf_Internal_Note
*note
)
9684 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cgpr", note
);
9688 elfcore_grok_ppc_tm_cfpr (bfd
*abfd
, Elf_Internal_Note
*note
)
9690 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cfpr", note
);
9694 elfcore_grok_ppc_tm_cvmx (bfd
*abfd
, Elf_Internal_Note
*note
)
9696 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cvmx", note
);
9700 elfcore_grok_ppc_tm_cvsx (bfd
*abfd
, Elf_Internal_Note
*note
)
9702 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cvsx", note
);
9706 elfcore_grok_ppc_tm_spr (bfd
*abfd
, Elf_Internal_Note
*note
)
9708 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-spr", note
);
9712 elfcore_grok_ppc_tm_ctar (bfd
*abfd
, Elf_Internal_Note
*note
)
9714 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-ctar", note
);
9718 elfcore_grok_ppc_tm_cppr (bfd
*abfd
, Elf_Internal_Note
*note
)
9720 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cppr", note
);
9724 elfcore_grok_ppc_tm_cdscr (bfd
*abfd
, Elf_Internal_Note
*note
)
9726 return elfcore_make_note_pseudosection (abfd
, ".reg-ppc-tm-cdscr", note
);
9730 elfcore_grok_s390_high_gprs (bfd
*abfd
, Elf_Internal_Note
*note
)
9732 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-high-gprs", note
);
9736 elfcore_grok_s390_timer (bfd
*abfd
, Elf_Internal_Note
*note
)
9738 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-timer", note
);
9742 elfcore_grok_s390_todcmp (bfd
*abfd
, Elf_Internal_Note
*note
)
9744 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-todcmp", note
);
9748 elfcore_grok_s390_todpreg (bfd
*abfd
, Elf_Internal_Note
*note
)
9750 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-todpreg", note
);
9754 elfcore_grok_s390_ctrs (bfd
*abfd
, Elf_Internal_Note
*note
)
9756 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-ctrs", note
);
9760 elfcore_grok_s390_prefix (bfd
*abfd
, Elf_Internal_Note
*note
)
9762 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-prefix", note
);
9766 elfcore_grok_s390_last_break (bfd
*abfd
, Elf_Internal_Note
*note
)
9768 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-last-break", note
);
9772 elfcore_grok_s390_system_call (bfd
*abfd
, Elf_Internal_Note
*note
)
9774 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-system-call", note
);
9778 elfcore_grok_s390_tdb (bfd
*abfd
, Elf_Internal_Note
*note
)
9780 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-tdb", note
);
9784 elfcore_grok_s390_vxrs_low (bfd
*abfd
, Elf_Internal_Note
*note
)
9786 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-vxrs-low", note
);
9790 elfcore_grok_s390_vxrs_high (bfd
*abfd
, Elf_Internal_Note
*note
)
9792 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-vxrs-high", note
);
9796 elfcore_grok_s390_gs_cb (bfd
*abfd
, Elf_Internal_Note
*note
)
9798 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-gs-cb", note
);
9802 elfcore_grok_s390_gs_bc (bfd
*abfd
, Elf_Internal_Note
*note
)
9804 return elfcore_make_note_pseudosection (abfd
, ".reg-s390-gs-bc", note
);
9808 elfcore_grok_arm_vfp (bfd
*abfd
, Elf_Internal_Note
*note
)
9810 return elfcore_make_note_pseudosection (abfd
, ".reg-arm-vfp", note
);
9814 elfcore_grok_aarch_tls (bfd
*abfd
, Elf_Internal_Note
*note
)
9816 return elfcore_make_note_pseudosection (abfd
, ".reg-aarch-tls", note
);
9820 elfcore_grok_aarch_hw_break (bfd
*abfd
, Elf_Internal_Note
*note
)
9822 return elfcore_make_note_pseudosection (abfd
, ".reg-aarch-hw-break", note
);
9826 elfcore_grok_aarch_hw_watch (bfd
*abfd
, Elf_Internal_Note
*note
)
9828 return elfcore_make_note_pseudosection (abfd
, ".reg-aarch-hw-watch", note
);
9832 elfcore_grok_aarch_sve (bfd
*abfd
, Elf_Internal_Note
*note
)
9834 return elfcore_make_note_pseudosection (abfd
, ".reg-aarch-sve", note
);
9838 elfcore_grok_aarch_pauth (bfd
*abfd
, Elf_Internal_Note
*note
)
9840 return elfcore_make_note_pseudosection (abfd
, ".reg-aarch-pauth", note
);
9843 #if defined (HAVE_PRPSINFO_T)
9844 typedef prpsinfo_t elfcore_psinfo_t
;
9845 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9846 typedef prpsinfo32_t elfcore_psinfo32_t
;
9850 #if defined (HAVE_PSINFO_T)
9851 typedef psinfo_t elfcore_psinfo_t
;
9852 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9853 typedef psinfo32_t elfcore_psinfo32_t
;
9857 /* return a malloc'ed copy of a string at START which is at
9858 most MAX bytes long, possibly without a terminating '\0'.
9859 the copy will always have a terminating '\0'. */
9862 _bfd_elfcore_strndup (bfd
*abfd
, char *start
, size_t max
)
9865 char *end
= (char *) memchr (start
, '\0', max
);
9873 dups
= (char *) bfd_alloc (abfd
, len
+ 1);
9877 memcpy (dups
, start
, len
);
9883 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9885 elfcore_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
9887 if (note
->descsz
== sizeof (elfcore_psinfo_t
))
9889 elfcore_psinfo_t psinfo
;
9891 memcpy (&psinfo
, note
->descdata
, sizeof (psinfo
));
9893 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9894 elf_tdata (abfd
)->core
->pid
= psinfo
.pr_pid
;
9896 elf_tdata (abfd
)->core
->program
9897 = _bfd_elfcore_strndup (abfd
, psinfo
.pr_fname
,
9898 sizeof (psinfo
.pr_fname
));
9900 elf_tdata (abfd
)->core
->command
9901 = _bfd_elfcore_strndup (abfd
, psinfo
.pr_psargs
,
9902 sizeof (psinfo
.pr_psargs
));
9904 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9905 else if (note
->descsz
== sizeof (elfcore_psinfo32_t
))
9907 /* 64-bit host, 32-bit corefile */
9908 elfcore_psinfo32_t psinfo
;
9910 memcpy (&psinfo
, note
->descdata
, sizeof (psinfo
));
9912 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9913 elf_tdata (abfd
)->core
->pid
= psinfo
.pr_pid
;
9915 elf_tdata (abfd
)->core
->program
9916 = _bfd_elfcore_strndup (abfd
, psinfo
.pr_fname
,
9917 sizeof (psinfo
.pr_fname
));
9919 elf_tdata (abfd
)->core
->command
9920 = _bfd_elfcore_strndup (abfd
, psinfo
.pr_psargs
,
9921 sizeof (psinfo
.pr_psargs
));
9927 /* Fail - we don't know how to handle any other
9928 note size (ie. data object type). */
9932 /* Note that for some reason, a spurious space is tacked
9933 onto the end of the args in some (at least one anyway)
9934 implementations, so strip it off if it exists. */
9937 char *command
= elf_tdata (abfd
)->core
->command
;
9938 int n
= strlen (command
);
9940 if (0 < n
&& command
[n
- 1] == ' ')
9941 command
[n
- 1] = '\0';
9946 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
9948 #if defined (HAVE_PSTATUS_T)
9950 elfcore_grok_pstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
9952 if (note
->descsz
== sizeof (pstatus_t
)
9953 #if defined (HAVE_PXSTATUS_T)
9954 || note
->descsz
== sizeof (pxstatus_t
)
9960 memcpy (&pstat
, note
->descdata
, sizeof (pstat
));
9962 elf_tdata (abfd
)->core
->pid
= pstat
.pr_pid
;
9964 #if defined (HAVE_PSTATUS32_T)
9965 else if (note
->descsz
== sizeof (pstatus32_t
))
9967 /* 64-bit host, 32-bit corefile */
9970 memcpy (&pstat
, note
->descdata
, sizeof (pstat
));
9972 elf_tdata (abfd
)->core
->pid
= pstat
.pr_pid
;
9975 /* Could grab some more details from the "representative"
9976 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
9977 NT_LWPSTATUS note, presumably. */
9981 #endif /* defined (HAVE_PSTATUS_T) */
9983 #if defined (HAVE_LWPSTATUS_T)
9985 elfcore_grok_lwpstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
9987 lwpstatus_t lwpstat
;
9993 if (note
->descsz
!= sizeof (lwpstat
)
9994 #if defined (HAVE_LWPXSTATUS_T)
9995 && note
->descsz
!= sizeof (lwpxstatus_t
)
10000 memcpy (&lwpstat
, note
->descdata
, sizeof (lwpstat
));
10002 elf_tdata (abfd
)->core
->lwpid
= lwpstat
.pr_lwpid
;
10003 /* Do not overwrite the core signal if it has already been set by
10005 if (elf_tdata (abfd
)->core
->signal
== 0)
10006 elf_tdata (abfd
)->core
->signal
= lwpstat
.pr_cursig
;
10008 /* Make a ".reg/999" section. */
10010 sprintf (buf
, ".reg/%d", elfcore_make_pid (abfd
));
10011 len
= strlen (buf
) + 1;
10012 name
= bfd_alloc (abfd
, len
);
10015 memcpy (name
, buf
, len
);
10017 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10021 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10022 sect
->size
= sizeof (lwpstat
.pr_context
.uc_mcontext
.gregs
);
10023 sect
->filepos
= note
->descpos
10024 + offsetof (lwpstatus_t
, pr_context
.uc_mcontext
.gregs
);
10027 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10028 sect
->size
= sizeof (lwpstat
.pr_reg
);
10029 sect
->filepos
= note
->descpos
+ offsetof (lwpstatus_t
, pr_reg
);
10032 sect
->alignment_power
= 2;
10034 if (!elfcore_maybe_make_sect (abfd
, ".reg", sect
))
10037 /* Make a ".reg2/999" section */
10039 sprintf (buf
, ".reg2/%d", elfcore_make_pid (abfd
));
10040 len
= strlen (buf
) + 1;
10041 name
= bfd_alloc (abfd
, len
);
10044 memcpy (name
, buf
, len
);
10046 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10050 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10051 sect
->size
= sizeof (lwpstat
.pr_context
.uc_mcontext
.fpregs
);
10052 sect
->filepos
= note
->descpos
10053 + offsetof (lwpstatus_t
, pr_context
.uc_mcontext
.fpregs
);
10056 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10057 sect
->size
= sizeof (lwpstat
.pr_fpreg
);
10058 sect
->filepos
= note
->descpos
+ offsetof (lwpstatus_t
, pr_fpreg
);
10061 sect
->alignment_power
= 2;
10063 return elfcore_maybe_make_sect (abfd
, ".reg2", sect
);
10065 #endif /* defined (HAVE_LWPSTATUS_T) */
10068 elfcore_grok_win32pstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
10075 int is_active_thread
;
10078 if (note
->descsz
< 728)
10081 if (! CONST_STRNEQ (note
->namedata
, "win32"))
10084 type
= bfd_get_32 (abfd
, note
->descdata
);
10088 case 1 /* NOTE_INFO_PROCESS */:
10089 /* FIXME: need to add ->core->command. */
10090 /* process_info.pid */
10091 elf_tdata (abfd
)->core
->pid
= bfd_get_32 (abfd
, note
->descdata
+ 8);
10092 /* process_info.signal */
10093 elf_tdata (abfd
)->core
->signal
= bfd_get_32 (abfd
, note
->descdata
+ 12);
10096 case 2 /* NOTE_INFO_THREAD */:
10097 /* Make a ".reg/999" section. */
10098 /* thread_info.tid */
10099 sprintf (buf
, ".reg/%ld", (long) bfd_get_32 (abfd
, note
->descdata
+ 8));
10101 len
= strlen (buf
) + 1;
10102 name
= (char *) bfd_alloc (abfd
, len
);
10106 memcpy (name
, buf
, len
);
10108 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10112 /* sizeof (thread_info.thread_context) */
10114 /* offsetof (thread_info.thread_context) */
10115 sect
->filepos
= note
->descpos
+ 12;
10116 sect
->alignment_power
= 2;
10118 /* thread_info.is_active_thread */
10119 is_active_thread
= bfd_get_32 (abfd
, note
->descdata
+ 8);
10121 if (is_active_thread
)
10122 if (! elfcore_maybe_make_sect (abfd
, ".reg", sect
))
10126 case 3 /* NOTE_INFO_MODULE */:
10127 /* Make a ".module/xxxxxxxx" section. */
10128 /* module_info.base_address */
10129 base_addr
= bfd_get_32 (abfd
, note
->descdata
+ 4);
10130 sprintf (buf
, ".module/%08lx", (unsigned long) base_addr
);
10132 len
= strlen (buf
) + 1;
10133 name
= (char *) bfd_alloc (abfd
, len
);
10137 memcpy (name
, buf
, len
);
10139 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10144 sect
->size
= note
->descsz
;
10145 sect
->filepos
= note
->descpos
;
10146 sect
->alignment_power
= 2;
10157 elfcore_grok_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10159 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
10161 switch (note
->type
)
10167 if (bed
->elf_backend_grok_prstatus
)
10168 if ((*bed
->elf_backend_grok_prstatus
) (abfd
, note
))
10170 #if defined (HAVE_PRSTATUS_T)
10171 return elfcore_grok_prstatus (abfd
, note
);
10176 #if defined (HAVE_PSTATUS_T)
10178 return elfcore_grok_pstatus (abfd
, note
);
10181 #if defined (HAVE_LWPSTATUS_T)
10183 return elfcore_grok_lwpstatus (abfd
, note
);
10186 case NT_FPREGSET
: /* FIXME: rename to NT_PRFPREG */
10187 return elfcore_grok_prfpreg (abfd
, note
);
10189 case NT_WIN32PSTATUS
:
10190 return elfcore_grok_win32pstatus (abfd
, note
);
10192 case NT_PRXFPREG
: /* Linux SSE extension */
10193 if (note
->namesz
== 6
10194 && strcmp (note
->namedata
, "LINUX") == 0)
10195 return elfcore_grok_prxfpreg (abfd
, note
);
10199 case NT_X86_XSTATE
: /* Linux XSAVE extension */
10200 if (note
->namesz
== 6
10201 && strcmp (note
->namedata
, "LINUX") == 0)
10202 return elfcore_grok_xstatereg (abfd
, note
);
10207 if (note
->namesz
== 6
10208 && strcmp (note
->namedata
, "LINUX") == 0)
10209 return elfcore_grok_ppc_vmx (abfd
, note
);
10214 if (note
->namesz
== 6
10215 && strcmp (note
->namedata
, "LINUX") == 0)
10216 return elfcore_grok_ppc_vsx (abfd
, note
);
10221 if (note
->namesz
== 6
10222 && strcmp (note
->namedata
, "LINUX") == 0)
10223 return elfcore_grok_ppc_tar (abfd
, note
);
10228 if (note
->namesz
== 6
10229 && strcmp (note
->namedata
, "LINUX") == 0)
10230 return elfcore_grok_ppc_ppr (abfd
, note
);
10235 if (note
->namesz
== 6
10236 && strcmp (note
->namedata
, "LINUX") == 0)
10237 return elfcore_grok_ppc_dscr (abfd
, note
);
10242 if (note
->namesz
== 6
10243 && strcmp (note
->namedata
, "LINUX") == 0)
10244 return elfcore_grok_ppc_ebb (abfd
, note
);
10249 if (note
->namesz
== 6
10250 && strcmp (note
->namedata
, "LINUX") == 0)
10251 return elfcore_grok_ppc_pmu (abfd
, note
);
10255 case NT_PPC_TM_CGPR
:
10256 if (note
->namesz
== 6
10257 && strcmp (note
->namedata
, "LINUX") == 0)
10258 return elfcore_grok_ppc_tm_cgpr (abfd
, note
);
10262 case NT_PPC_TM_CFPR
:
10263 if (note
->namesz
== 6
10264 && strcmp (note
->namedata
, "LINUX") == 0)
10265 return elfcore_grok_ppc_tm_cfpr (abfd
, note
);
10269 case NT_PPC_TM_CVMX
:
10270 if (note
->namesz
== 6
10271 && strcmp (note
->namedata
, "LINUX") == 0)
10272 return elfcore_grok_ppc_tm_cvmx (abfd
, note
);
10276 case NT_PPC_TM_CVSX
:
10277 if (note
->namesz
== 6
10278 && strcmp (note
->namedata
, "LINUX") == 0)
10279 return elfcore_grok_ppc_tm_cvsx (abfd
, note
);
10283 case NT_PPC_TM_SPR
:
10284 if (note
->namesz
== 6
10285 && strcmp (note
->namedata
, "LINUX") == 0)
10286 return elfcore_grok_ppc_tm_spr (abfd
, note
);
10290 case NT_PPC_TM_CTAR
:
10291 if (note
->namesz
== 6
10292 && strcmp (note
->namedata
, "LINUX") == 0)
10293 return elfcore_grok_ppc_tm_ctar (abfd
, note
);
10297 case NT_PPC_TM_CPPR
:
10298 if (note
->namesz
== 6
10299 && strcmp (note
->namedata
, "LINUX") == 0)
10300 return elfcore_grok_ppc_tm_cppr (abfd
, note
);
10304 case NT_PPC_TM_CDSCR
:
10305 if (note
->namesz
== 6
10306 && strcmp (note
->namedata
, "LINUX") == 0)
10307 return elfcore_grok_ppc_tm_cdscr (abfd
, note
);
10311 case NT_S390_HIGH_GPRS
:
10312 if (note
->namesz
== 6
10313 && strcmp (note
->namedata
, "LINUX") == 0)
10314 return elfcore_grok_s390_high_gprs (abfd
, note
);
10318 case NT_S390_TIMER
:
10319 if (note
->namesz
== 6
10320 && strcmp (note
->namedata
, "LINUX") == 0)
10321 return elfcore_grok_s390_timer (abfd
, note
);
10325 case NT_S390_TODCMP
:
10326 if (note
->namesz
== 6
10327 && strcmp (note
->namedata
, "LINUX") == 0)
10328 return elfcore_grok_s390_todcmp (abfd
, note
);
10332 case NT_S390_TODPREG
:
10333 if (note
->namesz
== 6
10334 && strcmp (note
->namedata
, "LINUX") == 0)
10335 return elfcore_grok_s390_todpreg (abfd
, note
);
10340 if (note
->namesz
== 6
10341 && strcmp (note
->namedata
, "LINUX") == 0)
10342 return elfcore_grok_s390_ctrs (abfd
, note
);
10346 case NT_S390_PREFIX
:
10347 if (note
->namesz
== 6
10348 && strcmp (note
->namedata
, "LINUX") == 0)
10349 return elfcore_grok_s390_prefix (abfd
, note
);
10353 case NT_S390_LAST_BREAK
:
10354 if (note
->namesz
== 6
10355 && strcmp (note
->namedata
, "LINUX") == 0)
10356 return elfcore_grok_s390_last_break (abfd
, note
);
10360 case NT_S390_SYSTEM_CALL
:
10361 if (note
->namesz
== 6
10362 && strcmp (note
->namedata
, "LINUX") == 0)
10363 return elfcore_grok_s390_system_call (abfd
, note
);
10368 if (note
->namesz
== 6
10369 && strcmp (note
->namedata
, "LINUX") == 0)
10370 return elfcore_grok_s390_tdb (abfd
, note
);
10374 case NT_S390_VXRS_LOW
:
10375 if (note
->namesz
== 6
10376 && strcmp (note
->namedata
, "LINUX") == 0)
10377 return elfcore_grok_s390_vxrs_low (abfd
, note
);
10381 case NT_S390_VXRS_HIGH
:
10382 if (note
->namesz
== 6
10383 && strcmp (note
->namedata
, "LINUX") == 0)
10384 return elfcore_grok_s390_vxrs_high (abfd
, note
);
10388 case NT_S390_GS_CB
:
10389 if (note
->namesz
== 6
10390 && strcmp (note
->namedata
, "LINUX") == 0)
10391 return elfcore_grok_s390_gs_cb (abfd
, note
);
10395 case NT_S390_GS_BC
:
10396 if (note
->namesz
== 6
10397 && strcmp (note
->namedata
, "LINUX") == 0)
10398 return elfcore_grok_s390_gs_bc (abfd
, note
);
10403 if (note
->namesz
== 6
10404 && strcmp (note
->namedata
, "LINUX") == 0)
10405 return elfcore_grok_arm_vfp (abfd
, note
);
10410 if (note
->namesz
== 6
10411 && strcmp (note
->namedata
, "LINUX") == 0)
10412 return elfcore_grok_aarch_tls (abfd
, note
);
10416 case NT_ARM_HW_BREAK
:
10417 if (note
->namesz
== 6
10418 && strcmp (note
->namedata
, "LINUX") == 0)
10419 return elfcore_grok_aarch_hw_break (abfd
, note
);
10423 case NT_ARM_HW_WATCH
:
10424 if (note
->namesz
== 6
10425 && strcmp (note
->namedata
, "LINUX") == 0)
10426 return elfcore_grok_aarch_hw_watch (abfd
, note
);
10431 if (note
->namesz
== 6
10432 && strcmp (note
->namedata
, "LINUX") == 0)
10433 return elfcore_grok_aarch_sve (abfd
, note
);
10437 case NT_ARM_PAC_MASK
:
10438 if (note
->namesz
== 6
10439 && strcmp (note
->namedata
, "LINUX") == 0)
10440 return elfcore_grok_aarch_pauth (abfd
, note
);
10446 if (bed
->elf_backend_grok_psinfo
)
10447 if ((*bed
->elf_backend_grok_psinfo
) (abfd
, note
))
10449 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10450 return elfcore_grok_psinfo (abfd
, note
);
10456 return elfcore_make_auxv_note_section (abfd
, note
, 0);
10459 return elfcore_make_note_pseudosection (abfd
, ".note.linuxcore.file",
10463 return elfcore_make_note_pseudosection (abfd
, ".note.linuxcore.siginfo",
10470 elfobj_grok_gnu_build_id (bfd
*abfd
, Elf_Internal_Note
*note
)
10472 struct bfd_build_id
* build_id
;
10474 if (note
->descsz
== 0)
10477 build_id
= bfd_alloc (abfd
, sizeof (struct bfd_build_id
) - 1 + note
->descsz
);
10478 if (build_id
== NULL
)
10481 build_id
->size
= note
->descsz
;
10482 memcpy (build_id
->data
, note
->descdata
, note
->descsz
);
10483 abfd
->build_id
= build_id
;
10489 elfobj_grok_gnu_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10491 switch (note
->type
)
10496 case NT_GNU_PROPERTY_TYPE_0
:
10497 return _bfd_elf_parse_gnu_properties (abfd
, note
);
10499 case NT_GNU_BUILD_ID
:
10500 return elfobj_grok_gnu_build_id (abfd
, note
);
10505 elfobj_grok_stapsdt_note_1 (bfd
*abfd
, Elf_Internal_Note
*note
)
10507 struct sdt_note
*cur
=
10508 (struct sdt_note
*) bfd_alloc (abfd
,
10509 sizeof (struct sdt_note
) + note
->descsz
);
10511 cur
->next
= (struct sdt_note
*) (elf_tdata (abfd
))->sdt_note_head
;
10512 cur
->size
= (bfd_size_type
) note
->descsz
;
10513 memcpy (cur
->data
, note
->descdata
, note
->descsz
);
10515 elf_tdata (abfd
)->sdt_note_head
= cur
;
10521 elfobj_grok_stapsdt_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10523 switch (note
->type
)
10526 return elfobj_grok_stapsdt_note_1 (abfd
, note
);
10534 elfcore_grok_freebsd_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
10538 switch (elf_elfheader (abfd
)->e_ident
[EI_CLASS
])
10541 if (note
->descsz
< 108)
10546 if (note
->descsz
< 120)
10554 /* Check for version 1 in pr_version. */
10555 if (bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
) != 1)
10560 /* Skip over pr_psinfosz. */
10561 if (elf_elfheader (abfd
)->e_ident
[EI_CLASS
] == ELFCLASS32
)
10565 offset
+= 4; /* Padding before pr_psinfosz. */
10569 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10570 elf_tdata (abfd
)->core
->program
10571 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ offset
, 17);
10574 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10575 elf_tdata (abfd
)->core
->command
10576 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ offset
, 81);
10579 /* Padding before pr_pid. */
10582 /* The pr_pid field was added in version "1a". */
10583 if (note
->descsz
< offset
+ 4)
10586 elf_tdata (abfd
)->core
->pid
10587 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ offset
);
10593 elfcore_grok_freebsd_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
10599 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10600 Also compute minimum size of this note. */
10601 switch (elf_elfheader (abfd
)->e_ident
[EI_CLASS
])
10605 min_size
= offset
+ (4 * 2) + 4 + 4 + 4;
10609 offset
= 4 + 4 + 8; /* Includes padding before pr_statussz. */
10610 min_size
= offset
+ (8 * 2) + 4 + 4 + 4 + 4;
10617 if (note
->descsz
< min_size
)
10620 /* Check for version 1 in pr_version. */
10621 if (bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
) != 1)
10624 /* Extract size of pr_reg from pr_gregsetsz. */
10625 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10626 if (elf_elfheader (abfd
)->e_ident
[EI_CLASS
] == ELFCLASS32
)
10628 size
= bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ offset
);
10633 size
= bfd_h_get_64 (abfd
, (bfd_byte
*) note
->descdata
+ offset
);
10637 /* Skip over pr_osreldate. */
10640 /* Read signal from pr_cursig. */
10641 if (elf_tdata (abfd
)->core
->signal
== 0)
10642 elf_tdata (abfd
)->core
->signal
10643 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ offset
);
10646 /* Read TID from pr_pid. */
10647 elf_tdata (abfd
)->core
->lwpid
10648 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ offset
);
10651 /* Padding before pr_reg. */
10652 if (elf_elfheader (abfd
)->e_ident
[EI_CLASS
] == ELFCLASS64
)
10655 /* Make sure that there is enough data remaining in the note. */
10656 if ((note
->descsz
- offset
) < size
)
10659 /* Make a ".reg/999" section and a ".reg" section. */
10660 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
10661 size
, note
->descpos
+ offset
);
10665 elfcore_grok_freebsd_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10667 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
10669 switch (note
->type
)
10672 if (bed
->elf_backend_grok_freebsd_prstatus
)
10673 if ((*bed
->elf_backend_grok_freebsd_prstatus
) (abfd
, note
))
10675 return elfcore_grok_freebsd_prstatus (abfd
, note
);
10678 return elfcore_grok_prfpreg (abfd
, note
);
10681 return elfcore_grok_freebsd_psinfo (abfd
, note
);
10683 case NT_FREEBSD_THRMISC
:
10684 if (note
->namesz
== 8)
10685 return elfcore_make_note_pseudosection (abfd
, ".thrmisc", note
);
10689 case NT_FREEBSD_PROCSTAT_PROC
:
10690 return elfcore_make_note_pseudosection (abfd
, ".note.freebsdcore.proc",
10693 case NT_FREEBSD_PROCSTAT_FILES
:
10694 return elfcore_make_note_pseudosection (abfd
, ".note.freebsdcore.files",
10697 case NT_FREEBSD_PROCSTAT_VMMAP
:
10698 return elfcore_make_note_pseudosection (abfd
, ".note.freebsdcore.vmmap",
10701 case NT_FREEBSD_PROCSTAT_AUXV
:
10702 return elfcore_make_auxv_note_section (abfd
, note
, 4);
10704 case NT_X86_XSTATE
:
10705 if (note
->namesz
== 8)
10706 return elfcore_grok_xstatereg (abfd
, note
);
10710 case NT_FREEBSD_PTLWPINFO
:
10711 return elfcore_make_note_pseudosection (abfd
, ".note.freebsdcore.lwpinfo",
10715 return elfcore_grok_arm_vfp (abfd
, note
);
10723 elfcore_netbsd_get_lwpid (Elf_Internal_Note
*note
, int *lwpidp
)
10727 cp
= strchr (note
->namedata
, '@');
10730 *lwpidp
= atoi(cp
+ 1);
10737 elfcore_grok_netbsd_procinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
10739 if (note
->descsz
<= 0x7c + 31)
10742 /* Signal number at offset 0x08. */
10743 elf_tdata (abfd
)->core
->signal
10744 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ 0x08);
10746 /* Process ID at offset 0x50. */
10747 elf_tdata (abfd
)->core
->pid
10748 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ 0x50);
10750 /* Command name at 0x7c (max 32 bytes, including nul). */
10751 elf_tdata (abfd
)->core
->command
10752 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 0x7c, 31);
10754 return elfcore_make_note_pseudosection (abfd
, ".note.netbsdcore.procinfo",
10759 elfcore_grok_netbsd_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10763 if (elfcore_netbsd_get_lwpid (note
, &lwp
))
10764 elf_tdata (abfd
)->core
->lwpid
= lwp
;
10766 switch (note
->type
)
10768 case NT_NETBSDCORE_PROCINFO
:
10769 /* NetBSD-specific core "procinfo". Note that we expect to
10770 find this note before any of the others, which is fine,
10771 since the kernel writes this note out first when it
10772 creates a core file. */
10773 return elfcore_grok_netbsd_procinfo (abfd
, note
);
10774 #ifdef NT_NETBSDCORE_AUXV
10775 case NT_NETBSDCORE_AUXV
:
10776 /* NetBSD-specific Elf Auxiliary Vector data. */
10777 return elfcore_make_auxv_note_section (abfd
, note
, 4);
10779 #ifdef NT_NETBSDCORE_LWPSTATUS
10780 case NT_NETBSDCORE_LWPSTATUS
:
10781 return elfcore_make_note_pseudosection (abfd
,
10782 ".note.netbsdcore.lwpstatus",
10789 /* As of March 2020 there are no other machine-independent notes
10790 defined for NetBSD core files. If the note type is less
10791 than the start of the machine-dependent note types, we don't
10794 if (note
->type
< NT_NETBSDCORE_FIRSTMACH
)
10798 switch (bfd_get_arch (abfd
))
10800 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10801 PT_GETFPREGS == mach+2. */
10803 case bfd_arch_aarch64
:
10804 case bfd_arch_alpha
:
10805 case bfd_arch_sparc
:
10806 switch (note
->type
)
10808 case NT_NETBSDCORE_FIRSTMACH
+0:
10809 return elfcore_make_note_pseudosection (abfd
, ".reg", note
);
10811 case NT_NETBSDCORE_FIRSTMACH
+2:
10812 return elfcore_make_note_pseudosection (abfd
, ".reg2", note
);
10818 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10819 There's also old PT___GETREGS40 == mach + 1 for old reg
10820 structure which lacks GBR. */
10823 switch (note
->type
)
10825 case NT_NETBSDCORE_FIRSTMACH
+3:
10826 return elfcore_make_note_pseudosection (abfd
, ".reg", note
);
10828 case NT_NETBSDCORE_FIRSTMACH
+5:
10829 return elfcore_make_note_pseudosection (abfd
, ".reg2", note
);
10835 /* On all other arch's, PT_GETREGS == mach+1 and
10836 PT_GETFPREGS == mach+3. */
10839 switch (note
->type
)
10841 case NT_NETBSDCORE_FIRSTMACH
+1:
10842 return elfcore_make_note_pseudosection (abfd
, ".reg", note
);
10844 case NT_NETBSDCORE_FIRSTMACH
+3:
10845 return elfcore_make_note_pseudosection (abfd
, ".reg2", note
);
10855 elfcore_grok_openbsd_procinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
10857 if (note
->descsz
<= 0x48 + 31)
10860 /* Signal number at offset 0x08. */
10861 elf_tdata (abfd
)->core
->signal
10862 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ 0x08);
10864 /* Process ID at offset 0x20. */
10865 elf_tdata (abfd
)->core
->pid
10866 = bfd_h_get_32 (abfd
, (bfd_byte
*) note
->descdata
+ 0x20);
10868 /* Command name at 0x48 (max 32 bytes, including nul). */
10869 elf_tdata (abfd
)->core
->command
10870 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 0x48, 31);
10876 elfcore_grok_openbsd_note (bfd
*abfd
, Elf_Internal_Note
*note
)
10878 if (note
->type
== NT_OPENBSD_PROCINFO
)
10879 return elfcore_grok_openbsd_procinfo (abfd
, note
);
10881 if (note
->type
== NT_OPENBSD_REGS
)
10882 return elfcore_make_note_pseudosection (abfd
, ".reg", note
);
10884 if (note
->type
== NT_OPENBSD_FPREGS
)
10885 return elfcore_make_note_pseudosection (abfd
, ".reg2", note
);
10887 if (note
->type
== NT_OPENBSD_XFPREGS
)
10888 return elfcore_make_note_pseudosection (abfd
, ".reg-xfp", note
);
10890 if (note
->type
== NT_OPENBSD_AUXV
)
10891 return elfcore_make_auxv_note_section (abfd
, note
, 0);
10893 if (note
->type
== NT_OPENBSD_WCOOKIE
)
10895 asection
*sect
= bfd_make_section_anyway_with_flags (abfd
, ".wcookie",
10900 sect
->size
= note
->descsz
;
10901 sect
->filepos
= note
->descpos
;
10902 sect
->alignment_power
= 1 + bfd_get_arch_size (abfd
) / 32;
10911 elfcore_grok_nto_status (bfd
*abfd
, Elf_Internal_Note
*note
, long *tid
)
10913 void *ddata
= note
->descdata
;
10920 if (note
->descsz
< 16)
10923 /* nto_procfs_status 'pid' field is at offset 0. */
10924 elf_tdata (abfd
)->core
->pid
= bfd_get_32 (abfd
, (bfd_byte
*) ddata
);
10926 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
10927 *tid
= bfd_get_32 (abfd
, (bfd_byte
*) ddata
+ 4);
10929 /* nto_procfs_status 'flags' field is at offset 8. */
10930 flags
= bfd_get_32 (abfd
, (bfd_byte
*) ddata
+ 8);
10932 /* nto_procfs_status 'what' field is at offset 14. */
10933 if ((sig
= bfd_get_16 (abfd
, (bfd_byte
*) ddata
+ 14)) > 0)
10935 elf_tdata (abfd
)->core
->signal
= sig
;
10936 elf_tdata (abfd
)->core
->lwpid
= *tid
;
10939 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
10940 do not come from signals so we make sure we set the current
10941 thread just in case. */
10942 if (flags
& 0x00000080)
10943 elf_tdata (abfd
)->core
->lwpid
= *tid
;
10945 /* Make a ".qnx_core_status/%d" section. */
10946 sprintf (buf
, ".qnx_core_status/%ld", *tid
);
10948 name
= (char *) bfd_alloc (abfd
, strlen (buf
) + 1);
10951 strcpy (name
, buf
);
10953 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10957 sect
->size
= note
->descsz
;
10958 sect
->filepos
= note
->descpos
;
10959 sect
->alignment_power
= 2;
10961 return (elfcore_maybe_make_sect (abfd
, ".qnx_core_status", sect
));
10965 elfcore_grok_nto_regs (bfd
*abfd
,
10966 Elf_Internal_Note
*note
,
10974 /* Make a "(base)/%d" section. */
10975 sprintf (buf
, "%s/%ld", base
, tid
);
10977 name
= (char *) bfd_alloc (abfd
, strlen (buf
) + 1);
10980 strcpy (name
, buf
);
10982 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
10986 sect
->size
= note
->descsz
;
10987 sect
->filepos
= note
->descpos
;
10988 sect
->alignment_power
= 2;
10990 /* This is the current thread. */
10991 if (elf_tdata (abfd
)->core
->lwpid
== tid
)
10992 return elfcore_maybe_make_sect (abfd
, base
, sect
);
10997 #define BFD_QNT_CORE_INFO 7
10998 #define BFD_QNT_CORE_STATUS 8
10999 #define BFD_QNT_CORE_GREG 9
11000 #define BFD_QNT_CORE_FPREG 10
11003 elfcore_grok_nto_note (bfd
*abfd
, Elf_Internal_Note
*note
)
11005 /* Every GREG section has a STATUS section before it. Store the
11006 tid from the previous call to pass down to the next gregs
11008 static long tid
= 1;
11010 switch (note
->type
)
11012 case BFD_QNT_CORE_INFO
:
11013 return elfcore_make_note_pseudosection (abfd
, ".qnx_core_info", note
);
11014 case BFD_QNT_CORE_STATUS
:
11015 return elfcore_grok_nto_status (abfd
, note
, &tid
);
11016 case BFD_QNT_CORE_GREG
:
11017 return elfcore_grok_nto_regs (abfd
, note
, tid
, ".reg");
11018 case BFD_QNT_CORE_FPREG
:
11019 return elfcore_grok_nto_regs (abfd
, note
, tid
, ".reg2");
11026 elfcore_grok_spu_note (bfd
*abfd
, Elf_Internal_Note
*note
)
11032 /* Use note name as section name. */
11033 len
= note
->namesz
;
11034 name
= (char *) bfd_alloc (abfd
, len
);
11037 memcpy (name
, note
->namedata
, len
);
11038 name
[len
- 1] = '\0';
11040 sect
= bfd_make_section_anyway_with_flags (abfd
, name
, SEC_HAS_CONTENTS
);
11044 sect
->size
= note
->descsz
;
11045 sect
->filepos
= note
->descpos
;
11046 sect
->alignment_power
= 1;
11051 /* Function: elfcore_write_note
11054 buffer to hold note, and current size of buffer
11058 size of data for note
11060 Writes note to end of buffer. ELF64 notes are written exactly as
11061 for ELF32, despite the current (as of 2006) ELF gabi specifying
11062 that they ought to have 8-byte namesz and descsz field, and have
11063 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11066 Pointer to realloc'd buffer, *BUFSIZ updated. */
11069 elfcore_write_note (bfd
*abfd
,
11077 Elf_External_Note
*xnp
;
11084 namesz
= strlen (name
) + 1;
11086 newspace
= 12 + ((namesz
+ 3) & -4) + ((size
+ 3) & -4);
11088 buf
= (char *) realloc (buf
, *bufsiz
+ newspace
);
11091 dest
= buf
+ *bufsiz
;
11092 *bufsiz
+= newspace
;
11093 xnp
= (Elf_External_Note
*) dest
;
11094 H_PUT_32 (abfd
, namesz
, xnp
->namesz
);
11095 H_PUT_32 (abfd
, size
, xnp
->descsz
);
11096 H_PUT_32 (abfd
, type
, xnp
->type
);
11100 memcpy (dest
, name
, namesz
);
11108 memcpy (dest
, input
, size
);
11118 /* gcc-8 warns (*) on all the strncpy calls in this function about
11119 possible string truncation. The "truncation" is not a bug. We
11120 have an external representation of structs with fields that are not
11121 necessarily NULL terminated and corresponding internal
11122 representation fields that are one larger so that they can always
11123 be NULL terminated.
11124 gcc versions between 4.2 and 4.6 do not allow pragma control of
11125 diagnostics inside functions, giving a hard error if you try to use
11126 the finer control available with later versions.
11127 gcc prior to 4.2 warns about diagnostic push and pop.
11128 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11129 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11130 (*) Depending on your system header files! */
11131 #if GCC_VERSION >= 8000
11132 # pragma GCC diagnostic push
11133 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11136 elfcore_write_prpsinfo (bfd
*abfd
,
11140 const char *psargs
)
11142 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
11144 if (bed
->elf_backend_write_core_note
!= NULL
)
11147 ret
= (*bed
->elf_backend_write_core_note
) (abfd
, buf
, bufsiz
,
11148 NT_PRPSINFO
, fname
, psargs
);
11153 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11154 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11155 if (bed
->s
->elfclass
== ELFCLASS32
)
11157 # if defined (HAVE_PSINFO32_T)
11159 int note_type
= NT_PSINFO
;
11162 int note_type
= NT_PRPSINFO
;
11165 memset (&data
, 0, sizeof (data
));
11166 strncpy (data
.pr_fname
, fname
, sizeof (data
.pr_fname
));
11167 strncpy (data
.pr_psargs
, psargs
, sizeof (data
.pr_psargs
));
11168 return elfcore_write_note (abfd
, buf
, bufsiz
,
11169 "CORE", note_type
, &data
, sizeof (data
));
11174 # if defined (HAVE_PSINFO_T)
11176 int note_type
= NT_PSINFO
;
11179 int note_type
= NT_PRPSINFO
;
11182 memset (&data
, 0, sizeof (data
));
11183 strncpy (data
.pr_fname
, fname
, sizeof (data
.pr_fname
));
11184 strncpy (data
.pr_psargs
, psargs
, sizeof (data
.pr_psargs
));
11185 return elfcore_write_note (abfd
, buf
, bufsiz
,
11186 "CORE", note_type
, &data
, sizeof (data
));
11188 #endif /* PSINFO_T or PRPSINFO_T */
11193 #if GCC_VERSION >= 8000
11194 # pragma GCC diagnostic pop
11198 elfcore_write_linux_prpsinfo32
11199 (bfd
*abfd
, char *buf
, int *bufsiz
,
11200 const struct elf_internal_linux_prpsinfo
*prpsinfo
)
11202 if (get_elf_backend_data (abfd
)->linux_prpsinfo32_ugid16
)
11204 struct elf_external_linux_prpsinfo32_ugid16 data
;
11206 swap_linux_prpsinfo32_ugid16_out (abfd
, prpsinfo
, &data
);
11207 return elfcore_write_note (abfd
, buf
, bufsiz
, "CORE", NT_PRPSINFO
,
11208 &data
, sizeof (data
));
11212 struct elf_external_linux_prpsinfo32_ugid32 data
;
11214 swap_linux_prpsinfo32_ugid32_out (abfd
, prpsinfo
, &data
);
11215 return elfcore_write_note (abfd
, buf
, bufsiz
, "CORE", NT_PRPSINFO
,
11216 &data
, sizeof (data
));
11221 elfcore_write_linux_prpsinfo64
11222 (bfd
*abfd
, char *buf
, int *bufsiz
,
11223 const struct elf_internal_linux_prpsinfo
*prpsinfo
)
11225 if (get_elf_backend_data (abfd
)->linux_prpsinfo64_ugid16
)
11227 struct elf_external_linux_prpsinfo64_ugid16 data
;
11229 swap_linux_prpsinfo64_ugid16_out (abfd
, prpsinfo
, &data
);
11230 return elfcore_write_note (abfd
, buf
, bufsiz
,
11231 "CORE", NT_PRPSINFO
, &data
, sizeof (data
));
11235 struct elf_external_linux_prpsinfo64_ugid32 data
;
11237 swap_linux_prpsinfo64_ugid32_out (abfd
, prpsinfo
, &data
);
11238 return elfcore_write_note (abfd
, buf
, bufsiz
,
11239 "CORE", NT_PRPSINFO
, &data
, sizeof (data
));
11244 elfcore_write_prstatus (bfd
*abfd
,
11251 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
11253 if (bed
->elf_backend_write_core_note
!= NULL
)
11256 ret
= (*bed
->elf_backend_write_core_note
) (abfd
, buf
, bufsiz
,
11258 pid
, cursig
, gregs
);
11263 #if defined (HAVE_PRSTATUS_T)
11264 #if defined (HAVE_PRSTATUS32_T)
11265 if (bed
->s
->elfclass
== ELFCLASS32
)
11267 prstatus32_t prstat
;
11269 memset (&prstat
, 0, sizeof (prstat
));
11270 prstat
.pr_pid
= pid
;
11271 prstat
.pr_cursig
= cursig
;
11272 memcpy (&prstat
.pr_reg
, gregs
, sizeof (prstat
.pr_reg
));
11273 return elfcore_write_note (abfd
, buf
, bufsiz
, "CORE",
11274 NT_PRSTATUS
, &prstat
, sizeof (prstat
));
11281 memset (&prstat
, 0, sizeof (prstat
));
11282 prstat
.pr_pid
= pid
;
11283 prstat
.pr_cursig
= cursig
;
11284 memcpy (&prstat
.pr_reg
, gregs
, sizeof (prstat
.pr_reg
));
11285 return elfcore_write_note (abfd
, buf
, bufsiz
, "CORE",
11286 NT_PRSTATUS
, &prstat
, sizeof (prstat
));
11288 #endif /* HAVE_PRSTATUS_T */
11294 #if defined (HAVE_LWPSTATUS_T)
11296 elfcore_write_lwpstatus (bfd
*abfd
,
11303 lwpstatus_t lwpstat
;
11304 const char *note_name
= "CORE";
11306 memset (&lwpstat
, 0, sizeof (lwpstat
));
11307 lwpstat
.pr_lwpid
= pid
>> 16;
11308 lwpstat
.pr_cursig
= cursig
;
11309 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11310 memcpy (&lwpstat
.pr_reg
, gregs
, sizeof (lwpstat
.pr_reg
));
11311 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11312 #if !defined(gregs)
11313 memcpy (lwpstat
.pr_context
.uc_mcontext
.gregs
,
11314 gregs
, sizeof (lwpstat
.pr_context
.uc_mcontext
.gregs
));
11316 memcpy (lwpstat
.pr_context
.uc_mcontext
.__gregs
,
11317 gregs
, sizeof (lwpstat
.pr_context
.uc_mcontext
.__gregs
));
11320 return elfcore_write_note (abfd
, buf
, bufsiz
, note_name
,
11321 NT_LWPSTATUS
, &lwpstat
, sizeof (lwpstat
));
11323 #endif /* HAVE_LWPSTATUS_T */
11325 #if defined (HAVE_PSTATUS_T)
11327 elfcore_write_pstatus (bfd
*abfd
,
11331 int cursig ATTRIBUTE_UNUSED
,
11332 const void *gregs ATTRIBUTE_UNUSED
)
11334 const char *note_name
= "CORE";
11335 #if defined (HAVE_PSTATUS32_T)
11336 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
11338 if (bed
->s
->elfclass
== ELFCLASS32
)
11342 memset (&pstat
, 0, sizeof (pstat
));
11343 pstat
.pr_pid
= pid
& 0xffff;
11344 buf
= elfcore_write_note (abfd
, buf
, bufsiz
, note_name
,
11345 NT_PSTATUS
, &pstat
, sizeof (pstat
));
11353 memset (&pstat
, 0, sizeof (pstat
));
11354 pstat
.pr_pid
= pid
& 0xffff;
11355 buf
= elfcore_write_note (abfd
, buf
, bufsiz
, note_name
,
11356 NT_PSTATUS
, &pstat
, sizeof (pstat
));
11360 #endif /* HAVE_PSTATUS_T */
11363 elfcore_write_prfpreg (bfd
*abfd
,
11366 const void *fpregs
,
11369 const char *note_name
= "CORE";
11370 return elfcore_write_note (abfd
, buf
, bufsiz
,
11371 note_name
, NT_FPREGSET
, fpregs
, size
);
11375 elfcore_write_prxfpreg (bfd
*abfd
,
11378 const void *xfpregs
,
11381 char *note_name
= "LINUX";
11382 return elfcore_write_note (abfd
, buf
, bufsiz
,
11383 note_name
, NT_PRXFPREG
, xfpregs
, size
);
11387 elfcore_write_xstatereg (bfd
*abfd
, char *buf
, int *bufsiz
,
11388 const void *xfpregs
, int size
)
11391 if (get_elf_backend_data (abfd
)->elf_osabi
== ELFOSABI_FREEBSD
)
11392 note_name
= "FreeBSD";
11394 note_name
= "LINUX";
11395 return elfcore_write_note (abfd
, buf
, bufsiz
,
11396 note_name
, NT_X86_XSTATE
, xfpregs
, size
);
11400 elfcore_write_ppc_vmx (bfd
*abfd
,
11403 const void *ppc_vmx
,
11406 char *note_name
= "LINUX";
11407 return elfcore_write_note (abfd
, buf
, bufsiz
,
11408 note_name
, NT_PPC_VMX
, ppc_vmx
, size
);
11412 elfcore_write_ppc_vsx (bfd
*abfd
,
11415 const void *ppc_vsx
,
11418 char *note_name
= "LINUX";
11419 return elfcore_write_note (abfd
, buf
, bufsiz
,
11420 note_name
, NT_PPC_VSX
, ppc_vsx
, size
);
11424 elfcore_write_ppc_tar (bfd
*abfd
,
11427 const void *ppc_tar
,
11430 char *note_name
= "LINUX";
11431 return elfcore_write_note (abfd
, buf
, bufsiz
,
11432 note_name
, NT_PPC_TAR
, ppc_tar
, size
);
11436 elfcore_write_ppc_ppr (bfd
*abfd
,
11439 const void *ppc_ppr
,
11442 char *note_name
= "LINUX";
11443 return elfcore_write_note (abfd
, buf
, bufsiz
,
11444 note_name
, NT_PPC_PPR
, ppc_ppr
, size
);
11448 elfcore_write_ppc_dscr (bfd
*abfd
,
11451 const void *ppc_dscr
,
11454 char *note_name
= "LINUX";
11455 return elfcore_write_note (abfd
, buf
, bufsiz
,
11456 note_name
, NT_PPC_DSCR
, ppc_dscr
, size
);
11460 elfcore_write_ppc_ebb (bfd
*abfd
,
11463 const void *ppc_ebb
,
11466 char *note_name
= "LINUX";
11467 return elfcore_write_note (abfd
, buf
, bufsiz
,
11468 note_name
, NT_PPC_EBB
, ppc_ebb
, size
);
11472 elfcore_write_ppc_pmu (bfd
*abfd
,
11475 const void *ppc_pmu
,
11478 char *note_name
= "LINUX";
11479 return elfcore_write_note (abfd
, buf
, bufsiz
,
11480 note_name
, NT_PPC_PMU
, ppc_pmu
, size
);
11484 elfcore_write_ppc_tm_cgpr (bfd
*abfd
,
11487 const void *ppc_tm_cgpr
,
11490 char *note_name
= "LINUX";
11491 return elfcore_write_note (abfd
, buf
, bufsiz
,
11492 note_name
, NT_PPC_TM_CGPR
, ppc_tm_cgpr
, size
);
11496 elfcore_write_ppc_tm_cfpr (bfd
*abfd
,
11499 const void *ppc_tm_cfpr
,
11502 char *note_name
= "LINUX";
11503 return elfcore_write_note (abfd
, buf
, bufsiz
,
11504 note_name
, NT_PPC_TM_CFPR
, ppc_tm_cfpr
, size
);
11508 elfcore_write_ppc_tm_cvmx (bfd
*abfd
,
11511 const void *ppc_tm_cvmx
,
11514 char *note_name
= "LINUX";
11515 return elfcore_write_note (abfd
, buf
, bufsiz
,
11516 note_name
, NT_PPC_TM_CVMX
, ppc_tm_cvmx
, size
);
11520 elfcore_write_ppc_tm_cvsx (bfd
*abfd
,
11523 const void *ppc_tm_cvsx
,
11526 char *note_name
= "LINUX";
11527 return elfcore_write_note (abfd
, buf
, bufsiz
,
11528 note_name
, NT_PPC_TM_CVSX
, ppc_tm_cvsx
, size
);
11532 elfcore_write_ppc_tm_spr (bfd
*abfd
,
11535 const void *ppc_tm_spr
,
11538 char *note_name
= "LINUX";
11539 return elfcore_write_note (abfd
, buf
, bufsiz
,
11540 note_name
, NT_PPC_TM_SPR
, ppc_tm_spr
, size
);
11544 elfcore_write_ppc_tm_ctar (bfd
*abfd
,
11547 const void *ppc_tm_ctar
,
11550 char *note_name
= "LINUX";
11551 return elfcore_write_note (abfd
, buf
, bufsiz
,
11552 note_name
, NT_PPC_TM_CTAR
, ppc_tm_ctar
, size
);
11556 elfcore_write_ppc_tm_cppr (bfd
*abfd
,
11559 const void *ppc_tm_cppr
,
11562 char *note_name
= "LINUX";
11563 return elfcore_write_note (abfd
, buf
, bufsiz
,
11564 note_name
, NT_PPC_TM_CPPR
, ppc_tm_cppr
, size
);
11568 elfcore_write_ppc_tm_cdscr (bfd
*abfd
,
11571 const void *ppc_tm_cdscr
,
11574 char *note_name
= "LINUX";
11575 return elfcore_write_note (abfd
, buf
, bufsiz
,
11576 note_name
, NT_PPC_TM_CDSCR
, ppc_tm_cdscr
, size
);
11580 elfcore_write_s390_high_gprs (bfd
*abfd
,
11583 const void *s390_high_gprs
,
11586 char *note_name
= "LINUX";
11587 return elfcore_write_note (abfd
, buf
, bufsiz
,
11588 note_name
, NT_S390_HIGH_GPRS
,
11589 s390_high_gprs
, size
);
11593 elfcore_write_s390_timer (bfd
*abfd
,
11596 const void *s390_timer
,
11599 char *note_name
= "LINUX";
11600 return elfcore_write_note (abfd
, buf
, bufsiz
,
11601 note_name
, NT_S390_TIMER
, s390_timer
, size
);
11605 elfcore_write_s390_todcmp (bfd
*abfd
,
11608 const void *s390_todcmp
,
11611 char *note_name
= "LINUX";
11612 return elfcore_write_note (abfd
, buf
, bufsiz
,
11613 note_name
, NT_S390_TODCMP
, s390_todcmp
, size
);
11617 elfcore_write_s390_todpreg (bfd
*abfd
,
11620 const void *s390_todpreg
,
11623 char *note_name
= "LINUX";
11624 return elfcore_write_note (abfd
, buf
, bufsiz
,
11625 note_name
, NT_S390_TODPREG
, s390_todpreg
, size
);
11629 elfcore_write_s390_ctrs (bfd
*abfd
,
11632 const void *s390_ctrs
,
11635 char *note_name
= "LINUX";
11636 return elfcore_write_note (abfd
, buf
, bufsiz
,
11637 note_name
, NT_S390_CTRS
, s390_ctrs
, size
);
11641 elfcore_write_s390_prefix (bfd
*abfd
,
11644 const void *s390_prefix
,
11647 char *note_name
= "LINUX";
11648 return elfcore_write_note (abfd
, buf
, bufsiz
,
11649 note_name
, NT_S390_PREFIX
, s390_prefix
, size
);
11653 elfcore_write_s390_last_break (bfd
*abfd
,
11656 const void *s390_last_break
,
11659 char *note_name
= "LINUX";
11660 return elfcore_write_note (abfd
, buf
, bufsiz
,
11661 note_name
, NT_S390_LAST_BREAK
,
11662 s390_last_break
, size
);
11666 elfcore_write_s390_system_call (bfd
*abfd
,
11669 const void *s390_system_call
,
11672 char *note_name
= "LINUX";
11673 return elfcore_write_note (abfd
, buf
, bufsiz
,
11674 note_name
, NT_S390_SYSTEM_CALL
,
11675 s390_system_call
, size
);
11679 elfcore_write_s390_tdb (bfd
*abfd
,
11682 const void *s390_tdb
,
11685 char *note_name
= "LINUX";
11686 return elfcore_write_note (abfd
, buf
, bufsiz
,
11687 note_name
, NT_S390_TDB
, s390_tdb
, size
);
11691 elfcore_write_s390_vxrs_low (bfd
*abfd
,
11694 const void *s390_vxrs_low
,
11697 char *note_name
= "LINUX";
11698 return elfcore_write_note (abfd
, buf
, bufsiz
,
11699 note_name
, NT_S390_VXRS_LOW
, s390_vxrs_low
, size
);
11703 elfcore_write_s390_vxrs_high (bfd
*abfd
,
11706 const void *s390_vxrs_high
,
11709 char *note_name
= "LINUX";
11710 return elfcore_write_note (abfd
, buf
, bufsiz
,
11711 note_name
, NT_S390_VXRS_HIGH
,
11712 s390_vxrs_high
, size
);
11716 elfcore_write_s390_gs_cb (bfd
*abfd
,
11719 const void *s390_gs_cb
,
11722 char *note_name
= "LINUX";
11723 return elfcore_write_note (abfd
, buf
, bufsiz
,
11724 note_name
, NT_S390_GS_CB
,
11729 elfcore_write_s390_gs_bc (bfd
*abfd
,
11732 const void *s390_gs_bc
,
11735 char *note_name
= "LINUX";
11736 return elfcore_write_note (abfd
, buf
, bufsiz
,
11737 note_name
, NT_S390_GS_BC
,
11742 elfcore_write_arm_vfp (bfd
*abfd
,
11745 const void *arm_vfp
,
11748 char *note_name
= "LINUX";
11749 return elfcore_write_note (abfd
, buf
, bufsiz
,
11750 note_name
, NT_ARM_VFP
, arm_vfp
, size
);
11754 elfcore_write_aarch_tls (bfd
*abfd
,
11757 const void *aarch_tls
,
11760 char *note_name
= "LINUX";
11761 return elfcore_write_note (abfd
, buf
, bufsiz
,
11762 note_name
, NT_ARM_TLS
, aarch_tls
, size
);
11766 elfcore_write_aarch_hw_break (bfd
*abfd
,
11769 const void *aarch_hw_break
,
11772 char *note_name
= "LINUX";
11773 return elfcore_write_note (abfd
, buf
, bufsiz
,
11774 note_name
, NT_ARM_HW_BREAK
, aarch_hw_break
, size
);
11778 elfcore_write_aarch_hw_watch (bfd
*abfd
,
11781 const void *aarch_hw_watch
,
11784 char *note_name
= "LINUX";
11785 return elfcore_write_note (abfd
, buf
, bufsiz
,
11786 note_name
, NT_ARM_HW_WATCH
, aarch_hw_watch
, size
);
11790 elfcore_write_aarch_sve (bfd
*abfd
,
11793 const void *aarch_sve
,
11796 char *note_name
= "LINUX";
11797 return elfcore_write_note (abfd
, buf
, bufsiz
,
11798 note_name
, NT_ARM_SVE
, aarch_sve
, size
);
11802 elfcore_write_aarch_pauth (bfd
*abfd
,
11805 const void *aarch_pauth
,
11808 char *note_name
= "LINUX";
11809 return elfcore_write_note (abfd
, buf
, bufsiz
,
11810 note_name
, NT_ARM_PAC_MASK
, aarch_pauth
, size
);
11814 elfcore_write_register_note (bfd
*abfd
,
11817 const char *section
,
11821 if (strcmp (section
, ".reg2") == 0)
11822 return elfcore_write_prfpreg (abfd
, buf
, bufsiz
, data
, size
);
11823 if (strcmp (section
, ".reg-xfp") == 0)
11824 return elfcore_write_prxfpreg (abfd
, buf
, bufsiz
, data
, size
);
11825 if (strcmp (section
, ".reg-xstate") == 0)
11826 return elfcore_write_xstatereg (abfd
, buf
, bufsiz
, data
, size
);
11827 if (strcmp (section
, ".reg-ppc-vmx") == 0)
11828 return elfcore_write_ppc_vmx (abfd
, buf
, bufsiz
, data
, size
);
11829 if (strcmp (section
, ".reg-ppc-vsx") == 0)
11830 return elfcore_write_ppc_vsx (abfd
, buf
, bufsiz
, data
, size
);
11831 if (strcmp (section
, ".reg-ppc-tar") == 0)
11832 return elfcore_write_ppc_tar (abfd
, buf
, bufsiz
, data
, size
);
11833 if (strcmp (section
, ".reg-ppc-ppr") == 0)
11834 return elfcore_write_ppc_ppr (abfd
, buf
, bufsiz
, data
, size
);
11835 if (strcmp (section
, ".reg-ppc-dscr") == 0)
11836 return elfcore_write_ppc_dscr (abfd
, buf
, bufsiz
, data
, size
);
11837 if (strcmp (section
, ".reg-ppc-ebb") == 0)
11838 return elfcore_write_ppc_ebb (abfd
, buf
, bufsiz
, data
, size
);
11839 if (strcmp (section
, ".reg-ppc-pmu") == 0)
11840 return elfcore_write_ppc_pmu (abfd
, buf
, bufsiz
, data
, size
);
11841 if (strcmp (section
, ".reg-ppc-tm-cgpr") == 0)
11842 return elfcore_write_ppc_tm_cgpr (abfd
, buf
, bufsiz
, data
, size
);
11843 if (strcmp (section
, ".reg-ppc-tm-cfpr") == 0)
11844 return elfcore_write_ppc_tm_cfpr (abfd
, buf
, bufsiz
, data
, size
);
11845 if (strcmp (section
, ".reg-ppc-tm-cvmx") == 0)
11846 return elfcore_write_ppc_tm_cvmx (abfd
, buf
, bufsiz
, data
, size
);
11847 if (strcmp (section
, ".reg-ppc-tm-cvsx") == 0)
11848 return elfcore_write_ppc_tm_cvsx (abfd
, buf
, bufsiz
, data
, size
);
11849 if (strcmp (section
, ".reg-ppc-tm-spr") == 0)
11850 return elfcore_write_ppc_tm_spr (abfd
, buf
, bufsiz
, data
, size
);
11851 if (strcmp (section
, ".reg-ppc-tm-ctar") == 0)
11852 return elfcore_write_ppc_tm_ctar (abfd
, buf
, bufsiz
, data
, size
);
11853 if (strcmp (section
, ".reg-ppc-tm-cppr") == 0)
11854 return elfcore_write_ppc_tm_cppr (abfd
, buf
, bufsiz
, data
, size
);
11855 if (strcmp (section
, ".reg-ppc-tm-cdscr") == 0)
11856 return elfcore_write_ppc_tm_cdscr (abfd
, buf
, bufsiz
, data
, size
);
11857 if (strcmp (section
, ".reg-s390-high-gprs") == 0)
11858 return elfcore_write_s390_high_gprs (abfd
, buf
, bufsiz
, data
, size
);
11859 if (strcmp (section
, ".reg-s390-timer") == 0)
11860 return elfcore_write_s390_timer (abfd
, buf
, bufsiz
, data
, size
);
11861 if (strcmp (section
, ".reg-s390-todcmp") == 0)
11862 return elfcore_write_s390_todcmp (abfd
, buf
, bufsiz
, data
, size
);
11863 if (strcmp (section
, ".reg-s390-todpreg") == 0)
11864 return elfcore_write_s390_todpreg (abfd
, buf
, bufsiz
, data
, size
);
11865 if (strcmp (section
, ".reg-s390-ctrs") == 0)
11866 return elfcore_write_s390_ctrs (abfd
, buf
, bufsiz
, data
, size
);
11867 if (strcmp (section
, ".reg-s390-prefix") == 0)
11868 return elfcore_write_s390_prefix (abfd
, buf
, bufsiz
, data
, size
);
11869 if (strcmp (section
, ".reg-s390-last-break") == 0)
11870 return elfcore_write_s390_last_break (abfd
, buf
, bufsiz
, data
, size
);
11871 if (strcmp (section
, ".reg-s390-system-call") == 0)
11872 return elfcore_write_s390_system_call (abfd
, buf
, bufsiz
, data
, size
);
11873 if (strcmp (section
, ".reg-s390-tdb") == 0)
11874 return elfcore_write_s390_tdb (abfd
, buf
, bufsiz
, data
, size
);
11875 if (strcmp (section
, ".reg-s390-vxrs-low") == 0)
11876 return elfcore_write_s390_vxrs_low (abfd
, buf
, bufsiz
, data
, size
);
11877 if (strcmp (section
, ".reg-s390-vxrs-high") == 0)
11878 return elfcore_write_s390_vxrs_high (abfd
, buf
, bufsiz
, data
, size
);
11879 if (strcmp (section
, ".reg-s390-gs-cb") == 0)
11880 return elfcore_write_s390_gs_cb (abfd
, buf
, bufsiz
, data
, size
);
11881 if (strcmp (section
, ".reg-s390-gs-bc") == 0)
11882 return elfcore_write_s390_gs_bc (abfd
, buf
, bufsiz
, data
, size
);
11883 if (strcmp (section
, ".reg-arm-vfp") == 0)
11884 return elfcore_write_arm_vfp (abfd
, buf
, bufsiz
, data
, size
);
11885 if (strcmp (section
, ".reg-aarch-tls") == 0)
11886 return elfcore_write_aarch_tls (abfd
, buf
, bufsiz
, data
, size
);
11887 if (strcmp (section
, ".reg-aarch-hw-break") == 0)
11888 return elfcore_write_aarch_hw_break (abfd
, buf
, bufsiz
, data
, size
);
11889 if (strcmp (section
, ".reg-aarch-hw-watch") == 0)
11890 return elfcore_write_aarch_hw_watch (abfd
, buf
, bufsiz
, data
, size
);
11891 if (strcmp (section
, ".reg-aarch-sve") == 0)
11892 return elfcore_write_aarch_sve (abfd
, buf
, bufsiz
, data
, size
);
11893 if (strcmp (section
, ".reg-aarch-pauth") == 0)
11894 return elfcore_write_aarch_pauth (abfd
, buf
, bufsiz
, data
, size
);
11899 elf_parse_notes (bfd
*abfd
, char *buf
, size_t size
, file_ptr offset
,
11904 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11905 gABI specifies that PT_NOTE alignment should be aligned to 4
11906 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11907 align is less than 4, we use 4 byte alignment. */
11910 if (align
!= 4 && align
!= 8)
11914 while (p
< buf
+ size
)
11916 Elf_External_Note
*xnp
= (Elf_External_Note
*) p
;
11917 Elf_Internal_Note in
;
11919 if (offsetof (Elf_External_Note
, name
) > buf
- p
+ size
)
11922 in
.type
= H_GET_32 (abfd
, xnp
->type
);
11924 in
.namesz
= H_GET_32 (abfd
, xnp
->namesz
);
11925 in
.namedata
= xnp
->name
;
11926 if (in
.namesz
> buf
- in
.namedata
+ size
)
11929 in
.descsz
= H_GET_32 (abfd
, xnp
->descsz
);
11930 in
.descdata
= p
+ ELF_NOTE_DESC_OFFSET (in
.namesz
, align
);
11931 in
.descpos
= offset
+ (in
.descdata
- buf
);
11933 && (in
.descdata
>= buf
+ size
11934 || in
.descsz
> buf
- in
.descdata
+ size
))
11937 switch (bfd_get_format (abfd
))
11944 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
11947 const char * string
;
11949 bfd_boolean (* func
)(bfd
*, Elf_Internal_Note
*);
11953 GROKER_ELEMENT ("", elfcore_grok_note
),
11954 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note
),
11955 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note
),
11956 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note
),
11957 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note
),
11958 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note
),
11959 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note
)
11961 #undef GROKER_ELEMENT
11964 for (i
= ARRAY_SIZE (grokers
); i
--;)
11966 if (in
.namesz
>= grokers
[i
].len
11967 && strncmp (in
.namedata
, grokers
[i
].string
,
11968 grokers
[i
].len
) == 0)
11970 if (! grokers
[i
].func (abfd
, & in
))
11979 if (in
.namesz
== sizeof "GNU" && strcmp (in
.namedata
, "GNU") == 0)
11981 if (! elfobj_grok_gnu_note (abfd
, &in
))
11984 else if (in
.namesz
== sizeof "stapsdt"
11985 && strcmp (in
.namedata
, "stapsdt") == 0)
11987 if (! elfobj_grok_stapsdt_note (abfd
, &in
))
11993 p
+= ELF_NOTE_NEXT_OFFSET (in
.namesz
, in
.descsz
, align
);
12000 elf_read_notes (bfd
*abfd
, file_ptr offset
, bfd_size_type size
,
12005 if (size
== 0 || (size
+ 1) == 0)
12008 if (bfd_seek (abfd
, offset
, SEEK_SET
) != 0)
12011 buf
= (char *) _bfd_malloc_and_read (abfd
, size
+ 1, size
);
12015 /* PR 17512: file: ec08f814
12016 0-termintate the buffer so that string searches will not overflow. */
12019 if (!elf_parse_notes (abfd
, buf
, size
, offset
, align
))
12029 /* Providing external access to the ELF program header table. */
12031 /* Return an upper bound on the number of bytes required to store a
12032 copy of ABFD's program header table entries. Return -1 if an error
12033 occurs; bfd_get_error will return an appropriate code. */
12036 bfd_get_elf_phdr_upper_bound (bfd
*abfd
)
12038 if (abfd
->xvec
->flavour
!= bfd_target_elf_flavour
)
12040 bfd_set_error (bfd_error_wrong_format
);
12044 return elf_elfheader (abfd
)->e_phnum
* sizeof (Elf_Internal_Phdr
);
12047 /* Copy ABFD's program header table entries to *PHDRS. The entries
12048 will be stored as an array of Elf_Internal_Phdr structures, as
12049 defined in include/elf/internal.h. To find out how large the
12050 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12052 Return the number of program header table entries read, or -1 if an
12053 error occurs; bfd_get_error will return an appropriate code. */
12056 bfd_get_elf_phdrs (bfd
*abfd
, void *phdrs
)
12060 if (abfd
->xvec
->flavour
!= bfd_target_elf_flavour
)
12062 bfd_set_error (bfd_error_wrong_format
);
12066 num_phdrs
= elf_elfheader (abfd
)->e_phnum
;
12067 if (num_phdrs
!= 0)
12068 memcpy (phdrs
, elf_tdata (abfd
)->phdr
,
12069 num_phdrs
* sizeof (Elf_Internal_Phdr
));
12074 enum elf_reloc_type_class
12075 _bfd_elf_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
12076 const asection
*rel_sec ATTRIBUTE_UNUSED
,
12077 const Elf_Internal_Rela
*rela ATTRIBUTE_UNUSED
)
12079 return reloc_class_normal
;
12082 /* For RELA architectures, return the relocation value for a
12083 relocation against a local symbol. */
12086 _bfd_elf_rela_local_sym (bfd
*abfd
,
12087 Elf_Internal_Sym
*sym
,
12089 Elf_Internal_Rela
*rel
)
12091 asection
*sec
= *psec
;
12092 bfd_vma relocation
;
12094 relocation
= (sec
->output_section
->vma
12095 + sec
->output_offset
12097 if ((sec
->flags
& SEC_MERGE
)
12098 && ELF_ST_TYPE (sym
->st_info
) == STT_SECTION
12099 && sec
->sec_info_type
== SEC_INFO_TYPE_MERGE
)
12102 _bfd_merged_section_offset (abfd
, psec
,
12103 elf_section_data (sec
)->sec_info
,
12104 sym
->st_value
+ rel
->r_addend
);
12107 /* If we have changed the section, and our original section is
12108 marked with SEC_EXCLUDE, it means that the original
12109 SEC_MERGE section has been completely subsumed in some
12110 other SEC_MERGE section. In this case, we need to leave
12111 some info around for --emit-relocs. */
12112 if ((sec
->flags
& SEC_EXCLUDE
) != 0)
12113 sec
->kept_section
= *psec
;
12116 rel
->r_addend
-= relocation
;
12117 rel
->r_addend
+= sec
->output_section
->vma
+ sec
->output_offset
;
12123 _bfd_elf_rel_local_sym (bfd
*abfd
,
12124 Elf_Internal_Sym
*sym
,
12128 asection
*sec
= *psec
;
12130 if (sec
->sec_info_type
!= SEC_INFO_TYPE_MERGE
)
12131 return sym
->st_value
+ addend
;
12133 return _bfd_merged_section_offset (abfd
, psec
,
12134 elf_section_data (sec
)->sec_info
,
12135 sym
->st_value
+ addend
);
12138 /* Adjust an address within a section. Given OFFSET within SEC, return
12139 the new offset within the section, based upon changes made to the
12140 section. Returns -1 if the offset is now invalid.
12141 The offset (in abnd out) is in target sized bytes, however big a
12145 _bfd_elf_section_offset (bfd
*abfd
,
12146 struct bfd_link_info
*info
,
12150 switch (sec
->sec_info_type
)
12152 case SEC_INFO_TYPE_STABS
:
12153 return _bfd_stab_section_offset (sec
, elf_section_data (sec
)->sec_info
,
12155 case SEC_INFO_TYPE_EH_FRAME
:
12156 return _bfd_elf_eh_frame_section_offset (abfd
, info
, sec
, offset
);
12159 if ((sec
->flags
& SEC_ELF_REVERSE_COPY
) != 0)
12161 /* Reverse the offset. */
12162 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
12163 bfd_size_type address_size
= bed
->s
->arch_size
/ 8;
12165 /* address_size and sec->size are in octets. Convert
12166 to bytes before subtracting the original offset. */
12167 offset
= ((sec
->size
- address_size
)
12168 / bfd_octets_per_byte (abfd
, sec
) - offset
);
12174 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12175 reconstruct an ELF file by reading the segments out of remote memory
12176 based on the ELF file header at EHDR_VMA and the ELF program headers it
12177 points to. If not null, *LOADBASEP is filled in with the difference
12178 between the VMAs from which the segments were read, and the VMAs the
12179 file headers (and hence BFD's idea of each section's VMA) put them at.
12181 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12182 remote memory at target address VMA into the local buffer at MYADDR; it
12183 should return zero on success or an `errno' code on failure. TEMPL must
12184 be a BFD for an ELF target with the word size and byte order found in
12185 the remote memory. */
12188 bfd_elf_bfd_from_remote_memory
12191 bfd_size_type size
,
12192 bfd_vma
*loadbasep
,
12193 int (*target_read_memory
) (bfd_vma
, bfd_byte
*, bfd_size_type
))
12195 return (*get_elf_backend_data (templ
)->elf_backend_bfd_from_remote_memory
)
12196 (templ
, ehdr_vma
, size
, loadbasep
, target_read_memory
);
12200 _bfd_elf_get_synthetic_symtab (bfd
*abfd
,
12201 long symcount ATTRIBUTE_UNUSED
,
12202 asymbol
**syms ATTRIBUTE_UNUSED
,
12207 const struct elf_backend_data
*bed
= get_elf_backend_data (abfd
);
12210 const char *relplt_name
;
12211 bfd_boolean (*slurp_relocs
) (bfd
*, asection
*, asymbol
**, bfd_boolean
);
12215 Elf_Internal_Shdr
*hdr
;
12221 if ((abfd
->flags
& (DYNAMIC
| EXEC_P
)) == 0)
12224 if (dynsymcount
<= 0)
12227 if (!bed
->plt_sym_val
)
12230 relplt_name
= bed
->relplt_name
;
12231 if (relplt_name
== NULL
)
12232 relplt_name
= bed
->rela_plts_and_copies_p
? ".rela.plt" : ".rel.plt";
12233 relplt
= bfd_get_section_by_name (abfd
, relplt_name
);
12234 if (relplt
== NULL
)
12237 hdr
= &elf_section_data (relplt
)->this_hdr
;
12238 if (hdr
->sh_link
!= elf_dynsymtab (abfd
)
12239 || (hdr
->sh_type
!= SHT_REL
&& hdr
->sh_type
!= SHT_RELA
))
12242 plt
= bfd_get_section_by_name (abfd
, ".plt");
12246 slurp_relocs
= get_elf_backend_data (abfd
)->s
->slurp_reloc_table
;
12247 if (! (*slurp_relocs
) (abfd
, relplt
, dynsyms
, TRUE
))
12250 count
= relplt
->size
/ hdr
->sh_entsize
;
12251 size
= count
* sizeof (asymbol
);
12252 p
= relplt
->relocation
;
12253 for (i
= 0; i
< count
; i
++, p
+= bed
->s
->int_rels_per_ext_rel
)
12255 size
+= strlen ((*p
->sym_ptr_ptr
)->name
) + sizeof ("@plt");
12256 if (p
->addend
!= 0)
12259 size
+= sizeof ("+0x") - 1 + 8 + 8 * (bed
->s
->elfclass
== ELFCLASS64
);
12261 size
+= sizeof ("+0x") - 1 + 8;
12266 s
= *ret
= (asymbol
*) bfd_malloc (size
);
12270 names
= (char *) (s
+ count
);
12271 p
= relplt
->relocation
;
12273 for (i
= 0; i
< count
; i
++, p
+= bed
->s
->int_rels_per_ext_rel
)
12278 addr
= bed
->plt_sym_val (i
, plt
, p
);
12279 if (addr
== (bfd_vma
) -1)
12282 *s
= **p
->sym_ptr_ptr
;
12283 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12284 we are defining a symbol, ensure one of them is set. */
12285 if ((s
->flags
& BSF_LOCAL
) == 0)
12286 s
->flags
|= BSF_GLOBAL
;
12287 s
->flags
|= BSF_SYNTHETIC
;
12289 s
->value
= addr
- plt
->vma
;
12292 len
= strlen ((*p
->sym_ptr_ptr
)->name
);
12293 memcpy (names
, (*p
->sym_ptr_ptr
)->name
, len
);
12295 if (p
->addend
!= 0)
12299 memcpy (names
, "+0x", sizeof ("+0x") - 1);
12300 names
+= sizeof ("+0x") - 1;
12301 bfd_sprintf_vma (abfd
, buf
, p
->addend
);
12302 for (a
= buf
; *a
== '0'; ++a
)
12305 memcpy (names
, a
, len
);
12308 memcpy (names
, "@plt", sizeof ("@plt"));
12309 names
+= sizeof ("@plt");
12316 /* It is only used by x86-64 so far.
12317 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12318 but current usage would allow all of _bfd_std_section to be zero. */
12319 static const asymbol lcomm_sym
12320 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section
);
12321 asection _bfd_elf_large_com_section
12322 = BFD_FAKE_SECTION (_bfd_elf_large_com_section
, &lcomm_sym
,
12323 "LARGE_COMMON", 0, SEC_IS_COMMON
);
12326 _bfd_elf_final_write_processing (bfd
*abfd
)
12328 Elf_Internal_Ehdr
*i_ehdrp
; /* ELF file header, internal form. */
12330 i_ehdrp
= elf_elfheader (abfd
);
12332 if (i_ehdrp
->e_ident
[EI_OSABI
] == ELFOSABI_NONE
)
12333 i_ehdrp
->e_ident
[EI_OSABI
] = get_elf_backend_data (abfd
)->elf_osabi
;
12335 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12336 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12337 STB_GNU_UNIQUE binding. */
12338 if (elf_tdata (abfd
)->has_gnu_osabi
!= 0)
12340 if (i_ehdrp
->e_ident
[EI_OSABI
] == ELFOSABI_NONE
)
12341 i_ehdrp
->e_ident
[EI_OSABI
] = ELFOSABI_GNU
;
12342 else if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_GNU
12343 && i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_FREEBSD
)
12345 if (elf_tdata (abfd
)->has_gnu_osabi
& elf_gnu_osabi_mbind
)
12346 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12347 if (elf_tdata (abfd
)->has_gnu_osabi
& elf_gnu_osabi_ifunc
)
12348 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12349 if (elf_tdata (abfd
)->has_gnu_osabi
& elf_gnu_osabi_unique
)
12350 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12351 bfd_set_error (bfd_error_sorry
);
12359 /* Return TRUE for ELF symbol types that represent functions.
12360 This is the default version of this function, which is sufficient for
12361 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12364 _bfd_elf_is_function_type (unsigned int type
)
12366 return (type
== STT_FUNC
12367 || type
== STT_GNU_IFUNC
);
12370 /* If the ELF symbol SYM might be a function in SEC, return the
12371 function size and set *CODE_OFF to the function's entry point,
12372 otherwise return zero. */
12375 _bfd_elf_maybe_function_sym (const asymbol
*sym
, asection
*sec
,
12378 bfd_size_type size
;
12380 if ((sym
->flags
& (BSF_SECTION_SYM
| BSF_FILE
| BSF_OBJECT
12381 | BSF_THREAD_LOCAL
| BSF_RELC
| BSF_SRELC
)) != 0
12382 || sym
->section
!= sec
)
12385 *code_off
= sym
->value
;
12387 if (!(sym
->flags
& BSF_SYNTHETIC
))
12388 size
= ((elf_symbol_type
*) sym
)->internal_elf_sym
.st_size
;
12394 /* Set to non-zero to enable some debug messages. */
12395 #define DEBUG_SECONDARY_RELOCS 0
12397 /* An internal-to-the-bfd-library only section type
12398 used to indicate a cached secondary reloc section. */
12399 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12401 /* Create a BFD section to hold a secondary reloc section. */
12404 _bfd_elf_init_secondary_reloc_section (bfd
* abfd
,
12405 Elf_Internal_Shdr
*hdr
,
12407 unsigned int shindex
)
12409 /* We only support RELA secondary relocs. */
12410 if (hdr
->sh_type
!= SHT_RELA
)
12413 #if DEBUG_SECONDARY_RELOCS
12414 fprintf (stderr
, "secondary reloc section %s encountered\n", name
);
12416 hdr
->sh_type
= SHT_SECONDARY_RELOC
;
12417 return _bfd_elf_make_section_from_shdr (abfd
, hdr
, name
, shindex
);
12420 /* Read in any secondary relocs associated with SEC. */
12423 _bfd_elf_slurp_secondary_reloc_section (bfd
* abfd
,
12425 asymbol
** symbols
)
12427 const struct elf_backend_data
* const ebd
= get_elf_backend_data (abfd
);
12429 bfd_boolean result
= TRUE
;
12430 bfd_vma (*r_sym
) (bfd_vma
);
12432 #if BFD_DEFAULT_TARGET_SIZE > 32
12433 if (bfd_arch_bits_per_address (abfd
) != 32)
12434 r_sym
= elf64_r_sym
;
12437 r_sym
= elf32_r_sym
;
12439 /* Discover if there are any secondary reloc sections
12440 associated with SEC. */
12441 for (relsec
= abfd
->sections
; relsec
!= NULL
; relsec
= relsec
->next
)
12443 Elf_Internal_Shdr
* hdr
= & elf_section_data (relsec
)->this_hdr
;
12445 if (hdr
->sh_type
== SHT_SECONDARY_RELOC
12446 && hdr
->sh_info
== (unsigned) elf_section_data (sec
)->this_idx
)
12448 bfd_byte
* native_relocs
;
12449 bfd_byte
* native_reloc
;
12450 arelent
* internal_relocs
;
12451 arelent
* internal_reloc
;
12453 unsigned int entsize
;
12454 unsigned int symcount
;
12455 unsigned int reloc_count
;
12458 if (ebd
->elf_info_to_howto
== NULL
)
12461 #if DEBUG_SECONDARY_RELOCS
12462 fprintf (stderr
, "read secondary relocs for %s from %s\n",
12463 sec
->name
, relsec
->name
);
12465 entsize
= hdr
->sh_entsize
;
12467 native_relocs
= bfd_malloc (hdr
->sh_size
);
12468 if (native_relocs
== NULL
)
12474 reloc_count
= NUM_SHDR_ENTRIES (hdr
);
12475 if (_bfd_mul_overflow (reloc_count
, sizeof (arelent
), & amt
))
12477 free (native_relocs
);
12478 bfd_set_error (bfd_error_file_too_big
);
12483 internal_relocs
= (arelent
*) bfd_alloc (abfd
, amt
);
12484 if (internal_relocs
== NULL
)
12486 free (native_relocs
);
12491 if (bfd_seek (abfd
, hdr
->sh_offset
, SEEK_SET
) != 0
12492 || (bfd_bread (native_relocs
, hdr
->sh_size
, abfd
)
12495 free (native_relocs
);
12496 /* The internal_relocs will be freed when
12497 the memory for the bfd is released. */
12502 symcount
= bfd_get_symcount (abfd
);
12504 for (i
= 0, internal_reloc
= internal_relocs
,
12505 native_reloc
= native_relocs
;
12507 i
++, internal_reloc
++, native_reloc
+= entsize
)
12510 Elf_Internal_Rela rela
;
12512 ebd
->s
->swap_reloca_in (abfd
, native_reloc
, & rela
);
12514 /* The address of an ELF reloc is section relative for an object
12515 file, and absolute for an executable file or shared library.
12516 The address of a normal BFD reloc is always section relative,
12517 and the address of a dynamic reloc is absolute.. */
12518 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) == 0)
12519 internal_reloc
->address
= rela
.r_offset
;
12521 internal_reloc
->address
= rela
.r_offset
- sec
->vma
;
12523 if (r_sym (rela
.r_info
) == STN_UNDEF
)
12525 /* FIXME: This and the error case below mean that we
12526 have a symbol on relocs that is not elf_symbol_type. */
12527 internal_reloc
->sym_ptr_ptr
=
12528 bfd_abs_section_ptr
->symbol_ptr_ptr
;
12530 else if (r_sym (rela
.r_info
) > symcount
)
12533 /* xgettext:c-format */
12534 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
12535 abfd
, sec
, i
, (long) r_sym (rela
.r_info
));
12536 bfd_set_error (bfd_error_bad_value
);
12537 internal_reloc
->sym_ptr_ptr
=
12538 bfd_abs_section_ptr
->symbol_ptr_ptr
;
12545 ps
= symbols
+ r_sym (rela
.r_info
) - 1;
12547 internal_reloc
->sym_ptr_ptr
= ps
;
12548 /* Make sure that this symbol is not removed by strip. */
12549 (*ps
)->flags
|= BSF_KEEP
;
12552 internal_reloc
->addend
= rela
.r_addend
;
12554 res
= ebd
->elf_info_to_howto (abfd
, internal_reloc
, & rela
);
12555 if (! res
|| internal_reloc
->howto
== NULL
)
12557 #if DEBUG_SECONDARY_RELOCS
12558 fprintf (stderr
, "there is no howto associated with reloc %lx\n",
12565 free (native_relocs
);
12566 /* Store the internal relocs. */
12567 elf_section_data (relsec
)->sec_info
= internal_relocs
;
12574 /* Set the ELF section header fields of an output secondary reloc section. */
12577 _bfd_elf_copy_special_section_fields (const bfd
* ibfd ATTRIBUTE_UNUSED
,
12578 bfd
* obfd ATTRIBUTE_UNUSED
,
12579 const Elf_Internal_Shdr
* isection
,
12580 Elf_Internal_Shdr
* osection
)
12585 if (isection
== NULL
)
12588 if (isection
->sh_type
!= SHT_SECONDARY_RELOC
)
12591 isec
= isection
->bfd_section
;
12595 osec
= osection
->bfd_section
;
12599 BFD_ASSERT (elf_section_data (osec
)->sec_info
== NULL
);
12600 elf_section_data (osec
)->sec_info
= elf_section_data (isec
)->sec_info
;
12601 osection
->sh_type
= SHT_RELA
;
12602 osection
->sh_link
= elf_onesymtab (obfd
);
12603 if (osection
->sh_link
== 0)
12605 /* There is no symbol table - we are hosed... */
12607 /* xgettext:c-format */
12608 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
12610 bfd_set_error (bfd_error_bad_value
);
12614 /* Find the output section that corresponds to the isection's sh_info link. */
12615 if (isection
->sh_info
== 0
12616 || isection
->sh_info
>= elf_numsections (ibfd
))
12619 /* xgettext:c-format */
12620 (_("%pB(%pA): info section index is invalid"),
12622 bfd_set_error (bfd_error_bad_value
);
12626 isection
= elf_elfsections (ibfd
)[isection
->sh_info
];
12628 if (isection
== NULL
12629 || isection
->bfd_section
== NULL
12630 || isection
->bfd_section
->output_section
== NULL
)
12633 /* xgettext:c-format */
12634 (_("%pB(%pA): info section index cannot be set because the section is not in the output"),
12636 bfd_set_error (bfd_error_bad_value
);
12640 osection
->sh_info
=
12641 elf_section_data (isection
->bfd_section
->output_section
)->this_idx
;
12643 #if DEBUG_SECONDARY_RELOCS
12644 fprintf (stderr
, "update header of %s, sh_link = %u, sh_info = %u\n",
12645 osec
->name
, osection
->sh_link
, osection
->sh_info
);
12651 /* Write out a secondary reloc section. */
12654 _bfd_elf_write_secondary_reloc_section (bfd
*abfd
, asection
*sec
)
12656 const struct elf_backend_data
* const ebd
= get_elf_backend_data (abfd
);
12657 bfd_vma addr_offset
;
12659 bfd_vma (*r_info
) (bfd_vma
, bfd_vma
);
12660 bfd_boolean result
= TRUE
;
12665 #if BFD_DEFAULT_TARGET_SIZE > 32
12666 if (bfd_arch_bits_per_address (abfd
) != 32)
12667 r_info
= elf64_r_info
;
12670 r_info
= elf32_r_info
;
12672 /* The address of an ELF reloc is section relative for an object
12673 file, and absolute for an executable file or shared library.
12674 The address of a BFD reloc is always section relative. */
12676 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) != 0)
12677 addr_offset
= sec
->vma
;
12679 /* Discover if there are any secondary reloc sections
12680 associated with SEC. */
12681 for (relsec
= abfd
->sections
; relsec
!= NULL
; relsec
= relsec
->next
)
12683 const struct bfd_elf_section_data
* const esd
= elf_section_data (relsec
);
12684 Elf_Internal_Shdr
* const hdr
= (Elf_Internal_Shdr
*) & esd
->this_hdr
;
12686 if (hdr
->sh_type
== SHT_RELA
12687 && hdr
->sh_info
== (unsigned) elf_section_data (sec
)->this_idx
)
12689 asymbol
* last_sym
;
12691 unsigned int reloc_count
;
12693 arelent
* src_irel
;
12694 bfd_byte
* dst_rela
;
12696 if (hdr
->contents
!= NULL
)
12699 /* xgettext:c-format */
12700 (_("%pB(%pA): error: secondary reloc section processed twice"),
12702 bfd_set_error (bfd_error_bad_value
);
12707 reloc_count
= hdr
->sh_size
/ hdr
->sh_entsize
;
12708 if (reloc_count
<= 0)
12711 /* xgettext:c-format */
12712 (_("%pB(%pA): error: secondary reloc section is empty!"),
12714 bfd_set_error (bfd_error_bad_value
);
12719 hdr
->contents
= bfd_alloc (abfd
, hdr
->sh_size
);
12720 if (hdr
->contents
== NULL
)
12723 #if DEBUG_SECONDARY_RELOCS
12724 fprintf (stderr
, "write %u secondary relocs for %s from %s\n",
12725 reloc_count
, sec
->name
, relsec
->name
);
12729 dst_rela
= hdr
->contents
;
12730 src_irel
= (arelent
*) esd
->sec_info
;
12731 if (src_irel
== NULL
)
12734 /* xgettext:c-format */
12735 (_("%pB(%pA): error: internal relocs missing for secondary reloc section"),
12737 bfd_set_error (bfd_error_bad_value
);
12742 for (idx
= 0; idx
< reloc_count
; idx
++, dst_rela
+= hdr
->sh_entsize
)
12744 Elf_Internal_Rela src_rela
;
12749 ptr
= src_irel
+ idx
;
12753 /* xgettext:c-format */
12754 (_("%pB(%pA): error: reloc table entry %u is empty"),
12755 abfd
, relsec
, idx
);
12756 bfd_set_error (bfd_error_bad_value
);
12761 if (ptr
->sym_ptr_ptr
== NULL
)
12763 /* FIXME: Is this an error ? */
12768 sym
= *ptr
->sym_ptr_ptr
;
12770 if (sym
== last_sym
)
12774 n
= _bfd_elf_symbol_from_bfd_symbol (abfd
, & sym
);
12778 /* xgettext:c-format */
12779 (_("%pB(%pA): error: secondary reloc %u references a missing symbol"),
12780 abfd
, relsec
, idx
);
12781 bfd_set_error (bfd_error_bad_value
);
12790 if (sym
->the_bfd
!= NULL
12791 && sym
->the_bfd
->xvec
!= abfd
->xvec
12792 && ! _bfd_elf_validate_reloc (abfd
, ptr
))
12795 /* xgettext:c-format */
12796 (_("%pB(%pA): error: secondary reloc %u references a deleted symbol"),
12797 abfd
, relsec
, idx
);
12798 bfd_set_error (bfd_error_bad_value
);
12804 src_rela
.r_offset
= ptr
->address
+ addr_offset
;
12805 if (ptr
->howto
== NULL
)
12808 /* xgettext:c-format */
12809 (_("%pB(%pA): error: secondary reloc %u is of an unknown type"),
12810 abfd
, relsec
, idx
);
12811 bfd_set_error (bfd_error_bad_value
);
12813 src_rela
.r_info
= r_info (0, 0);
12816 src_rela
.r_info
= r_info (n
, ptr
->howto
->type
);
12817 src_rela
.r_addend
= ptr
->addend
;
12818 ebd
->s
->swap_reloca_out (abfd
, &src_rela
, dst_rela
);