]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf.c
PR26011, excessive memory allocation with fuzzed reloc sections
[thirdparty/binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2020 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bfd_boolean assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bfd_boolean swap_out_syms (bfd *, struct elf_strtab_hash **, int) ;
55 static bfd_boolean elf_parse_notes (bfd *abfd, char *buf, size_t size,
56 file_ptr offset, size_t align);
57
58 /* Swap version information in and out. The version information is
59 currently size independent. If that ever changes, this code will
60 need to move into elfcode.h. */
61
62 /* Swap in a Verdef structure. */
63
64 void
65 _bfd_elf_swap_verdef_in (bfd *abfd,
66 const Elf_External_Verdef *src,
67 Elf_Internal_Verdef *dst)
68 {
69 dst->vd_version = H_GET_16 (abfd, src->vd_version);
70 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
71 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
72 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
73 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
74 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
75 dst->vd_next = H_GET_32 (abfd, src->vd_next);
76 }
77
78 /* Swap out a Verdef structure. */
79
80 void
81 _bfd_elf_swap_verdef_out (bfd *abfd,
82 const Elf_Internal_Verdef *src,
83 Elf_External_Verdef *dst)
84 {
85 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
86 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
87 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
88 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
89 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
90 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
91 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
92 }
93
94 /* Swap in a Verdaux structure. */
95
96 void
97 _bfd_elf_swap_verdaux_in (bfd *abfd,
98 const Elf_External_Verdaux *src,
99 Elf_Internal_Verdaux *dst)
100 {
101 dst->vda_name = H_GET_32 (abfd, src->vda_name);
102 dst->vda_next = H_GET_32 (abfd, src->vda_next);
103 }
104
105 /* Swap out a Verdaux structure. */
106
107 void
108 _bfd_elf_swap_verdaux_out (bfd *abfd,
109 const Elf_Internal_Verdaux *src,
110 Elf_External_Verdaux *dst)
111 {
112 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
113 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
114 }
115
116 /* Swap in a Verneed structure. */
117
118 void
119 _bfd_elf_swap_verneed_in (bfd *abfd,
120 const Elf_External_Verneed *src,
121 Elf_Internal_Verneed *dst)
122 {
123 dst->vn_version = H_GET_16 (abfd, src->vn_version);
124 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
125 dst->vn_file = H_GET_32 (abfd, src->vn_file);
126 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
127 dst->vn_next = H_GET_32 (abfd, src->vn_next);
128 }
129
130 /* Swap out a Verneed structure. */
131
132 void
133 _bfd_elf_swap_verneed_out (bfd *abfd,
134 const Elf_Internal_Verneed *src,
135 Elf_External_Verneed *dst)
136 {
137 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
138 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
139 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
140 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
141 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
142 }
143
144 /* Swap in a Vernaux structure. */
145
146 void
147 _bfd_elf_swap_vernaux_in (bfd *abfd,
148 const Elf_External_Vernaux *src,
149 Elf_Internal_Vernaux *dst)
150 {
151 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
152 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
153 dst->vna_other = H_GET_16 (abfd, src->vna_other);
154 dst->vna_name = H_GET_32 (abfd, src->vna_name);
155 dst->vna_next = H_GET_32 (abfd, src->vna_next);
156 }
157
158 /* Swap out a Vernaux structure. */
159
160 void
161 _bfd_elf_swap_vernaux_out (bfd *abfd,
162 const Elf_Internal_Vernaux *src,
163 Elf_External_Vernaux *dst)
164 {
165 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
166 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
167 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
168 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
169 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
170 }
171
172 /* Swap in a Versym structure. */
173
174 void
175 _bfd_elf_swap_versym_in (bfd *abfd,
176 const Elf_External_Versym *src,
177 Elf_Internal_Versym *dst)
178 {
179 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
180 }
181
182 /* Swap out a Versym structure. */
183
184 void
185 _bfd_elf_swap_versym_out (bfd *abfd,
186 const Elf_Internal_Versym *src,
187 Elf_External_Versym *dst)
188 {
189 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
190 }
191
192 /* Standard ELF hash function. Do not change this function; you will
193 cause invalid hash tables to be generated. */
194
195 unsigned long
196 bfd_elf_hash (const char *namearg)
197 {
198 const unsigned char *name = (const unsigned char *) namearg;
199 unsigned long h = 0;
200 unsigned long g;
201 int ch;
202
203 while ((ch = *name++) != '\0')
204 {
205 h = (h << 4) + ch;
206 if ((g = (h & 0xf0000000)) != 0)
207 {
208 h ^= g >> 24;
209 /* The ELF ABI says `h &= ~g', but this is equivalent in
210 this case and on some machines one insn instead of two. */
211 h ^= g;
212 }
213 }
214 return h & 0xffffffff;
215 }
216
217 /* DT_GNU_HASH hash function. Do not change this function; you will
218 cause invalid hash tables to be generated. */
219
220 unsigned long
221 bfd_elf_gnu_hash (const char *namearg)
222 {
223 const unsigned char *name = (const unsigned char *) namearg;
224 unsigned long h = 5381;
225 unsigned char ch;
226
227 while ((ch = *name++) != '\0')
228 h = (h << 5) + h + ch;
229 return h & 0xffffffff;
230 }
231
232 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
233 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
234 bfd_boolean
235 bfd_elf_allocate_object (bfd *abfd,
236 size_t object_size,
237 enum elf_target_id object_id)
238 {
239 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
240 abfd->tdata.any = bfd_zalloc (abfd, object_size);
241 if (abfd->tdata.any == NULL)
242 return FALSE;
243
244 elf_object_id (abfd) = object_id;
245 if (abfd->direction != read_direction)
246 {
247 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
248 if (o == NULL)
249 return FALSE;
250 elf_tdata (abfd)->o = o;
251 elf_program_header_size (abfd) = (bfd_size_type) -1;
252 }
253 return TRUE;
254 }
255
256
257 bfd_boolean
258 bfd_elf_make_object (bfd *abfd)
259 {
260 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
261 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
262 bed->target_id);
263 }
264
265 bfd_boolean
266 bfd_elf_mkcorefile (bfd *abfd)
267 {
268 /* I think this can be done just like an object file. */
269 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
270 return FALSE;
271 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
272 return elf_tdata (abfd)->core != NULL;
273 }
274
275 char *
276 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
277 {
278 Elf_Internal_Shdr **i_shdrp;
279 bfd_byte *shstrtab = NULL;
280 file_ptr offset;
281 bfd_size_type shstrtabsize;
282
283 i_shdrp = elf_elfsections (abfd);
284 if (i_shdrp == 0
285 || shindex >= elf_numsections (abfd)
286 || i_shdrp[shindex] == 0)
287 return NULL;
288
289 shstrtab = i_shdrp[shindex]->contents;
290 if (shstrtab == NULL)
291 {
292 /* No cached one, attempt to read, and cache what we read. */
293 offset = i_shdrp[shindex]->sh_offset;
294 shstrtabsize = i_shdrp[shindex]->sh_size;
295
296 /* Allocate and clear an extra byte at the end, to prevent crashes
297 in case the string table is not terminated. */
298 if (shstrtabsize + 1 <= 1
299 || bfd_seek (abfd, offset, SEEK_SET) != 0
300 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
301 shstrtabsize)) == NULL)
302 {
303 /* Once we've failed to read it, make sure we don't keep
304 trying. Otherwise, we'll keep allocating space for
305 the string table over and over. */
306 i_shdrp[shindex]->sh_size = 0;
307 }
308 else
309 shstrtab[shstrtabsize] = '\0';
310 i_shdrp[shindex]->contents = shstrtab;
311 }
312 return (char *) shstrtab;
313 }
314
315 char *
316 bfd_elf_string_from_elf_section (bfd *abfd,
317 unsigned int shindex,
318 unsigned int strindex)
319 {
320 Elf_Internal_Shdr *hdr;
321
322 if (strindex == 0)
323 return "";
324
325 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
326 return NULL;
327
328 hdr = elf_elfsections (abfd)[shindex];
329
330 if (hdr->contents == NULL)
331 {
332 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
333 {
334 /* PR 17512: file: f057ec89. */
335 /* xgettext:c-format */
336 _bfd_error_handler (_("%pB: attempt to load strings from"
337 " a non-string section (number %d)"),
338 abfd, shindex);
339 return NULL;
340 }
341
342 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
343 return NULL;
344 }
345 else
346 {
347 /* PR 24273: The string section's contents may have already
348 been loaded elsewhere, eg because a corrupt file has the
349 string section index in the ELF header pointing at a group
350 section. So be paranoid, and test that the last byte of
351 the section is zero. */
352 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
353 return NULL;
354 }
355
356 if (strindex >= hdr->sh_size)
357 {
358 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
359 _bfd_error_handler
360 /* xgettext:c-format */
361 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
362 abfd, strindex, (uint64_t) hdr->sh_size,
363 (shindex == shstrndx && strindex == hdr->sh_name
364 ? ".shstrtab"
365 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
366 return NULL;
367 }
368
369 return ((char *) hdr->contents) + strindex;
370 }
371
372 /* Read and convert symbols to internal format.
373 SYMCOUNT specifies the number of symbols to read, starting from
374 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
375 are non-NULL, they are used to store the internal symbols, external
376 symbols, and symbol section index extensions, respectively.
377 Returns a pointer to the internal symbol buffer (malloced if necessary)
378 or NULL if there were no symbols or some kind of problem. */
379
380 Elf_Internal_Sym *
381 bfd_elf_get_elf_syms (bfd *ibfd,
382 Elf_Internal_Shdr *symtab_hdr,
383 size_t symcount,
384 size_t symoffset,
385 Elf_Internal_Sym *intsym_buf,
386 void *extsym_buf,
387 Elf_External_Sym_Shndx *extshndx_buf)
388 {
389 Elf_Internal_Shdr *shndx_hdr;
390 void *alloc_ext;
391 const bfd_byte *esym;
392 Elf_External_Sym_Shndx *alloc_extshndx;
393 Elf_External_Sym_Shndx *shndx;
394 Elf_Internal_Sym *alloc_intsym;
395 Elf_Internal_Sym *isym;
396 Elf_Internal_Sym *isymend;
397 const struct elf_backend_data *bed;
398 size_t extsym_size;
399 size_t amt;
400 file_ptr pos;
401
402 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
403 abort ();
404
405 if (symcount == 0)
406 return intsym_buf;
407
408 /* Normal syms might have section extension entries. */
409 shndx_hdr = NULL;
410 if (elf_symtab_shndx_list (ibfd) != NULL)
411 {
412 elf_section_list * entry;
413 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
414
415 /* Find an index section that is linked to this symtab section. */
416 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
417 {
418 /* PR 20063. */
419 if (entry->hdr.sh_link >= elf_numsections (ibfd))
420 continue;
421
422 if (sections[entry->hdr.sh_link] == symtab_hdr)
423 {
424 shndx_hdr = & entry->hdr;
425 break;
426 };
427 }
428
429 if (shndx_hdr == NULL)
430 {
431 if (symtab_hdr == & elf_symtab_hdr (ibfd))
432 /* Not really accurate, but this was how the old code used to work. */
433 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
434 /* Otherwise we do nothing. The assumption is that
435 the index table will not be needed. */
436 }
437 }
438
439 /* Read the symbols. */
440 alloc_ext = NULL;
441 alloc_extshndx = NULL;
442 alloc_intsym = NULL;
443 bed = get_elf_backend_data (ibfd);
444 extsym_size = bed->s->sizeof_sym;
445 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
446 {
447 bfd_set_error (bfd_error_file_too_big);
448 intsym_buf = NULL;
449 goto out;
450 }
451 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
452 if (extsym_buf == NULL)
453 {
454 alloc_ext = bfd_malloc (amt);
455 extsym_buf = alloc_ext;
456 }
457 if (extsym_buf == NULL
458 || bfd_seek (ibfd, pos, SEEK_SET) != 0
459 || bfd_bread (extsym_buf, amt, ibfd) != amt)
460 {
461 intsym_buf = NULL;
462 goto out;
463 }
464
465 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
466 extshndx_buf = NULL;
467 else
468 {
469 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
470 {
471 bfd_set_error (bfd_error_file_too_big);
472 intsym_buf = NULL;
473 goto out;
474 }
475 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
476 if (extshndx_buf == NULL)
477 {
478 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
479 extshndx_buf = alloc_extshndx;
480 }
481 if (extshndx_buf == NULL
482 || bfd_seek (ibfd, pos, SEEK_SET) != 0
483 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
484 {
485 intsym_buf = NULL;
486 goto out;
487 }
488 }
489
490 if (intsym_buf == NULL)
491 {
492 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
493 {
494 bfd_set_error (bfd_error_file_too_big);
495 goto out;
496 }
497 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
498 intsym_buf = alloc_intsym;
499 if (intsym_buf == NULL)
500 goto out;
501 }
502
503 /* Convert the symbols to internal form. */
504 isymend = intsym_buf + symcount;
505 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
506 shndx = extshndx_buf;
507 isym < isymend;
508 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
509 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
510 {
511 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
512 /* xgettext:c-format */
513 _bfd_error_handler (_("%pB symbol number %lu references"
514 " nonexistent SHT_SYMTAB_SHNDX section"),
515 ibfd, (unsigned long) symoffset);
516 if (alloc_intsym != NULL)
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 if (alloc_ext != NULL)
524 free (alloc_ext);
525 if (alloc_extshndx != NULL)
526 free (alloc_extshndx);
527
528 return intsym_buf;
529 }
530
531 /* Look up a symbol name. */
532 const char *
533 bfd_elf_sym_name (bfd *abfd,
534 Elf_Internal_Shdr *symtab_hdr,
535 Elf_Internal_Sym *isym,
536 asection *sym_sec)
537 {
538 const char *name;
539 unsigned int iname = isym->st_name;
540 unsigned int shindex = symtab_hdr->sh_link;
541
542 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
543 /* Check for a bogus st_shndx to avoid crashing. */
544 && isym->st_shndx < elf_numsections (abfd))
545 {
546 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
547 shindex = elf_elfheader (abfd)->e_shstrndx;
548 }
549
550 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
551 if (name == NULL)
552 name = "(null)";
553 else if (sym_sec && *name == '\0')
554 name = bfd_section_name (sym_sec);
555
556 return name;
557 }
558
559 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
560 sections. The first element is the flags, the rest are section
561 pointers. */
562
563 typedef union elf_internal_group {
564 Elf_Internal_Shdr *shdr;
565 unsigned int flags;
566 } Elf_Internal_Group;
567
568 /* Return the name of the group signature symbol. Why isn't the
569 signature just a string? */
570
571 static const char *
572 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 {
574 Elf_Internal_Shdr *hdr;
575 unsigned char esym[sizeof (Elf64_External_Sym)];
576 Elf_External_Sym_Shndx eshndx;
577 Elf_Internal_Sym isym;
578
579 /* First we need to ensure the symbol table is available. Make sure
580 that it is a symbol table section. */
581 if (ghdr->sh_link >= elf_numsections (abfd))
582 return NULL;
583 hdr = elf_elfsections (abfd) [ghdr->sh_link];
584 if (hdr->sh_type != SHT_SYMTAB
585 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
586 return NULL;
587
588 /* Go read the symbol. */
589 hdr = &elf_tdata (abfd)->symtab_hdr;
590 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
591 &isym, esym, &eshndx) == NULL)
592 return NULL;
593
594 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
595 }
596
597 /* Set next_in_group list pointer, and group name for NEWSECT. */
598
599 static bfd_boolean
600 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 {
602 unsigned int num_group = elf_tdata (abfd)->num_group;
603
604 /* If num_group is zero, read in all SHT_GROUP sections. The count
605 is set to -1 if there are no SHT_GROUP sections. */
606 if (num_group == 0)
607 {
608 unsigned int i, shnum;
609
610 /* First count the number of groups. If we have a SHT_GROUP
611 section with just a flag word (ie. sh_size is 4), ignore it. */
612 shnum = elf_numsections (abfd);
613 num_group = 0;
614
615 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
616 ( (shdr)->sh_type == SHT_GROUP \
617 && (shdr)->sh_size >= minsize \
618 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
619 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620
621 for (i = 0; i < shnum; i++)
622 {
623 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624
625 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
626 num_group += 1;
627 }
628
629 if (num_group == 0)
630 {
631 num_group = (unsigned) -1;
632 elf_tdata (abfd)->num_group = num_group;
633 elf_tdata (abfd)->group_sect_ptr = NULL;
634 }
635 else
636 {
637 /* We keep a list of elf section headers for group sections,
638 so we can find them quickly. */
639 size_t amt;
640
641 elf_tdata (abfd)->num_group = num_group;
642 amt = num_group * sizeof (Elf_Internal_Shdr *);
643 elf_tdata (abfd)->group_sect_ptr
644 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
645 if (elf_tdata (abfd)->group_sect_ptr == NULL)
646 return FALSE;
647 num_group = 0;
648
649 for (i = 0; i < shnum; i++)
650 {
651 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652
653 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 {
655 unsigned char *src;
656 Elf_Internal_Group *dest;
657
658 /* Make sure the group section has a BFD section
659 attached to it. */
660 if (!bfd_section_from_shdr (abfd, i))
661 return FALSE;
662
663 /* Add to list of sections. */
664 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
665 num_group += 1;
666
667 /* Read the raw contents. */
668 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
669 shdr->contents = NULL;
670 if (_bfd_mul_overflow (shdr->sh_size,
671 sizeof (*dest) / 4, &amt)
672 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
673 || !(shdr->contents
674 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 {
676 _bfd_error_handler
677 /* xgettext:c-format */
678 (_("%pB: invalid size field in group section"
679 " header: %#" PRIx64 ""),
680 abfd, (uint64_t) shdr->sh_size);
681 bfd_set_error (bfd_error_bad_value);
682 -- num_group;
683 continue;
684 }
685
686 /* Translate raw contents, a flag word followed by an
687 array of elf section indices all in target byte order,
688 to the flag word followed by an array of elf section
689 pointers. */
690 src = shdr->contents + shdr->sh_size;
691 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692
693 while (1)
694 {
695 unsigned int idx;
696
697 src -= 4;
698 --dest;
699 idx = H_GET_32 (abfd, src);
700 if (src == shdr->contents)
701 {
702 dest->shdr = NULL;
703 dest->flags = idx;
704 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
705 shdr->bfd_section->flags
706 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
707 break;
708 }
709 if (idx < shnum)
710 {
711 dest->shdr = elf_elfsections (abfd)[idx];
712 /* PR binutils/23199: All sections in a
713 section group should be marked with
714 SHF_GROUP. But some tools generate
715 broken objects without SHF_GROUP. Fix
716 them up here. */
717 dest->shdr->sh_flags |= SHF_GROUP;
718 }
719 if (idx >= shnum
720 || dest->shdr->sh_type == SHT_GROUP)
721 {
722 _bfd_error_handler
723 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
724 abfd, i);
725 dest->shdr = NULL;
726 }
727 }
728 }
729 }
730
731 /* PR 17510: Corrupt binaries might contain invalid groups. */
732 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 {
734 elf_tdata (abfd)->num_group = num_group;
735
736 /* If all groups are invalid then fail. */
737 if (num_group == 0)
738 {
739 elf_tdata (abfd)->group_sect_ptr = NULL;
740 elf_tdata (abfd)->num_group = num_group = -1;
741 _bfd_error_handler
742 (_("%pB: no valid group sections found"), abfd);
743 bfd_set_error (bfd_error_bad_value);
744 }
745 }
746 }
747 }
748
749 if (num_group != (unsigned) -1)
750 {
751 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
752 unsigned int j;
753
754 for (j = 0; j < num_group; j++)
755 {
756 /* Begin search from previous found group. */
757 unsigned i = (j + search_offset) % num_group;
758
759 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
760 Elf_Internal_Group *idx;
761 bfd_size_type n_elt;
762
763 if (shdr == NULL)
764 continue;
765
766 idx = (Elf_Internal_Group *) shdr->contents;
767 if (idx == NULL || shdr->sh_size < 4)
768 {
769 /* See PR 21957 for a reproducer. */
770 /* xgettext:c-format */
771 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
772 abfd, shdr->bfd_section);
773 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
774 bfd_set_error (bfd_error_bad_value);
775 return FALSE;
776 }
777 n_elt = shdr->sh_size / 4;
778
779 /* Look through this group's sections to see if current
780 section is a member. */
781 while (--n_elt != 0)
782 if ((++idx)->shdr == hdr)
783 {
784 asection *s = NULL;
785
786 /* We are a member of this group. Go looking through
787 other members to see if any others are linked via
788 next_in_group. */
789 idx = (Elf_Internal_Group *) shdr->contents;
790 n_elt = shdr->sh_size / 4;
791 while (--n_elt != 0)
792 if ((++idx)->shdr != NULL
793 && (s = idx->shdr->bfd_section) != NULL
794 && elf_next_in_group (s) != NULL)
795 break;
796 if (n_elt != 0)
797 {
798 /* Snarf the group name from other member, and
799 insert current section in circular list. */
800 elf_group_name (newsect) = elf_group_name (s);
801 elf_next_in_group (newsect) = elf_next_in_group (s);
802 elf_next_in_group (s) = newsect;
803 }
804 else
805 {
806 const char *gname;
807
808 gname = group_signature (abfd, shdr);
809 if (gname == NULL)
810 return FALSE;
811 elf_group_name (newsect) = gname;
812
813 /* Start a circular list with one element. */
814 elf_next_in_group (newsect) = newsect;
815 }
816
817 /* If the group section has been created, point to the
818 new member. */
819 if (shdr->bfd_section != NULL)
820 elf_next_in_group (shdr->bfd_section) = newsect;
821
822 elf_tdata (abfd)->group_search_offset = i;
823 j = num_group - 1;
824 break;
825 }
826 }
827 }
828
829 if (elf_group_name (newsect) == NULL)
830 {
831 /* xgettext:c-format */
832 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
833 abfd, newsect);
834 return FALSE;
835 }
836 return TRUE;
837 }
838
839 bfd_boolean
840 _bfd_elf_setup_sections (bfd *abfd)
841 {
842 unsigned int i;
843 unsigned int num_group = elf_tdata (abfd)->num_group;
844 bfd_boolean result = TRUE;
845 asection *s;
846
847 /* Process SHF_LINK_ORDER. */
848 for (s = abfd->sections; s != NULL; s = s->next)
849 {
850 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
851 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
852 {
853 unsigned int elfsec = this_hdr->sh_link;
854 /* FIXME: The old Intel compiler and old strip/objcopy may
855 not set the sh_link or sh_info fields. Hence we could
856 get the situation where elfsec is 0. */
857 if (elfsec == 0)
858 {
859 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
860 bed->link_order_error_handler
861 /* xgettext:c-format */
862 (_("%pB: warning: sh_link not set for section `%pA'"),
863 abfd, s);
864 }
865 else
866 {
867 asection *linksec = NULL;
868
869 if (elfsec < elf_numsections (abfd))
870 {
871 this_hdr = elf_elfsections (abfd)[elfsec];
872 linksec = this_hdr->bfd_section;
873 }
874
875 /* PR 1991, 2008:
876 Some strip/objcopy may leave an incorrect value in
877 sh_link. We don't want to proceed. */
878 if (linksec == NULL)
879 {
880 _bfd_error_handler
881 /* xgettext:c-format */
882 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
883 s->owner, elfsec, s);
884 result = FALSE;
885 }
886
887 elf_linked_to_section (s) = linksec;
888 }
889 }
890 else if (this_hdr->sh_type == SHT_GROUP
891 && elf_next_in_group (s) == NULL)
892 {
893 _bfd_error_handler
894 /* xgettext:c-format */
895 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
896 abfd, elf_section_data (s)->this_idx);
897 result = FALSE;
898 }
899 }
900
901 /* Process section groups. */
902 if (num_group == (unsigned) -1)
903 return result;
904
905 for (i = 0; i < num_group; i++)
906 {
907 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
908 Elf_Internal_Group *idx;
909 unsigned int n_elt;
910
911 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
912 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
913 {
914 _bfd_error_handler
915 /* xgettext:c-format */
916 (_("%pB: section group entry number %u is corrupt"),
917 abfd, i);
918 result = FALSE;
919 continue;
920 }
921
922 idx = (Elf_Internal_Group *) shdr->contents;
923 n_elt = shdr->sh_size / 4;
924
925 while (--n_elt != 0)
926 {
927 ++ idx;
928
929 if (idx->shdr == NULL)
930 continue;
931 else if (idx->shdr->bfd_section)
932 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
933 else if (idx->shdr->sh_type != SHT_RELA
934 && idx->shdr->sh_type != SHT_REL)
935 {
936 /* There are some unknown sections in the group. */
937 _bfd_error_handler
938 /* xgettext:c-format */
939 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
940 abfd,
941 idx->shdr->sh_type,
942 bfd_elf_string_from_elf_section (abfd,
943 (elf_elfheader (abfd)
944 ->e_shstrndx),
945 idx->shdr->sh_name),
946 shdr->bfd_section);
947 result = FALSE;
948 }
949 }
950 }
951
952 return result;
953 }
954
955 bfd_boolean
956 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
957 {
958 return elf_next_in_group (sec) != NULL;
959 }
960
961 const char *
962 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
963 {
964 if (elf_sec_group (sec) != NULL)
965 return elf_group_name (sec);
966 return NULL;
967 }
968
969 static char *
970 convert_debug_to_zdebug (bfd *abfd, const char *name)
971 {
972 unsigned int len = strlen (name);
973 char *new_name = bfd_alloc (abfd, len + 2);
974 if (new_name == NULL)
975 return NULL;
976 new_name[0] = '.';
977 new_name[1] = 'z';
978 memcpy (new_name + 2, name + 1, len);
979 return new_name;
980 }
981
982 static char *
983 convert_zdebug_to_debug (bfd *abfd, const char *name)
984 {
985 unsigned int len = strlen (name);
986 char *new_name = bfd_alloc (abfd, len);
987 if (new_name == NULL)
988 return NULL;
989 new_name[0] = '.';
990 memcpy (new_name + 1, name + 2, len - 1);
991 return new_name;
992 }
993
994 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
995
996 struct lto_section
997 {
998 int16_t major_version;
999 int16_t minor_version;
1000 unsigned char slim_object;
1001
1002 /* Flags is a private field that is not defined publicly. */
1003 uint16_t flags;
1004 };
1005
1006 /* Make a BFD section from an ELF section. We store a pointer to the
1007 BFD section in the bfd_section field of the header. */
1008
1009 bfd_boolean
1010 _bfd_elf_make_section_from_shdr (bfd *abfd,
1011 Elf_Internal_Shdr *hdr,
1012 const char *name,
1013 int shindex)
1014 {
1015 asection *newsect;
1016 flagword flags;
1017 const struct elf_backend_data *bed;
1018 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
1019
1020 if (hdr->bfd_section != NULL)
1021 return TRUE;
1022
1023 newsect = bfd_make_section_anyway (abfd, name);
1024 if (newsect == NULL)
1025 return FALSE;
1026
1027 hdr->bfd_section = newsect;
1028 elf_section_data (newsect)->this_hdr = *hdr;
1029 elf_section_data (newsect)->this_idx = shindex;
1030
1031 /* Always use the real type/flags. */
1032 elf_section_type (newsect) = hdr->sh_type;
1033 elf_section_flags (newsect) = hdr->sh_flags;
1034
1035 newsect->filepos = hdr->sh_offset;
1036
1037 flags = SEC_NO_FLAGS;
1038 if (hdr->sh_type != SHT_NOBITS)
1039 flags |= SEC_HAS_CONTENTS;
1040 if (hdr->sh_type == SHT_GROUP)
1041 flags |= SEC_GROUP;
1042 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1043 {
1044 flags |= SEC_ALLOC;
1045 if (hdr->sh_type != SHT_NOBITS)
1046 flags |= SEC_LOAD;
1047 }
1048 if ((hdr->sh_flags & SHF_WRITE) == 0)
1049 flags |= SEC_READONLY;
1050 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1051 flags |= SEC_CODE;
1052 else if ((flags & SEC_LOAD) != 0)
1053 flags |= SEC_DATA;
1054 if ((hdr->sh_flags & SHF_MERGE) != 0)
1055 {
1056 flags |= SEC_MERGE;
1057 newsect->entsize = hdr->sh_entsize;
1058 }
1059 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1060 flags |= SEC_STRINGS;
1061 if (hdr->sh_flags & SHF_GROUP)
1062 if (!setup_group (abfd, hdr, newsect))
1063 return FALSE;
1064 if ((hdr->sh_flags & SHF_TLS) != 0)
1065 flags |= SEC_THREAD_LOCAL;
1066 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1067 flags |= SEC_EXCLUDE;
1068
1069 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1070 {
1071 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1072 but binutils as of 2019-07-23 did not set the EI_OSABI header
1073 byte. */
1074 case ELFOSABI_NONE:
1075 case ELFOSABI_GNU:
1076 case ELFOSABI_FREEBSD:
1077 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1078 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1079 break;
1080 }
1081
1082 if ((flags & SEC_ALLOC) == 0)
1083 {
1084 /* The debugging sections appear to be recognized only by name,
1085 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1086 if (name [0] == '.')
1087 {
1088 if (strncmp (name, ".debug", 6) == 0
1089 || strncmp (name, ".gnu.linkonce.wi.", 17) == 0
1090 || strncmp (name, ".zdebug", 7) == 0)
1091 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1092 else if (strncmp (name, GNU_BUILD_ATTRS_SECTION_NAME, 21) == 0
1093 || strncmp (name, ".note.gnu", 9) == 0)
1094 {
1095 flags |= SEC_ELF_OCTETS;
1096 opb = 1;
1097 }
1098 else if (strncmp (name, ".line", 5) == 0
1099 || strncmp (name, ".stab", 5) == 0
1100 || strcmp (name, ".gdb_index") == 0)
1101 flags |= SEC_DEBUGGING;
1102 }
1103 }
1104
1105 if (!bfd_set_section_vma (newsect, hdr->sh_addr / opb)
1106 || !bfd_set_section_size (newsect, hdr->sh_size)
1107 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1108 return FALSE;
1109
1110 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1111 only link a single copy of the section. This is used to support
1112 g++. g++ will emit each template expansion in its own section.
1113 The symbols will be defined as weak, so that multiple definitions
1114 are permitted. The GNU linker extension is to actually discard
1115 all but one of the sections. */
1116 if (CONST_STRNEQ (name, ".gnu.linkonce")
1117 && elf_next_in_group (newsect) == NULL)
1118 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1119
1120 if (!bfd_set_section_flags (newsect, flags))
1121 return FALSE;
1122
1123 bed = get_elf_backend_data (abfd);
1124 if (bed->elf_backend_section_flags)
1125 if (!bed->elf_backend_section_flags (hdr))
1126 return FALSE;
1127
1128 /* We do not parse the PT_NOTE segments as we are interested even in the
1129 separate debug info files which may have the segments offsets corrupted.
1130 PT_NOTEs from the core files are currently not parsed using BFD. */
1131 if (hdr->sh_type == SHT_NOTE)
1132 {
1133 bfd_byte *contents;
1134
1135 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1136 return FALSE;
1137
1138 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1139 hdr->sh_offset, hdr->sh_addralign);
1140 free (contents);
1141 }
1142
1143 if ((newsect->flags & SEC_ALLOC) != 0)
1144 {
1145 Elf_Internal_Phdr *phdr;
1146 unsigned int i, nload;
1147
1148 /* Some ELF linkers produce binaries with all the program header
1149 p_paddr fields zero. If we have such a binary with more than
1150 one PT_LOAD header, then leave the section lma equal to vma
1151 so that we don't create sections with overlapping lma. */
1152 phdr = elf_tdata (abfd)->phdr;
1153 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1154 if (phdr->p_paddr != 0)
1155 break;
1156 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1157 ++nload;
1158 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1159 return TRUE;
1160
1161 phdr = elf_tdata (abfd)->phdr;
1162 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1163 {
1164 if (((phdr->p_type == PT_LOAD
1165 && (hdr->sh_flags & SHF_TLS) == 0)
1166 || phdr->p_type == PT_TLS)
1167 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1168 {
1169 if ((newsect->flags & SEC_LOAD) == 0)
1170 newsect->lma = (phdr->p_paddr
1171 + hdr->sh_addr - phdr->p_vaddr) / opb;
1172 else
1173 /* We used to use the same adjustment for SEC_LOAD
1174 sections, but that doesn't work if the segment
1175 is packed with code from multiple VMAs.
1176 Instead we calculate the section LMA based on
1177 the segment LMA. It is assumed that the
1178 segment will contain sections with contiguous
1179 LMAs, even if the VMAs are not. */
1180 newsect->lma = (phdr->p_paddr
1181 + hdr->sh_offset - phdr->p_offset) / opb;
1182
1183 /* With contiguous segments, we can't tell from file
1184 offsets whether a section with zero size should
1185 be placed at the end of one segment or the
1186 beginning of the next. Decide based on vaddr. */
1187 if (hdr->sh_addr >= phdr->p_vaddr
1188 && (hdr->sh_addr + hdr->sh_size
1189 <= phdr->p_vaddr + phdr->p_memsz))
1190 break;
1191 }
1192 }
1193 }
1194
1195 /* Compress/decompress DWARF debug sections with names: .debug_* and
1196 .zdebug_*, after the section flags is set. */
1197 if ((newsect->flags & SEC_DEBUGGING)
1198 && ((name[1] == 'd' && name[6] == '_')
1199 || (name[1] == 'z' && name[7] == '_')))
1200 {
1201 enum { nothing, compress, decompress } action = nothing;
1202 int compression_header_size;
1203 bfd_size_type uncompressed_size;
1204 unsigned int uncompressed_align_power;
1205 bfd_boolean compressed
1206 = bfd_is_section_compressed_with_header (abfd, newsect,
1207 &compression_header_size,
1208 &uncompressed_size,
1209 &uncompressed_align_power);
1210 if (compressed)
1211 {
1212 /* Compressed section. Check if we should decompress. */
1213 if ((abfd->flags & BFD_DECOMPRESS))
1214 action = decompress;
1215 }
1216
1217 /* Compress the uncompressed section or convert from/to .zdebug*
1218 section. Check if we should compress. */
1219 if (action == nothing)
1220 {
1221 if (newsect->size != 0
1222 && (abfd->flags & BFD_COMPRESS)
1223 && compression_header_size >= 0
1224 && uncompressed_size > 0
1225 && (!compressed
1226 || ((compression_header_size > 0)
1227 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1228 action = compress;
1229 else
1230 return TRUE;
1231 }
1232
1233 if (action == compress)
1234 {
1235 if (!bfd_init_section_compress_status (abfd, newsect))
1236 {
1237 _bfd_error_handler
1238 /* xgettext:c-format */
1239 (_("%pB: unable to initialize compress status for section %s"),
1240 abfd, name);
1241 return FALSE;
1242 }
1243 }
1244 else
1245 {
1246 if (!bfd_init_section_decompress_status (abfd, newsect))
1247 {
1248 _bfd_error_handler
1249 /* xgettext:c-format */
1250 (_("%pB: unable to initialize decompress status for section %s"),
1251 abfd, name);
1252 return FALSE;
1253 }
1254 }
1255
1256 if (abfd->is_linker_input)
1257 {
1258 if (name[1] == 'z'
1259 && (action == decompress
1260 || (action == compress
1261 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1262 {
1263 /* Convert section name from .zdebug_* to .debug_* so
1264 that linker will consider this section as a debug
1265 section. */
1266 char *new_name = convert_zdebug_to_debug (abfd, name);
1267 if (new_name == NULL)
1268 return FALSE;
1269 bfd_rename_section (newsect, new_name);
1270 }
1271 }
1272 else
1273 /* For objdump, don't rename the section. For objcopy, delay
1274 section rename to elf_fake_sections. */
1275 newsect->flags |= SEC_ELF_RENAME;
1276 }
1277
1278 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1279 section. */
1280 const char *lto_section_name = ".gnu.lto_.lto.";
1281 if (strncmp (name, lto_section_name, strlen (lto_section_name)) == 0)
1282 {
1283 struct lto_section lsection;
1284 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1285 sizeof (struct lto_section)))
1286 abfd->lto_slim_object = lsection.slim_object;
1287 }
1288
1289 return TRUE;
1290 }
1291
1292 const char *const bfd_elf_section_type_names[] =
1293 {
1294 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1295 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1296 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1297 };
1298
1299 /* ELF relocs are against symbols. If we are producing relocatable
1300 output, and the reloc is against an external symbol, and nothing
1301 has given us any additional addend, the resulting reloc will also
1302 be against the same symbol. In such a case, we don't want to
1303 change anything about the way the reloc is handled, since it will
1304 all be done at final link time. Rather than put special case code
1305 into bfd_perform_relocation, all the reloc types use this howto
1306 function. It just short circuits the reloc if producing
1307 relocatable output against an external symbol. */
1308
1309 bfd_reloc_status_type
1310 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1311 arelent *reloc_entry,
1312 asymbol *symbol,
1313 void *data ATTRIBUTE_UNUSED,
1314 asection *input_section,
1315 bfd *output_bfd,
1316 char **error_message ATTRIBUTE_UNUSED)
1317 {
1318 if (output_bfd != NULL
1319 && (symbol->flags & BSF_SECTION_SYM) == 0
1320 && (! reloc_entry->howto->partial_inplace
1321 || reloc_entry->addend == 0))
1322 {
1323 reloc_entry->address += input_section->output_offset;
1324 return bfd_reloc_ok;
1325 }
1326
1327 return bfd_reloc_continue;
1328 }
1329 \f
1330 /* Returns TRUE if section A matches section B.
1331 Names, addresses and links may be different, but everything else
1332 should be the same. */
1333
1334 static bfd_boolean
1335 section_match (const Elf_Internal_Shdr * a,
1336 const Elf_Internal_Shdr * b)
1337 {
1338 if (a->sh_type != b->sh_type
1339 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1340 || a->sh_addralign != b->sh_addralign
1341 || a->sh_entsize != b->sh_entsize)
1342 return FALSE;
1343 if (a->sh_type == SHT_SYMTAB
1344 || a->sh_type == SHT_STRTAB)
1345 return TRUE;
1346 return a->sh_size == b->sh_size;
1347 }
1348
1349 /* Find a section in OBFD that has the same characteristics
1350 as IHEADER. Return the index of this section or SHN_UNDEF if
1351 none can be found. Check's section HINT first, as this is likely
1352 to be the correct section. */
1353
1354 static unsigned int
1355 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1356 const unsigned int hint)
1357 {
1358 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1359 unsigned int i;
1360
1361 BFD_ASSERT (iheader != NULL);
1362
1363 /* See PR 20922 for a reproducer of the NULL test. */
1364 if (hint < elf_numsections (obfd)
1365 && oheaders[hint] != NULL
1366 && section_match (oheaders[hint], iheader))
1367 return hint;
1368
1369 for (i = 1; i < elf_numsections (obfd); i++)
1370 {
1371 Elf_Internal_Shdr * oheader = oheaders[i];
1372
1373 if (oheader == NULL)
1374 continue;
1375 if (section_match (oheader, iheader))
1376 /* FIXME: Do we care if there is a potential for
1377 multiple matches ? */
1378 return i;
1379 }
1380
1381 return SHN_UNDEF;
1382 }
1383
1384 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1385 Processor specific section, based upon a matching input section.
1386 Returns TRUE upon success, FALSE otherwise. */
1387
1388 static bfd_boolean
1389 copy_special_section_fields (const bfd *ibfd,
1390 bfd *obfd,
1391 const Elf_Internal_Shdr *iheader,
1392 Elf_Internal_Shdr *oheader,
1393 const unsigned int secnum)
1394 {
1395 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1396 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1397 bfd_boolean changed = FALSE;
1398 unsigned int sh_link;
1399
1400 if (oheader->sh_type == SHT_NOBITS)
1401 {
1402 /* This is a feature for objcopy --only-keep-debug:
1403 When a section's type is changed to NOBITS, we preserve
1404 the sh_link and sh_info fields so that they can be
1405 matched up with the original.
1406
1407 Note: Strictly speaking these assignments are wrong.
1408 The sh_link and sh_info fields should point to the
1409 relevent sections in the output BFD, which may not be in
1410 the same location as they were in the input BFD. But
1411 the whole point of this action is to preserve the
1412 original values of the sh_link and sh_info fields, so
1413 that they can be matched up with the section headers in
1414 the original file. So strictly speaking we may be
1415 creating an invalid ELF file, but it is only for a file
1416 that just contains debug info and only for sections
1417 without any contents. */
1418 if (oheader->sh_link == 0)
1419 oheader->sh_link = iheader->sh_link;
1420 if (oheader->sh_info == 0)
1421 oheader->sh_info = iheader->sh_info;
1422 return TRUE;
1423 }
1424
1425 /* Allow the target a chance to decide how these fields should be set. */
1426 if (bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1427 iheader, oheader))
1428 return TRUE;
1429
1430 /* We have an iheader which might match oheader, and which has non-zero
1431 sh_info and/or sh_link fields. Attempt to follow those links and find
1432 the section in the output bfd which corresponds to the linked section
1433 in the input bfd. */
1434 if (iheader->sh_link != SHN_UNDEF)
1435 {
1436 /* See PR 20931 for a reproducer. */
1437 if (iheader->sh_link >= elf_numsections (ibfd))
1438 {
1439 _bfd_error_handler
1440 /* xgettext:c-format */
1441 (_("%pB: invalid sh_link field (%d) in section number %d"),
1442 ibfd, iheader->sh_link, secnum);
1443 return FALSE;
1444 }
1445
1446 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1447 if (sh_link != SHN_UNDEF)
1448 {
1449 oheader->sh_link = sh_link;
1450 changed = TRUE;
1451 }
1452 else
1453 /* FIXME: Should we install iheader->sh_link
1454 if we could not find a match ? */
1455 _bfd_error_handler
1456 /* xgettext:c-format */
1457 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1458 }
1459
1460 if (iheader->sh_info)
1461 {
1462 /* The sh_info field can hold arbitrary information, but if the
1463 SHF_LINK_INFO flag is set then it should be interpreted as a
1464 section index. */
1465 if (iheader->sh_flags & SHF_INFO_LINK)
1466 {
1467 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1468 iheader->sh_info);
1469 if (sh_link != SHN_UNDEF)
1470 oheader->sh_flags |= SHF_INFO_LINK;
1471 }
1472 else
1473 /* No idea what it means - just copy it. */
1474 sh_link = iheader->sh_info;
1475
1476 if (sh_link != SHN_UNDEF)
1477 {
1478 oheader->sh_info = sh_link;
1479 changed = TRUE;
1480 }
1481 else
1482 _bfd_error_handler
1483 /* xgettext:c-format */
1484 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1485 }
1486
1487 return changed;
1488 }
1489
1490 /* Copy the program header and other data from one object module to
1491 another. */
1492
1493 bfd_boolean
1494 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1495 {
1496 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1497 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1498 const struct elf_backend_data *bed;
1499 unsigned int i;
1500
1501 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1502 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1503 return TRUE;
1504
1505 if (!elf_flags_init (obfd))
1506 {
1507 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1508 elf_flags_init (obfd) = TRUE;
1509 }
1510
1511 elf_gp (obfd) = elf_gp (ibfd);
1512
1513 /* Also copy the EI_OSABI field. */
1514 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1515 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1516
1517 /* If set, copy the EI_ABIVERSION field. */
1518 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1519 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1520 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1521
1522 /* Copy object attributes. */
1523 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1524
1525 if (iheaders == NULL || oheaders == NULL)
1526 return TRUE;
1527
1528 bed = get_elf_backend_data (obfd);
1529
1530 /* Possibly copy other fields in the section header. */
1531 for (i = 1; i < elf_numsections (obfd); i++)
1532 {
1533 unsigned int j;
1534 Elf_Internal_Shdr * oheader = oheaders[i];
1535
1536 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1537 because of a special case need for generating separate debug info
1538 files. See below for more details. */
1539 if (oheader == NULL
1540 || (oheader->sh_type != SHT_NOBITS
1541 && oheader->sh_type < SHT_LOOS))
1542 continue;
1543
1544 /* Ignore empty sections, and sections whose
1545 fields have already been initialised. */
1546 if (oheader->sh_size == 0
1547 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1548 continue;
1549
1550 /* Scan for the matching section in the input bfd.
1551 First we try for a direct mapping between the input and output sections. */
1552 for (j = 1; j < elf_numsections (ibfd); j++)
1553 {
1554 const Elf_Internal_Shdr * iheader = iheaders[j];
1555
1556 if (iheader == NULL)
1557 continue;
1558
1559 if (oheader->bfd_section != NULL
1560 && iheader->bfd_section != NULL
1561 && iheader->bfd_section->output_section != NULL
1562 && iheader->bfd_section->output_section == oheader->bfd_section)
1563 {
1564 /* We have found a connection from the input section to the
1565 output section. Attempt to copy the header fields. If
1566 this fails then do not try any further sections - there
1567 should only be a one-to-one mapping between input and output. */
1568 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1569 j = elf_numsections (ibfd);
1570 break;
1571 }
1572 }
1573
1574 if (j < elf_numsections (ibfd))
1575 continue;
1576
1577 /* That failed. So try to deduce the corresponding input section.
1578 Unfortunately we cannot compare names as the output string table
1579 is empty, so instead we check size, address and type. */
1580 for (j = 1; j < elf_numsections (ibfd); j++)
1581 {
1582 const Elf_Internal_Shdr * iheader = iheaders[j];
1583
1584 if (iheader == NULL)
1585 continue;
1586
1587 /* Try matching fields in the input section's header.
1588 Since --only-keep-debug turns all non-debug sections into
1589 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1590 input type. */
1591 if ((oheader->sh_type == SHT_NOBITS
1592 || iheader->sh_type == oheader->sh_type)
1593 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1594 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1595 && iheader->sh_addralign == oheader->sh_addralign
1596 && iheader->sh_entsize == oheader->sh_entsize
1597 && iheader->sh_size == oheader->sh_size
1598 && iheader->sh_addr == oheader->sh_addr
1599 && (iheader->sh_info != oheader->sh_info
1600 || iheader->sh_link != oheader->sh_link))
1601 {
1602 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1603 break;
1604 }
1605 }
1606
1607 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1608 {
1609 /* Final attempt. Call the backend copy function
1610 with a NULL input section. */
1611 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1612 NULL, oheader);
1613 }
1614 }
1615
1616 return TRUE;
1617 }
1618
1619 static const char *
1620 get_segment_type (unsigned int p_type)
1621 {
1622 const char *pt;
1623 switch (p_type)
1624 {
1625 case PT_NULL: pt = "NULL"; break;
1626 case PT_LOAD: pt = "LOAD"; break;
1627 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1628 case PT_INTERP: pt = "INTERP"; break;
1629 case PT_NOTE: pt = "NOTE"; break;
1630 case PT_SHLIB: pt = "SHLIB"; break;
1631 case PT_PHDR: pt = "PHDR"; break;
1632 case PT_TLS: pt = "TLS"; break;
1633 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1634 case PT_GNU_STACK: pt = "STACK"; break;
1635 case PT_GNU_RELRO: pt = "RELRO"; break;
1636 default: pt = NULL; break;
1637 }
1638 return pt;
1639 }
1640
1641 /* Print out the program headers. */
1642
1643 bfd_boolean
1644 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1645 {
1646 FILE *f = (FILE *) farg;
1647 Elf_Internal_Phdr *p;
1648 asection *s;
1649 bfd_byte *dynbuf = NULL;
1650
1651 p = elf_tdata (abfd)->phdr;
1652 if (p != NULL)
1653 {
1654 unsigned int i, c;
1655
1656 fprintf (f, _("\nProgram Header:\n"));
1657 c = elf_elfheader (abfd)->e_phnum;
1658 for (i = 0; i < c; i++, p++)
1659 {
1660 const char *pt = get_segment_type (p->p_type);
1661 char buf[20];
1662
1663 if (pt == NULL)
1664 {
1665 sprintf (buf, "0x%lx", p->p_type);
1666 pt = buf;
1667 }
1668 fprintf (f, "%8s off 0x", pt);
1669 bfd_fprintf_vma (abfd, f, p->p_offset);
1670 fprintf (f, " vaddr 0x");
1671 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1672 fprintf (f, " paddr 0x");
1673 bfd_fprintf_vma (abfd, f, p->p_paddr);
1674 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1675 fprintf (f, " filesz 0x");
1676 bfd_fprintf_vma (abfd, f, p->p_filesz);
1677 fprintf (f, " memsz 0x");
1678 bfd_fprintf_vma (abfd, f, p->p_memsz);
1679 fprintf (f, " flags %c%c%c",
1680 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1681 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1682 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1683 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1684 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1685 fprintf (f, "\n");
1686 }
1687 }
1688
1689 s = bfd_get_section_by_name (abfd, ".dynamic");
1690 if (s != NULL)
1691 {
1692 unsigned int elfsec;
1693 unsigned long shlink;
1694 bfd_byte *extdyn, *extdynend;
1695 size_t extdynsize;
1696 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1697
1698 fprintf (f, _("\nDynamic Section:\n"));
1699
1700 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1701 goto error_return;
1702
1703 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1704 if (elfsec == SHN_BAD)
1705 goto error_return;
1706 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1707
1708 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1709 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1710
1711 extdyn = dynbuf;
1712 /* PR 17512: file: 6f427532. */
1713 if (s->size < extdynsize)
1714 goto error_return;
1715 extdynend = extdyn + s->size;
1716 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1717 Fix range check. */
1718 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1719 {
1720 Elf_Internal_Dyn dyn;
1721 const char *name = "";
1722 char ab[20];
1723 bfd_boolean stringp;
1724 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1725
1726 (*swap_dyn_in) (abfd, extdyn, &dyn);
1727
1728 if (dyn.d_tag == DT_NULL)
1729 break;
1730
1731 stringp = FALSE;
1732 switch (dyn.d_tag)
1733 {
1734 default:
1735 if (bed->elf_backend_get_target_dtag)
1736 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1737
1738 if (!strcmp (name, ""))
1739 {
1740 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1741 name = ab;
1742 }
1743 break;
1744
1745 case DT_NEEDED: name = "NEEDED"; stringp = TRUE; break;
1746 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1747 case DT_PLTGOT: name = "PLTGOT"; break;
1748 case DT_HASH: name = "HASH"; break;
1749 case DT_STRTAB: name = "STRTAB"; break;
1750 case DT_SYMTAB: name = "SYMTAB"; break;
1751 case DT_RELA: name = "RELA"; break;
1752 case DT_RELASZ: name = "RELASZ"; break;
1753 case DT_RELAENT: name = "RELAENT"; break;
1754 case DT_STRSZ: name = "STRSZ"; break;
1755 case DT_SYMENT: name = "SYMENT"; break;
1756 case DT_INIT: name = "INIT"; break;
1757 case DT_FINI: name = "FINI"; break;
1758 case DT_SONAME: name = "SONAME"; stringp = TRUE; break;
1759 case DT_RPATH: name = "RPATH"; stringp = TRUE; break;
1760 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1761 case DT_REL: name = "REL"; break;
1762 case DT_RELSZ: name = "RELSZ"; break;
1763 case DT_RELENT: name = "RELENT"; break;
1764 case DT_PLTREL: name = "PLTREL"; break;
1765 case DT_DEBUG: name = "DEBUG"; break;
1766 case DT_TEXTREL: name = "TEXTREL"; break;
1767 case DT_JMPREL: name = "JMPREL"; break;
1768 case DT_BIND_NOW: name = "BIND_NOW"; break;
1769 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1770 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1771 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1772 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1773 case DT_RUNPATH: name = "RUNPATH"; stringp = TRUE; break;
1774 case DT_FLAGS: name = "FLAGS"; break;
1775 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1776 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1777 case DT_CHECKSUM: name = "CHECKSUM"; break;
1778 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1779 case DT_MOVEENT: name = "MOVEENT"; break;
1780 case DT_MOVESZ: name = "MOVESZ"; break;
1781 case DT_FEATURE: name = "FEATURE"; break;
1782 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1783 case DT_SYMINSZ: name = "SYMINSZ"; break;
1784 case DT_SYMINENT: name = "SYMINENT"; break;
1785 case DT_CONFIG: name = "CONFIG"; stringp = TRUE; break;
1786 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = TRUE; break;
1787 case DT_AUDIT: name = "AUDIT"; stringp = TRUE; break;
1788 case DT_PLTPAD: name = "PLTPAD"; break;
1789 case DT_MOVETAB: name = "MOVETAB"; break;
1790 case DT_SYMINFO: name = "SYMINFO"; break;
1791 case DT_RELACOUNT: name = "RELACOUNT"; break;
1792 case DT_RELCOUNT: name = "RELCOUNT"; break;
1793 case DT_FLAGS_1: name = "FLAGS_1"; break;
1794 case DT_VERSYM: name = "VERSYM"; break;
1795 case DT_VERDEF: name = "VERDEF"; break;
1796 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1797 case DT_VERNEED: name = "VERNEED"; break;
1798 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1799 case DT_AUXILIARY: name = "AUXILIARY"; stringp = TRUE; break;
1800 case DT_USED: name = "USED"; break;
1801 case DT_FILTER: name = "FILTER"; stringp = TRUE; break;
1802 case DT_GNU_HASH: name = "GNU_HASH"; break;
1803 }
1804
1805 fprintf (f, " %-20s ", name);
1806 if (! stringp)
1807 {
1808 fprintf (f, "0x");
1809 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1810 }
1811 else
1812 {
1813 const char *string;
1814 unsigned int tagv = dyn.d_un.d_val;
1815
1816 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1817 if (string == NULL)
1818 goto error_return;
1819 fprintf (f, "%s", string);
1820 }
1821 fprintf (f, "\n");
1822 }
1823
1824 free (dynbuf);
1825 dynbuf = NULL;
1826 }
1827
1828 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1829 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1830 {
1831 if (! _bfd_elf_slurp_version_tables (abfd, FALSE))
1832 return FALSE;
1833 }
1834
1835 if (elf_dynverdef (abfd) != 0)
1836 {
1837 Elf_Internal_Verdef *t;
1838
1839 fprintf (f, _("\nVersion definitions:\n"));
1840 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1841 {
1842 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1843 t->vd_flags, t->vd_hash,
1844 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1845 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1846 {
1847 Elf_Internal_Verdaux *a;
1848
1849 fprintf (f, "\t");
1850 for (a = t->vd_auxptr->vda_nextptr;
1851 a != NULL;
1852 a = a->vda_nextptr)
1853 fprintf (f, "%s ",
1854 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1855 fprintf (f, "\n");
1856 }
1857 }
1858 }
1859
1860 if (elf_dynverref (abfd) != 0)
1861 {
1862 Elf_Internal_Verneed *t;
1863
1864 fprintf (f, _("\nVersion References:\n"));
1865 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1866 {
1867 Elf_Internal_Vernaux *a;
1868
1869 fprintf (f, _(" required from %s:\n"),
1870 t->vn_filename ? t->vn_filename : "<corrupt>");
1871 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1872 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1873 a->vna_flags, a->vna_other,
1874 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1875 }
1876 }
1877
1878 return TRUE;
1879
1880 error_return:
1881 if (dynbuf != NULL)
1882 free (dynbuf);
1883 return FALSE;
1884 }
1885
1886 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1887 and return symbol version for symbol version itself. */
1888
1889 const char *
1890 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1891 bfd_boolean base_p,
1892 bfd_boolean *hidden)
1893 {
1894 const char *version_string = NULL;
1895 if (elf_dynversym (abfd) != 0
1896 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1897 {
1898 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1899
1900 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1901 vernum &= VERSYM_VERSION;
1902
1903 if (vernum == 0)
1904 version_string = "";
1905 else if (vernum == 1
1906 && (vernum > elf_tdata (abfd)->cverdefs
1907 || (elf_tdata (abfd)->verdef[0].vd_flags
1908 == VER_FLG_BASE)))
1909 version_string = base_p ? "Base" : "";
1910 else if (vernum <= elf_tdata (abfd)->cverdefs)
1911 {
1912 const char *nodename
1913 = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1914 version_string = "";
1915 if (base_p
1916 || nodename == NULL
1917 || symbol->name == NULL
1918 || strcmp (symbol->name, nodename) != 0)
1919 version_string = nodename;
1920 }
1921 else
1922 {
1923 Elf_Internal_Verneed *t;
1924
1925 version_string = _("<corrupt>");
1926 for (t = elf_tdata (abfd)->verref;
1927 t != NULL;
1928 t = t->vn_nextref)
1929 {
1930 Elf_Internal_Vernaux *a;
1931
1932 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1933 {
1934 if (a->vna_other == vernum)
1935 {
1936 version_string = a->vna_nodename;
1937 break;
1938 }
1939 }
1940 }
1941 }
1942 }
1943 return version_string;
1944 }
1945
1946 /* Display ELF-specific fields of a symbol. */
1947
1948 void
1949 bfd_elf_print_symbol (bfd *abfd,
1950 void *filep,
1951 asymbol *symbol,
1952 bfd_print_symbol_type how)
1953 {
1954 FILE *file = (FILE *) filep;
1955 switch (how)
1956 {
1957 case bfd_print_symbol_name:
1958 fprintf (file, "%s", symbol->name);
1959 break;
1960 case bfd_print_symbol_more:
1961 fprintf (file, "elf ");
1962 bfd_fprintf_vma (abfd, file, symbol->value);
1963 fprintf (file, " %x", symbol->flags);
1964 break;
1965 case bfd_print_symbol_all:
1966 {
1967 const char *section_name;
1968 const char *name = NULL;
1969 const struct elf_backend_data *bed;
1970 unsigned char st_other;
1971 bfd_vma val;
1972 const char *version_string;
1973 bfd_boolean hidden;
1974
1975 section_name = symbol->section ? symbol->section->name : "(*none*)";
1976
1977 bed = get_elf_backend_data (abfd);
1978 if (bed->elf_backend_print_symbol_all)
1979 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1980
1981 if (name == NULL)
1982 {
1983 name = symbol->name;
1984 bfd_print_symbol_vandf (abfd, file, symbol);
1985 }
1986
1987 fprintf (file, " %s\t", section_name);
1988 /* Print the "other" value for a symbol. For common symbols,
1989 we've already printed the size; now print the alignment.
1990 For other symbols, we have no specified alignment, and
1991 we've printed the address; now print the size. */
1992 if (symbol->section && bfd_is_com_section (symbol->section))
1993 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1994 else
1995 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1996 bfd_fprintf_vma (abfd, file, val);
1997
1998 /* If we have version information, print it. */
1999 version_string = _bfd_elf_get_symbol_version_string (abfd,
2000 symbol,
2001 TRUE,
2002 &hidden);
2003 if (version_string)
2004 {
2005 if (!hidden)
2006 fprintf (file, " %-11s", version_string);
2007 else
2008 {
2009 int i;
2010
2011 fprintf (file, " (%s)", version_string);
2012 for (i = 10 - strlen (version_string); i > 0; --i)
2013 putc (' ', file);
2014 }
2015 }
2016
2017 /* If the st_other field is not zero, print it. */
2018 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2019
2020 switch (st_other)
2021 {
2022 case 0: break;
2023 case STV_INTERNAL: fprintf (file, " .internal"); break;
2024 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2025 case STV_PROTECTED: fprintf (file, " .protected"); break;
2026 default:
2027 /* Some other non-defined flags are also present, so print
2028 everything hex. */
2029 fprintf (file, " 0x%02x", (unsigned int) st_other);
2030 }
2031
2032 fprintf (file, " %s", name);
2033 }
2034 break;
2035 }
2036 }
2037 \f
2038 /* ELF .o/exec file reading */
2039
2040 /* Create a new bfd section from an ELF section header. */
2041
2042 bfd_boolean
2043 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2044 {
2045 Elf_Internal_Shdr *hdr;
2046 Elf_Internal_Ehdr *ehdr;
2047 const struct elf_backend_data *bed;
2048 const char *name;
2049 bfd_boolean ret = TRUE;
2050 static bfd_boolean * sections_being_created = NULL;
2051 static bfd * sections_being_created_abfd = NULL;
2052 static unsigned int nesting = 0;
2053
2054 if (shindex >= elf_numsections (abfd))
2055 return FALSE;
2056
2057 if (++ nesting > 3)
2058 {
2059 /* PR17512: A corrupt ELF binary might contain a recursive group of
2060 sections, with each the string indices pointing to the next in the
2061 loop. Detect this here, by refusing to load a section that we are
2062 already in the process of loading. We only trigger this test if
2063 we have nested at least three sections deep as normal ELF binaries
2064 can expect to recurse at least once.
2065
2066 FIXME: It would be better if this array was attached to the bfd,
2067 rather than being held in a static pointer. */
2068
2069 if (sections_being_created_abfd != abfd)
2070 sections_being_created = NULL;
2071 if (sections_being_created == NULL)
2072 {
2073 size_t amt = elf_numsections (abfd) * sizeof (bfd_boolean);
2074
2075 /* PR 26005: Do not use bfd_zalloc here as the memory might
2076 be released before the bfd has been fully scanned. */
2077 sections_being_created = (bfd_boolean *) bfd_malloc (amt);
2078 if (sections_being_created == NULL)
2079 return FALSE;
2080 memset (sections_being_created, FALSE, amt);
2081 sections_being_created_abfd = abfd;
2082 }
2083 if (sections_being_created [shindex])
2084 {
2085 _bfd_error_handler
2086 (_("%pB: warning: loop in section dependencies detected"), abfd);
2087 return FALSE;
2088 }
2089 sections_being_created [shindex] = TRUE;
2090 }
2091
2092 hdr = elf_elfsections (abfd)[shindex];
2093 ehdr = elf_elfheader (abfd);
2094 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2095 hdr->sh_name);
2096 if (name == NULL)
2097 goto fail;
2098
2099 bed = get_elf_backend_data (abfd);
2100 switch (hdr->sh_type)
2101 {
2102 case SHT_NULL:
2103 /* Inactive section. Throw it away. */
2104 goto success;
2105
2106 case SHT_PROGBITS: /* Normal section with contents. */
2107 case SHT_NOBITS: /* .bss section. */
2108 case SHT_HASH: /* .hash section. */
2109 case SHT_NOTE: /* .note section. */
2110 case SHT_INIT_ARRAY: /* .init_array section. */
2111 case SHT_FINI_ARRAY: /* .fini_array section. */
2112 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2113 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2114 case SHT_GNU_HASH: /* .gnu.hash section. */
2115 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2116 goto success;
2117
2118 case SHT_DYNAMIC: /* Dynamic linking information. */
2119 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2120 goto fail;
2121
2122 if (hdr->sh_link > elf_numsections (abfd))
2123 {
2124 /* PR 10478: Accept Solaris binaries with a sh_link
2125 field set to SHN_BEFORE or SHN_AFTER. */
2126 switch (bfd_get_arch (abfd))
2127 {
2128 case bfd_arch_i386:
2129 case bfd_arch_sparc:
2130 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2131 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2132 break;
2133 /* Otherwise fall through. */
2134 default:
2135 goto fail;
2136 }
2137 }
2138 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2139 goto fail;
2140 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2141 {
2142 Elf_Internal_Shdr *dynsymhdr;
2143
2144 /* The shared libraries distributed with hpux11 have a bogus
2145 sh_link field for the ".dynamic" section. Find the
2146 string table for the ".dynsym" section instead. */
2147 if (elf_dynsymtab (abfd) != 0)
2148 {
2149 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2150 hdr->sh_link = dynsymhdr->sh_link;
2151 }
2152 else
2153 {
2154 unsigned int i, num_sec;
2155
2156 num_sec = elf_numsections (abfd);
2157 for (i = 1; i < num_sec; i++)
2158 {
2159 dynsymhdr = elf_elfsections (abfd)[i];
2160 if (dynsymhdr->sh_type == SHT_DYNSYM)
2161 {
2162 hdr->sh_link = dynsymhdr->sh_link;
2163 break;
2164 }
2165 }
2166 }
2167 }
2168 goto success;
2169
2170 case SHT_SYMTAB: /* A symbol table. */
2171 if (elf_onesymtab (abfd) == shindex)
2172 goto success;
2173
2174 if (hdr->sh_entsize != bed->s->sizeof_sym)
2175 goto fail;
2176
2177 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2178 {
2179 if (hdr->sh_size != 0)
2180 goto fail;
2181 /* Some assemblers erroneously set sh_info to one with a
2182 zero sh_size. ld sees this as a global symbol count
2183 of (unsigned) -1. Fix it here. */
2184 hdr->sh_info = 0;
2185 goto success;
2186 }
2187
2188 /* PR 18854: A binary might contain more than one symbol table.
2189 Unusual, but possible. Warn, but continue. */
2190 if (elf_onesymtab (abfd) != 0)
2191 {
2192 _bfd_error_handler
2193 /* xgettext:c-format */
2194 (_("%pB: warning: multiple symbol tables detected"
2195 " - ignoring the table in section %u"),
2196 abfd, shindex);
2197 goto success;
2198 }
2199 elf_onesymtab (abfd) = shindex;
2200 elf_symtab_hdr (abfd) = *hdr;
2201 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2202 abfd->flags |= HAS_SYMS;
2203
2204 /* Sometimes a shared object will map in the symbol table. If
2205 SHF_ALLOC is set, and this is a shared object, then we also
2206 treat this section as a BFD section. We can not base the
2207 decision purely on SHF_ALLOC, because that flag is sometimes
2208 set in a relocatable object file, which would confuse the
2209 linker. */
2210 if ((hdr->sh_flags & SHF_ALLOC) != 0
2211 && (abfd->flags & DYNAMIC) != 0
2212 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2213 shindex))
2214 goto fail;
2215
2216 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2217 can't read symbols without that section loaded as well. It
2218 is most likely specified by the next section header. */
2219 {
2220 elf_section_list * entry;
2221 unsigned int i, num_sec;
2222
2223 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2224 if (entry->hdr.sh_link == shindex)
2225 goto success;
2226
2227 num_sec = elf_numsections (abfd);
2228 for (i = shindex + 1; i < num_sec; i++)
2229 {
2230 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2231
2232 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2233 && hdr2->sh_link == shindex)
2234 break;
2235 }
2236
2237 if (i == num_sec)
2238 for (i = 1; i < shindex; i++)
2239 {
2240 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2241
2242 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2243 && hdr2->sh_link == shindex)
2244 break;
2245 }
2246
2247 if (i != shindex)
2248 ret = bfd_section_from_shdr (abfd, i);
2249 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2250 goto success;
2251 }
2252
2253 case SHT_DYNSYM: /* A dynamic symbol table. */
2254 if (elf_dynsymtab (abfd) == shindex)
2255 goto success;
2256
2257 if (hdr->sh_entsize != bed->s->sizeof_sym)
2258 goto fail;
2259
2260 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2261 {
2262 if (hdr->sh_size != 0)
2263 goto fail;
2264
2265 /* Some linkers erroneously set sh_info to one with a
2266 zero sh_size. ld sees this as a global symbol count
2267 of (unsigned) -1. Fix it here. */
2268 hdr->sh_info = 0;
2269 goto success;
2270 }
2271
2272 /* PR 18854: A binary might contain more than one dynamic symbol table.
2273 Unusual, but possible. Warn, but continue. */
2274 if (elf_dynsymtab (abfd) != 0)
2275 {
2276 _bfd_error_handler
2277 /* xgettext:c-format */
2278 (_("%pB: warning: multiple dynamic symbol tables detected"
2279 " - ignoring the table in section %u"),
2280 abfd, shindex);
2281 goto success;
2282 }
2283 elf_dynsymtab (abfd) = shindex;
2284 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2285 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2286 abfd->flags |= HAS_SYMS;
2287
2288 /* Besides being a symbol table, we also treat this as a regular
2289 section, so that objcopy can handle it. */
2290 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2291 goto success;
2292
2293 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2294 {
2295 elf_section_list * entry;
2296
2297 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2298 if (entry->ndx == shindex)
2299 goto success;
2300
2301 entry = bfd_alloc (abfd, sizeof (*entry));
2302 if (entry == NULL)
2303 goto fail;
2304 entry->ndx = shindex;
2305 entry->hdr = * hdr;
2306 entry->next = elf_symtab_shndx_list (abfd);
2307 elf_symtab_shndx_list (abfd) = entry;
2308 elf_elfsections (abfd)[shindex] = & entry->hdr;
2309 goto success;
2310 }
2311
2312 case SHT_STRTAB: /* A string table. */
2313 if (hdr->bfd_section != NULL)
2314 goto success;
2315
2316 if (ehdr->e_shstrndx == shindex)
2317 {
2318 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2319 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2320 goto success;
2321 }
2322
2323 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2324 {
2325 symtab_strtab:
2326 elf_tdata (abfd)->strtab_hdr = *hdr;
2327 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2328 goto success;
2329 }
2330
2331 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2332 {
2333 dynsymtab_strtab:
2334 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2335 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2336 elf_elfsections (abfd)[shindex] = hdr;
2337 /* We also treat this as a regular section, so that objcopy
2338 can handle it. */
2339 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2340 shindex);
2341 goto success;
2342 }
2343
2344 /* If the string table isn't one of the above, then treat it as a
2345 regular section. We need to scan all the headers to be sure,
2346 just in case this strtab section appeared before the above. */
2347 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2348 {
2349 unsigned int i, num_sec;
2350
2351 num_sec = elf_numsections (abfd);
2352 for (i = 1; i < num_sec; i++)
2353 {
2354 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2355 if (hdr2->sh_link == shindex)
2356 {
2357 /* Prevent endless recursion on broken objects. */
2358 if (i == shindex)
2359 goto fail;
2360 if (! bfd_section_from_shdr (abfd, i))
2361 goto fail;
2362 if (elf_onesymtab (abfd) == i)
2363 goto symtab_strtab;
2364 if (elf_dynsymtab (abfd) == i)
2365 goto dynsymtab_strtab;
2366 }
2367 }
2368 }
2369 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2370 goto success;
2371
2372 case SHT_REL:
2373 case SHT_RELA:
2374 /* *These* do a lot of work -- but build no sections! */
2375 {
2376 asection *target_sect;
2377 Elf_Internal_Shdr *hdr2, **p_hdr;
2378 unsigned int num_sec = elf_numsections (abfd);
2379 struct bfd_elf_section_data *esdt;
2380
2381 if (hdr->sh_entsize
2382 != (bfd_size_type) (hdr->sh_type == SHT_REL
2383 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2384 goto fail;
2385
2386 /* Check for a bogus link to avoid crashing. */
2387 if (hdr->sh_link >= num_sec)
2388 {
2389 _bfd_error_handler
2390 /* xgettext:c-format */
2391 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2392 abfd, hdr->sh_link, name, shindex);
2393 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2394 shindex);
2395 goto success;
2396 }
2397
2398 /* For some incomprehensible reason Oracle distributes
2399 libraries for Solaris in which some of the objects have
2400 bogus sh_link fields. It would be nice if we could just
2401 reject them, but, unfortunately, some people need to use
2402 them. We scan through the section headers; if we find only
2403 one suitable symbol table, we clobber the sh_link to point
2404 to it. I hope this doesn't break anything.
2405
2406 Don't do it on executable nor shared library. */
2407 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2408 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2409 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2410 {
2411 unsigned int scan;
2412 int found;
2413
2414 found = 0;
2415 for (scan = 1; scan < num_sec; scan++)
2416 {
2417 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2418 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2419 {
2420 if (found != 0)
2421 {
2422 found = 0;
2423 break;
2424 }
2425 found = scan;
2426 }
2427 }
2428 if (found != 0)
2429 hdr->sh_link = found;
2430 }
2431
2432 /* Get the symbol table. */
2433 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2434 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2435 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2436 goto fail;
2437
2438 /* If this is an alloc section in an executable or shared
2439 library, or the reloc section does not use the main symbol
2440 table we don't treat it as a reloc section. BFD can't
2441 adequately represent such a section, so at least for now,
2442 we don't try. We just present it as a normal section. We
2443 also can't use it as a reloc section if it points to the
2444 null section, an invalid section, another reloc section, or
2445 its sh_link points to the null section. */
2446 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2447 && (hdr->sh_flags & SHF_ALLOC) != 0)
2448 || hdr->sh_link == SHN_UNDEF
2449 || hdr->sh_link != elf_onesymtab (abfd)
2450 || hdr->sh_info == SHN_UNDEF
2451 || hdr->sh_info >= num_sec
2452 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2453 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2454 {
2455 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2456 shindex);
2457 goto success;
2458 }
2459
2460 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2461 goto fail;
2462
2463 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2464 if (target_sect == NULL)
2465 goto fail;
2466
2467 esdt = elf_section_data (target_sect);
2468 if (hdr->sh_type == SHT_RELA)
2469 p_hdr = &esdt->rela.hdr;
2470 else
2471 p_hdr = &esdt->rel.hdr;
2472
2473 /* PR 17512: file: 0b4f81b7.
2474 Also see PR 24456, for a file which deliberately has two reloc
2475 sections. */
2476 if (*p_hdr != NULL)
2477 {
2478 if (!bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2479 {
2480 _bfd_error_handler
2481 /* xgettext:c-format */
2482 (_("%pB: warning: secondary relocation section '%s' "
2483 "for section %pA found - ignoring"),
2484 abfd, name, target_sect);
2485 }
2486 goto success;
2487 }
2488
2489 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2490 if (hdr2 == NULL)
2491 goto fail;
2492 *hdr2 = *hdr;
2493 *p_hdr = hdr2;
2494 elf_elfsections (abfd)[shindex] = hdr2;
2495 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2496 * bed->s->int_rels_per_ext_rel);
2497 target_sect->flags |= SEC_RELOC;
2498 target_sect->relocation = NULL;
2499 target_sect->rel_filepos = hdr->sh_offset;
2500 /* In the section to which the relocations apply, mark whether
2501 its relocations are of the REL or RELA variety. */
2502 if (hdr->sh_size != 0)
2503 {
2504 if (hdr->sh_type == SHT_RELA)
2505 target_sect->use_rela_p = 1;
2506 }
2507 abfd->flags |= HAS_RELOC;
2508 goto success;
2509 }
2510
2511 case SHT_GNU_verdef:
2512 elf_dynverdef (abfd) = shindex;
2513 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2514 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2515 goto success;
2516
2517 case SHT_GNU_versym:
2518 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2519 goto fail;
2520
2521 elf_dynversym (abfd) = shindex;
2522 elf_tdata (abfd)->dynversym_hdr = *hdr;
2523 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2524 goto success;
2525
2526 case SHT_GNU_verneed:
2527 elf_dynverref (abfd) = shindex;
2528 elf_tdata (abfd)->dynverref_hdr = *hdr;
2529 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2530 goto success;
2531
2532 case SHT_SHLIB:
2533 goto success;
2534
2535 case SHT_GROUP:
2536 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2537 goto fail;
2538
2539 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2540 goto fail;
2541
2542 goto success;
2543
2544 default:
2545 /* Possibly an attributes section. */
2546 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2547 || hdr->sh_type == bed->obj_attrs_section_type)
2548 {
2549 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2550 goto fail;
2551 _bfd_elf_parse_attributes (abfd, hdr);
2552 goto success;
2553 }
2554
2555 /* Check for any processor-specific section types. */
2556 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2557 goto success;
2558
2559 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2560 {
2561 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2562 /* FIXME: How to properly handle allocated section reserved
2563 for applications? */
2564 _bfd_error_handler
2565 /* xgettext:c-format */
2566 (_("%pB: unknown type [%#x] section `%s'"),
2567 abfd, hdr->sh_type, name);
2568 else
2569 {
2570 /* Allow sections reserved for applications. */
2571 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2572 shindex);
2573 goto success;
2574 }
2575 }
2576 else if (hdr->sh_type >= SHT_LOPROC
2577 && hdr->sh_type <= SHT_HIPROC)
2578 /* FIXME: We should handle this section. */
2579 _bfd_error_handler
2580 /* xgettext:c-format */
2581 (_("%pB: unknown type [%#x] section `%s'"),
2582 abfd, hdr->sh_type, name);
2583 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2584 {
2585 /* Unrecognised OS-specific sections. */
2586 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2587 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2588 required to correctly process the section and the file should
2589 be rejected with an error message. */
2590 _bfd_error_handler
2591 /* xgettext:c-format */
2592 (_("%pB: unknown type [%#x] section `%s'"),
2593 abfd, hdr->sh_type, name);
2594 else
2595 {
2596 /* Otherwise it should be processed. */
2597 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2598 goto success;
2599 }
2600 }
2601 else
2602 /* FIXME: We should handle this section. */
2603 _bfd_error_handler
2604 /* xgettext:c-format */
2605 (_("%pB: unknown type [%#x] section `%s'"),
2606 abfd, hdr->sh_type, name);
2607
2608 goto fail;
2609 }
2610
2611 fail:
2612 ret = FALSE;
2613 success:
2614 if (sections_being_created && sections_being_created_abfd == abfd)
2615 sections_being_created [shindex] = FALSE;
2616 if (-- nesting == 0)
2617 {
2618 free (sections_being_created);
2619 sections_being_created = NULL;
2620 sections_being_created_abfd = NULL;
2621 }
2622 return ret;
2623 }
2624
2625 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2626
2627 Elf_Internal_Sym *
2628 bfd_sym_from_r_symndx (struct sym_cache *cache,
2629 bfd *abfd,
2630 unsigned long r_symndx)
2631 {
2632 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2633
2634 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2635 {
2636 Elf_Internal_Shdr *symtab_hdr;
2637 unsigned char esym[sizeof (Elf64_External_Sym)];
2638 Elf_External_Sym_Shndx eshndx;
2639
2640 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2641 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2642 &cache->sym[ent], esym, &eshndx) == NULL)
2643 return NULL;
2644
2645 if (cache->abfd != abfd)
2646 {
2647 memset (cache->indx, -1, sizeof (cache->indx));
2648 cache->abfd = abfd;
2649 }
2650 cache->indx[ent] = r_symndx;
2651 }
2652
2653 return &cache->sym[ent];
2654 }
2655
2656 /* Given an ELF section number, retrieve the corresponding BFD
2657 section. */
2658
2659 asection *
2660 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2661 {
2662 if (sec_index >= elf_numsections (abfd))
2663 return NULL;
2664 return elf_elfsections (abfd)[sec_index]->bfd_section;
2665 }
2666
2667 static const struct bfd_elf_special_section special_sections_b[] =
2668 {
2669 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2670 { NULL, 0, 0, 0, 0 }
2671 };
2672
2673 static const struct bfd_elf_special_section special_sections_c[] =
2674 {
2675 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2676 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2677 { NULL, 0, 0, 0, 0 }
2678 };
2679
2680 static const struct bfd_elf_special_section special_sections_d[] =
2681 {
2682 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2683 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2684 /* There are more DWARF sections than these, but they needn't be added here
2685 unless you have to cope with broken compilers that don't emit section
2686 attributes or you want to help the user writing assembler. */
2687 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2688 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2689 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2690 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2691 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2692 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2693 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2694 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2695 { NULL, 0, 0, 0, 0 }
2696 };
2697
2698 static const struct bfd_elf_special_section special_sections_f[] =
2699 {
2700 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2701 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2702 { NULL, 0 , 0, 0, 0 }
2703 };
2704
2705 static const struct bfd_elf_special_section special_sections_g[] =
2706 {
2707 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2708 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2709 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2710 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2711 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2712 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2713 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2714 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2715 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2716 { NULL, 0, 0, 0, 0 }
2717 };
2718
2719 static const struct bfd_elf_special_section special_sections_h[] =
2720 {
2721 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2722 { NULL, 0, 0, 0, 0 }
2723 };
2724
2725 static const struct bfd_elf_special_section special_sections_i[] =
2726 {
2727 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2728 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2729 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2730 { NULL, 0, 0, 0, 0 }
2731 };
2732
2733 static const struct bfd_elf_special_section special_sections_l[] =
2734 {
2735 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2736 { NULL, 0, 0, 0, 0 }
2737 };
2738
2739 static const struct bfd_elf_special_section special_sections_n[] =
2740 {
2741 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2742 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2743 { NULL, 0, 0, 0, 0 }
2744 };
2745
2746 static const struct bfd_elf_special_section special_sections_p[] =
2747 {
2748 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2749 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2750 { NULL, 0, 0, 0, 0 }
2751 };
2752
2753 static const struct bfd_elf_special_section special_sections_r[] =
2754 {
2755 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2756 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2757 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2758 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2759 { NULL, 0, 0, 0, 0 }
2760 };
2761
2762 static const struct bfd_elf_special_section special_sections_s[] =
2763 {
2764 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2765 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2766 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2767 /* See struct bfd_elf_special_section declaration for the semantics of
2768 this special case where .prefix_length != strlen (.prefix). */
2769 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2770 { NULL, 0, 0, 0, 0 }
2771 };
2772
2773 static const struct bfd_elf_special_section special_sections_t[] =
2774 {
2775 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2776 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2777 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2778 { NULL, 0, 0, 0, 0 }
2779 };
2780
2781 static const struct bfd_elf_special_section special_sections_z[] =
2782 {
2783 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2784 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2785 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2786 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2787 { NULL, 0, 0, 0, 0 }
2788 };
2789
2790 static const struct bfd_elf_special_section * const special_sections[] =
2791 {
2792 special_sections_b, /* 'b' */
2793 special_sections_c, /* 'c' */
2794 special_sections_d, /* 'd' */
2795 NULL, /* 'e' */
2796 special_sections_f, /* 'f' */
2797 special_sections_g, /* 'g' */
2798 special_sections_h, /* 'h' */
2799 special_sections_i, /* 'i' */
2800 NULL, /* 'j' */
2801 NULL, /* 'k' */
2802 special_sections_l, /* 'l' */
2803 NULL, /* 'm' */
2804 special_sections_n, /* 'n' */
2805 NULL, /* 'o' */
2806 special_sections_p, /* 'p' */
2807 NULL, /* 'q' */
2808 special_sections_r, /* 'r' */
2809 special_sections_s, /* 's' */
2810 special_sections_t, /* 't' */
2811 NULL, /* 'u' */
2812 NULL, /* 'v' */
2813 NULL, /* 'w' */
2814 NULL, /* 'x' */
2815 NULL, /* 'y' */
2816 special_sections_z /* 'z' */
2817 };
2818
2819 const struct bfd_elf_special_section *
2820 _bfd_elf_get_special_section (const char *name,
2821 const struct bfd_elf_special_section *spec,
2822 unsigned int rela)
2823 {
2824 int i;
2825 int len;
2826
2827 len = strlen (name);
2828
2829 for (i = 0; spec[i].prefix != NULL; i++)
2830 {
2831 int suffix_len;
2832 int prefix_len = spec[i].prefix_length;
2833
2834 if (len < prefix_len)
2835 continue;
2836 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2837 continue;
2838
2839 suffix_len = spec[i].suffix_length;
2840 if (suffix_len <= 0)
2841 {
2842 if (name[prefix_len] != 0)
2843 {
2844 if (suffix_len == 0)
2845 continue;
2846 if (name[prefix_len] != '.'
2847 && (suffix_len == -2
2848 || (rela && spec[i].type == SHT_REL)))
2849 continue;
2850 }
2851 }
2852 else
2853 {
2854 if (len < prefix_len + suffix_len)
2855 continue;
2856 if (memcmp (name + len - suffix_len,
2857 spec[i].prefix + prefix_len,
2858 suffix_len) != 0)
2859 continue;
2860 }
2861 return &spec[i];
2862 }
2863
2864 return NULL;
2865 }
2866
2867 const struct bfd_elf_special_section *
2868 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2869 {
2870 int i;
2871 const struct bfd_elf_special_section *spec;
2872 const struct elf_backend_data *bed;
2873
2874 /* See if this is one of the special sections. */
2875 if (sec->name == NULL)
2876 return NULL;
2877
2878 bed = get_elf_backend_data (abfd);
2879 spec = bed->special_sections;
2880 if (spec)
2881 {
2882 spec = _bfd_elf_get_special_section (sec->name,
2883 bed->special_sections,
2884 sec->use_rela_p);
2885 if (spec != NULL)
2886 return spec;
2887 }
2888
2889 if (sec->name[0] != '.')
2890 return NULL;
2891
2892 i = sec->name[1] - 'b';
2893 if (i < 0 || i > 'z' - 'b')
2894 return NULL;
2895
2896 spec = special_sections[i];
2897
2898 if (spec == NULL)
2899 return NULL;
2900
2901 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2902 }
2903
2904 bfd_boolean
2905 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2906 {
2907 struct bfd_elf_section_data *sdata;
2908 const struct elf_backend_data *bed;
2909 const struct bfd_elf_special_section *ssect;
2910
2911 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2912 if (sdata == NULL)
2913 {
2914 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2915 sizeof (*sdata));
2916 if (sdata == NULL)
2917 return FALSE;
2918 sec->used_by_bfd = sdata;
2919 }
2920
2921 /* Indicate whether or not this section should use RELA relocations. */
2922 bed = get_elf_backend_data (abfd);
2923 sec->use_rela_p = bed->default_use_rela_p;
2924
2925 /* Set up ELF section type and flags for newly created sections, if
2926 there is an ABI mandated section. */
2927 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2928 if (ssect != NULL)
2929 {
2930 elf_section_type (sec) = ssect->type;
2931 elf_section_flags (sec) = ssect->attr;
2932 }
2933
2934 return _bfd_generic_new_section_hook (abfd, sec);
2935 }
2936
2937 /* Create a new bfd section from an ELF program header.
2938
2939 Since program segments have no names, we generate a synthetic name
2940 of the form segment<NUM>, where NUM is generally the index in the
2941 program header table. For segments that are split (see below) we
2942 generate the names segment<NUM>a and segment<NUM>b.
2943
2944 Note that some program segments may have a file size that is different than
2945 (less than) the memory size. All this means is that at execution the
2946 system must allocate the amount of memory specified by the memory size,
2947 but only initialize it with the first "file size" bytes read from the
2948 file. This would occur for example, with program segments consisting
2949 of combined data+bss.
2950
2951 To handle the above situation, this routine generates TWO bfd sections
2952 for the single program segment. The first has the length specified by
2953 the file size of the segment, and the second has the length specified
2954 by the difference between the two sizes. In effect, the segment is split
2955 into its initialized and uninitialized parts.
2956
2957 */
2958
2959 bfd_boolean
2960 _bfd_elf_make_section_from_phdr (bfd *abfd,
2961 Elf_Internal_Phdr *hdr,
2962 int hdr_index,
2963 const char *type_name)
2964 {
2965 asection *newsect;
2966 char *name;
2967 char namebuf[64];
2968 size_t len;
2969 int split;
2970 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
2971
2972 split = ((hdr->p_memsz > 0)
2973 && (hdr->p_filesz > 0)
2974 && (hdr->p_memsz > hdr->p_filesz));
2975
2976 if (hdr->p_filesz > 0)
2977 {
2978 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2979 len = strlen (namebuf) + 1;
2980 name = (char *) bfd_alloc (abfd, len);
2981 if (!name)
2982 return FALSE;
2983 memcpy (name, namebuf, len);
2984 newsect = bfd_make_section (abfd, name);
2985 if (newsect == NULL)
2986 return FALSE;
2987 newsect->vma = hdr->p_vaddr / opb;
2988 newsect->lma = hdr->p_paddr / opb;
2989 newsect->size = hdr->p_filesz;
2990 newsect->filepos = hdr->p_offset;
2991 newsect->flags |= SEC_HAS_CONTENTS;
2992 newsect->alignment_power = bfd_log2 (hdr->p_align);
2993 if (hdr->p_type == PT_LOAD)
2994 {
2995 newsect->flags |= SEC_ALLOC;
2996 newsect->flags |= SEC_LOAD;
2997 if (hdr->p_flags & PF_X)
2998 {
2999 /* FIXME: all we known is that it has execute PERMISSION,
3000 may be data. */
3001 newsect->flags |= SEC_CODE;
3002 }
3003 }
3004 if (!(hdr->p_flags & PF_W))
3005 {
3006 newsect->flags |= SEC_READONLY;
3007 }
3008 }
3009
3010 if (hdr->p_memsz > hdr->p_filesz)
3011 {
3012 bfd_vma align;
3013
3014 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
3015 len = strlen (namebuf) + 1;
3016 name = (char *) bfd_alloc (abfd, len);
3017 if (!name)
3018 return FALSE;
3019 memcpy (name, namebuf, len);
3020 newsect = bfd_make_section (abfd, name);
3021 if (newsect == NULL)
3022 return FALSE;
3023 newsect->vma = (hdr->p_vaddr + hdr->p_filesz) / opb;
3024 newsect->lma = (hdr->p_paddr + hdr->p_filesz) / opb;
3025 newsect->size = hdr->p_memsz - hdr->p_filesz;
3026 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3027 align = newsect->vma & -newsect->vma;
3028 if (align == 0 || align > hdr->p_align)
3029 align = hdr->p_align;
3030 newsect->alignment_power = bfd_log2 (align);
3031 if (hdr->p_type == PT_LOAD)
3032 {
3033 /* Hack for gdb. Segments that have not been modified do
3034 not have their contents written to a core file, on the
3035 assumption that a debugger can find the contents in the
3036 executable. We flag this case by setting the fake
3037 section size to zero. Note that "real" bss sections will
3038 always have their contents dumped to the core file. */
3039 if (bfd_get_format (abfd) == bfd_core)
3040 newsect->size = 0;
3041 newsect->flags |= SEC_ALLOC;
3042 if (hdr->p_flags & PF_X)
3043 newsect->flags |= SEC_CODE;
3044 }
3045 if (!(hdr->p_flags & PF_W))
3046 newsect->flags |= SEC_READONLY;
3047 }
3048
3049 return TRUE;
3050 }
3051
3052 static bfd_boolean
3053 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3054 {
3055 /* The return value is ignored. Build-ids are considered optional. */
3056 if (templ->xvec->flavour == bfd_target_elf_flavour)
3057 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3058 (templ, offset);
3059 return FALSE;
3060 }
3061
3062 bfd_boolean
3063 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3064 {
3065 const struct elf_backend_data *bed;
3066
3067 switch (hdr->p_type)
3068 {
3069 case PT_NULL:
3070 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3071
3072 case PT_LOAD:
3073 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3074 return FALSE;
3075 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3076 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3077 return TRUE;
3078
3079 case PT_DYNAMIC:
3080 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3081
3082 case PT_INTERP:
3083 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3084
3085 case PT_NOTE:
3086 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3087 return FALSE;
3088 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3089 hdr->p_align))
3090 return FALSE;
3091 return TRUE;
3092
3093 case PT_SHLIB:
3094 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3095
3096 case PT_PHDR:
3097 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3098
3099 case PT_GNU_EH_FRAME:
3100 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3101 "eh_frame_hdr");
3102
3103 case PT_GNU_STACK:
3104 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3105
3106 case PT_GNU_RELRO:
3107 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3108
3109 default:
3110 /* Check for any processor-specific program segment types. */
3111 bed = get_elf_backend_data (abfd);
3112 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3113 }
3114 }
3115
3116 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3117 REL or RELA. */
3118
3119 Elf_Internal_Shdr *
3120 _bfd_elf_single_rel_hdr (asection *sec)
3121 {
3122 if (elf_section_data (sec)->rel.hdr)
3123 {
3124 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3125 return elf_section_data (sec)->rel.hdr;
3126 }
3127 else
3128 return elf_section_data (sec)->rela.hdr;
3129 }
3130
3131 static bfd_boolean
3132 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3133 Elf_Internal_Shdr *rel_hdr,
3134 const char *sec_name,
3135 bfd_boolean use_rela_p)
3136 {
3137 char *name = (char *) bfd_alloc (abfd,
3138 sizeof ".rela" + strlen (sec_name));
3139 if (name == NULL)
3140 return FALSE;
3141
3142 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3143 rel_hdr->sh_name =
3144 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3145 FALSE);
3146 if (rel_hdr->sh_name == (unsigned int) -1)
3147 return FALSE;
3148
3149 return TRUE;
3150 }
3151
3152 /* Allocate and initialize a section-header for a new reloc section,
3153 containing relocations against ASECT. It is stored in RELDATA. If
3154 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3155 relocations. */
3156
3157 static bfd_boolean
3158 _bfd_elf_init_reloc_shdr (bfd *abfd,
3159 struct bfd_elf_section_reloc_data *reldata,
3160 const char *sec_name,
3161 bfd_boolean use_rela_p,
3162 bfd_boolean delay_st_name_p)
3163 {
3164 Elf_Internal_Shdr *rel_hdr;
3165 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3166
3167 BFD_ASSERT (reldata->hdr == NULL);
3168 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3169 reldata->hdr = rel_hdr;
3170
3171 if (delay_st_name_p)
3172 rel_hdr->sh_name = (unsigned int) -1;
3173 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3174 use_rela_p))
3175 return FALSE;
3176 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3177 rel_hdr->sh_entsize = (use_rela_p
3178 ? bed->s->sizeof_rela
3179 : bed->s->sizeof_rel);
3180 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3181 rel_hdr->sh_flags = 0;
3182 rel_hdr->sh_addr = 0;
3183 rel_hdr->sh_size = 0;
3184 rel_hdr->sh_offset = 0;
3185
3186 return TRUE;
3187 }
3188
3189 /* Return the default section type based on the passed in section flags. */
3190
3191 int
3192 bfd_elf_get_default_section_type (flagword flags)
3193 {
3194 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3195 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3196 return SHT_NOBITS;
3197 return SHT_PROGBITS;
3198 }
3199
3200 struct fake_section_arg
3201 {
3202 struct bfd_link_info *link_info;
3203 bfd_boolean failed;
3204 };
3205
3206 /* Set up an ELF internal section header for a section. */
3207
3208 static void
3209 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3210 {
3211 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3212 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3213 struct bfd_elf_section_data *esd = elf_section_data (asect);
3214 Elf_Internal_Shdr *this_hdr;
3215 unsigned int sh_type;
3216 const char *name = asect->name;
3217 bfd_boolean delay_st_name_p = FALSE;
3218 bfd_vma mask;
3219
3220 if (arg->failed)
3221 {
3222 /* We already failed; just get out of the bfd_map_over_sections
3223 loop. */
3224 return;
3225 }
3226
3227 this_hdr = &esd->this_hdr;
3228
3229 if (arg->link_info)
3230 {
3231 /* ld: compress DWARF debug sections with names: .debug_*. */
3232 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3233 && (asect->flags & SEC_DEBUGGING)
3234 && name[1] == 'd'
3235 && name[6] == '_')
3236 {
3237 /* Set SEC_ELF_COMPRESS to indicate this section should be
3238 compressed. */
3239 asect->flags |= SEC_ELF_COMPRESS;
3240 /* If this section will be compressed, delay adding section
3241 name to section name section after it is compressed in
3242 _bfd_elf_assign_file_positions_for_non_load. */
3243 delay_st_name_p = TRUE;
3244 }
3245 }
3246 else if ((asect->flags & SEC_ELF_RENAME))
3247 {
3248 /* objcopy: rename output DWARF debug section. */
3249 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3250 {
3251 /* When we decompress or compress with SHF_COMPRESSED,
3252 convert section name from .zdebug_* to .debug_* if
3253 needed. */
3254 if (name[1] == 'z')
3255 {
3256 char *new_name = convert_zdebug_to_debug (abfd, name);
3257 if (new_name == NULL)
3258 {
3259 arg->failed = TRUE;
3260 return;
3261 }
3262 name = new_name;
3263 }
3264 }
3265 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3266 {
3267 /* PR binutils/18087: Compression does not always make a
3268 section smaller. So only rename the section when
3269 compression has actually taken place. If input section
3270 name is .zdebug_*, we should never compress it again. */
3271 char *new_name = convert_debug_to_zdebug (abfd, name);
3272 if (new_name == NULL)
3273 {
3274 arg->failed = TRUE;
3275 return;
3276 }
3277 BFD_ASSERT (name[1] != 'z');
3278 name = new_name;
3279 }
3280 }
3281
3282 if (delay_st_name_p)
3283 this_hdr->sh_name = (unsigned int) -1;
3284 else
3285 {
3286 this_hdr->sh_name
3287 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3288 name, FALSE);
3289 if (this_hdr->sh_name == (unsigned int) -1)
3290 {
3291 arg->failed = TRUE;
3292 return;
3293 }
3294 }
3295
3296 /* Don't clear sh_flags. Assembler may set additional bits. */
3297
3298 if ((asect->flags & SEC_ALLOC) != 0
3299 || asect->user_set_vma)
3300 this_hdr->sh_addr = asect->vma * bfd_octets_per_byte (abfd, asect);
3301 else
3302 this_hdr->sh_addr = 0;
3303
3304 this_hdr->sh_offset = 0;
3305 this_hdr->sh_size = asect->size;
3306 this_hdr->sh_link = 0;
3307 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3308 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3309 {
3310 _bfd_error_handler
3311 /* xgettext:c-format */
3312 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3313 abfd, asect->alignment_power, asect);
3314 arg->failed = TRUE;
3315 return;
3316 }
3317 /* Set sh_addralign to the highest power of two given by alignment
3318 consistent with the section VMA. Linker scripts can force VMA. */
3319 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3320 this_hdr->sh_addralign = mask & -mask;
3321 /* The sh_entsize and sh_info fields may have been set already by
3322 copy_private_section_data. */
3323
3324 this_hdr->bfd_section = asect;
3325 this_hdr->contents = NULL;
3326
3327 /* If the section type is unspecified, we set it based on
3328 asect->flags. */
3329 if ((asect->flags & SEC_GROUP) != 0)
3330 sh_type = SHT_GROUP;
3331 else
3332 sh_type = bfd_elf_get_default_section_type (asect->flags);
3333
3334 if (this_hdr->sh_type == SHT_NULL)
3335 this_hdr->sh_type = sh_type;
3336 else if (this_hdr->sh_type == SHT_NOBITS
3337 && sh_type == SHT_PROGBITS
3338 && (asect->flags & SEC_ALLOC) != 0)
3339 {
3340 /* Warn if we are changing a NOBITS section to PROGBITS, but
3341 allow the link to proceed. This can happen when users link
3342 non-bss input sections to bss output sections, or emit data
3343 to a bss output section via a linker script. */
3344 _bfd_error_handler
3345 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3346 this_hdr->sh_type = sh_type;
3347 }
3348
3349 switch (this_hdr->sh_type)
3350 {
3351 default:
3352 break;
3353
3354 case SHT_STRTAB:
3355 case SHT_NOTE:
3356 case SHT_NOBITS:
3357 case SHT_PROGBITS:
3358 break;
3359
3360 case SHT_INIT_ARRAY:
3361 case SHT_FINI_ARRAY:
3362 case SHT_PREINIT_ARRAY:
3363 this_hdr->sh_entsize = bed->s->arch_size / 8;
3364 break;
3365
3366 case SHT_HASH:
3367 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3368 break;
3369
3370 case SHT_DYNSYM:
3371 this_hdr->sh_entsize = bed->s->sizeof_sym;
3372 break;
3373
3374 case SHT_DYNAMIC:
3375 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3376 break;
3377
3378 case SHT_RELA:
3379 if (get_elf_backend_data (abfd)->may_use_rela_p)
3380 this_hdr->sh_entsize = bed->s->sizeof_rela;
3381 break;
3382
3383 case SHT_REL:
3384 if (get_elf_backend_data (abfd)->may_use_rel_p)
3385 this_hdr->sh_entsize = bed->s->sizeof_rel;
3386 break;
3387
3388 case SHT_GNU_versym:
3389 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3390 break;
3391
3392 case SHT_GNU_verdef:
3393 this_hdr->sh_entsize = 0;
3394 /* objcopy or strip will copy over sh_info, but may not set
3395 cverdefs. The linker will set cverdefs, but sh_info will be
3396 zero. */
3397 if (this_hdr->sh_info == 0)
3398 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3399 else
3400 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3401 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3402 break;
3403
3404 case SHT_GNU_verneed:
3405 this_hdr->sh_entsize = 0;
3406 /* objcopy or strip will copy over sh_info, but may not set
3407 cverrefs. The linker will set cverrefs, but sh_info will be
3408 zero. */
3409 if (this_hdr->sh_info == 0)
3410 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3411 else
3412 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3413 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3414 break;
3415
3416 case SHT_GROUP:
3417 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3418 break;
3419
3420 case SHT_GNU_HASH:
3421 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3422 break;
3423 }
3424
3425 if ((asect->flags & SEC_ALLOC) != 0)
3426 this_hdr->sh_flags |= SHF_ALLOC;
3427 if ((asect->flags & SEC_READONLY) == 0)
3428 this_hdr->sh_flags |= SHF_WRITE;
3429 if ((asect->flags & SEC_CODE) != 0)
3430 this_hdr->sh_flags |= SHF_EXECINSTR;
3431 if ((asect->flags & SEC_MERGE) != 0)
3432 {
3433 this_hdr->sh_flags |= SHF_MERGE;
3434 this_hdr->sh_entsize = asect->entsize;
3435 }
3436 if ((asect->flags & SEC_STRINGS) != 0)
3437 this_hdr->sh_flags |= SHF_STRINGS;
3438 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3439 this_hdr->sh_flags |= SHF_GROUP;
3440 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3441 {
3442 this_hdr->sh_flags |= SHF_TLS;
3443 if (asect->size == 0
3444 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3445 {
3446 struct bfd_link_order *o = asect->map_tail.link_order;
3447
3448 this_hdr->sh_size = 0;
3449 if (o != NULL)
3450 {
3451 this_hdr->sh_size = o->offset + o->size;
3452 if (this_hdr->sh_size != 0)
3453 this_hdr->sh_type = SHT_NOBITS;
3454 }
3455 }
3456 }
3457 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3458 this_hdr->sh_flags |= SHF_EXCLUDE;
3459
3460 /* If the section has relocs, set up a section header for the
3461 SHT_REL[A] section. If two relocation sections are required for
3462 this section, it is up to the processor-specific back-end to
3463 create the other. */
3464 if ((asect->flags & SEC_RELOC) != 0)
3465 {
3466 /* When doing a relocatable link, create both REL and RELA sections if
3467 needed. */
3468 if (arg->link_info
3469 /* Do the normal setup if we wouldn't create any sections here. */
3470 && esd->rel.count + esd->rela.count > 0
3471 && (bfd_link_relocatable (arg->link_info)
3472 || arg->link_info->emitrelocations))
3473 {
3474 if (esd->rel.count && esd->rel.hdr == NULL
3475 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3476 FALSE, delay_st_name_p))
3477 {
3478 arg->failed = TRUE;
3479 return;
3480 }
3481 if (esd->rela.count && esd->rela.hdr == NULL
3482 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3483 TRUE, delay_st_name_p))
3484 {
3485 arg->failed = TRUE;
3486 return;
3487 }
3488 }
3489 else if (!_bfd_elf_init_reloc_shdr (abfd,
3490 (asect->use_rela_p
3491 ? &esd->rela : &esd->rel),
3492 name,
3493 asect->use_rela_p,
3494 delay_st_name_p))
3495 {
3496 arg->failed = TRUE;
3497 return;
3498 }
3499 }
3500
3501 /* Check for processor-specific section types. */
3502 sh_type = this_hdr->sh_type;
3503 if (bed->elf_backend_fake_sections
3504 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3505 {
3506 arg->failed = TRUE;
3507 return;
3508 }
3509
3510 if (sh_type == SHT_NOBITS && asect->size != 0)
3511 {
3512 /* Don't change the header type from NOBITS if we are being
3513 called for objcopy --only-keep-debug. */
3514 this_hdr->sh_type = sh_type;
3515 }
3516 }
3517
3518 /* Fill in the contents of a SHT_GROUP section. Called from
3519 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3520 when ELF targets use the generic linker, ld. Called for ld -r
3521 from bfd_elf_final_link. */
3522
3523 void
3524 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3525 {
3526 bfd_boolean *failedptr = (bfd_boolean *) failedptrarg;
3527 asection *elt, *first;
3528 unsigned char *loc;
3529 bfd_boolean gas;
3530
3531 /* Ignore linker created group section. See elfNN_ia64_object_p in
3532 elfxx-ia64.c. */
3533 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3534 || sec->size == 0
3535 || *failedptr)
3536 return;
3537
3538 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3539 {
3540 unsigned long symindx = 0;
3541
3542 /* elf_group_id will have been set up by objcopy and the
3543 generic linker. */
3544 if (elf_group_id (sec) != NULL)
3545 symindx = elf_group_id (sec)->udata.i;
3546
3547 if (symindx == 0)
3548 {
3549 /* If called from the assembler, swap_out_syms will have set up
3550 elf_section_syms.
3551 PR 25699: A corrupt input file could contain bogus group info. */
3552 if (elf_section_syms (abfd) == NULL)
3553 {
3554 *failedptr = TRUE;
3555 return;
3556 }
3557 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3558 }
3559 elf_section_data (sec)->this_hdr.sh_info = symindx;
3560 }
3561 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3562 {
3563 /* The ELF backend linker sets sh_info to -2 when the group
3564 signature symbol is global, and thus the index can't be
3565 set until all local symbols are output. */
3566 asection *igroup;
3567 struct bfd_elf_section_data *sec_data;
3568 unsigned long symndx;
3569 unsigned long extsymoff;
3570 struct elf_link_hash_entry *h;
3571
3572 /* The point of this little dance to the first SHF_GROUP section
3573 then back to the SHT_GROUP section is that this gets us to
3574 the SHT_GROUP in the input object. */
3575 igroup = elf_sec_group (elf_next_in_group (sec));
3576 sec_data = elf_section_data (igroup);
3577 symndx = sec_data->this_hdr.sh_info;
3578 extsymoff = 0;
3579 if (!elf_bad_symtab (igroup->owner))
3580 {
3581 Elf_Internal_Shdr *symtab_hdr;
3582
3583 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3584 extsymoff = symtab_hdr->sh_info;
3585 }
3586 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3587 while (h->root.type == bfd_link_hash_indirect
3588 || h->root.type == bfd_link_hash_warning)
3589 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3590
3591 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3592 }
3593
3594 /* The contents won't be allocated for "ld -r" or objcopy. */
3595 gas = TRUE;
3596 if (sec->contents == NULL)
3597 {
3598 gas = FALSE;
3599 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3600
3601 /* Arrange for the section to be written out. */
3602 elf_section_data (sec)->this_hdr.contents = sec->contents;
3603 if (sec->contents == NULL)
3604 {
3605 *failedptr = TRUE;
3606 return;
3607 }
3608 }
3609
3610 loc = sec->contents + sec->size;
3611
3612 /* Get the pointer to the first section in the group that gas
3613 squirreled away here. objcopy arranges for this to be set to the
3614 start of the input section group. */
3615 first = elt = elf_next_in_group (sec);
3616
3617 /* First element is a flag word. Rest of section is elf section
3618 indices for all the sections of the group. Write them backwards
3619 just to keep the group in the same order as given in .section
3620 directives, not that it matters. */
3621 while (elt != NULL)
3622 {
3623 asection *s;
3624
3625 s = elt;
3626 if (!gas)
3627 s = s->output_section;
3628 if (s != NULL
3629 && !bfd_is_abs_section (s))
3630 {
3631 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3632 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3633
3634 if (elf_sec->rel.hdr != NULL
3635 && (gas
3636 || (input_elf_sec->rel.hdr != NULL
3637 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3638 {
3639 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3640 loc -= 4;
3641 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3642 }
3643 if (elf_sec->rela.hdr != NULL
3644 && (gas
3645 || (input_elf_sec->rela.hdr != NULL
3646 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3647 {
3648 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3649 loc -= 4;
3650 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3651 }
3652 loc -= 4;
3653 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3654 }
3655 elt = elf_next_in_group (elt);
3656 if (elt == first)
3657 break;
3658 }
3659
3660 loc -= 4;
3661 BFD_ASSERT (loc == sec->contents);
3662
3663 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3664 }
3665
3666 /* Given NAME, the name of a relocation section stripped of its
3667 .rel/.rela prefix, return the section in ABFD to which the
3668 relocations apply. */
3669
3670 asection *
3671 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3672 {
3673 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3674 section likely apply to .got.plt or .got section. */
3675 if (get_elf_backend_data (abfd)->want_got_plt
3676 && strcmp (name, ".plt") == 0)
3677 {
3678 asection *sec;
3679
3680 name = ".got.plt";
3681 sec = bfd_get_section_by_name (abfd, name);
3682 if (sec != NULL)
3683 return sec;
3684 name = ".got";
3685 }
3686
3687 return bfd_get_section_by_name (abfd, name);
3688 }
3689
3690 /* Return the section to which RELOC_SEC applies. */
3691
3692 static asection *
3693 elf_get_reloc_section (asection *reloc_sec)
3694 {
3695 const char *name;
3696 unsigned int type;
3697 bfd *abfd;
3698 const struct elf_backend_data *bed;
3699
3700 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3701 if (type != SHT_REL && type != SHT_RELA)
3702 return NULL;
3703
3704 /* We look up the section the relocs apply to by name. */
3705 name = reloc_sec->name;
3706 if (strncmp (name, ".rel", 4) != 0)
3707 return NULL;
3708 name += 4;
3709 if (type == SHT_RELA && *name++ != 'a')
3710 return NULL;
3711
3712 abfd = reloc_sec->owner;
3713 bed = get_elf_backend_data (abfd);
3714 return bed->get_reloc_section (abfd, name);
3715 }
3716
3717 /* Assign all ELF section numbers. The dummy first section is handled here
3718 too. The link/info pointers for the standard section types are filled
3719 in here too, while we're at it. */
3720
3721 static bfd_boolean
3722 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3723 {
3724 struct elf_obj_tdata *t = elf_tdata (abfd);
3725 asection *sec;
3726 unsigned int section_number;
3727 Elf_Internal_Shdr **i_shdrp;
3728 struct bfd_elf_section_data *d;
3729 bfd_boolean need_symtab;
3730 size_t amt;
3731
3732 section_number = 1;
3733
3734 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3735
3736 /* SHT_GROUP sections are in relocatable files only. */
3737 if (link_info == NULL || !link_info->resolve_section_groups)
3738 {
3739 size_t reloc_count = 0;
3740
3741 /* Put SHT_GROUP sections first. */
3742 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3743 {
3744 d = elf_section_data (sec);
3745
3746 if (d->this_hdr.sh_type == SHT_GROUP)
3747 {
3748 if (sec->flags & SEC_LINKER_CREATED)
3749 {
3750 /* Remove the linker created SHT_GROUP sections. */
3751 bfd_section_list_remove (abfd, sec);
3752 abfd->section_count--;
3753 }
3754 else
3755 d->this_idx = section_number++;
3756 }
3757
3758 /* Count relocations. */
3759 reloc_count += sec->reloc_count;
3760 }
3761
3762 /* Clear HAS_RELOC if there are no relocations. */
3763 if (reloc_count == 0)
3764 abfd->flags &= ~HAS_RELOC;
3765 }
3766
3767 for (sec = abfd->sections; sec; sec = sec->next)
3768 {
3769 d = elf_section_data (sec);
3770
3771 if (d->this_hdr.sh_type != SHT_GROUP)
3772 d->this_idx = section_number++;
3773 if (d->this_hdr.sh_name != (unsigned int) -1)
3774 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3775 if (d->rel.hdr)
3776 {
3777 d->rel.idx = section_number++;
3778 if (d->rel.hdr->sh_name != (unsigned int) -1)
3779 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3780 }
3781 else
3782 d->rel.idx = 0;
3783
3784 if (d->rela.hdr)
3785 {
3786 d->rela.idx = section_number++;
3787 if (d->rela.hdr->sh_name != (unsigned int) -1)
3788 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3789 }
3790 else
3791 d->rela.idx = 0;
3792 }
3793
3794 need_symtab = (bfd_get_symcount (abfd) > 0
3795 || (link_info == NULL
3796 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3797 == HAS_RELOC)));
3798 if (need_symtab)
3799 {
3800 elf_onesymtab (abfd) = section_number++;
3801 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3802 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3803 {
3804 elf_section_list *entry;
3805
3806 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3807
3808 entry = bfd_zalloc (abfd, sizeof (*entry));
3809 entry->ndx = section_number++;
3810 elf_symtab_shndx_list (abfd) = entry;
3811 entry->hdr.sh_name
3812 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3813 ".symtab_shndx", FALSE);
3814 if (entry->hdr.sh_name == (unsigned int) -1)
3815 return FALSE;
3816 }
3817 elf_strtab_sec (abfd) = section_number++;
3818 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3819 }
3820
3821 elf_shstrtab_sec (abfd) = section_number++;
3822 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3823 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3824
3825 if (section_number >= SHN_LORESERVE)
3826 {
3827 /* xgettext:c-format */
3828 _bfd_error_handler (_("%pB: too many sections: %u"),
3829 abfd, section_number);
3830 return FALSE;
3831 }
3832
3833 elf_numsections (abfd) = section_number;
3834 elf_elfheader (abfd)->e_shnum = section_number;
3835
3836 /* Set up the list of section header pointers, in agreement with the
3837 indices. */
3838 amt = section_number * sizeof (Elf_Internal_Shdr *);
3839 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3840 if (i_shdrp == NULL)
3841 return FALSE;
3842
3843 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3844 sizeof (Elf_Internal_Shdr));
3845 if (i_shdrp[0] == NULL)
3846 {
3847 bfd_release (abfd, i_shdrp);
3848 return FALSE;
3849 }
3850
3851 elf_elfsections (abfd) = i_shdrp;
3852
3853 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3854 if (need_symtab)
3855 {
3856 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3857 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3858 {
3859 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3860 BFD_ASSERT (entry != NULL);
3861 i_shdrp[entry->ndx] = & entry->hdr;
3862 entry->hdr.sh_link = elf_onesymtab (abfd);
3863 }
3864 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3865 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3866 }
3867
3868 for (sec = abfd->sections; sec; sec = sec->next)
3869 {
3870 asection *s;
3871
3872 d = elf_section_data (sec);
3873
3874 i_shdrp[d->this_idx] = &d->this_hdr;
3875 if (d->rel.idx != 0)
3876 i_shdrp[d->rel.idx] = d->rel.hdr;
3877 if (d->rela.idx != 0)
3878 i_shdrp[d->rela.idx] = d->rela.hdr;
3879
3880 /* Fill in the sh_link and sh_info fields while we're at it. */
3881
3882 /* sh_link of a reloc section is the section index of the symbol
3883 table. sh_info is the section index of the section to which
3884 the relocation entries apply. */
3885 if (d->rel.idx != 0)
3886 {
3887 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3888 d->rel.hdr->sh_info = d->this_idx;
3889 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3890 }
3891 if (d->rela.idx != 0)
3892 {
3893 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3894 d->rela.hdr->sh_info = d->this_idx;
3895 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3896 }
3897
3898 /* We need to set up sh_link for SHF_LINK_ORDER. */
3899 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3900 {
3901 s = elf_linked_to_section (sec);
3902 if (s)
3903 {
3904 /* elf_linked_to_section points to the input section. */
3905 if (link_info != NULL)
3906 {
3907 /* Check discarded linkonce section. */
3908 if (discarded_section (s))
3909 {
3910 asection *kept;
3911 _bfd_error_handler
3912 /* xgettext:c-format */
3913 (_("%pB: sh_link of section `%pA' points to"
3914 " discarded section `%pA' of `%pB'"),
3915 abfd, d->this_hdr.bfd_section,
3916 s, s->owner);
3917 /* Point to the kept section if it has the same
3918 size as the discarded one. */
3919 kept = _bfd_elf_check_kept_section (s, link_info);
3920 if (kept == NULL)
3921 {
3922 bfd_set_error (bfd_error_bad_value);
3923 return FALSE;
3924 }
3925 s = kept;
3926 }
3927
3928 s = s->output_section;
3929 BFD_ASSERT (s != NULL);
3930 }
3931 else
3932 {
3933 /* Handle objcopy. */
3934 if (s->output_section == NULL)
3935 {
3936 _bfd_error_handler
3937 /* xgettext:c-format */
3938 (_("%pB: sh_link of section `%pA' points to"
3939 " removed section `%pA' of `%pB'"),
3940 abfd, d->this_hdr.bfd_section, s, s->owner);
3941 bfd_set_error (bfd_error_bad_value);
3942 return FALSE;
3943 }
3944 s = s->output_section;
3945 }
3946 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3947 }
3948 else
3949 {
3950 /* PR 290:
3951 The Intel C compiler generates SHT_IA_64_UNWIND with
3952 SHF_LINK_ORDER. But it doesn't set the sh_link or
3953 sh_info fields. Hence we could get the situation
3954 where s is NULL. */
3955 const struct elf_backend_data *bed
3956 = get_elf_backend_data (abfd);
3957 bed->link_order_error_handler
3958 /* xgettext:c-format */
3959 (_("%pB: warning: sh_link not set for section `%pA'"),
3960 abfd, sec);
3961 }
3962 }
3963
3964 switch (d->this_hdr.sh_type)
3965 {
3966 case SHT_REL:
3967 case SHT_RELA:
3968 /* A reloc section which we are treating as a normal BFD
3969 section. sh_link is the section index of the symbol
3970 table. sh_info is the section index of the section to
3971 which the relocation entries apply. We assume that an
3972 allocated reloc section uses the dynamic symbol table.
3973 FIXME: How can we be sure? */
3974 s = bfd_get_section_by_name (abfd, ".dynsym");
3975 if (s != NULL)
3976 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3977
3978 s = elf_get_reloc_section (sec);
3979 if (s != NULL)
3980 {
3981 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3982 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3983 }
3984 break;
3985
3986 case SHT_STRTAB:
3987 /* We assume that a section named .stab*str is a stabs
3988 string section. We look for a section with the same name
3989 but without the trailing ``str'', and set its sh_link
3990 field to point to this section. */
3991 if (CONST_STRNEQ (sec->name, ".stab")
3992 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3993 {
3994 size_t len;
3995 char *alc;
3996
3997 len = strlen (sec->name);
3998 alc = (char *) bfd_malloc (len - 2);
3999 if (alc == NULL)
4000 return FALSE;
4001 memcpy (alc, sec->name, len - 3);
4002 alc[len - 3] = '\0';
4003 s = bfd_get_section_by_name (abfd, alc);
4004 free (alc);
4005 if (s != NULL)
4006 {
4007 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
4008
4009 /* This is a .stab section. */
4010 elf_section_data (s)->this_hdr.sh_entsize = 12;
4011 }
4012 }
4013 break;
4014
4015 case SHT_DYNAMIC:
4016 case SHT_DYNSYM:
4017 case SHT_GNU_verneed:
4018 case SHT_GNU_verdef:
4019 /* sh_link is the section header index of the string table
4020 used for the dynamic entries, or the symbol table, or the
4021 version strings. */
4022 s = bfd_get_section_by_name (abfd, ".dynstr");
4023 if (s != NULL)
4024 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4025 break;
4026
4027 case SHT_GNU_LIBLIST:
4028 /* sh_link is the section header index of the prelink library
4029 list used for the dynamic entries, or the symbol table, or
4030 the version strings. */
4031 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
4032 ? ".dynstr" : ".gnu.libstr");
4033 if (s != NULL)
4034 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4035 break;
4036
4037 case SHT_HASH:
4038 case SHT_GNU_HASH:
4039 case SHT_GNU_versym:
4040 /* sh_link is the section header index of the symbol table
4041 this hash table or version table is for. */
4042 s = bfd_get_section_by_name (abfd, ".dynsym");
4043 if (s != NULL)
4044 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4045 break;
4046
4047 case SHT_GROUP:
4048 d->this_hdr.sh_link = elf_onesymtab (abfd);
4049 }
4050 }
4051
4052 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4053 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4054 debug section name from .debug_* to .zdebug_* if needed. */
4055
4056 return TRUE;
4057 }
4058
4059 static bfd_boolean
4060 sym_is_global (bfd *abfd, asymbol *sym)
4061 {
4062 /* If the backend has a special mapping, use it. */
4063 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4064 if (bed->elf_backend_sym_is_global)
4065 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4066
4067 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4068 || bfd_is_und_section (bfd_asymbol_section (sym))
4069 || bfd_is_com_section (bfd_asymbol_section (sym)));
4070 }
4071
4072 /* Filter global symbols of ABFD to include in the import library. All
4073 SYMCOUNT symbols of ABFD can be examined from their pointers in
4074 SYMS. Pointers of symbols to keep should be stored contiguously at
4075 the beginning of that array.
4076
4077 Returns the number of symbols to keep. */
4078
4079 unsigned int
4080 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4081 asymbol **syms, long symcount)
4082 {
4083 long src_count, dst_count = 0;
4084
4085 for (src_count = 0; src_count < symcount; src_count++)
4086 {
4087 asymbol *sym = syms[src_count];
4088 char *name = (char *) bfd_asymbol_name (sym);
4089 struct bfd_link_hash_entry *h;
4090
4091 if (!sym_is_global (abfd, sym))
4092 continue;
4093
4094 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, FALSE);
4095 if (h == NULL)
4096 continue;
4097 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4098 continue;
4099 if (h->linker_def || h->ldscript_def)
4100 continue;
4101
4102 syms[dst_count++] = sym;
4103 }
4104
4105 syms[dst_count] = NULL;
4106
4107 return dst_count;
4108 }
4109
4110 /* Don't output section symbols for sections that are not going to be
4111 output, that are duplicates or there is no BFD section. */
4112
4113 static bfd_boolean
4114 ignore_section_sym (bfd *abfd, asymbol *sym)
4115 {
4116 elf_symbol_type *type_ptr;
4117
4118 if (sym == NULL)
4119 return FALSE;
4120
4121 if ((sym->flags & BSF_SECTION_SYM) == 0)
4122 return FALSE;
4123
4124 if (sym->section == NULL)
4125 return TRUE;
4126
4127 type_ptr = elf_symbol_from (abfd, sym);
4128 return ((type_ptr != NULL
4129 && type_ptr->internal_elf_sym.st_shndx != 0
4130 && bfd_is_abs_section (sym->section))
4131 || !(sym->section->owner == abfd
4132 || (sym->section->output_section != NULL
4133 && sym->section->output_section->owner == abfd
4134 && sym->section->output_offset == 0)
4135 || bfd_is_abs_section (sym->section)));
4136 }
4137
4138 /* Map symbol from it's internal number to the external number, moving
4139 all local symbols to be at the head of the list. */
4140
4141 static bfd_boolean
4142 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4143 {
4144 unsigned int symcount = bfd_get_symcount (abfd);
4145 asymbol **syms = bfd_get_outsymbols (abfd);
4146 asymbol **sect_syms;
4147 unsigned int num_locals = 0;
4148 unsigned int num_globals = 0;
4149 unsigned int num_locals2 = 0;
4150 unsigned int num_globals2 = 0;
4151 unsigned int max_index = 0;
4152 unsigned int idx;
4153 asection *asect;
4154 asymbol **new_syms;
4155 size_t amt;
4156
4157 #ifdef DEBUG
4158 fprintf (stderr, "elf_map_symbols\n");
4159 fflush (stderr);
4160 #endif
4161
4162 for (asect = abfd->sections; asect; asect = asect->next)
4163 {
4164 if (max_index < asect->index)
4165 max_index = asect->index;
4166 }
4167
4168 max_index++;
4169 amt = max_index * sizeof (asymbol *);
4170 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4171 if (sect_syms == NULL)
4172 return FALSE;
4173 elf_section_syms (abfd) = sect_syms;
4174 elf_num_section_syms (abfd) = max_index;
4175
4176 /* Init sect_syms entries for any section symbols we have already
4177 decided to output. */
4178 for (idx = 0; idx < symcount; idx++)
4179 {
4180 asymbol *sym = syms[idx];
4181
4182 if ((sym->flags & BSF_SECTION_SYM) != 0
4183 && sym->value == 0
4184 && !ignore_section_sym (abfd, sym)
4185 && !bfd_is_abs_section (sym->section))
4186 {
4187 asection *sec = sym->section;
4188
4189 if (sec->owner != abfd)
4190 sec = sec->output_section;
4191
4192 sect_syms[sec->index] = syms[idx];
4193 }
4194 }
4195
4196 /* Classify all of the symbols. */
4197 for (idx = 0; idx < symcount; idx++)
4198 {
4199 if (sym_is_global (abfd, syms[idx]))
4200 num_globals++;
4201 else if (!ignore_section_sym (abfd, syms[idx]))
4202 num_locals++;
4203 }
4204
4205 /* We will be adding a section symbol for each normal BFD section. Most
4206 sections will already have a section symbol in outsymbols, but
4207 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4208 at least in that case. */
4209 for (asect = abfd->sections; asect; asect = asect->next)
4210 {
4211 if (sect_syms[asect->index] == NULL)
4212 {
4213 if (!sym_is_global (abfd, asect->symbol))
4214 num_locals++;
4215 else
4216 num_globals++;
4217 }
4218 }
4219
4220 /* Now sort the symbols so the local symbols are first. */
4221 amt = (num_locals + num_globals) * sizeof (asymbol *);
4222 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4223 if (new_syms == NULL)
4224 return FALSE;
4225
4226 for (idx = 0; idx < symcount; idx++)
4227 {
4228 asymbol *sym = syms[idx];
4229 unsigned int i;
4230
4231 if (sym_is_global (abfd, sym))
4232 i = num_locals + num_globals2++;
4233 else if (!ignore_section_sym (abfd, sym))
4234 i = num_locals2++;
4235 else
4236 continue;
4237 new_syms[i] = sym;
4238 sym->udata.i = i + 1;
4239 }
4240 for (asect = abfd->sections; asect; asect = asect->next)
4241 {
4242 if (sect_syms[asect->index] == NULL)
4243 {
4244 asymbol *sym = asect->symbol;
4245 unsigned int i;
4246
4247 sect_syms[asect->index] = sym;
4248 if (!sym_is_global (abfd, sym))
4249 i = num_locals2++;
4250 else
4251 i = num_locals + num_globals2++;
4252 new_syms[i] = sym;
4253 sym->udata.i = i + 1;
4254 }
4255 }
4256
4257 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4258
4259 *pnum_locals = num_locals;
4260 return TRUE;
4261 }
4262
4263 /* Align to the maximum file alignment that could be required for any
4264 ELF data structure. */
4265
4266 static inline file_ptr
4267 align_file_position (file_ptr off, int align)
4268 {
4269 return (off + align - 1) & ~(align - 1);
4270 }
4271
4272 /* Assign a file position to a section, optionally aligning to the
4273 required section alignment. */
4274
4275 file_ptr
4276 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4277 file_ptr offset,
4278 bfd_boolean align)
4279 {
4280 if (align && i_shdrp->sh_addralign > 1)
4281 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4282 i_shdrp->sh_offset = offset;
4283 if (i_shdrp->bfd_section != NULL)
4284 i_shdrp->bfd_section->filepos = offset;
4285 if (i_shdrp->sh_type != SHT_NOBITS)
4286 offset += i_shdrp->sh_size;
4287 return offset;
4288 }
4289
4290 /* Compute the file positions we are going to put the sections at, and
4291 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4292 is not NULL, this is being called by the ELF backend linker. */
4293
4294 bfd_boolean
4295 _bfd_elf_compute_section_file_positions (bfd *abfd,
4296 struct bfd_link_info *link_info)
4297 {
4298 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4299 struct fake_section_arg fsargs;
4300 bfd_boolean failed;
4301 struct elf_strtab_hash *strtab = NULL;
4302 Elf_Internal_Shdr *shstrtab_hdr;
4303 bfd_boolean need_symtab;
4304
4305 if (abfd->output_has_begun)
4306 return TRUE;
4307
4308 /* Do any elf backend specific processing first. */
4309 if (bed->elf_backend_begin_write_processing)
4310 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4311
4312 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4313 return FALSE;
4314
4315 fsargs.failed = FALSE;
4316 fsargs.link_info = link_info;
4317 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4318 if (fsargs.failed)
4319 return FALSE;
4320
4321 if (!assign_section_numbers (abfd, link_info))
4322 return FALSE;
4323
4324 /* The backend linker builds symbol table information itself. */
4325 need_symtab = (link_info == NULL
4326 && (bfd_get_symcount (abfd) > 0
4327 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4328 == HAS_RELOC)));
4329 if (need_symtab)
4330 {
4331 /* Non-zero if doing a relocatable link. */
4332 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4333
4334 if (! swap_out_syms (abfd, &strtab, relocatable_p))
4335 return FALSE;
4336 }
4337
4338 failed = FALSE;
4339 if (link_info == NULL)
4340 {
4341 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4342 if (failed)
4343 return FALSE;
4344 }
4345
4346 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4347 /* sh_name was set in init_file_header. */
4348 shstrtab_hdr->sh_type = SHT_STRTAB;
4349 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4350 shstrtab_hdr->sh_addr = 0;
4351 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4352 shstrtab_hdr->sh_entsize = 0;
4353 shstrtab_hdr->sh_link = 0;
4354 shstrtab_hdr->sh_info = 0;
4355 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4356 shstrtab_hdr->sh_addralign = 1;
4357
4358 if (!assign_file_positions_except_relocs (abfd, link_info))
4359 return FALSE;
4360
4361 if (need_symtab)
4362 {
4363 file_ptr off;
4364 Elf_Internal_Shdr *hdr;
4365
4366 off = elf_next_file_pos (abfd);
4367
4368 hdr = & elf_symtab_hdr (abfd);
4369 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4370
4371 if (elf_symtab_shndx_list (abfd) != NULL)
4372 {
4373 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4374 if (hdr->sh_size != 0)
4375 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4376 /* FIXME: What about other symtab_shndx sections in the list ? */
4377 }
4378
4379 hdr = &elf_tdata (abfd)->strtab_hdr;
4380 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
4381
4382 elf_next_file_pos (abfd) = off;
4383
4384 /* Now that we know where the .strtab section goes, write it
4385 out. */
4386 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4387 || ! _bfd_elf_strtab_emit (abfd, strtab))
4388 return FALSE;
4389 _bfd_elf_strtab_free (strtab);
4390 }
4391
4392 abfd->output_has_begun = TRUE;
4393
4394 return TRUE;
4395 }
4396
4397 /* Make an initial estimate of the size of the program header. If we
4398 get the number wrong here, we'll redo section placement. */
4399
4400 static bfd_size_type
4401 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4402 {
4403 size_t segs;
4404 asection *s;
4405 const struct elf_backend_data *bed;
4406
4407 /* Assume we will need exactly two PT_LOAD segments: one for text
4408 and one for data. */
4409 segs = 2;
4410
4411 s = bfd_get_section_by_name (abfd, ".interp");
4412 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4413 {
4414 /* If we have a loadable interpreter section, we need a
4415 PT_INTERP segment. In this case, assume we also need a
4416 PT_PHDR segment, although that may not be true for all
4417 targets. */
4418 segs += 2;
4419 }
4420
4421 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4422 {
4423 /* We need a PT_DYNAMIC segment. */
4424 ++segs;
4425 }
4426
4427 if (info != NULL && info->relro)
4428 {
4429 /* We need a PT_GNU_RELRO segment. */
4430 ++segs;
4431 }
4432
4433 if (elf_eh_frame_hdr (abfd))
4434 {
4435 /* We need a PT_GNU_EH_FRAME segment. */
4436 ++segs;
4437 }
4438
4439 if (elf_stack_flags (abfd))
4440 {
4441 /* We need a PT_GNU_STACK segment. */
4442 ++segs;
4443 }
4444
4445 s = bfd_get_section_by_name (abfd,
4446 NOTE_GNU_PROPERTY_SECTION_NAME);
4447 if (s != NULL && s->size != 0)
4448 {
4449 /* We need a PT_GNU_PROPERTY segment. */
4450 ++segs;
4451 }
4452
4453 for (s = abfd->sections; s != NULL; s = s->next)
4454 {
4455 if ((s->flags & SEC_LOAD) != 0
4456 && elf_section_type (s) == SHT_NOTE)
4457 {
4458 unsigned int alignment_power;
4459 /* We need a PT_NOTE segment. */
4460 ++segs;
4461 /* Try to create just one PT_NOTE segment for all adjacent
4462 loadable SHT_NOTE sections. gABI requires that within a
4463 PT_NOTE segment (and also inside of each SHT_NOTE section)
4464 each note should have the same alignment. So we check
4465 whether the sections are correctly aligned. */
4466 alignment_power = s->alignment_power;
4467 while (s->next != NULL
4468 && s->next->alignment_power == alignment_power
4469 && (s->next->flags & SEC_LOAD) != 0
4470 && elf_section_type (s->next) == SHT_NOTE)
4471 s = s->next;
4472 }
4473 }
4474
4475 for (s = abfd->sections; s != NULL; s = s->next)
4476 {
4477 if (s->flags & SEC_THREAD_LOCAL)
4478 {
4479 /* We need a PT_TLS segment. */
4480 ++segs;
4481 break;
4482 }
4483 }
4484
4485 bed = get_elf_backend_data (abfd);
4486
4487 if ((abfd->flags & D_PAGED) != 0
4488 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4489 {
4490 /* Add a PT_GNU_MBIND segment for each mbind section. */
4491 unsigned int page_align_power = bfd_log2 (bed->commonpagesize);
4492 for (s = abfd->sections; s != NULL; s = s->next)
4493 if (elf_section_flags (s) & SHF_GNU_MBIND)
4494 {
4495 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4496 {
4497 _bfd_error_handler
4498 /* xgettext:c-format */
4499 (_("%pB: GNU_MBIND section `%pA' has invalid "
4500 "sh_info field: %d"),
4501 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4502 continue;
4503 }
4504 /* Align mbind section to page size. */
4505 if (s->alignment_power < page_align_power)
4506 s->alignment_power = page_align_power;
4507 segs ++;
4508 }
4509 }
4510
4511 /* Let the backend count up any program headers it might need. */
4512 if (bed->elf_backend_additional_program_headers)
4513 {
4514 int a;
4515
4516 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4517 if (a == -1)
4518 abort ();
4519 segs += a;
4520 }
4521
4522 return segs * bed->s->sizeof_phdr;
4523 }
4524
4525 /* Find the segment that contains the output_section of section. */
4526
4527 Elf_Internal_Phdr *
4528 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4529 {
4530 struct elf_segment_map *m;
4531 Elf_Internal_Phdr *p;
4532
4533 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4534 m != NULL;
4535 m = m->next, p++)
4536 {
4537 int i;
4538
4539 for (i = m->count - 1; i >= 0; i--)
4540 if (m->sections[i] == section)
4541 return p;
4542 }
4543
4544 return NULL;
4545 }
4546
4547 /* Create a mapping from a set of sections to a program segment. */
4548
4549 static struct elf_segment_map *
4550 make_mapping (bfd *abfd,
4551 asection **sections,
4552 unsigned int from,
4553 unsigned int to,
4554 bfd_boolean phdr)
4555 {
4556 struct elf_segment_map *m;
4557 unsigned int i;
4558 asection **hdrpp;
4559 size_t amt;
4560
4561 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4562 amt += (to - from) * sizeof (asection *);
4563 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4564 if (m == NULL)
4565 return NULL;
4566 m->next = NULL;
4567 m->p_type = PT_LOAD;
4568 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4569 m->sections[i - from] = *hdrpp;
4570 m->count = to - from;
4571
4572 if (from == 0 && phdr)
4573 {
4574 /* Include the headers in the first PT_LOAD segment. */
4575 m->includes_filehdr = 1;
4576 m->includes_phdrs = 1;
4577 }
4578
4579 return m;
4580 }
4581
4582 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4583 on failure. */
4584
4585 struct elf_segment_map *
4586 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4587 {
4588 struct elf_segment_map *m;
4589
4590 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4591 sizeof (struct elf_segment_map));
4592 if (m == NULL)
4593 return NULL;
4594 m->next = NULL;
4595 m->p_type = PT_DYNAMIC;
4596 m->count = 1;
4597 m->sections[0] = dynsec;
4598
4599 return m;
4600 }
4601
4602 /* Possibly add or remove segments from the segment map. */
4603
4604 static bfd_boolean
4605 elf_modify_segment_map (bfd *abfd,
4606 struct bfd_link_info *info,
4607 bfd_boolean remove_empty_load)
4608 {
4609 struct elf_segment_map **m;
4610 const struct elf_backend_data *bed;
4611
4612 /* The placement algorithm assumes that non allocated sections are
4613 not in PT_LOAD segments. We ensure this here by removing such
4614 sections from the segment map. We also remove excluded
4615 sections. Finally, any PT_LOAD segment without sections is
4616 removed. */
4617 m = &elf_seg_map (abfd);
4618 while (*m)
4619 {
4620 unsigned int i, new_count;
4621
4622 for (new_count = 0, i = 0; i < (*m)->count; i++)
4623 {
4624 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4625 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4626 || (*m)->p_type != PT_LOAD))
4627 {
4628 (*m)->sections[new_count] = (*m)->sections[i];
4629 new_count++;
4630 }
4631 }
4632 (*m)->count = new_count;
4633
4634 if (remove_empty_load
4635 && (*m)->p_type == PT_LOAD
4636 && (*m)->count == 0
4637 && !(*m)->includes_phdrs)
4638 *m = (*m)->next;
4639 else
4640 m = &(*m)->next;
4641 }
4642
4643 bed = get_elf_backend_data (abfd);
4644 if (bed->elf_backend_modify_segment_map != NULL)
4645 {
4646 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4647 return FALSE;
4648 }
4649
4650 return TRUE;
4651 }
4652
4653 #define IS_TBSS(s) \
4654 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4655
4656 /* Set up a mapping from BFD sections to program segments. */
4657
4658 bfd_boolean
4659 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4660 {
4661 unsigned int count;
4662 struct elf_segment_map *m;
4663 asection **sections = NULL;
4664 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4665 bfd_boolean no_user_phdrs;
4666
4667 no_user_phdrs = elf_seg_map (abfd) == NULL;
4668
4669 if (info != NULL)
4670 info->user_phdrs = !no_user_phdrs;
4671
4672 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4673 {
4674 asection *s;
4675 unsigned int i;
4676 struct elf_segment_map *mfirst;
4677 struct elf_segment_map **pm;
4678 asection *last_hdr;
4679 bfd_vma last_size;
4680 unsigned int hdr_index;
4681 bfd_vma maxpagesize;
4682 asection **hdrpp;
4683 bfd_boolean phdr_in_segment;
4684 bfd_boolean writable;
4685 bfd_boolean executable;
4686 unsigned int tls_count = 0;
4687 asection *first_tls = NULL;
4688 asection *first_mbind = NULL;
4689 asection *dynsec, *eh_frame_hdr;
4690 size_t amt;
4691 bfd_vma addr_mask, wrap_to = 0; /* Bytes. */
4692 bfd_size_type phdr_size; /* Octets/bytes. */
4693 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
4694
4695 /* Select the allocated sections, and sort them. */
4696
4697 amt = bfd_count_sections (abfd) * sizeof (asection *);
4698 sections = (asection **) bfd_malloc (amt);
4699 if (sections == NULL)
4700 goto error_return;
4701
4702 /* Calculate top address, avoiding undefined behaviour of shift
4703 left operator when shift count is equal to size of type
4704 being shifted. */
4705 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4706 addr_mask = (addr_mask << 1) + 1;
4707
4708 i = 0;
4709 for (s = abfd->sections; s != NULL; s = s->next)
4710 {
4711 if ((s->flags & SEC_ALLOC) != 0)
4712 {
4713 /* target_index is unused until bfd_elf_final_link
4714 starts output of section symbols. Use it to make
4715 qsort stable. */
4716 s->target_index = i;
4717 sections[i] = s;
4718 ++i;
4719 /* A wrapping section potentially clashes with header. */
4720 if (((s->lma + s->size / opb) & addr_mask) < (s->lma & addr_mask))
4721 wrap_to = (s->lma + s->size / opb) & addr_mask;
4722 }
4723 }
4724 BFD_ASSERT (i <= bfd_count_sections (abfd));
4725 count = i;
4726
4727 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4728
4729 phdr_size = elf_program_header_size (abfd);
4730 if (phdr_size == (bfd_size_type) -1)
4731 phdr_size = get_program_header_size (abfd, info);
4732 phdr_size += bed->s->sizeof_ehdr;
4733 /* phdr_size is compared to LMA values which are in bytes. */
4734 phdr_size /= opb;
4735 maxpagesize = bed->maxpagesize;
4736 if (maxpagesize == 0)
4737 maxpagesize = 1;
4738 phdr_in_segment = info != NULL && info->load_phdrs;
4739 if (count != 0
4740 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4741 >= (phdr_size & (maxpagesize - 1))))
4742 /* For compatibility with old scripts that may not be using
4743 SIZEOF_HEADERS, add headers when it looks like space has
4744 been left for them. */
4745 phdr_in_segment = TRUE;
4746
4747 /* Build the mapping. */
4748 mfirst = NULL;
4749 pm = &mfirst;
4750
4751 /* If we have a .interp section, then create a PT_PHDR segment for
4752 the program headers and a PT_INTERP segment for the .interp
4753 section. */
4754 s = bfd_get_section_by_name (abfd, ".interp");
4755 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4756 {
4757 amt = sizeof (struct elf_segment_map);
4758 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4759 if (m == NULL)
4760 goto error_return;
4761 m->next = NULL;
4762 m->p_type = PT_PHDR;
4763 m->p_flags = PF_R;
4764 m->p_flags_valid = 1;
4765 m->includes_phdrs = 1;
4766 phdr_in_segment = TRUE;
4767 *pm = m;
4768 pm = &m->next;
4769
4770 amt = sizeof (struct elf_segment_map);
4771 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4772 if (m == NULL)
4773 goto error_return;
4774 m->next = NULL;
4775 m->p_type = PT_INTERP;
4776 m->count = 1;
4777 m->sections[0] = s;
4778
4779 *pm = m;
4780 pm = &m->next;
4781 }
4782
4783 /* Look through the sections. We put sections in the same program
4784 segment when the start of the second section can be placed within
4785 a few bytes of the end of the first section. */
4786 last_hdr = NULL;
4787 last_size = 0;
4788 hdr_index = 0;
4789 writable = FALSE;
4790 executable = FALSE;
4791 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4792 if (dynsec != NULL
4793 && (dynsec->flags & SEC_LOAD) == 0)
4794 dynsec = NULL;
4795
4796 if ((abfd->flags & D_PAGED) == 0)
4797 phdr_in_segment = FALSE;
4798
4799 /* Deal with -Ttext or something similar such that the first section
4800 is not adjacent to the program headers. This is an
4801 approximation, since at this point we don't know exactly how many
4802 program headers we will need. */
4803 if (phdr_in_segment && count > 0)
4804 {
4805 bfd_vma phdr_lma; /* Bytes. */
4806 bfd_boolean separate_phdr = FALSE;
4807
4808 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4809 if (info != NULL
4810 && info->separate_code
4811 && (sections[0]->flags & SEC_CODE) != 0)
4812 {
4813 /* If data sections should be separate from code and
4814 thus not executable, and the first section is
4815 executable then put the file and program headers in
4816 their own PT_LOAD. */
4817 separate_phdr = TRUE;
4818 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4819 == (sections[0]->lma & addr_mask & -maxpagesize)))
4820 {
4821 /* The file and program headers are currently on the
4822 same page as the first section. Put them on the
4823 previous page if we can. */
4824 if (phdr_lma >= maxpagesize)
4825 phdr_lma -= maxpagesize;
4826 else
4827 separate_phdr = FALSE;
4828 }
4829 }
4830 if ((sections[0]->lma & addr_mask) < phdr_lma
4831 || (sections[0]->lma & addr_mask) < phdr_size)
4832 /* If file and program headers would be placed at the end
4833 of memory then it's probably better to omit them. */
4834 phdr_in_segment = FALSE;
4835 else if (phdr_lma < wrap_to)
4836 /* If a section wraps around to where we'll be placing
4837 file and program headers, then the headers will be
4838 overwritten. */
4839 phdr_in_segment = FALSE;
4840 else if (separate_phdr)
4841 {
4842 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4843 if (m == NULL)
4844 goto error_return;
4845 m->p_paddr = phdr_lma * opb;
4846 m->p_vaddr_offset
4847 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4848 m->p_paddr_valid = 1;
4849 *pm = m;
4850 pm = &m->next;
4851 phdr_in_segment = FALSE;
4852 }
4853 }
4854
4855 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4856 {
4857 asection *hdr;
4858 bfd_boolean new_segment;
4859
4860 hdr = *hdrpp;
4861
4862 /* See if this section and the last one will fit in the same
4863 segment. */
4864
4865 if (last_hdr == NULL)
4866 {
4867 /* If we don't have a segment yet, then we don't need a new
4868 one (we build the last one after this loop). */
4869 new_segment = FALSE;
4870 }
4871 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4872 {
4873 /* If this section has a different relation between the
4874 virtual address and the load address, then we need a new
4875 segment. */
4876 new_segment = TRUE;
4877 }
4878 else if (hdr->lma < last_hdr->lma + last_size
4879 || last_hdr->lma + last_size < last_hdr->lma)
4880 {
4881 /* If this section has a load address that makes it overlap
4882 the previous section, then we need a new segment. */
4883 new_segment = TRUE;
4884 }
4885 else if ((abfd->flags & D_PAGED) != 0
4886 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4887 == (hdr->lma & -maxpagesize)))
4888 {
4889 /* If we are demand paged then we can't map two disk
4890 pages onto the same memory page. */
4891 new_segment = FALSE;
4892 }
4893 /* In the next test we have to be careful when last_hdr->lma is close
4894 to the end of the address space. If the aligned address wraps
4895 around to the start of the address space, then there are no more
4896 pages left in memory and it is OK to assume that the current
4897 section can be included in the current segment. */
4898 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4899 + maxpagesize > last_hdr->lma)
4900 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4901 + maxpagesize <= hdr->lma))
4902 {
4903 /* If putting this section in this segment would force us to
4904 skip a page in the segment, then we need a new segment. */
4905 new_segment = TRUE;
4906 }
4907 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4908 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4909 {
4910 /* We don't want to put a loaded section after a
4911 nonloaded (ie. bss style) section in the same segment
4912 as that will force the non-loaded section to be loaded.
4913 Consider .tbss sections as loaded for this purpose. */
4914 new_segment = TRUE;
4915 }
4916 else if ((abfd->flags & D_PAGED) == 0)
4917 {
4918 /* If the file is not demand paged, which means that we
4919 don't require the sections to be correctly aligned in the
4920 file, then there is no other reason for a new segment. */
4921 new_segment = FALSE;
4922 }
4923 else if (info != NULL
4924 && info->separate_code
4925 && executable != ((hdr->flags & SEC_CODE) != 0))
4926 {
4927 new_segment = TRUE;
4928 }
4929 else if (! writable
4930 && (hdr->flags & SEC_READONLY) == 0)
4931 {
4932 /* We don't want to put a writable section in a read only
4933 segment. */
4934 new_segment = TRUE;
4935 }
4936 else
4937 {
4938 /* Otherwise, we can use the same segment. */
4939 new_segment = FALSE;
4940 }
4941
4942 /* Allow interested parties a chance to override our decision. */
4943 if (last_hdr != NULL
4944 && info != NULL
4945 && info->callbacks->override_segment_assignment != NULL)
4946 new_segment
4947 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4948 last_hdr,
4949 new_segment);
4950
4951 if (! new_segment)
4952 {
4953 if ((hdr->flags & SEC_READONLY) == 0)
4954 writable = TRUE;
4955 if ((hdr->flags & SEC_CODE) != 0)
4956 executable = TRUE;
4957 last_hdr = hdr;
4958 /* .tbss sections effectively have zero size. */
4959 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4960 continue;
4961 }
4962
4963 /* We need a new program segment. We must create a new program
4964 header holding all the sections from hdr_index until hdr. */
4965
4966 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4967 if (m == NULL)
4968 goto error_return;
4969
4970 *pm = m;
4971 pm = &m->next;
4972
4973 if ((hdr->flags & SEC_READONLY) == 0)
4974 writable = TRUE;
4975 else
4976 writable = FALSE;
4977
4978 if ((hdr->flags & SEC_CODE) == 0)
4979 executable = FALSE;
4980 else
4981 executable = TRUE;
4982
4983 last_hdr = hdr;
4984 /* .tbss sections effectively have zero size. */
4985 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4986 hdr_index = i;
4987 phdr_in_segment = FALSE;
4988 }
4989
4990 /* Create a final PT_LOAD program segment, but not if it's just
4991 for .tbss. */
4992 if (last_hdr != NULL
4993 && (i - hdr_index != 1
4994 || !IS_TBSS (last_hdr)))
4995 {
4996 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4997 if (m == NULL)
4998 goto error_return;
4999
5000 *pm = m;
5001 pm = &m->next;
5002 }
5003
5004 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
5005 if (dynsec != NULL)
5006 {
5007 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
5008 if (m == NULL)
5009 goto error_return;
5010 *pm = m;
5011 pm = &m->next;
5012 }
5013
5014 /* For each batch of consecutive loadable SHT_NOTE sections,
5015 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
5016 because if we link together nonloadable .note sections and
5017 loadable .note sections, we will generate two .note sections
5018 in the output file. */
5019 for (s = abfd->sections; s != NULL; s = s->next)
5020 {
5021 if ((s->flags & SEC_LOAD) != 0
5022 && elf_section_type (s) == SHT_NOTE)
5023 {
5024 asection *s2;
5025 unsigned int alignment_power = s->alignment_power;
5026
5027 count = 1;
5028 for (s2 = s; s2->next != NULL; s2 = s2->next)
5029 {
5030 if (s2->next->alignment_power == alignment_power
5031 && (s2->next->flags & SEC_LOAD) != 0
5032 && elf_section_type (s2->next) == SHT_NOTE
5033 && align_power (s2->lma + s2->size / opb,
5034 alignment_power)
5035 == s2->next->lma)
5036 count++;
5037 else
5038 break;
5039 }
5040 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5041 amt += count * sizeof (asection *);
5042 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5043 if (m == NULL)
5044 goto error_return;
5045 m->next = NULL;
5046 m->p_type = PT_NOTE;
5047 m->count = count;
5048 while (count > 1)
5049 {
5050 m->sections[m->count - count--] = s;
5051 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5052 s = s->next;
5053 }
5054 m->sections[m->count - 1] = s;
5055 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5056 *pm = m;
5057 pm = &m->next;
5058 }
5059 if (s->flags & SEC_THREAD_LOCAL)
5060 {
5061 if (! tls_count)
5062 first_tls = s;
5063 tls_count++;
5064 }
5065 if (first_mbind == NULL
5066 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5067 first_mbind = s;
5068 }
5069
5070 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5071 if (tls_count > 0)
5072 {
5073 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5074 amt += tls_count * sizeof (asection *);
5075 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5076 if (m == NULL)
5077 goto error_return;
5078 m->next = NULL;
5079 m->p_type = PT_TLS;
5080 m->count = tls_count;
5081 /* Mandated PF_R. */
5082 m->p_flags = PF_R;
5083 m->p_flags_valid = 1;
5084 s = first_tls;
5085 for (i = 0; i < tls_count; ++i)
5086 {
5087 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5088 {
5089 _bfd_error_handler
5090 (_("%pB: TLS sections are not adjacent:"), abfd);
5091 s = first_tls;
5092 i = 0;
5093 while (i < tls_count)
5094 {
5095 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5096 {
5097 _bfd_error_handler (_(" TLS: %pA"), s);
5098 i++;
5099 }
5100 else
5101 _bfd_error_handler (_(" non-TLS: %pA"), s);
5102 s = s->next;
5103 }
5104 bfd_set_error (bfd_error_bad_value);
5105 goto error_return;
5106 }
5107 m->sections[i] = s;
5108 s = s->next;
5109 }
5110
5111 *pm = m;
5112 pm = &m->next;
5113 }
5114
5115 if (first_mbind
5116 && (abfd->flags & D_PAGED) != 0
5117 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5118 for (s = first_mbind; s != NULL; s = s->next)
5119 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5120 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5121 {
5122 /* Mandated PF_R. */
5123 unsigned long p_flags = PF_R;
5124 if ((s->flags & SEC_READONLY) == 0)
5125 p_flags |= PF_W;
5126 if ((s->flags & SEC_CODE) != 0)
5127 p_flags |= PF_X;
5128
5129 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5130 m = bfd_zalloc (abfd, amt);
5131 if (m == NULL)
5132 goto error_return;
5133 m->next = NULL;
5134 m->p_type = (PT_GNU_MBIND_LO
5135 + elf_section_data (s)->this_hdr.sh_info);
5136 m->count = 1;
5137 m->p_flags_valid = 1;
5138 m->sections[0] = s;
5139 m->p_flags = p_flags;
5140
5141 *pm = m;
5142 pm = &m->next;
5143 }
5144
5145 s = bfd_get_section_by_name (abfd,
5146 NOTE_GNU_PROPERTY_SECTION_NAME);
5147 if (s != NULL && s->size != 0)
5148 {
5149 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5150 m = bfd_zalloc (abfd, amt);
5151 if (m == NULL)
5152 goto error_return;
5153 m->next = NULL;
5154 m->p_type = PT_GNU_PROPERTY;
5155 m->count = 1;
5156 m->p_flags_valid = 1;
5157 m->sections[0] = s;
5158 m->p_flags = PF_R;
5159 *pm = m;
5160 pm = &m->next;
5161 }
5162
5163 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5164 segment. */
5165 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5166 if (eh_frame_hdr != NULL
5167 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5168 {
5169 amt = sizeof (struct elf_segment_map);
5170 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5171 if (m == NULL)
5172 goto error_return;
5173 m->next = NULL;
5174 m->p_type = PT_GNU_EH_FRAME;
5175 m->count = 1;
5176 m->sections[0] = eh_frame_hdr->output_section;
5177
5178 *pm = m;
5179 pm = &m->next;
5180 }
5181
5182 if (elf_stack_flags (abfd))
5183 {
5184 amt = sizeof (struct elf_segment_map);
5185 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5186 if (m == NULL)
5187 goto error_return;
5188 m->next = NULL;
5189 m->p_type = PT_GNU_STACK;
5190 m->p_flags = elf_stack_flags (abfd);
5191 m->p_align = bed->stack_align;
5192 m->p_flags_valid = 1;
5193 m->p_align_valid = m->p_align != 0;
5194 if (info->stacksize > 0)
5195 {
5196 m->p_size = info->stacksize;
5197 m->p_size_valid = 1;
5198 }
5199
5200 *pm = m;
5201 pm = &m->next;
5202 }
5203
5204 if (info != NULL && info->relro)
5205 {
5206 for (m = mfirst; m != NULL; m = m->next)
5207 {
5208 if (m->p_type == PT_LOAD
5209 && m->count != 0
5210 && m->sections[0]->vma >= info->relro_start
5211 && m->sections[0]->vma < info->relro_end)
5212 {
5213 i = m->count;
5214 while (--i != (unsigned) -1)
5215 {
5216 if (m->sections[i]->size > 0
5217 && (m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5218 == (SEC_LOAD | SEC_HAS_CONTENTS))
5219 break;
5220 }
5221
5222 if (i != (unsigned) -1)
5223 break;
5224 }
5225 }
5226
5227 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5228 if (m != NULL)
5229 {
5230 amt = sizeof (struct elf_segment_map);
5231 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5232 if (m == NULL)
5233 goto error_return;
5234 m->next = NULL;
5235 m->p_type = PT_GNU_RELRO;
5236 *pm = m;
5237 pm = &m->next;
5238 }
5239 }
5240
5241 free (sections);
5242 elf_seg_map (abfd) = mfirst;
5243 }
5244
5245 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5246 return FALSE;
5247
5248 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5249 ++count;
5250 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5251
5252 return TRUE;
5253
5254 error_return:
5255 if (sections != NULL)
5256 free (sections);
5257 return FALSE;
5258 }
5259
5260 /* Sort sections by address. */
5261
5262 static int
5263 elf_sort_sections (const void *arg1, const void *arg2)
5264 {
5265 const asection *sec1 = *(const asection **) arg1;
5266 const asection *sec2 = *(const asection **) arg2;
5267 bfd_size_type size1, size2;
5268
5269 /* Sort by LMA first, since this is the address used to
5270 place the section into a segment. */
5271 if (sec1->lma < sec2->lma)
5272 return -1;
5273 else if (sec1->lma > sec2->lma)
5274 return 1;
5275
5276 /* Then sort by VMA. Normally the LMA and the VMA will be
5277 the same, and this will do nothing. */
5278 if (sec1->vma < sec2->vma)
5279 return -1;
5280 else if (sec1->vma > sec2->vma)
5281 return 1;
5282
5283 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5284
5285 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0)
5286
5287 if (TOEND (sec1))
5288 {
5289 if (!TOEND (sec2))
5290 return 1;
5291 }
5292 else if (TOEND (sec2))
5293 return -1;
5294
5295 #undef TOEND
5296
5297 /* Sort by size, to put zero sized sections
5298 before others at the same address. */
5299
5300 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5301 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5302
5303 if (size1 < size2)
5304 return -1;
5305 if (size1 > size2)
5306 return 1;
5307
5308 return sec1->target_index - sec2->target_index;
5309 }
5310
5311 /* This qsort comparison functions sorts PT_LOAD segments first and
5312 by p_paddr, for assign_file_positions_for_load_sections. */
5313
5314 static int
5315 elf_sort_segments (const void *arg1, const void *arg2)
5316 {
5317 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5318 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5319
5320 if (m1->p_type != m2->p_type)
5321 {
5322 if (m1->p_type == PT_NULL)
5323 return 1;
5324 if (m2->p_type == PT_NULL)
5325 return -1;
5326 return m1->p_type < m2->p_type ? -1 : 1;
5327 }
5328 if (m1->includes_filehdr != m2->includes_filehdr)
5329 return m1->includes_filehdr ? -1 : 1;
5330 if (m1->no_sort_lma != m2->no_sort_lma)
5331 return m1->no_sort_lma ? -1 : 1;
5332 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5333 {
5334 bfd_vma lma1, lma2; /* Octets. */
5335 lma1 = 0;
5336 if (m1->p_paddr_valid)
5337 lma1 = m1->p_paddr;
5338 else if (m1->count != 0)
5339 {
5340 unsigned int opb = bfd_octets_per_byte (m1->sections[0]->owner,
5341 m1->sections[0]);
5342 lma1 = (m1->sections[0]->lma + m1->p_vaddr_offset) * opb;
5343 }
5344 lma2 = 0;
5345 if (m2->p_paddr_valid)
5346 lma2 = m2->p_paddr;
5347 else if (m2->count != 0)
5348 {
5349 unsigned int opb = bfd_octets_per_byte (m2->sections[0]->owner,
5350 m2->sections[0]);
5351 lma2 = (m2->sections[0]->lma + m2->p_vaddr_offset) * opb;
5352 }
5353 if (lma1 != lma2)
5354 return lma1 < lma2 ? -1 : 1;
5355 }
5356 if (m1->idx != m2->idx)
5357 return m1->idx < m2->idx ? -1 : 1;
5358 return 0;
5359 }
5360
5361 /* Ian Lance Taylor writes:
5362
5363 We shouldn't be using % with a negative signed number. That's just
5364 not good. We have to make sure either that the number is not
5365 negative, or that the number has an unsigned type. When the types
5366 are all the same size they wind up as unsigned. When file_ptr is a
5367 larger signed type, the arithmetic winds up as signed long long,
5368 which is wrong.
5369
5370 What we're trying to say here is something like ``increase OFF by
5371 the least amount that will cause it to be equal to the VMA modulo
5372 the page size.'' */
5373 /* In other words, something like:
5374
5375 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5376 off_offset = off % bed->maxpagesize;
5377 if (vma_offset < off_offset)
5378 adjustment = vma_offset + bed->maxpagesize - off_offset;
5379 else
5380 adjustment = vma_offset - off_offset;
5381
5382 which can be collapsed into the expression below. */
5383
5384 static file_ptr
5385 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5386 {
5387 /* PR binutils/16199: Handle an alignment of zero. */
5388 if (maxpagesize == 0)
5389 maxpagesize = 1;
5390 return ((vma - off) % maxpagesize);
5391 }
5392
5393 static void
5394 print_segment_map (const struct elf_segment_map *m)
5395 {
5396 unsigned int j;
5397 const char *pt = get_segment_type (m->p_type);
5398 char buf[32];
5399
5400 if (pt == NULL)
5401 {
5402 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5403 sprintf (buf, "LOPROC+%7.7x",
5404 (unsigned int) (m->p_type - PT_LOPROC));
5405 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5406 sprintf (buf, "LOOS+%7.7x",
5407 (unsigned int) (m->p_type - PT_LOOS));
5408 else
5409 snprintf (buf, sizeof (buf), "%8.8x",
5410 (unsigned int) m->p_type);
5411 pt = buf;
5412 }
5413 fflush (stdout);
5414 fprintf (stderr, "%s:", pt);
5415 for (j = 0; j < m->count; j++)
5416 fprintf (stderr, " %s", m->sections [j]->name);
5417 putc ('\n',stderr);
5418 fflush (stderr);
5419 }
5420
5421 static bfd_boolean
5422 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5423 {
5424 void *buf;
5425 bfd_boolean ret;
5426
5427 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5428 return FALSE;
5429 buf = bfd_zmalloc (len);
5430 if (buf == NULL)
5431 return FALSE;
5432 ret = bfd_bwrite (buf, len, abfd) == len;
5433 free (buf);
5434 return ret;
5435 }
5436
5437 /* Assign file positions to the sections based on the mapping from
5438 sections to segments. This function also sets up some fields in
5439 the file header. */
5440
5441 static bfd_boolean
5442 assign_file_positions_for_load_sections (bfd *abfd,
5443 struct bfd_link_info *link_info)
5444 {
5445 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5446 struct elf_segment_map *m;
5447 struct elf_segment_map *phdr_load_seg;
5448 Elf_Internal_Phdr *phdrs;
5449 Elf_Internal_Phdr *p;
5450 file_ptr off; /* Octets. */
5451 bfd_size_type maxpagesize;
5452 unsigned int alloc, actual;
5453 unsigned int i, j;
5454 struct elf_segment_map **sorted_seg_map;
5455 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
5456
5457 if (link_info == NULL
5458 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5459 return FALSE;
5460
5461 alloc = 0;
5462 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5463 m->idx = alloc++;
5464
5465 if (alloc)
5466 {
5467 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5468 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5469 }
5470 else
5471 {
5472 /* PR binutils/12467. */
5473 elf_elfheader (abfd)->e_phoff = 0;
5474 elf_elfheader (abfd)->e_phentsize = 0;
5475 }
5476
5477 elf_elfheader (abfd)->e_phnum = alloc;
5478
5479 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5480 {
5481 actual = alloc;
5482 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5483 }
5484 else
5485 {
5486 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5487 BFD_ASSERT (elf_program_header_size (abfd)
5488 == actual * bed->s->sizeof_phdr);
5489 BFD_ASSERT (actual >= alloc);
5490 }
5491
5492 if (alloc == 0)
5493 {
5494 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5495 return TRUE;
5496 }
5497
5498 /* We're writing the size in elf_program_header_size (abfd),
5499 see assign_file_positions_except_relocs, so make sure we have
5500 that amount allocated, with trailing space cleared.
5501 The variable alloc contains the computed need, while
5502 elf_program_header_size (abfd) contains the size used for the
5503 layout.
5504 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5505 where the layout is forced to according to a larger size in the
5506 last iterations for the testcase ld-elf/header. */
5507 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5508 + alloc * sizeof (*sorted_seg_map)));
5509 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5510 elf_tdata (abfd)->phdr = phdrs;
5511 if (phdrs == NULL)
5512 return FALSE;
5513
5514 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5515 {
5516 sorted_seg_map[j] = m;
5517 /* If elf_segment_map is not from map_sections_to_segments, the
5518 sections may not be correctly ordered. NOTE: sorting should
5519 not be done to the PT_NOTE section of a corefile, which may
5520 contain several pseudo-sections artificially created by bfd.
5521 Sorting these pseudo-sections breaks things badly. */
5522 if (m->count > 1
5523 && !(elf_elfheader (abfd)->e_type == ET_CORE
5524 && m->p_type == PT_NOTE))
5525 {
5526 for (i = 0; i < m->count; i++)
5527 m->sections[i]->target_index = i;
5528 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5529 elf_sort_sections);
5530 }
5531 }
5532 if (alloc > 1)
5533 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5534 elf_sort_segments);
5535
5536 maxpagesize = 1;
5537 if ((abfd->flags & D_PAGED) != 0)
5538 maxpagesize = bed->maxpagesize;
5539
5540 /* Sections must map to file offsets past the ELF file header. */
5541 off = bed->s->sizeof_ehdr;
5542 /* And if one of the PT_LOAD headers doesn't include the program
5543 headers then we'll be mapping program headers in the usual
5544 position after the ELF file header. */
5545 phdr_load_seg = NULL;
5546 for (j = 0; j < alloc; j++)
5547 {
5548 m = sorted_seg_map[j];
5549 if (m->p_type != PT_LOAD)
5550 break;
5551 if (m->includes_phdrs)
5552 {
5553 phdr_load_seg = m;
5554 break;
5555 }
5556 }
5557 if (phdr_load_seg == NULL)
5558 off += actual * bed->s->sizeof_phdr;
5559
5560 for (j = 0; j < alloc; j++)
5561 {
5562 asection **secpp;
5563 bfd_vma off_adjust; /* Octets. */
5564 bfd_boolean no_contents;
5565
5566 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5567 number of sections with contents contributing to both p_filesz
5568 and p_memsz, followed by a number of sections with no contents
5569 that just contribute to p_memsz. In this loop, OFF tracks next
5570 available file offset for PT_LOAD and PT_NOTE segments. */
5571 m = sorted_seg_map[j];
5572 p = phdrs + m->idx;
5573 p->p_type = m->p_type;
5574 p->p_flags = m->p_flags;
5575
5576 if (m->count == 0)
5577 p->p_vaddr = m->p_vaddr_offset * opb;
5578 else
5579 p->p_vaddr = (m->sections[0]->vma + m->p_vaddr_offset) * opb;
5580
5581 if (m->p_paddr_valid)
5582 p->p_paddr = m->p_paddr;
5583 else if (m->count == 0)
5584 p->p_paddr = 0;
5585 else
5586 p->p_paddr = (m->sections[0]->lma + m->p_vaddr_offset) * opb;
5587
5588 if (p->p_type == PT_LOAD
5589 && (abfd->flags & D_PAGED) != 0)
5590 {
5591 /* p_align in demand paged PT_LOAD segments effectively stores
5592 the maximum page size. When copying an executable with
5593 objcopy, we set m->p_align from the input file. Use this
5594 value for maxpagesize rather than bed->maxpagesize, which
5595 may be different. Note that we use maxpagesize for PT_TLS
5596 segment alignment later in this function, so we are relying
5597 on at least one PT_LOAD segment appearing before a PT_TLS
5598 segment. */
5599 if (m->p_align_valid)
5600 maxpagesize = m->p_align;
5601
5602 p->p_align = maxpagesize;
5603 }
5604 else if (m->p_align_valid)
5605 p->p_align = m->p_align;
5606 else if (m->count == 0)
5607 p->p_align = 1 << bed->s->log_file_align;
5608
5609 if (m == phdr_load_seg)
5610 {
5611 if (!m->includes_filehdr)
5612 p->p_offset = off;
5613 off += actual * bed->s->sizeof_phdr;
5614 }
5615
5616 no_contents = FALSE;
5617 off_adjust = 0;
5618 if (p->p_type == PT_LOAD
5619 && m->count > 0)
5620 {
5621 bfd_size_type align; /* Bytes. */
5622 unsigned int align_power = 0;
5623
5624 if (m->p_align_valid)
5625 align = p->p_align;
5626 else
5627 {
5628 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5629 {
5630 unsigned int secalign;
5631
5632 secalign = bfd_section_alignment (*secpp);
5633 if (secalign > align_power)
5634 align_power = secalign;
5635 }
5636 align = (bfd_size_type) 1 << align_power;
5637 if (align < maxpagesize)
5638 align = maxpagesize;
5639 }
5640
5641 for (i = 0; i < m->count; i++)
5642 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5643 /* If we aren't making room for this section, then
5644 it must be SHT_NOBITS regardless of what we've
5645 set via struct bfd_elf_special_section. */
5646 elf_section_type (m->sections[i]) = SHT_NOBITS;
5647
5648 /* Find out whether this segment contains any loadable
5649 sections. */
5650 no_contents = TRUE;
5651 for (i = 0; i < m->count; i++)
5652 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5653 {
5654 no_contents = FALSE;
5655 break;
5656 }
5657
5658 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align * opb);
5659
5660 /* Broken hardware and/or kernel require that files do not
5661 map the same page with different permissions on some hppa
5662 processors. */
5663 if (j != 0
5664 && (abfd->flags & D_PAGED) != 0
5665 && bed->no_page_alias
5666 && (off & (maxpagesize - 1)) != 0
5667 && ((off & -maxpagesize)
5668 == ((off + off_adjust) & -maxpagesize)))
5669 off_adjust += maxpagesize;
5670 off += off_adjust;
5671 if (no_contents)
5672 {
5673 /* We shouldn't need to align the segment on disk since
5674 the segment doesn't need file space, but the gABI
5675 arguably requires the alignment and glibc ld.so
5676 checks it. So to comply with the alignment
5677 requirement but not waste file space, we adjust
5678 p_offset for just this segment. (OFF_ADJUST is
5679 subtracted from OFF later.) This may put p_offset
5680 past the end of file, but that shouldn't matter. */
5681 }
5682 else
5683 off_adjust = 0;
5684 }
5685 /* Make sure the .dynamic section is the first section in the
5686 PT_DYNAMIC segment. */
5687 else if (p->p_type == PT_DYNAMIC
5688 && m->count > 1
5689 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5690 {
5691 _bfd_error_handler
5692 (_("%pB: The first section in the PT_DYNAMIC segment"
5693 " is not the .dynamic section"),
5694 abfd);
5695 bfd_set_error (bfd_error_bad_value);
5696 return FALSE;
5697 }
5698 /* Set the note section type to SHT_NOTE. */
5699 else if (p->p_type == PT_NOTE)
5700 for (i = 0; i < m->count; i++)
5701 elf_section_type (m->sections[i]) = SHT_NOTE;
5702
5703 if (m->includes_filehdr)
5704 {
5705 if (!m->p_flags_valid)
5706 p->p_flags |= PF_R;
5707 p->p_filesz = bed->s->sizeof_ehdr;
5708 p->p_memsz = bed->s->sizeof_ehdr;
5709 if (p->p_type == PT_LOAD)
5710 {
5711 if (m->count > 0)
5712 {
5713 if (p->p_vaddr < (bfd_vma) off
5714 || (!m->p_paddr_valid
5715 && p->p_paddr < (bfd_vma) off))
5716 {
5717 _bfd_error_handler
5718 (_("%pB: not enough room for program headers,"
5719 " try linking with -N"),
5720 abfd);
5721 bfd_set_error (bfd_error_bad_value);
5722 return FALSE;
5723 }
5724 p->p_vaddr -= off;
5725 if (!m->p_paddr_valid)
5726 p->p_paddr -= off;
5727 }
5728 }
5729 else if (sorted_seg_map[0]->includes_filehdr)
5730 {
5731 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5732 p->p_vaddr = filehdr->p_vaddr;
5733 if (!m->p_paddr_valid)
5734 p->p_paddr = filehdr->p_paddr;
5735 }
5736 }
5737
5738 if (m->includes_phdrs)
5739 {
5740 if (!m->p_flags_valid)
5741 p->p_flags |= PF_R;
5742 p->p_filesz += actual * bed->s->sizeof_phdr;
5743 p->p_memsz += actual * bed->s->sizeof_phdr;
5744 if (!m->includes_filehdr)
5745 {
5746 if (p->p_type == PT_LOAD)
5747 {
5748 elf_elfheader (abfd)->e_phoff = p->p_offset;
5749 if (m->count > 0)
5750 {
5751 p->p_vaddr -= off - p->p_offset;
5752 if (!m->p_paddr_valid)
5753 p->p_paddr -= off - p->p_offset;
5754 }
5755 }
5756 else if (phdr_load_seg != NULL)
5757 {
5758 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5759 bfd_vma phdr_off = 0; /* Octets. */
5760 if (phdr_load_seg->includes_filehdr)
5761 phdr_off = bed->s->sizeof_ehdr;
5762 p->p_vaddr = phdr->p_vaddr + phdr_off;
5763 if (!m->p_paddr_valid)
5764 p->p_paddr = phdr->p_paddr + phdr_off;
5765 p->p_offset = phdr->p_offset + phdr_off;
5766 }
5767 else
5768 p->p_offset = bed->s->sizeof_ehdr;
5769 }
5770 }
5771
5772 if (p->p_type == PT_LOAD
5773 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5774 {
5775 if (!m->includes_filehdr && !m->includes_phdrs)
5776 {
5777 p->p_offset = off;
5778 if (no_contents)
5779 {
5780 /* Put meaningless p_offset for PT_LOAD segments
5781 without file contents somewhere within the first
5782 page, in an attempt to not point past EOF. */
5783 bfd_size_type align = maxpagesize;
5784 if (align < p->p_align)
5785 align = p->p_align;
5786 if (align < 1)
5787 align = 1;
5788 p->p_offset = off % align;
5789 }
5790 }
5791 else
5792 {
5793 file_ptr adjust; /* Octets. */
5794
5795 adjust = off - (p->p_offset + p->p_filesz);
5796 if (!no_contents)
5797 p->p_filesz += adjust;
5798 p->p_memsz += adjust;
5799 }
5800 }
5801
5802 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5803 maps. Set filepos for sections in PT_LOAD segments, and in
5804 core files, for sections in PT_NOTE segments.
5805 assign_file_positions_for_non_load_sections will set filepos
5806 for other sections and update p_filesz for other segments. */
5807 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5808 {
5809 asection *sec;
5810 bfd_size_type align;
5811 Elf_Internal_Shdr *this_hdr;
5812
5813 sec = *secpp;
5814 this_hdr = &elf_section_data (sec)->this_hdr;
5815 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5816
5817 if ((p->p_type == PT_LOAD
5818 || p->p_type == PT_TLS)
5819 && (this_hdr->sh_type != SHT_NOBITS
5820 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5821 && ((this_hdr->sh_flags & SHF_TLS) == 0
5822 || p->p_type == PT_TLS))))
5823 {
5824 bfd_vma p_start = p->p_paddr; /* Octets. */
5825 bfd_vma p_end = p_start + p->p_memsz; /* Octets. */
5826 bfd_vma s_start = sec->lma * opb; /* Octets. */
5827 bfd_vma adjust = s_start - p_end; /* Octets. */
5828
5829 if (adjust != 0
5830 && (s_start < p_end
5831 || p_end < p_start))
5832 {
5833 _bfd_error_handler
5834 /* xgettext:c-format */
5835 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5836 abfd, sec, (uint64_t) s_start / opb,
5837 (uint64_t) p_end / opb);
5838 adjust = 0;
5839 sec->lma = p_end / opb;
5840 }
5841 p->p_memsz += adjust;
5842
5843 if (p->p_type == PT_LOAD)
5844 {
5845 if (this_hdr->sh_type != SHT_NOBITS)
5846 {
5847 off_adjust = 0;
5848 if (p->p_filesz + adjust < p->p_memsz)
5849 {
5850 /* We have a PROGBITS section following NOBITS ones.
5851 Allocate file space for the NOBITS section(s) and
5852 zero it. */
5853 adjust = p->p_memsz - p->p_filesz;
5854 if (!write_zeros (abfd, off, adjust))
5855 return FALSE;
5856 }
5857 }
5858 /* We only adjust sh_offset in SHT_NOBITS sections
5859 as would seem proper for their address when the
5860 section is first in the segment. sh_offset
5861 doesn't really have any significance for
5862 SHT_NOBITS anyway, apart from a notional position
5863 relative to other sections. Historically we
5864 didn't bother with adjusting sh_offset and some
5865 programs depend on it not being adjusted. See
5866 pr12921 and pr25662. */
5867 if (this_hdr->sh_type != SHT_NOBITS || i == 0)
5868 {
5869 off += adjust;
5870 if (this_hdr->sh_type == SHT_NOBITS)
5871 off_adjust += adjust;
5872 }
5873 }
5874 if (this_hdr->sh_type != SHT_NOBITS)
5875 p->p_filesz += adjust;
5876 }
5877
5878 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5879 {
5880 /* The section at i == 0 is the one that actually contains
5881 everything. */
5882 if (i == 0)
5883 {
5884 this_hdr->sh_offset = sec->filepos = off;
5885 off += this_hdr->sh_size;
5886 p->p_filesz = this_hdr->sh_size;
5887 p->p_memsz = 0;
5888 p->p_align = 1;
5889 }
5890 else
5891 {
5892 /* The rest are fake sections that shouldn't be written. */
5893 sec->filepos = 0;
5894 sec->size = 0;
5895 sec->flags = 0;
5896 continue;
5897 }
5898 }
5899 else
5900 {
5901 if (p->p_type == PT_LOAD)
5902 {
5903 this_hdr->sh_offset = sec->filepos = off;
5904 if (this_hdr->sh_type != SHT_NOBITS)
5905 off += this_hdr->sh_size;
5906 }
5907 else if (this_hdr->sh_type == SHT_NOBITS
5908 && (this_hdr->sh_flags & SHF_TLS) != 0
5909 && this_hdr->sh_offset == 0)
5910 {
5911 /* This is a .tbss section that didn't get a PT_LOAD.
5912 (See _bfd_elf_map_sections_to_segments "Create a
5913 final PT_LOAD".) Set sh_offset to the value it
5914 would have if we had created a zero p_filesz and
5915 p_memsz PT_LOAD header for the section. This
5916 also makes the PT_TLS header have the same
5917 p_offset value. */
5918 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5919 off, align);
5920 this_hdr->sh_offset = sec->filepos = off + adjust;
5921 }
5922
5923 if (this_hdr->sh_type != SHT_NOBITS)
5924 {
5925 p->p_filesz += this_hdr->sh_size;
5926 /* A load section without SHF_ALLOC is something like
5927 a note section in a PT_NOTE segment. These take
5928 file space but are not loaded into memory. */
5929 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5930 p->p_memsz += this_hdr->sh_size;
5931 }
5932 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5933 {
5934 if (p->p_type == PT_TLS)
5935 p->p_memsz += this_hdr->sh_size;
5936
5937 /* .tbss is special. It doesn't contribute to p_memsz of
5938 normal segments. */
5939 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5940 p->p_memsz += this_hdr->sh_size;
5941 }
5942
5943 if (align > p->p_align
5944 && !m->p_align_valid
5945 && (p->p_type != PT_LOAD
5946 || (abfd->flags & D_PAGED) == 0))
5947 p->p_align = align;
5948 }
5949
5950 if (!m->p_flags_valid)
5951 {
5952 p->p_flags |= PF_R;
5953 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5954 p->p_flags |= PF_X;
5955 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5956 p->p_flags |= PF_W;
5957 }
5958 }
5959
5960 off -= off_adjust;
5961
5962 /* PR ld/20815 - Check that the program header segment, if
5963 present, will be loaded into memory. */
5964 if (p->p_type == PT_PHDR
5965 && phdr_load_seg == NULL
5966 && !(bed->elf_backend_allow_non_load_phdr != NULL
5967 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5968 {
5969 /* The fix for this error is usually to edit the linker script being
5970 used and set up the program headers manually. Either that or
5971 leave room for the headers at the start of the SECTIONS. */
5972 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5973 " by LOAD segment"),
5974 abfd);
5975 if (link_info == NULL)
5976 return FALSE;
5977 /* Arrange for the linker to exit with an error, deleting
5978 the output file unless --noinhibit-exec is given. */
5979 link_info->callbacks->info ("%X");
5980 }
5981
5982 /* Check that all sections are in a PT_LOAD segment.
5983 Don't check funky gdb generated core files. */
5984 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5985 {
5986 bfd_boolean check_vma = TRUE;
5987
5988 for (i = 1; i < m->count; i++)
5989 if (m->sections[i]->vma == m->sections[i - 1]->vma
5990 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5991 ->this_hdr), p) != 0
5992 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5993 ->this_hdr), p) != 0)
5994 {
5995 /* Looks like we have overlays packed into the segment. */
5996 check_vma = FALSE;
5997 break;
5998 }
5999
6000 for (i = 0; i < m->count; i++)
6001 {
6002 Elf_Internal_Shdr *this_hdr;
6003 asection *sec;
6004
6005 sec = m->sections[i];
6006 this_hdr = &(elf_section_data(sec)->this_hdr);
6007 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
6008 && !ELF_TBSS_SPECIAL (this_hdr, p))
6009 {
6010 _bfd_error_handler
6011 /* xgettext:c-format */
6012 (_("%pB: section `%pA' can't be allocated in segment %d"),
6013 abfd, sec, j);
6014 print_segment_map (m);
6015 }
6016 }
6017 }
6018 }
6019
6020 elf_next_file_pos (abfd) = off;
6021
6022 if (link_info != NULL
6023 && phdr_load_seg != NULL
6024 && phdr_load_seg->includes_filehdr)
6025 {
6026 /* There is a segment that contains both the file headers and the
6027 program headers, so provide a symbol __ehdr_start pointing there.
6028 A program can use this to examine itself robustly. */
6029
6030 struct elf_link_hash_entry *hash
6031 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
6032 FALSE, FALSE, TRUE);
6033 /* If the symbol was referenced and not defined, define it. */
6034 if (hash != NULL
6035 && (hash->root.type == bfd_link_hash_new
6036 || hash->root.type == bfd_link_hash_undefined
6037 || hash->root.type == bfd_link_hash_undefweak
6038 || hash->root.type == bfd_link_hash_common))
6039 {
6040 asection *s = NULL;
6041 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr / opb;
6042
6043 if (phdr_load_seg->count != 0)
6044 /* The segment contains sections, so use the first one. */
6045 s = phdr_load_seg->sections[0];
6046 else
6047 /* Use the first (i.e. lowest-addressed) section in any segment. */
6048 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
6049 if (m->p_type == PT_LOAD && m->count != 0)
6050 {
6051 s = m->sections[0];
6052 break;
6053 }
6054
6055 if (s != NULL)
6056 {
6057 hash->root.u.def.value = filehdr_vaddr - s->vma;
6058 hash->root.u.def.section = s;
6059 }
6060 else
6061 {
6062 hash->root.u.def.value = filehdr_vaddr;
6063 hash->root.u.def.section = bfd_abs_section_ptr;
6064 }
6065
6066 hash->root.type = bfd_link_hash_defined;
6067 hash->def_regular = 1;
6068 hash->non_elf = 0;
6069 }
6070 }
6071
6072 return TRUE;
6073 }
6074
6075 /* Determine if a bfd is a debuginfo file. Unfortunately there
6076 is no defined method for detecting such files, so we have to
6077 use heuristics instead. */
6078
6079 bfd_boolean
6080 is_debuginfo_file (bfd *abfd)
6081 {
6082 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6083 return FALSE;
6084
6085 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6086 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6087 Elf_Internal_Shdr **headerp;
6088
6089 for (headerp = start_headers; headerp < end_headers; headerp ++)
6090 {
6091 Elf_Internal_Shdr *header = * headerp;
6092
6093 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6094 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6095 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6096 && header->sh_type != SHT_NOBITS
6097 && header->sh_type != SHT_NOTE)
6098 return FALSE;
6099 }
6100
6101 return TRUE;
6102 }
6103
6104 /* Assign file positions for the other sections, except for compressed debugging
6105 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6106
6107 static bfd_boolean
6108 assign_file_positions_for_non_load_sections (bfd *abfd,
6109 struct bfd_link_info *link_info)
6110 {
6111 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6112 Elf_Internal_Shdr **i_shdrpp;
6113 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6114 Elf_Internal_Phdr *phdrs;
6115 Elf_Internal_Phdr *p;
6116 struct elf_segment_map *m;
6117 file_ptr off;
6118 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
6119
6120 i_shdrpp = elf_elfsections (abfd);
6121 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6122 off = elf_next_file_pos (abfd);
6123 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6124 {
6125 Elf_Internal_Shdr *hdr;
6126
6127 hdr = *hdrpp;
6128 if (hdr->bfd_section != NULL
6129 && (hdr->bfd_section->filepos != 0
6130 || (hdr->sh_type == SHT_NOBITS
6131 && hdr->contents == NULL)))
6132 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6133 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6134 {
6135 if (hdr->sh_size != 0
6136 /* PR 24717 - debuginfo files are known to be not strictly
6137 compliant with the ELF standard. In particular they often
6138 have .note.gnu.property sections that are outside of any
6139 loadable segment. This is not a problem for such files,
6140 so do not warn about them. */
6141 && ! is_debuginfo_file (abfd))
6142 _bfd_error_handler
6143 /* xgettext:c-format */
6144 (_("%pB: warning: allocated section `%s' not in segment"),
6145 abfd,
6146 (hdr->bfd_section == NULL
6147 ? "*unknown*"
6148 : hdr->bfd_section->name));
6149 /* We don't need to page align empty sections. */
6150 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6151 off += vma_page_aligned_bias (hdr->sh_addr, off,
6152 bed->maxpagesize);
6153 else
6154 off += vma_page_aligned_bias (hdr->sh_addr, off,
6155 hdr->sh_addralign);
6156 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6157 FALSE);
6158 }
6159 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6160 && hdr->bfd_section == NULL)
6161 /* We don't know the offset of these sections yet: their size has
6162 not been decided. */
6163 || (hdr->bfd_section != NULL
6164 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6165 || (bfd_section_is_ctf (hdr->bfd_section)
6166 && abfd->is_linker_output)))
6167 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6168 || (elf_symtab_shndx_list (abfd) != NULL
6169 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6170 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6171 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6172 hdr->sh_offset = -1;
6173 else
6174 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6175 }
6176 elf_next_file_pos (abfd) = off;
6177
6178 /* Now that we have set the section file positions, we can set up
6179 the file positions for the non PT_LOAD segments. */
6180 phdrs = elf_tdata (abfd)->phdr;
6181 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6182 {
6183 if (p->p_type == PT_GNU_RELRO)
6184 {
6185 bfd_vma start, end; /* Bytes. */
6186 bfd_boolean ok;
6187
6188 if (link_info != NULL)
6189 {
6190 /* During linking the range of the RELRO segment is passed
6191 in link_info. Note that there may be padding between
6192 relro_start and the first RELRO section. */
6193 start = link_info->relro_start;
6194 end = link_info->relro_end;
6195 }
6196 else if (m->count != 0)
6197 {
6198 if (!m->p_size_valid)
6199 abort ();
6200 start = m->sections[0]->vma;
6201 end = start + m->p_size / opb;
6202 }
6203 else
6204 {
6205 start = 0;
6206 end = 0;
6207 }
6208
6209 ok = FALSE;
6210 if (start < end)
6211 {
6212 struct elf_segment_map *lm;
6213 const Elf_Internal_Phdr *lp;
6214 unsigned int i;
6215
6216 /* Find a LOAD segment containing a section in the RELRO
6217 segment. */
6218 for (lm = elf_seg_map (abfd), lp = phdrs;
6219 lm != NULL;
6220 lm = lm->next, lp++)
6221 {
6222 if (lp->p_type == PT_LOAD
6223 && lm->count != 0
6224 && (lm->sections[lm->count - 1]->vma
6225 + (!IS_TBSS (lm->sections[lm->count - 1])
6226 ? lm->sections[lm->count - 1]->size / opb
6227 : 0)) > start
6228 && lm->sections[0]->vma < end)
6229 break;
6230 }
6231
6232 if (lm != NULL)
6233 {
6234 /* Find the section starting the RELRO segment. */
6235 for (i = 0; i < lm->count; i++)
6236 {
6237 asection *s = lm->sections[i];
6238 if (s->vma >= start
6239 && s->vma < end
6240 && s->size != 0)
6241 break;
6242 }
6243
6244 if (i < lm->count)
6245 {
6246 p->p_vaddr = lm->sections[i]->vma * opb;
6247 p->p_paddr = lm->sections[i]->lma * opb;
6248 p->p_offset = lm->sections[i]->filepos;
6249 p->p_memsz = end * opb - p->p_vaddr;
6250 p->p_filesz = p->p_memsz;
6251
6252 /* The RELRO segment typically ends a few bytes
6253 into .got.plt but other layouts are possible.
6254 In cases where the end does not match any
6255 loaded section (for instance is in file
6256 padding), trim p_filesz back to correspond to
6257 the end of loaded section contents. */
6258 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6259 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6260
6261 /* Preserve the alignment and flags if they are
6262 valid. The gold linker generates RW/4 for
6263 the PT_GNU_RELRO section. It is better for
6264 objcopy/strip to honor these attributes
6265 otherwise gdb will choke when using separate
6266 debug files. */
6267 if (!m->p_align_valid)
6268 p->p_align = 1;
6269 if (!m->p_flags_valid)
6270 p->p_flags = PF_R;
6271 ok = TRUE;
6272 }
6273 }
6274 }
6275 if (link_info != NULL)
6276 BFD_ASSERT (ok);
6277 if (!ok)
6278 memset (p, 0, sizeof *p);
6279 }
6280 else if (p->p_type == PT_GNU_STACK)
6281 {
6282 if (m->p_size_valid)
6283 p->p_memsz = m->p_size;
6284 }
6285 else if (m->count != 0)
6286 {
6287 unsigned int i;
6288
6289 if (p->p_type != PT_LOAD
6290 && (p->p_type != PT_NOTE
6291 || bfd_get_format (abfd) != bfd_core))
6292 {
6293 /* A user specified segment layout may include a PHDR
6294 segment that overlaps with a LOAD segment... */
6295 if (p->p_type == PT_PHDR)
6296 {
6297 m->count = 0;
6298 continue;
6299 }
6300
6301 if (m->includes_filehdr || m->includes_phdrs)
6302 {
6303 /* PR 17512: file: 2195325e. */
6304 _bfd_error_handler
6305 (_("%pB: error: non-load segment %d includes file header "
6306 "and/or program header"),
6307 abfd, (int) (p - phdrs));
6308 return FALSE;
6309 }
6310
6311 p->p_filesz = 0;
6312 p->p_offset = m->sections[0]->filepos;
6313 for (i = m->count; i-- != 0;)
6314 {
6315 asection *sect = m->sections[i];
6316 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6317 if (hdr->sh_type != SHT_NOBITS)
6318 {
6319 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6320 + hdr->sh_size);
6321 break;
6322 }
6323 }
6324 }
6325 }
6326 }
6327
6328 return TRUE;
6329 }
6330
6331 static elf_section_list *
6332 find_section_in_list (unsigned int i, elf_section_list * list)
6333 {
6334 for (;list != NULL; list = list->next)
6335 if (list->ndx == i)
6336 break;
6337 return list;
6338 }
6339
6340 /* Work out the file positions of all the sections. This is called by
6341 _bfd_elf_compute_section_file_positions. All the section sizes and
6342 VMAs must be known before this is called.
6343
6344 Reloc sections come in two flavours: Those processed specially as
6345 "side-channel" data attached to a section to which they apply, and those that
6346 bfd doesn't process as relocations. The latter sort are stored in a normal
6347 bfd section by bfd_section_from_shdr. We don't consider the former sort
6348 here, unless they form part of the loadable image. Reloc sections not
6349 assigned here (and compressed debugging sections and CTF sections which
6350 nothing else in the file can rely upon) will be handled later by
6351 assign_file_positions_for_relocs.
6352
6353 We also don't set the positions of the .symtab and .strtab here. */
6354
6355 static bfd_boolean
6356 assign_file_positions_except_relocs (bfd *abfd,
6357 struct bfd_link_info *link_info)
6358 {
6359 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6360 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6361 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6362 unsigned int alloc;
6363
6364 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6365 && bfd_get_format (abfd) != bfd_core)
6366 {
6367 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6368 unsigned int num_sec = elf_numsections (abfd);
6369 Elf_Internal_Shdr **hdrpp;
6370 unsigned int i;
6371 file_ptr off;
6372
6373 /* Start after the ELF header. */
6374 off = i_ehdrp->e_ehsize;
6375
6376 /* We are not creating an executable, which means that we are
6377 not creating a program header, and that the actual order of
6378 the sections in the file is unimportant. */
6379 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6380 {
6381 Elf_Internal_Shdr *hdr;
6382
6383 hdr = *hdrpp;
6384 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6385 && hdr->bfd_section == NULL)
6386 /* Do not assign offsets for these sections yet: we don't know
6387 their sizes. */
6388 || (hdr->bfd_section != NULL
6389 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6390 || (bfd_section_is_ctf (hdr->bfd_section)
6391 && abfd->is_linker_output)))
6392 || i == elf_onesymtab (abfd)
6393 || (elf_symtab_shndx_list (abfd) != NULL
6394 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6395 || i == elf_strtab_sec (abfd)
6396 || i == elf_shstrtab_sec (abfd))
6397 {
6398 hdr->sh_offset = -1;
6399 }
6400 else
6401 off = _bfd_elf_assign_file_position_for_section (hdr, off, TRUE);
6402 }
6403
6404 elf_next_file_pos (abfd) = off;
6405 elf_program_header_size (abfd) = 0;
6406 }
6407 else
6408 {
6409 /* Assign file positions for the loaded sections based on the
6410 assignment of sections to segments. */
6411 if (!assign_file_positions_for_load_sections (abfd, link_info))
6412 return FALSE;
6413
6414 /* And for non-load sections. */
6415 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6416 return FALSE;
6417 }
6418
6419 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6420 return FALSE;
6421
6422 /* Write out the program headers. */
6423 alloc = i_ehdrp->e_phnum;
6424 if (alloc != 0)
6425 {
6426 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6427 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6428 return FALSE;
6429 }
6430
6431 return TRUE;
6432 }
6433
6434 bfd_boolean
6435 _bfd_elf_init_file_header (bfd *abfd,
6436 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6437 {
6438 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6439 struct elf_strtab_hash *shstrtab;
6440 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6441
6442 i_ehdrp = elf_elfheader (abfd);
6443
6444 shstrtab = _bfd_elf_strtab_init ();
6445 if (shstrtab == NULL)
6446 return FALSE;
6447
6448 elf_shstrtab (abfd) = shstrtab;
6449
6450 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6451 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6452 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6453 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6454
6455 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6456 i_ehdrp->e_ident[EI_DATA] =
6457 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6458 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6459
6460 if ((abfd->flags & DYNAMIC) != 0)
6461 i_ehdrp->e_type = ET_DYN;
6462 else if ((abfd->flags & EXEC_P) != 0)
6463 i_ehdrp->e_type = ET_EXEC;
6464 else if (bfd_get_format (abfd) == bfd_core)
6465 i_ehdrp->e_type = ET_CORE;
6466 else
6467 i_ehdrp->e_type = ET_REL;
6468
6469 switch (bfd_get_arch (abfd))
6470 {
6471 case bfd_arch_unknown:
6472 i_ehdrp->e_machine = EM_NONE;
6473 break;
6474
6475 /* There used to be a long list of cases here, each one setting
6476 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6477 in the corresponding bfd definition. To avoid duplication,
6478 the switch was removed. Machines that need special handling
6479 can generally do it in elf_backend_final_write_processing(),
6480 unless they need the information earlier than the final write.
6481 Such need can generally be supplied by replacing the tests for
6482 e_machine with the conditions used to determine it. */
6483 default:
6484 i_ehdrp->e_machine = bed->elf_machine_code;
6485 }
6486
6487 i_ehdrp->e_version = bed->s->ev_current;
6488 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6489
6490 /* No program header, for now. */
6491 i_ehdrp->e_phoff = 0;
6492 i_ehdrp->e_phentsize = 0;
6493 i_ehdrp->e_phnum = 0;
6494
6495 /* Each bfd section is section header entry. */
6496 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6497 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6498
6499 elf_tdata (abfd)->symtab_hdr.sh_name =
6500 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", FALSE);
6501 elf_tdata (abfd)->strtab_hdr.sh_name =
6502 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", FALSE);
6503 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6504 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", FALSE);
6505 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6506 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6507 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6508 return FALSE;
6509
6510 return TRUE;
6511 }
6512
6513 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6514
6515 FIXME: We used to have code here to sort the PT_LOAD segments into
6516 ascending order, as per the ELF spec. But this breaks some programs,
6517 including the Linux kernel. But really either the spec should be
6518 changed or the programs updated. */
6519
6520 bfd_boolean
6521 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6522 {
6523 if (link_info != NULL && bfd_link_pie (link_info))
6524 {
6525 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6526 unsigned int num_segments = i_ehdrp->e_phnum;
6527 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6528 Elf_Internal_Phdr *segment = tdata->phdr;
6529 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6530
6531 /* Find the lowest p_vaddr in PT_LOAD segments. */
6532 bfd_vma p_vaddr = (bfd_vma) -1;
6533 for (; segment < end_segment; segment++)
6534 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6535 p_vaddr = segment->p_vaddr;
6536
6537 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6538 segments is non-zero. */
6539 if (p_vaddr)
6540 i_ehdrp->e_type = ET_EXEC;
6541 }
6542 return TRUE;
6543 }
6544
6545 /* Assign file positions for all the reloc sections which are not part
6546 of the loadable file image, and the file position of section headers. */
6547
6548 static bfd_boolean
6549 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6550 {
6551 file_ptr off;
6552 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6553 Elf_Internal_Shdr *shdrp;
6554 Elf_Internal_Ehdr *i_ehdrp;
6555 const struct elf_backend_data *bed;
6556
6557 off = elf_next_file_pos (abfd);
6558
6559 shdrpp = elf_elfsections (abfd);
6560 end_shdrpp = shdrpp + elf_numsections (abfd);
6561 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6562 {
6563 shdrp = *shdrpp;
6564 if (shdrp->sh_offset == -1)
6565 {
6566 asection *sec = shdrp->bfd_section;
6567 bfd_boolean is_rel = (shdrp->sh_type == SHT_REL
6568 || shdrp->sh_type == SHT_RELA);
6569 bfd_boolean is_ctf = sec && bfd_section_is_ctf (sec);
6570 if (is_rel
6571 || is_ctf
6572 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6573 {
6574 if (!is_rel && !is_ctf)
6575 {
6576 const char *name = sec->name;
6577 struct bfd_elf_section_data *d;
6578
6579 /* Compress DWARF debug sections. */
6580 if (!bfd_compress_section (abfd, sec,
6581 shdrp->contents))
6582 return FALSE;
6583
6584 if (sec->compress_status == COMPRESS_SECTION_DONE
6585 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6586 {
6587 /* If section is compressed with zlib-gnu, convert
6588 section name from .debug_* to .zdebug_*. */
6589 char *new_name
6590 = convert_debug_to_zdebug (abfd, name);
6591 if (new_name == NULL)
6592 return FALSE;
6593 name = new_name;
6594 }
6595 /* Add section name to section name section. */
6596 if (shdrp->sh_name != (unsigned int) -1)
6597 abort ();
6598 shdrp->sh_name
6599 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6600 name, FALSE);
6601 d = elf_section_data (sec);
6602
6603 /* Add reloc section name to section name section. */
6604 if (d->rel.hdr
6605 && !_bfd_elf_set_reloc_sh_name (abfd,
6606 d->rel.hdr,
6607 name, FALSE))
6608 return FALSE;
6609 if (d->rela.hdr
6610 && !_bfd_elf_set_reloc_sh_name (abfd,
6611 d->rela.hdr,
6612 name, TRUE))
6613 return FALSE;
6614
6615 /* Update section size and contents. */
6616 shdrp->sh_size = sec->size;
6617 shdrp->contents = sec->contents;
6618 shdrp->bfd_section->contents = NULL;
6619 }
6620 else if (is_ctf)
6621 {
6622 /* Update section size and contents. */
6623 shdrp->sh_size = sec->size;
6624 shdrp->contents = sec->contents;
6625 }
6626
6627 off = _bfd_elf_assign_file_position_for_section (shdrp,
6628 off,
6629 TRUE);
6630 }
6631 }
6632 }
6633
6634 /* Place section name section after DWARF debug sections have been
6635 compressed. */
6636 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6637 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6638 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6639 off = _bfd_elf_assign_file_position_for_section (shdrp, off, TRUE);
6640
6641 /* Place the section headers. */
6642 i_ehdrp = elf_elfheader (abfd);
6643 bed = get_elf_backend_data (abfd);
6644 off = align_file_position (off, 1 << bed->s->log_file_align);
6645 i_ehdrp->e_shoff = off;
6646 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6647 elf_next_file_pos (abfd) = off;
6648
6649 return TRUE;
6650 }
6651
6652 bfd_boolean
6653 _bfd_elf_write_object_contents (bfd *abfd)
6654 {
6655 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6656 Elf_Internal_Shdr **i_shdrp;
6657 bfd_boolean failed;
6658 unsigned int count, num_sec;
6659 struct elf_obj_tdata *t;
6660
6661 if (! abfd->output_has_begun
6662 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6663 return FALSE;
6664 /* Do not rewrite ELF data when the BFD has been opened for update.
6665 abfd->output_has_begun was set to TRUE on opening, so creation of new
6666 sections, and modification of existing section sizes was restricted.
6667 This means the ELF header, program headers and section headers can't have
6668 changed.
6669 If the contents of any sections has been modified, then those changes have
6670 already been written to the BFD. */
6671 else if (abfd->direction == both_direction)
6672 {
6673 BFD_ASSERT (abfd->output_has_begun);
6674 return TRUE;
6675 }
6676
6677 i_shdrp = elf_elfsections (abfd);
6678
6679 failed = FALSE;
6680 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6681 if (failed)
6682 return FALSE;
6683
6684 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6685 return FALSE;
6686
6687 /* After writing the headers, we need to write the sections too... */
6688 num_sec = elf_numsections (abfd);
6689 for (count = 1; count < num_sec; count++)
6690 {
6691 i_shdrp[count]->sh_name
6692 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6693 i_shdrp[count]->sh_name);
6694 if (bed->elf_backend_section_processing)
6695 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6696 return FALSE;
6697 if (i_shdrp[count]->contents)
6698 {
6699 bfd_size_type amt = i_shdrp[count]->sh_size;
6700
6701 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6702 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6703 return FALSE;
6704 }
6705 }
6706
6707 /* Write out the section header names. */
6708 t = elf_tdata (abfd);
6709 if (elf_shstrtab (abfd) != NULL
6710 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6711 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6712 return FALSE;
6713
6714 if (!(*bed->elf_backend_final_write_processing) (abfd))
6715 return FALSE;
6716
6717 if (!bed->s->write_shdrs_and_ehdr (abfd))
6718 return FALSE;
6719
6720 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6721 if (t->o->build_id.after_write_object_contents != NULL)
6722 return (*t->o->build_id.after_write_object_contents) (abfd);
6723
6724 return TRUE;
6725 }
6726
6727 bfd_boolean
6728 _bfd_elf_write_corefile_contents (bfd *abfd)
6729 {
6730 /* Hopefully this can be done just like an object file. */
6731 return _bfd_elf_write_object_contents (abfd);
6732 }
6733
6734 /* Given a section, search the header to find them. */
6735
6736 unsigned int
6737 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6738 {
6739 const struct elf_backend_data *bed;
6740 unsigned int sec_index;
6741
6742 if (elf_section_data (asect) != NULL
6743 && elf_section_data (asect)->this_idx != 0)
6744 return elf_section_data (asect)->this_idx;
6745
6746 if (bfd_is_abs_section (asect))
6747 sec_index = SHN_ABS;
6748 else if (bfd_is_com_section (asect))
6749 sec_index = SHN_COMMON;
6750 else if (bfd_is_und_section (asect))
6751 sec_index = SHN_UNDEF;
6752 else
6753 sec_index = SHN_BAD;
6754
6755 bed = get_elf_backend_data (abfd);
6756 if (bed->elf_backend_section_from_bfd_section)
6757 {
6758 int retval = sec_index;
6759
6760 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6761 return retval;
6762 }
6763
6764 if (sec_index == SHN_BAD)
6765 bfd_set_error (bfd_error_nonrepresentable_section);
6766
6767 return sec_index;
6768 }
6769
6770 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6771 on error. */
6772
6773 int
6774 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6775 {
6776 asymbol *asym_ptr = *asym_ptr_ptr;
6777 int idx;
6778 flagword flags = asym_ptr->flags;
6779
6780 /* When gas creates relocations against local labels, it creates its
6781 own symbol for the section, but does put the symbol into the
6782 symbol chain, so udata is 0. When the linker is generating
6783 relocatable output, this section symbol may be for one of the
6784 input sections rather than the output section. */
6785 if (asym_ptr->udata.i == 0
6786 && (flags & BSF_SECTION_SYM)
6787 && asym_ptr->section)
6788 {
6789 asection *sec;
6790 int indx;
6791
6792 sec = asym_ptr->section;
6793 if (sec->owner != abfd && sec->output_section != NULL)
6794 sec = sec->output_section;
6795 if (sec->owner == abfd
6796 && (indx = sec->index) < elf_num_section_syms (abfd)
6797 && elf_section_syms (abfd)[indx] != NULL)
6798 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6799 }
6800
6801 idx = asym_ptr->udata.i;
6802
6803 if (idx == 0)
6804 {
6805 /* This case can occur when using --strip-symbol on a symbol
6806 which is used in a relocation entry. */
6807 _bfd_error_handler
6808 /* xgettext:c-format */
6809 (_("%pB: symbol `%s' required but not present"),
6810 abfd, bfd_asymbol_name (asym_ptr));
6811 bfd_set_error (bfd_error_no_symbols);
6812 return -1;
6813 }
6814
6815 #if DEBUG & 4
6816 {
6817 fprintf (stderr,
6818 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6819 (long) asym_ptr, asym_ptr->name, idx, flags);
6820 fflush (stderr);
6821 }
6822 #endif
6823
6824 return idx;
6825 }
6826
6827 /* Rewrite program header information. */
6828
6829 static bfd_boolean
6830 rewrite_elf_program_header (bfd *ibfd, bfd *obfd)
6831 {
6832 Elf_Internal_Ehdr *iehdr;
6833 struct elf_segment_map *map;
6834 struct elf_segment_map *map_first;
6835 struct elf_segment_map **pointer_to_map;
6836 Elf_Internal_Phdr *segment;
6837 asection *section;
6838 unsigned int i;
6839 unsigned int num_segments;
6840 bfd_boolean phdr_included = FALSE;
6841 bfd_boolean p_paddr_valid;
6842 bfd_vma maxpagesize;
6843 struct elf_segment_map *phdr_adjust_seg = NULL;
6844 unsigned int phdr_adjust_num = 0;
6845 const struct elf_backend_data *bed;
6846 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
6847
6848 bed = get_elf_backend_data (ibfd);
6849 iehdr = elf_elfheader (ibfd);
6850
6851 map_first = NULL;
6852 pointer_to_map = &map_first;
6853
6854 num_segments = elf_elfheader (ibfd)->e_phnum;
6855 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
6856
6857 /* Returns the end address of the segment + 1. */
6858 #define SEGMENT_END(segment, start) \
6859 (start + (segment->p_memsz > segment->p_filesz \
6860 ? segment->p_memsz : segment->p_filesz))
6861
6862 #define SECTION_SIZE(section, segment) \
6863 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6864 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6865 ? section->size : 0)
6866
6867 /* Returns TRUE if the given section is contained within
6868 the given segment. VMA addresses are compared. */
6869 #define IS_CONTAINED_BY_VMA(section, segment, opb) \
6870 (section->vma * (opb) >= segment->p_vaddr \
6871 && (section->vma * (opb) + SECTION_SIZE (section, segment) \
6872 <= (SEGMENT_END (segment, segment->p_vaddr))))
6873
6874 /* Returns TRUE if the given section is contained within
6875 the given segment. LMA addresses are compared. */
6876 #define IS_CONTAINED_BY_LMA(section, segment, base, opb) \
6877 (section->lma * (opb) >= base \
6878 && (section->lma + SECTION_SIZE (section, segment) / (opb) >= section->lma) \
6879 && (section->lma * (opb) + SECTION_SIZE (section, segment) \
6880 <= SEGMENT_END (segment, base)))
6881
6882 /* Handle PT_NOTE segment. */
6883 #define IS_NOTE(p, s) \
6884 (p->p_type == PT_NOTE \
6885 && elf_section_type (s) == SHT_NOTE \
6886 && (bfd_vma) s->filepos >= p->p_offset \
6887 && ((bfd_vma) s->filepos + s->size \
6888 <= p->p_offset + p->p_filesz))
6889
6890 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6891 etc. */
6892 #define IS_COREFILE_NOTE(p, s) \
6893 (IS_NOTE (p, s) \
6894 && bfd_get_format (ibfd) == bfd_core \
6895 && s->vma == 0 \
6896 && s->lma == 0)
6897
6898 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6899 linker, which generates a PT_INTERP section with p_vaddr and
6900 p_memsz set to 0. */
6901 #define IS_SOLARIS_PT_INTERP(p, s) \
6902 (p->p_vaddr == 0 \
6903 && p->p_paddr == 0 \
6904 && p->p_memsz == 0 \
6905 && p->p_filesz > 0 \
6906 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6907 && s->size > 0 \
6908 && (bfd_vma) s->filepos >= p->p_offset \
6909 && ((bfd_vma) s->filepos + s->size \
6910 <= p->p_offset + p->p_filesz))
6911
6912 /* Decide if the given section should be included in the given segment.
6913 A section will be included if:
6914 1. It is within the address space of the segment -- we use the LMA
6915 if that is set for the segment and the VMA otherwise,
6916 2. It is an allocated section or a NOTE section in a PT_NOTE
6917 segment.
6918 3. There is an output section associated with it,
6919 4. The section has not already been allocated to a previous segment.
6920 5. PT_GNU_STACK segments do not include any sections.
6921 6. PT_TLS segment includes only SHF_TLS sections.
6922 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6923 8. PT_DYNAMIC should not contain empty sections at the beginning
6924 (with the possible exception of .dynamic). */
6925 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6926 ((((segment->p_paddr \
6927 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr, opb) \
6928 : IS_CONTAINED_BY_VMA (section, segment, opb)) \
6929 && (section->flags & SEC_ALLOC) != 0) \
6930 || IS_NOTE (segment, section)) \
6931 && segment->p_type != PT_GNU_STACK \
6932 && (segment->p_type != PT_TLS \
6933 || (section->flags & SEC_THREAD_LOCAL)) \
6934 && (segment->p_type == PT_LOAD \
6935 || segment->p_type == PT_TLS \
6936 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6937 && (segment->p_type != PT_DYNAMIC \
6938 || SECTION_SIZE (section, segment) > 0 \
6939 || (segment->p_paddr \
6940 ? segment->p_paddr != section->lma * (opb) \
6941 : segment->p_vaddr != section->vma * (opb)) \
6942 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6943 && (segment->p_type != PT_LOAD || !section->segment_mark))
6944
6945 /* If the output section of a section in the input segment is NULL,
6946 it is removed from the corresponding output segment. */
6947 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
6948 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
6949 && section->output_section != NULL)
6950
6951 /* Returns TRUE iff seg1 starts after the end of seg2. */
6952 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6953 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6954
6955 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6956 their VMA address ranges and their LMA address ranges overlap.
6957 It is possible to have overlapping VMA ranges without overlapping LMA
6958 ranges. RedBoot images for example can have both .data and .bss mapped
6959 to the same VMA range, but with the .data section mapped to a different
6960 LMA. */
6961 #define SEGMENT_OVERLAPS(seg1, seg2) \
6962 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6963 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6964 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6965 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6966
6967 /* Initialise the segment mark field. */
6968 for (section = ibfd->sections; section != NULL; section = section->next)
6969 section->segment_mark = FALSE;
6970
6971 /* The Solaris linker creates program headers in which all the
6972 p_paddr fields are zero. When we try to objcopy or strip such a
6973 file, we get confused. Check for this case, and if we find it
6974 don't set the p_paddr_valid fields. */
6975 p_paddr_valid = FALSE;
6976 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6977 i < num_segments;
6978 i++, segment++)
6979 if (segment->p_paddr != 0)
6980 {
6981 p_paddr_valid = TRUE;
6982 break;
6983 }
6984
6985 /* Scan through the segments specified in the program header
6986 of the input BFD. For this first scan we look for overlaps
6987 in the loadable segments. These can be created by weird
6988 parameters to objcopy. Also, fix some solaris weirdness. */
6989 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6990 i < num_segments;
6991 i++, segment++)
6992 {
6993 unsigned int j;
6994 Elf_Internal_Phdr *segment2;
6995
6996 if (segment->p_type == PT_INTERP)
6997 for (section = ibfd->sections; section; section = section->next)
6998 if (IS_SOLARIS_PT_INTERP (segment, section))
6999 {
7000 /* Mininal change so that the normal section to segment
7001 assignment code will work. */
7002 segment->p_vaddr = section->vma * opb;
7003 break;
7004 }
7005
7006 if (segment->p_type != PT_LOAD)
7007 {
7008 /* Remove PT_GNU_RELRO segment. */
7009 if (segment->p_type == PT_GNU_RELRO)
7010 segment->p_type = PT_NULL;
7011 continue;
7012 }
7013
7014 /* Determine if this segment overlaps any previous segments. */
7015 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
7016 {
7017 bfd_signed_vma extra_length;
7018
7019 if (segment2->p_type != PT_LOAD
7020 || !SEGMENT_OVERLAPS (segment, segment2))
7021 continue;
7022
7023 /* Merge the two segments together. */
7024 if (segment2->p_vaddr < segment->p_vaddr)
7025 {
7026 /* Extend SEGMENT2 to include SEGMENT and then delete
7027 SEGMENT. */
7028 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
7029 - SEGMENT_END (segment2, segment2->p_vaddr));
7030
7031 if (extra_length > 0)
7032 {
7033 segment2->p_memsz += extra_length;
7034 segment2->p_filesz += extra_length;
7035 }
7036
7037 segment->p_type = PT_NULL;
7038
7039 /* Since we have deleted P we must restart the outer loop. */
7040 i = 0;
7041 segment = elf_tdata (ibfd)->phdr;
7042 break;
7043 }
7044 else
7045 {
7046 /* Extend SEGMENT to include SEGMENT2 and then delete
7047 SEGMENT2. */
7048 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
7049 - SEGMENT_END (segment, segment->p_vaddr));
7050
7051 if (extra_length > 0)
7052 {
7053 segment->p_memsz += extra_length;
7054 segment->p_filesz += extra_length;
7055 }
7056
7057 segment2->p_type = PT_NULL;
7058 }
7059 }
7060 }
7061
7062 /* The second scan attempts to assign sections to segments. */
7063 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7064 i < num_segments;
7065 i++, segment++)
7066 {
7067 unsigned int section_count;
7068 asection **sections;
7069 asection *output_section;
7070 unsigned int isec;
7071 asection *matching_lma;
7072 asection *suggested_lma;
7073 unsigned int j;
7074 size_t amt;
7075 asection *first_section;
7076
7077 if (segment->p_type == PT_NULL)
7078 continue;
7079
7080 first_section = NULL;
7081 /* Compute how many sections might be placed into this segment. */
7082 for (section = ibfd->sections, section_count = 0;
7083 section != NULL;
7084 section = section->next)
7085 {
7086 /* Find the first section in the input segment, which may be
7087 removed from the corresponding output segment. */
7088 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb))
7089 {
7090 if (first_section == NULL)
7091 first_section = section;
7092 if (section->output_section != NULL)
7093 ++section_count;
7094 }
7095 }
7096
7097 /* Allocate a segment map big enough to contain
7098 all of the sections we have selected. */
7099 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7100 amt += section_count * sizeof (asection *);
7101 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7102 if (map == NULL)
7103 return FALSE;
7104
7105 /* Initialise the fields of the segment map. Default to
7106 using the physical address of the segment in the input BFD. */
7107 map->next = NULL;
7108 map->p_type = segment->p_type;
7109 map->p_flags = segment->p_flags;
7110 map->p_flags_valid = 1;
7111
7112 /* If the first section in the input segment is removed, there is
7113 no need to preserve segment physical address in the corresponding
7114 output segment. */
7115 if (!first_section || first_section->output_section != NULL)
7116 {
7117 map->p_paddr = segment->p_paddr;
7118 map->p_paddr_valid = p_paddr_valid;
7119 }
7120
7121 /* Determine if this segment contains the ELF file header
7122 and if it contains the program headers themselves. */
7123 map->includes_filehdr = (segment->p_offset == 0
7124 && segment->p_filesz >= iehdr->e_ehsize);
7125 map->includes_phdrs = 0;
7126
7127 if (!phdr_included || segment->p_type != PT_LOAD)
7128 {
7129 map->includes_phdrs =
7130 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7131 && (segment->p_offset + segment->p_filesz
7132 >= ((bfd_vma) iehdr->e_phoff
7133 + iehdr->e_phnum * iehdr->e_phentsize)));
7134
7135 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7136 phdr_included = TRUE;
7137 }
7138
7139 if (section_count == 0)
7140 {
7141 /* Special segments, such as the PT_PHDR segment, may contain
7142 no sections, but ordinary, loadable segments should contain
7143 something. They are allowed by the ELF spec however, so only
7144 a warning is produced.
7145 There is however the valid use case of embedded systems which
7146 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7147 flash memory with zeros. No warning is shown for that case. */
7148 if (segment->p_type == PT_LOAD
7149 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7150 /* xgettext:c-format */
7151 _bfd_error_handler
7152 (_("%pB: warning: empty loadable segment detected"
7153 " at vaddr=%#" PRIx64 ", is this intentional?"),
7154 ibfd, (uint64_t) segment->p_vaddr);
7155
7156 map->p_vaddr_offset = segment->p_vaddr / opb;
7157 map->count = 0;
7158 *pointer_to_map = map;
7159 pointer_to_map = &map->next;
7160
7161 continue;
7162 }
7163
7164 /* Now scan the sections in the input BFD again and attempt
7165 to add their corresponding output sections to the segment map.
7166 The problem here is how to handle an output section which has
7167 been moved (ie had its LMA changed). There are four possibilities:
7168
7169 1. None of the sections have been moved.
7170 In this case we can continue to use the segment LMA from the
7171 input BFD.
7172
7173 2. All of the sections have been moved by the same amount.
7174 In this case we can change the segment's LMA to match the LMA
7175 of the first section.
7176
7177 3. Some of the sections have been moved, others have not.
7178 In this case those sections which have not been moved can be
7179 placed in the current segment which will have to have its size,
7180 and possibly its LMA changed, and a new segment or segments will
7181 have to be created to contain the other sections.
7182
7183 4. The sections have been moved, but not by the same amount.
7184 In this case we can change the segment's LMA to match the LMA
7185 of the first section and we will have to create a new segment
7186 or segments to contain the other sections.
7187
7188 In order to save time, we allocate an array to hold the section
7189 pointers that we are interested in. As these sections get assigned
7190 to a segment, they are removed from this array. */
7191
7192 amt = section_count * sizeof (asection *);
7193 sections = (asection **) bfd_malloc (amt);
7194 if (sections == NULL)
7195 return FALSE;
7196
7197 /* Step One: Scan for segment vs section LMA conflicts.
7198 Also add the sections to the section array allocated above.
7199 Also add the sections to the current segment. In the common
7200 case, where the sections have not been moved, this means that
7201 we have completely filled the segment, and there is nothing
7202 more to do. */
7203 isec = 0;
7204 matching_lma = NULL;
7205 suggested_lma = NULL;
7206
7207 for (section = first_section, j = 0;
7208 section != NULL;
7209 section = section->next)
7210 {
7211 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed, opb))
7212 {
7213 output_section = section->output_section;
7214
7215 sections[j++] = section;
7216
7217 /* The Solaris native linker always sets p_paddr to 0.
7218 We try to catch that case here, and set it to the
7219 correct value. Note - some backends require that
7220 p_paddr be left as zero. */
7221 if (!p_paddr_valid
7222 && segment->p_vaddr != 0
7223 && !bed->want_p_paddr_set_to_zero
7224 && isec == 0
7225 && output_section->lma != 0
7226 && (align_power (segment->p_vaddr
7227 + (map->includes_filehdr
7228 ? iehdr->e_ehsize : 0)
7229 + (map->includes_phdrs
7230 ? iehdr->e_phnum * iehdr->e_phentsize
7231 : 0),
7232 output_section->alignment_power * opb)
7233 == (output_section->vma * opb)))
7234 map->p_paddr = segment->p_vaddr;
7235
7236 /* Match up the physical address of the segment with the
7237 LMA address of the output section. */
7238 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7239 opb)
7240 || IS_COREFILE_NOTE (segment, section)
7241 || (bed->want_p_paddr_set_to_zero
7242 && IS_CONTAINED_BY_VMA (output_section, segment, opb)))
7243 {
7244 if (matching_lma == NULL
7245 || output_section->lma < matching_lma->lma)
7246 matching_lma = output_section;
7247
7248 /* We assume that if the section fits within the segment
7249 then it does not overlap any other section within that
7250 segment. */
7251 map->sections[isec++] = output_section;
7252 }
7253 else if (suggested_lma == NULL)
7254 suggested_lma = output_section;
7255
7256 if (j == section_count)
7257 break;
7258 }
7259 }
7260
7261 BFD_ASSERT (j == section_count);
7262
7263 /* Step Two: Adjust the physical address of the current segment,
7264 if necessary. */
7265 if (isec == section_count)
7266 {
7267 /* All of the sections fitted within the segment as currently
7268 specified. This is the default case. Add the segment to
7269 the list of built segments and carry on to process the next
7270 program header in the input BFD. */
7271 map->count = section_count;
7272 *pointer_to_map = map;
7273 pointer_to_map = &map->next;
7274
7275 if (p_paddr_valid
7276 && !bed->want_p_paddr_set_to_zero)
7277 {
7278 bfd_vma hdr_size = 0;
7279 if (map->includes_filehdr)
7280 hdr_size = iehdr->e_ehsize;
7281 if (map->includes_phdrs)
7282 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7283
7284 /* Account for padding before the first section in the
7285 segment. */
7286 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7287 - matching_lma->lma);
7288 }
7289
7290 free (sections);
7291 continue;
7292 }
7293 else
7294 {
7295 /* Change the current segment's physical address to match
7296 the LMA of the first section that fitted, or if no
7297 section fitted, the first section. */
7298 if (matching_lma == NULL)
7299 matching_lma = suggested_lma;
7300
7301 map->p_paddr = matching_lma->lma * opb;
7302
7303 /* Offset the segment physical address from the lma
7304 to allow for space taken up by elf headers. */
7305 if (map->includes_phdrs)
7306 {
7307 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7308
7309 /* iehdr->e_phnum is just an estimate of the number
7310 of program headers that we will need. Make a note
7311 here of the number we used and the segment we chose
7312 to hold these headers, so that we can adjust the
7313 offset when we know the correct value. */
7314 phdr_adjust_num = iehdr->e_phnum;
7315 phdr_adjust_seg = map;
7316 }
7317
7318 if (map->includes_filehdr)
7319 {
7320 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7321 map->p_paddr -= iehdr->e_ehsize;
7322 /* We've subtracted off the size of headers from the
7323 first section lma, but there may have been some
7324 alignment padding before that section too. Try to
7325 account for that by adjusting the segment lma down to
7326 the same alignment. */
7327 if (segment->p_align != 0 && segment->p_align < align)
7328 align = segment->p_align;
7329 map->p_paddr &= -(align * opb);
7330 }
7331 }
7332
7333 /* Step Three: Loop over the sections again, this time assigning
7334 those that fit to the current segment and removing them from the
7335 sections array; but making sure not to leave large gaps. Once all
7336 possible sections have been assigned to the current segment it is
7337 added to the list of built segments and if sections still remain
7338 to be assigned, a new segment is constructed before repeating
7339 the loop. */
7340 isec = 0;
7341 do
7342 {
7343 map->count = 0;
7344 suggested_lma = NULL;
7345
7346 /* Fill the current segment with sections that fit. */
7347 for (j = 0; j < section_count; j++)
7348 {
7349 section = sections[j];
7350
7351 if (section == NULL)
7352 continue;
7353
7354 output_section = section->output_section;
7355
7356 BFD_ASSERT (output_section != NULL);
7357
7358 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7359 opb)
7360 || IS_COREFILE_NOTE (segment, section))
7361 {
7362 if (map->count == 0)
7363 {
7364 /* If the first section in a segment does not start at
7365 the beginning of the segment, then something is
7366 wrong. */
7367 if (align_power (map->p_paddr
7368 + (map->includes_filehdr
7369 ? iehdr->e_ehsize : 0)
7370 + (map->includes_phdrs
7371 ? iehdr->e_phnum * iehdr->e_phentsize
7372 : 0),
7373 output_section->alignment_power * opb)
7374 != output_section->lma * opb)
7375 goto sorry;
7376 }
7377 else
7378 {
7379 asection *prev_sec;
7380
7381 prev_sec = map->sections[map->count - 1];
7382
7383 /* If the gap between the end of the previous section
7384 and the start of this section is more than
7385 maxpagesize then we need to start a new segment. */
7386 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7387 maxpagesize)
7388 < BFD_ALIGN (output_section->lma, maxpagesize))
7389 || (prev_sec->lma + prev_sec->size
7390 > output_section->lma))
7391 {
7392 if (suggested_lma == NULL)
7393 suggested_lma = output_section;
7394
7395 continue;
7396 }
7397 }
7398
7399 map->sections[map->count++] = output_section;
7400 ++isec;
7401 sections[j] = NULL;
7402 if (segment->p_type == PT_LOAD)
7403 section->segment_mark = TRUE;
7404 }
7405 else if (suggested_lma == NULL)
7406 suggested_lma = output_section;
7407 }
7408
7409 /* PR 23932. A corrupt input file may contain sections that cannot
7410 be assigned to any segment - because for example they have a
7411 negative size - or segments that do not contain any sections.
7412 But there are also valid reasons why a segment can be empty.
7413 So allow a count of zero. */
7414
7415 /* Add the current segment to the list of built segments. */
7416 *pointer_to_map = map;
7417 pointer_to_map = &map->next;
7418
7419 if (isec < section_count)
7420 {
7421 /* We still have not allocated all of the sections to
7422 segments. Create a new segment here, initialise it
7423 and carry on looping. */
7424 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7425 amt += section_count * sizeof (asection *);
7426 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7427 if (map == NULL)
7428 {
7429 free (sections);
7430 return FALSE;
7431 }
7432
7433 /* Initialise the fields of the segment map. Set the physical
7434 physical address to the LMA of the first section that has
7435 not yet been assigned. */
7436 map->next = NULL;
7437 map->p_type = segment->p_type;
7438 map->p_flags = segment->p_flags;
7439 map->p_flags_valid = 1;
7440 map->p_paddr = suggested_lma->lma * opb;
7441 map->p_paddr_valid = p_paddr_valid;
7442 map->includes_filehdr = 0;
7443 map->includes_phdrs = 0;
7444 }
7445
7446 continue;
7447 sorry:
7448 bfd_set_error (bfd_error_sorry);
7449 free (sections);
7450 return FALSE;
7451 }
7452 while (isec < section_count);
7453
7454 free (sections);
7455 }
7456
7457 elf_seg_map (obfd) = map_first;
7458
7459 /* If we had to estimate the number of program headers that were
7460 going to be needed, then check our estimate now and adjust
7461 the offset if necessary. */
7462 if (phdr_adjust_seg != NULL)
7463 {
7464 unsigned int count;
7465
7466 for (count = 0, map = map_first; map != NULL; map = map->next)
7467 count++;
7468
7469 if (count > phdr_adjust_num)
7470 phdr_adjust_seg->p_paddr
7471 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7472
7473 for (map = map_first; map != NULL; map = map->next)
7474 if (map->p_type == PT_PHDR)
7475 {
7476 bfd_vma adjust
7477 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7478 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7479 break;
7480 }
7481 }
7482
7483 #undef SEGMENT_END
7484 #undef SECTION_SIZE
7485 #undef IS_CONTAINED_BY_VMA
7486 #undef IS_CONTAINED_BY_LMA
7487 #undef IS_NOTE
7488 #undef IS_COREFILE_NOTE
7489 #undef IS_SOLARIS_PT_INTERP
7490 #undef IS_SECTION_IN_INPUT_SEGMENT
7491 #undef INCLUDE_SECTION_IN_SEGMENT
7492 #undef SEGMENT_AFTER_SEGMENT
7493 #undef SEGMENT_OVERLAPS
7494 return TRUE;
7495 }
7496
7497 /* Copy ELF program header information. */
7498
7499 static bfd_boolean
7500 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7501 {
7502 Elf_Internal_Ehdr *iehdr;
7503 struct elf_segment_map *map;
7504 struct elf_segment_map *map_first;
7505 struct elf_segment_map **pointer_to_map;
7506 Elf_Internal_Phdr *segment;
7507 unsigned int i;
7508 unsigned int num_segments;
7509 bfd_boolean phdr_included = FALSE;
7510 bfd_boolean p_paddr_valid;
7511 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
7512
7513 iehdr = elf_elfheader (ibfd);
7514
7515 map_first = NULL;
7516 pointer_to_map = &map_first;
7517
7518 /* If all the segment p_paddr fields are zero, don't set
7519 map->p_paddr_valid. */
7520 p_paddr_valid = FALSE;
7521 num_segments = elf_elfheader (ibfd)->e_phnum;
7522 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7523 i < num_segments;
7524 i++, segment++)
7525 if (segment->p_paddr != 0)
7526 {
7527 p_paddr_valid = TRUE;
7528 break;
7529 }
7530
7531 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7532 i < num_segments;
7533 i++, segment++)
7534 {
7535 asection *section;
7536 unsigned int section_count;
7537 size_t amt;
7538 Elf_Internal_Shdr *this_hdr;
7539 asection *first_section = NULL;
7540 asection *lowest_section;
7541
7542 /* Compute how many sections are in this segment. */
7543 for (section = ibfd->sections, section_count = 0;
7544 section != NULL;
7545 section = section->next)
7546 {
7547 this_hdr = &(elf_section_data(section)->this_hdr);
7548 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7549 {
7550 if (first_section == NULL)
7551 first_section = section;
7552 section_count++;
7553 }
7554 }
7555
7556 /* Allocate a segment map big enough to contain
7557 all of the sections we have selected. */
7558 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7559 amt += section_count * sizeof (asection *);
7560 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7561 if (map == NULL)
7562 return FALSE;
7563
7564 /* Initialize the fields of the output segment map with the
7565 input segment. */
7566 map->next = NULL;
7567 map->p_type = segment->p_type;
7568 map->p_flags = segment->p_flags;
7569 map->p_flags_valid = 1;
7570 map->p_paddr = segment->p_paddr;
7571 map->p_paddr_valid = p_paddr_valid;
7572 map->p_align = segment->p_align;
7573 map->p_align_valid = 1;
7574 map->p_vaddr_offset = 0;
7575
7576 if (map->p_type == PT_GNU_RELRO
7577 || map->p_type == PT_GNU_STACK)
7578 {
7579 /* The PT_GNU_RELRO segment may contain the first a few
7580 bytes in the .got.plt section even if the whole .got.plt
7581 section isn't in the PT_GNU_RELRO segment. We won't
7582 change the size of the PT_GNU_RELRO segment.
7583 Similarly, PT_GNU_STACK size is significant on uclinux
7584 systems. */
7585 map->p_size = segment->p_memsz;
7586 map->p_size_valid = 1;
7587 }
7588
7589 /* Determine if this segment contains the ELF file header
7590 and if it contains the program headers themselves. */
7591 map->includes_filehdr = (segment->p_offset == 0
7592 && segment->p_filesz >= iehdr->e_ehsize);
7593
7594 map->includes_phdrs = 0;
7595 if (! phdr_included || segment->p_type != PT_LOAD)
7596 {
7597 map->includes_phdrs =
7598 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7599 && (segment->p_offset + segment->p_filesz
7600 >= ((bfd_vma) iehdr->e_phoff
7601 + iehdr->e_phnum * iehdr->e_phentsize)));
7602
7603 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7604 phdr_included = TRUE;
7605 }
7606
7607 lowest_section = NULL;
7608 if (section_count != 0)
7609 {
7610 unsigned int isec = 0;
7611
7612 for (section = first_section;
7613 section != NULL;
7614 section = section->next)
7615 {
7616 this_hdr = &(elf_section_data(section)->this_hdr);
7617 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7618 {
7619 map->sections[isec++] = section->output_section;
7620 if ((section->flags & SEC_ALLOC) != 0)
7621 {
7622 bfd_vma seg_off;
7623
7624 if (lowest_section == NULL
7625 || section->lma < lowest_section->lma)
7626 lowest_section = section;
7627
7628 /* Section lmas are set up from PT_LOAD header
7629 p_paddr in _bfd_elf_make_section_from_shdr.
7630 If this header has a p_paddr that disagrees
7631 with the section lma, flag the p_paddr as
7632 invalid. */
7633 if ((section->flags & SEC_LOAD) != 0)
7634 seg_off = this_hdr->sh_offset - segment->p_offset;
7635 else
7636 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7637 if (section->lma * opb - segment->p_paddr != seg_off)
7638 map->p_paddr_valid = FALSE;
7639 }
7640 if (isec == section_count)
7641 break;
7642 }
7643 }
7644 }
7645
7646 if (section_count == 0)
7647 map->p_vaddr_offset = segment->p_vaddr / opb;
7648 else if (map->p_paddr_valid)
7649 {
7650 /* Account for padding before the first section in the segment. */
7651 bfd_vma hdr_size = 0;
7652 if (map->includes_filehdr)
7653 hdr_size = iehdr->e_ehsize;
7654 if (map->includes_phdrs)
7655 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7656
7657 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7658 - (lowest_section ? lowest_section->lma : 0));
7659 }
7660
7661 map->count = section_count;
7662 *pointer_to_map = map;
7663 pointer_to_map = &map->next;
7664 }
7665
7666 elf_seg_map (obfd) = map_first;
7667 return TRUE;
7668 }
7669
7670 /* Copy private BFD data. This copies or rewrites ELF program header
7671 information. */
7672
7673 static bfd_boolean
7674 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7675 {
7676 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7677 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7678 return TRUE;
7679
7680 if (elf_tdata (ibfd)->phdr == NULL)
7681 return TRUE;
7682
7683 if (ibfd->xvec == obfd->xvec)
7684 {
7685 /* Check to see if any sections in the input BFD
7686 covered by ELF program header have changed. */
7687 Elf_Internal_Phdr *segment;
7688 asection *section, *osec;
7689 unsigned int i, num_segments;
7690 Elf_Internal_Shdr *this_hdr;
7691 const struct elf_backend_data *bed;
7692
7693 bed = get_elf_backend_data (ibfd);
7694
7695 /* Regenerate the segment map if p_paddr is set to 0. */
7696 if (bed->want_p_paddr_set_to_zero)
7697 goto rewrite;
7698
7699 /* Initialize the segment mark field. */
7700 for (section = obfd->sections; section != NULL;
7701 section = section->next)
7702 section->segment_mark = FALSE;
7703
7704 num_segments = elf_elfheader (ibfd)->e_phnum;
7705 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7706 i < num_segments;
7707 i++, segment++)
7708 {
7709 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7710 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7711 which severly confuses things, so always regenerate the segment
7712 map in this case. */
7713 if (segment->p_paddr == 0
7714 && segment->p_memsz == 0
7715 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7716 goto rewrite;
7717
7718 for (section = ibfd->sections;
7719 section != NULL; section = section->next)
7720 {
7721 /* We mark the output section so that we know it comes
7722 from the input BFD. */
7723 osec = section->output_section;
7724 if (osec)
7725 osec->segment_mark = TRUE;
7726
7727 /* Check if this section is covered by the segment. */
7728 this_hdr = &(elf_section_data(section)->this_hdr);
7729 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7730 {
7731 /* FIXME: Check if its output section is changed or
7732 removed. What else do we need to check? */
7733 if (osec == NULL
7734 || section->flags != osec->flags
7735 || section->lma != osec->lma
7736 || section->vma != osec->vma
7737 || section->size != osec->size
7738 || section->rawsize != osec->rawsize
7739 || section->alignment_power != osec->alignment_power)
7740 goto rewrite;
7741 }
7742 }
7743 }
7744
7745 /* Check to see if any output section do not come from the
7746 input BFD. */
7747 for (section = obfd->sections; section != NULL;
7748 section = section->next)
7749 {
7750 if (!section->segment_mark)
7751 goto rewrite;
7752 else
7753 section->segment_mark = FALSE;
7754 }
7755
7756 return copy_elf_program_header (ibfd, obfd);
7757 }
7758
7759 rewrite:
7760 if (ibfd->xvec == obfd->xvec)
7761 {
7762 /* When rewriting program header, set the output maxpagesize to
7763 the maximum alignment of input PT_LOAD segments. */
7764 Elf_Internal_Phdr *segment;
7765 unsigned int i;
7766 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7767 bfd_vma maxpagesize = 0;
7768
7769 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7770 i < num_segments;
7771 i++, segment++)
7772 if (segment->p_type == PT_LOAD
7773 && maxpagesize < segment->p_align)
7774 {
7775 /* PR 17512: file: f17299af. */
7776 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7777 /* xgettext:c-format */
7778 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7779 PRIx64 " is too large"),
7780 ibfd, (uint64_t) segment->p_align);
7781 else
7782 maxpagesize = segment->p_align;
7783 }
7784
7785 if (maxpagesize != get_elf_backend_data (obfd)->maxpagesize)
7786 bfd_emul_set_maxpagesize (bfd_get_target (obfd), maxpagesize);
7787 }
7788
7789 return rewrite_elf_program_header (ibfd, obfd);
7790 }
7791
7792 /* Initialize private output section information from input section. */
7793
7794 bfd_boolean
7795 _bfd_elf_init_private_section_data (bfd *ibfd,
7796 asection *isec,
7797 bfd *obfd,
7798 asection *osec,
7799 struct bfd_link_info *link_info)
7800
7801 {
7802 Elf_Internal_Shdr *ihdr, *ohdr;
7803 bfd_boolean final_link = (link_info != NULL
7804 && !bfd_link_relocatable (link_info));
7805
7806 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7807 || obfd->xvec->flavour != bfd_target_elf_flavour)
7808 return TRUE;
7809
7810 BFD_ASSERT (elf_section_data (osec) != NULL);
7811
7812 /* If this is a known ABI section, ELF section type and flags may
7813 have been set up when OSEC was created. For normal sections we
7814 allow the user to override the type and flags other than
7815 SHF_MASKOS and SHF_MASKPROC. */
7816 if (elf_section_type (osec) == SHT_PROGBITS
7817 || elf_section_type (osec) == SHT_NOTE
7818 || elf_section_type (osec) == SHT_NOBITS)
7819 elf_section_type (osec) = SHT_NULL;
7820 /* For objcopy and relocatable link, copy the ELF section type from
7821 the input file if the BFD section flags are the same. (If they
7822 are different the user may be doing something like
7823 "objcopy --set-section-flags .text=alloc,data".) For a final
7824 link allow some flags that the linker clears to differ. */
7825 if (elf_section_type (osec) == SHT_NULL
7826 && (osec->flags == isec->flags
7827 || (final_link
7828 && ((osec->flags ^ isec->flags)
7829 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7830 elf_section_type (osec) = elf_section_type (isec);
7831
7832 /* FIXME: Is this correct for all OS/PROC specific flags? */
7833 elf_section_flags (osec) = (elf_section_flags (isec)
7834 & (SHF_MASKOS | SHF_MASKPROC));
7835
7836 /* Copy sh_info from input for mbind section. */
7837 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7838 && elf_section_flags (isec) & SHF_GNU_MBIND)
7839 elf_section_data (osec)->this_hdr.sh_info
7840 = elf_section_data (isec)->this_hdr.sh_info;
7841
7842 /* Set things up for objcopy and relocatable link. The output
7843 SHT_GROUP section will have its elf_next_in_group pointing back
7844 to the input group members. Ignore linker created group section.
7845 See elfNN_ia64_object_p in elfxx-ia64.c. */
7846 if ((link_info == NULL
7847 || !link_info->resolve_section_groups)
7848 && (elf_sec_group (isec) == NULL
7849 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7850 {
7851 if (elf_section_flags (isec) & SHF_GROUP)
7852 elf_section_flags (osec) |= SHF_GROUP;
7853 elf_next_in_group (osec) = elf_next_in_group (isec);
7854 elf_section_data (osec)->group = elf_section_data (isec)->group;
7855 }
7856
7857 /* If not decompress, preserve SHF_COMPRESSED. */
7858 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7859 elf_section_flags (osec) |= (elf_section_flags (isec)
7860 & SHF_COMPRESSED);
7861
7862 ihdr = &elf_section_data (isec)->this_hdr;
7863
7864 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7865 don't use the output section of the linked-to section since it
7866 may be NULL at this point. */
7867 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7868 {
7869 ohdr = &elf_section_data (osec)->this_hdr;
7870 ohdr->sh_flags |= SHF_LINK_ORDER;
7871 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7872 }
7873
7874 osec->use_rela_p = isec->use_rela_p;
7875
7876 return TRUE;
7877 }
7878
7879 /* Copy private section information. This copies over the entsize
7880 field, and sometimes the info field. */
7881
7882 bfd_boolean
7883 _bfd_elf_copy_private_section_data (bfd *ibfd,
7884 asection *isec,
7885 bfd *obfd,
7886 asection *osec)
7887 {
7888 Elf_Internal_Shdr *ihdr, *ohdr;
7889
7890 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7891 || obfd->xvec->flavour != bfd_target_elf_flavour)
7892 return TRUE;
7893
7894 ihdr = &elf_section_data (isec)->this_hdr;
7895 ohdr = &elf_section_data (osec)->this_hdr;
7896
7897 ohdr->sh_entsize = ihdr->sh_entsize;
7898
7899 if (ihdr->sh_type == SHT_SYMTAB
7900 || ihdr->sh_type == SHT_DYNSYM
7901 || ihdr->sh_type == SHT_GNU_verneed
7902 || ihdr->sh_type == SHT_GNU_verdef)
7903 ohdr->sh_info = ihdr->sh_info;
7904
7905 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7906 NULL);
7907 }
7908
7909 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7910 necessary if we are removing either the SHT_GROUP section or any of
7911 the group member sections. DISCARDED is the value that a section's
7912 output_section has if the section will be discarded, NULL when this
7913 function is called from objcopy, bfd_abs_section_ptr when called
7914 from the linker. */
7915
7916 bfd_boolean
7917 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7918 {
7919 asection *isec;
7920
7921 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7922 if (elf_section_type (isec) == SHT_GROUP)
7923 {
7924 asection *first = elf_next_in_group (isec);
7925 asection *s = first;
7926 bfd_size_type removed = 0;
7927
7928 while (s != NULL)
7929 {
7930 /* If this member section is being output but the
7931 SHT_GROUP section is not, then clear the group info
7932 set up by _bfd_elf_copy_private_section_data. */
7933 if (s->output_section != discarded
7934 && isec->output_section == discarded)
7935 {
7936 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7937 elf_group_name (s->output_section) = NULL;
7938 }
7939 else
7940 {
7941 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7942 if (s->output_section == discarded
7943 && isec->output_section != discarded)
7944 {
7945 /* Conversely, if the member section is not being
7946 output but the SHT_GROUP section is, then adjust
7947 its size. */
7948 removed += 4;
7949 if (elf_sec->rel.hdr != NULL
7950 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7951 removed += 4;
7952 if (elf_sec->rela.hdr != NULL
7953 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7954 removed += 4;
7955 }
7956 else
7957 {
7958 /* Also adjust for zero-sized relocation member
7959 section. */
7960 if (elf_sec->rel.hdr != NULL
7961 && elf_sec->rel.hdr->sh_size == 0)
7962 removed += 4;
7963 if (elf_sec->rela.hdr != NULL
7964 && elf_sec->rela.hdr->sh_size == 0)
7965 removed += 4;
7966 }
7967 }
7968 s = elf_next_in_group (s);
7969 if (s == first)
7970 break;
7971 }
7972 if (removed != 0)
7973 {
7974 if (discarded != NULL)
7975 {
7976 /* If we've been called for ld -r, then we need to
7977 adjust the input section size. */
7978 if (isec->rawsize == 0)
7979 isec->rawsize = isec->size;
7980 isec->size = isec->rawsize - removed;
7981 if (isec->size <= 4)
7982 {
7983 isec->size = 0;
7984 isec->flags |= SEC_EXCLUDE;
7985 }
7986 }
7987 else
7988 {
7989 /* Adjust the output section size when called from
7990 objcopy. */
7991 isec->output_section->size -= removed;
7992 if (isec->output_section->size <= 4)
7993 {
7994 isec->output_section->size = 0;
7995 isec->output_section->flags |= SEC_EXCLUDE;
7996 }
7997 }
7998 }
7999 }
8000
8001 return TRUE;
8002 }
8003
8004 /* Copy private header information. */
8005
8006 bfd_boolean
8007 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
8008 {
8009 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8010 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8011 return TRUE;
8012
8013 /* Copy over private BFD data if it has not already been copied.
8014 This must be done here, rather than in the copy_private_bfd_data
8015 entry point, because the latter is called after the section
8016 contents have been set, which means that the program headers have
8017 already been worked out. */
8018 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
8019 {
8020 if (! copy_private_bfd_data (ibfd, obfd))
8021 return FALSE;
8022 }
8023
8024 return _bfd_elf_fixup_group_sections (ibfd, NULL);
8025 }
8026
8027 /* Copy private symbol information. If this symbol is in a section
8028 which we did not map into a BFD section, try to map the section
8029 index correctly. We use special macro definitions for the mapped
8030 section indices; these definitions are interpreted by the
8031 swap_out_syms function. */
8032
8033 #define MAP_ONESYMTAB (SHN_HIOS + 1)
8034 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
8035 #define MAP_STRTAB (SHN_HIOS + 3)
8036 #define MAP_SHSTRTAB (SHN_HIOS + 4)
8037 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
8038
8039 bfd_boolean
8040 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
8041 asymbol *isymarg,
8042 bfd *obfd,
8043 asymbol *osymarg)
8044 {
8045 elf_symbol_type *isym, *osym;
8046
8047 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8048 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8049 return TRUE;
8050
8051 isym = elf_symbol_from (ibfd, isymarg);
8052 osym = elf_symbol_from (obfd, osymarg);
8053
8054 if (isym != NULL
8055 && isym->internal_elf_sym.st_shndx != 0
8056 && osym != NULL
8057 && bfd_is_abs_section (isym->symbol.section))
8058 {
8059 unsigned int shndx;
8060
8061 shndx = isym->internal_elf_sym.st_shndx;
8062 if (shndx == elf_onesymtab (ibfd))
8063 shndx = MAP_ONESYMTAB;
8064 else if (shndx == elf_dynsymtab (ibfd))
8065 shndx = MAP_DYNSYMTAB;
8066 else if (shndx == elf_strtab_sec (ibfd))
8067 shndx = MAP_STRTAB;
8068 else if (shndx == elf_shstrtab_sec (ibfd))
8069 shndx = MAP_SHSTRTAB;
8070 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
8071 shndx = MAP_SYM_SHNDX;
8072 osym->internal_elf_sym.st_shndx = shndx;
8073 }
8074
8075 return TRUE;
8076 }
8077
8078 /* Swap out the symbols. */
8079
8080 static bfd_boolean
8081 swap_out_syms (bfd *abfd,
8082 struct elf_strtab_hash **sttp,
8083 int relocatable_p)
8084 {
8085 const struct elf_backend_data *bed;
8086 unsigned int symcount;
8087 asymbol **syms;
8088 struct elf_strtab_hash *stt;
8089 Elf_Internal_Shdr *symtab_hdr;
8090 Elf_Internal_Shdr *symtab_shndx_hdr;
8091 Elf_Internal_Shdr *symstrtab_hdr;
8092 struct elf_sym_strtab *symstrtab;
8093 bfd_byte *outbound_syms;
8094 bfd_byte *outbound_shndx;
8095 unsigned long outbound_syms_index;
8096 unsigned long outbound_shndx_index;
8097 unsigned int idx;
8098 unsigned int num_locals;
8099 size_t amt;
8100 bfd_boolean name_local_sections;
8101
8102 if (!elf_map_symbols (abfd, &num_locals))
8103 return FALSE;
8104
8105 /* Dump out the symtabs. */
8106 stt = _bfd_elf_strtab_init ();
8107 if (stt == NULL)
8108 return FALSE;
8109
8110 bed = get_elf_backend_data (abfd);
8111 symcount = bfd_get_symcount (abfd);
8112 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8113 symtab_hdr->sh_type = SHT_SYMTAB;
8114 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8115 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8116 symtab_hdr->sh_info = num_locals + 1;
8117 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8118
8119 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8120 symstrtab_hdr->sh_type = SHT_STRTAB;
8121
8122 /* Allocate buffer to swap out the .strtab section. */
8123 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8124 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8125 {
8126 bfd_set_error (bfd_error_no_memory);
8127 _bfd_elf_strtab_free (stt);
8128 return FALSE;
8129 }
8130
8131 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8132 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8133 {
8134 error_no_mem:
8135 bfd_set_error (bfd_error_no_memory);
8136 error_return:
8137 free (symstrtab);
8138 _bfd_elf_strtab_free (stt);
8139 return FALSE;
8140 }
8141 symtab_hdr->contents = outbound_syms;
8142 outbound_syms_index = 0;
8143
8144 outbound_shndx = NULL;
8145 outbound_shndx_index = 0;
8146
8147 if (elf_symtab_shndx_list (abfd))
8148 {
8149 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8150 if (symtab_shndx_hdr->sh_name != 0)
8151 {
8152 if (_bfd_mul_overflow (symcount + 1,
8153 sizeof (Elf_External_Sym_Shndx), &amt))
8154 goto error_no_mem;
8155 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8156 if (outbound_shndx == NULL)
8157 goto error_return;
8158
8159 symtab_shndx_hdr->contents = outbound_shndx;
8160 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8161 symtab_shndx_hdr->sh_size = amt;
8162 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8163 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8164 }
8165 /* FIXME: What about any other headers in the list ? */
8166 }
8167
8168 /* Now generate the data (for "contents"). */
8169 {
8170 /* Fill in zeroth symbol and swap it out. */
8171 Elf_Internal_Sym sym;
8172 sym.st_name = 0;
8173 sym.st_value = 0;
8174 sym.st_size = 0;
8175 sym.st_info = 0;
8176 sym.st_other = 0;
8177 sym.st_shndx = SHN_UNDEF;
8178 sym.st_target_internal = 0;
8179 symstrtab[0].sym = sym;
8180 symstrtab[0].dest_index = outbound_syms_index;
8181 symstrtab[0].destshndx_index = outbound_shndx_index;
8182 outbound_syms_index++;
8183 if (outbound_shndx != NULL)
8184 outbound_shndx_index++;
8185 }
8186
8187 name_local_sections
8188 = (bed->elf_backend_name_local_section_symbols
8189 && bed->elf_backend_name_local_section_symbols (abfd));
8190
8191 syms = bfd_get_outsymbols (abfd);
8192 for (idx = 0; idx < symcount;)
8193 {
8194 Elf_Internal_Sym sym;
8195 bfd_vma value = syms[idx]->value;
8196 elf_symbol_type *type_ptr;
8197 flagword flags = syms[idx]->flags;
8198 int type;
8199
8200 if (!name_local_sections
8201 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8202 {
8203 /* Local section symbols have no name. */
8204 sym.st_name = (unsigned long) -1;
8205 }
8206 else
8207 {
8208 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8209 to get the final offset for st_name. */
8210 sym.st_name
8211 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8212 FALSE);
8213 if (sym.st_name == (unsigned long) -1)
8214 goto error_return;
8215 }
8216
8217 type_ptr = elf_symbol_from (abfd, syms[idx]);
8218
8219 if ((flags & BSF_SECTION_SYM) == 0
8220 && bfd_is_com_section (syms[idx]->section))
8221 {
8222 /* ELF common symbols put the alignment into the `value' field,
8223 and the size into the `size' field. This is backwards from
8224 how BFD handles it, so reverse it here. */
8225 sym.st_size = value;
8226 if (type_ptr == NULL
8227 || type_ptr->internal_elf_sym.st_value == 0)
8228 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8229 else
8230 sym.st_value = type_ptr->internal_elf_sym.st_value;
8231 sym.st_shndx = _bfd_elf_section_from_bfd_section
8232 (abfd, syms[idx]->section);
8233 }
8234 else
8235 {
8236 asection *sec = syms[idx]->section;
8237 unsigned int shndx;
8238
8239 if (sec->output_section)
8240 {
8241 value += sec->output_offset;
8242 sec = sec->output_section;
8243 }
8244
8245 /* Don't add in the section vma for relocatable output. */
8246 if (! relocatable_p)
8247 value += sec->vma;
8248 sym.st_value = value;
8249 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8250
8251 if (bfd_is_abs_section (sec)
8252 && type_ptr != NULL
8253 && type_ptr->internal_elf_sym.st_shndx != 0)
8254 {
8255 /* This symbol is in a real ELF section which we did
8256 not create as a BFD section. Undo the mapping done
8257 by copy_private_symbol_data. */
8258 shndx = type_ptr->internal_elf_sym.st_shndx;
8259 switch (shndx)
8260 {
8261 case MAP_ONESYMTAB:
8262 shndx = elf_onesymtab (abfd);
8263 break;
8264 case MAP_DYNSYMTAB:
8265 shndx = elf_dynsymtab (abfd);
8266 break;
8267 case MAP_STRTAB:
8268 shndx = elf_strtab_sec (abfd);
8269 break;
8270 case MAP_SHSTRTAB:
8271 shndx = elf_shstrtab_sec (abfd);
8272 break;
8273 case MAP_SYM_SHNDX:
8274 if (elf_symtab_shndx_list (abfd))
8275 shndx = elf_symtab_shndx_list (abfd)->ndx;
8276 break;
8277 case SHN_COMMON:
8278 case SHN_ABS:
8279 shndx = SHN_ABS;
8280 break;
8281 default:
8282 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8283 {
8284 if (bed->symbol_section_index)
8285 shndx = bed->symbol_section_index (abfd, type_ptr);
8286 /* Otherwise just leave the index alone. */
8287 }
8288 else
8289 {
8290 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8291 _bfd_error_handler (_("%pB: \
8292 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8293 abfd, shndx);
8294 shndx = SHN_ABS;
8295 }
8296 break;
8297 }
8298 }
8299 else
8300 {
8301 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8302
8303 if (shndx == SHN_BAD)
8304 {
8305 asection *sec2;
8306
8307 /* Writing this would be a hell of a lot easier if
8308 we had some decent documentation on bfd, and
8309 knew what to expect of the library, and what to
8310 demand of applications. For example, it
8311 appears that `objcopy' might not set the
8312 section of a symbol to be a section that is
8313 actually in the output file. */
8314 sec2 = bfd_get_section_by_name (abfd, sec->name);
8315 if (sec2 != NULL)
8316 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8317 if (shndx == SHN_BAD)
8318 {
8319 /* xgettext:c-format */
8320 _bfd_error_handler
8321 (_("unable to find equivalent output section"
8322 " for symbol '%s' from section '%s'"),
8323 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8324 sec->name);
8325 bfd_set_error (bfd_error_invalid_operation);
8326 goto error_return;
8327 }
8328 }
8329 }
8330
8331 sym.st_shndx = shndx;
8332 }
8333
8334 if ((flags & BSF_THREAD_LOCAL) != 0)
8335 type = STT_TLS;
8336 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8337 type = STT_GNU_IFUNC;
8338 else if ((flags & BSF_FUNCTION) != 0)
8339 type = STT_FUNC;
8340 else if ((flags & BSF_OBJECT) != 0)
8341 type = STT_OBJECT;
8342 else if ((flags & BSF_RELC) != 0)
8343 type = STT_RELC;
8344 else if ((flags & BSF_SRELC) != 0)
8345 type = STT_SRELC;
8346 else
8347 type = STT_NOTYPE;
8348
8349 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8350 type = STT_TLS;
8351
8352 /* Processor-specific types. */
8353 if (type_ptr != NULL
8354 && bed->elf_backend_get_symbol_type)
8355 type = ((*bed->elf_backend_get_symbol_type)
8356 (&type_ptr->internal_elf_sym, type));
8357
8358 if (flags & BSF_SECTION_SYM)
8359 {
8360 if (flags & BSF_GLOBAL)
8361 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8362 else
8363 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8364 }
8365 else if (bfd_is_com_section (syms[idx]->section))
8366 {
8367 if (type != STT_TLS)
8368 {
8369 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8370 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8371 ? STT_COMMON : STT_OBJECT);
8372 else
8373 type = ((flags & BSF_ELF_COMMON) != 0
8374 ? STT_COMMON : STT_OBJECT);
8375 }
8376 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8377 }
8378 else if (bfd_is_und_section (syms[idx]->section))
8379 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8380 ? STB_WEAK
8381 : STB_GLOBAL),
8382 type);
8383 else if (flags & BSF_FILE)
8384 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8385 else
8386 {
8387 int bind = STB_LOCAL;
8388
8389 if (flags & BSF_LOCAL)
8390 bind = STB_LOCAL;
8391 else if (flags & BSF_GNU_UNIQUE)
8392 bind = STB_GNU_UNIQUE;
8393 else if (flags & BSF_WEAK)
8394 bind = STB_WEAK;
8395 else if (flags & BSF_GLOBAL)
8396 bind = STB_GLOBAL;
8397
8398 sym.st_info = ELF_ST_INFO (bind, type);
8399 }
8400
8401 if (type_ptr != NULL)
8402 {
8403 sym.st_other = type_ptr->internal_elf_sym.st_other;
8404 sym.st_target_internal
8405 = type_ptr->internal_elf_sym.st_target_internal;
8406 }
8407 else
8408 {
8409 sym.st_other = 0;
8410 sym.st_target_internal = 0;
8411 }
8412
8413 idx++;
8414 symstrtab[idx].sym = sym;
8415 symstrtab[idx].dest_index = outbound_syms_index;
8416 symstrtab[idx].destshndx_index = outbound_shndx_index;
8417
8418 outbound_syms_index++;
8419 if (outbound_shndx != NULL)
8420 outbound_shndx_index++;
8421 }
8422
8423 /* Finalize the .strtab section. */
8424 _bfd_elf_strtab_finalize (stt);
8425
8426 /* Swap out the .strtab section. */
8427 for (idx = 0; idx <= symcount; idx++)
8428 {
8429 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8430 if (elfsym->sym.st_name == (unsigned long) -1)
8431 elfsym->sym.st_name = 0;
8432 else
8433 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8434 elfsym->sym.st_name);
8435 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8436 (outbound_syms
8437 + (elfsym->dest_index
8438 * bed->s->sizeof_sym)),
8439 (outbound_shndx
8440 + (elfsym->destshndx_index
8441 * sizeof (Elf_External_Sym_Shndx))));
8442 }
8443 free (symstrtab);
8444
8445 *sttp = stt;
8446 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8447 symstrtab_hdr->sh_type = SHT_STRTAB;
8448 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8449 symstrtab_hdr->sh_addr = 0;
8450 symstrtab_hdr->sh_entsize = 0;
8451 symstrtab_hdr->sh_link = 0;
8452 symstrtab_hdr->sh_info = 0;
8453 symstrtab_hdr->sh_addralign = 1;
8454
8455 return TRUE;
8456 }
8457
8458 /* Return the number of bytes required to hold the symtab vector.
8459
8460 Note that we base it on the count plus 1, since we will null terminate
8461 the vector allocated based on this size. However, the ELF symbol table
8462 always has a dummy entry as symbol #0, so it ends up even. */
8463
8464 long
8465 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8466 {
8467 bfd_size_type symcount;
8468 long symtab_size;
8469 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8470
8471 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8472 if (symcount >= LONG_MAX / sizeof (asymbol *))
8473 {
8474 bfd_set_error (bfd_error_file_too_big);
8475 return -1;
8476 }
8477 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8478 if (symcount > 0)
8479 symtab_size -= sizeof (asymbol *);
8480
8481 return symtab_size;
8482 }
8483
8484 long
8485 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8486 {
8487 bfd_size_type symcount;
8488 long symtab_size;
8489 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8490
8491 if (elf_dynsymtab (abfd) == 0)
8492 {
8493 bfd_set_error (bfd_error_invalid_operation);
8494 return -1;
8495 }
8496
8497 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8498 if (symcount >= LONG_MAX / sizeof (asymbol *))
8499 {
8500 bfd_set_error (bfd_error_file_too_big);
8501 return -1;
8502 }
8503 symtab_size = (symcount + 1) * (sizeof (asymbol *));
8504 if (symcount > 0)
8505 symtab_size -= sizeof (asymbol *);
8506
8507 return symtab_size;
8508 }
8509
8510 long
8511 _bfd_elf_get_reloc_upper_bound (bfd *abfd, sec_ptr asect)
8512 {
8513 if (asect->reloc_count != 0)
8514 {
8515 /* Sanity check reloc section size. */
8516 struct bfd_elf_section_data *d = elf_section_data (asect);
8517 Elf_Internal_Shdr *rel_hdr = &d->this_hdr;
8518 bfd_size_type ext_rel_size = rel_hdr->sh_size;
8519 ufile_ptr filesize = bfd_get_file_size (abfd);
8520
8521 if (filesize != 0 && ext_rel_size > filesize)
8522 {
8523 bfd_set_error (bfd_error_file_truncated);
8524 return -1;
8525 }
8526 }
8527
8528 #if SIZEOF_LONG == SIZEOF_INT
8529 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8530 {
8531 bfd_set_error (bfd_error_file_too_big);
8532 return -1;
8533 }
8534 #endif
8535 return (asect->reloc_count + 1) * sizeof (arelent *);
8536 }
8537
8538 /* Canonicalize the relocs. */
8539
8540 long
8541 _bfd_elf_canonicalize_reloc (bfd *abfd,
8542 sec_ptr section,
8543 arelent **relptr,
8544 asymbol **symbols)
8545 {
8546 arelent *tblptr;
8547 unsigned int i;
8548 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8549
8550 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
8551 return -1;
8552
8553 tblptr = section->relocation;
8554 for (i = 0; i < section->reloc_count; i++)
8555 *relptr++ = tblptr++;
8556
8557 *relptr = NULL;
8558
8559 return section->reloc_count;
8560 }
8561
8562 long
8563 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8564 {
8565 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8566 long symcount = bed->s->slurp_symbol_table (abfd, allocation, FALSE);
8567
8568 if (symcount >= 0)
8569 abfd->symcount = symcount;
8570 return symcount;
8571 }
8572
8573 long
8574 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8575 asymbol **allocation)
8576 {
8577 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8578 long symcount = bed->s->slurp_symbol_table (abfd, allocation, TRUE);
8579
8580 if (symcount >= 0)
8581 abfd->dynsymcount = symcount;
8582 return symcount;
8583 }
8584
8585 /* Return the size required for the dynamic reloc entries. Any loadable
8586 section that was actually installed in the BFD, and has type SHT_REL
8587 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8588 dynamic reloc section. */
8589
8590 long
8591 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8592 {
8593 bfd_size_type count, ext_rel_size;
8594 asection *s;
8595
8596 if (elf_dynsymtab (abfd) == 0)
8597 {
8598 bfd_set_error (bfd_error_invalid_operation);
8599 return -1;
8600 }
8601
8602 count = 1;
8603 ext_rel_size = 0;
8604 for (s = abfd->sections; s != NULL; s = s->next)
8605 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8606 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8607 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8608 {
8609 ext_rel_size += s->size;
8610 if (ext_rel_size < s->size)
8611 {
8612 bfd_set_error (bfd_error_file_truncated);
8613 return -1;
8614 }
8615 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8616 if (count > LONG_MAX / sizeof (arelent *))
8617 {
8618 bfd_set_error (bfd_error_file_too_big);
8619 return -1;
8620 }
8621 }
8622 if (count > 1)
8623 {
8624 /* Sanity check reloc section sizes. */
8625 ufile_ptr filesize = bfd_get_file_size (abfd);
8626 if (filesize != 0 && ext_rel_size > filesize)
8627 {
8628 bfd_set_error (bfd_error_file_truncated);
8629 return -1;
8630 }
8631 }
8632 return count * sizeof (arelent *);
8633 }
8634
8635 /* Canonicalize the dynamic relocation entries. Note that we return the
8636 dynamic relocations as a single block, although they are actually
8637 associated with particular sections; the interface, which was
8638 designed for SunOS style shared libraries, expects that there is only
8639 one set of dynamic relocs. Any loadable section that was actually
8640 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8641 dynamic symbol table, is considered to be a dynamic reloc section. */
8642
8643 long
8644 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8645 arelent **storage,
8646 asymbol **syms)
8647 {
8648 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
8649 asection *s;
8650 long ret;
8651
8652 if (elf_dynsymtab (abfd) == 0)
8653 {
8654 bfd_set_error (bfd_error_invalid_operation);
8655 return -1;
8656 }
8657
8658 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8659 ret = 0;
8660 for (s = abfd->sections; s != NULL; s = s->next)
8661 {
8662 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8663 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8664 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8665 {
8666 arelent *p;
8667 long count, i;
8668
8669 if (! (*slurp_relocs) (abfd, s, syms, TRUE))
8670 return -1;
8671 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8672 p = s->relocation;
8673 for (i = 0; i < count; i++)
8674 *storage++ = p++;
8675 ret += count;
8676 }
8677 }
8678
8679 *storage = NULL;
8680
8681 return ret;
8682 }
8683 \f
8684 /* Read in the version information. */
8685
8686 bfd_boolean
8687 _bfd_elf_slurp_version_tables (bfd *abfd, bfd_boolean default_imported_symver)
8688 {
8689 bfd_byte *contents = NULL;
8690 unsigned int freeidx = 0;
8691 size_t amt;
8692
8693 if (elf_dynverref (abfd) != 0)
8694 {
8695 Elf_Internal_Shdr *hdr;
8696 Elf_External_Verneed *everneed;
8697 Elf_Internal_Verneed *iverneed;
8698 unsigned int i;
8699 bfd_byte *contents_end;
8700
8701 hdr = &elf_tdata (abfd)->dynverref_hdr;
8702
8703 if (hdr->sh_info == 0
8704 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8705 {
8706 error_return_bad_verref:
8707 _bfd_error_handler
8708 (_("%pB: .gnu.version_r invalid entry"), abfd);
8709 bfd_set_error (bfd_error_bad_value);
8710 error_return_verref:
8711 elf_tdata (abfd)->verref = NULL;
8712 elf_tdata (abfd)->cverrefs = 0;
8713 goto error_return;
8714 }
8715
8716 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8717 goto error_return_verref;
8718 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8719 if (contents == NULL)
8720 goto error_return_verref;
8721
8722 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8723 {
8724 bfd_set_error (bfd_error_file_too_big);
8725 goto error_return_verref;
8726 }
8727 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8728 if (elf_tdata (abfd)->verref == NULL)
8729 goto error_return_verref;
8730
8731 BFD_ASSERT (sizeof (Elf_External_Verneed)
8732 == sizeof (Elf_External_Vernaux));
8733 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8734 everneed = (Elf_External_Verneed *) contents;
8735 iverneed = elf_tdata (abfd)->verref;
8736 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8737 {
8738 Elf_External_Vernaux *evernaux;
8739 Elf_Internal_Vernaux *ivernaux;
8740 unsigned int j;
8741
8742 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8743
8744 iverneed->vn_bfd = abfd;
8745
8746 iverneed->vn_filename =
8747 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8748 iverneed->vn_file);
8749 if (iverneed->vn_filename == NULL)
8750 goto error_return_bad_verref;
8751
8752 if (iverneed->vn_cnt == 0)
8753 iverneed->vn_auxptr = NULL;
8754 else
8755 {
8756 if (_bfd_mul_overflow (iverneed->vn_cnt,
8757 sizeof (Elf_Internal_Vernaux), &amt))
8758 {
8759 bfd_set_error (bfd_error_file_too_big);
8760 goto error_return_verref;
8761 }
8762 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8763 bfd_alloc (abfd, amt);
8764 if (iverneed->vn_auxptr == NULL)
8765 goto error_return_verref;
8766 }
8767
8768 if (iverneed->vn_aux
8769 > (size_t) (contents_end - (bfd_byte *) everneed))
8770 goto error_return_bad_verref;
8771
8772 evernaux = ((Elf_External_Vernaux *)
8773 ((bfd_byte *) everneed + iverneed->vn_aux));
8774 ivernaux = iverneed->vn_auxptr;
8775 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8776 {
8777 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8778
8779 ivernaux->vna_nodename =
8780 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8781 ivernaux->vna_name);
8782 if (ivernaux->vna_nodename == NULL)
8783 goto error_return_bad_verref;
8784
8785 if (ivernaux->vna_other > freeidx)
8786 freeidx = ivernaux->vna_other;
8787
8788 ivernaux->vna_nextptr = NULL;
8789 if (ivernaux->vna_next == 0)
8790 {
8791 iverneed->vn_cnt = j + 1;
8792 break;
8793 }
8794 if (j + 1 < iverneed->vn_cnt)
8795 ivernaux->vna_nextptr = ivernaux + 1;
8796
8797 if (ivernaux->vna_next
8798 > (size_t) (contents_end - (bfd_byte *) evernaux))
8799 goto error_return_bad_verref;
8800
8801 evernaux = ((Elf_External_Vernaux *)
8802 ((bfd_byte *) evernaux + ivernaux->vna_next));
8803 }
8804
8805 iverneed->vn_nextref = NULL;
8806 if (iverneed->vn_next == 0)
8807 break;
8808 if (i + 1 < hdr->sh_info)
8809 iverneed->vn_nextref = iverneed + 1;
8810
8811 if (iverneed->vn_next
8812 > (size_t) (contents_end - (bfd_byte *) everneed))
8813 goto error_return_bad_verref;
8814
8815 everneed = ((Elf_External_Verneed *)
8816 ((bfd_byte *) everneed + iverneed->vn_next));
8817 }
8818 elf_tdata (abfd)->cverrefs = i;
8819
8820 free (contents);
8821 contents = NULL;
8822 }
8823
8824 if (elf_dynverdef (abfd) != 0)
8825 {
8826 Elf_Internal_Shdr *hdr;
8827 Elf_External_Verdef *everdef;
8828 Elf_Internal_Verdef *iverdef;
8829 Elf_Internal_Verdef *iverdefarr;
8830 Elf_Internal_Verdef iverdefmem;
8831 unsigned int i;
8832 unsigned int maxidx;
8833 bfd_byte *contents_end_def, *contents_end_aux;
8834
8835 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8836
8837 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8838 {
8839 error_return_bad_verdef:
8840 _bfd_error_handler
8841 (_("%pB: .gnu.version_d invalid entry"), abfd);
8842 bfd_set_error (bfd_error_bad_value);
8843 error_return_verdef:
8844 elf_tdata (abfd)->verdef = NULL;
8845 elf_tdata (abfd)->cverdefs = 0;
8846 goto error_return;
8847 }
8848
8849 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8850 goto error_return_verdef;
8851 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8852 if (contents == NULL)
8853 goto error_return_verdef;
8854
8855 BFD_ASSERT (sizeof (Elf_External_Verdef)
8856 >= sizeof (Elf_External_Verdaux));
8857 contents_end_def = contents + hdr->sh_size
8858 - sizeof (Elf_External_Verdef);
8859 contents_end_aux = contents + hdr->sh_size
8860 - sizeof (Elf_External_Verdaux);
8861
8862 /* We know the number of entries in the section but not the maximum
8863 index. Therefore we have to run through all entries and find
8864 the maximum. */
8865 everdef = (Elf_External_Verdef *) contents;
8866 maxidx = 0;
8867 for (i = 0; i < hdr->sh_info; ++i)
8868 {
8869 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8870
8871 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8872 goto error_return_bad_verdef;
8873 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8874 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8875
8876 if (iverdefmem.vd_next == 0)
8877 break;
8878
8879 if (iverdefmem.vd_next
8880 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8881 goto error_return_bad_verdef;
8882
8883 everdef = ((Elf_External_Verdef *)
8884 ((bfd_byte *) everdef + iverdefmem.vd_next));
8885 }
8886
8887 if (default_imported_symver)
8888 {
8889 if (freeidx > maxidx)
8890 maxidx = ++freeidx;
8891 else
8892 freeidx = ++maxidx;
8893 }
8894 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8895 {
8896 bfd_set_error (bfd_error_file_too_big);
8897 goto error_return_verdef;
8898 }
8899 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8900 if (elf_tdata (abfd)->verdef == NULL)
8901 goto error_return_verdef;
8902
8903 elf_tdata (abfd)->cverdefs = maxidx;
8904
8905 everdef = (Elf_External_Verdef *) contents;
8906 iverdefarr = elf_tdata (abfd)->verdef;
8907 for (i = 0; i < hdr->sh_info; i++)
8908 {
8909 Elf_External_Verdaux *everdaux;
8910 Elf_Internal_Verdaux *iverdaux;
8911 unsigned int j;
8912
8913 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8914
8915 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8916 goto error_return_bad_verdef;
8917
8918 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8919 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8920
8921 iverdef->vd_bfd = abfd;
8922
8923 if (iverdef->vd_cnt == 0)
8924 iverdef->vd_auxptr = NULL;
8925 else
8926 {
8927 if (_bfd_mul_overflow (iverdef->vd_cnt,
8928 sizeof (Elf_Internal_Verdaux), &amt))
8929 {
8930 bfd_set_error (bfd_error_file_too_big);
8931 goto error_return_verdef;
8932 }
8933 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8934 bfd_alloc (abfd, amt);
8935 if (iverdef->vd_auxptr == NULL)
8936 goto error_return_verdef;
8937 }
8938
8939 if (iverdef->vd_aux
8940 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8941 goto error_return_bad_verdef;
8942
8943 everdaux = ((Elf_External_Verdaux *)
8944 ((bfd_byte *) everdef + iverdef->vd_aux));
8945 iverdaux = iverdef->vd_auxptr;
8946 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8947 {
8948 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8949
8950 iverdaux->vda_nodename =
8951 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8952 iverdaux->vda_name);
8953 if (iverdaux->vda_nodename == NULL)
8954 goto error_return_bad_verdef;
8955
8956 iverdaux->vda_nextptr = NULL;
8957 if (iverdaux->vda_next == 0)
8958 {
8959 iverdef->vd_cnt = j + 1;
8960 break;
8961 }
8962 if (j + 1 < iverdef->vd_cnt)
8963 iverdaux->vda_nextptr = iverdaux + 1;
8964
8965 if (iverdaux->vda_next
8966 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
8967 goto error_return_bad_verdef;
8968
8969 everdaux = ((Elf_External_Verdaux *)
8970 ((bfd_byte *) everdaux + iverdaux->vda_next));
8971 }
8972
8973 iverdef->vd_nodename = NULL;
8974 if (iverdef->vd_cnt)
8975 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
8976
8977 iverdef->vd_nextdef = NULL;
8978 if (iverdef->vd_next == 0)
8979 break;
8980 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
8981 iverdef->vd_nextdef = iverdef + 1;
8982
8983 everdef = ((Elf_External_Verdef *)
8984 ((bfd_byte *) everdef + iverdef->vd_next));
8985 }
8986
8987 free (contents);
8988 contents = NULL;
8989 }
8990 else if (default_imported_symver)
8991 {
8992 if (freeidx < 3)
8993 freeidx = 3;
8994 else
8995 freeidx++;
8996
8997 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
8998 {
8999 bfd_set_error (bfd_error_file_too_big);
9000 goto error_return;
9001 }
9002 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
9003 if (elf_tdata (abfd)->verdef == NULL)
9004 goto error_return;
9005
9006 elf_tdata (abfd)->cverdefs = freeidx;
9007 }
9008
9009 /* Create a default version based on the soname. */
9010 if (default_imported_symver)
9011 {
9012 Elf_Internal_Verdef *iverdef;
9013 Elf_Internal_Verdaux *iverdaux;
9014
9015 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
9016
9017 iverdef->vd_version = VER_DEF_CURRENT;
9018 iverdef->vd_flags = 0;
9019 iverdef->vd_ndx = freeidx;
9020 iverdef->vd_cnt = 1;
9021
9022 iverdef->vd_bfd = abfd;
9023
9024 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
9025 if (iverdef->vd_nodename == NULL)
9026 goto error_return_verdef;
9027 iverdef->vd_nextdef = NULL;
9028 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
9029 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
9030 if (iverdef->vd_auxptr == NULL)
9031 goto error_return_verdef;
9032
9033 iverdaux = iverdef->vd_auxptr;
9034 iverdaux->vda_nodename = iverdef->vd_nodename;
9035 }
9036
9037 return TRUE;
9038
9039 error_return:
9040 if (contents != NULL)
9041 free (contents);
9042 return FALSE;
9043 }
9044 \f
9045 asymbol *
9046 _bfd_elf_make_empty_symbol (bfd *abfd)
9047 {
9048 elf_symbol_type *newsym;
9049
9050 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
9051 if (!newsym)
9052 return NULL;
9053 newsym->symbol.the_bfd = abfd;
9054 return &newsym->symbol;
9055 }
9056
9057 void
9058 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
9059 asymbol *symbol,
9060 symbol_info *ret)
9061 {
9062 bfd_symbol_info (symbol, ret);
9063 }
9064
9065 /* Return whether a symbol name implies a local symbol. Most targets
9066 use this function for the is_local_label_name entry point, but some
9067 override it. */
9068
9069 bfd_boolean
9070 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
9071 const char *name)
9072 {
9073 /* Normal local symbols start with ``.L''. */
9074 if (name[0] == '.' && name[1] == 'L')
9075 return TRUE;
9076
9077 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9078 DWARF debugging symbols starting with ``..''. */
9079 if (name[0] == '.' && name[1] == '.')
9080 return TRUE;
9081
9082 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9083 emitting DWARF debugging output. I suspect this is actually a
9084 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9085 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9086 underscore to be emitted on some ELF targets). For ease of use,
9087 we treat such symbols as local. */
9088 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
9089 return TRUE;
9090
9091 /* Treat assembler generated fake symbols, dollar local labels and
9092 forward-backward labels (aka local labels) as locals.
9093 These labels have the form:
9094
9095 L0^A.* (fake symbols)
9096
9097 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9098
9099 Versions which start with .L will have already been matched above,
9100 so we only need to match the rest. */
9101 if (name[0] == 'L' && ISDIGIT (name[1]))
9102 {
9103 bfd_boolean ret = FALSE;
9104 const char * p;
9105 char c;
9106
9107 for (p = name + 2; (c = *p); p++)
9108 {
9109 if (c == 1 || c == 2)
9110 {
9111 if (c == 1 && p == name + 2)
9112 /* A fake symbol. */
9113 return TRUE;
9114
9115 /* FIXME: We are being paranoid here and treating symbols like
9116 L0^Bfoo as if there were non-local, on the grounds that the
9117 assembler will never generate them. But can any symbol
9118 containing an ASCII value in the range 1-31 ever be anything
9119 other than some kind of local ? */
9120 ret = TRUE;
9121 }
9122
9123 if (! ISDIGIT (c))
9124 {
9125 ret = FALSE;
9126 break;
9127 }
9128 }
9129 return ret;
9130 }
9131
9132 return FALSE;
9133 }
9134
9135 alent *
9136 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9137 asymbol *symbol ATTRIBUTE_UNUSED)
9138 {
9139 abort ();
9140 return NULL;
9141 }
9142
9143 bfd_boolean
9144 _bfd_elf_set_arch_mach (bfd *abfd,
9145 enum bfd_architecture arch,
9146 unsigned long machine)
9147 {
9148 /* If this isn't the right architecture for this backend, and this
9149 isn't the generic backend, fail. */
9150 if (arch != get_elf_backend_data (abfd)->arch
9151 && arch != bfd_arch_unknown
9152 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9153 return FALSE;
9154
9155 return bfd_default_set_arch_mach (abfd, arch, machine);
9156 }
9157
9158 /* Find the nearest line to a particular section and offset,
9159 for error reporting. */
9160
9161 bfd_boolean
9162 _bfd_elf_find_nearest_line (bfd *abfd,
9163 asymbol **symbols,
9164 asection *section,
9165 bfd_vma offset,
9166 const char **filename_ptr,
9167 const char **functionname_ptr,
9168 unsigned int *line_ptr,
9169 unsigned int *discriminator_ptr)
9170 {
9171 bfd_boolean found;
9172
9173 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9174 filename_ptr, functionname_ptr,
9175 line_ptr, discriminator_ptr,
9176 dwarf_debug_sections,
9177 &elf_tdata (abfd)->dwarf2_find_line_info))
9178 return TRUE;
9179
9180 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9181 filename_ptr, functionname_ptr, line_ptr))
9182 {
9183 if (!*functionname_ptr)
9184 _bfd_elf_find_function (abfd, symbols, section, offset,
9185 *filename_ptr ? NULL : filename_ptr,
9186 functionname_ptr);
9187 return TRUE;
9188 }
9189
9190 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9191 &found, filename_ptr,
9192 functionname_ptr, line_ptr,
9193 &elf_tdata (abfd)->line_info))
9194 return FALSE;
9195 if (found && (*functionname_ptr || *line_ptr))
9196 return TRUE;
9197
9198 if (symbols == NULL)
9199 return FALSE;
9200
9201 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9202 filename_ptr, functionname_ptr))
9203 return FALSE;
9204
9205 *line_ptr = 0;
9206 return TRUE;
9207 }
9208
9209 /* Find the line for a symbol. */
9210
9211 bfd_boolean
9212 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9213 const char **filename_ptr, unsigned int *line_ptr)
9214 {
9215 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9216 filename_ptr, NULL, line_ptr, NULL,
9217 dwarf_debug_sections,
9218 &elf_tdata (abfd)->dwarf2_find_line_info);
9219 }
9220
9221 /* After a call to bfd_find_nearest_line, successive calls to
9222 bfd_find_inliner_info can be used to get source information about
9223 each level of function inlining that terminated at the address
9224 passed to bfd_find_nearest_line. Currently this is only supported
9225 for DWARF2 with appropriate DWARF3 extensions. */
9226
9227 bfd_boolean
9228 _bfd_elf_find_inliner_info (bfd *abfd,
9229 const char **filename_ptr,
9230 const char **functionname_ptr,
9231 unsigned int *line_ptr)
9232 {
9233 bfd_boolean found;
9234 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9235 functionname_ptr, line_ptr,
9236 & elf_tdata (abfd)->dwarf2_find_line_info);
9237 return found;
9238 }
9239
9240 int
9241 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9242 {
9243 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9244 int ret = bed->s->sizeof_ehdr;
9245
9246 if (!bfd_link_relocatable (info))
9247 {
9248 bfd_size_type phdr_size = elf_program_header_size (abfd);
9249
9250 if (phdr_size == (bfd_size_type) -1)
9251 {
9252 struct elf_segment_map *m;
9253
9254 phdr_size = 0;
9255 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9256 phdr_size += bed->s->sizeof_phdr;
9257
9258 if (phdr_size == 0)
9259 phdr_size = get_program_header_size (abfd, info);
9260 }
9261
9262 elf_program_header_size (abfd) = phdr_size;
9263 ret += phdr_size;
9264 }
9265
9266 return ret;
9267 }
9268
9269 bfd_boolean
9270 _bfd_elf_set_section_contents (bfd *abfd,
9271 sec_ptr section,
9272 const void *location,
9273 file_ptr offset,
9274 bfd_size_type count)
9275 {
9276 Elf_Internal_Shdr *hdr;
9277 file_ptr pos;
9278
9279 if (! abfd->output_has_begun
9280 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9281 return FALSE;
9282
9283 if (!count)
9284 return TRUE;
9285
9286 hdr = &elf_section_data (section)->this_hdr;
9287 if (hdr->sh_offset == (file_ptr) -1)
9288 {
9289 unsigned char *contents;
9290
9291 if (bfd_section_is_ctf (section))
9292 /* Nothing to do with this section: the contents are generated
9293 later. */
9294 return TRUE;
9295
9296 if ((section->flags & SEC_ELF_COMPRESS) == 0)
9297 {
9298 _bfd_error_handler
9299 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9300 abfd, section);
9301 bfd_set_error (bfd_error_invalid_operation);
9302 return FALSE;
9303 }
9304
9305 if ((offset + count) > hdr->sh_size)
9306 {
9307 _bfd_error_handler
9308 (_("%pB:%pA: error: attempting to write over the end of the section"),
9309 abfd, section);
9310
9311 bfd_set_error (bfd_error_invalid_operation);
9312 return FALSE;
9313 }
9314
9315 contents = hdr->contents;
9316 if (contents == NULL)
9317 {
9318 _bfd_error_handler
9319 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9320 abfd, section);
9321
9322 bfd_set_error (bfd_error_invalid_operation);
9323 return FALSE;
9324 }
9325
9326 memcpy (contents + offset, location, count);
9327 return TRUE;
9328 }
9329
9330 pos = hdr->sh_offset + offset;
9331 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9332 || bfd_bwrite (location, count, abfd) != count)
9333 return FALSE;
9334
9335 return TRUE;
9336 }
9337
9338 bfd_boolean
9339 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9340 arelent *cache_ptr ATTRIBUTE_UNUSED,
9341 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9342 {
9343 abort ();
9344 return FALSE;
9345 }
9346
9347 /* Try to convert a non-ELF reloc into an ELF one. */
9348
9349 bfd_boolean
9350 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9351 {
9352 /* Check whether we really have an ELF howto. */
9353
9354 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9355 {
9356 bfd_reloc_code_real_type code;
9357 reloc_howto_type *howto;
9358
9359 /* Alien reloc: Try to determine its type to replace it with an
9360 equivalent ELF reloc. */
9361
9362 if (areloc->howto->pc_relative)
9363 {
9364 switch (areloc->howto->bitsize)
9365 {
9366 case 8:
9367 code = BFD_RELOC_8_PCREL;
9368 break;
9369 case 12:
9370 code = BFD_RELOC_12_PCREL;
9371 break;
9372 case 16:
9373 code = BFD_RELOC_16_PCREL;
9374 break;
9375 case 24:
9376 code = BFD_RELOC_24_PCREL;
9377 break;
9378 case 32:
9379 code = BFD_RELOC_32_PCREL;
9380 break;
9381 case 64:
9382 code = BFD_RELOC_64_PCREL;
9383 break;
9384 default:
9385 goto fail;
9386 }
9387
9388 howto = bfd_reloc_type_lookup (abfd, code);
9389
9390 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9391 {
9392 if (howto->pcrel_offset)
9393 areloc->addend += areloc->address;
9394 else
9395 areloc->addend -= areloc->address; /* addend is unsigned!! */
9396 }
9397 }
9398 else
9399 {
9400 switch (areloc->howto->bitsize)
9401 {
9402 case 8:
9403 code = BFD_RELOC_8;
9404 break;
9405 case 14:
9406 code = BFD_RELOC_14;
9407 break;
9408 case 16:
9409 code = BFD_RELOC_16;
9410 break;
9411 case 26:
9412 code = BFD_RELOC_26;
9413 break;
9414 case 32:
9415 code = BFD_RELOC_32;
9416 break;
9417 case 64:
9418 code = BFD_RELOC_64;
9419 break;
9420 default:
9421 goto fail;
9422 }
9423
9424 howto = bfd_reloc_type_lookup (abfd, code);
9425 }
9426
9427 if (howto)
9428 areloc->howto = howto;
9429 else
9430 goto fail;
9431 }
9432
9433 return TRUE;
9434
9435 fail:
9436 /* xgettext:c-format */
9437 _bfd_error_handler (_("%pB: %s unsupported"),
9438 abfd, areloc->howto->name);
9439 bfd_set_error (bfd_error_sorry);
9440 return FALSE;
9441 }
9442
9443 bfd_boolean
9444 _bfd_elf_close_and_cleanup (bfd *abfd)
9445 {
9446 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9447 if (bfd_get_format (abfd) == bfd_object && tdata != NULL)
9448 {
9449 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9450 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9451 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9452 }
9453
9454 return _bfd_generic_close_and_cleanup (abfd);
9455 }
9456
9457 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9458 in the relocation's offset. Thus we cannot allow any sort of sanity
9459 range-checking to interfere. There is nothing else to do in processing
9460 this reloc. */
9461
9462 bfd_reloc_status_type
9463 _bfd_elf_rel_vtable_reloc_fn
9464 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9465 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9466 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9467 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9468 {
9469 return bfd_reloc_ok;
9470 }
9471 \f
9472 /* Elf core file support. Much of this only works on native
9473 toolchains, since we rely on knowing the
9474 machine-dependent procfs structure in order to pick
9475 out details about the corefile. */
9476
9477 #ifdef HAVE_SYS_PROCFS_H
9478 /* Needed for new procfs interface on sparc-solaris. */
9479 # define _STRUCTURED_PROC 1
9480 # include <sys/procfs.h>
9481 #endif
9482
9483 /* Return a PID that identifies a "thread" for threaded cores, or the
9484 PID of the main process for non-threaded cores. */
9485
9486 static int
9487 elfcore_make_pid (bfd *abfd)
9488 {
9489 int pid;
9490
9491 pid = elf_tdata (abfd)->core->lwpid;
9492 if (pid == 0)
9493 pid = elf_tdata (abfd)->core->pid;
9494
9495 return pid;
9496 }
9497
9498 /* If there isn't a section called NAME, make one, using
9499 data from SECT. Note, this function will generate a
9500 reference to NAME, so you shouldn't deallocate or
9501 overwrite it. */
9502
9503 static bfd_boolean
9504 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9505 {
9506 asection *sect2;
9507
9508 if (bfd_get_section_by_name (abfd, name) != NULL)
9509 return TRUE;
9510
9511 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9512 if (sect2 == NULL)
9513 return FALSE;
9514
9515 sect2->size = sect->size;
9516 sect2->filepos = sect->filepos;
9517 sect2->alignment_power = sect->alignment_power;
9518 return TRUE;
9519 }
9520
9521 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9522 actually creates up to two pseudosections:
9523 - For the single-threaded case, a section named NAME, unless
9524 such a section already exists.
9525 - For the multi-threaded case, a section named "NAME/PID", where
9526 PID is elfcore_make_pid (abfd).
9527 Both pseudosections have identical contents. */
9528 bfd_boolean
9529 _bfd_elfcore_make_pseudosection (bfd *abfd,
9530 char *name,
9531 size_t size,
9532 ufile_ptr filepos)
9533 {
9534 char buf[100];
9535 char *threaded_name;
9536 size_t len;
9537 asection *sect;
9538
9539 /* Build the section name. */
9540
9541 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9542 len = strlen (buf) + 1;
9543 threaded_name = (char *) bfd_alloc (abfd, len);
9544 if (threaded_name == NULL)
9545 return FALSE;
9546 memcpy (threaded_name, buf, len);
9547
9548 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9549 SEC_HAS_CONTENTS);
9550 if (sect == NULL)
9551 return FALSE;
9552 sect->size = size;
9553 sect->filepos = filepos;
9554 sect->alignment_power = 2;
9555
9556 return elfcore_maybe_make_sect (abfd, name, sect);
9557 }
9558
9559 static bfd_boolean
9560 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9561 size_t offs)
9562 {
9563 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9564 SEC_HAS_CONTENTS);
9565
9566 if (sect == NULL)
9567 return FALSE;
9568
9569 sect->size = note->descsz - offs;
9570 sect->filepos = note->descpos + offs;
9571 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9572
9573 return TRUE;
9574 }
9575
9576 /* prstatus_t exists on:
9577 solaris 2.5+
9578 linux 2.[01] + glibc
9579 unixware 4.2
9580 */
9581
9582 #if defined (HAVE_PRSTATUS_T)
9583
9584 static bfd_boolean
9585 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9586 {
9587 size_t size;
9588 int offset;
9589
9590 if (note->descsz == sizeof (prstatus_t))
9591 {
9592 prstatus_t prstat;
9593
9594 size = sizeof (prstat.pr_reg);
9595 offset = offsetof (prstatus_t, pr_reg);
9596 memcpy (&prstat, note->descdata, sizeof (prstat));
9597
9598 /* Do not overwrite the core signal if it
9599 has already been set by another thread. */
9600 if (elf_tdata (abfd)->core->signal == 0)
9601 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9602 if (elf_tdata (abfd)->core->pid == 0)
9603 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9604
9605 /* pr_who exists on:
9606 solaris 2.5+
9607 unixware 4.2
9608 pr_who doesn't exist on:
9609 linux 2.[01]
9610 */
9611 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9612 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9613 #else
9614 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9615 #endif
9616 }
9617 #if defined (HAVE_PRSTATUS32_T)
9618 else if (note->descsz == sizeof (prstatus32_t))
9619 {
9620 /* 64-bit host, 32-bit corefile */
9621 prstatus32_t prstat;
9622
9623 size = sizeof (prstat.pr_reg);
9624 offset = offsetof (prstatus32_t, pr_reg);
9625 memcpy (&prstat, note->descdata, sizeof (prstat));
9626
9627 /* Do not overwrite the core signal if it
9628 has already been set by another thread. */
9629 if (elf_tdata (abfd)->core->signal == 0)
9630 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9631 if (elf_tdata (abfd)->core->pid == 0)
9632 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9633
9634 /* pr_who exists on:
9635 solaris 2.5+
9636 unixware 4.2
9637 pr_who doesn't exist on:
9638 linux 2.[01]
9639 */
9640 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9641 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9642 #else
9643 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9644 #endif
9645 }
9646 #endif /* HAVE_PRSTATUS32_T */
9647 else
9648 {
9649 /* Fail - we don't know how to handle any other
9650 note size (ie. data object type). */
9651 return TRUE;
9652 }
9653
9654 /* Make a ".reg/999" section and a ".reg" section. */
9655 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9656 size, note->descpos + offset);
9657 }
9658 #endif /* defined (HAVE_PRSTATUS_T) */
9659
9660 /* Create a pseudosection containing the exact contents of NOTE. */
9661 static bfd_boolean
9662 elfcore_make_note_pseudosection (bfd *abfd,
9663 char *name,
9664 Elf_Internal_Note *note)
9665 {
9666 return _bfd_elfcore_make_pseudosection (abfd, name,
9667 note->descsz, note->descpos);
9668 }
9669
9670 /* There isn't a consistent prfpregset_t across platforms,
9671 but it doesn't matter, because we don't have to pick this
9672 data structure apart. */
9673
9674 static bfd_boolean
9675 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9676 {
9677 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9678 }
9679
9680 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9681 type of NT_PRXFPREG. Just include the whole note's contents
9682 literally. */
9683
9684 static bfd_boolean
9685 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9686 {
9687 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9688 }
9689
9690 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9691 with a note type of NT_X86_XSTATE. Just include the whole note's
9692 contents literally. */
9693
9694 static bfd_boolean
9695 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9696 {
9697 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9698 }
9699
9700 static bfd_boolean
9701 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9702 {
9703 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9704 }
9705
9706 static bfd_boolean
9707 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9708 {
9709 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9710 }
9711
9712 static bfd_boolean
9713 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9714 {
9715 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9716 }
9717
9718 static bfd_boolean
9719 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9720 {
9721 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9722 }
9723
9724 static bfd_boolean
9725 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9726 {
9727 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9728 }
9729
9730 static bfd_boolean
9731 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9732 {
9733 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9734 }
9735
9736 static bfd_boolean
9737 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9738 {
9739 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9740 }
9741
9742 static bfd_boolean
9743 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9744 {
9745 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9746 }
9747
9748 static bfd_boolean
9749 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9750 {
9751 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9752 }
9753
9754 static bfd_boolean
9755 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9756 {
9757 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9758 }
9759
9760 static bfd_boolean
9761 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9762 {
9763 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9764 }
9765
9766 static bfd_boolean
9767 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9768 {
9769 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9770 }
9771
9772 static bfd_boolean
9773 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9774 {
9775 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9776 }
9777
9778 static bfd_boolean
9779 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9780 {
9781 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9782 }
9783
9784 static bfd_boolean
9785 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9786 {
9787 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9788 }
9789
9790 static bfd_boolean
9791 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9792 {
9793 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9794 }
9795
9796 static bfd_boolean
9797 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9798 {
9799 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9800 }
9801
9802 static bfd_boolean
9803 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9804 {
9805 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9806 }
9807
9808 static bfd_boolean
9809 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9810 {
9811 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9812 }
9813
9814 static bfd_boolean
9815 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9816 {
9817 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9818 }
9819
9820 static bfd_boolean
9821 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9822 {
9823 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9824 }
9825
9826 static bfd_boolean
9827 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9828 {
9829 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9830 }
9831
9832 static bfd_boolean
9833 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9834 {
9835 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9836 }
9837
9838 static bfd_boolean
9839 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9840 {
9841 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9842 }
9843
9844 static bfd_boolean
9845 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9846 {
9847 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9848 }
9849
9850 static bfd_boolean
9851 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9852 {
9853 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9854 }
9855
9856 static bfd_boolean
9857 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9858 {
9859 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9860 }
9861
9862 static bfd_boolean
9863 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9864 {
9865 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9866 }
9867
9868 static bfd_boolean
9869 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9870 {
9871 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9872 }
9873
9874 static bfd_boolean
9875 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9876 {
9877 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9878 }
9879
9880 static bfd_boolean
9881 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9882 {
9883 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9884 }
9885
9886 static bfd_boolean
9887 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9888 {
9889 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9890 }
9891
9892 static bfd_boolean
9893 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9894 {
9895 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9896 }
9897
9898 static bfd_boolean
9899 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9900 {
9901 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9902 }
9903
9904 static bfd_boolean
9905 elfcore_grok_arc_v2 (bfd *abfd, Elf_Internal_Note *note)
9906 {
9907 return elfcore_make_note_pseudosection (abfd, ".reg-arc-v2", note);
9908 }
9909
9910 #if defined (HAVE_PRPSINFO_T)
9911 typedef prpsinfo_t elfcore_psinfo_t;
9912 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9913 typedef prpsinfo32_t elfcore_psinfo32_t;
9914 #endif
9915 #endif
9916
9917 #if defined (HAVE_PSINFO_T)
9918 typedef psinfo_t elfcore_psinfo_t;
9919 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
9920 typedef psinfo32_t elfcore_psinfo32_t;
9921 #endif
9922 #endif
9923
9924 /* return a malloc'ed copy of a string at START which is at
9925 most MAX bytes long, possibly without a terminating '\0'.
9926 the copy will always have a terminating '\0'. */
9927
9928 char *
9929 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
9930 {
9931 char *dups;
9932 char *end = (char *) memchr (start, '\0', max);
9933 size_t len;
9934
9935 if (end == NULL)
9936 len = max;
9937 else
9938 len = end - start;
9939
9940 dups = (char *) bfd_alloc (abfd, len + 1);
9941 if (dups == NULL)
9942 return NULL;
9943
9944 memcpy (dups, start, len);
9945 dups[len] = '\0';
9946
9947 return dups;
9948 }
9949
9950 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
9951 static bfd_boolean
9952 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
9953 {
9954 if (note->descsz == sizeof (elfcore_psinfo_t))
9955 {
9956 elfcore_psinfo_t psinfo;
9957
9958 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9959
9960 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
9961 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9962 #endif
9963 elf_tdata (abfd)->core->program
9964 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9965 sizeof (psinfo.pr_fname));
9966
9967 elf_tdata (abfd)->core->command
9968 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9969 sizeof (psinfo.pr_psargs));
9970 }
9971 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
9972 else if (note->descsz == sizeof (elfcore_psinfo32_t))
9973 {
9974 /* 64-bit host, 32-bit corefile */
9975 elfcore_psinfo32_t psinfo;
9976
9977 memcpy (&psinfo, note->descdata, sizeof (psinfo));
9978
9979 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
9980 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
9981 #endif
9982 elf_tdata (abfd)->core->program
9983 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
9984 sizeof (psinfo.pr_fname));
9985
9986 elf_tdata (abfd)->core->command
9987 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
9988 sizeof (psinfo.pr_psargs));
9989 }
9990 #endif
9991
9992 else
9993 {
9994 /* Fail - we don't know how to handle any other
9995 note size (ie. data object type). */
9996 return TRUE;
9997 }
9998
9999 /* Note that for some reason, a spurious space is tacked
10000 onto the end of the args in some (at least one anyway)
10001 implementations, so strip it off if it exists. */
10002
10003 {
10004 char *command = elf_tdata (abfd)->core->command;
10005 int n = strlen (command);
10006
10007 if (0 < n && command[n - 1] == ' ')
10008 command[n - 1] = '\0';
10009 }
10010
10011 return TRUE;
10012 }
10013 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
10014
10015 #if defined (HAVE_PSTATUS_T)
10016 static bfd_boolean
10017 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
10018 {
10019 if (note->descsz == sizeof (pstatus_t)
10020 #if defined (HAVE_PXSTATUS_T)
10021 || note->descsz == sizeof (pxstatus_t)
10022 #endif
10023 )
10024 {
10025 pstatus_t pstat;
10026
10027 memcpy (&pstat, note->descdata, sizeof (pstat));
10028
10029 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10030 }
10031 #if defined (HAVE_PSTATUS32_T)
10032 else if (note->descsz == sizeof (pstatus32_t))
10033 {
10034 /* 64-bit host, 32-bit corefile */
10035 pstatus32_t pstat;
10036
10037 memcpy (&pstat, note->descdata, sizeof (pstat));
10038
10039 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10040 }
10041 #endif
10042 /* Could grab some more details from the "representative"
10043 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
10044 NT_LWPSTATUS note, presumably. */
10045
10046 return TRUE;
10047 }
10048 #endif /* defined (HAVE_PSTATUS_T) */
10049
10050 #if defined (HAVE_LWPSTATUS_T)
10051 static bfd_boolean
10052 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
10053 {
10054 lwpstatus_t lwpstat;
10055 char buf[100];
10056 char *name;
10057 size_t len;
10058 asection *sect;
10059
10060 if (note->descsz != sizeof (lwpstat)
10061 #if defined (HAVE_LWPXSTATUS_T)
10062 && note->descsz != sizeof (lwpxstatus_t)
10063 #endif
10064 )
10065 return TRUE;
10066
10067 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
10068
10069 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
10070 /* Do not overwrite the core signal if it has already been set by
10071 another thread. */
10072 if (elf_tdata (abfd)->core->signal == 0)
10073 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
10074
10075 /* Make a ".reg/999" section. */
10076
10077 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
10078 len = strlen (buf) + 1;
10079 name = bfd_alloc (abfd, len);
10080 if (name == NULL)
10081 return FALSE;
10082 memcpy (name, buf, len);
10083
10084 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10085 if (sect == NULL)
10086 return FALSE;
10087
10088 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10089 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
10090 sect->filepos = note->descpos
10091 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
10092 #endif
10093
10094 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10095 sect->size = sizeof (lwpstat.pr_reg);
10096 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
10097 #endif
10098
10099 sect->alignment_power = 2;
10100
10101 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
10102 return FALSE;
10103
10104 /* Make a ".reg2/999" section */
10105
10106 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
10107 len = strlen (buf) + 1;
10108 name = bfd_alloc (abfd, len);
10109 if (name == NULL)
10110 return FALSE;
10111 memcpy (name, buf, len);
10112
10113 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10114 if (sect == NULL)
10115 return FALSE;
10116
10117 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10118 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10119 sect->filepos = note->descpos
10120 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10121 #endif
10122
10123 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10124 sect->size = sizeof (lwpstat.pr_fpreg);
10125 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10126 #endif
10127
10128 sect->alignment_power = 2;
10129
10130 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10131 }
10132 #endif /* defined (HAVE_LWPSTATUS_T) */
10133
10134 static bfd_boolean
10135 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10136 {
10137 char buf[30];
10138 char *name;
10139 size_t len;
10140 asection *sect;
10141 int type;
10142 int is_active_thread;
10143 bfd_vma base_addr;
10144
10145 if (note->descsz < 728)
10146 return TRUE;
10147
10148 if (! CONST_STRNEQ (note->namedata, "win32"))
10149 return TRUE;
10150
10151 type = bfd_get_32 (abfd, note->descdata);
10152
10153 switch (type)
10154 {
10155 case 1 /* NOTE_INFO_PROCESS */:
10156 /* FIXME: need to add ->core->command. */
10157 /* process_info.pid */
10158 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 8);
10159 /* process_info.signal */
10160 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 12);
10161 break;
10162
10163 case 2 /* NOTE_INFO_THREAD */:
10164 /* Make a ".reg/999" section. */
10165 /* thread_info.tid */
10166 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 8));
10167
10168 len = strlen (buf) + 1;
10169 name = (char *) bfd_alloc (abfd, len);
10170 if (name == NULL)
10171 return FALSE;
10172
10173 memcpy (name, buf, len);
10174
10175 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10176 if (sect == NULL)
10177 return FALSE;
10178
10179 /* sizeof (thread_info.thread_context) */
10180 sect->size = 716;
10181 /* offsetof (thread_info.thread_context) */
10182 sect->filepos = note->descpos + 12;
10183 sect->alignment_power = 2;
10184
10185 /* thread_info.is_active_thread */
10186 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10187
10188 if (is_active_thread)
10189 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10190 return FALSE;
10191 break;
10192
10193 case 3 /* NOTE_INFO_MODULE */:
10194 /* Make a ".module/xxxxxxxx" section. */
10195 /* module_info.base_address */
10196 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10197 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10198
10199 len = strlen (buf) + 1;
10200 name = (char *) bfd_alloc (abfd, len);
10201 if (name == NULL)
10202 return FALSE;
10203
10204 memcpy (name, buf, len);
10205
10206 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10207
10208 if (sect == NULL)
10209 return FALSE;
10210
10211 sect->size = note->descsz;
10212 sect->filepos = note->descpos;
10213 sect->alignment_power = 2;
10214 break;
10215
10216 default:
10217 return TRUE;
10218 }
10219
10220 return TRUE;
10221 }
10222
10223 static bfd_boolean
10224 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10225 {
10226 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10227
10228 switch (note->type)
10229 {
10230 default:
10231 return TRUE;
10232
10233 case NT_PRSTATUS:
10234 if (bed->elf_backend_grok_prstatus)
10235 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10236 return TRUE;
10237 #if defined (HAVE_PRSTATUS_T)
10238 return elfcore_grok_prstatus (abfd, note);
10239 #else
10240 return TRUE;
10241 #endif
10242
10243 #if defined (HAVE_PSTATUS_T)
10244 case NT_PSTATUS:
10245 return elfcore_grok_pstatus (abfd, note);
10246 #endif
10247
10248 #if defined (HAVE_LWPSTATUS_T)
10249 case NT_LWPSTATUS:
10250 return elfcore_grok_lwpstatus (abfd, note);
10251 #endif
10252
10253 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10254 return elfcore_grok_prfpreg (abfd, note);
10255
10256 case NT_WIN32PSTATUS:
10257 return elfcore_grok_win32pstatus (abfd, note);
10258
10259 case NT_PRXFPREG: /* Linux SSE extension */
10260 if (note->namesz == 6
10261 && strcmp (note->namedata, "LINUX") == 0)
10262 return elfcore_grok_prxfpreg (abfd, note);
10263 else
10264 return TRUE;
10265
10266 case NT_X86_XSTATE: /* Linux XSAVE extension */
10267 if (note->namesz == 6
10268 && strcmp (note->namedata, "LINUX") == 0)
10269 return elfcore_grok_xstatereg (abfd, note);
10270 else
10271 return TRUE;
10272
10273 case NT_PPC_VMX:
10274 if (note->namesz == 6
10275 && strcmp (note->namedata, "LINUX") == 0)
10276 return elfcore_grok_ppc_vmx (abfd, note);
10277 else
10278 return TRUE;
10279
10280 case NT_PPC_VSX:
10281 if (note->namesz == 6
10282 && strcmp (note->namedata, "LINUX") == 0)
10283 return elfcore_grok_ppc_vsx (abfd, note);
10284 else
10285 return TRUE;
10286
10287 case NT_PPC_TAR:
10288 if (note->namesz == 6
10289 && strcmp (note->namedata, "LINUX") == 0)
10290 return elfcore_grok_ppc_tar (abfd, note);
10291 else
10292 return TRUE;
10293
10294 case NT_PPC_PPR:
10295 if (note->namesz == 6
10296 && strcmp (note->namedata, "LINUX") == 0)
10297 return elfcore_grok_ppc_ppr (abfd, note);
10298 else
10299 return TRUE;
10300
10301 case NT_PPC_DSCR:
10302 if (note->namesz == 6
10303 && strcmp (note->namedata, "LINUX") == 0)
10304 return elfcore_grok_ppc_dscr (abfd, note);
10305 else
10306 return TRUE;
10307
10308 case NT_PPC_EBB:
10309 if (note->namesz == 6
10310 && strcmp (note->namedata, "LINUX") == 0)
10311 return elfcore_grok_ppc_ebb (abfd, note);
10312 else
10313 return TRUE;
10314
10315 case NT_PPC_PMU:
10316 if (note->namesz == 6
10317 && strcmp (note->namedata, "LINUX") == 0)
10318 return elfcore_grok_ppc_pmu (abfd, note);
10319 else
10320 return TRUE;
10321
10322 case NT_PPC_TM_CGPR:
10323 if (note->namesz == 6
10324 && strcmp (note->namedata, "LINUX") == 0)
10325 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10326 else
10327 return TRUE;
10328
10329 case NT_PPC_TM_CFPR:
10330 if (note->namesz == 6
10331 && strcmp (note->namedata, "LINUX") == 0)
10332 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10333 else
10334 return TRUE;
10335
10336 case NT_PPC_TM_CVMX:
10337 if (note->namesz == 6
10338 && strcmp (note->namedata, "LINUX") == 0)
10339 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10340 else
10341 return TRUE;
10342
10343 case NT_PPC_TM_CVSX:
10344 if (note->namesz == 6
10345 && strcmp (note->namedata, "LINUX") == 0)
10346 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10347 else
10348 return TRUE;
10349
10350 case NT_PPC_TM_SPR:
10351 if (note->namesz == 6
10352 && strcmp (note->namedata, "LINUX") == 0)
10353 return elfcore_grok_ppc_tm_spr (abfd, note);
10354 else
10355 return TRUE;
10356
10357 case NT_PPC_TM_CTAR:
10358 if (note->namesz == 6
10359 && strcmp (note->namedata, "LINUX") == 0)
10360 return elfcore_grok_ppc_tm_ctar (abfd, note);
10361 else
10362 return TRUE;
10363
10364 case NT_PPC_TM_CPPR:
10365 if (note->namesz == 6
10366 && strcmp (note->namedata, "LINUX") == 0)
10367 return elfcore_grok_ppc_tm_cppr (abfd, note);
10368 else
10369 return TRUE;
10370
10371 case NT_PPC_TM_CDSCR:
10372 if (note->namesz == 6
10373 && strcmp (note->namedata, "LINUX") == 0)
10374 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10375 else
10376 return TRUE;
10377
10378 case NT_S390_HIGH_GPRS:
10379 if (note->namesz == 6
10380 && strcmp (note->namedata, "LINUX") == 0)
10381 return elfcore_grok_s390_high_gprs (abfd, note);
10382 else
10383 return TRUE;
10384
10385 case NT_S390_TIMER:
10386 if (note->namesz == 6
10387 && strcmp (note->namedata, "LINUX") == 0)
10388 return elfcore_grok_s390_timer (abfd, note);
10389 else
10390 return TRUE;
10391
10392 case NT_S390_TODCMP:
10393 if (note->namesz == 6
10394 && strcmp (note->namedata, "LINUX") == 0)
10395 return elfcore_grok_s390_todcmp (abfd, note);
10396 else
10397 return TRUE;
10398
10399 case NT_S390_TODPREG:
10400 if (note->namesz == 6
10401 && strcmp (note->namedata, "LINUX") == 0)
10402 return elfcore_grok_s390_todpreg (abfd, note);
10403 else
10404 return TRUE;
10405
10406 case NT_S390_CTRS:
10407 if (note->namesz == 6
10408 && strcmp (note->namedata, "LINUX") == 0)
10409 return elfcore_grok_s390_ctrs (abfd, note);
10410 else
10411 return TRUE;
10412
10413 case NT_S390_PREFIX:
10414 if (note->namesz == 6
10415 && strcmp (note->namedata, "LINUX") == 0)
10416 return elfcore_grok_s390_prefix (abfd, note);
10417 else
10418 return TRUE;
10419
10420 case NT_S390_LAST_BREAK:
10421 if (note->namesz == 6
10422 && strcmp (note->namedata, "LINUX") == 0)
10423 return elfcore_grok_s390_last_break (abfd, note);
10424 else
10425 return TRUE;
10426
10427 case NT_S390_SYSTEM_CALL:
10428 if (note->namesz == 6
10429 && strcmp (note->namedata, "LINUX") == 0)
10430 return elfcore_grok_s390_system_call (abfd, note);
10431 else
10432 return TRUE;
10433
10434 case NT_S390_TDB:
10435 if (note->namesz == 6
10436 && strcmp (note->namedata, "LINUX") == 0)
10437 return elfcore_grok_s390_tdb (abfd, note);
10438 else
10439 return TRUE;
10440
10441 case NT_S390_VXRS_LOW:
10442 if (note->namesz == 6
10443 && strcmp (note->namedata, "LINUX") == 0)
10444 return elfcore_grok_s390_vxrs_low (abfd, note);
10445 else
10446 return TRUE;
10447
10448 case NT_S390_VXRS_HIGH:
10449 if (note->namesz == 6
10450 && strcmp (note->namedata, "LINUX") == 0)
10451 return elfcore_grok_s390_vxrs_high (abfd, note);
10452 else
10453 return TRUE;
10454
10455 case NT_S390_GS_CB:
10456 if (note->namesz == 6
10457 && strcmp (note->namedata, "LINUX") == 0)
10458 return elfcore_grok_s390_gs_cb (abfd, note);
10459 else
10460 return TRUE;
10461
10462 case NT_S390_GS_BC:
10463 if (note->namesz == 6
10464 && strcmp (note->namedata, "LINUX") == 0)
10465 return elfcore_grok_s390_gs_bc (abfd, note);
10466 else
10467 return TRUE;
10468
10469 case NT_ARC_V2:
10470 if (note->namesz == 6
10471 && strcmp (note->namedata, "LINUX") == 0)
10472 return elfcore_grok_arc_v2 (abfd, note);
10473 else
10474 return TRUE;
10475
10476 case NT_ARM_VFP:
10477 if (note->namesz == 6
10478 && strcmp (note->namedata, "LINUX") == 0)
10479 return elfcore_grok_arm_vfp (abfd, note);
10480 else
10481 return TRUE;
10482
10483 case NT_ARM_TLS:
10484 if (note->namesz == 6
10485 && strcmp (note->namedata, "LINUX") == 0)
10486 return elfcore_grok_aarch_tls (abfd, note);
10487 else
10488 return TRUE;
10489
10490 case NT_ARM_HW_BREAK:
10491 if (note->namesz == 6
10492 && strcmp (note->namedata, "LINUX") == 0)
10493 return elfcore_grok_aarch_hw_break (abfd, note);
10494 else
10495 return TRUE;
10496
10497 case NT_ARM_HW_WATCH:
10498 if (note->namesz == 6
10499 && strcmp (note->namedata, "LINUX") == 0)
10500 return elfcore_grok_aarch_hw_watch (abfd, note);
10501 else
10502 return TRUE;
10503
10504 case NT_ARM_SVE:
10505 if (note->namesz == 6
10506 && strcmp (note->namedata, "LINUX") == 0)
10507 return elfcore_grok_aarch_sve (abfd, note);
10508 else
10509 return TRUE;
10510
10511 case NT_ARM_PAC_MASK:
10512 if (note->namesz == 6
10513 && strcmp (note->namedata, "LINUX") == 0)
10514 return elfcore_grok_aarch_pauth (abfd, note);
10515 else
10516 return TRUE;
10517
10518 case NT_PRPSINFO:
10519 case NT_PSINFO:
10520 if (bed->elf_backend_grok_psinfo)
10521 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10522 return TRUE;
10523 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10524 return elfcore_grok_psinfo (abfd, note);
10525 #else
10526 return TRUE;
10527 #endif
10528
10529 case NT_AUXV:
10530 return elfcore_make_auxv_note_section (abfd, note, 0);
10531
10532 case NT_FILE:
10533 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10534 note);
10535
10536 case NT_SIGINFO:
10537 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10538 note);
10539
10540 }
10541 }
10542
10543 static bfd_boolean
10544 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10545 {
10546 struct bfd_build_id* build_id;
10547
10548 if (note->descsz == 0)
10549 return FALSE;
10550
10551 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10552 if (build_id == NULL)
10553 return FALSE;
10554
10555 build_id->size = note->descsz;
10556 memcpy (build_id->data, note->descdata, note->descsz);
10557 abfd->build_id = build_id;
10558
10559 return TRUE;
10560 }
10561
10562 static bfd_boolean
10563 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10564 {
10565 switch (note->type)
10566 {
10567 default:
10568 return TRUE;
10569
10570 case NT_GNU_PROPERTY_TYPE_0:
10571 return _bfd_elf_parse_gnu_properties (abfd, note);
10572
10573 case NT_GNU_BUILD_ID:
10574 return elfobj_grok_gnu_build_id (abfd, note);
10575 }
10576 }
10577
10578 static bfd_boolean
10579 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10580 {
10581 struct sdt_note *cur =
10582 (struct sdt_note *) bfd_alloc (abfd,
10583 sizeof (struct sdt_note) + note->descsz);
10584
10585 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10586 cur->size = (bfd_size_type) note->descsz;
10587 memcpy (cur->data, note->descdata, note->descsz);
10588
10589 elf_tdata (abfd)->sdt_note_head = cur;
10590
10591 return TRUE;
10592 }
10593
10594 static bfd_boolean
10595 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10596 {
10597 switch (note->type)
10598 {
10599 case NT_STAPSDT:
10600 return elfobj_grok_stapsdt_note_1 (abfd, note);
10601
10602 default:
10603 return TRUE;
10604 }
10605 }
10606
10607 static bfd_boolean
10608 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10609 {
10610 size_t offset;
10611
10612 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10613 {
10614 case ELFCLASS32:
10615 if (note->descsz < 108)
10616 return FALSE;
10617 break;
10618
10619 case ELFCLASS64:
10620 if (note->descsz < 120)
10621 return FALSE;
10622 break;
10623
10624 default:
10625 return FALSE;
10626 }
10627
10628 /* Check for version 1 in pr_version. */
10629 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10630 return FALSE;
10631
10632 offset = 4;
10633
10634 /* Skip over pr_psinfosz. */
10635 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10636 offset += 4;
10637 else
10638 {
10639 offset += 4; /* Padding before pr_psinfosz. */
10640 offset += 8;
10641 }
10642
10643 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10644 elf_tdata (abfd)->core->program
10645 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10646 offset += 17;
10647
10648 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10649 elf_tdata (abfd)->core->command
10650 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10651 offset += 81;
10652
10653 /* Padding before pr_pid. */
10654 offset += 2;
10655
10656 /* The pr_pid field was added in version "1a". */
10657 if (note->descsz < offset + 4)
10658 return TRUE;
10659
10660 elf_tdata (abfd)->core->pid
10661 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10662
10663 return TRUE;
10664 }
10665
10666 static bfd_boolean
10667 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10668 {
10669 size_t offset;
10670 size_t size;
10671 size_t min_size;
10672
10673 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10674 Also compute minimum size of this note. */
10675 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10676 {
10677 case ELFCLASS32:
10678 offset = 4 + 4;
10679 min_size = offset + (4 * 2) + 4 + 4 + 4;
10680 break;
10681
10682 case ELFCLASS64:
10683 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10684 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10685 break;
10686
10687 default:
10688 return FALSE;
10689 }
10690
10691 if (note->descsz < min_size)
10692 return FALSE;
10693
10694 /* Check for version 1 in pr_version. */
10695 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10696 return FALSE;
10697
10698 /* Extract size of pr_reg from pr_gregsetsz. */
10699 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10700 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10701 {
10702 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10703 offset += 4 * 2;
10704 }
10705 else
10706 {
10707 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10708 offset += 8 * 2;
10709 }
10710
10711 /* Skip over pr_osreldate. */
10712 offset += 4;
10713
10714 /* Read signal from pr_cursig. */
10715 if (elf_tdata (abfd)->core->signal == 0)
10716 elf_tdata (abfd)->core->signal
10717 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10718 offset += 4;
10719
10720 /* Read TID from pr_pid. */
10721 elf_tdata (abfd)->core->lwpid
10722 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10723 offset += 4;
10724
10725 /* Padding before pr_reg. */
10726 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10727 offset += 4;
10728
10729 /* Make sure that there is enough data remaining in the note. */
10730 if ((note->descsz - offset) < size)
10731 return FALSE;
10732
10733 /* Make a ".reg/999" section and a ".reg" section. */
10734 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10735 size, note->descpos + offset);
10736 }
10737
10738 static bfd_boolean
10739 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10740 {
10741 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10742
10743 switch (note->type)
10744 {
10745 case NT_PRSTATUS:
10746 if (bed->elf_backend_grok_freebsd_prstatus)
10747 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10748 return TRUE;
10749 return elfcore_grok_freebsd_prstatus (abfd, note);
10750
10751 case NT_FPREGSET:
10752 return elfcore_grok_prfpreg (abfd, note);
10753
10754 case NT_PRPSINFO:
10755 return elfcore_grok_freebsd_psinfo (abfd, note);
10756
10757 case NT_FREEBSD_THRMISC:
10758 if (note->namesz == 8)
10759 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10760 else
10761 return TRUE;
10762
10763 case NT_FREEBSD_PROCSTAT_PROC:
10764 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10765 note);
10766
10767 case NT_FREEBSD_PROCSTAT_FILES:
10768 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10769 note);
10770
10771 case NT_FREEBSD_PROCSTAT_VMMAP:
10772 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10773 note);
10774
10775 case NT_FREEBSD_PROCSTAT_AUXV:
10776 return elfcore_make_auxv_note_section (abfd, note, 4);
10777
10778 case NT_X86_XSTATE:
10779 if (note->namesz == 8)
10780 return elfcore_grok_xstatereg (abfd, note);
10781 else
10782 return TRUE;
10783
10784 case NT_FREEBSD_PTLWPINFO:
10785 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10786 note);
10787
10788 case NT_ARM_VFP:
10789 return elfcore_grok_arm_vfp (abfd, note);
10790
10791 default:
10792 return TRUE;
10793 }
10794 }
10795
10796 static bfd_boolean
10797 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10798 {
10799 char *cp;
10800
10801 cp = strchr (note->namedata, '@');
10802 if (cp != NULL)
10803 {
10804 *lwpidp = atoi(cp + 1);
10805 return TRUE;
10806 }
10807 return FALSE;
10808 }
10809
10810 static bfd_boolean
10811 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10812 {
10813 if (note->descsz <= 0x7c + 31)
10814 return FALSE;
10815
10816 /* Signal number at offset 0x08. */
10817 elf_tdata (abfd)->core->signal
10818 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10819
10820 /* Process ID at offset 0x50. */
10821 elf_tdata (abfd)->core->pid
10822 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
10823
10824 /* Command name at 0x7c (max 32 bytes, including nul). */
10825 elf_tdata (abfd)->core->command
10826 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
10827
10828 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
10829 note);
10830 }
10831
10832 static bfd_boolean
10833 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
10834 {
10835 int lwp;
10836
10837 if (elfcore_netbsd_get_lwpid (note, &lwp))
10838 elf_tdata (abfd)->core->lwpid = lwp;
10839
10840 switch (note->type)
10841 {
10842 case NT_NETBSDCORE_PROCINFO:
10843 /* NetBSD-specific core "procinfo". Note that we expect to
10844 find this note before any of the others, which is fine,
10845 since the kernel writes this note out first when it
10846 creates a core file. */
10847 return elfcore_grok_netbsd_procinfo (abfd, note);
10848 #ifdef NT_NETBSDCORE_AUXV
10849 case NT_NETBSDCORE_AUXV:
10850 /* NetBSD-specific Elf Auxiliary Vector data. */
10851 return elfcore_make_auxv_note_section (abfd, note, 4);
10852 #endif
10853 #ifdef NT_NETBSDCORE_LWPSTATUS
10854 case NT_NETBSDCORE_LWPSTATUS:
10855 return elfcore_make_note_pseudosection (abfd,
10856 ".note.netbsdcore.lwpstatus",
10857 note);
10858 #endif
10859 default:
10860 break;
10861 }
10862
10863 /* As of March 2020 there are no other machine-independent notes
10864 defined for NetBSD core files. If the note type is less
10865 than the start of the machine-dependent note types, we don't
10866 understand it. */
10867
10868 if (note->type < NT_NETBSDCORE_FIRSTMACH)
10869 return TRUE;
10870
10871
10872 switch (bfd_get_arch (abfd))
10873 {
10874 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
10875 PT_GETFPREGS == mach+2. */
10876
10877 case bfd_arch_aarch64:
10878 case bfd_arch_alpha:
10879 case bfd_arch_sparc:
10880 switch (note->type)
10881 {
10882 case NT_NETBSDCORE_FIRSTMACH+0:
10883 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10884
10885 case NT_NETBSDCORE_FIRSTMACH+2:
10886 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10887
10888 default:
10889 return TRUE;
10890 }
10891
10892 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
10893 There's also old PT___GETREGS40 == mach + 1 for old reg
10894 structure which lacks GBR. */
10895
10896 case bfd_arch_sh:
10897 switch (note->type)
10898 {
10899 case NT_NETBSDCORE_FIRSTMACH+3:
10900 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10901
10902 case NT_NETBSDCORE_FIRSTMACH+5:
10903 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10904
10905 default:
10906 return TRUE;
10907 }
10908
10909 /* On all other arch's, PT_GETREGS == mach+1 and
10910 PT_GETFPREGS == mach+3. */
10911
10912 default:
10913 switch (note->type)
10914 {
10915 case NT_NETBSDCORE_FIRSTMACH+1:
10916 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10917
10918 case NT_NETBSDCORE_FIRSTMACH+3:
10919 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10920
10921 default:
10922 return TRUE;
10923 }
10924 }
10925 /* NOTREACHED */
10926 }
10927
10928 static bfd_boolean
10929 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10930 {
10931 if (note->descsz <= 0x48 + 31)
10932 return FALSE;
10933
10934 /* Signal number at offset 0x08. */
10935 elf_tdata (abfd)->core->signal
10936 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10937
10938 /* Process ID at offset 0x20. */
10939 elf_tdata (abfd)->core->pid
10940 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
10941
10942 /* Command name at 0x48 (max 32 bytes, including nul). */
10943 elf_tdata (abfd)->core->command
10944 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
10945
10946 return TRUE;
10947 }
10948
10949 static bfd_boolean
10950 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
10951 {
10952 if (note->type == NT_OPENBSD_PROCINFO)
10953 return elfcore_grok_openbsd_procinfo (abfd, note);
10954
10955 if (note->type == NT_OPENBSD_REGS)
10956 return elfcore_make_note_pseudosection (abfd, ".reg", note);
10957
10958 if (note->type == NT_OPENBSD_FPREGS)
10959 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
10960
10961 if (note->type == NT_OPENBSD_XFPREGS)
10962 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
10963
10964 if (note->type == NT_OPENBSD_AUXV)
10965 return elfcore_make_auxv_note_section (abfd, note, 0);
10966
10967 if (note->type == NT_OPENBSD_WCOOKIE)
10968 {
10969 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
10970 SEC_HAS_CONTENTS);
10971
10972 if (sect == NULL)
10973 return FALSE;
10974 sect->size = note->descsz;
10975 sect->filepos = note->descpos;
10976 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
10977
10978 return TRUE;
10979 }
10980
10981 return TRUE;
10982 }
10983
10984 static bfd_boolean
10985 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
10986 {
10987 void *ddata = note->descdata;
10988 char buf[100];
10989 char *name;
10990 asection *sect;
10991 short sig;
10992 unsigned flags;
10993
10994 if (note->descsz < 16)
10995 return FALSE;
10996
10997 /* nto_procfs_status 'pid' field is at offset 0. */
10998 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
10999
11000 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
11001 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
11002
11003 /* nto_procfs_status 'flags' field is at offset 8. */
11004 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
11005
11006 /* nto_procfs_status 'what' field is at offset 14. */
11007 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
11008 {
11009 elf_tdata (abfd)->core->signal = sig;
11010 elf_tdata (abfd)->core->lwpid = *tid;
11011 }
11012
11013 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
11014 do not come from signals so we make sure we set the current
11015 thread just in case. */
11016 if (flags & 0x00000080)
11017 elf_tdata (abfd)->core->lwpid = *tid;
11018
11019 /* Make a ".qnx_core_status/%d" section. */
11020 sprintf (buf, ".qnx_core_status/%ld", *tid);
11021
11022 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11023 if (name == NULL)
11024 return FALSE;
11025 strcpy (name, buf);
11026
11027 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11028 if (sect == NULL)
11029 return FALSE;
11030
11031 sect->size = note->descsz;
11032 sect->filepos = note->descpos;
11033 sect->alignment_power = 2;
11034
11035 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
11036 }
11037
11038 static bfd_boolean
11039 elfcore_grok_nto_regs (bfd *abfd,
11040 Elf_Internal_Note *note,
11041 long tid,
11042 char *base)
11043 {
11044 char buf[100];
11045 char *name;
11046 asection *sect;
11047
11048 /* Make a "(base)/%d" section. */
11049 sprintf (buf, "%s/%ld", base, tid);
11050
11051 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11052 if (name == NULL)
11053 return FALSE;
11054 strcpy (name, buf);
11055
11056 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11057 if (sect == NULL)
11058 return FALSE;
11059
11060 sect->size = note->descsz;
11061 sect->filepos = note->descpos;
11062 sect->alignment_power = 2;
11063
11064 /* This is the current thread. */
11065 if (elf_tdata (abfd)->core->lwpid == tid)
11066 return elfcore_maybe_make_sect (abfd, base, sect);
11067
11068 return TRUE;
11069 }
11070
11071 #define BFD_QNT_CORE_INFO 7
11072 #define BFD_QNT_CORE_STATUS 8
11073 #define BFD_QNT_CORE_GREG 9
11074 #define BFD_QNT_CORE_FPREG 10
11075
11076 static bfd_boolean
11077 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
11078 {
11079 /* Every GREG section has a STATUS section before it. Store the
11080 tid from the previous call to pass down to the next gregs
11081 function. */
11082 static long tid = 1;
11083
11084 switch (note->type)
11085 {
11086 case BFD_QNT_CORE_INFO:
11087 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
11088 case BFD_QNT_CORE_STATUS:
11089 return elfcore_grok_nto_status (abfd, note, &tid);
11090 case BFD_QNT_CORE_GREG:
11091 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
11092 case BFD_QNT_CORE_FPREG:
11093 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
11094 default:
11095 return TRUE;
11096 }
11097 }
11098
11099 static bfd_boolean
11100 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
11101 {
11102 char *name;
11103 asection *sect;
11104 size_t len;
11105
11106 /* Use note name as section name. */
11107 len = note->namesz;
11108 name = (char *) bfd_alloc (abfd, len);
11109 if (name == NULL)
11110 return FALSE;
11111 memcpy (name, note->namedata, len);
11112 name[len - 1] = '\0';
11113
11114 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11115 if (sect == NULL)
11116 return FALSE;
11117
11118 sect->size = note->descsz;
11119 sect->filepos = note->descpos;
11120 sect->alignment_power = 1;
11121
11122 return TRUE;
11123 }
11124
11125 /* Function: elfcore_write_note
11126
11127 Inputs:
11128 buffer to hold note, and current size of buffer
11129 name of note
11130 type of note
11131 data for note
11132 size of data for note
11133
11134 Writes note to end of buffer. ELF64 notes are written exactly as
11135 for ELF32, despite the current (as of 2006) ELF gabi specifying
11136 that they ought to have 8-byte namesz and descsz field, and have
11137 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11138
11139 Return:
11140 Pointer to realloc'd buffer, *BUFSIZ updated. */
11141
11142 char *
11143 elfcore_write_note (bfd *abfd,
11144 char *buf,
11145 int *bufsiz,
11146 const char *name,
11147 int type,
11148 const void *input,
11149 int size)
11150 {
11151 Elf_External_Note *xnp;
11152 size_t namesz;
11153 size_t newspace;
11154 char *dest;
11155
11156 namesz = 0;
11157 if (name != NULL)
11158 namesz = strlen (name) + 1;
11159
11160 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11161
11162 buf = (char *) realloc (buf, *bufsiz + newspace);
11163 if (buf == NULL)
11164 return buf;
11165 dest = buf + *bufsiz;
11166 *bufsiz += newspace;
11167 xnp = (Elf_External_Note *) dest;
11168 H_PUT_32 (abfd, namesz, xnp->namesz);
11169 H_PUT_32 (abfd, size, xnp->descsz);
11170 H_PUT_32 (abfd, type, xnp->type);
11171 dest = xnp->name;
11172 if (name != NULL)
11173 {
11174 memcpy (dest, name, namesz);
11175 dest += namesz;
11176 while (namesz & 3)
11177 {
11178 *dest++ = '\0';
11179 ++namesz;
11180 }
11181 }
11182 memcpy (dest, input, size);
11183 dest += size;
11184 while (size & 3)
11185 {
11186 *dest++ = '\0';
11187 ++size;
11188 }
11189 return buf;
11190 }
11191
11192 /* gcc-8 warns (*) on all the strncpy calls in this function about
11193 possible string truncation. The "truncation" is not a bug. We
11194 have an external representation of structs with fields that are not
11195 necessarily NULL terminated and corresponding internal
11196 representation fields that are one larger so that they can always
11197 be NULL terminated.
11198 gcc versions between 4.2 and 4.6 do not allow pragma control of
11199 diagnostics inside functions, giving a hard error if you try to use
11200 the finer control available with later versions.
11201 gcc prior to 4.2 warns about diagnostic push and pop.
11202 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11203 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11204 (*) Depending on your system header files! */
11205 #if GCC_VERSION >= 8000
11206 # pragma GCC diagnostic push
11207 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11208 #endif
11209 char *
11210 elfcore_write_prpsinfo (bfd *abfd,
11211 char *buf,
11212 int *bufsiz,
11213 const char *fname,
11214 const char *psargs)
11215 {
11216 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11217
11218 if (bed->elf_backend_write_core_note != NULL)
11219 {
11220 char *ret;
11221 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11222 NT_PRPSINFO, fname, psargs);
11223 if (ret != NULL)
11224 return ret;
11225 }
11226
11227 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11228 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11229 if (bed->s->elfclass == ELFCLASS32)
11230 {
11231 # if defined (HAVE_PSINFO32_T)
11232 psinfo32_t data;
11233 int note_type = NT_PSINFO;
11234 # else
11235 prpsinfo32_t data;
11236 int note_type = NT_PRPSINFO;
11237 # endif
11238
11239 memset (&data, 0, sizeof (data));
11240 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11241 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11242 return elfcore_write_note (abfd, buf, bufsiz,
11243 "CORE", note_type, &data, sizeof (data));
11244 }
11245 else
11246 # endif
11247 {
11248 # if defined (HAVE_PSINFO_T)
11249 psinfo_t data;
11250 int note_type = NT_PSINFO;
11251 # else
11252 prpsinfo_t data;
11253 int note_type = NT_PRPSINFO;
11254 # endif
11255
11256 memset (&data, 0, sizeof (data));
11257 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11258 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11259 return elfcore_write_note (abfd, buf, bufsiz,
11260 "CORE", note_type, &data, sizeof (data));
11261 }
11262 #endif /* PSINFO_T or PRPSINFO_T */
11263
11264 free (buf);
11265 return NULL;
11266 }
11267 #if GCC_VERSION >= 8000
11268 # pragma GCC diagnostic pop
11269 #endif
11270
11271 char *
11272 elfcore_write_linux_prpsinfo32
11273 (bfd *abfd, char *buf, int *bufsiz,
11274 const struct elf_internal_linux_prpsinfo *prpsinfo)
11275 {
11276 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11277 {
11278 struct elf_external_linux_prpsinfo32_ugid16 data;
11279
11280 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11281 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11282 &data, sizeof (data));
11283 }
11284 else
11285 {
11286 struct elf_external_linux_prpsinfo32_ugid32 data;
11287
11288 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11289 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11290 &data, sizeof (data));
11291 }
11292 }
11293
11294 char *
11295 elfcore_write_linux_prpsinfo64
11296 (bfd *abfd, char *buf, int *bufsiz,
11297 const struct elf_internal_linux_prpsinfo *prpsinfo)
11298 {
11299 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11300 {
11301 struct elf_external_linux_prpsinfo64_ugid16 data;
11302
11303 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11304 return elfcore_write_note (abfd, buf, bufsiz,
11305 "CORE", NT_PRPSINFO, &data, sizeof (data));
11306 }
11307 else
11308 {
11309 struct elf_external_linux_prpsinfo64_ugid32 data;
11310
11311 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11312 return elfcore_write_note (abfd, buf, bufsiz,
11313 "CORE", NT_PRPSINFO, &data, sizeof (data));
11314 }
11315 }
11316
11317 char *
11318 elfcore_write_prstatus (bfd *abfd,
11319 char *buf,
11320 int *bufsiz,
11321 long pid,
11322 int cursig,
11323 const void *gregs)
11324 {
11325 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11326
11327 if (bed->elf_backend_write_core_note != NULL)
11328 {
11329 char *ret;
11330 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11331 NT_PRSTATUS,
11332 pid, cursig, gregs);
11333 if (ret != NULL)
11334 return ret;
11335 }
11336
11337 #if defined (HAVE_PRSTATUS_T)
11338 #if defined (HAVE_PRSTATUS32_T)
11339 if (bed->s->elfclass == ELFCLASS32)
11340 {
11341 prstatus32_t prstat;
11342
11343 memset (&prstat, 0, sizeof (prstat));
11344 prstat.pr_pid = pid;
11345 prstat.pr_cursig = cursig;
11346 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11347 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11348 NT_PRSTATUS, &prstat, sizeof (prstat));
11349 }
11350 else
11351 #endif
11352 {
11353 prstatus_t prstat;
11354
11355 memset (&prstat, 0, sizeof (prstat));
11356 prstat.pr_pid = pid;
11357 prstat.pr_cursig = cursig;
11358 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11359 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11360 NT_PRSTATUS, &prstat, sizeof (prstat));
11361 }
11362 #endif /* HAVE_PRSTATUS_T */
11363
11364 free (buf);
11365 return NULL;
11366 }
11367
11368 #if defined (HAVE_LWPSTATUS_T)
11369 char *
11370 elfcore_write_lwpstatus (bfd *abfd,
11371 char *buf,
11372 int *bufsiz,
11373 long pid,
11374 int cursig,
11375 const void *gregs)
11376 {
11377 lwpstatus_t lwpstat;
11378 const char *note_name = "CORE";
11379
11380 memset (&lwpstat, 0, sizeof (lwpstat));
11381 lwpstat.pr_lwpid = pid >> 16;
11382 lwpstat.pr_cursig = cursig;
11383 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11384 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11385 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11386 #if !defined(gregs)
11387 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11388 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11389 #else
11390 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11391 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11392 #endif
11393 #endif
11394 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11395 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11396 }
11397 #endif /* HAVE_LWPSTATUS_T */
11398
11399 #if defined (HAVE_PSTATUS_T)
11400 char *
11401 elfcore_write_pstatus (bfd *abfd,
11402 char *buf,
11403 int *bufsiz,
11404 long pid,
11405 int cursig ATTRIBUTE_UNUSED,
11406 const void *gregs ATTRIBUTE_UNUSED)
11407 {
11408 const char *note_name = "CORE";
11409 #if defined (HAVE_PSTATUS32_T)
11410 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11411
11412 if (bed->s->elfclass == ELFCLASS32)
11413 {
11414 pstatus32_t pstat;
11415
11416 memset (&pstat, 0, sizeof (pstat));
11417 pstat.pr_pid = pid & 0xffff;
11418 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11419 NT_PSTATUS, &pstat, sizeof (pstat));
11420 return buf;
11421 }
11422 else
11423 #endif
11424 {
11425 pstatus_t pstat;
11426
11427 memset (&pstat, 0, sizeof (pstat));
11428 pstat.pr_pid = pid & 0xffff;
11429 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11430 NT_PSTATUS, &pstat, sizeof (pstat));
11431 return buf;
11432 }
11433 }
11434 #endif /* HAVE_PSTATUS_T */
11435
11436 char *
11437 elfcore_write_prfpreg (bfd *abfd,
11438 char *buf,
11439 int *bufsiz,
11440 const void *fpregs,
11441 int size)
11442 {
11443 const char *note_name = "CORE";
11444 return elfcore_write_note (abfd, buf, bufsiz,
11445 note_name, NT_FPREGSET, fpregs, size);
11446 }
11447
11448 char *
11449 elfcore_write_prxfpreg (bfd *abfd,
11450 char *buf,
11451 int *bufsiz,
11452 const void *xfpregs,
11453 int size)
11454 {
11455 char *note_name = "LINUX";
11456 return elfcore_write_note (abfd, buf, bufsiz,
11457 note_name, NT_PRXFPREG, xfpregs, size);
11458 }
11459
11460 char *
11461 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11462 const void *xfpregs, int size)
11463 {
11464 char *note_name;
11465 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11466 note_name = "FreeBSD";
11467 else
11468 note_name = "LINUX";
11469 return elfcore_write_note (abfd, buf, bufsiz,
11470 note_name, NT_X86_XSTATE, xfpregs, size);
11471 }
11472
11473 char *
11474 elfcore_write_ppc_vmx (bfd *abfd,
11475 char *buf,
11476 int *bufsiz,
11477 const void *ppc_vmx,
11478 int size)
11479 {
11480 char *note_name = "LINUX";
11481 return elfcore_write_note (abfd, buf, bufsiz,
11482 note_name, NT_PPC_VMX, ppc_vmx, size);
11483 }
11484
11485 char *
11486 elfcore_write_ppc_vsx (bfd *abfd,
11487 char *buf,
11488 int *bufsiz,
11489 const void *ppc_vsx,
11490 int size)
11491 {
11492 char *note_name = "LINUX";
11493 return elfcore_write_note (abfd, buf, bufsiz,
11494 note_name, NT_PPC_VSX, ppc_vsx, size);
11495 }
11496
11497 char *
11498 elfcore_write_ppc_tar (bfd *abfd,
11499 char *buf,
11500 int *bufsiz,
11501 const void *ppc_tar,
11502 int size)
11503 {
11504 char *note_name = "LINUX";
11505 return elfcore_write_note (abfd, buf, bufsiz,
11506 note_name, NT_PPC_TAR, ppc_tar, size);
11507 }
11508
11509 char *
11510 elfcore_write_ppc_ppr (bfd *abfd,
11511 char *buf,
11512 int *bufsiz,
11513 const void *ppc_ppr,
11514 int size)
11515 {
11516 char *note_name = "LINUX";
11517 return elfcore_write_note (abfd, buf, bufsiz,
11518 note_name, NT_PPC_PPR, ppc_ppr, size);
11519 }
11520
11521 char *
11522 elfcore_write_ppc_dscr (bfd *abfd,
11523 char *buf,
11524 int *bufsiz,
11525 const void *ppc_dscr,
11526 int size)
11527 {
11528 char *note_name = "LINUX";
11529 return elfcore_write_note (abfd, buf, bufsiz,
11530 note_name, NT_PPC_DSCR, ppc_dscr, size);
11531 }
11532
11533 char *
11534 elfcore_write_ppc_ebb (bfd *abfd,
11535 char *buf,
11536 int *bufsiz,
11537 const void *ppc_ebb,
11538 int size)
11539 {
11540 char *note_name = "LINUX";
11541 return elfcore_write_note (abfd, buf, bufsiz,
11542 note_name, NT_PPC_EBB, ppc_ebb, size);
11543 }
11544
11545 char *
11546 elfcore_write_ppc_pmu (bfd *abfd,
11547 char *buf,
11548 int *bufsiz,
11549 const void *ppc_pmu,
11550 int size)
11551 {
11552 char *note_name = "LINUX";
11553 return elfcore_write_note (abfd, buf, bufsiz,
11554 note_name, NT_PPC_PMU, ppc_pmu, size);
11555 }
11556
11557 char *
11558 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11559 char *buf,
11560 int *bufsiz,
11561 const void *ppc_tm_cgpr,
11562 int size)
11563 {
11564 char *note_name = "LINUX";
11565 return elfcore_write_note (abfd, buf, bufsiz,
11566 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11567 }
11568
11569 char *
11570 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11571 char *buf,
11572 int *bufsiz,
11573 const void *ppc_tm_cfpr,
11574 int size)
11575 {
11576 char *note_name = "LINUX";
11577 return elfcore_write_note (abfd, buf, bufsiz,
11578 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11579 }
11580
11581 char *
11582 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11583 char *buf,
11584 int *bufsiz,
11585 const void *ppc_tm_cvmx,
11586 int size)
11587 {
11588 char *note_name = "LINUX";
11589 return elfcore_write_note (abfd, buf, bufsiz,
11590 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11591 }
11592
11593 char *
11594 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11595 char *buf,
11596 int *bufsiz,
11597 const void *ppc_tm_cvsx,
11598 int size)
11599 {
11600 char *note_name = "LINUX";
11601 return elfcore_write_note (abfd, buf, bufsiz,
11602 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11603 }
11604
11605 char *
11606 elfcore_write_ppc_tm_spr (bfd *abfd,
11607 char *buf,
11608 int *bufsiz,
11609 const void *ppc_tm_spr,
11610 int size)
11611 {
11612 char *note_name = "LINUX";
11613 return elfcore_write_note (abfd, buf, bufsiz,
11614 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11615 }
11616
11617 char *
11618 elfcore_write_ppc_tm_ctar (bfd *abfd,
11619 char *buf,
11620 int *bufsiz,
11621 const void *ppc_tm_ctar,
11622 int size)
11623 {
11624 char *note_name = "LINUX";
11625 return elfcore_write_note (abfd, buf, bufsiz,
11626 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11627 }
11628
11629 char *
11630 elfcore_write_ppc_tm_cppr (bfd *abfd,
11631 char *buf,
11632 int *bufsiz,
11633 const void *ppc_tm_cppr,
11634 int size)
11635 {
11636 char *note_name = "LINUX";
11637 return elfcore_write_note (abfd, buf, bufsiz,
11638 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
11639 }
11640
11641 char *
11642 elfcore_write_ppc_tm_cdscr (bfd *abfd,
11643 char *buf,
11644 int *bufsiz,
11645 const void *ppc_tm_cdscr,
11646 int size)
11647 {
11648 char *note_name = "LINUX";
11649 return elfcore_write_note (abfd, buf, bufsiz,
11650 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
11651 }
11652
11653 static char *
11654 elfcore_write_s390_high_gprs (bfd *abfd,
11655 char *buf,
11656 int *bufsiz,
11657 const void *s390_high_gprs,
11658 int size)
11659 {
11660 char *note_name = "LINUX";
11661 return elfcore_write_note (abfd, buf, bufsiz,
11662 note_name, NT_S390_HIGH_GPRS,
11663 s390_high_gprs, size);
11664 }
11665
11666 char *
11667 elfcore_write_s390_timer (bfd *abfd,
11668 char *buf,
11669 int *bufsiz,
11670 const void *s390_timer,
11671 int size)
11672 {
11673 char *note_name = "LINUX";
11674 return elfcore_write_note (abfd, buf, bufsiz,
11675 note_name, NT_S390_TIMER, s390_timer, size);
11676 }
11677
11678 char *
11679 elfcore_write_s390_todcmp (bfd *abfd,
11680 char *buf,
11681 int *bufsiz,
11682 const void *s390_todcmp,
11683 int size)
11684 {
11685 char *note_name = "LINUX";
11686 return elfcore_write_note (abfd, buf, bufsiz,
11687 note_name, NT_S390_TODCMP, s390_todcmp, size);
11688 }
11689
11690 char *
11691 elfcore_write_s390_todpreg (bfd *abfd,
11692 char *buf,
11693 int *bufsiz,
11694 const void *s390_todpreg,
11695 int size)
11696 {
11697 char *note_name = "LINUX";
11698 return elfcore_write_note (abfd, buf, bufsiz,
11699 note_name, NT_S390_TODPREG, s390_todpreg, size);
11700 }
11701
11702 char *
11703 elfcore_write_s390_ctrs (bfd *abfd,
11704 char *buf,
11705 int *bufsiz,
11706 const void *s390_ctrs,
11707 int size)
11708 {
11709 char *note_name = "LINUX";
11710 return elfcore_write_note (abfd, buf, bufsiz,
11711 note_name, NT_S390_CTRS, s390_ctrs, size);
11712 }
11713
11714 char *
11715 elfcore_write_s390_prefix (bfd *abfd,
11716 char *buf,
11717 int *bufsiz,
11718 const void *s390_prefix,
11719 int size)
11720 {
11721 char *note_name = "LINUX";
11722 return elfcore_write_note (abfd, buf, bufsiz,
11723 note_name, NT_S390_PREFIX, s390_prefix, size);
11724 }
11725
11726 char *
11727 elfcore_write_s390_last_break (bfd *abfd,
11728 char *buf,
11729 int *bufsiz,
11730 const void *s390_last_break,
11731 int size)
11732 {
11733 char *note_name = "LINUX";
11734 return elfcore_write_note (abfd, buf, bufsiz,
11735 note_name, NT_S390_LAST_BREAK,
11736 s390_last_break, size);
11737 }
11738
11739 char *
11740 elfcore_write_s390_system_call (bfd *abfd,
11741 char *buf,
11742 int *bufsiz,
11743 const void *s390_system_call,
11744 int size)
11745 {
11746 char *note_name = "LINUX";
11747 return elfcore_write_note (abfd, buf, bufsiz,
11748 note_name, NT_S390_SYSTEM_CALL,
11749 s390_system_call, size);
11750 }
11751
11752 char *
11753 elfcore_write_s390_tdb (bfd *abfd,
11754 char *buf,
11755 int *bufsiz,
11756 const void *s390_tdb,
11757 int size)
11758 {
11759 char *note_name = "LINUX";
11760 return elfcore_write_note (abfd, buf, bufsiz,
11761 note_name, NT_S390_TDB, s390_tdb, size);
11762 }
11763
11764 char *
11765 elfcore_write_s390_vxrs_low (bfd *abfd,
11766 char *buf,
11767 int *bufsiz,
11768 const void *s390_vxrs_low,
11769 int size)
11770 {
11771 char *note_name = "LINUX";
11772 return elfcore_write_note (abfd, buf, bufsiz,
11773 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
11774 }
11775
11776 char *
11777 elfcore_write_s390_vxrs_high (bfd *abfd,
11778 char *buf,
11779 int *bufsiz,
11780 const void *s390_vxrs_high,
11781 int size)
11782 {
11783 char *note_name = "LINUX";
11784 return elfcore_write_note (abfd, buf, bufsiz,
11785 note_name, NT_S390_VXRS_HIGH,
11786 s390_vxrs_high, size);
11787 }
11788
11789 char *
11790 elfcore_write_s390_gs_cb (bfd *abfd,
11791 char *buf,
11792 int *bufsiz,
11793 const void *s390_gs_cb,
11794 int size)
11795 {
11796 char *note_name = "LINUX";
11797 return elfcore_write_note (abfd, buf, bufsiz,
11798 note_name, NT_S390_GS_CB,
11799 s390_gs_cb, size);
11800 }
11801
11802 char *
11803 elfcore_write_s390_gs_bc (bfd *abfd,
11804 char *buf,
11805 int *bufsiz,
11806 const void *s390_gs_bc,
11807 int size)
11808 {
11809 char *note_name = "LINUX";
11810 return elfcore_write_note (abfd, buf, bufsiz,
11811 note_name, NT_S390_GS_BC,
11812 s390_gs_bc, size);
11813 }
11814
11815 char *
11816 elfcore_write_arm_vfp (bfd *abfd,
11817 char *buf,
11818 int *bufsiz,
11819 const void *arm_vfp,
11820 int size)
11821 {
11822 char *note_name = "LINUX";
11823 return elfcore_write_note (abfd, buf, bufsiz,
11824 note_name, NT_ARM_VFP, arm_vfp, size);
11825 }
11826
11827 char *
11828 elfcore_write_aarch_tls (bfd *abfd,
11829 char *buf,
11830 int *bufsiz,
11831 const void *aarch_tls,
11832 int size)
11833 {
11834 char *note_name = "LINUX";
11835 return elfcore_write_note (abfd, buf, bufsiz,
11836 note_name, NT_ARM_TLS, aarch_tls, size);
11837 }
11838
11839 char *
11840 elfcore_write_aarch_hw_break (bfd *abfd,
11841 char *buf,
11842 int *bufsiz,
11843 const void *aarch_hw_break,
11844 int size)
11845 {
11846 char *note_name = "LINUX";
11847 return elfcore_write_note (abfd, buf, bufsiz,
11848 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
11849 }
11850
11851 char *
11852 elfcore_write_aarch_hw_watch (bfd *abfd,
11853 char *buf,
11854 int *bufsiz,
11855 const void *aarch_hw_watch,
11856 int size)
11857 {
11858 char *note_name = "LINUX";
11859 return elfcore_write_note (abfd, buf, bufsiz,
11860 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
11861 }
11862
11863 char *
11864 elfcore_write_aarch_sve (bfd *abfd,
11865 char *buf,
11866 int *bufsiz,
11867 const void *aarch_sve,
11868 int size)
11869 {
11870 char *note_name = "LINUX";
11871 return elfcore_write_note (abfd, buf, bufsiz,
11872 note_name, NT_ARM_SVE, aarch_sve, size);
11873 }
11874
11875 char *
11876 elfcore_write_aarch_pauth (bfd *abfd,
11877 char *buf,
11878 int *bufsiz,
11879 const void *aarch_pauth,
11880 int size)
11881 {
11882 char *note_name = "LINUX";
11883 return elfcore_write_note (abfd, buf, bufsiz,
11884 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
11885 }
11886
11887 char *
11888 elfcore_write_arc_v2 (bfd *abfd,
11889 char *buf,
11890 int *bufsiz,
11891 const void *arc_v2,
11892 int size)
11893 {
11894 char *note_name = "LINUX";
11895 return elfcore_write_note (abfd, buf, bufsiz,
11896 note_name, NT_ARC_V2, arc_v2, size);
11897 }
11898
11899 char *
11900 elfcore_write_register_note (bfd *abfd,
11901 char *buf,
11902 int *bufsiz,
11903 const char *section,
11904 const void *data,
11905 int size)
11906 {
11907 if (strcmp (section, ".reg2") == 0)
11908 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
11909 if (strcmp (section, ".reg-xfp") == 0)
11910 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
11911 if (strcmp (section, ".reg-xstate") == 0)
11912 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
11913 if (strcmp (section, ".reg-ppc-vmx") == 0)
11914 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
11915 if (strcmp (section, ".reg-ppc-vsx") == 0)
11916 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
11917 if (strcmp (section, ".reg-ppc-tar") == 0)
11918 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
11919 if (strcmp (section, ".reg-ppc-ppr") == 0)
11920 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
11921 if (strcmp (section, ".reg-ppc-dscr") == 0)
11922 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
11923 if (strcmp (section, ".reg-ppc-ebb") == 0)
11924 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
11925 if (strcmp (section, ".reg-ppc-pmu") == 0)
11926 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
11927 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
11928 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
11929 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
11930 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
11931 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
11932 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
11933 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
11934 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
11935 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
11936 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
11937 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
11938 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
11939 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
11940 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
11941 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
11942 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
11943 if (strcmp (section, ".reg-s390-high-gprs") == 0)
11944 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
11945 if (strcmp (section, ".reg-s390-timer") == 0)
11946 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
11947 if (strcmp (section, ".reg-s390-todcmp") == 0)
11948 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
11949 if (strcmp (section, ".reg-s390-todpreg") == 0)
11950 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
11951 if (strcmp (section, ".reg-s390-ctrs") == 0)
11952 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
11953 if (strcmp (section, ".reg-s390-prefix") == 0)
11954 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
11955 if (strcmp (section, ".reg-s390-last-break") == 0)
11956 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
11957 if (strcmp (section, ".reg-s390-system-call") == 0)
11958 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
11959 if (strcmp (section, ".reg-s390-tdb") == 0)
11960 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
11961 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
11962 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
11963 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
11964 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
11965 if (strcmp (section, ".reg-s390-gs-cb") == 0)
11966 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
11967 if (strcmp (section, ".reg-s390-gs-bc") == 0)
11968 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
11969 if (strcmp (section, ".reg-arm-vfp") == 0)
11970 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
11971 if (strcmp (section, ".reg-aarch-tls") == 0)
11972 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
11973 if (strcmp (section, ".reg-aarch-hw-break") == 0)
11974 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
11975 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
11976 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
11977 if (strcmp (section, ".reg-aarch-sve") == 0)
11978 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
11979 if (strcmp (section, ".reg-aarch-pauth") == 0)
11980 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
11981 if (strcmp (section, ".reg-arc-v2") == 0)
11982 return elfcore_write_arc_v2 (abfd, buf, bufsiz, data, size);
11983 return NULL;
11984 }
11985
11986 static bfd_boolean
11987 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
11988 size_t align)
11989 {
11990 char *p;
11991
11992 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
11993 gABI specifies that PT_NOTE alignment should be aligned to 4
11994 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
11995 align is less than 4, we use 4 byte alignment. */
11996 if (align < 4)
11997 align = 4;
11998 if (align != 4 && align != 8)
11999 return FALSE;
12000
12001 p = buf;
12002 while (p < buf + size)
12003 {
12004 Elf_External_Note *xnp = (Elf_External_Note *) p;
12005 Elf_Internal_Note in;
12006
12007 if (offsetof (Elf_External_Note, name) > buf - p + size)
12008 return FALSE;
12009
12010 in.type = H_GET_32 (abfd, xnp->type);
12011
12012 in.namesz = H_GET_32 (abfd, xnp->namesz);
12013 in.namedata = xnp->name;
12014 if (in.namesz > buf - in.namedata + size)
12015 return FALSE;
12016
12017 in.descsz = H_GET_32 (abfd, xnp->descsz);
12018 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
12019 in.descpos = offset + (in.descdata - buf);
12020 if (in.descsz != 0
12021 && (in.descdata >= buf + size
12022 || in.descsz > buf - in.descdata + size))
12023 return FALSE;
12024
12025 switch (bfd_get_format (abfd))
12026 {
12027 default:
12028 return TRUE;
12029
12030 case bfd_core:
12031 {
12032 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
12033 struct
12034 {
12035 const char * string;
12036 size_t len;
12037 bfd_boolean (* func)(bfd *, Elf_Internal_Note *);
12038 }
12039 grokers[] =
12040 {
12041 GROKER_ELEMENT ("", elfcore_grok_note),
12042 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
12043 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
12044 GROKER_ELEMENT ( "OpenBSD", elfcore_grok_openbsd_note),
12045 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
12046 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
12047 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note)
12048 };
12049 #undef GROKER_ELEMENT
12050 int i;
12051
12052 for (i = ARRAY_SIZE (grokers); i--;)
12053 {
12054 if (in.namesz >= grokers[i].len
12055 && strncmp (in.namedata, grokers[i].string,
12056 grokers[i].len) == 0)
12057 {
12058 if (! grokers[i].func (abfd, & in))
12059 return FALSE;
12060 break;
12061 }
12062 }
12063 break;
12064 }
12065
12066 case bfd_object:
12067 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
12068 {
12069 if (! elfobj_grok_gnu_note (abfd, &in))
12070 return FALSE;
12071 }
12072 else if (in.namesz == sizeof "stapsdt"
12073 && strcmp (in.namedata, "stapsdt") == 0)
12074 {
12075 if (! elfobj_grok_stapsdt_note (abfd, &in))
12076 return FALSE;
12077 }
12078 break;
12079 }
12080
12081 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
12082 }
12083
12084 return TRUE;
12085 }
12086
12087 bfd_boolean
12088 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
12089 size_t align)
12090 {
12091 char *buf;
12092
12093 if (size == 0 || (size + 1) == 0)
12094 return TRUE;
12095
12096 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
12097 return FALSE;
12098
12099 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
12100 if (buf == NULL)
12101 return FALSE;
12102
12103 /* PR 17512: file: ec08f814
12104 0-termintate the buffer so that string searches will not overflow. */
12105 buf[size] = 0;
12106
12107 if (!elf_parse_notes (abfd, buf, size, offset, align))
12108 {
12109 free (buf);
12110 return FALSE;
12111 }
12112
12113 free (buf);
12114 return TRUE;
12115 }
12116 \f
12117 /* Providing external access to the ELF program header table. */
12118
12119 /* Return an upper bound on the number of bytes required to store a
12120 copy of ABFD's program header table entries. Return -1 if an error
12121 occurs; bfd_get_error will return an appropriate code. */
12122
12123 long
12124 bfd_get_elf_phdr_upper_bound (bfd *abfd)
12125 {
12126 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12127 {
12128 bfd_set_error (bfd_error_wrong_format);
12129 return -1;
12130 }
12131
12132 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
12133 }
12134
12135 /* Copy ABFD's program header table entries to *PHDRS. The entries
12136 will be stored as an array of Elf_Internal_Phdr structures, as
12137 defined in include/elf/internal.h. To find out how large the
12138 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12139
12140 Return the number of program header table entries read, or -1 if an
12141 error occurs; bfd_get_error will return an appropriate code. */
12142
12143 int
12144 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12145 {
12146 int num_phdrs;
12147
12148 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12149 {
12150 bfd_set_error (bfd_error_wrong_format);
12151 return -1;
12152 }
12153
12154 num_phdrs = elf_elfheader (abfd)->e_phnum;
12155 if (num_phdrs != 0)
12156 memcpy (phdrs, elf_tdata (abfd)->phdr,
12157 num_phdrs * sizeof (Elf_Internal_Phdr));
12158
12159 return num_phdrs;
12160 }
12161
12162 enum elf_reloc_type_class
12163 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12164 const asection *rel_sec ATTRIBUTE_UNUSED,
12165 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12166 {
12167 return reloc_class_normal;
12168 }
12169
12170 /* For RELA architectures, return the relocation value for a
12171 relocation against a local symbol. */
12172
12173 bfd_vma
12174 _bfd_elf_rela_local_sym (bfd *abfd,
12175 Elf_Internal_Sym *sym,
12176 asection **psec,
12177 Elf_Internal_Rela *rel)
12178 {
12179 asection *sec = *psec;
12180 bfd_vma relocation;
12181
12182 relocation = (sec->output_section->vma
12183 + sec->output_offset
12184 + sym->st_value);
12185 if ((sec->flags & SEC_MERGE)
12186 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12187 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12188 {
12189 rel->r_addend =
12190 _bfd_merged_section_offset (abfd, psec,
12191 elf_section_data (sec)->sec_info,
12192 sym->st_value + rel->r_addend);
12193 if (sec != *psec)
12194 {
12195 /* If we have changed the section, and our original section is
12196 marked with SEC_EXCLUDE, it means that the original
12197 SEC_MERGE section has been completely subsumed in some
12198 other SEC_MERGE section. In this case, we need to leave
12199 some info around for --emit-relocs. */
12200 if ((sec->flags & SEC_EXCLUDE) != 0)
12201 sec->kept_section = *psec;
12202 sec = *psec;
12203 }
12204 rel->r_addend -= relocation;
12205 rel->r_addend += sec->output_section->vma + sec->output_offset;
12206 }
12207 return relocation;
12208 }
12209
12210 bfd_vma
12211 _bfd_elf_rel_local_sym (bfd *abfd,
12212 Elf_Internal_Sym *sym,
12213 asection **psec,
12214 bfd_vma addend)
12215 {
12216 asection *sec = *psec;
12217
12218 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12219 return sym->st_value + addend;
12220
12221 return _bfd_merged_section_offset (abfd, psec,
12222 elf_section_data (sec)->sec_info,
12223 sym->st_value + addend);
12224 }
12225
12226 /* Adjust an address within a section. Given OFFSET within SEC, return
12227 the new offset within the section, based upon changes made to the
12228 section. Returns -1 if the offset is now invalid.
12229 The offset (in abnd out) is in target sized bytes, however big a
12230 byte may be. */
12231
12232 bfd_vma
12233 _bfd_elf_section_offset (bfd *abfd,
12234 struct bfd_link_info *info,
12235 asection *sec,
12236 bfd_vma offset)
12237 {
12238 switch (sec->sec_info_type)
12239 {
12240 case SEC_INFO_TYPE_STABS:
12241 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12242 offset);
12243 case SEC_INFO_TYPE_EH_FRAME:
12244 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12245
12246 default:
12247 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12248 {
12249 /* Reverse the offset. */
12250 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12251 bfd_size_type address_size = bed->s->arch_size / 8;
12252
12253 /* address_size and sec->size are in octets. Convert
12254 to bytes before subtracting the original offset. */
12255 offset = ((sec->size - address_size)
12256 / bfd_octets_per_byte (abfd, sec) - offset);
12257 }
12258 return offset;
12259 }
12260 }
12261 \f
12262 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12263 reconstruct an ELF file by reading the segments out of remote memory
12264 based on the ELF file header at EHDR_VMA and the ELF program headers it
12265 points to. If not null, *LOADBASEP is filled in with the difference
12266 between the VMAs from which the segments were read, and the VMAs the
12267 file headers (and hence BFD's idea of each section's VMA) put them at.
12268
12269 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12270 remote memory at target address VMA into the local buffer at MYADDR; it
12271 should return zero on success or an `errno' code on failure. TEMPL must
12272 be a BFD for an ELF target with the word size and byte order found in
12273 the remote memory. */
12274
12275 bfd *
12276 bfd_elf_bfd_from_remote_memory
12277 (bfd *templ,
12278 bfd_vma ehdr_vma,
12279 bfd_size_type size,
12280 bfd_vma *loadbasep,
12281 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12282 {
12283 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12284 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12285 }
12286 \f
12287 long
12288 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12289 long symcount ATTRIBUTE_UNUSED,
12290 asymbol **syms ATTRIBUTE_UNUSED,
12291 long dynsymcount,
12292 asymbol **dynsyms,
12293 asymbol **ret)
12294 {
12295 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12296 asection *relplt;
12297 asymbol *s;
12298 const char *relplt_name;
12299 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
12300 arelent *p;
12301 long count, i, n;
12302 size_t size;
12303 Elf_Internal_Shdr *hdr;
12304 char *names;
12305 asection *plt;
12306
12307 *ret = NULL;
12308
12309 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12310 return 0;
12311
12312 if (dynsymcount <= 0)
12313 return 0;
12314
12315 if (!bed->plt_sym_val)
12316 return 0;
12317
12318 relplt_name = bed->relplt_name;
12319 if (relplt_name == NULL)
12320 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12321 relplt = bfd_get_section_by_name (abfd, relplt_name);
12322 if (relplt == NULL)
12323 return 0;
12324
12325 hdr = &elf_section_data (relplt)->this_hdr;
12326 if (hdr->sh_link != elf_dynsymtab (abfd)
12327 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12328 return 0;
12329
12330 plt = bfd_get_section_by_name (abfd, ".plt");
12331 if (plt == NULL)
12332 return 0;
12333
12334 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12335 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
12336 return -1;
12337
12338 count = relplt->size / hdr->sh_entsize;
12339 size = count * sizeof (asymbol);
12340 p = relplt->relocation;
12341 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12342 {
12343 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12344 if (p->addend != 0)
12345 {
12346 #ifdef BFD64
12347 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12348 #else
12349 size += sizeof ("+0x") - 1 + 8;
12350 #endif
12351 }
12352 }
12353
12354 s = *ret = (asymbol *) bfd_malloc (size);
12355 if (s == NULL)
12356 return -1;
12357
12358 names = (char *) (s + count);
12359 p = relplt->relocation;
12360 n = 0;
12361 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12362 {
12363 size_t len;
12364 bfd_vma addr;
12365
12366 addr = bed->plt_sym_val (i, plt, p);
12367 if (addr == (bfd_vma) -1)
12368 continue;
12369
12370 *s = **p->sym_ptr_ptr;
12371 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12372 we are defining a symbol, ensure one of them is set. */
12373 if ((s->flags & BSF_LOCAL) == 0)
12374 s->flags |= BSF_GLOBAL;
12375 s->flags |= BSF_SYNTHETIC;
12376 s->section = plt;
12377 s->value = addr - plt->vma;
12378 s->name = names;
12379 s->udata.p = NULL;
12380 len = strlen ((*p->sym_ptr_ptr)->name);
12381 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12382 names += len;
12383 if (p->addend != 0)
12384 {
12385 char buf[30], *a;
12386
12387 memcpy (names, "+0x", sizeof ("+0x") - 1);
12388 names += sizeof ("+0x") - 1;
12389 bfd_sprintf_vma (abfd, buf, p->addend);
12390 for (a = buf; *a == '0'; ++a)
12391 ;
12392 len = strlen (a);
12393 memcpy (names, a, len);
12394 names += len;
12395 }
12396 memcpy (names, "@plt", sizeof ("@plt"));
12397 names += sizeof ("@plt");
12398 ++s, ++n;
12399 }
12400
12401 return n;
12402 }
12403
12404 /* It is only used by x86-64 so far.
12405 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12406 but current usage would allow all of _bfd_std_section to be zero. */
12407 static const asymbol lcomm_sym
12408 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12409 asection _bfd_elf_large_com_section
12410 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12411 "LARGE_COMMON", 0, SEC_IS_COMMON);
12412
12413 bfd_boolean
12414 _bfd_elf_final_write_processing (bfd *abfd)
12415 {
12416 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12417
12418 i_ehdrp = elf_elfheader (abfd);
12419
12420 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12421 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12422
12423 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12424 SHF_GNU_MBIND sections or symbols of STT_GNU_IFUNC type or
12425 STB_GNU_UNIQUE binding. */
12426 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12427 {
12428 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12429 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12430 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12431 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12432 {
12433 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12434 _bfd_error_handler (_("GNU_MBIND section is unsupported"));
12435 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12436 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is unsupported"));
12437 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12438 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is unsupported"));
12439 bfd_set_error (bfd_error_sorry);
12440 return FALSE;
12441 }
12442 }
12443 return TRUE;
12444 }
12445
12446
12447 /* Return TRUE for ELF symbol types that represent functions.
12448 This is the default version of this function, which is sufficient for
12449 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12450
12451 bfd_boolean
12452 _bfd_elf_is_function_type (unsigned int type)
12453 {
12454 return (type == STT_FUNC
12455 || type == STT_GNU_IFUNC);
12456 }
12457
12458 /* If the ELF symbol SYM might be a function in SEC, return the
12459 function size and set *CODE_OFF to the function's entry point,
12460 otherwise return zero. */
12461
12462 bfd_size_type
12463 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12464 bfd_vma *code_off)
12465 {
12466 bfd_size_type size;
12467
12468 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12469 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12470 || sym->section != sec)
12471 return 0;
12472
12473 *code_off = sym->value;
12474 size = 0;
12475 if (!(sym->flags & BSF_SYNTHETIC))
12476 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
12477 if (size == 0)
12478 size = 1;
12479 return size;
12480 }
12481
12482 /* Set to non-zero to enable some debug messages. */
12483 #define DEBUG_SECONDARY_RELOCS 0
12484
12485 /* An internal-to-the-bfd-library only section type
12486 used to indicate a cached secondary reloc section. */
12487 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12488
12489 /* Create a BFD section to hold a secondary reloc section. */
12490
12491 bfd_boolean
12492 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
12493 Elf_Internal_Shdr *hdr,
12494 const char * name,
12495 unsigned int shindex)
12496 {
12497 /* We only support RELA secondary relocs. */
12498 if (hdr->sh_type != SHT_RELA)
12499 return FALSE;
12500
12501 #if DEBUG_SECONDARY_RELOCS
12502 fprintf (stderr, "secondary reloc section %s encountered\n", name);
12503 #endif
12504 hdr->sh_type = SHT_SECONDARY_RELOC;
12505 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
12506 }
12507
12508 /* Read in any secondary relocs associated with SEC. */
12509
12510 bfd_boolean
12511 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
12512 asection * sec,
12513 asymbol ** symbols)
12514 {
12515 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12516 asection * relsec;
12517 bfd_boolean result = TRUE;
12518 bfd_vma (*r_sym) (bfd_vma);
12519
12520 #if BFD_DEFAULT_TARGET_SIZE > 32
12521 if (bfd_arch_bits_per_address (abfd) != 32)
12522 r_sym = elf64_r_sym;
12523 else
12524 #endif
12525 r_sym = elf32_r_sym;
12526
12527 /* Discover if there are any secondary reloc sections
12528 associated with SEC. */
12529 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12530 {
12531 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
12532
12533 if (hdr->sh_type == SHT_SECONDARY_RELOC
12534 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12535 {
12536 bfd_byte * native_relocs;
12537 bfd_byte * native_reloc;
12538 arelent * internal_relocs;
12539 arelent * internal_reloc;
12540 unsigned int i;
12541 unsigned int entsize;
12542 unsigned int symcount;
12543 unsigned int reloc_count;
12544 size_t amt;
12545
12546 if (ebd->elf_info_to_howto == NULL)
12547 return FALSE;
12548
12549 #if DEBUG_SECONDARY_RELOCS
12550 fprintf (stderr, "read secondary relocs for %s from %s\n",
12551 sec->name, relsec->name);
12552 #endif
12553 entsize = hdr->sh_entsize;
12554
12555 native_relocs = bfd_malloc (hdr->sh_size);
12556 if (native_relocs == NULL)
12557 {
12558 result = FALSE;
12559 continue;
12560 }
12561
12562 reloc_count = NUM_SHDR_ENTRIES (hdr);
12563 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
12564 {
12565 free (native_relocs);
12566 bfd_set_error (bfd_error_file_too_big);
12567 result = FALSE;
12568 continue;
12569 }
12570
12571 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
12572 if (internal_relocs == NULL)
12573 {
12574 free (native_relocs);
12575 result = FALSE;
12576 continue;
12577 }
12578
12579 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
12580 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
12581 != hdr->sh_size))
12582 {
12583 free (native_relocs);
12584 /* The internal_relocs will be freed when
12585 the memory for the bfd is released. */
12586 result = FALSE;
12587 continue;
12588 }
12589
12590 symcount = bfd_get_symcount (abfd);
12591
12592 for (i = 0, internal_reloc = internal_relocs,
12593 native_reloc = native_relocs;
12594 i < reloc_count;
12595 i++, internal_reloc++, native_reloc += entsize)
12596 {
12597 bfd_boolean res;
12598 Elf_Internal_Rela rela;
12599
12600 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
12601
12602 /* The address of an ELF reloc is section relative for an object
12603 file, and absolute for an executable file or shared library.
12604 The address of a normal BFD reloc is always section relative,
12605 and the address of a dynamic reloc is absolute.. */
12606 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
12607 internal_reloc->address = rela.r_offset;
12608 else
12609 internal_reloc->address = rela.r_offset - sec->vma;
12610
12611 if (r_sym (rela.r_info) == STN_UNDEF)
12612 {
12613 /* FIXME: This and the error case below mean that we
12614 have a symbol on relocs that is not elf_symbol_type. */
12615 internal_reloc->sym_ptr_ptr =
12616 bfd_abs_section_ptr->symbol_ptr_ptr;
12617 }
12618 else if (r_sym (rela.r_info) > symcount)
12619 {
12620 _bfd_error_handler
12621 /* xgettext:c-format */
12622 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
12623 abfd, sec, i, (long) r_sym (rela.r_info));
12624 bfd_set_error (bfd_error_bad_value);
12625 internal_reloc->sym_ptr_ptr =
12626 bfd_abs_section_ptr->symbol_ptr_ptr;
12627 result = FALSE;
12628 }
12629 else
12630 {
12631 asymbol **ps;
12632
12633 ps = symbols + r_sym (rela.r_info) - 1;
12634
12635 internal_reloc->sym_ptr_ptr = ps;
12636 /* Make sure that this symbol is not removed by strip. */
12637 (*ps)->flags |= BSF_KEEP;
12638 }
12639
12640 internal_reloc->addend = rela.r_addend;
12641
12642 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
12643 if (! res || internal_reloc->howto == NULL)
12644 {
12645 #if DEBUG_SECONDARY_RELOCS
12646 fprintf (stderr, "there is no howto associated with reloc %lx\n",
12647 rela.r_info);
12648 #endif
12649 result = FALSE;
12650 }
12651 }
12652
12653 free (native_relocs);
12654 /* Store the internal relocs. */
12655 elf_section_data (relsec)->sec_info = internal_relocs;
12656 }
12657 }
12658
12659 return result;
12660 }
12661
12662 /* Set the ELF section header fields of an output secondary reloc section. */
12663
12664 bfd_boolean
12665 _bfd_elf_copy_special_section_fields (const bfd * ibfd ATTRIBUTE_UNUSED,
12666 bfd * obfd ATTRIBUTE_UNUSED,
12667 const Elf_Internal_Shdr * isection,
12668 Elf_Internal_Shdr * osection)
12669 {
12670 asection * isec;
12671 asection * osec;
12672
12673 if (isection == NULL)
12674 return FALSE;
12675
12676 if (isection->sh_type != SHT_SECONDARY_RELOC)
12677 return TRUE;
12678
12679 isec = isection->bfd_section;
12680 if (isec == NULL)
12681 return FALSE;
12682
12683 osec = osection->bfd_section;
12684 if (osec == NULL)
12685 return FALSE;
12686
12687 BFD_ASSERT (elf_section_data (osec)->sec_info == NULL);
12688 elf_section_data (osec)->sec_info = elf_section_data (isec)->sec_info;
12689 osection->sh_type = SHT_RELA;
12690 osection->sh_link = elf_onesymtab (obfd);
12691 if (osection->sh_link == 0)
12692 {
12693 /* There is no symbol table - we are hosed... */
12694 _bfd_error_handler
12695 /* xgettext:c-format */
12696 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
12697 obfd, osec);
12698 bfd_set_error (bfd_error_bad_value);
12699 return FALSE;
12700 }
12701
12702 /* Find the output section that corresponds to the isection's sh_info link. */
12703 if (isection->sh_info == 0
12704 || isection->sh_info >= elf_numsections (ibfd))
12705 {
12706 _bfd_error_handler
12707 /* xgettext:c-format */
12708 (_("%pB(%pA): info section index is invalid"),
12709 obfd, osec);
12710 bfd_set_error (bfd_error_bad_value);
12711 return FALSE;
12712 }
12713
12714 isection = elf_elfsections (ibfd)[isection->sh_info];
12715
12716 if (isection == NULL
12717 || isection->bfd_section == NULL
12718 || isection->bfd_section->output_section == NULL)
12719 {
12720 _bfd_error_handler
12721 /* xgettext:c-format */
12722 (_("%pB(%pA): info section index cannot be set because the section is not in the output"),
12723 obfd, osec);
12724 bfd_set_error (bfd_error_bad_value);
12725 return FALSE;
12726 }
12727
12728 osection->sh_info =
12729 elf_section_data (isection->bfd_section->output_section)->this_idx;
12730
12731 #if DEBUG_SECONDARY_RELOCS
12732 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
12733 osec->name, osection->sh_link, osection->sh_info);
12734 #endif
12735
12736 return TRUE;
12737 }
12738
12739 /* Write out a secondary reloc section. */
12740
12741 bfd_boolean
12742 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
12743 {
12744 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
12745 bfd_vma addr_offset;
12746 asection * relsec;
12747 bfd_vma (*r_info) (bfd_vma, bfd_vma);
12748 bfd_boolean result = TRUE;
12749
12750 if (sec == NULL)
12751 return FALSE;
12752
12753 #if BFD_DEFAULT_TARGET_SIZE > 32
12754 if (bfd_arch_bits_per_address (abfd) != 32)
12755 r_info = elf64_r_info;
12756 else
12757 #endif
12758 r_info = elf32_r_info;
12759
12760 /* The address of an ELF reloc is section relative for an object
12761 file, and absolute for an executable file or shared library.
12762 The address of a BFD reloc is always section relative. */
12763 addr_offset = 0;
12764 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
12765 addr_offset = sec->vma;
12766
12767 /* Discover if there are any secondary reloc sections
12768 associated with SEC. */
12769 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
12770 {
12771 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
12772 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
12773
12774 if (hdr->sh_type == SHT_RELA
12775 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
12776 {
12777 asymbol * last_sym;
12778 int last_sym_idx;
12779 unsigned int reloc_count;
12780 unsigned int idx;
12781 arelent * src_irel;
12782 bfd_byte * dst_rela;
12783
12784 if (hdr->contents != NULL)
12785 {
12786 _bfd_error_handler
12787 /* xgettext:c-format */
12788 (_("%pB(%pA): error: secondary reloc section processed twice"),
12789 abfd, relsec);
12790 bfd_set_error (bfd_error_bad_value);
12791 result = FALSE;
12792 continue;
12793 }
12794
12795 reloc_count = hdr->sh_size / hdr->sh_entsize;
12796 if (reloc_count <= 0)
12797 {
12798 _bfd_error_handler
12799 /* xgettext:c-format */
12800 (_("%pB(%pA): error: secondary reloc section is empty!"),
12801 abfd, relsec);
12802 bfd_set_error (bfd_error_bad_value);
12803 result = FALSE;
12804 continue;
12805 }
12806
12807 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
12808 if (hdr->contents == NULL)
12809 continue;
12810
12811 #if DEBUG_SECONDARY_RELOCS
12812 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
12813 reloc_count, sec->name, relsec->name);
12814 #endif
12815 last_sym = NULL;
12816 last_sym_idx = 0;
12817 dst_rela = hdr->contents;
12818 src_irel = (arelent *) esd->sec_info;
12819 if (src_irel == NULL)
12820 {
12821 _bfd_error_handler
12822 /* xgettext:c-format */
12823 (_("%pB(%pA): error: internal relocs missing for secondary reloc section"),
12824 abfd, relsec);
12825 bfd_set_error (bfd_error_bad_value);
12826 result = FALSE;
12827 continue;
12828 }
12829
12830 for (idx = 0; idx < reloc_count; idx++, dst_rela += hdr->sh_entsize)
12831 {
12832 Elf_Internal_Rela src_rela;
12833 arelent *ptr;
12834 asymbol *sym;
12835 int n;
12836
12837 ptr = src_irel + idx;
12838 if (ptr == NULL)
12839 {
12840 _bfd_error_handler
12841 /* xgettext:c-format */
12842 (_("%pB(%pA): error: reloc table entry %u is empty"),
12843 abfd, relsec, idx);
12844 bfd_set_error (bfd_error_bad_value);
12845 result = FALSE;
12846 break;
12847 }
12848
12849 if (ptr->sym_ptr_ptr == NULL)
12850 {
12851 /* FIXME: Is this an error ? */
12852 n = 0;
12853 }
12854 else
12855 {
12856 sym = *ptr->sym_ptr_ptr;
12857
12858 if (sym == last_sym)
12859 n = last_sym_idx;
12860 else
12861 {
12862 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
12863 if (n < 0)
12864 {
12865 _bfd_error_handler
12866 /* xgettext:c-format */
12867 (_("%pB(%pA): error: secondary reloc %u references a missing symbol"),
12868 abfd, relsec, idx);
12869 bfd_set_error (bfd_error_bad_value);
12870 result = FALSE;
12871 n = 0;
12872 }
12873
12874 last_sym = sym;
12875 last_sym_idx = n;
12876 }
12877
12878 if (sym->the_bfd != NULL
12879 && sym->the_bfd->xvec != abfd->xvec
12880 && ! _bfd_elf_validate_reloc (abfd, ptr))
12881 {
12882 _bfd_error_handler
12883 /* xgettext:c-format */
12884 (_("%pB(%pA): error: secondary reloc %u references a deleted symbol"),
12885 abfd, relsec, idx);
12886 bfd_set_error (bfd_error_bad_value);
12887 result = FALSE;
12888 n = 0;
12889 }
12890 }
12891
12892 src_rela.r_offset = ptr->address + addr_offset;
12893 if (ptr->howto == NULL)
12894 {
12895 _bfd_error_handler
12896 /* xgettext:c-format */
12897 (_("%pB(%pA): error: secondary reloc %u is of an unknown type"),
12898 abfd, relsec, idx);
12899 bfd_set_error (bfd_error_bad_value);
12900 result = FALSE;
12901 src_rela.r_info = r_info (0, 0);
12902 }
12903 else
12904 src_rela.r_info = r_info (n, ptr->howto->type);
12905 src_rela.r_addend = ptr->addend;
12906 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
12907 }
12908 }
12909 }
12910
12911 return result;
12912 }