]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf.c
Fix the linker script parser so that it will recognise the PT_GNU_RELRO segment type...
[thirdparty/binutils-gdb.git] / bfd / elf.c
1 /* ELF executable support for BFD.
2
3 Copyright (C) 1993-2021 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22
23 /*
24 SECTION
25 ELF backends
26
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
30
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
34
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
47
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
51
52 static int elf_sort_sections (const void *, const void *);
53 static bool assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bool swap_out_syms (bfd *, struct elf_strtab_hash **, int,
55 struct bfd_link_info *);
56 static bool elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset, size_t align);
58
59 /* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
62
63 /* Swap in a Verdef structure. */
64
65 void
66 _bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
69 {
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
77 }
78
79 /* Swap out a Verdef structure. */
80
81 void
82 _bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
85 {
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
93 }
94
95 /* Swap in a Verdaux structure. */
96
97 void
98 _bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
101 {
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
104 }
105
106 /* Swap out a Verdaux structure. */
107
108 void
109 _bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
112 {
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
115 }
116
117 /* Swap in a Verneed structure. */
118
119 void
120 _bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
123 {
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
129 }
130
131 /* Swap out a Verneed structure. */
132
133 void
134 _bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
137 {
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
143 }
144
145 /* Swap in a Vernaux structure. */
146
147 void
148 _bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
151 {
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
157 }
158
159 /* Swap out a Vernaux structure. */
160
161 void
162 _bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
165 {
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
171 }
172
173 /* Swap in a Versym structure. */
174
175 void
176 _bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
179 {
180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
181 }
182
183 /* Swap out a Versym structure. */
184
185 void
186 _bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
189 {
190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
191 }
192
193 /* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
195
196 unsigned long
197 bfd_elf_hash (const char *namearg)
198 {
199 const unsigned char *name = (const unsigned char *) namearg;
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
203
204 while ((ch = *name++) != '\0')
205 {
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
208 {
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
213 }
214 }
215 return h & 0xffffffff;
216 }
217
218 /* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
220
221 unsigned long
222 bfd_elf_gnu_hash (const char *namearg)
223 {
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
227
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
231 }
232
233 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
235 bool
236 bfd_elf_allocate_object (bfd *abfd,
237 size_t object_size,
238 enum elf_target_id object_id)
239 {
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return false;
244
245 elf_object_id (abfd) = object_id;
246 if (abfd->direction != read_direction)
247 {
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return false;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
253 }
254 return true;
255 }
256
257
258 bool
259 bfd_elf_make_object (bfd *abfd)
260 {
261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
263 bed->target_id);
264 }
265
266 bool
267 bfd_elf_mkcorefile (bfd *abfd)
268 {
269 /* I think this can be done just like an object file. */
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return false;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
274 }
275
276 char *
277 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
278 {
279 Elf_Internal_Shdr **i_shdrp;
280 bfd_byte *shstrtab = NULL;
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
283
284 i_shdrp = elf_elfsections (abfd);
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
288 return NULL;
289
290 shstrtab = i_shdrp[shindex]->contents;
291 if (shstrtab == NULL)
292 {
293 /* No cached one, attempt to read, and cache what we read. */
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
296
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
299 if (shstrtabsize + 1 <= 1
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
302 shstrtabsize)) == NULL)
303 {
304 /* Once we've failed to read it, make sure we don't keep
305 trying. Otherwise, we'll keep allocating space for
306 the string table over and over. */
307 i_shdrp[shindex]->sh_size = 0;
308 }
309 else
310 shstrtab[shstrtabsize] = '\0';
311 i_shdrp[shindex]->contents = shstrtab;
312 }
313 return (char *) shstrtab;
314 }
315
316 char *
317 bfd_elf_string_from_elf_section (bfd *abfd,
318 unsigned int shindex,
319 unsigned int strindex)
320 {
321 Elf_Internal_Shdr *hdr;
322
323 if (strindex == 0)
324 return "";
325
326 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
327 return NULL;
328
329 hdr = elf_elfsections (abfd)[shindex];
330
331 if (hdr->contents == NULL)
332 {
333 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
334 {
335 /* PR 17512: file: f057ec89. */
336 /* xgettext:c-format */
337 _bfd_error_handler (_("%pB: attempt to load strings from"
338 " a non-string section (number %d)"),
339 abfd, shindex);
340 return NULL;
341 }
342
343 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
344 return NULL;
345 }
346 else
347 {
348 /* PR 24273: The string section's contents may have already
349 been loaded elsewhere, eg because a corrupt file has the
350 string section index in the ELF header pointing at a group
351 section. So be paranoid, and test that the last byte of
352 the section is zero. */
353 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
354 return NULL;
355 }
356
357 if (strindex >= hdr->sh_size)
358 {
359 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
360 _bfd_error_handler
361 /* xgettext:c-format */
362 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
363 abfd, strindex, (uint64_t) hdr->sh_size,
364 (shindex == shstrndx && strindex == hdr->sh_name
365 ? ".shstrtab"
366 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
367 return NULL;
368 }
369
370 return ((char *) hdr->contents) + strindex;
371 }
372
373 /* Read and convert symbols to internal format.
374 SYMCOUNT specifies the number of symbols to read, starting from
375 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
376 are non-NULL, they are used to store the internal symbols, external
377 symbols, and symbol section index extensions, respectively.
378 Returns a pointer to the internal symbol buffer (malloced if necessary)
379 or NULL if there were no symbols or some kind of problem. */
380
381 Elf_Internal_Sym *
382 bfd_elf_get_elf_syms (bfd *ibfd,
383 Elf_Internal_Shdr *symtab_hdr,
384 size_t symcount,
385 size_t symoffset,
386 Elf_Internal_Sym *intsym_buf,
387 void *extsym_buf,
388 Elf_External_Sym_Shndx *extshndx_buf)
389 {
390 Elf_Internal_Shdr *shndx_hdr;
391 void *alloc_ext;
392 const bfd_byte *esym;
393 Elf_External_Sym_Shndx *alloc_extshndx;
394 Elf_External_Sym_Shndx *shndx;
395 Elf_Internal_Sym *alloc_intsym;
396 Elf_Internal_Sym *isym;
397 Elf_Internal_Sym *isymend;
398 const struct elf_backend_data *bed;
399 size_t extsym_size;
400 size_t amt;
401 file_ptr pos;
402
403 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
404 abort ();
405
406 if (symcount == 0)
407 return intsym_buf;
408
409 /* Normal syms might have section extension entries. */
410 shndx_hdr = NULL;
411 if (elf_symtab_shndx_list (ibfd) != NULL)
412 {
413 elf_section_list * entry;
414 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
415
416 /* Find an index section that is linked to this symtab section. */
417 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
418 {
419 /* PR 20063. */
420 if (entry->hdr.sh_link >= elf_numsections (ibfd))
421 continue;
422
423 if (sections[entry->hdr.sh_link] == symtab_hdr)
424 {
425 shndx_hdr = & entry->hdr;
426 break;
427 };
428 }
429
430 if (shndx_hdr == NULL)
431 {
432 if (symtab_hdr == & elf_symtab_hdr (ibfd))
433 /* Not really accurate, but this was how the old code used to work. */
434 shndx_hdr = & elf_symtab_shndx_list (ibfd)->hdr;
435 /* Otherwise we do nothing. The assumption is that
436 the index table will not be needed. */
437 }
438 }
439
440 /* Read the symbols. */
441 alloc_ext = NULL;
442 alloc_extshndx = NULL;
443 alloc_intsym = NULL;
444 bed = get_elf_backend_data (ibfd);
445 extsym_size = bed->s->sizeof_sym;
446 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
447 {
448 bfd_set_error (bfd_error_file_too_big);
449 intsym_buf = NULL;
450 goto out;
451 }
452 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
453 if (extsym_buf == NULL)
454 {
455 alloc_ext = bfd_malloc (amt);
456 extsym_buf = alloc_ext;
457 }
458 if (extsym_buf == NULL
459 || bfd_seek (ibfd, pos, SEEK_SET) != 0
460 || bfd_bread (extsym_buf, amt, ibfd) != amt)
461 {
462 intsym_buf = NULL;
463 goto out;
464 }
465
466 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
467 extshndx_buf = NULL;
468 else
469 {
470 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
471 {
472 bfd_set_error (bfd_error_file_too_big);
473 intsym_buf = NULL;
474 goto out;
475 }
476 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
477 if (extshndx_buf == NULL)
478 {
479 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
480 extshndx_buf = alloc_extshndx;
481 }
482 if (extshndx_buf == NULL
483 || bfd_seek (ibfd, pos, SEEK_SET) != 0
484 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
485 {
486 intsym_buf = NULL;
487 goto out;
488 }
489 }
490
491 if (intsym_buf == NULL)
492 {
493 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
494 {
495 bfd_set_error (bfd_error_file_too_big);
496 goto out;
497 }
498 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
499 intsym_buf = alloc_intsym;
500 if (intsym_buf == NULL)
501 goto out;
502 }
503
504 /* Convert the symbols to internal form. */
505 isymend = intsym_buf + symcount;
506 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
507 shndx = extshndx_buf;
508 isym < isymend;
509 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
510 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
511 {
512 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
513 /* xgettext:c-format */
514 _bfd_error_handler (_("%pB symbol number %lu references"
515 " nonexistent SHT_SYMTAB_SHNDX section"),
516 ibfd, (unsigned long) symoffset);
517 free (alloc_intsym);
518 intsym_buf = NULL;
519 goto out;
520 }
521
522 out:
523 free (alloc_ext);
524 free (alloc_extshndx);
525
526 return intsym_buf;
527 }
528
529 /* Look up a symbol name. */
530 const char *
531 bfd_elf_sym_name (bfd *abfd,
532 Elf_Internal_Shdr *symtab_hdr,
533 Elf_Internal_Sym *isym,
534 asection *sym_sec)
535 {
536 const char *name;
537 unsigned int iname = isym->st_name;
538 unsigned int shindex = symtab_hdr->sh_link;
539
540 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
541 /* Check for a bogus st_shndx to avoid crashing. */
542 && isym->st_shndx < elf_numsections (abfd))
543 {
544 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
545 shindex = elf_elfheader (abfd)->e_shstrndx;
546 }
547
548 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
549 if (name == NULL)
550 name = "(null)";
551 else if (sym_sec && *name == '\0')
552 name = bfd_section_name (sym_sec);
553
554 return name;
555 }
556
557 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
558 sections. The first element is the flags, the rest are section
559 pointers. */
560
561 typedef union elf_internal_group {
562 Elf_Internal_Shdr *shdr;
563 unsigned int flags;
564 } Elf_Internal_Group;
565
566 /* Return the name of the group signature symbol. Why isn't the
567 signature just a string? */
568
569 static const char *
570 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
571 {
572 Elf_Internal_Shdr *hdr;
573 unsigned char esym[sizeof (Elf64_External_Sym)];
574 Elf_External_Sym_Shndx eshndx;
575 Elf_Internal_Sym isym;
576
577 /* First we need to ensure the symbol table is available. Make sure
578 that it is a symbol table section. */
579 if (ghdr->sh_link >= elf_numsections (abfd))
580 return NULL;
581 hdr = elf_elfsections (abfd) [ghdr->sh_link];
582 if (hdr->sh_type != SHT_SYMTAB
583 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
584 return NULL;
585
586 /* Go read the symbol. */
587 hdr = &elf_tdata (abfd)->symtab_hdr;
588 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
589 &isym, esym, &eshndx) == NULL)
590 return NULL;
591
592 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
593 }
594
595 /* Set next_in_group list pointer, and group name for NEWSECT. */
596
597 static bool
598 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
599 {
600 unsigned int num_group = elf_tdata (abfd)->num_group;
601
602 /* If num_group is zero, read in all SHT_GROUP sections. The count
603 is set to -1 if there are no SHT_GROUP sections. */
604 if (num_group == 0)
605 {
606 unsigned int i, shnum;
607
608 /* First count the number of groups. If we have a SHT_GROUP
609 section with just a flag word (ie. sh_size is 4), ignore it. */
610 shnum = elf_numsections (abfd);
611 num_group = 0;
612
613 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
614 ( (shdr)->sh_type == SHT_GROUP \
615 && (shdr)->sh_size >= minsize \
616 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
617 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
618
619 for (i = 0; i < shnum; i++)
620 {
621 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
622
623 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
624 num_group += 1;
625 }
626
627 if (num_group == 0)
628 {
629 num_group = (unsigned) -1;
630 elf_tdata (abfd)->num_group = num_group;
631 elf_tdata (abfd)->group_sect_ptr = NULL;
632 }
633 else
634 {
635 /* We keep a list of elf section headers for group sections,
636 so we can find them quickly. */
637 size_t amt;
638
639 elf_tdata (abfd)->num_group = num_group;
640 amt = num_group * sizeof (Elf_Internal_Shdr *);
641 elf_tdata (abfd)->group_sect_ptr
642 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
643 if (elf_tdata (abfd)->group_sect_ptr == NULL)
644 return false;
645 num_group = 0;
646
647 for (i = 0; i < shnum; i++)
648 {
649 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
650
651 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
652 {
653 unsigned char *src;
654 Elf_Internal_Group *dest;
655
656 /* Make sure the group section has a BFD section
657 attached to it. */
658 if (!bfd_section_from_shdr (abfd, i))
659 return false;
660
661 /* Add to list of sections. */
662 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
663 num_group += 1;
664
665 /* Read the raw contents. */
666 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
667 shdr->contents = NULL;
668 if (_bfd_mul_overflow (shdr->sh_size,
669 sizeof (*dest) / 4, &amt)
670 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
671 || !(shdr->contents
672 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
673 {
674 _bfd_error_handler
675 /* xgettext:c-format */
676 (_("%pB: invalid size field in group section"
677 " header: %#" PRIx64 ""),
678 abfd, (uint64_t) shdr->sh_size);
679 bfd_set_error (bfd_error_bad_value);
680 -- num_group;
681 continue;
682 }
683
684 /* Translate raw contents, a flag word followed by an
685 array of elf section indices all in target byte order,
686 to the flag word followed by an array of elf section
687 pointers. */
688 src = shdr->contents + shdr->sh_size;
689 dest = (Elf_Internal_Group *) (shdr->contents + amt);
690
691 while (1)
692 {
693 unsigned int idx;
694
695 src -= 4;
696 --dest;
697 idx = H_GET_32 (abfd, src);
698 if (src == shdr->contents)
699 {
700 dest->shdr = NULL;
701 dest->flags = idx;
702 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
703 shdr->bfd_section->flags
704 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
705 break;
706 }
707 if (idx < shnum)
708 {
709 dest->shdr = elf_elfsections (abfd)[idx];
710 /* PR binutils/23199: All sections in a
711 section group should be marked with
712 SHF_GROUP. But some tools generate
713 broken objects without SHF_GROUP. Fix
714 them up here. */
715 dest->shdr->sh_flags |= SHF_GROUP;
716 }
717 if (idx >= shnum
718 || dest->shdr->sh_type == SHT_GROUP)
719 {
720 _bfd_error_handler
721 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
722 abfd, i);
723 dest->shdr = NULL;
724 }
725 }
726 }
727 }
728
729 /* PR 17510: Corrupt binaries might contain invalid groups. */
730 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
731 {
732 elf_tdata (abfd)->num_group = num_group;
733
734 /* If all groups are invalid then fail. */
735 if (num_group == 0)
736 {
737 elf_tdata (abfd)->group_sect_ptr = NULL;
738 elf_tdata (abfd)->num_group = num_group = -1;
739 _bfd_error_handler
740 (_("%pB: no valid group sections found"), abfd);
741 bfd_set_error (bfd_error_bad_value);
742 }
743 }
744 }
745 }
746
747 if (num_group != (unsigned) -1)
748 {
749 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
750 unsigned int j;
751
752 for (j = 0; j < num_group; j++)
753 {
754 /* Begin search from previous found group. */
755 unsigned i = (j + search_offset) % num_group;
756
757 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
758 Elf_Internal_Group *idx;
759 bfd_size_type n_elt;
760
761 if (shdr == NULL)
762 continue;
763
764 idx = (Elf_Internal_Group *) shdr->contents;
765 if (idx == NULL || shdr->sh_size < 4)
766 {
767 /* See PR 21957 for a reproducer. */
768 /* xgettext:c-format */
769 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
770 abfd, shdr->bfd_section);
771 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
772 bfd_set_error (bfd_error_bad_value);
773 return false;
774 }
775 n_elt = shdr->sh_size / 4;
776
777 /* Look through this group's sections to see if current
778 section is a member. */
779 while (--n_elt != 0)
780 if ((++idx)->shdr == hdr)
781 {
782 asection *s = NULL;
783
784 /* We are a member of this group. Go looking through
785 other members to see if any others are linked via
786 next_in_group. */
787 idx = (Elf_Internal_Group *) shdr->contents;
788 n_elt = shdr->sh_size / 4;
789 while (--n_elt != 0)
790 if ((++idx)->shdr != NULL
791 && (s = idx->shdr->bfd_section) != NULL
792 && elf_next_in_group (s) != NULL)
793 break;
794 if (n_elt != 0)
795 {
796 /* Snarf the group name from other member, and
797 insert current section in circular list. */
798 elf_group_name (newsect) = elf_group_name (s);
799 elf_next_in_group (newsect) = elf_next_in_group (s);
800 elf_next_in_group (s) = newsect;
801 }
802 else
803 {
804 const char *gname;
805
806 gname = group_signature (abfd, shdr);
807 if (gname == NULL)
808 return false;
809 elf_group_name (newsect) = gname;
810
811 /* Start a circular list with one element. */
812 elf_next_in_group (newsect) = newsect;
813 }
814
815 /* If the group section has been created, point to the
816 new member. */
817 if (shdr->bfd_section != NULL)
818 elf_next_in_group (shdr->bfd_section) = newsect;
819
820 elf_tdata (abfd)->group_search_offset = i;
821 j = num_group - 1;
822 break;
823 }
824 }
825 }
826
827 if (elf_group_name (newsect) == NULL)
828 {
829 /* xgettext:c-format */
830 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
831 abfd, newsect);
832 return false;
833 }
834 return true;
835 }
836
837 bool
838 _bfd_elf_setup_sections (bfd *abfd)
839 {
840 unsigned int i;
841 unsigned int num_group = elf_tdata (abfd)->num_group;
842 bool result = true;
843 asection *s;
844
845 /* Process SHF_LINK_ORDER. */
846 for (s = abfd->sections; s != NULL; s = s->next)
847 {
848 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
849 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
850 {
851 unsigned int elfsec = this_hdr->sh_link;
852 /* An sh_link value of 0 is now allowed. It indicates that linked
853 to section has already been discarded, but that the current
854 section has been retained for some other reason. This linking
855 section is still a candidate for later garbage collection
856 however. */
857 if (elfsec == 0)
858 {
859 elf_linked_to_section (s) = NULL;
860 }
861 else
862 {
863 asection *linksec = NULL;
864
865 if (elfsec < elf_numsections (abfd))
866 {
867 this_hdr = elf_elfsections (abfd)[elfsec];
868 linksec = this_hdr->bfd_section;
869 }
870
871 /* PR 1991, 2008:
872 Some strip/objcopy may leave an incorrect value in
873 sh_link. We don't want to proceed. */
874 if (linksec == NULL)
875 {
876 _bfd_error_handler
877 /* xgettext:c-format */
878 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
879 s->owner, elfsec, s);
880 result = false;
881 }
882
883 elf_linked_to_section (s) = linksec;
884 }
885 }
886 else if (this_hdr->sh_type == SHT_GROUP
887 && elf_next_in_group (s) == NULL)
888 {
889 _bfd_error_handler
890 /* xgettext:c-format */
891 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
892 abfd, elf_section_data (s)->this_idx);
893 result = false;
894 }
895 }
896
897 /* Process section groups. */
898 if (num_group == (unsigned) -1)
899 return result;
900
901 for (i = 0; i < num_group; i++)
902 {
903 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
904 Elf_Internal_Group *idx;
905 unsigned int n_elt;
906
907 /* PR binutils/18758: Beware of corrupt binaries with invalid group data. */
908 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
909 {
910 _bfd_error_handler
911 /* xgettext:c-format */
912 (_("%pB: section group entry number %u is corrupt"),
913 abfd, i);
914 result = false;
915 continue;
916 }
917
918 idx = (Elf_Internal_Group *) shdr->contents;
919 n_elt = shdr->sh_size / 4;
920
921 while (--n_elt != 0)
922 {
923 ++ idx;
924
925 if (idx->shdr == NULL)
926 continue;
927 else if (idx->shdr->bfd_section)
928 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
929 else if (idx->shdr->sh_type != SHT_RELA
930 && idx->shdr->sh_type != SHT_REL)
931 {
932 /* There are some unknown sections in the group. */
933 _bfd_error_handler
934 /* xgettext:c-format */
935 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
936 abfd,
937 idx->shdr->sh_type,
938 bfd_elf_string_from_elf_section (abfd,
939 (elf_elfheader (abfd)
940 ->e_shstrndx),
941 idx->shdr->sh_name),
942 shdr->bfd_section);
943 result = false;
944 }
945 }
946 }
947
948 return result;
949 }
950
951 bool
952 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
953 {
954 return elf_next_in_group (sec) != NULL;
955 }
956
957 const char *
958 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
959 {
960 if (elf_sec_group (sec) != NULL)
961 return elf_group_name (sec);
962 return NULL;
963 }
964
965 static char *
966 convert_debug_to_zdebug (bfd *abfd, const char *name)
967 {
968 unsigned int len = strlen (name);
969 char *new_name = bfd_alloc (abfd, len + 2);
970 if (new_name == NULL)
971 return NULL;
972 new_name[0] = '.';
973 new_name[1] = 'z';
974 memcpy (new_name + 2, name + 1, len);
975 return new_name;
976 }
977
978 static char *
979 convert_zdebug_to_debug (bfd *abfd, const char *name)
980 {
981 unsigned int len = strlen (name);
982 char *new_name = bfd_alloc (abfd, len);
983 if (new_name == NULL)
984 return NULL;
985 new_name[0] = '.';
986 memcpy (new_name + 1, name + 2, len - 1);
987 return new_name;
988 }
989
990 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
991
992 struct lto_section
993 {
994 int16_t major_version;
995 int16_t minor_version;
996 unsigned char slim_object;
997
998 /* Flags is a private field that is not defined publicly. */
999 uint16_t flags;
1000 };
1001
1002 /* Make a BFD section from an ELF section. We store a pointer to the
1003 BFD section in the bfd_section field of the header. */
1004
1005 bool
1006 _bfd_elf_make_section_from_shdr (bfd *abfd,
1007 Elf_Internal_Shdr *hdr,
1008 const char *name,
1009 int shindex)
1010 {
1011 asection *newsect;
1012 flagword flags;
1013 const struct elf_backend_data *bed;
1014 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
1015
1016 if (hdr->bfd_section != NULL)
1017 return true;
1018
1019 newsect = bfd_make_section_anyway (abfd, name);
1020 if (newsect == NULL)
1021 return false;
1022
1023 hdr->bfd_section = newsect;
1024 elf_section_data (newsect)->this_hdr = *hdr;
1025 elf_section_data (newsect)->this_idx = shindex;
1026
1027 /* Always use the real type/flags. */
1028 elf_section_type (newsect) = hdr->sh_type;
1029 elf_section_flags (newsect) = hdr->sh_flags;
1030
1031 newsect->filepos = hdr->sh_offset;
1032
1033 flags = SEC_NO_FLAGS;
1034 if (hdr->sh_type != SHT_NOBITS)
1035 flags |= SEC_HAS_CONTENTS;
1036 if (hdr->sh_type == SHT_GROUP)
1037 flags |= SEC_GROUP;
1038 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1039 {
1040 flags |= SEC_ALLOC;
1041 if (hdr->sh_type != SHT_NOBITS)
1042 flags |= SEC_LOAD;
1043 }
1044 if ((hdr->sh_flags & SHF_WRITE) == 0)
1045 flags |= SEC_READONLY;
1046 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1047 flags |= SEC_CODE;
1048 else if ((flags & SEC_LOAD) != 0)
1049 flags |= SEC_DATA;
1050 if ((hdr->sh_flags & SHF_MERGE) != 0)
1051 {
1052 flags |= SEC_MERGE;
1053 newsect->entsize = hdr->sh_entsize;
1054 }
1055 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1056 flags |= SEC_STRINGS;
1057 if (hdr->sh_flags & SHF_GROUP)
1058 if (!setup_group (abfd, hdr, newsect))
1059 return false;
1060 if ((hdr->sh_flags & SHF_TLS) != 0)
1061 flags |= SEC_THREAD_LOCAL;
1062 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1063 flags |= SEC_EXCLUDE;
1064
1065 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1066 {
1067 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1068 but binutils as of 2019-07-23 did not set the EI_OSABI header
1069 byte. */
1070 case ELFOSABI_GNU:
1071 case ELFOSABI_FREEBSD:
1072 if ((hdr->sh_flags & SHF_GNU_RETAIN) != 0)
1073 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_retain;
1074 /* Fall through */
1075 case ELFOSABI_NONE:
1076 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1077 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1078 break;
1079 }
1080
1081 if ((flags & SEC_ALLOC) == 0)
1082 {
1083 /* The debugging sections appear to be recognized only by name,
1084 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1085 if (name [0] == '.')
1086 {
1087 if (startswith (name, ".debug")
1088 || startswith (name, ".gnu.debuglto_.debug_")
1089 || startswith (name, ".gnu.linkonce.wi.")
1090 || startswith (name, ".zdebug"))
1091 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1092 else if (startswith (name, GNU_BUILD_ATTRS_SECTION_NAME)
1093 || startswith (name, ".note.gnu"))
1094 {
1095 flags |= SEC_ELF_OCTETS;
1096 opb = 1;
1097 }
1098 else if (startswith (name, ".line")
1099 || startswith (name, ".stab")
1100 || strcmp (name, ".gdb_index") == 0)
1101 flags |= SEC_DEBUGGING;
1102 }
1103 }
1104
1105 if (!bfd_set_section_vma (newsect, hdr->sh_addr / opb)
1106 || !bfd_set_section_size (newsect, hdr->sh_size)
1107 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign)))
1108 return false;
1109
1110 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1111 only link a single copy of the section. This is used to support
1112 g++. g++ will emit each template expansion in its own section.
1113 The symbols will be defined as weak, so that multiple definitions
1114 are permitted. The GNU linker extension is to actually discard
1115 all but one of the sections. */
1116 if (startswith (name, ".gnu.linkonce")
1117 && elf_next_in_group (newsect) == NULL)
1118 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1119
1120 if (!bfd_set_section_flags (newsect, flags))
1121 return false;
1122
1123 bed = get_elf_backend_data (abfd);
1124 if (bed->elf_backend_section_flags)
1125 if (!bed->elf_backend_section_flags (hdr))
1126 return false;
1127
1128 /* We do not parse the PT_NOTE segments as we are interested even in the
1129 separate debug info files which may have the segments offsets corrupted.
1130 PT_NOTEs from the core files are currently not parsed using BFD. */
1131 if (hdr->sh_type == SHT_NOTE)
1132 {
1133 bfd_byte *contents;
1134
1135 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1136 return false;
1137
1138 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1139 hdr->sh_offset, hdr->sh_addralign);
1140 free (contents);
1141 }
1142
1143 if ((newsect->flags & SEC_ALLOC) != 0)
1144 {
1145 Elf_Internal_Phdr *phdr;
1146 unsigned int i, nload;
1147
1148 /* Some ELF linkers produce binaries with all the program header
1149 p_paddr fields zero. If we have such a binary with more than
1150 one PT_LOAD header, then leave the section lma equal to vma
1151 so that we don't create sections with overlapping lma. */
1152 phdr = elf_tdata (abfd)->phdr;
1153 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1154 if (phdr->p_paddr != 0)
1155 break;
1156 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1157 ++nload;
1158 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1159 return true;
1160
1161 phdr = elf_tdata (abfd)->phdr;
1162 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1163 {
1164 if (((phdr->p_type == PT_LOAD
1165 && (hdr->sh_flags & SHF_TLS) == 0)
1166 || phdr->p_type == PT_TLS)
1167 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1168 {
1169 if ((newsect->flags & SEC_LOAD) == 0)
1170 newsect->lma = (phdr->p_paddr
1171 + hdr->sh_addr - phdr->p_vaddr) / opb;
1172 else
1173 /* We used to use the same adjustment for SEC_LOAD
1174 sections, but that doesn't work if the segment
1175 is packed with code from multiple VMAs.
1176 Instead we calculate the section LMA based on
1177 the segment LMA. It is assumed that the
1178 segment will contain sections with contiguous
1179 LMAs, even if the VMAs are not. */
1180 newsect->lma = (phdr->p_paddr
1181 + hdr->sh_offset - phdr->p_offset) / opb;
1182
1183 /* With contiguous segments, we can't tell from file
1184 offsets whether a section with zero size should
1185 be placed at the end of one segment or the
1186 beginning of the next. Decide based on vaddr. */
1187 if (hdr->sh_addr >= phdr->p_vaddr
1188 && (hdr->sh_addr + hdr->sh_size
1189 <= phdr->p_vaddr + phdr->p_memsz))
1190 break;
1191 }
1192 }
1193 }
1194
1195 /* Compress/decompress DWARF debug sections with names: .debug_* and
1196 .zdebug_*, after the section flags is set. */
1197 if ((newsect->flags & SEC_DEBUGGING)
1198 && ((name[1] == 'd' && name[6] == '_')
1199 || (name[1] == 'z' && name[7] == '_')))
1200 {
1201 enum { nothing, compress, decompress } action = nothing;
1202 int compression_header_size;
1203 bfd_size_type uncompressed_size;
1204 unsigned int uncompressed_align_power;
1205 bool compressed
1206 = bfd_is_section_compressed_with_header (abfd, newsect,
1207 &compression_header_size,
1208 &uncompressed_size,
1209 &uncompressed_align_power);
1210 if (compressed)
1211 {
1212 /* Compressed section. Check if we should decompress. */
1213 if ((abfd->flags & BFD_DECOMPRESS))
1214 action = decompress;
1215 }
1216
1217 /* Compress the uncompressed section or convert from/to .zdebug*
1218 section. Check if we should compress. */
1219 if (action == nothing)
1220 {
1221 if (newsect->size != 0
1222 && (abfd->flags & BFD_COMPRESS)
1223 && compression_header_size >= 0
1224 && uncompressed_size > 0
1225 && (!compressed
1226 || ((compression_header_size > 0)
1227 != ((abfd->flags & BFD_COMPRESS_GABI) != 0))))
1228 action = compress;
1229 else
1230 return true;
1231 }
1232
1233 if (action == compress)
1234 {
1235 if (!bfd_init_section_compress_status (abfd, newsect))
1236 {
1237 _bfd_error_handler
1238 /* xgettext:c-format */
1239 (_("%pB: unable to initialize compress status for section %s"),
1240 abfd, name);
1241 return false;
1242 }
1243 }
1244 else
1245 {
1246 if (!bfd_init_section_decompress_status (abfd, newsect))
1247 {
1248 _bfd_error_handler
1249 /* xgettext:c-format */
1250 (_("%pB: unable to initialize decompress status for section %s"),
1251 abfd, name);
1252 return false;
1253 }
1254 }
1255
1256 if (abfd->is_linker_input)
1257 {
1258 if (name[1] == 'z'
1259 && (action == decompress
1260 || (action == compress
1261 && (abfd->flags & BFD_COMPRESS_GABI) != 0)))
1262 {
1263 /* Convert section name from .zdebug_* to .debug_* so
1264 that linker will consider this section as a debug
1265 section. */
1266 char *new_name = convert_zdebug_to_debug (abfd, name);
1267 if (new_name == NULL)
1268 return false;
1269 bfd_rename_section (newsect, new_name);
1270 }
1271 }
1272 else
1273 /* For objdump, don't rename the section. For objcopy, delay
1274 section rename to elf_fake_sections. */
1275 newsect->flags |= SEC_ELF_RENAME;
1276 }
1277
1278 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1279 section. */
1280 if (startswith (name, ".gnu.lto_.lto."))
1281 {
1282 struct lto_section lsection;
1283 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1284 sizeof (struct lto_section)))
1285 abfd->lto_slim_object = lsection.slim_object;
1286 }
1287
1288 return true;
1289 }
1290
1291 const char *const bfd_elf_section_type_names[] =
1292 {
1293 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1294 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1295 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1296 };
1297
1298 /* ELF relocs are against symbols. If we are producing relocatable
1299 output, and the reloc is against an external symbol, and nothing
1300 has given us any additional addend, the resulting reloc will also
1301 be against the same symbol. In such a case, we don't want to
1302 change anything about the way the reloc is handled, since it will
1303 all be done at final link time. Rather than put special case code
1304 into bfd_perform_relocation, all the reloc types use this howto
1305 function, or should call this function for relocatable output. */
1306
1307 bfd_reloc_status_type
1308 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1309 arelent *reloc_entry,
1310 asymbol *symbol,
1311 void *data ATTRIBUTE_UNUSED,
1312 asection *input_section,
1313 bfd *output_bfd,
1314 char **error_message ATTRIBUTE_UNUSED)
1315 {
1316 if (output_bfd != NULL
1317 && (symbol->flags & BSF_SECTION_SYM) == 0
1318 && (! reloc_entry->howto->partial_inplace
1319 || reloc_entry->addend == 0))
1320 {
1321 reloc_entry->address += input_section->output_offset;
1322 return bfd_reloc_ok;
1323 }
1324
1325 /* In some cases the relocation should be treated as output section
1326 relative, as when linking ELF DWARF into PE COFF. Many ELF
1327 targets lack section relative relocations and instead use
1328 ordinary absolute relocations for references between DWARF
1329 sections. That is arguably a bug in those targets but it happens
1330 to work for the usual case of linking to non-loaded ELF debug
1331 sections with VMAs forced to zero. PE COFF on the other hand
1332 doesn't allow a section VMA of zero. */
1333 if (output_bfd == NULL
1334 && !reloc_entry->howto->pc_relative
1335 && (symbol->section->flags & SEC_DEBUGGING) != 0
1336 && (input_section->flags & SEC_DEBUGGING) != 0)
1337 reloc_entry->addend -= symbol->section->output_section->vma;
1338
1339 return bfd_reloc_continue;
1340 }
1341 \f
1342 /* Returns TRUE if section A matches section B.
1343 Names, addresses and links may be different, but everything else
1344 should be the same. */
1345
1346 static bool
1347 section_match (const Elf_Internal_Shdr * a,
1348 const Elf_Internal_Shdr * b)
1349 {
1350 if (a->sh_type != b->sh_type
1351 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1352 || a->sh_addralign != b->sh_addralign
1353 || a->sh_entsize != b->sh_entsize)
1354 return false;
1355 if (a->sh_type == SHT_SYMTAB
1356 || a->sh_type == SHT_STRTAB)
1357 return true;
1358 return a->sh_size == b->sh_size;
1359 }
1360
1361 /* Find a section in OBFD that has the same characteristics
1362 as IHEADER. Return the index of this section or SHN_UNDEF if
1363 none can be found. Check's section HINT first, as this is likely
1364 to be the correct section. */
1365
1366 static unsigned int
1367 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1368 const unsigned int hint)
1369 {
1370 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1371 unsigned int i;
1372
1373 BFD_ASSERT (iheader != NULL);
1374
1375 /* See PR 20922 for a reproducer of the NULL test. */
1376 if (hint < elf_numsections (obfd)
1377 && oheaders[hint] != NULL
1378 && section_match (oheaders[hint], iheader))
1379 return hint;
1380
1381 for (i = 1; i < elf_numsections (obfd); i++)
1382 {
1383 Elf_Internal_Shdr * oheader = oheaders[i];
1384
1385 if (oheader == NULL)
1386 continue;
1387 if (section_match (oheader, iheader))
1388 /* FIXME: Do we care if there is a potential for
1389 multiple matches ? */
1390 return i;
1391 }
1392
1393 return SHN_UNDEF;
1394 }
1395
1396 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1397 Processor specific section, based upon a matching input section.
1398 Returns TRUE upon success, FALSE otherwise. */
1399
1400 static bool
1401 copy_special_section_fields (const bfd *ibfd,
1402 bfd *obfd,
1403 const Elf_Internal_Shdr *iheader,
1404 Elf_Internal_Shdr *oheader,
1405 const unsigned int secnum)
1406 {
1407 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1408 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1409 bool changed = false;
1410 unsigned int sh_link;
1411
1412 if (oheader->sh_type == SHT_NOBITS)
1413 {
1414 /* This is a feature for objcopy --only-keep-debug:
1415 When a section's type is changed to NOBITS, we preserve
1416 the sh_link and sh_info fields so that they can be
1417 matched up with the original.
1418
1419 Note: Strictly speaking these assignments are wrong.
1420 The sh_link and sh_info fields should point to the
1421 relevent sections in the output BFD, which may not be in
1422 the same location as they were in the input BFD. But
1423 the whole point of this action is to preserve the
1424 original values of the sh_link and sh_info fields, so
1425 that they can be matched up with the section headers in
1426 the original file. So strictly speaking we may be
1427 creating an invalid ELF file, but it is only for a file
1428 that just contains debug info and only for sections
1429 without any contents. */
1430 if (oheader->sh_link == 0)
1431 oheader->sh_link = iheader->sh_link;
1432 if (oheader->sh_info == 0)
1433 oheader->sh_info = iheader->sh_info;
1434 return true;
1435 }
1436
1437 /* Allow the target a chance to decide how these fields should be set. */
1438 if (bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1439 iheader, oheader))
1440 return true;
1441
1442 /* We have an iheader which might match oheader, and which has non-zero
1443 sh_info and/or sh_link fields. Attempt to follow those links and find
1444 the section in the output bfd which corresponds to the linked section
1445 in the input bfd. */
1446 if (iheader->sh_link != SHN_UNDEF)
1447 {
1448 /* See PR 20931 for a reproducer. */
1449 if (iheader->sh_link >= elf_numsections (ibfd))
1450 {
1451 _bfd_error_handler
1452 /* xgettext:c-format */
1453 (_("%pB: invalid sh_link field (%d) in section number %d"),
1454 ibfd, iheader->sh_link, secnum);
1455 return false;
1456 }
1457
1458 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1459 if (sh_link != SHN_UNDEF)
1460 {
1461 oheader->sh_link = sh_link;
1462 changed = true;
1463 }
1464 else
1465 /* FIXME: Should we install iheader->sh_link
1466 if we could not find a match ? */
1467 _bfd_error_handler
1468 /* xgettext:c-format */
1469 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1470 }
1471
1472 if (iheader->sh_info)
1473 {
1474 /* The sh_info field can hold arbitrary information, but if the
1475 SHF_LINK_INFO flag is set then it should be interpreted as a
1476 section index. */
1477 if (iheader->sh_flags & SHF_INFO_LINK)
1478 {
1479 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1480 iheader->sh_info);
1481 if (sh_link != SHN_UNDEF)
1482 oheader->sh_flags |= SHF_INFO_LINK;
1483 }
1484 else
1485 /* No idea what it means - just copy it. */
1486 sh_link = iheader->sh_info;
1487
1488 if (sh_link != SHN_UNDEF)
1489 {
1490 oheader->sh_info = sh_link;
1491 changed = true;
1492 }
1493 else
1494 _bfd_error_handler
1495 /* xgettext:c-format */
1496 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1497 }
1498
1499 return changed;
1500 }
1501
1502 /* Copy the program header and other data from one object module to
1503 another. */
1504
1505 bool
1506 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1507 {
1508 const Elf_Internal_Shdr **iheaders = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1509 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1510 const struct elf_backend_data *bed;
1511 unsigned int i;
1512
1513 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1514 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1515 return true;
1516
1517 if (!elf_flags_init (obfd))
1518 {
1519 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1520 elf_flags_init (obfd) = true;
1521 }
1522
1523 elf_gp (obfd) = elf_gp (ibfd);
1524
1525 /* Also copy the EI_OSABI field. */
1526 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1527 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1528
1529 /* If set, copy the EI_ABIVERSION field. */
1530 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1531 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1532 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1533
1534 /* Copy object attributes. */
1535 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1536
1537 if (iheaders == NULL || oheaders == NULL)
1538 return true;
1539
1540 bed = get_elf_backend_data (obfd);
1541
1542 /* Possibly copy other fields in the section header. */
1543 for (i = 1; i < elf_numsections (obfd); i++)
1544 {
1545 unsigned int j;
1546 Elf_Internal_Shdr * oheader = oheaders[i];
1547
1548 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1549 because of a special case need for generating separate debug info
1550 files. See below for more details. */
1551 if (oheader == NULL
1552 || (oheader->sh_type != SHT_NOBITS
1553 && oheader->sh_type < SHT_LOOS))
1554 continue;
1555
1556 /* Ignore empty sections, and sections whose
1557 fields have already been initialised. */
1558 if (oheader->sh_size == 0
1559 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1560 continue;
1561
1562 /* Scan for the matching section in the input bfd.
1563 First we try for a direct mapping between the input and output sections. */
1564 for (j = 1; j < elf_numsections (ibfd); j++)
1565 {
1566 const Elf_Internal_Shdr * iheader = iheaders[j];
1567
1568 if (iheader == NULL)
1569 continue;
1570
1571 if (oheader->bfd_section != NULL
1572 && iheader->bfd_section != NULL
1573 && iheader->bfd_section->output_section != NULL
1574 && iheader->bfd_section->output_section == oheader->bfd_section)
1575 {
1576 /* We have found a connection from the input section to the
1577 output section. Attempt to copy the header fields. If
1578 this fails then do not try any further sections - there
1579 should only be a one-to-one mapping between input and output. */
1580 if (! copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1581 j = elf_numsections (ibfd);
1582 break;
1583 }
1584 }
1585
1586 if (j < elf_numsections (ibfd))
1587 continue;
1588
1589 /* That failed. So try to deduce the corresponding input section.
1590 Unfortunately we cannot compare names as the output string table
1591 is empty, so instead we check size, address and type. */
1592 for (j = 1; j < elf_numsections (ibfd); j++)
1593 {
1594 const Elf_Internal_Shdr * iheader = iheaders[j];
1595
1596 if (iheader == NULL)
1597 continue;
1598
1599 /* Try matching fields in the input section's header.
1600 Since --only-keep-debug turns all non-debug sections into
1601 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1602 input type. */
1603 if ((oheader->sh_type == SHT_NOBITS
1604 || iheader->sh_type == oheader->sh_type)
1605 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1606 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1607 && iheader->sh_addralign == oheader->sh_addralign
1608 && iheader->sh_entsize == oheader->sh_entsize
1609 && iheader->sh_size == oheader->sh_size
1610 && iheader->sh_addr == oheader->sh_addr
1611 && (iheader->sh_info != oheader->sh_info
1612 || iheader->sh_link != oheader->sh_link))
1613 {
1614 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1615 break;
1616 }
1617 }
1618
1619 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1620 {
1621 /* Final attempt. Call the backend copy function
1622 with a NULL input section. */
1623 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1624 NULL, oheader);
1625 }
1626 }
1627
1628 return true;
1629 }
1630
1631 static const char *
1632 get_segment_type (unsigned int p_type)
1633 {
1634 const char *pt;
1635 switch (p_type)
1636 {
1637 case PT_NULL: pt = "NULL"; break;
1638 case PT_LOAD: pt = "LOAD"; break;
1639 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1640 case PT_INTERP: pt = "INTERP"; break;
1641 case PT_NOTE: pt = "NOTE"; break;
1642 case PT_SHLIB: pt = "SHLIB"; break;
1643 case PT_PHDR: pt = "PHDR"; break;
1644 case PT_TLS: pt = "TLS"; break;
1645 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1646 case PT_GNU_STACK: pt = "STACK"; break;
1647 case PT_GNU_RELRO: pt = "RELRO"; break;
1648 default: pt = NULL; break;
1649 }
1650 return pt;
1651 }
1652
1653 /* Print out the program headers. */
1654
1655 bool
1656 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1657 {
1658 FILE *f = (FILE *) farg;
1659 Elf_Internal_Phdr *p;
1660 asection *s;
1661 bfd_byte *dynbuf = NULL;
1662
1663 p = elf_tdata (abfd)->phdr;
1664 if (p != NULL)
1665 {
1666 unsigned int i, c;
1667
1668 fprintf (f, _("\nProgram Header:\n"));
1669 c = elf_elfheader (abfd)->e_phnum;
1670 for (i = 0; i < c; i++, p++)
1671 {
1672 const char *pt = get_segment_type (p->p_type);
1673 char buf[20];
1674
1675 if (pt == NULL)
1676 {
1677 sprintf (buf, "0x%lx", p->p_type);
1678 pt = buf;
1679 }
1680 fprintf (f, "%8s off 0x", pt);
1681 bfd_fprintf_vma (abfd, f, p->p_offset);
1682 fprintf (f, " vaddr 0x");
1683 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1684 fprintf (f, " paddr 0x");
1685 bfd_fprintf_vma (abfd, f, p->p_paddr);
1686 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1687 fprintf (f, " filesz 0x");
1688 bfd_fprintf_vma (abfd, f, p->p_filesz);
1689 fprintf (f, " memsz 0x");
1690 bfd_fprintf_vma (abfd, f, p->p_memsz);
1691 fprintf (f, " flags %c%c%c",
1692 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1693 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1694 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1695 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1696 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1697 fprintf (f, "\n");
1698 }
1699 }
1700
1701 s = bfd_get_section_by_name (abfd, ".dynamic");
1702 if (s != NULL)
1703 {
1704 unsigned int elfsec;
1705 unsigned long shlink;
1706 bfd_byte *extdyn, *extdynend;
1707 size_t extdynsize;
1708 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1709
1710 fprintf (f, _("\nDynamic Section:\n"));
1711
1712 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1713 goto error_return;
1714
1715 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1716 if (elfsec == SHN_BAD)
1717 goto error_return;
1718 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1719
1720 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1721 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1722
1723 extdyn = dynbuf;
1724 /* PR 17512: file: 6f427532. */
1725 if (s->size < extdynsize)
1726 goto error_return;
1727 extdynend = extdyn + s->size;
1728 /* PR 17512: file: id:000006,sig:06,src:000000,op:flip4,pos:5664.
1729 Fix range check. */
1730 for (; extdyn <= (extdynend - extdynsize); extdyn += extdynsize)
1731 {
1732 Elf_Internal_Dyn dyn;
1733 const char *name = "";
1734 char ab[20];
1735 bool stringp;
1736 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1737
1738 (*swap_dyn_in) (abfd, extdyn, &dyn);
1739
1740 if (dyn.d_tag == DT_NULL)
1741 break;
1742
1743 stringp = false;
1744 switch (dyn.d_tag)
1745 {
1746 default:
1747 if (bed->elf_backend_get_target_dtag)
1748 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1749
1750 if (!strcmp (name, ""))
1751 {
1752 sprintf (ab, "%#" BFD_VMA_FMT "x", dyn.d_tag);
1753 name = ab;
1754 }
1755 break;
1756
1757 case DT_NEEDED: name = "NEEDED"; stringp = true; break;
1758 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1759 case DT_PLTGOT: name = "PLTGOT"; break;
1760 case DT_HASH: name = "HASH"; break;
1761 case DT_STRTAB: name = "STRTAB"; break;
1762 case DT_SYMTAB: name = "SYMTAB"; break;
1763 case DT_RELA: name = "RELA"; break;
1764 case DT_RELASZ: name = "RELASZ"; break;
1765 case DT_RELAENT: name = "RELAENT"; break;
1766 case DT_STRSZ: name = "STRSZ"; break;
1767 case DT_SYMENT: name = "SYMENT"; break;
1768 case DT_INIT: name = "INIT"; break;
1769 case DT_FINI: name = "FINI"; break;
1770 case DT_SONAME: name = "SONAME"; stringp = true; break;
1771 case DT_RPATH: name = "RPATH"; stringp = true; break;
1772 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1773 case DT_REL: name = "REL"; break;
1774 case DT_RELSZ: name = "RELSZ"; break;
1775 case DT_RELENT: name = "RELENT"; break;
1776 case DT_RELR: name = "RELR"; break;
1777 case DT_RELRSZ: name = "RELRSZ"; break;
1778 case DT_RELRENT: name = "RELRENT"; break;
1779 case DT_PLTREL: name = "PLTREL"; break;
1780 case DT_DEBUG: name = "DEBUG"; break;
1781 case DT_TEXTREL: name = "TEXTREL"; break;
1782 case DT_JMPREL: name = "JMPREL"; break;
1783 case DT_BIND_NOW: name = "BIND_NOW"; break;
1784 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1785 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1786 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1787 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1788 case DT_RUNPATH: name = "RUNPATH"; stringp = true; break;
1789 case DT_FLAGS: name = "FLAGS"; break;
1790 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1791 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1792 case DT_CHECKSUM: name = "CHECKSUM"; break;
1793 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1794 case DT_MOVEENT: name = "MOVEENT"; break;
1795 case DT_MOVESZ: name = "MOVESZ"; break;
1796 case DT_FEATURE: name = "FEATURE"; break;
1797 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1798 case DT_SYMINSZ: name = "SYMINSZ"; break;
1799 case DT_SYMINENT: name = "SYMINENT"; break;
1800 case DT_CONFIG: name = "CONFIG"; stringp = true; break;
1801 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = true; break;
1802 case DT_AUDIT: name = "AUDIT"; stringp = true; break;
1803 case DT_PLTPAD: name = "PLTPAD"; break;
1804 case DT_MOVETAB: name = "MOVETAB"; break;
1805 case DT_SYMINFO: name = "SYMINFO"; break;
1806 case DT_RELACOUNT: name = "RELACOUNT"; break;
1807 case DT_RELCOUNT: name = "RELCOUNT"; break;
1808 case DT_FLAGS_1: name = "FLAGS_1"; break;
1809 case DT_VERSYM: name = "VERSYM"; break;
1810 case DT_VERDEF: name = "VERDEF"; break;
1811 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1812 case DT_VERNEED: name = "VERNEED"; break;
1813 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1814 case DT_AUXILIARY: name = "AUXILIARY"; stringp = true; break;
1815 case DT_USED: name = "USED"; break;
1816 case DT_FILTER: name = "FILTER"; stringp = true; break;
1817 case DT_GNU_HASH: name = "GNU_HASH"; break;
1818 }
1819
1820 fprintf (f, " %-20s ", name);
1821 if (! stringp)
1822 {
1823 fprintf (f, "0x");
1824 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1825 }
1826 else
1827 {
1828 const char *string;
1829 unsigned int tagv = dyn.d_un.d_val;
1830
1831 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1832 if (string == NULL)
1833 goto error_return;
1834 fprintf (f, "%s", string);
1835 }
1836 fprintf (f, "\n");
1837 }
1838
1839 free (dynbuf);
1840 dynbuf = NULL;
1841 }
1842
1843 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1844 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1845 {
1846 if (! _bfd_elf_slurp_version_tables (abfd, false))
1847 return false;
1848 }
1849
1850 if (elf_dynverdef (abfd) != 0)
1851 {
1852 Elf_Internal_Verdef *t;
1853
1854 fprintf (f, _("\nVersion definitions:\n"));
1855 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1856 {
1857 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1858 t->vd_flags, t->vd_hash,
1859 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1860 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1861 {
1862 Elf_Internal_Verdaux *a;
1863
1864 fprintf (f, "\t");
1865 for (a = t->vd_auxptr->vda_nextptr;
1866 a != NULL;
1867 a = a->vda_nextptr)
1868 fprintf (f, "%s ",
1869 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1870 fprintf (f, "\n");
1871 }
1872 }
1873 }
1874
1875 if (elf_dynverref (abfd) != 0)
1876 {
1877 Elf_Internal_Verneed *t;
1878
1879 fprintf (f, _("\nVersion References:\n"));
1880 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1881 {
1882 Elf_Internal_Vernaux *a;
1883
1884 fprintf (f, _(" required from %s:\n"),
1885 t->vn_filename ? t->vn_filename : "<corrupt>");
1886 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1887 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1888 a->vna_flags, a->vna_other,
1889 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1890 }
1891 }
1892
1893 return true;
1894
1895 error_return:
1896 free (dynbuf);
1897 return false;
1898 }
1899
1900 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1901 and return symbol version for symbol version itself. */
1902
1903 const char *
1904 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1905 bool base_p,
1906 bool *hidden)
1907 {
1908 const char *version_string = NULL;
1909 if (elf_dynversym (abfd) != 0
1910 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1911 {
1912 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1913
1914 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1915 vernum &= VERSYM_VERSION;
1916
1917 if (vernum == 0)
1918 version_string = "";
1919 else if (vernum == 1
1920 && (vernum > elf_tdata (abfd)->cverdefs
1921 || (elf_tdata (abfd)->verdef[0].vd_flags
1922 == VER_FLG_BASE)))
1923 version_string = base_p ? "Base" : "";
1924 else if (vernum <= elf_tdata (abfd)->cverdefs)
1925 {
1926 const char *nodename
1927 = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1928 version_string = "";
1929 if (base_p
1930 || nodename == NULL
1931 || symbol->name == NULL
1932 || strcmp (symbol->name, nodename) != 0)
1933 version_string = nodename;
1934 }
1935 else
1936 {
1937 Elf_Internal_Verneed *t;
1938
1939 version_string = _("<corrupt>");
1940 for (t = elf_tdata (abfd)->verref;
1941 t != NULL;
1942 t = t->vn_nextref)
1943 {
1944 Elf_Internal_Vernaux *a;
1945
1946 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1947 {
1948 if (a->vna_other == vernum)
1949 {
1950 *hidden = true;
1951 version_string = a->vna_nodename;
1952 break;
1953 }
1954 }
1955 }
1956 }
1957 }
1958 return version_string;
1959 }
1960
1961 /* Display ELF-specific fields of a symbol. */
1962
1963 void
1964 bfd_elf_print_symbol (bfd *abfd,
1965 void *filep,
1966 asymbol *symbol,
1967 bfd_print_symbol_type how)
1968 {
1969 FILE *file = (FILE *) filep;
1970 switch (how)
1971 {
1972 case bfd_print_symbol_name:
1973 fprintf (file, "%s", symbol->name);
1974 break;
1975 case bfd_print_symbol_more:
1976 fprintf (file, "elf ");
1977 bfd_fprintf_vma (abfd, file, symbol->value);
1978 fprintf (file, " %x", symbol->flags);
1979 break;
1980 case bfd_print_symbol_all:
1981 {
1982 const char *section_name;
1983 const char *name = NULL;
1984 const struct elf_backend_data *bed;
1985 unsigned char st_other;
1986 bfd_vma val;
1987 const char *version_string;
1988 bool hidden;
1989
1990 section_name = symbol->section ? symbol->section->name : "(*none*)";
1991
1992 bed = get_elf_backend_data (abfd);
1993 if (bed->elf_backend_print_symbol_all)
1994 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1995
1996 if (name == NULL)
1997 {
1998 name = symbol->name;
1999 bfd_print_symbol_vandf (abfd, file, symbol);
2000 }
2001
2002 fprintf (file, " %s\t", section_name);
2003 /* Print the "other" value for a symbol. For common symbols,
2004 we've already printed the size; now print the alignment.
2005 For other symbols, we have no specified alignment, and
2006 we've printed the address; now print the size. */
2007 if (symbol->section && bfd_is_com_section (symbol->section))
2008 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
2009 else
2010 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
2011 bfd_fprintf_vma (abfd, file, val);
2012
2013 /* If we have version information, print it. */
2014 version_string = _bfd_elf_get_symbol_version_string (abfd,
2015 symbol,
2016 true,
2017 &hidden);
2018 if (version_string)
2019 {
2020 if (!hidden)
2021 fprintf (file, " %-11s", version_string);
2022 else
2023 {
2024 int i;
2025
2026 fprintf (file, " (%s)", version_string);
2027 for (i = 10 - strlen (version_string); i > 0; --i)
2028 putc (' ', file);
2029 }
2030 }
2031
2032 /* If the st_other field is not zero, print it. */
2033 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2034
2035 switch (st_other)
2036 {
2037 case 0: break;
2038 case STV_INTERNAL: fprintf (file, " .internal"); break;
2039 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2040 case STV_PROTECTED: fprintf (file, " .protected"); break;
2041 default:
2042 /* Some other non-defined flags are also present, so print
2043 everything hex. */
2044 fprintf (file, " 0x%02x", (unsigned int) st_other);
2045 }
2046
2047 fprintf (file, " %s", name);
2048 }
2049 break;
2050 }
2051 }
2052 \f
2053 /* ELF .o/exec file reading */
2054
2055 /* Create a new bfd section from an ELF section header. */
2056
2057 bool
2058 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2059 {
2060 Elf_Internal_Shdr *hdr;
2061 Elf_Internal_Ehdr *ehdr;
2062 const struct elf_backend_data *bed;
2063 const char *name;
2064 bool ret = true;
2065
2066 if (shindex >= elf_numsections (abfd))
2067 return false;
2068
2069 /* PR17512: A corrupt ELF binary might contain a loop of sections via
2070 sh_link or sh_info. Detect this here, by refusing to load a
2071 section that we are already in the process of loading. */
2072 if (elf_tdata (abfd)->being_created[shindex])
2073 {
2074 _bfd_error_handler
2075 (_("%pB: warning: loop in section dependencies detected"), abfd);
2076 return false;
2077 }
2078 elf_tdata (abfd)->being_created[shindex] = true;
2079
2080 hdr = elf_elfsections (abfd)[shindex];
2081 ehdr = elf_elfheader (abfd);
2082 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2083 hdr->sh_name);
2084 if (name == NULL)
2085 goto fail;
2086
2087 bed = get_elf_backend_data (abfd);
2088 switch (hdr->sh_type)
2089 {
2090 case SHT_NULL:
2091 /* Inactive section. Throw it away. */
2092 goto success;
2093
2094 case SHT_PROGBITS: /* Normal section with contents. */
2095 case SHT_NOBITS: /* .bss section. */
2096 case SHT_HASH: /* .hash section. */
2097 case SHT_NOTE: /* .note section. */
2098 case SHT_INIT_ARRAY: /* .init_array section. */
2099 case SHT_FINI_ARRAY: /* .fini_array section. */
2100 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2101 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2102 case SHT_GNU_HASH: /* .gnu.hash section. */
2103 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2104 goto success;
2105
2106 case SHT_DYNAMIC: /* Dynamic linking information. */
2107 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2108 goto fail;
2109
2110 if (hdr->sh_link > elf_numsections (abfd))
2111 {
2112 /* PR 10478: Accept Solaris binaries with a sh_link
2113 field set to SHN_BEFORE or SHN_AFTER. */
2114 switch (bfd_get_arch (abfd))
2115 {
2116 case bfd_arch_i386:
2117 case bfd_arch_sparc:
2118 if (hdr->sh_link == (SHN_LORESERVE & 0xffff) /* SHN_BEFORE */
2119 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff) /* SHN_AFTER */)
2120 break;
2121 /* Otherwise fall through. */
2122 default:
2123 goto fail;
2124 }
2125 }
2126 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2127 goto fail;
2128 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2129 {
2130 Elf_Internal_Shdr *dynsymhdr;
2131
2132 /* The shared libraries distributed with hpux11 have a bogus
2133 sh_link field for the ".dynamic" section. Find the
2134 string table for the ".dynsym" section instead. */
2135 if (elf_dynsymtab (abfd) != 0)
2136 {
2137 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2138 hdr->sh_link = dynsymhdr->sh_link;
2139 }
2140 else
2141 {
2142 unsigned int i, num_sec;
2143
2144 num_sec = elf_numsections (abfd);
2145 for (i = 1; i < num_sec; i++)
2146 {
2147 dynsymhdr = elf_elfsections (abfd)[i];
2148 if (dynsymhdr->sh_type == SHT_DYNSYM)
2149 {
2150 hdr->sh_link = dynsymhdr->sh_link;
2151 break;
2152 }
2153 }
2154 }
2155 }
2156 goto success;
2157
2158 case SHT_SYMTAB: /* A symbol table. */
2159 if (elf_onesymtab (abfd) == shindex)
2160 goto success;
2161
2162 if (hdr->sh_entsize != bed->s->sizeof_sym)
2163 goto fail;
2164
2165 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2166 {
2167 if (hdr->sh_size != 0)
2168 goto fail;
2169 /* Some assemblers erroneously set sh_info to one with a
2170 zero sh_size. ld sees this as a global symbol count
2171 of (unsigned) -1. Fix it here. */
2172 hdr->sh_info = 0;
2173 goto success;
2174 }
2175
2176 /* PR 18854: A binary might contain more than one symbol table.
2177 Unusual, but possible. Warn, but continue. */
2178 if (elf_onesymtab (abfd) != 0)
2179 {
2180 _bfd_error_handler
2181 /* xgettext:c-format */
2182 (_("%pB: warning: multiple symbol tables detected"
2183 " - ignoring the table in section %u"),
2184 abfd, shindex);
2185 goto success;
2186 }
2187 elf_onesymtab (abfd) = shindex;
2188 elf_symtab_hdr (abfd) = *hdr;
2189 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2190 abfd->flags |= HAS_SYMS;
2191
2192 /* Sometimes a shared object will map in the symbol table. If
2193 SHF_ALLOC is set, and this is a shared object, then we also
2194 treat this section as a BFD section. We can not base the
2195 decision purely on SHF_ALLOC, because that flag is sometimes
2196 set in a relocatable object file, which would confuse the
2197 linker. */
2198 if ((hdr->sh_flags & SHF_ALLOC) != 0
2199 && (abfd->flags & DYNAMIC) != 0
2200 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2201 shindex))
2202 goto fail;
2203
2204 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2205 can't read symbols without that section loaded as well. It
2206 is most likely specified by the next section header. */
2207 {
2208 elf_section_list * entry;
2209 unsigned int i, num_sec;
2210
2211 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2212 if (entry->hdr.sh_link == shindex)
2213 goto success;
2214
2215 num_sec = elf_numsections (abfd);
2216 for (i = shindex + 1; i < num_sec; i++)
2217 {
2218 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2219
2220 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2221 && hdr2->sh_link == shindex)
2222 break;
2223 }
2224
2225 if (i == num_sec)
2226 for (i = 1; i < shindex; i++)
2227 {
2228 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2229
2230 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2231 && hdr2->sh_link == shindex)
2232 break;
2233 }
2234
2235 if (i != shindex)
2236 ret = bfd_section_from_shdr (abfd, i);
2237 /* else FIXME: we have failed to find the symbol table - should we issue an error ? */
2238 goto success;
2239 }
2240
2241 case SHT_DYNSYM: /* A dynamic symbol table. */
2242 if (elf_dynsymtab (abfd) == shindex)
2243 goto success;
2244
2245 if (hdr->sh_entsize != bed->s->sizeof_sym)
2246 goto fail;
2247
2248 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2249 {
2250 if (hdr->sh_size != 0)
2251 goto fail;
2252
2253 /* Some linkers erroneously set sh_info to one with a
2254 zero sh_size. ld sees this as a global symbol count
2255 of (unsigned) -1. Fix it here. */
2256 hdr->sh_info = 0;
2257 goto success;
2258 }
2259
2260 /* PR 18854: A binary might contain more than one dynamic symbol table.
2261 Unusual, but possible. Warn, but continue. */
2262 if (elf_dynsymtab (abfd) != 0)
2263 {
2264 _bfd_error_handler
2265 /* xgettext:c-format */
2266 (_("%pB: warning: multiple dynamic symbol tables detected"
2267 " - ignoring the table in section %u"),
2268 abfd, shindex);
2269 goto success;
2270 }
2271 elf_dynsymtab (abfd) = shindex;
2272 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2273 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2274 abfd->flags |= HAS_SYMS;
2275
2276 /* Besides being a symbol table, we also treat this as a regular
2277 section, so that objcopy can handle it. */
2278 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2279 goto success;
2280
2281 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2282 {
2283 elf_section_list * entry;
2284
2285 for (entry = elf_symtab_shndx_list (abfd); entry != NULL; entry = entry->next)
2286 if (entry->ndx == shindex)
2287 goto success;
2288
2289 entry = bfd_alloc (abfd, sizeof (*entry));
2290 if (entry == NULL)
2291 goto fail;
2292 entry->ndx = shindex;
2293 entry->hdr = * hdr;
2294 entry->next = elf_symtab_shndx_list (abfd);
2295 elf_symtab_shndx_list (abfd) = entry;
2296 elf_elfsections (abfd)[shindex] = & entry->hdr;
2297 goto success;
2298 }
2299
2300 case SHT_STRTAB: /* A string table. */
2301 if (hdr->bfd_section != NULL)
2302 goto success;
2303
2304 if (ehdr->e_shstrndx == shindex)
2305 {
2306 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2307 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2308 goto success;
2309 }
2310
2311 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2312 {
2313 symtab_strtab:
2314 elf_tdata (abfd)->strtab_hdr = *hdr;
2315 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2316 goto success;
2317 }
2318
2319 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2320 {
2321 dynsymtab_strtab:
2322 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2323 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2324 elf_elfsections (abfd)[shindex] = hdr;
2325 /* We also treat this as a regular section, so that objcopy
2326 can handle it. */
2327 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2328 shindex);
2329 goto success;
2330 }
2331
2332 /* If the string table isn't one of the above, then treat it as a
2333 regular section. We need to scan all the headers to be sure,
2334 just in case this strtab section appeared before the above. */
2335 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2336 {
2337 unsigned int i, num_sec;
2338
2339 num_sec = elf_numsections (abfd);
2340 for (i = 1; i < num_sec; i++)
2341 {
2342 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2343 if (hdr2->sh_link == shindex)
2344 {
2345 /* Prevent endless recursion on broken objects. */
2346 if (i == shindex)
2347 goto fail;
2348 if (! bfd_section_from_shdr (abfd, i))
2349 goto fail;
2350 if (elf_onesymtab (abfd) == i)
2351 goto symtab_strtab;
2352 if (elf_dynsymtab (abfd) == i)
2353 goto dynsymtab_strtab;
2354 }
2355 }
2356 }
2357 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2358 goto success;
2359
2360 case SHT_REL:
2361 case SHT_RELA:
2362 /* *These* do a lot of work -- but build no sections! */
2363 {
2364 asection *target_sect;
2365 Elf_Internal_Shdr *hdr2, **p_hdr;
2366 unsigned int num_sec = elf_numsections (abfd);
2367 struct bfd_elf_section_data *esdt;
2368
2369 if (hdr->sh_entsize
2370 != (bfd_size_type) (hdr->sh_type == SHT_REL
2371 ? bed->s->sizeof_rel : bed->s->sizeof_rela))
2372 goto fail;
2373
2374 /* Check for a bogus link to avoid crashing. */
2375 if (hdr->sh_link >= num_sec)
2376 {
2377 _bfd_error_handler
2378 /* xgettext:c-format */
2379 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2380 abfd, hdr->sh_link, name, shindex);
2381 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2382 shindex);
2383 goto success;
2384 }
2385
2386 /* For some incomprehensible reason Oracle distributes
2387 libraries for Solaris in which some of the objects have
2388 bogus sh_link fields. It would be nice if we could just
2389 reject them, but, unfortunately, some people need to use
2390 them. We scan through the section headers; if we find only
2391 one suitable symbol table, we clobber the sh_link to point
2392 to it. I hope this doesn't break anything.
2393
2394 Don't do it on executable nor shared library. */
2395 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0
2396 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_SYMTAB
2397 && elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_DYNSYM)
2398 {
2399 unsigned int scan;
2400 int found;
2401
2402 found = 0;
2403 for (scan = 1; scan < num_sec; scan++)
2404 {
2405 if (elf_elfsections (abfd)[scan]->sh_type == SHT_SYMTAB
2406 || elf_elfsections (abfd)[scan]->sh_type == SHT_DYNSYM)
2407 {
2408 if (found != 0)
2409 {
2410 found = 0;
2411 break;
2412 }
2413 found = scan;
2414 }
2415 }
2416 if (found != 0)
2417 hdr->sh_link = found;
2418 }
2419
2420 /* Get the symbol table. */
2421 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2422 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2423 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2424 goto fail;
2425
2426 /* If this is an alloc section in an executable or shared
2427 library, or the reloc section does not use the main symbol
2428 table we don't treat it as a reloc section. BFD can't
2429 adequately represent such a section, so at least for now,
2430 we don't try. We just present it as a normal section. We
2431 also can't use it as a reloc section if it points to the
2432 null section, an invalid section, another reloc section, or
2433 its sh_link points to the null section. */
2434 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2435 && (hdr->sh_flags & SHF_ALLOC) != 0)
2436 || hdr->sh_link == SHN_UNDEF
2437 || hdr->sh_link != elf_onesymtab (abfd)
2438 || hdr->sh_info == SHN_UNDEF
2439 || hdr->sh_info >= num_sec
2440 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2441 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2442 {
2443 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2444 shindex);
2445 goto success;
2446 }
2447
2448 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2449 goto fail;
2450
2451 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2452 if (target_sect == NULL)
2453 goto fail;
2454
2455 esdt = elf_section_data (target_sect);
2456 if (hdr->sh_type == SHT_RELA)
2457 p_hdr = &esdt->rela.hdr;
2458 else
2459 p_hdr = &esdt->rel.hdr;
2460
2461 /* PR 17512: file: 0b4f81b7.
2462 Also see PR 24456, for a file which deliberately has two reloc
2463 sections. */
2464 if (*p_hdr != NULL)
2465 {
2466 if (!bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2467 {
2468 _bfd_error_handler
2469 /* xgettext:c-format */
2470 (_("%pB: warning: secondary relocation section '%s' "
2471 "for section %pA found - ignoring"),
2472 abfd, name, target_sect);
2473 }
2474 else
2475 esdt->has_secondary_relocs = true;
2476 goto success;
2477 }
2478
2479 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2480 if (hdr2 == NULL)
2481 goto fail;
2482 *hdr2 = *hdr;
2483 *p_hdr = hdr2;
2484 elf_elfsections (abfd)[shindex] = hdr2;
2485 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2486 * bed->s->int_rels_per_ext_rel);
2487 target_sect->flags |= SEC_RELOC;
2488 target_sect->relocation = NULL;
2489 target_sect->rel_filepos = hdr->sh_offset;
2490 /* In the section to which the relocations apply, mark whether
2491 its relocations are of the REL or RELA variety. */
2492 if (hdr->sh_size != 0)
2493 {
2494 if (hdr->sh_type == SHT_RELA)
2495 target_sect->use_rela_p = 1;
2496 }
2497 abfd->flags |= HAS_RELOC;
2498 goto success;
2499 }
2500
2501 case SHT_GNU_verdef:
2502 elf_dynverdef (abfd) = shindex;
2503 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2504 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2505 goto success;
2506
2507 case SHT_GNU_versym:
2508 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2509 goto fail;
2510
2511 elf_dynversym (abfd) = shindex;
2512 elf_tdata (abfd)->dynversym_hdr = *hdr;
2513 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2514 goto success;
2515
2516 case SHT_GNU_verneed:
2517 elf_dynverref (abfd) = shindex;
2518 elf_tdata (abfd)->dynverref_hdr = *hdr;
2519 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2520 goto success;
2521
2522 case SHT_SHLIB:
2523 goto success;
2524
2525 case SHT_GROUP:
2526 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2527 goto fail;
2528
2529 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2530 goto fail;
2531
2532 goto success;
2533
2534 default:
2535 /* Possibly an attributes section. */
2536 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2537 || hdr->sh_type == bed->obj_attrs_section_type)
2538 {
2539 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2540 goto fail;
2541 _bfd_elf_parse_attributes (abfd, hdr);
2542 goto success;
2543 }
2544
2545 /* Check for any processor-specific section types. */
2546 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2547 goto success;
2548
2549 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2550 {
2551 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2552 /* FIXME: How to properly handle allocated section reserved
2553 for applications? */
2554 _bfd_error_handler
2555 /* xgettext:c-format */
2556 (_("%pB: unknown type [%#x] section `%s'"),
2557 abfd, hdr->sh_type, name);
2558 else
2559 {
2560 /* Allow sections reserved for applications. */
2561 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2562 shindex);
2563 goto success;
2564 }
2565 }
2566 else if (hdr->sh_type >= SHT_LOPROC
2567 && hdr->sh_type <= SHT_HIPROC)
2568 /* FIXME: We should handle this section. */
2569 _bfd_error_handler
2570 /* xgettext:c-format */
2571 (_("%pB: unknown type [%#x] section `%s'"),
2572 abfd, hdr->sh_type, name);
2573 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2574 {
2575 /* Unrecognised OS-specific sections. */
2576 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2577 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2578 required to correctly process the section and the file should
2579 be rejected with an error message. */
2580 _bfd_error_handler
2581 /* xgettext:c-format */
2582 (_("%pB: unknown type [%#x] section `%s'"),
2583 abfd, hdr->sh_type, name);
2584 else
2585 {
2586 /* Otherwise it should be processed. */
2587 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2588 goto success;
2589 }
2590 }
2591 else
2592 /* FIXME: We should handle this section. */
2593 _bfd_error_handler
2594 /* xgettext:c-format */
2595 (_("%pB: unknown type [%#x] section `%s'"),
2596 abfd, hdr->sh_type, name);
2597
2598 goto fail;
2599 }
2600
2601 fail:
2602 ret = false;
2603 success:
2604 elf_tdata (abfd)->being_created[shindex] = false;
2605 return ret;
2606 }
2607
2608 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2609
2610 Elf_Internal_Sym *
2611 bfd_sym_from_r_symndx (struct sym_cache *cache,
2612 bfd *abfd,
2613 unsigned long r_symndx)
2614 {
2615 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2616
2617 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2618 {
2619 Elf_Internal_Shdr *symtab_hdr;
2620 unsigned char esym[sizeof (Elf64_External_Sym)];
2621 Elf_External_Sym_Shndx eshndx;
2622
2623 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2624 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2625 &cache->sym[ent], esym, &eshndx) == NULL)
2626 return NULL;
2627
2628 if (cache->abfd != abfd)
2629 {
2630 memset (cache->indx, -1, sizeof (cache->indx));
2631 cache->abfd = abfd;
2632 }
2633 cache->indx[ent] = r_symndx;
2634 }
2635
2636 return &cache->sym[ent];
2637 }
2638
2639 /* Given an ELF section number, retrieve the corresponding BFD
2640 section. */
2641
2642 asection *
2643 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2644 {
2645 if (sec_index >= elf_numsections (abfd))
2646 return NULL;
2647 return elf_elfsections (abfd)[sec_index]->bfd_section;
2648 }
2649
2650 static const struct bfd_elf_special_section special_sections_b[] =
2651 {
2652 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2653 { NULL, 0, 0, 0, 0 }
2654 };
2655
2656 static const struct bfd_elf_special_section special_sections_c[] =
2657 {
2658 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2659 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2660 { NULL, 0, 0, 0, 0 }
2661 };
2662
2663 static const struct bfd_elf_special_section special_sections_d[] =
2664 {
2665 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2666 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2667 /* There are more DWARF sections than these, but they needn't be added here
2668 unless you have to cope with broken compilers that don't emit section
2669 attributes or you want to help the user writing assembler. */
2670 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2671 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2672 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2673 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2674 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2675 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2676 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2677 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2678 { NULL, 0, 0, 0, 0 }
2679 };
2680
2681 static const struct bfd_elf_special_section special_sections_f[] =
2682 {
2683 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2684 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2685 { NULL, 0 , 0, 0, 0 }
2686 };
2687
2688 static const struct bfd_elf_special_section special_sections_g[] =
2689 {
2690 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2691 { STRING_COMMA_LEN (".gnu.linkonce.n"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2692 { STRING_COMMA_LEN (".gnu.linkonce.p"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2693 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2694 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2695 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2696 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2697 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2698 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2699 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2700 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2701 { NULL, 0, 0, 0, 0 }
2702 };
2703
2704 static const struct bfd_elf_special_section special_sections_h[] =
2705 {
2706 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2707 { NULL, 0, 0, 0, 0 }
2708 };
2709
2710 static const struct bfd_elf_special_section special_sections_i[] =
2711 {
2712 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2713 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2714 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2715 { NULL, 0, 0, 0, 0 }
2716 };
2717
2718 static const struct bfd_elf_special_section special_sections_l[] =
2719 {
2720 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2721 { NULL, 0, 0, 0, 0 }
2722 };
2723
2724 static const struct bfd_elf_special_section special_sections_n[] =
2725 {
2726 { STRING_COMMA_LEN (".noinit"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2727 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2728 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2729 { NULL, 0, 0, 0, 0 }
2730 };
2731
2732 static const struct bfd_elf_special_section special_sections_p[] =
2733 {
2734 { STRING_COMMA_LEN (".persistent.bss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2735 { STRING_COMMA_LEN (".persistent"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2736 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2737 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2738 { NULL, 0, 0, 0, 0 }
2739 };
2740
2741 static const struct bfd_elf_special_section special_sections_r[] =
2742 {
2743 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2744 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2745 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2746 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2747 { NULL, 0, 0, 0, 0 }
2748 };
2749
2750 static const struct bfd_elf_special_section special_sections_s[] =
2751 {
2752 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2753 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2754 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2755 /* See struct bfd_elf_special_section declaration for the semantics of
2756 this special case where .prefix_length != strlen (.prefix). */
2757 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2758 { NULL, 0, 0, 0, 0 }
2759 };
2760
2761 static const struct bfd_elf_special_section special_sections_t[] =
2762 {
2763 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2764 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2765 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2766 { NULL, 0, 0, 0, 0 }
2767 };
2768
2769 static const struct bfd_elf_special_section special_sections_z[] =
2770 {
2771 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2772 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2773 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2774 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2775 { NULL, 0, 0, 0, 0 }
2776 };
2777
2778 static const struct bfd_elf_special_section * const special_sections[] =
2779 {
2780 special_sections_b, /* 'b' */
2781 special_sections_c, /* 'c' */
2782 special_sections_d, /* 'd' */
2783 NULL, /* 'e' */
2784 special_sections_f, /* 'f' */
2785 special_sections_g, /* 'g' */
2786 special_sections_h, /* 'h' */
2787 special_sections_i, /* 'i' */
2788 NULL, /* 'j' */
2789 NULL, /* 'k' */
2790 special_sections_l, /* 'l' */
2791 NULL, /* 'm' */
2792 special_sections_n, /* 'n' */
2793 NULL, /* 'o' */
2794 special_sections_p, /* 'p' */
2795 NULL, /* 'q' */
2796 special_sections_r, /* 'r' */
2797 special_sections_s, /* 's' */
2798 special_sections_t, /* 't' */
2799 NULL, /* 'u' */
2800 NULL, /* 'v' */
2801 NULL, /* 'w' */
2802 NULL, /* 'x' */
2803 NULL, /* 'y' */
2804 special_sections_z /* 'z' */
2805 };
2806
2807 const struct bfd_elf_special_section *
2808 _bfd_elf_get_special_section (const char *name,
2809 const struct bfd_elf_special_section *spec,
2810 unsigned int rela)
2811 {
2812 int i;
2813 int len;
2814
2815 len = strlen (name);
2816
2817 for (i = 0; spec[i].prefix != NULL; i++)
2818 {
2819 int suffix_len;
2820 int prefix_len = spec[i].prefix_length;
2821
2822 if (len < prefix_len)
2823 continue;
2824 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2825 continue;
2826
2827 suffix_len = spec[i].suffix_length;
2828 if (suffix_len <= 0)
2829 {
2830 if (name[prefix_len] != 0)
2831 {
2832 if (suffix_len == 0)
2833 continue;
2834 if (name[prefix_len] != '.'
2835 && (suffix_len == -2
2836 || (rela && spec[i].type == SHT_REL)))
2837 continue;
2838 }
2839 }
2840 else
2841 {
2842 if (len < prefix_len + suffix_len)
2843 continue;
2844 if (memcmp (name + len - suffix_len,
2845 spec[i].prefix + prefix_len,
2846 suffix_len) != 0)
2847 continue;
2848 }
2849 return &spec[i];
2850 }
2851
2852 return NULL;
2853 }
2854
2855 const struct bfd_elf_special_section *
2856 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2857 {
2858 int i;
2859 const struct bfd_elf_special_section *spec;
2860 const struct elf_backend_data *bed;
2861
2862 /* See if this is one of the special sections. */
2863 if (sec->name == NULL)
2864 return NULL;
2865
2866 bed = get_elf_backend_data (abfd);
2867 spec = bed->special_sections;
2868 if (spec)
2869 {
2870 spec = _bfd_elf_get_special_section (sec->name,
2871 bed->special_sections,
2872 sec->use_rela_p);
2873 if (spec != NULL)
2874 return spec;
2875 }
2876
2877 if (sec->name[0] != '.')
2878 return NULL;
2879
2880 i = sec->name[1] - 'b';
2881 if (i < 0 || i > 'z' - 'b')
2882 return NULL;
2883
2884 spec = special_sections[i];
2885
2886 if (spec == NULL)
2887 return NULL;
2888
2889 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2890 }
2891
2892 bool
2893 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2894 {
2895 struct bfd_elf_section_data *sdata;
2896 const struct elf_backend_data *bed;
2897 const struct bfd_elf_special_section *ssect;
2898
2899 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2900 if (sdata == NULL)
2901 {
2902 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2903 sizeof (*sdata));
2904 if (sdata == NULL)
2905 return false;
2906 sec->used_by_bfd = sdata;
2907 }
2908
2909 /* Indicate whether or not this section should use RELA relocations. */
2910 bed = get_elf_backend_data (abfd);
2911 sec->use_rela_p = bed->default_use_rela_p;
2912
2913 /* Set up ELF section type and flags for newly created sections, if
2914 there is an ABI mandated section. */
2915 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2916 if (ssect != NULL)
2917 {
2918 elf_section_type (sec) = ssect->type;
2919 elf_section_flags (sec) = ssect->attr;
2920 }
2921
2922 return _bfd_generic_new_section_hook (abfd, sec);
2923 }
2924
2925 /* Create a new bfd section from an ELF program header.
2926
2927 Since program segments have no names, we generate a synthetic name
2928 of the form segment<NUM>, where NUM is generally the index in the
2929 program header table. For segments that are split (see below) we
2930 generate the names segment<NUM>a and segment<NUM>b.
2931
2932 Note that some program segments may have a file size that is different than
2933 (less than) the memory size. All this means is that at execution the
2934 system must allocate the amount of memory specified by the memory size,
2935 but only initialize it with the first "file size" bytes read from the
2936 file. This would occur for example, with program segments consisting
2937 of combined data+bss.
2938
2939 To handle the above situation, this routine generates TWO bfd sections
2940 for the single program segment. The first has the length specified by
2941 the file size of the segment, and the second has the length specified
2942 by the difference between the two sizes. In effect, the segment is split
2943 into its initialized and uninitialized parts.
2944
2945 */
2946
2947 bool
2948 _bfd_elf_make_section_from_phdr (bfd *abfd,
2949 Elf_Internal_Phdr *hdr,
2950 int hdr_index,
2951 const char *type_name)
2952 {
2953 asection *newsect;
2954 char *name;
2955 char namebuf[64];
2956 size_t len;
2957 int split;
2958 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
2959
2960 split = ((hdr->p_memsz > 0)
2961 && (hdr->p_filesz > 0)
2962 && (hdr->p_memsz > hdr->p_filesz));
2963
2964 if (hdr->p_filesz > 0)
2965 {
2966 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2967 len = strlen (namebuf) + 1;
2968 name = (char *) bfd_alloc (abfd, len);
2969 if (!name)
2970 return false;
2971 memcpy (name, namebuf, len);
2972 newsect = bfd_make_section (abfd, name);
2973 if (newsect == NULL)
2974 return false;
2975 newsect->vma = hdr->p_vaddr / opb;
2976 newsect->lma = hdr->p_paddr / opb;
2977 newsect->size = hdr->p_filesz;
2978 newsect->filepos = hdr->p_offset;
2979 newsect->flags |= SEC_HAS_CONTENTS;
2980 newsect->alignment_power = bfd_log2 (hdr->p_align);
2981 if (hdr->p_type == PT_LOAD)
2982 {
2983 newsect->flags |= SEC_ALLOC;
2984 newsect->flags |= SEC_LOAD;
2985 if (hdr->p_flags & PF_X)
2986 {
2987 /* FIXME: all we known is that it has execute PERMISSION,
2988 may be data. */
2989 newsect->flags |= SEC_CODE;
2990 }
2991 }
2992 if (!(hdr->p_flags & PF_W))
2993 {
2994 newsect->flags |= SEC_READONLY;
2995 }
2996 }
2997
2998 if (hdr->p_memsz > hdr->p_filesz)
2999 {
3000 bfd_vma align;
3001
3002 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
3003 len = strlen (namebuf) + 1;
3004 name = (char *) bfd_alloc (abfd, len);
3005 if (!name)
3006 return false;
3007 memcpy (name, namebuf, len);
3008 newsect = bfd_make_section (abfd, name);
3009 if (newsect == NULL)
3010 return false;
3011 newsect->vma = (hdr->p_vaddr + hdr->p_filesz) / opb;
3012 newsect->lma = (hdr->p_paddr + hdr->p_filesz) / opb;
3013 newsect->size = hdr->p_memsz - hdr->p_filesz;
3014 newsect->filepos = hdr->p_offset + hdr->p_filesz;
3015 align = newsect->vma & -newsect->vma;
3016 if (align == 0 || align > hdr->p_align)
3017 align = hdr->p_align;
3018 newsect->alignment_power = bfd_log2 (align);
3019 if (hdr->p_type == PT_LOAD)
3020 {
3021 newsect->flags |= SEC_ALLOC;
3022 if (hdr->p_flags & PF_X)
3023 newsect->flags |= SEC_CODE;
3024 }
3025 if (!(hdr->p_flags & PF_W))
3026 newsect->flags |= SEC_READONLY;
3027 }
3028
3029 return true;
3030 }
3031
3032 static bool
3033 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
3034 {
3035 /* The return value is ignored. Build-ids are considered optional. */
3036 if (templ->xvec->flavour == bfd_target_elf_flavour)
3037 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
3038 (templ, offset);
3039 return false;
3040 }
3041
3042 bool
3043 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3044 {
3045 const struct elf_backend_data *bed;
3046
3047 switch (hdr->p_type)
3048 {
3049 case PT_NULL:
3050 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3051
3052 case PT_LOAD:
3053 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3054 return false;
3055 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3056 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3057 return true;
3058
3059 case PT_DYNAMIC:
3060 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3061
3062 case PT_INTERP:
3063 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3064
3065 case PT_NOTE:
3066 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3067 return false;
3068 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3069 hdr->p_align))
3070 return false;
3071 return true;
3072
3073 case PT_SHLIB:
3074 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3075
3076 case PT_PHDR:
3077 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3078
3079 case PT_GNU_EH_FRAME:
3080 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3081 "eh_frame_hdr");
3082
3083 case PT_GNU_STACK:
3084 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3085
3086 case PT_GNU_RELRO:
3087 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3088
3089 default:
3090 /* Check for any processor-specific program segment types. */
3091 bed = get_elf_backend_data (abfd);
3092 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3093 }
3094 }
3095
3096 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3097 REL or RELA. */
3098
3099 Elf_Internal_Shdr *
3100 _bfd_elf_single_rel_hdr (asection *sec)
3101 {
3102 if (elf_section_data (sec)->rel.hdr)
3103 {
3104 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3105 return elf_section_data (sec)->rel.hdr;
3106 }
3107 else
3108 return elf_section_data (sec)->rela.hdr;
3109 }
3110
3111 static bool
3112 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3113 Elf_Internal_Shdr *rel_hdr,
3114 const char *sec_name,
3115 bool use_rela_p)
3116 {
3117 char *name = (char *) bfd_alloc (abfd,
3118 sizeof ".rela" + strlen (sec_name));
3119 if (name == NULL)
3120 return false;
3121
3122 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3123 rel_hdr->sh_name =
3124 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3125 false);
3126 if (rel_hdr->sh_name == (unsigned int) -1)
3127 return false;
3128
3129 return true;
3130 }
3131
3132 /* Allocate and initialize a section-header for a new reloc section,
3133 containing relocations against ASECT. It is stored in RELDATA. If
3134 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3135 relocations. */
3136
3137 static bool
3138 _bfd_elf_init_reloc_shdr (bfd *abfd,
3139 struct bfd_elf_section_reloc_data *reldata,
3140 const char *sec_name,
3141 bool use_rela_p,
3142 bool delay_st_name_p)
3143 {
3144 Elf_Internal_Shdr *rel_hdr;
3145 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3146
3147 BFD_ASSERT (reldata->hdr == NULL);
3148 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3149 reldata->hdr = rel_hdr;
3150
3151 if (delay_st_name_p)
3152 rel_hdr->sh_name = (unsigned int) -1;
3153 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3154 use_rela_p))
3155 return false;
3156 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3157 rel_hdr->sh_entsize = (use_rela_p
3158 ? bed->s->sizeof_rela
3159 : bed->s->sizeof_rel);
3160 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3161 rel_hdr->sh_flags = 0;
3162 rel_hdr->sh_addr = 0;
3163 rel_hdr->sh_size = 0;
3164 rel_hdr->sh_offset = 0;
3165
3166 return true;
3167 }
3168
3169 /* Return the default section type based on the passed in section flags. */
3170
3171 int
3172 bfd_elf_get_default_section_type (flagword flags)
3173 {
3174 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3175 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3176 return SHT_NOBITS;
3177 return SHT_PROGBITS;
3178 }
3179
3180 struct fake_section_arg
3181 {
3182 struct bfd_link_info *link_info;
3183 bool failed;
3184 };
3185
3186 /* Set up an ELF internal section header for a section. */
3187
3188 static void
3189 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3190 {
3191 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3192 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3193 struct bfd_elf_section_data *esd = elf_section_data (asect);
3194 Elf_Internal_Shdr *this_hdr;
3195 unsigned int sh_type;
3196 const char *name = asect->name;
3197 bool delay_st_name_p = false;
3198 bfd_vma mask;
3199
3200 if (arg->failed)
3201 {
3202 /* We already failed; just get out of the bfd_map_over_sections
3203 loop. */
3204 return;
3205 }
3206
3207 this_hdr = &esd->this_hdr;
3208
3209 if (arg->link_info)
3210 {
3211 /* ld: compress DWARF debug sections with names: .debug_*. */
3212 if ((arg->link_info->compress_debug & COMPRESS_DEBUG)
3213 && (asect->flags & SEC_DEBUGGING)
3214 && name[1] == 'd'
3215 && name[6] == '_')
3216 {
3217 /* Set SEC_ELF_COMPRESS to indicate this section should be
3218 compressed. */
3219 asect->flags |= SEC_ELF_COMPRESS;
3220 /* If this section will be compressed, delay adding section
3221 name to section name section after it is compressed in
3222 _bfd_elf_assign_file_positions_for_non_load. */
3223 delay_st_name_p = true;
3224 }
3225 }
3226 else if ((asect->flags & SEC_ELF_RENAME))
3227 {
3228 /* objcopy: rename output DWARF debug section. */
3229 if ((abfd->flags & (BFD_DECOMPRESS | BFD_COMPRESS_GABI)))
3230 {
3231 /* When we decompress or compress with SHF_COMPRESSED,
3232 convert section name from .zdebug_* to .debug_* if
3233 needed. */
3234 if (name[1] == 'z')
3235 {
3236 char *new_name = convert_zdebug_to_debug (abfd, name);
3237 if (new_name == NULL)
3238 {
3239 arg->failed = true;
3240 return;
3241 }
3242 name = new_name;
3243 }
3244 }
3245 else if (asect->compress_status == COMPRESS_SECTION_DONE)
3246 {
3247 /* PR binutils/18087: Compression does not always make a
3248 section smaller. So only rename the section when
3249 compression has actually taken place. If input section
3250 name is .zdebug_*, we should never compress it again. */
3251 char *new_name = convert_debug_to_zdebug (abfd, name);
3252 if (new_name == NULL)
3253 {
3254 arg->failed = true;
3255 return;
3256 }
3257 BFD_ASSERT (name[1] != 'z');
3258 name = new_name;
3259 }
3260 }
3261
3262 if (delay_st_name_p)
3263 this_hdr->sh_name = (unsigned int) -1;
3264 else
3265 {
3266 this_hdr->sh_name
3267 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3268 name, false);
3269 if (this_hdr->sh_name == (unsigned int) -1)
3270 {
3271 arg->failed = true;
3272 return;
3273 }
3274 }
3275
3276 /* Don't clear sh_flags. Assembler may set additional bits. */
3277
3278 if ((asect->flags & SEC_ALLOC) != 0
3279 || asect->user_set_vma)
3280 this_hdr->sh_addr = asect->vma * bfd_octets_per_byte (abfd, asect);
3281 else
3282 this_hdr->sh_addr = 0;
3283
3284 this_hdr->sh_offset = 0;
3285 this_hdr->sh_size = asect->size;
3286 this_hdr->sh_link = 0;
3287 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3288 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3289 {
3290 _bfd_error_handler
3291 /* xgettext:c-format */
3292 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3293 abfd, asect->alignment_power, asect);
3294 arg->failed = true;
3295 return;
3296 }
3297 /* Set sh_addralign to the highest power of two given by alignment
3298 consistent with the section VMA. Linker scripts can force VMA. */
3299 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3300 this_hdr->sh_addralign = mask & -mask;
3301 /* The sh_entsize and sh_info fields may have been set already by
3302 copy_private_section_data. */
3303
3304 this_hdr->bfd_section = asect;
3305 this_hdr->contents = NULL;
3306
3307 /* If the section type is unspecified, we set it based on
3308 asect->flags. */
3309 if ((asect->flags & SEC_GROUP) != 0)
3310 sh_type = SHT_GROUP;
3311 else
3312 sh_type = bfd_elf_get_default_section_type (asect->flags);
3313
3314 if (this_hdr->sh_type == SHT_NULL)
3315 this_hdr->sh_type = sh_type;
3316 else if (this_hdr->sh_type == SHT_NOBITS
3317 && sh_type == SHT_PROGBITS
3318 && (asect->flags & SEC_ALLOC) != 0)
3319 {
3320 /* Warn if we are changing a NOBITS section to PROGBITS, but
3321 allow the link to proceed. This can happen when users link
3322 non-bss input sections to bss output sections, or emit data
3323 to a bss output section via a linker script. */
3324 _bfd_error_handler
3325 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3326 this_hdr->sh_type = sh_type;
3327 }
3328
3329 switch (this_hdr->sh_type)
3330 {
3331 default:
3332 break;
3333
3334 case SHT_STRTAB:
3335 case SHT_NOTE:
3336 case SHT_NOBITS:
3337 case SHT_PROGBITS:
3338 break;
3339
3340 case SHT_INIT_ARRAY:
3341 case SHT_FINI_ARRAY:
3342 case SHT_PREINIT_ARRAY:
3343 this_hdr->sh_entsize = bed->s->arch_size / 8;
3344 break;
3345
3346 case SHT_HASH:
3347 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3348 break;
3349
3350 case SHT_DYNSYM:
3351 this_hdr->sh_entsize = bed->s->sizeof_sym;
3352 break;
3353
3354 case SHT_DYNAMIC:
3355 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3356 break;
3357
3358 case SHT_RELA:
3359 if (get_elf_backend_data (abfd)->may_use_rela_p)
3360 this_hdr->sh_entsize = bed->s->sizeof_rela;
3361 break;
3362
3363 case SHT_REL:
3364 if (get_elf_backend_data (abfd)->may_use_rel_p)
3365 this_hdr->sh_entsize = bed->s->sizeof_rel;
3366 break;
3367
3368 case SHT_GNU_versym:
3369 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3370 break;
3371
3372 case SHT_GNU_verdef:
3373 this_hdr->sh_entsize = 0;
3374 /* objcopy or strip will copy over sh_info, but may not set
3375 cverdefs. The linker will set cverdefs, but sh_info will be
3376 zero. */
3377 if (this_hdr->sh_info == 0)
3378 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3379 else
3380 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3381 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3382 break;
3383
3384 case SHT_GNU_verneed:
3385 this_hdr->sh_entsize = 0;
3386 /* objcopy or strip will copy over sh_info, but may not set
3387 cverrefs. The linker will set cverrefs, but sh_info will be
3388 zero. */
3389 if (this_hdr->sh_info == 0)
3390 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3391 else
3392 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3393 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3394 break;
3395
3396 case SHT_GROUP:
3397 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3398 break;
3399
3400 case SHT_GNU_HASH:
3401 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3402 break;
3403 }
3404
3405 if ((asect->flags & SEC_ALLOC) != 0)
3406 this_hdr->sh_flags |= SHF_ALLOC;
3407 if ((asect->flags & SEC_READONLY) == 0)
3408 this_hdr->sh_flags |= SHF_WRITE;
3409 if ((asect->flags & SEC_CODE) != 0)
3410 this_hdr->sh_flags |= SHF_EXECINSTR;
3411 if ((asect->flags & SEC_MERGE) != 0)
3412 {
3413 this_hdr->sh_flags |= SHF_MERGE;
3414 this_hdr->sh_entsize = asect->entsize;
3415 }
3416 if ((asect->flags & SEC_STRINGS) != 0)
3417 this_hdr->sh_flags |= SHF_STRINGS;
3418 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3419 this_hdr->sh_flags |= SHF_GROUP;
3420 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3421 {
3422 this_hdr->sh_flags |= SHF_TLS;
3423 if (asect->size == 0
3424 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3425 {
3426 struct bfd_link_order *o = asect->map_tail.link_order;
3427
3428 this_hdr->sh_size = 0;
3429 if (o != NULL)
3430 {
3431 this_hdr->sh_size = o->offset + o->size;
3432 if (this_hdr->sh_size != 0)
3433 this_hdr->sh_type = SHT_NOBITS;
3434 }
3435 }
3436 }
3437 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3438 this_hdr->sh_flags |= SHF_EXCLUDE;
3439
3440 /* If the section has relocs, set up a section header for the
3441 SHT_REL[A] section. If two relocation sections are required for
3442 this section, it is up to the processor-specific back-end to
3443 create the other. */
3444 if ((asect->flags & SEC_RELOC) != 0)
3445 {
3446 /* When doing a relocatable link, create both REL and RELA sections if
3447 needed. */
3448 if (arg->link_info
3449 /* Do the normal setup if we wouldn't create any sections here. */
3450 && esd->rel.count + esd->rela.count > 0
3451 && (bfd_link_relocatable (arg->link_info)
3452 || arg->link_info->emitrelocations))
3453 {
3454 if (esd->rel.count && esd->rel.hdr == NULL
3455 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3456 false, delay_st_name_p))
3457 {
3458 arg->failed = true;
3459 return;
3460 }
3461 if (esd->rela.count && esd->rela.hdr == NULL
3462 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3463 true, delay_st_name_p))
3464 {
3465 arg->failed = true;
3466 return;
3467 }
3468 }
3469 else if (!_bfd_elf_init_reloc_shdr (abfd,
3470 (asect->use_rela_p
3471 ? &esd->rela : &esd->rel),
3472 name,
3473 asect->use_rela_p,
3474 delay_st_name_p))
3475 {
3476 arg->failed = true;
3477 return;
3478 }
3479 }
3480
3481 /* Check for processor-specific section types. */
3482 sh_type = this_hdr->sh_type;
3483 if (bed->elf_backend_fake_sections
3484 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3485 {
3486 arg->failed = true;
3487 return;
3488 }
3489
3490 if (sh_type == SHT_NOBITS && asect->size != 0)
3491 {
3492 /* Don't change the header type from NOBITS if we are being
3493 called for objcopy --only-keep-debug. */
3494 this_hdr->sh_type = sh_type;
3495 }
3496 }
3497
3498 /* Fill in the contents of a SHT_GROUP section. Called from
3499 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3500 when ELF targets use the generic linker, ld. Called for ld -r
3501 from bfd_elf_final_link. */
3502
3503 void
3504 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3505 {
3506 bool *failedptr = (bool *) failedptrarg;
3507 asection *elt, *first;
3508 unsigned char *loc;
3509 bool gas;
3510
3511 /* Ignore linker created group section. See elfNN_ia64_object_p in
3512 elfxx-ia64.c. */
3513 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3514 || sec->size == 0
3515 || *failedptr)
3516 return;
3517
3518 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3519 {
3520 unsigned long symindx = 0;
3521
3522 /* elf_group_id will have been set up by objcopy and the
3523 generic linker. */
3524 if (elf_group_id (sec) != NULL)
3525 symindx = elf_group_id (sec)->udata.i;
3526
3527 if (symindx == 0)
3528 {
3529 /* If called from the assembler, swap_out_syms will have set up
3530 elf_section_syms.
3531 PR 25699: A corrupt input file could contain bogus group info. */
3532 if (elf_section_syms (abfd) == NULL)
3533 {
3534 *failedptr = true;
3535 return;
3536 }
3537 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3538 }
3539 elf_section_data (sec)->this_hdr.sh_info = symindx;
3540 }
3541 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3542 {
3543 /* The ELF backend linker sets sh_info to -2 when the group
3544 signature symbol is global, and thus the index can't be
3545 set until all local symbols are output. */
3546 asection *igroup;
3547 struct bfd_elf_section_data *sec_data;
3548 unsigned long symndx;
3549 unsigned long extsymoff;
3550 struct elf_link_hash_entry *h;
3551
3552 /* The point of this little dance to the first SHF_GROUP section
3553 then back to the SHT_GROUP section is that this gets us to
3554 the SHT_GROUP in the input object. */
3555 igroup = elf_sec_group (elf_next_in_group (sec));
3556 sec_data = elf_section_data (igroup);
3557 symndx = sec_data->this_hdr.sh_info;
3558 extsymoff = 0;
3559 if (!elf_bad_symtab (igroup->owner))
3560 {
3561 Elf_Internal_Shdr *symtab_hdr;
3562
3563 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3564 extsymoff = symtab_hdr->sh_info;
3565 }
3566 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3567 while (h->root.type == bfd_link_hash_indirect
3568 || h->root.type == bfd_link_hash_warning)
3569 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3570
3571 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3572 }
3573
3574 /* The contents won't be allocated for "ld -r" or objcopy. */
3575 gas = true;
3576 if (sec->contents == NULL)
3577 {
3578 gas = false;
3579 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3580
3581 /* Arrange for the section to be written out. */
3582 elf_section_data (sec)->this_hdr.contents = sec->contents;
3583 if (sec->contents == NULL)
3584 {
3585 *failedptr = true;
3586 return;
3587 }
3588 }
3589
3590 loc = sec->contents + sec->size;
3591
3592 /* Get the pointer to the first section in the group that gas
3593 squirreled away here. objcopy arranges for this to be set to the
3594 start of the input section group. */
3595 first = elt = elf_next_in_group (sec);
3596
3597 /* First element is a flag word. Rest of section is elf section
3598 indices for all the sections of the group. Write them backwards
3599 just to keep the group in the same order as given in .section
3600 directives, not that it matters. */
3601 while (elt != NULL)
3602 {
3603 asection *s;
3604
3605 s = elt;
3606 if (!gas)
3607 s = s->output_section;
3608 if (s != NULL
3609 && !bfd_is_abs_section (s))
3610 {
3611 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3612 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3613
3614 if (elf_sec->rel.hdr != NULL
3615 && (gas
3616 || (input_elf_sec->rel.hdr != NULL
3617 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3618 {
3619 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3620 loc -= 4;
3621 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3622 }
3623 if (elf_sec->rela.hdr != NULL
3624 && (gas
3625 || (input_elf_sec->rela.hdr != NULL
3626 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3627 {
3628 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3629 loc -= 4;
3630 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3631 }
3632 loc -= 4;
3633 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3634 }
3635 elt = elf_next_in_group (elt);
3636 if (elt == first)
3637 break;
3638 }
3639
3640 loc -= 4;
3641 BFD_ASSERT (loc == sec->contents);
3642
3643 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3644 }
3645
3646 /* Given NAME, the name of a relocation section stripped of its
3647 .rel/.rela prefix, return the section in ABFD to which the
3648 relocations apply. */
3649
3650 asection *
3651 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3652 {
3653 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3654 section likely apply to .got.plt or .got section. */
3655 if (get_elf_backend_data (abfd)->want_got_plt
3656 && strcmp (name, ".plt") == 0)
3657 {
3658 asection *sec;
3659
3660 name = ".got.plt";
3661 sec = bfd_get_section_by_name (abfd, name);
3662 if (sec != NULL)
3663 return sec;
3664 name = ".got";
3665 }
3666
3667 return bfd_get_section_by_name (abfd, name);
3668 }
3669
3670 /* Return the section to which RELOC_SEC applies. */
3671
3672 static asection *
3673 elf_get_reloc_section (asection *reloc_sec)
3674 {
3675 const char *name;
3676 unsigned int type;
3677 bfd *abfd;
3678 const struct elf_backend_data *bed;
3679
3680 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3681 if (type != SHT_REL && type != SHT_RELA)
3682 return NULL;
3683
3684 /* We look up the section the relocs apply to by name. */
3685 name = reloc_sec->name;
3686 if (!startswith (name, ".rel"))
3687 return NULL;
3688 name += 4;
3689 if (type == SHT_RELA && *name++ != 'a')
3690 return NULL;
3691
3692 abfd = reloc_sec->owner;
3693 bed = get_elf_backend_data (abfd);
3694 return bed->get_reloc_section (abfd, name);
3695 }
3696
3697 /* Assign all ELF section numbers. The dummy first section is handled here
3698 too. The link/info pointers for the standard section types are filled
3699 in here too, while we're at it. LINK_INFO will be 0 when arriving
3700 here for objcopy, and when using the generic ELF linker. */
3701
3702 static bool
3703 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3704 {
3705 struct elf_obj_tdata *t = elf_tdata (abfd);
3706 asection *sec;
3707 unsigned int section_number;
3708 Elf_Internal_Shdr **i_shdrp;
3709 struct bfd_elf_section_data *d;
3710 bool need_symtab;
3711 size_t amt;
3712
3713 section_number = 1;
3714
3715 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3716
3717 /* SHT_GROUP sections are in relocatable files only. */
3718 if (link_info == NULL || !link_info->resolve_section_groups)
3719 {
3720 size_t reloc_count = 0;
3721
3722 /* Put SHT_GROUP sections first. */
3723 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3724 {
3725 d = elf_section_data (sec);
3726
3727 if (d->this_hdr.sh_type == SHT_GROUP)
3728 {
3729 if (sec->flags & SEC_LINKER_CREATED)
3730 {
3731 /* Remove the linker created SHT_GROUP sections. */
3732 bfd_section_list_remove (abfd, sec);
3733 abfd->section_count--;
3734 }
3735 else
3736 d->this_idx = section_number++;
3737 }
3738
3739 /* Count relocations. */
3740 reloc_count += sec->reloc_count;
3741 }
3742
3743 /* Clear HAS_RELOC if there are no relocations. */
3744 if (reloc_count == 0)
3745 abfd->flags &= ~HAS_RELOC;
3746 }
3747
3748 for (sec = abfd->sections; sec; sec = sec->next)
3749 {
3750 d = elf_section_data (sec);
3751
3752 if (d->this_hdr.sh_type != SHT_GROUP)
3753 d->this_idx = section_number++;
3754 if (d->this_hdr.sh_name != (unsigned int) -1)
3755 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3756 if (d->rel.hdr)
3757 {
3758 d->rel.idx = section_number++;
3759 if (d->rel.hdr->sh_name != (unsigned int) -1)
3760 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3761 }
3762 else
3763 d->rel.idx = 0;
3764
3765 if (d->rela.hdr)
3766 {
3767 d->rela.idx = section_number++;
3768 if (d->rela.hdr->sh_name != (unsigned int) -1)
3769 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3770 }
3771 else
3772 d->rela.idx = 0;
3773 }
3774
3775 need_symtab = (bfd_get_symcount (abfd) > 0
3776 || (link_info == NULL
3777 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3778 == HAS_RELOC)));
3779 if (need_symtab)
3780 {
3781 elf_onesymtab (abfd) = section_number++;
3782 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3783 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3784 {
3785 elf_section_list *entry;
3786
3787 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3788
3789 entry = bfd_zalloc (abfd, sizeof (*entry));
3790 entry->ndx = section_number++;
3791 elf_symtab_shndx_list (abfd) = entry;
3792 entry->hdr.sh_name
3793 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3794 ".symtab_shndx", false);
3795 if (entry->hdr.sh_name == (unsigned int) -1)
3796 return false;
3797 }
3798 elf_strtab_sec (abfd) = section_number++;
3799 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3800 }
3801
3802 elf_shstrtab_sec (abfd) = section_number++;
3803 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3804 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3805
3806 if (section_number >= SHN_LORESERVE)
3807 {
3808 /* xgettext:c-format */
3809 _bfd_error_handler (_("%pB: too many sections: %u"),
3810 abfd, section_number);
3811 return false;
3812 }
3813
3814 elf_numsections (abfd) = section_number;
3815 elf_elfheader (abfd)->e_shnum = section_number;
3816
3817 /* Set up the list of section header pointers, in agreement with the
3818 indices. */
3819 amt = section_number * sizeof (Elf_Internal_Shdr *);
3820 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3821 if (i_shdrp == NULL)
3822 return false;
3823
3824 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3825 sizeof (Elf_Internal_Shdr));
3826 if (i_shdrp[0] == NULL)
3827 {
3828 bfd_release (abfd, i_shdrp);
3829 return false;
3830 }
3831
3832 elf_elfsections (abfd) = i_shdrp;
3833
3834 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3835 if (need_symtab)
3836 {
3837 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3838 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3839 {
3840 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3841 BFD_ASSERT (entry != NULL);
3842 i_shdrp[entry->ndx] = & entry->hdr;
3843 entry->hdr.sh_link = elf_onesymtab (abfd);
3844 }
3845 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3846 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3847 }
3848
3849 for (sec = abfd->sections; sec; sec = sec->next)
3850 {
3851 asection *s;
3852
3853 d = elf_section_data (sec);
3854
3855 i_shdrp[d->this_idx] = &d->this_hdr;
3856 if (d->rel.idx != 0)
3857 i_shdrp[d->rel.idx] = d->rel.hdr;
3858 if (d->rela.idx != 0)
3859 i_shdrp[d->rela.idx] = d->rela.hdr;
3860
3861 /* Fill in the sh_link and sh_info fields while we're at it. */
3862
3863 /* sh_link of a reloc section is the section index of the symbol
3864 table. sh_info is the section index of the section to which
3865 the relocation entries apply. */
3866 if (d->rel.idx != 0)
3867 {
3868 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3869 d->rel.hdr->sh_info = d->this_idx;
3870 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3871 }
3872 if (d->rela.idx != 0)
3873 {
3874 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3875 d->rela.hdr->sh_info = d->this_idx;
3876 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3877 }
3878
3879 /* We need to set up sh_link for SHF_LINK_ORDER. */
3880 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3881 {
3882 s = elf_linked_to_section (sec);
3883 /* We can now have a NULL linked section pointer.
3884 This happens when the sh_link field is 0, which is done
3885 when a linked to section is discarded but the linking
3886 section has been retained for some reason. */
3887 if (s)
3888 {
3889 /* Check discarded linkonce section. */
3890 if (discarded_section (s))
3891 {
3892 asection *kept;
3893 _bfd_error_handler
3894 /* xgettext:c-format */
3895 (_("%pB: sh_link of section `%pA' points to"
3896 " discarded section `%pA' of `%pB'"),
3897 abfd, d->this_hdr.bfd_section, s, s->owner);
3898 /* Point to the kept section if it has the same
3899 size as the discarded one. */
3900 kept = _bfd_elf_check_kept_section (s, link_info);
3901 if (kept == NULL)
3902 {
3903 bfd_set_error (bfd_error_bad_value);
3904 return false;
3905 }
3906 s = kept;
3907 }
3908 /* Handle objcopy. */
3909 else if (s->output_section == NULL)
3910 {
3911 _bfd_error_handler
3912 /* xgettext:c-format */
3913 (_("%pB: sh_link of section `%pA' points to"
3914 " removed section `%pA' of `%pB'"),
3915 abfd, d->this_hdr.bfd_section, s, s->owner);
3916 bfd_set_error (bfd_error_bad_value);
3917 return false;
3918 }
3919 s = s->output_section;
3920 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3921 }
3922 }
3923
3924 switch (d->this_hdr.sh_type)
3925 {
3926 case SHT_REL:
3927 case SHT_RELA:
3928 /* A reloc section which we are treating as a normal BFD
3929 section. sh_link is the section index of the symbol
3930 table. sh_info is the section index of the section to
3931 which the relocation entries apply. We assume that an
3932 allocated reloc section uses the dynamic symbol table.
3933 FIXME: How can we be sure? */
3934 s = bfd_get_section_by_name (abfd, ".dynsym");
3935 if (s != NULL)
3936 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3937
3938 s = elf_get_reloc_section (sec);
3939 if (s != NULL)
3940 {
3941 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3942 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3943 }
3944 break;
3945
3946 case SHT_STRTAB:
3947 /* We assume that a section named .stab*str is a stabs
3948 string section. We look for a section with the same name
3949 but without the trailing ``str'', and set its sh_link
3950 field to point to this section. */
3951 if (startswith (sec->name, ".stab")
3952 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3953 {
3954 size_t len;
3955 char *alc;
3956
3957 len = strlen (sec->name);
3958 alc = (char *) bfd_malloc (len - 2);
3959 if (alc == NULL)
3960 return false;
3961 memcpy (alc, sec->name, len - 3);
3962 alc[len - 3] = '\0';
3963 s = bfd_get_section_by_name (abfd, alc);
3964 free (alc);
3965 if (s != NULL)
3966 {
3967 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3968
3969 /* This is a .stab section. */
3970 elf_section_data (s)->this_hdr.sh_entsize = 12;
3971 }
3972 }
3973 break;
3974
3975 case SHT_DYNAMIC:
3976 case SHT_DYNSYM:
3977 case SHT_GNU_verneed:
3978 case SHT_GNU_verdef:
3979 /* sh_link is the section header index of the string table
3980 used for the dynamic entries, or the symbol table, or the
3981 version strings. */
3982 s = bfd_get_section_by_name (abfd, ".dynstr");
3983 if (s != NULL)
3984 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3985 break;
3986
3987 case SHT_GNU_LIBLIST:
3988 /* sh_link is the section header index of the prelink library
3989 list used for the dynamic entries, or the symbol table, or
3990 the version strings. */
3991 s = bfd_get_section_by_name (abfd, (sec->flags & SEC_ALLOC)
3992 ? ".dynstr" : ".gnu.libstr");
3993 if (s != NULL)
3994 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3995 break;
3996
3997 case SHT_HASH:
3998 case SHT_GNU_HASH:
3999 case SHT_GNU_versym:
4000 /* sh_link is the section header index of the symbol table
4001 this hash table or version table is for. */
4002 s = bfd_get_section_by_name (abfd, ".dynsym");
4003 if (s != NULL)
4004 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
4005 break;
4006
4007 case SHT_GROUP:
4008 d->this_hdr.sh_link = elf_onesymtab (abfd);
4009 }
4010 }
4011
4012 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
4013 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
4014 debug section name from .debug_* to .zdebug_* if needed. */
4015
4016 return true;
4017 }
4018
4019 static bool
4020 sym_is_global (bfd *abfd, asymbol *sym)
4021 {
4022 /* If the backend has a special mapping, use it. */
4023 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4024 if (bed->elf_backend_sym_is_global)
4025 return (*bed->elf_backend_sym_is_global) (abfd, sym);
4026
4027 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
4028 || bfd_is_und_section (bfd_asymbol_section (sym))
4029 || bfd_is_com_section (bfd_asymbol_section (sym)));
4030 }
4031
4032 /* Filter global symbols of ABFD to include in the import library. All
4033 SYMCOUNT symbols of ABFD can be examined from their pointers in
4034 SYMS. Pointers of symbols to keep should be stored contiguously at
4035 the beginning of that array.
4036
4037 Returns the number of symbols to keep. */
4038
4039 unsigned int
4040 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
4041 asymbol **syms, long symcount)
4042 {
4043 long src_count, dst_count = 0;
4044
4045 for (src_count = 0; src_count < symcount; src_count++)
4046 {
4047 asymbol *sym = syms[src_count];
4048 char *name = (char *) bfd_asymbol_name (sym);
4049 struct bfd_link_hash_entry *h;
4050
4051 if (!sym_is_global (abfd, sym))
4052 continue;
4053
4054 h = bfd_link_hash_lookup (info->hash, name, false, false, false);
4055 if (h == NULL)
4056 continue;
4057 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4058 continue;
4059 if (h->linker_def || h->ldscript_def)
4060 continue;
4061
4062 syms[dst_count++] = sym;
4063 }
4064
4065 syms[dst_count] = NULL;
4066
4067 return dst_count;
4068 }
4069
4070 /* Don't output section symbols for sections that are not going to be
4071 output, that are duplicates or there is no BFD section. */
4072
4073 static bool
4074 ignore_section_sym (bfd *abfd, asymbol *sym)
4075 {
4076 elf_symbol_type *type_ptr;
4077
4078 if (sym == NULL)
4079 return false;
4080
4081 if ((sym->flags & BSF_SECTION_SYM) == 0)
4082 return false;
4083
4084 /* Ignore the section symbol if it isn't used. */
4085 if ((sym->flags & BSF_SECTION_SYM_USED) == 0)
4086 return true;
4087
4088 if (sym->section == NULL)
4089 return true;
4090
4091 type_ptr = elf_symbol_from (sym);
4092 return ((type_ptr != NULL
4093 && type_ptr->internal_elf_sym.st_shndx != 0
4094 && bfd_is_abs_section (sym->section))
4095 || !(sym->section->owner == abfd
4096 || (sym->section->output_section != NULL
4097 && sym->section->output_section->owner == abfd
4098 && sym->section->output_offset == 0)
4099 || bfd_is_abs_section (sym->section)));
4100 }
4101
4102 /* Map symbol from it's internal number to the external number, moving
4103 all local symbols to be at the head of the list. */
4104
4105 static bool
4106 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4107 {
4108 unsigned int symcount = bfd_get_symcount (abfd);
4109 asymbol **syms = bfd_get_outsymbols (abfd);
4110 asymbol **sect_syms;
4111 unsigned int num_locals = 0;
4112 unsigned int num_globals = 0;
4113 unsigned int num_locals2 = 0;
4114 unsigned int num_globals2 = 0;
4115 unsigned int max_index = 0;
4116 unsigned int idx;
4117 asection *asect;
4118 asymbol **new_syms;
4119 size_t amt;
4120
4121 #ifdef DEBUG
4122 fprintf (stderr, "elf_map_symbols\n");
4123 fflush (stderr);
4124 #endif
4125
4126 for (asect = abfd->sections; asect; asect = asect->next)
4127 {
4128 if (max_index < asect->index)
4129 max_index = asect->index;
4130 }
4131
4132 max_index++;
4133 amt = max_index * sizeof (asymbol *);
4134 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4135 if (sect_syms == NULL)
4136 return false;
4137 elf_section_syms (abfd) = sect_syms;
4138 elf_num_section_syms (abfd) = max_index;
4139
4140 /* Init sect_syms entries for any section symbols we have already
4141 decided to output. */
4142 for (idx = 0; idx < symcount; idx++)
4143 {
4144 asymbol *sym = syms[idx];
4145
4146 if ((sym->flags & BSF_SECTION_SYM) != 0
4147 && sym->value == 0
4148 && !ignore_section_sym (abfd, sym)
4149 && !bfd_is_abs_section (sym->section))
4150 {
4151 asection *sec = sym->section;
4152
4153 if (sec->owner != abfd)
4154 sec = sec->output_section;
4155
4156 sect_syms[sec->index] = syms[idx];
4157 }
4158 }
4159
4160 /* Classify all of the symbols. */
4161 for (idx = 0; idx < symcount; idx++)
4162 {
4163 if (sym_is_global (abfd, syms[idx]))
4164 num_globals++;
4165 else if (!ignore_section_sym (abfd, syms[idx]))
4166 num_locals++;
4167 }
4168
4169 /* We will be adding a section symbol for each normal BFD section. Most
4170 sections will already have a section symbol in outsymbols, but
4171 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4172 at least in that case. */
4173 for (asect = abfd->sections; asect; asect = asect->next)
4174 {
4175 asymbol *sym = asect->symbol;
4176 /* Don't include ignored section symbols. */
4177 if (!ignore_section_sym (abfd, sym)
4178 && sect_syms[asect->index] == NULL)
4179 {
4180 if (!sym_is_global (abfd, asect->symbol))
4181 num_locals++;
4182 else
4183 num_globals++;
4184 }
4185 }
4186
4187 /* Now sort the symbols so the local symbols are first. */
4188 amt = (num_locals + num_globals) * sizeof (asymbol *);
4189 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4190 if (new_syms == NULL)
4191 return false;
4192
4193 for (idx = 0; idx < symcount; idx++)
4194 {
4195 asymbol *sym = syms[idx];
4196 unsigned int i;
4197
4198 if (sym_is_global (abfd, sym))
4199 i = num_locals + num_globals2++;
4200 /* Don't include ignored section symbols. */
4201 else if (!ignore_section_sym (abfd, sym))
4202 i = num_locals2++;
4203 else
4204 continue;
4205 new_syms[i] = sym;
4206 sym->udata.i = i + 1;
4207 }
4208 for (asect = abfd->sections; asect; asect = asect->next)
4209 {
4210 asymbol *sym = asect->symbol;
4211 if (!ignore_section_sym (abfd, sym)
4212 && sect_syms[asect->index] == NULL)
4213 {
4214 unsigned int i;
4215
4216 sect_syms[asect->index] = sym;
4217 if (!sym_is_global (abfd, sym))
4218 i = num_locals2++;
4219 else
4220 i = num_locals + num_globals2++;
4221 new_syms[i] = sym;
4222 sym->udata.i = i + 1;
4223 }
4224 }
4225
4226 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4227
4228 *pnum_locals = num_locals;
4229 return true;
4230 }
4231
4232 /* Align to the maximum file alignment that could be required for any
4233 ELF data structure. */
4234
4235 static inline file_ptr
4236 align_file_position (file_ptr off, int align)
4237 {
4238 return (off + align - 1) & ~(align - 1);
4239 }
4240
4241 /* Assign a file position to a section, optionally aligning to the
4242 required section alignment. */
4243
4244 file_ptr
4245 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4246 file_ptr offset,
4247 bool align)
4248 {
4249 if (align && i_shdrp->sh_addralign > 1)
4250 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign);
4251 i_shdrp->sh_offset = offset;
4252 if (i_shdrp->bfd_section != NULL)
4253 i_shdrp->bfd_section->filepos = offset;
4254 if (i_shdrp->sh_type != SHT_NOBITS)
4255 offset += i_shdrp->sh_size;
4256 return offset;
4257 }
4258
4259 /* Compute the file positions we are going to put the sections at, and
4260 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4261 is not NULL, this is being called by the ELF backend linker. */
4262
4263 bool
4264 _bfd_elf_compute_section_file_positions (bfd *abfd,
4265 struct bfd_link_info *link_info)
4266 {
4267 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4268 struct fake_section_arg fsargs;
4269 bool failed;
4270 struct elf_strtab_hash *strtab = NULL;
4271 Elf_Internal_Shdr *shstrtab_hdr;
4272 bool need_symtab;
4273
4274 if (abfd->output_has_begun)
4275 return true;
4276
4277 /* Do any elf backend specific processing first. */
4278 if (bed->elf_backend_begin_write_processing)
4279 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4280
4281 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4282 return false;
4283
4284 fsargs.failed = false;
4285 fsargs.link_info = link_info;
4286 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4287 if (fsargs.failed)
4288 return false;
4289
4290 if (!assign_section_numbers (abfd, link_info))
4291 return false;
4292
4293 /* The backend linker builds symbol table information itself. */
4294 need_symtab = (link_info == NULL
4295 && (bfd_get_symcount (abfd) > 0
4296 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4297 == HAS_RELOC)));
4298 if (need_symtab)
4299 {
4300 /* Non-zero if doing a relocatable link. */
4301 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4302
4303 if (! swap_out_syms (abfd, &strtab, relocatable_p, link_info))
4304 return false;
4305 }
4306
4307 failed = false;
4308 if (link_info == NULL)
4309 {
4310 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4311 if (failed)
4312 return false;
4313 }
4314
4315 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4316 /* sh_name was set in init_file_header. */
4317 shstrtab_hdr->sh_type = SHT_STRTAB;
4318 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4319 shstrtab_hdr->sh_addr = 0;
4320 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4321 shstrtab_hdr->sh_entsize = 0;
4322 shstrtab_hdr->sh_link = 0;
4323 shstrtab_hdr->sh_info = 0;
4324 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4325 shstrtab_hdr->sh_addralign = 1;
4326
4327 if (!assign_file_positions_except_relocs (abfd, link_info))
4328 return false;
4329
4330 if (need_symtab)
4331 {
4332 file_ptr off;
4333 Elf_Internal_Shdr *hdr;
4334
4335 off = elf_next_file_pos (abfd);
4336
4337 hdr = & elf_symtab_hdr (abfd);
4338 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4339
4340 if (elf_symtab_shndx_list (abfd) != NULL)
4341 {
4342 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4343 if (hdr->sh_size != 0)
4344 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4345 /* FIXME: What about other symtab_shndx sections in the list ? */
4346 }
4347
4348 hdr = &elf_tdata (abfd)->strtab_hdr;
4349 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4350
4351 elf_next_file_pos (abfd) = off;
4352
4353 /* Now that we know where the .strtab section goes, write it
4354 out. */
4355 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4356 || ! _bfd_elf_strtab_emit (abfd, strtab))
4357 return false;
4358 _bfd_elf_strtab_free (strtab);
4359 }
4360
4361 abfd->output_has_begun = true;
4362
4363 return true;
4364 }
4365
4366 /* Make an initial estimate of the size of the program header. If we
4367 get the number wrong here, we'll redo section placement. */
4368
4369 static bfd_size_type
4370 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4371 {
4372 size_t segs;
4373 asection *s;
4374 const struct elf_backend_data *bed;
4375
4376 /* Assume we will need exactly two PT_LOAD segments: one for text
4377 and one for data. */
4378 segs = 2;
4379
4380 s = bfd_get_section_by_name (abfd, ".interp");
4381 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4382 {
4383 /* If we have a loadable interpreter section, we need a
4384 PT_INTERP segment. In this case, assume we also need a
4385 PT_PHDR segment, although that may not be true for all
4386 targets. */
4387 segs += 2;
4388 }
4389
4390 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4391 {
4392 /* We need a PT_DYNAMIC segment. */
4393 ++segs;
4394 }
4395
4396 if (info != NULL && info->relro)
4397 {
4398 /* We need a PT_GNU_RELRO segment. */
4399 ++segs;
4400 }
4401
4402 if (elf_eh_frame_hdr (abfd))
4403 {
4404 /* We need a PT_GNU_EH_FRAME segment. */
4405 ++segs;
4406 }
4407
4408 if (elf_stack_flags (abfd))
4409 {
4410 /* We need a PT_GNU_STACK segment. */
4411 ++segs;
4412 }
4413
4414 s = bfd_get_section_by_name (abfd,
4415 NOTE_GNU_PROPERTY_SECTION_NAME);
4416 if (s != NULL && s->size != 0)
4417 {
4418 /* We need a PT_GNU_PROPERTY segment. */
4419 ++segs;
4420 }
4421
4422 for (s = abfd->sections; s != NULL; s = s->next)
4423 {
4424 if ((s->flags & SEC_LOAD) != 0
4425 && elf_section_type (s) == SHT_NOTE)
4426 {
4427 unsigned int alignment_power;
4428 /* We need a PT_NOTE segment. */
4429 ++segs;
4430 /* Try to create just one PT_NOTE segment for all adjacent
4431 loadable SHT_NOTE sections. gABI requires that within a
4432 PT_NOTE segment (and also inside of each SHT_NOTE section)
4433 each note should have the same alignment. So we check
4434 whether the sections are correctly aligned. */
4435 alignment_power = s->alignment_power;
4436 while (s->next != NULL
4437 && s->next->alignment_power == alignment_power
4438 && (s->next->flags & SEC_LOAD) != 0
4439 && elf_section_type (s->next) == SHT_NOTE)
4440 s = s->next;
4441 }
4442 }
4443
4444 for (s = abfd->sections; s != NULL; s = s->next)
4445 {
4446 if (s->flags & SEC_THREAD_LOCAL)
4447 {
4448 /* We need a PT_TLS segment. */
4449 ++segs;
4450 break;
4451 }
4452 }
4453
4454 bed = get_elf_backend_data (abfd);
4455
4456 if ((abfd->flags & D_PAGED) != 0
4457 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4458 {
4459 /* Add a PT_GNU_MBIND segment for each mbind section. */
4460 bfd_vma commonpagesize;
4461 unsigned int page_align_power;
4462
4463 if (info != NULL)
4464 commonpagesize = info->commonpagesize;
4465 else
4466 commonpagesize = bed->commonpagesize;
4467 page_align_power = bfd_log2 (commonpagesize);
4468 for (s = abfd->sections; s != NULL; s = s->next)
4469 if (elf_section_flags (s) & SHF_GNU_MBIND)
4470 {
4471 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4472 {
4473 _bfd_error_handler
4474 /* xgettext:c-format */
4475 (_("%pB: GNU_MBIND section `%pA' has invalid "
4476 "sh_info field: %d"),
4477 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4478 continue;
4479 }
4480 /* Align mbind section to page size. */
4481 if (s->alignment_power < page_align_power)
4482 s->alignment_power = page_align_power;
4483 segs ++;
4484 }
4485 }
4486
4487 /* Let the backend count up any program headers it might need. */
4488 if (bed->elf_backend_additional_program_headers)
4489 {
4490 int a;
4491
4492 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4493 if (a == -1)
4494 abort ();
4495 segs += a;
4496 }
4497
4498 return segs * bed->s->sizeof_phdr;
4499 }
4500
4501 /* Find the segment that contains the output_section of section. */
4502
4503 Elf_Internal_Phdr *
4504 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4505 {
4506 struct elf_segment_map *m;
4507 Elf_Internal_Phdr *p;
4508
4509 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4510 m != NULL;
4511 m = m->next, p++)
4512 {
4513 int i;
4514
4515 for (i = m->count - 1; i >= 0; i--)
4516 if (m->sections[i] == section)
4517 return p;
4518 }
4519
4520 return NULL;
4521 }
4522
4523 /* Create a mapping from a set of sections to a program segment. */
4524
4525 static struct elf_segment_map *
4526 make_mapping (bfd *abfd,
4527 asection **sections,
4528 unsigned int from,
4529 unsigned int to,
4530 bool phdr)
4531 {
4532 struct elf_segment_map *m;
4533 unsigned int i;
4534 asection **hdrpp;
4535 size_t amt;
4536
4537 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4538 amt += (to - from) * sizeof (asection *);
4539 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4540 if (m == NULL)
4541 return NULL;
4542 m->next = NULL;
4543 m->p_type = PT_LOAD;
4544 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4545 m->sections[i - from] = *hdrpp;
4546 m->count = to - from;
4547
4548 if (from == 0 && phdr)
4549 {
4550 /* Include the headers in the first PT_LOAD segment. */
4551 m->includes_filehdr = 1;
4552 m->includes_phdrs = 1;
4553 }
4554
4555 return m;
4556 }
4557
4558 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4559 on failure. */
4560
4561 struct elf_segment_map *
4562 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4563 {
4564 struct elf_segment_map *m;
4565
4566 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4567 sizeof (struct elf_segment_map));
4568 if (m == NULL)
4569 return NULL;
4570 m->next = NULL;
4571 m->p_type = PT_DYNAMIC;
4572 m->count = 1;
4573 m->sections[0] = dynsec;
4574
4575 return m;
4576 }
4577
4578 /* Possibly add or remove segments from the segment map. */
4579
4580 static bool
4581 elf_modify_segment_map (bfd *abfd,
4582 struct bfd_link_info *info,
4583 bool remove_empty_load)
4584 {
4585 struct elf_segment_map **m;
4586 const struct elf_backend_data *bed;
4587
4588 /* The placement algorithm assumes that non allocated sections are
4589 not in PT_LOAD segments. We ensure this here by removing such
4590 sections from the segment map. We also remove excluded
4591 sections. Finally, any PT_LOAD segment without sections is
4592 removed. */
4593 m = &elf_seg_map (abfd);
4594 while (*m)
4595 {
4596 unsigned int i, new_count;
4597
4598 for (new_count = 0, i = 0; i < (*m)->count; i++)
4599 {
4600 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4601 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4602 || (*m)->p_type != PT_LOAD))
4603 {
4604 (*m)->sections[new_count] = (*m)->sections[i];
4605 new_count++;
4606 }
4607 }
4608 (*m)->count = new_count;
4609
4610 if (remove_empty_load
4611 && (*m)->p_type == PT_LOAD
4612 && (*m)->count == 0
4613 && !(*m)->includes_phdrs)
4614 *m = (*m)->next;
4615 else
4616 m = &(*m)->next;
4617 }
4618
4619 bed = get_elf_backend_data (abfd);
4620 if (bed->elf_backend_modify_segment_map != NULL)
4621 {
4622 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4623 return false;
4624 }
4625
4626 return true;
4627 }
4628
4629 #define IS_TBSS(s) \
4630 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4631
4632 /* Set up a mapping from BFD sections to program segments. */
4633
4634 bool
4635 _bfd_elf_map_sections_to_segments (bfd *abfd, struct bfd_link_info *info)
4636 {
4637 unsigned int count;
4638 struct elf_segment_map *m;
4639 asection **sections = NULL;
4640 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4641 bool no_user_phdrs;
4642
4643 no_user_phdrs = elf_seg_map (abfd) == NULL;
4644
4645 if (info != NULL)
4646 info->user_phdrs = !no_user_phdrs;
4647
4648 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4649 {
4650 asection *s;
4651 unsigned int i;
4652 struct elf_segment_map *mfirst;
4653 struct elf_segment_map **pm;
4654 asection *last_hdr;
4655 bfd_vma last_size;
4656 unsigned int hdr_index;
4657 bfd_vma maxpagesize;
4658 asection **hdrpp;
4659 bool phdr_in_segment;
4660 bool writable;
4661 bool executable;
4662 unsigned int tls_count = 0;
4663 asection *first_tls = NULL;
4664 asection *first_mbind = NULL;
4665 asection *dynsec, *eh_frame_hdr;
4666 size_t amt;
4667 bfd_vma addr_mask, wrap_to = 0; /* Bytes. */
4668 bfd_size_type phdr_size; /* Octets/bytes. */
4669 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
4670
4671 /* Select the allocated sections, and sort them. */
4672
4673 amt = bfd_count_sections (abfd) * sizeof (asection *);
4674 sections = (asection **) bfd_malloc (amt);
4675 if (sections == NULL)
4676 goto error_return;
4677
4678 /* Calculate top address, avoiding undefined behaviour of shift
4679 left operator when shift count is equal to size of type
4680 being shifted. */
4681 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4682 addr_mask = (addr_mask << 1) + 1;
4683
4684 i = 0;
4685 for (s = abfd->sections; s != NULL; s = s->next)
4686 {
4687 if ((s->flags & SEC_ALLOC) != 0)
4688 {
4689 /* target_index is unused until bfd_elf_final_link
4690 starts output of section symbols. Use it to make
4691 qsort stable. */
4692 s->target_index = i;
4693 sections[i] = s;
4694 ++i;
4695 /* A wrapping section potentially clashes with header. */
4696 if (((s->lma + s->size / opb) & addr_mask) < (s->lma & addr_mask))
4697 wrap_to = (s->lma + s->size / opb) & addr_mask;
4698 }
4699 }
4700 BFD_ASSERT (i <= bfd_count_sections (abfd));
4701 count = i;
4702
4703 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4704
4705 phdr_size = elf_program_header_size (abfd);
4706 if (phdr_size == (bfd_size_type) -1)
4707 phdr_size = get_program_header_size (abfd, info);
4708 phdr_size += bed->s->sizeof_ehdr;
4709 /* phdr_size is compared to LMA values which are in bytes. */
4710 phdr_size /= opb;
4711 if (info != NULL)
4712 maxpagesize = info->maxpagesize;
4713 else
4714 maxpagesize = bed->maxpagesize;
4715 if (maxpagesize == 0)
4716 maxpagesize = 1;
4717 phdr_in_segment = info != NULL && info->load_phdrs;
4718 if (count != 0
4719 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4720 >= (phdr_size & (maxpagesize - 1))))
4721 /* For compatibility with old scripts that may not be using
4722 SIZEOF_HEADERS, add headers when it looks like space has
4723 been left for them. */
4724 phdr_in_segment = true;
4725
4726 /* Build the mapping. */
4727 mfirst = NULL;
4728 pm = &mfirst;
4729
4730 /* If we have a .interp section, then create a PT_PHDR segment for
4731 the program headers and a PT_INTERP segment for the .interp
4732 section. */
4733 s = bfd_get_section_by_name (abfd, ".interp");
4734 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4735 {
4736 amt = sizeof (struct elf_segment_map);
4737 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4738 if (m == NULL)
4739 goto error_return;
4740 m->next = NULL;
4741 m->p_type = PT_PHDR;
4742 m->p_flags = PF_R;
4743 m->p_flags_valid = 1;
4744 m->includes_phdrs = 1;
4745 phdr_in_segment = true;
4746 *pm = m;
4747 pm = &m->next;
4748
4749 amt = sizeof (struct elf_segment_map);
4750 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4751 if (m == NULL)
4752 goto error_return;
4753 m->next = NULL;
4754 m->p_type = PT_INTERP;
4755 m->count = 1;
4756 m->sections[0] = s;
4757
4758 *pm = m;
4759 pm = &m->next;
4760 }
4761
4762 /* Look through the sections. We put sections in the same program
4763 segment when the start of the second section can be placed within
4764 a few bytes of the end of the first section. */
4765 last_hdr = NULL;
4766 last_size = 0;
4767 hdr_index = 0;
4768 writable = false;
4769 executable = false;
4770 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4771 if (dynsec != NULL
4772 && (dynsec->flags & SEC_LOAD) == 0)
4773 dynsec = NULL;
4774
4775 if ((abfd->flags & D_PAGED) == 0)
4776 phdr_in_segment = false;
4777
4778 /* Deal with -Ttext or something similar such that the first section
4779 is not adjacent to the program headers. This is an
4780 approximation, since at this point we don't know exactly how many
4781 program headers we will need. */
4782 if (phdr_in_segment && count > 0)
4783 {
4784 bfd_vma phdr_lma; /* Bytes. */
4785 bool separate_phdr = false;
4786
4787 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4788 if (info != NULL
4789 && info->separate_code
4790 && (sections[0]->flags & SEC_CODE) != 0)
4791 {
4792 /* If data sections should be separate from code and
4793 thus not executable, and the first section is
4794 executable then put the file and program headers in
4795 their own PT_LOAD. */
4796 separate_phdr = true;
4797 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4798 == (sections[0]->lma & addr_mask & -maxpagesize)))
4799 {
4800 /* The file and program headers are currently on the
4801 same page as the first section. Put them on the
4802 previous page if we can. */
4803 if (phdr_lma >= maxpagesize)
4804 phdr_lma -= maxpagesize;
4805 else
4806 separate_phdr = false;
4807 }
4808 }
4809 if ((sections[0]->lma & addr_mask) < phdr_lma
4810 || (sections[0]->lma & addr_mask) < phdr_size)
4811 /* If file and program headers would be placed at the end
4812 of memory then it's probably better to omit them. */
4813 phdr_in_segment = false;
4814 else if (phdr_lma < wrap_to)
4815 /* If a section wraps around to where we'll be placing
4816 file and program headers, then the headers will be
4817 overwritten. */
4818 phdr_in_segment = false;
4819 else if (separate_phdr)
4820 {
4821 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4822 if (m == NULL)
4823 goto error_return;
4824 m->p_paddr = phdr_lma * opb;
4825 m->p_vaddr_offset
4826 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4827 m->p_paddr_valid = 1;
4828 *pm = m;
4829 pm = &m->next;
4830 phdr_in_segment = false;
4831 }
4832 }
4833
4834 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4835 {
4836 asection *hdr;
4837 bool new_segment;
4838
4839 hdr = *hdrpp;
4840
4841 /* See if this section and the last one will fit in the same
4842 segment. */
4843
4844 if (last_hdr == NULL)
4845 {
4846 /* If we don't have a segment yet, then we don't need a new
4847 one (we build the last one after this loop). */
4848 new_segment = false;
4849 }
4850 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4851 {
4852 /* If this section has a different relation between the
4853 virtual address and the load address, then we need a new
4854 segment. */
4855 new_segment = true;
4856 }
4857 else if (hdr->lma < last_hdr->lma + last_size
4858 || last_hdr->lma + last_size < last_hdr->lma)
4859 {
4860 /* If this section has a load address that makes it overlap
4861 the previous section, then we need a new segment. */
4862 new_segment = true;
4863 }
4864 else if ((abfd->flags & D_PAGED) != 0
4865 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4866 == (hdr->lma & -maxpagesize)))
4867 {
4868 /* If we are demand paged then we can't map two disk
4869 pages onto the same memory page. */
4870 new_segment = false;
4871 }
4872 /* In the next test we have to be careful when last_hdr->lma is close
4873 to the end of the address space. If the aligned address wraps
4874 around to the start of the address space, then there are no more
4875 pages left in memory and it is OK to assume that the current
4876 section can be included in the current segment. */
4877 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4878 + maxpagesize > last_hdr->lma)
4879 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4880 + maxpagesize <= hdr->lma))
4881 {
4882 /* If putting this section in this segment would force us to
4883 skip a page in the segment, then we need a new segment. */
4884 new_segment = true;
4885 }
4886 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4887 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4888 {
4889 /* We don't want to put a loaded section after a
4890 nonloaded (ie. bss style) section in the same segment
4891 as that will force the non-loaded section to be loaded.
4892 Consider .tbss sections as loaded for this purpose. */
4893 new_segment = true;
4894 }
4895 else if ((abfd->flags & D_PAGED) == 0)
4896 {
4897 /* If the file is not demand paged, which means that we
4898 don't require the sections to be correctly aligned in the
4899 file, then there is no other reason for a new segment. */
4900 new_segment = false;
4901 }
4902 else if (info != NULL
4903 && info->separate_code
4904 && executable != ((hdr->flags & SEC_CODE) != 0))
4905 {
4906 new_segment = true;
4907 }
4908 else if (! writable
4909 && (hdr->flags & SEC_READONLY) == 0)
4910 {
4911 /* We don't want to put a writable section in a read only
4912 segment. */
4913 new_segment = true;
4914 }
4915 else
4916 {
4917 /* Otherwise, we can use the same segment. */
4918 new_segment = false;
4919 }
4920
4921 /* Allow interested parties a chance to override our decision. */
4922 if (last_hdr != NULL
4923 && info != NULL
4924 && info->callbacks->override_segment_assignment != NULL)
4925 new_segment
4926 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4927 last_hdr,
4928 new_segment);
4929
4930 if (! new_segment)
4931 {
4932 if ((hdr->flags & SEC_READONLY) == 0)
4933 writable = true;
4934 if ((hdr->flags & SEC_CODE) != 0)
4935 executable = true;
4936 last_hdr = hdr;
4937 /* .tbss sections effectively have zero size. */
4938 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4939 continue;
4940 }
4941
4942 /* We need a new program segment. We must create a new program
4943 header holding all the sections from hdr_index until hdr. */
4944
4945 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4946 if (m == NULL)
4947 goto error_return;
4948
4949 *pm = m;
4950 pm = &m->next;
4951
4952 if ((hdr->flags & SEC_READONLY) == 0)
4953 writable = true;
4954 else
4955 writable = false;
4956
4957 if ((hdr->flags & SEC_CODE) == 0)
4958 executable = false;
4959 else
4960 executable = true;
4961
4962 last_hdr = hdr;
4963 /* .tbss sections effectively have zero size. */
4964 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4965 hdr_index = i;
4966 phdr_in_segment = false;
4967 }
4968
4969 /* Create a final PT_LOAD program segment, but not if it's just
4970 for .tbss. */
4971 if (last_hdr != NULL
4972 && (i - hdr_index != 1
4973 || !IS_TBSS (last_hdr)))
4974 {
4975 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4976 if (m == NULL)
4977 goto error_return;
4978
4979 *pm = m;
4980 pm = &m->next;
4981 }
4982
4983 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4984 if (dynsec != NULL)
4985 {
4986 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4987 if (m == NULL)
4988 goto error_return;
4989 *pm = m;
4990 pm = &m->next;
4991 }
4992
4993 /* For each batch of consecutive loadable SHT_NOTE sections,
4994 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4995 because if we link together nonloadable .note sections and
4996 loadable .note sections, we will generate two .note sections
4997 in the output file. */
4998 for (s = abfd->sections; s != NULL; s = s->next)
4999 {
5000 if ((s->flags & SEC_LOAD) != 0
5001 && elf_section_type (s) == SHT_NOTE)
5002 {
5003 asection *s2;
5004 unsigned int alignment_power = s->alignment_power;
5005
5006 count = 1;
5007 for (s2 = s; s2->next != NULL; s2 = s2->next)
5008 {
5009 if (s2->next->alignment_power == alignment_power
5010 && (s2->next->flags & SEC_LOAD) != 0
5011 && elf_section_type (s2->next) == SHT_NOTE
5012 && align_power (s2->lma + s2->size / opb,
5013 alignment_power)
5014 == s2->next->lma)
5015 count++;
5016 else
5017 break;
5018 }
5019 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5020 amt += count * sizeof (asection *);
5021 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5022 if (m == NULL)
5023 goto error_return;
5024 m->next = NULL;
5025 m->p_type = PT_NOTE;
5026 m->count = count;
5027 while (count > 1)
5028 {
5029 m->sections[m->count - count--] = s;
5030 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5031 s = s->next;
5032 }
5033 m->sections[m->count - 1] = s;
5034 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5035 *pm = m;
5036 pm = &m->next;
5037 }
5038 if (s->flags & SEC_THREAD_LOCAL)
5039 {
5040 if (! tls_count)
5041 first_tls = s;
5042 tls_count++;
5043 }
5044 if (first_mbind == NULL
5045 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5046 first_mbind = s;
5047 }
5048
5049 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5050 if (tls_count > 0)
5051 {
5052 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5053 amt += tls_count * sizeof (asection *);
5054 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5055 if (m == NULL)
5056 goto error_return;
5057 m->next = NULL;
5058 m->p_type = PT_TLS;
5059 m->count = tls_count;
5060 /* Mandated PF_R. */
5061 m->p_flags = PF_R;
5062 m->p_flags_valid = 1;
5063 s = first_tls;
5064 for (i = 0; i < tls_count; ++i)
5065 {
5066 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5067 {
5068 _bfd_error_handler
5069 (_("%pB: TLS sections are not adjacent:"), abfd);
5070 s = first_tls;
5071 i = 0;
5072 while (i < tls_count)
5073 {
5074 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5075 {
5076 _bfd_error_handler (_(" TLS: %pA"), s);
5077 i++;
5078 }
5079 else
5080 _bfd_error_handler (_(" non-TLS: %pA"), s);
5081 s = s->next;
5082 }
5083 bfd_set_error (bfd_error_bad_value);
5084 goto error_return;
5085 }
5086 m->sections[i] = s;
5087 s = s->next;
5088 }
5089
5090 *pm = m;
5091 pm = &m->next;
5092 }
5093
5094 if (first_mbind
5095 && (abfd->flags & D_PAGED) != 0
5096 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5097 for (s = first_mbind; s != NULL; s = s->next)
5098 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5099 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5100 {
5101 /* Mandated PF_R. */
5102 unsigned long p_flags = PF_R;
5103 if ((s->flags & SEC_READONLY) == 0)
5104 p_flags |= PF_W;
5105 if ((s->flags & SEC_CODE) != 0)
5106 p_flags |= PF_X;
5107
5108 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5109 m = bfd_zalloc (abfd, amt);
5110 if (m == NULL)
5111 goto error_return;
5112 m->next = NULL;
5113 m->p_type = (PT_GNU_MBIND_LO
5114 + elf_section_data (s)->this_hdr.sh_info);
5115 m->count = 1;
5116 m->p_flags_valid = 1;
5117 m->sections[0] = s;
5118 m->p_flags = p_flags;
5119
5120 *pm = m;
5121 pm = &m->next;
5122 }
5123
5124 s = bfd_get_section_by_name (abfd,
5125 NOTE_GNU_PROPERTY_SECTION_NAME);
5126 if (s != NULL && s->size != 0)
5127 {
5128 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5129 m = bfd_zalloc (abfd, amt);
5130 if (m == NULL)
5131 goto error_return;
5132 m->next = NULL;
5133 m->p_type = PT_GNU_PROPERTY;
5134 m->count = 1;
5135 m->p_flags_valid = 1;
5136 m->sections[0] = s;
5137 m->p_flags = PF_R;
5138 *pm = m;
5139 pm = &m->next;
5140 }
5141
5142 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5143 segment. */
5144 eh_frame_hdr = elf_eh_frame_hdr (abfd);
5145 if (eh_frame_hdr != NULL
5146 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5147 {
5148 amt = sizeof (struct elf_segment_map);
5149 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5150 if (m == NULL)
5151 goto error_return;
5152 m->next = NULL;
5153 m->p_type = PT_GNU_EH_FRAME;
5154 m->count = 1;
5155 m->sections[0] = eh_frame_hdr->output_section;
5156
5157 *pm = m;
5158 pm = &m->next;
5159 }
5160
5161 if (elf_stack_flags (abfd))
5162 {
5163 amt = sizeof (struct elf_segment_map);
5164 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5165 if (m == NULL)
5166 goto error_return;
5167 m->next = NULL;
5168 m->p_type = PT_GNU_STACK;
5169 m->p_flags = elf_stack_flags (abfd);
5170 m->p_align = bed->stack_align;
5171 m->p_flags_valid = 1;
5172 m->p_align_valid = m->p_align != 0;
5173 if (info->stacksize > 0)
5174 {
5175 m->p_size = info->stacksize;
5176 m->p_size_valid = 1;
5177 }
5178
5179 *pm = m;
5180 pm = &m->next;
5181 }
5182
5183 if (info != NULL && info->relro)
5184 {
5185 for (m = mfirst; m != NULL; m = m->next)
5186 {
5187 if (m->p_type == PT_LOAD
5188 && m->count != 0
5189 && m->sections[0]->vma >= info->relro_start
5190 && m->sections[0]->vma < info->relro_end)
5191 {
5192 i = m->count;
5193 while (--i != (unsigned) -1)
5194 {
5195 if (m->sections[i]->size > 0
5196 && (m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS))
5197 == (SEC_LOAD | SEC_HAS_CONTENTS))
5198 break;
5199 }
5200
5201 if (i != (unsigned) -1)
5202 break;
5203 }
5204 }
5205
5206 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5207 if (m != NULL)
5208 {
5209 amt = sizeof (struct elf_segment_map);
5210 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5211 if (m == NULL)
5212 goto error_return;
5213 m->next = NULL;
5214 m->p_type = PT_GNU_RELRO;
5215 *pm = m;
5216 pm = &m->next;
5217 }
5218 }
5219
5220 free (sections);
5221 elf_seg_map (abfd) = mfirst;
5222 }
5223
5224 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5225 return false;
5226
5227 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5228 ++count;
5229 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5230
5231 return true;
5232
5233 error_return:
5234 free (sections);
5235 return false;
5236 }
5237
5238 /* Sort sections by address. */
5239
5240 static int
5241 elf_sort_sections (const void *arg1, const void *arg2)
5242 {
5243 const asection *sec1 = *(const asection **) arg1;
5244 const asection *sec2 = *(const asection **) arg2;
5245 bfd_size_type size1, size2;
5246
5247 /* Sort by LMA first, since this is the address used to
5248 place the section into a segment. */
5249 if (sec1->lma < sec2->lma)
5250 return -1;
5251 else if (sec1->lma > sec2->lma)
5252 return 1;
5253
5254 /* Then sort by VMA. Normally the LMA and the VMA will be
5255 the same, and this will do nothing. */
5256 if (sec1->vma < sec2->vma)
5257 return -1;
5258 else if (sec1->vma > sec2->vma)
5259 return 1;
5260
5261 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5262
5263 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0 \
5264 && (x)->size != 0)
5265
5266 if (TOEND (sec1))
5267 {
5268 if (!TOEND (sec2))
5269 return 1;
5270 }
5271 else if (TOEND (sec2))
5272 return -1;
5273
5274 #undef TOEND
5275
5276 /* Sort by size, to put zero sized sections
5277 before others at the same address. */
5278
5279 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5280 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5281
5282 if (size1 < size2)
5283 return -1;
5284 if (size1 > size2)
5285 return 1;
5286
5287 return sec1->target_index - sec2->target_index;
5288 }
5289
5290 /* This qsort comparison functions sorts PT_LOAD segments first and
5291 by p_paddr, for assign_file_positions_for_load_sections. */
5292
5293 static int
5294 elf_sort_segments (const void *arg1, const void *arg2)
5295 {
5296 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5297 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5298
5299 if (m1->p_type != m2->p_type)
5300 {
5301 if (m1->p_type == PT_NULL)
5302 return 1;
5303 if (m2->p_type == PT_NULL)
5304 return -1;
5305 return m1->p_type < m2->p_type ? -1 : 1;
5306 }
5307 if (m1->includes_filehdr != m2->includes_filehdr)
5308 return m1->includes_filehdr ? -1 : 1;
5309 if (m1->no_sort_lma != m2->no_sort_lma)
5310 return m1->no_sort_lma ? -1 : 1;
5311 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5312 {
5313 bfd_vma lma1, lma2; /* Octets. */
5314 lma1 = 0;
5315 if (m1->p_paddr_valid)
5316 lma1 = m1->p_paddr;
5317 else if (m1->count != 0)
5318 {
5319 unsigned int opb = bfd_octets_per_byte (m1->sections[0]->owner,
5320 m1->sections[0]);
5321 lma1 = (m1->sections[0]->lma + m1->p_vaddr_offset) * opb;
5322 }
5323 lma2 = 0;
5324 if (m2->p_paddr_valid)
5325 lma2 = m2->p_paddr;
5326 else if (m2->count != 0)
5327 {
5328 unsigned int opb = bfd_octets_per_byte (m2->sections[0]->owner,
5329 m2->sections[0]);
5330 lma2 = (m2->sections[0]->lma + m2->p_vaddr_offset) * opb;
5331 }
5332 if (lma1 != lma2)
5333 return lma1 < lma2 ? -1 : 1;
5334 }
5335 if (m1->idx != m2->idx)
5336 return m1->idx < m2->idx ? -1 : 1;
5337 return 0;
5338 }
5339
5340 /* Ian Lance Taylor writes:
5341
5342 We shouldn't be using % with a negative signed number. That's just
5343 not good. We have to make sure either that the number is not
5344 negative, or that the number has an unsigned type. When the types
5345 are all the same size they wind up as unsigned. When file_ptr is a
5346 larger signed type, the arithmetic winds up as signed long long,
5347 which is wrong.
5348
5349 What we're trying to say here is something like ``increase OFF by
5350 the least amount that will cause it to be equal to the VMA modulo
5351 the page size.'' */
5352 /* In other words, something like:
5353
5354 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5355 off_offset = off % bed->maxpagesize;
5356 if (vma_offset < off_offset)
5357 adjustment = vma_offset + bed->maxpagesize - off_offset;
5358 else
5359 adjustment = vma_offset - off_offset;
5360
5361 which can be collapsed into the expression below. */
5362
5363 static file_ptr
5364 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5365 {
5366 /* PR binutils/16199: Handle an alignment of zero. */
5367 if (maxpagesize == 0)
5368 maxpagesize = 1;
5369 return ((vma - off) % maxpagesize);
5370 }
5371
5372 static void
5373 print_segment_map (const struct elf_segment_map *m)
5374 {
5375 unsigned int j;
5376 const char *pt = get_segment_type (m->p_type);
5377 char buf[32];
5378
5379 if (pt == NULL)
5380 {
5381 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5382 sprintf (buf, "LOPROC+%7.7x",
5383 (unsigned int) (m->p_type - PT_LOPROC));
5384 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5385 sprintf (buf, "LOOS+%7.7x",
5386 (unsigned int) (m->p_type - PT_LOOS));
5387 else
5388 snprintf (buf, sizeof (buf), "%8.8x",
5389 (unsigned int) m->p_type);
5390 pt = buf;
5391 }
5392 fflush (stdout);
5393 fprintf (stderr, "%s:", pt);
5394 for (j = 0; j < m->count; j++)
5395 fprintf (stderr, " %s", m->sections [j]->name);
5396 putc ('\n',stderr);
5397 fflush (stderr);
5398 }
5399
5400 static bool
5401 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5402 {
5403 void *buf;
5404 bool ret;
5405
5406 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5407 return false;
5408 buf = bfd_zmalloc (len);
5409 if (buf == NULL)
5410 return false;
5411 ret = bfd_bwrite (buf, len, abfd) == len;
5412 free (buf);
5413 return ret;
5414 }
5415
5416 /* Assign file positions to the sections based on the mapping from
5417 sections to segments. This function also sets up some fields in
5418 the file header. */
5419
5420 static bool
5421 assign_file_positions_for_load_sections (bfd *abfd,
5422 struct bfd_link_info *link_info)
5423 {
5424 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5425 struct elf_segment_map *m;
5426 struct elf_segment_map *phdr_load_seg;
5427 Elf_Internal_Phdr *phdrs;
5428 Elf_Internal_Phdr *p;
5429 file_ptr off; /* Octets. */
5430 bfd_size_type maxpagesize;
5431 unsigned int alloc, actual;
5432 unsigned int i, j;
5433 struct elf_segment_map **sorted_seg_map;
5434 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
5435
5436 if (link_info == NULL
5437 && !_bfd_elf_map_sections_to_segments (abfd, link_info))
5438 return false;
5439
5440 alloc = 0;
5441 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5442 m->idx = alloc++;
5443
5444 if (alloc)
5445 {
5446 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5447 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5448 }
5449 else
5450 {
5451 /* PR binutils/12467. */
5452 elf_elfheader (abfd)->e_phoff = 0;
5453 elf_elfheader (abfd)->e_phentsize = 0;
5454 }
5455
5456 elf_elfheader (abfd)->e_phnum = alloc;
5457
5458 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5459 {
5460 actual = alloc;
5461 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5462 }
5463 else
5464 {
5465 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5466 BFD_ASSERT (elf_program_header_size (abfd)
5467 == actual * bed->s->sizeof_phdr);
5468 BFD_ASSERT (actual >= alloc);
5469 }
5470
5471 if (alloc == 0)
5472 {
5473 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5474 return true;
5475 }
5476
5477 /* We're writing the size in elf_program_header_size (abfd),
5478 see assign_file_positions_except_relocs, so make sure we have
5479 that amount allocated, with trailing space cleared.
5480 The variable alloc contains the computed need, while
5481 elf_program_header_size (abfd) contains the size used for the
5482 layout.
5483 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5484 where the layout is forced to according to a larger size in the
5485 last iterations for the testcase ld-elf/header. */
5486 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5487 + alloc * sizeof (*sorted_seg_map)));
5488 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5489 elf_tdata (abfd)->phdr = phdrs;
5490 if (phdrs == NULL)
5491 return false;
5492
5493 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5494 {
5495 sorted_seg_map[j] = m;
5496 /* If elf_segment_map is not from map_sections_to_segments, the
5497 sections may not be correctly ordered. NOTE: sorting should
5498 not be done to the PT_NOTE section of a corefile, which may
5499 contain several pseudo-sections artificially created by bfd.
5500 Sorting these pseudo-sections breaks things badly. */
5501 if (m->count > 1
5502 && !(elf_elfheader (abfd)->e_type == ET_CORE
5503 && m->p_type == PT_NOTE))
5504 {
5505 for (i = 0; i < m->count; i++)
5506 m->sections[i]->target_index = i;
5507 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5508 elf_sort_sections);
5509 }
5510 }
5511 if (alloc > 1)
5512 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5513 elf_sort_segments);
5514
5515 maxpagesize = 1;
5516 if ((abfd->flags & D_PAGED) != 0)
5517 {
5518 if (link_info != NULL)
5519 maxpagesize = link_info->maxpagesize;
5520 else
5521 maxpagesize = bed->maxpagesize;
5522 }
5523
5524 /* Sections must map to file offsets past the ELF file header. */
5525 off = bed->s->sizeof_ehdr;
5526 /* And if one of the PT_LOAD headers doesn't include the program
5527 headers then we'll be mapping program headers in the usual
5528 position after the ELF file header. */
5529 phdr_load_seg = NULL;
5530 for (j = 0; j < alloc; j++)
5531 {
5532 m = sorted_seg_map[j];
5533 if (m->p_type != PT_LOAD)
5534 break;
5535 if (m->includes_phdrs)
5536 {
5537 phdr_load_seg = m;
5538 break;
5539 }
5540 }
5541 if (phdr_load_seg == NULL)
5542 off += actual * bed->s->sizeof_phdr;
5543
5544 for (j = 0; j < alloc; j++)
5545 {
5546 asection **secpp;
5547 bfd_vma off_adjust; /* Octets. */
5548 bool no_contents;
5549
5550 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5551 number of sections with contents contributing to both p_filesz
5552 and p_memsz, followed by a number of sections with no contents
5553 that just contribute to p_memsz. In this loop, OFF tracks next
5554 available file offset for PT_LOAD and PT_NOTE segments. */
5555 m = sorted_seg_map[j];
5556 p = phdrs + m->idx;
5557 p->p_type = m->p_type;
5558 p->p_flags = m->p_flags;
5559
5560 if (m->count == 0)
5561 p->p_vaddr = m->p_vaddr_offset * opb;
5562 else
5563 p->p_vaddr = (m->sections[0]->vma + m->p_vaddr_offset) * opb;
5564
5565 if (m->p_paddr_valid)
5566 p->p_paddr = m->p_paddr;
5567 else if (m->count == 0)
5568 p->p_paddr = 0;
5569 else
5570 p->p_paddr = (m->sections[0]->lma + m->p_vaddr_offset) * opb;
5571
5572 if (p->p_type == PT_LOAD
5573 && (abfd->flags & D_PAGED) != 0)
5574 {
5575 /* p_align in demand paged PT_LOAD segments effectively stores
5576 the maximum page size. When copying an executable with
5577 objcopy, we set m->p_align from the input file. Use this
5578 value for maxpagesize rather than bed->maxpagesize, which
5579 may be different. Note that we use maxpagesize for PT_TLS
5580 segment alignment later in this function, so we are relying
5581 on at least one PT_LOAD segment appearing before a PT_TLS
5582 segment. */
5583 if (m->p_align_valid)
5584 maxpagesize = m->p_align;
5585
5586 p->p_align = maxpagesize;
5587 }
5588 else if (m->p_align_valid)
5589 p->p_align = m->p_align;
5590 else if (m->count == 0)
5591 p->p_align = 1 << bed->s->log_file_align;
5592
5593 if (m == phdr_load_seg)
5594 {
5595 if (!m->includes_filehdr)
5596 p->p_offset = off;
5597 off += actual * bed->s->sizeof_phdr;
5598 }
5599
5600 no_contents = false;
5601 off_adjust = 0;
5602 if (p->p_type == PT_LOAD
5603 && m->count > 0)
5604 {
5605 bfd_size_type align; /* Bytes. */
5606 unsigned int align_power = 0;
5607
5608 if (m->p_align_valid)
5609 align = p->p_align;
5610 else
5611 {
5612 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5613 {
5614 unsigned int secalign;
5615
5616 secalign = bfd_section_alignment (*secpp);
5617 if (secalign > align_power)
5618 align_power = secalign;
5619 }
5620 align = (bfd_size_type) 1 << align_power;
5621 if (align < maxpagesize)
5622 align = maxpagesize;
5623 }
5624
5625 for (i = 0; i < m->count; i++)
5626 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5627 /* If we aren't making room for this section, then
5628 it must be SHT_NOBITS regardless of what we've
5629 set via struct bfd_elf_special_section. */
5630 elf_section_type (m->sections[i]) = SHT_NOBITS;
5631
5632 /* Find out whether this segment contains any loadable
5633 sections. */
5634 no_contents = true;
5635 for (i = 0; i < m->count; i++)
5636 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5637 {
5638 no_contents = false;
5639 break;
5640 }
5641
5642 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align * opb);
5643
5644 /* Broken hardware and/or kernel require that files do not
5645 map the same page with different permissions on some hppa
5646 processors. */
5647 if (j != 0
5648 && (abfd->flags & D_PAGED) != 0
5649 && bed->no_page_alias
5650 && (off & (maxpagesize - 1)) != 0
5651 && ((off & -maxpagesize)
5652 == ((off + off_adjust) & -maxpagesize)))
5653 off_adjust += maxpagesize;
5654 off += off_adjust;
5655 if (no_contents)
5656 {
5657 /* We shouldn't need to align the segment on disk since
5658 the segment doesn't need file space, but the gABI
5659 arguably requires the alignment and glibc ld.so
5660 checks it. So to comply with the alignment
5661 requirement but not waste file space, we adjust
5662 p_offset for just this segment. (OFF_ADJUST is
5663 subtracted from OFF later.) This may put p_offset
5664 past the end of file, but that shouldn't matter. */
5665 }
5666 else
5667 off_adjust = 0;
5668 }
5669 /* Make sure the .dynamic section is the first section in the
5670 PT_DYNAMIC segment. */
5671 else if (p->p_type == PT_DYNAMIC
5672 && m->count > 1
5673 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5674 {
5675 _bfd_error_handler
5676 (_("%pB: The first section in the PT_DYNAMIC segment"
5677 " is not the .dynamic section"),
5678 abfd);
5679 bfd_set_error (bfd_error_bad_value);
5680 return false;
5681 }
5682 /* Set the note section type to SHT_NOTE. */
5683 else if (p->p_type == PT_NOTE)
5684 for (i = 0; i < m->count; i++)
5685 elf_section_type (m->sections[i]) = SHT_NOTE;
5686
5687 if (m->includes_filehdr)
5688 {
5689 if (!m->p_flags_valid)
5690 p->p_flags |= PF_R;
5691 p->p_filesz = bed->s->sizeof_ehdr;
5692 p->p_memsz = bed->s->sizeof_ehdr;
5693 if (p->p_type == PT_LOAD)
5694 {
5695 if (m->count > 0)
5696 {
5697 if (p->p_vaddr < (bfd_vma) off
5698 || (!m->p_paddr_valid
5699 && p->p_paddr < (bfd_vma) off))
5700 {
5701 _bfd_error_handler
5702 (_("%pB: not enough room for program headers,"
5703 " try linking with -N"),
5704 abfd);
5705 bfd_set_error (bfd_error_bad_value);
5706 return false;
5707 }
5708 p->p_vaddr -= off;
5709 if (!m->p_paddr_valid)
5710 p->p_paddr -= off;
5711 }
5712 }
5713 else if (sorted_seg_map[0]->includes_filehdr)
5714 {
5715 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5716 p->p_vaddr = filehdr->p_vaddr;
5717 if (!m->p_paddr_valid)
5718 p->p_paddr = filehdr->p_paddr;
5719 }
5720 }
5721
5722 if (m->includes_phdrs)
5723 {
5724 if (!m->p_flags_valid)
5725 p->p_flags |= PF_R;
5726 p->p_filesz += actual * bed->s->sizeof_phdr;
5727 p->p_memsz += actual * bed->s->sizeof_phdr;
5728 if (!m->includes_filehdr)
5729 {
5730 if (p->p_type == PT_LOAD)
5731 {
5732 elf_elfheader (abfd)->e_phoff = p->p_offset;
5733 if (m->count > 0)
5734 {
5735 p->p_vaddr -= off - p->p_offset;
5736 if (!m->p_paddr_valid)
5737 p->p_paddr -= off - p->p_offset;
5738 }
5739 }
5740 else if (phdr_load_seg != NULL)
5741 {
5742 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5743 bfd_vma phdr_off = 0; /* Octets. */
5744 if (phdr_load_seg->includes_filehdr)
5745 phdr_off = bed->s->sizeof_ehdr;
5746 p->p_vaddr = phdr->p_vaddr + phdr_off;
5747 if (!m->p_paddr_valid)
5748 p->p_paddr = phdr->p_paddr + phdr_off;
5749 p->p_offset = phdr->p_offset + phdr_off;
5750 }
5751 else
5752 p->p_offset = bed->s->sizeof_ehdr;
5753 }
5754 }
5755
5756 if (p->p_type == PT_LOAD
5757 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5758 {
5759 if (!m->includes_filehdr && !m->includes_phdrs)
5760 {
5761 p->p_offset = off;
5762 if (no_contents)
5763 {
5764 /* Put meaningless p_offset for PT_LOAD segments
5765 without file contents somewhere within the first
5766 page, in an attempt to not point past EOF. */
5767 bfd_size_type align = maxpagesize;
5768 if (align < p->p_align)
5769 align = p->p_align;
5770 if (align < 1)
5771 align = 1;
5772 p->p_offset = off % align;
5773 }
5774 }
5775 else
5776 {
5777 file_ptr adjust; /* Octets. */
5778
5779 adjust = off - (p->p_offset + p->p_filesz);
5780 if (!no_contents)
5781 p->p_filesz += adjust;
5782 p->p_memsz += adjust;
5783 }
5784 }
5785
5786 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5787 maps. Set filepos for sections in PT_LOAD segments, and in
5788 core files, for sections in PT_NOTE segments.
5789 assign_file_positions_for_non_load_sections will set filepos
5790 for other sections and update p_filesz for other segments. */
5791 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5792 {
5793 asection *sec;
5794 bfd_size_type align;
5795 Elf_Internal_Shdr *this_hdr;
5796
5797 sec = *secpp;
5798 this_hdr = &elf_section_data (sec)->this_hdr;
5799 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5800
5801 if ((p->p_type == PT_LOAD
5802 || p->p_type == PT_TLS)
5803 && (this_hdr->sh_type != SHT_NOBITS
5804 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5805 && ((this_hdr->sh_flags & SHF_TLS) == 0
5806 || p->p_type == PT_TLS))))
5807 {
5808 bfd_vma p_start = p->p_paddr; /* Octets. */
5809 bfd_vma p_end = p_start + p->p_memsz; /* Octets. */
5810 bfd_vma s_start = sec->lma * opb; /* Octets. */
5811 bfd_vma adjust = s_start - p_end; /* Octets. */
5812
5813 if (adjust != 0
5814 && (s_start < p_end
5815 || p_end < p_start))
5816 {
5817 _bfd_error_handler
5818 /* xgettext:c-format */
5819 (_("%pB: section %pA lma %#" PRIx64 " adjusted to %#" PRIx64),
5820 abfd, sec, (uint64_t) s_start / opb,
5821 (uint64_t) p_end / opb);
5822 adjust = 0;
5823 sec->lma = p_end / opb;
5824 }
5825 p->p_memsz += adjust;
5826
5827 if (p->p_type == PT_LOAD)
5828 {
5829 if (this_hdr->sh_type != SHT_NOBITS)
5830 {
5831 off_adjust = 0;
5832 if (p->p_filesz + adjust < p->p_memsz)
5833 {
5834 /* We have a PROGBITS section following NOBITS ones.
5835 Allocate file space for the NOBITS section(s) and
5836 zero it. */
5837 adjust = p->p_memsz - p->p_filesz;
5838 if (!write_zeros (abfd, off, adjust))
5839 return false;
5840 }
5841 }
5842 /* We only adjust sh_offset in SHT_NOBITS sections
5843 as would seem proper for their address when the
5844 section is first in the segment. sh_offset
5845 doesn't really have any significance for
5846 SHT_NOBITS anyway, apart from a notional position
5847 relative to other sections. Historically we
5848 didn't bother with adjusting sh_offset and some
5849 programs depend on it not being adjusted. See
5850 pr12921 and pr25662. */
5851 if (this_hdr->sh_type != SHT_NOBITS || i == 0)
5852 {
5853 off += adjust;
5854 if (this_hdr->sh_type == SHT_NOBITS)
5855 off_adjust += adjust;
5856 }
5857 }
5858 if (this_hdr->sh_type != SHT_NOBITS)
5859 p->p_filesz += adjust;
5860 }
5861
5862 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5863 {
5864 /* The section at i == 0 is the one that actually contains
5865 everything. */
5866 if (i == 0)
5867 {
5868 this_hdr->sh_offset = sec->filepos = off;
5869 off += this_hdr->sh_size;
5870 p->p_filesz = this_hdr->sh_size;
5871 p->p_memsz = 0;
5872 p->p_align = 1;
5873 }
5874 else
5875 {
5876 /* The rest are fake sections that shouldn't be written. */
5877 sec->filepos = 0;
5878 sec->size = 0;
5879 sec->flags = 0;
5880 continue;
5881 }
5882 }
5883 else
5884 {
5885 if (p->p_type == PT_LOAD)
5886 {
5887 this_hdr->sh_offset = sec->filepos = off;
5888 if (this_hdr->sh_type != SHT_NOBITS)
5889 off += this_hdr->sh_size;
5890 }
5891 else if (this_hdr->sh_type == SHT_NOBITS
5892 && (this_hdr->sh_flags & SHF_TLS) != 0
5893 && this_hdr->sh_offset == 0)
5894 {
5895 /* This is a .tbss section that didn't get a PT_LOAD.
5896 (See _bfd_elf_map_sections_to_segments "Create a
5897 final PT_LOAD".) Set sh_offset to the value it
5898 would have if we had created a zero p_filesz and
5899 p_memsz PT_LOAD header for the section. This
5900 also makes the PT_TLS header have the same
5901 p_offset value. */
5902 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5903 off, align);
5904 this_hdr->sh_offset = sec->filepos = off + adjust;
5905 }
5906
5907 if (this_hdr->sh_type != SHT_NOBITS)
5908 {
5909 p->p_filesz += this_hdr->sh_size;
5910 /* A load section without SHF_ALLOC is something like
5911 a note section in a PT_NOTE segment. These take
5912 file space but are not loaded into memory. */
5913 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5914 p->p_memsz += this_hdr->sh_size;
5915 }
5916 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5917 {
5918 if (p->p_type == PT_TLS)
5919 p->p_memsz += this_hdr->sh_size;
5920
5921 /* .tbss is special. It doesn't contribute to p_memsz of
5922 normal segments. */
5923 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5924 p->p_memsz += this_hdr->sh_size;
5925 }
5926
5927 if (align > p->p_align
5928 && !m->p_align_valid
5929 && (p->p_type != PT_LOAD
5930 || (abfd->flags & D_PAGED) == 0))
5931 p->p_align = align;
5932 }
5933
5934 if (!m->p_flags_valid)
5935 {
5936 p->p_flags |= PF_R;
5937 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5938 p->p_flags |= PF_X;
5939 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5940 p->p_flags |= PF_W;
5941 }
5942 }
5943
5944 off -= off_adjust;
5945
5946 /* PR ld/20815 - Check that the program header segment, if
5947 present, will be loaded into memory. */
5948 if (p->p_type == PT_PHDR
5949 && phdr_load_seg == NULL
5950 && !(bed->elf_backend_allow_non_load_phdr != NULL
5951 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5952 {
5953 /* The fix for this error is usually to edit the linker script being
5954 used and set up the program headers manually. Either that or
5955 leave room for the headers at the start of the SECTIONS. */
5956 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5957 " by LOAD segment"),
5958 abfd);
5959 if (link_info == NULL)
5960 return false;
5961 /* Arrange for the linker to exit with an error, deleting
5962 the output file unless --noinhibit-exec is given. */
5963 link_info->callbacks->info ("%X");
5964 }
5965
5966 /* Check that all sections are in a PT_LOAD segment.
5967 Don't check funky gdb generated core files. */
5968 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
5969 {
5970 bool check_vma = true;
5971
5972 for (i = 1; i < m->count; i++)
5973 if (m->sections[i]->vma == m->sections[i - 1]->vma
5974 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
5975 ->this_hdr), p) != 0
5976 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
5977 ->this_hdr), p) != 0)
5978 {
5979 /* Looks like we have overlays packed into the segment. */
5980 check_vma = false;
5981 break;
5982 }
5983
5984 for (i = 0; i < m->count; i++)
5985 {
5986 Elf_Internal_Shdr *this_hdr;
5987 asection *sec;
5988
5989 sec = m->sections[i];
5990 this_hdr = &(elf_section_data(sec)->this_hdr);
5991 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
5992 && !ELF_TBSS_SPECIAL (this_hdr, p))
5993 {
5994 _bfd_error_handler
5995 /* xgettext:c-format */
5996 (_("%pB: section `%pA' can't be allocated in segment %d"),
5997 abfd, sec, j);
5998 print_segment_map (m);
5999 }
6000 }
6001 }
6002 }
6003
6004 elf_next_file_pos (abfd) = off;
6005
6006 if (link_info != NULL
6007 && phdr_load_seg != NULL
6008 && phdr_load_seg->includes_filehdr)
6009 {
6010 /* There is a segment that contains both the file headers and the
6011 program headers, so provide a symbol __ehdr_start pointing there.
6012 A program can use this to examine itself robustly. */
6013
6014 struct elf_link_hash_entry *hash
6015 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
6016 false, false, true);
6017 /* If the symbol was referenced and not defined, define it. */
6018 if (hash != NULL
6019 && (hash->root.type == bfd_link_hash_new
6020 || hash->root.type == bfd_link_hash_undefined
6021 || hash->root.type == bfd_link_hash_undefweak
6022 || hash->root.type == bfd_link_hash_common))
6023 {
6024 asection *s = NULL;
6025 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr / opb;
6026
6027 if (phdr_load_seg->count != 0)
6028 /* The segment contains sections, so use the first one. */
6029 s = phdr_load_seg->sections[0];
6030 else
6031 /* Use the first (i.e. lowest-addressed) section in any segment. */
6032 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
6033 if (m->p_type == PT_LOAD && m->count != 0)
6034 {
6035 s = m->sections[0];
6036 break;
6037 }
6038
6039 if (s != NULL)
6040 {
6041 hash->root.u.def.value = filehdr_vaddr - s->vma;
6042 hash->root.u.def.section = s;
6043 }
6044 else
6045 {
6046 hash->root.u.def.value = filehdr_vaddr;
6047 hash->root.u.def.section = bfd_abs_section_ptr;
6048 }
6049
6050 hash->root.type = bfd_link_hash_defined;
6051 hash->def_regular = 1;
6052 hash->non_elf = 0;
6053 }
6054 }
6055
6056 return true;
6057 }
6058
6059 /* Determine if a bfd is a debuginfo file. Unfortunately there
6060 is no defined method for detecting such files, so we have to
6061 use heuristics instead. */
6062
6063 bool
6064 is_debuginfo_file (bfd *abfd)
6065 {
6066 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6067 return false;
6068
6069 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6070 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6071 Elf_Internal_Shdr **headerp;
6072
6073 for (headerp = start_headers; headerp < end_headers; headerp ++)
6074 {
6075 Elf_Internal_Shdr *header = * headerp;
6076
6077 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6078 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6079 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6080 && header->sh_type != SHT_NOBITS
6081 && header->sh_type != SHT_NOTE)
6082 return false;
6083 }
6084
6085 return true;
6086 }
6087
6088 /* Assign file positions for the other sections, except for compressed debugging
6089 and other sections assigned in _bfd_elf_assign_file_positions_for_non_load(). */
6090
6091 static bool
6092 assign_file_positions_for_non_load_sections (bfd *abfd,
6093 struct bfd_link_info *link_info)
6094 {
6095 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6096 Elf_Internal_Shdr **i_shdrpp;
6097 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6098 Elf_Internal_Phdr *phdrs;
6099 Elf_Internal_Phdr *p;
6100 struct elf_segment_map *m;
6101 file_ptr off;
6102 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
6103 bfd_vma maxpagesize;
6104
6105 if (link_info != NULL)
6106 maxpagesize = link_info->maxpagesize;
6107 else
6108 maxpagesize = bed->maxpagesize;
6109 i_shdrpp = elf_elfsections (abfd);
6110 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6111 off = elf_next_file_pos (abfd);
6112 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6113 {
6114 Elf_Internal_Shdr *hdr;
6115
6116 hdr = *hdrpp;
6117 if (hdr->bfd_section != NULL
6118 && (hdr->bfd_section->filepos != 0
6119 || (hdr->sh_type == SHT_NOBITS
6120 && hdr->contents == NULL)))
6121 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6122 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6123 {
6124 if (hdr->sh_size != 0
6125 /* PR 24717 - debuginfo files are known to be not strictly
6126 compliant with the ELF standard. In particular they often
6127 have .note.gnu.property sections that are outside of any
6128 loadable segment. This is not a problem for such files,
6129 so do not warn about them. */
6130 && ! is_debuginfo_file (abfd))
6131 _bfd_error_handler
6132 /* xgettext:c-format */
6133 (_("%pB: warning: allocated section `%s' not in segment"),
6134 abfd,
6135 (hdr->bfd_section == NULL
6136 ? "*unknown*"
6137 : hdr->bfd_section->name));
6138 /* We don't need to page align empty sections. */
6139 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6140 off += vma_page_aligned_bias (hdr->sh_addr, off,
6141 maxpagesize);
6142 else
6143 off += vma_page_aligned_bias (hdr->sh_addr, off,
6144 hdr->sh_addralign);
6145 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6146 false);
6147 }
6148 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6149 && hdr->bfd_section == NULL)
6150 /* We don't know the offset of these sections yet: their size has
6151 not been decided. */
6152 || (hdr->bfd_section != NULL
6153 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6154 || (bfd_section_is_ctf (hdr->bfd_section)
6155 && abfd->is_linker_output)))
6156 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6157 || (elf_symtab_shndx_list (abfd) != NULL
6158 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6159 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6160 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6161 hdr->sh_offset = -1;
6162 else
6163 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
6164 }
6165 elf_next_file_pos (abfd) = off;
6166
6167 /* Now that we have set the section file positions, we can set up
6168 the file positions for the non PT_LOAD segments. */
6169 phdrs = elf_tdata (abfd)->phdr;
6170 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6171 {
6172 if (p->p_type == PT_GNU_RELRO)
6173 {
6174 bfd_vma start, end; /* Bytes. */
6175 bool ok;
6176
6177 if (link_info != NULL)
6178 {
6179 /* During linking the range of the RELRO segment is passed
6180 in link_info. Note that there may be padding between
6181 relro_start and the first RELRO section. */
6182 start = link_info->relro_start;
6183 end = link_info->relro_end;
6184 }
6185 else if (m->count != 0)
6186 {
6187 if (!m->p_size_valid)
6188 abort ();
6189 start = m->sections[0]->vma;
6190 end = start + m->p_size / opb;
6191 }
6192 else
6193 {
6194 start = 0;
6195 end = 0;
6196 }
6197
6198 ok = false;
6199 if (start < end)
6200 {
6201 struct elf_segment_map *lm;
6202 const Elf_Internal_Phdr *lp;
6203 unsigned int i;
6204
6205 /* Find a LOAD segment containing a section in the RELRO
6206 segment. */
6207 for (lm = elf_seg_map (abfd), lp = phdrs;
6208 lm != NULL;
6209 lm = lm->next, lp++)
6210 {
6211 if (lp->p_type == PT_LOAD
6212 && lm->count != 0
6213 && (lm->sections[lm->count - 1]->vma
6214 + (!IS_TBSS (lm->sections[lm->count - 1])
6215 ? lm->sections[lm->count - 1]->size / opb
6216 : 0)) > start
6217 && lm->sections[0]->vma < end)
6218 break;
6219 }
6220
6221 if (lm != NULL)
6222 {
6223 /* Find the section starting the RELRO segment. */
6224 for (i = 0; i < lm->count; i++)
6225 {
6226 asection *s = lm->sections[i];
6227 if (s->vma >= start
6228 && s->vma < end
6229 && s->size != 0)
6230 break;
6231 }
6232
6233 if (i < lm->count)
6234 {
6235 p->p_vaddr = lm->sections[i]->vma * opb;
6236 p->p_paddr = lm->sections[i]->lma * opb;
6237 p->p_offset = lm->sections[i]->filepos;
6238 p->p_memsz = end * opb - p->p_vaddr;
6239 p->p_filesz = p->p_memsz;
6240
6241 /* The RELRO segment typically ends a few bytes
6242 into .got.plt but other layouts are possible.
6243 In cases where the end does not match any
6244 loaded section (for instance is in file
6245 padding), trim p_filesz back to correspond to
6246 the end of loaded section contents. */
6247 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6248 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6249
6250 /* Preserve the alignment and flags if they are
6251 valid. The gold linker generates RW/4 for
6252 the PT_GNU_RELRO section. It is better for
6253 objcopy/strip to honor these attributes
6254 otherwise gdb will choke when using separate
6255 debug files. */
6256 if (!m->p_align_valid)
6257 p->p_align = 1;
6258 if (!m->p_flags_valid)
6259 p->p_flags = PF_R;
6260 ok = true;
6261 }
6262 }
6263 }
6264
6265 if (!ok)
6266 {
6267 if (link_info != NULL)
6268 _bfd_error_handler
6269 (_("%pB: warning: unable to allocate any sections to PT_GNU_RELRO segment"),
6270 abfd);
6271 memset (p, 0, sizeof *p);
6272 }
6273 }
6274 else if (p->p_type == PT_GNU_STACK)
6275 {
6276 if (m->p_size_valid)
6277 p->p_memsz = m->p_size;
6278 }
6279 else if (m->count != 0)
6280 {
6281 unsigned int i;
6282
6283 if (p->p_type != PT_LOAD
6284 && (p->p_type != PT_NOTE
6285 || bfd_get_format (abfd) != bfd_core))
6286 {
6287 /* A user specified segment layout may include a PHDR
6288 segment that overlaps with a LOAD segment... */
6289 if (p->p_type == PT_PHDR)
6290 {
6291 m->count = 0;
6292 continue;
6293 }
6294
6295 if (m->includes_filehdr || m->includes_phdrs)
6296 {
6297 /* PR 17512: file: 2195325e. */
6298 _bfd_error_handler
6299 (_("%pB: error: non-load segment %d includes file header "
6300 "and/or program header"),
6301 abfd, (int) (p - phdrs));
6302 return false;
6303 }
6304
6305 p->p_filesz = 0;
6306 p->p_offset = m->sections[0]->filepos;
6307 for (i = m->count; i-- != 0;)
6308 {
6309 asection *sect = m->sections[i];
6310 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6311 if (hdr->sh_type != SHT_NOBITS)
6312 {
6313 p->p_filesz = (sect->filepos - m->sections[0]->filepos
6314 + hdr->sh_size);
6315 /* NB: p_memsz of the loadable PT_NOTE segment
6316 should be the same as p_filesz. */
6317 if (p->p_type == PT_NOTE
6318 && (hdr->sh_flags & SHF_ALLOC) != 0)
6319 p->p_memsz = p->p_filesz;
6320 break;
6321 }
6322 }
6323 }
6324 }
6325 }
6326
6327 return true;
6328 }
6329
6330 static elf_section_list *
6331 find_section_in_list (unsigned int i, elf_section_list * list)
6332 {
6333 for (;list != NULL; list = list->next)
6334 if (list->ndx == i)
6335 break;
6336 return list;
6337 }
6338
6339 /* Work out the file positions of all the sections. This is called by
6340 _bfd_elf_compute_section_file_positions. All the section sizes and
6341 VMAs must be known before this is called.
6342
6343 Reloc sections come in two flavours: Those processed specially as
6344 "side-channel" data attached to a section to which they apply, and those that
6345 bfd doesn't process as relocations. The latter sort are stored in a normal
6346 bfd section by bfd_section_from_shdr. We don't consider the former sort
6347 here, unless they form part of the loadable image. Reloc sections not
6348 assigned here (and compressed debugging sections and CTF sections which
6349 nothing else in the file can rely upon) will be handled later by
6350 assign_file_positions_for_relocs.
6351
6352 We also don't set the positions of the .symtab and .strtab here. */
6353
6354 static bool
6355 assign_file_positions_except_relocs (bfd *abfd,
6356 struct bfd_link_info *link_info)
6357 {
6358 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6359 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6360 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6361 unsigned int alloc;
6362
6363 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6364 && bfd_get_format (abfd) != bfd_core)
6365 {
6366 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6367 unsigned int num_sec = elf_numsections (abfd);
6368 Elf_Internal_Shdr **hdrpp;
6369 unsigned int i;
6370 file_ptr off;
6371
6372 /* Start after the ELF header. */
6373 off = i_ehdrp->e_ehsize;
6374
6375 /* We are not creating an executable, which means that we are
6376 not creating a program header, and that the actual order of
6377 the sections in the file is unimportant. */
6378 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6379 {
6380 Elf_Internal_Shdr *hdr;
6381
6382 hdr = *hdrpp;
6383 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6384 && hdr->bfd_section == NULL)
6385 /* Do not assign offsets for these sections yet: we don't know
6386 their sizes. */
6387 || (hdr->bfd_section != NULL
6388 && (hdr->bfd_section->flags & SEC_ELF_COMPRESS
6389 || (bfd_section_is_ctf (hdr->bfd_section)
6390 && abfd->is_linker_output)))
6391 || i == elf_onesymtab (abfd)
6392 || (elf_symtab_shndx_list (abfd) != NULL
6393 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6394 || i == elf_strtab_sec (abfd)
6395 || i == elf_shstrtab_sec (abfd))
6396 {
6397 hdr->sh_offset = -1;
6398 }
6399 else
6400 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
6401 }
6402
6403 elf_next_file_pos (abfd) = off;
6404 elf_program_header_size (abfd) = 0;
6405 }
6406 else
6407 {
6408 /* Assign file positions for the loaded sections based on the
6409 assignment of sections to segments. */
6410 if (!assign_file_positions_for_load_sections (abfd, link_info))
6411 return false;
6412
6413 /* And for non-load sections. */
6414 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6415 return false;
6416 }
6417
6418 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6419 return false;
6420
6421 /* Write out the program headers. */
6422 alloc = i_ehdrp->e_phnum;
6423 if (alloc != 0)
6424 {
6425 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6426 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6427 return false;
6428 }
6429
6430 return true;
6431 }
6432
6433 bool
6434 _bfd_elf_init_file_header (bfd *abfd,
6435 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6436 {
6437 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6438 struct elf_strtab_hash *shstrtab;
6439 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6440
6441 i_ehdrp = elf_elfheader (abfd);
6442
6443 shstrtab = _bfd_elf_strtab_init ();
6444 if (shstrtab == NULL)
6445 return false;
6446
6447 elf_shstrtab (abfd) = shstrtab;
6448
6449 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6450 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6451 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6452 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6453
6454 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6455 i_ehdrp->e_ident[EI_DATA] =
6456 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6457 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6458
6459 if ((abfd->flags & DYNAMIC) != 0)
6460 i_ehdrp->e_type = ET_DYN;
6461 else if ((abfd->flags & EXEC_P) != 0)
6462 i_ehdrp->e_type = ET_EXEC;
6463 else if (bfd_get_format (abfd) == bfd_core)
6464 i_ehdrp->e_type = ET_CORE;
6465 else
6466 i_ehdrp->e_type = ET_REL;
6467
6468 switch (bfd_get_arch (abfd))
6469 {
6470 case bfd_arch_unknown:
6471 i_ehdrp->e_machine = EM_NONE;
6472 break;
6473
6474 /* There used to be a long list of cases here, each one setting
6475 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6476 in the corresponding bfd definition. To avoid duplication,
6477 the switch was removed. Machines that need special handling
6478 can generally do it in elf_backend_final_write_processing(),
6479 unless they need the information earlier than the final write.
6480 Such need can generally be supplied by replacing the tests for
6481 e_machine with the conditions used to determine it. */
6482 default:
6483 i_ehdrp->e_machine = bed->elf_machine_code;
6484 }
6485
6486 i_ehdrp->e_version = bed->s->ev_current;
6487 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6488
6489 /* No program header, for now. */
6490 i_ehdrp->e_phoff = 0;
6491 i_ehdrp->e_phentsize = 0;
6492 i_ehdrp->e_phnum = 0;
6493
6494 /* Each bfd section is section header entry. */
6495 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6496 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6497
6498 elf_tdata (abfd)->symtab_hdr.sh_name =
6499 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", false);
6500 elf_tdata (abfd)->strtab_hdr.sh_name =
6501 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", false);
6502 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6503 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", false);
6504 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6505 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6506 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6507 return false;
6508
6509 return true;
6510 }
6511
6512 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6513
6514 FIXME: We used to have code here to sort the PT_LOAD segments into
6515 ascending order, as per the ELF spec. But this breaks some programs,
6516 including the Linux kernel. But really either the spec should be
6517 changed or the programs updated. */
6518
6519 bool
6520 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6521 {
6522 if (link_info != NULL && bfd_link_pie (link_info))
6523 {
6524 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6525 unsigned int num_segments = i_ehdrp->e_phnum;
6526 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6527 Elf_Internal_Phdr *segment = tdata->phdr;
6528 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6529
6530 /* Find the lowest p_vaddr in PT_LOAD segments. */
6531 bfd_vma p_vaddr = (bfd_vma) -1;
6532 for (; segment < end_segment; segment++)
6533 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6534 p_vaddr = segment->p_vaddr;
6535
6536 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6537 segments is non-zero. */
6538 if (p_vaddr)
6539 i_ehdrp->e_type = ET_EXEC;
6540 }
6541 return true;
6542 }
6543
6544 /* Assign file positions for all the reloc sections which are not part
6545 of the loadable file image, and the file position of section headers. */
6546
6547 static bool
6548 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6549 {
6550 file_ptr off;
6551 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6552 Elf_Internal_Shdr *shdrp;
6553 Elf_Internal_Ehdr *i_ehdrp;
6554 const struct elf_backend_data *bed;
6555
6556 off = elf_next_file_pos (abfd);
6557
6558 shdrpp = elf_elfsections (abfd);
6559 end_shdrpp = shdrpp + elf_numsections (abfd);
6560 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6561 {
6562 shdrp = *shdrpp;
6563 if (shdrp->sh_offset == -1)
6564 {
6565 asection *sec = shdrp->bfd_section;
6566 bool is_rel = (shdrp->sh_type == SHT_REL
6567 || shdrp->sh_type == SHT_RELA);
6568 bool is_ctf = sec && bfd_section_is_ctf (sec);
6569 if (is_rel
6570 || is_ctf
6571 || (sec != NULL && (sec->flags & SEC_ELF_COMPRESS)))
6572 {
6573 if (!is_rel && !is_ctf)
6574 {
6575 const char *name = sec->name;
6576 struct bfd_elf_section_data *d;
6577
6578 /* Compress DWARF debug sections. */
6579 if (!bfd_compress_section (abfd, sec,
6580 shdrp->contents))
6581 return false;
6582
6583 if (sec->compress_status == COMPRESS_SECTION_DONE
6584 && (abfd->flags & BFD_COMPRESS_GABI) == 0)
6585 {
6586 /* If section is compressed with zlib-gnu, convert
6587 section name from .debug_* to .zdebug_*. */
6588 char *new_name
6589 = convert_debug_to_zdebug (abfd, name);
6590 if (new_name == NULL)
6591 return false;
6592 name = new_name;
6593 }
6594 /* Add section name to section name section. */
6595 if (shdrp->sh_name != (unsigned int) -1)
6596 abort ();
6597 shdrp->sh_name
6598 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6599 name, false);
6600 d = elf_section_data (sec);
6601
6602 /* Add reloc section name to section name section. */
6603 if (d->rel.hdr
6604 && !_bfd_elf_set_reloc_sh_name (abfd,
6605 d->rel.hdr,
6606 name, false))
6607 return false;
6608 if (d->rela.hdr
6609 && !_bfd_elf_set_reloc_sh_name (abfd,
6610 d->rela.hdr,
6611 name, true))
6612 return false;
6613
6614 /* Update section size and contents. */
6615 shdrp->sh_size = sec->size;
6616 shdrp->contents = sec->contents;
6617 shdrp->bfd_section->contents = NULL;
6618 }
6619 else if (is_ctf)
6620 {
6621 /* Update section size and contents. */
6622 shdrp->sh_size = sec->size;
6623 shdrp->contents = sec->contents;
6624 }
6625
6626 off = _bfd_elf_assign_file_position_for_section (shdrp,
6627 off,
6628 true);
6629 }
6630 }
6631 }
6632
6633 /* Place section name section after DWARF debug sections have been
6634 compressed. */
6635 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6636 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6637 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6638 off = _bfd_elf_assign_file_position_for_section (shdrp, off, true);
6639
6640 /* Place the section headers. */
6641 i_ehdrp = elf_elfheader (abfd);
6642 bed = get_elf_backend_data (abfd);
6643 off = align_file_position (off, 1 << bed->s->log_file_align);
6644 i_ehdrp->e_shoff = off;
6645 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6646 elf_next_file_pos (abfd) = off;
6647
6648 return true;
6649 }
6650
6651 bool
6652 _bfd_elf_write_object_contents (bfd *abfd)
6653 {
6654 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6655 Elf_Internal_Shdr **i_shdrp;
6656 bool failed;
6657 unsigned int count, num_sec;
6658 struct elf_obj_tdata *t;
6659
6660 if (! abfd->output_has_begun
6661 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6662 return false;
6663 /* Do not rewrite ELF data when the BFD has been opened for update.
6664 abfd->output_has_begun was set to TRUE on opening, so creation of new
6665 sections, and modification of existing section sizes was restricted.
6666 This means the ELF header, program headers and section headers can't have
6667 changed.
6668 If the contents of any sections has been modified, then those changes have
6669 already been written to the BFD. */
6670 else if (abfd->direction == both_direction)
6671 {
6672 BFD_ASSERT (abfd->output_has_begun);
6673 return true;
6674 }
6675
6676 i_shdrp = elf_elfsections (abfd);
6677
6678 failed = false;
6679 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6680 if (failed)
6681 return false;
6682
6683 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6684 return false;
6685
6686 /* After writing the headers, we need to write the sections too... */
6687 num_sec = elf_numsections (abfd);
6688 for (count = 1; count < num_sec; count++)
6689 {
6690 i_shdrp[count]->sh_name
6691 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6692 i_shdrp[count]->sh_name);
6693 if (bed->elf_backend_section_processing)
6694 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6695 return false;
6696 if (i_shdrp[count]->contents)
6697 {
6698 bfd_size_type amt = i_shdrp[count]->sh_size;
6699
6700 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6701 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6702 return false;
6703 }
6704 }
6705
6706 /* Write out the section header names. */
6707 t = elf_tdata (abfd);
6708 if (elf_shstrtab (abfd) != NULL
6709 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6710 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6711 return false;
6712
6713 if (!(*bed->elf_backend_final_write_processing) (abfd))
6714 return false;
6715
6716 if (!bed->s->write_shdrs_and_ehdr (abfd))
6717 return false;
6718
6719 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6720 if (t->o->build_id.after_write_object_contents != NULL)
6721 return (*t->o->build_id.after_write_object_contents) (abfd);
6722
6723 return true;
6724 }
6725
6726 bool
6727 _bfd_elf_write_corefile_contents (bfd *abfd)
6728 {
6729 /* Hopefully this can be done just like an object file. */
6730 return _bfd_elf_write_object_contents (abfd);
6731 }
6732
6733 /* Given a section, search the header to find them. */
6734
6735 unsigned int
6736 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6737 {
6738 const struct elf_backend_data *bed;
6739 unsigned int sec_index;
6740
6741 if (elf_section_data (asect) != NULL
6742 && elf_section_data (asect)->this_idx != 0)
6743 return elf_section_data (asect)->this_idx;
6744
6745 if (bfd_is_abs_section (asect))
6746 sec_index = SHN_ABS;
6747 else if (bfd_is_com_section (asect))
6748 sec_index = SHN_COMMON;
6749 else if (bfd_is_und_section (asect))
6750 sec_index = SHN_UNDEF;
6751 else
6752 sec_index = SHN_BAD;
6753
6754 bed = get_elf_backend_data (abfd);
6755 if (bed->elf_backend_section_from_bfd_section)
6756 {
6757 int retval = sec_index;
6758
6759 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6760 return retval;
6761 }
6762
6763 if (sec_index == SHN_BAD)
6764 bfd_set_error (bfd_error_nonrepresentable_section);
6765
6766 return sec_index;
6767 }
6768
6769 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6770 on error. */
6771
6772 int
6773 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6774 {
6775 asymbol *asym_ptr = *asym_ptr_ptr;
6776 int idx;
6777 flagword flags = asym_ptr->flags;
6778
6779 /* When gas creates relocations against local labels, it creates its
6780 own symbol for the section, but does put the symbol into the
6781 symbol chain, so udata is 0. When the linker is generating
6782 relocatable output, this section symbol may be for one of the
6783 input sections rather than the output section. */
6784 if (asym_ptr->udata.i == 0
6785 && (flags & BSF_SECTION_SYM)
6786 && asym_ptr->section)
6787 {
6788 asection *sec;
6789 int indx;
6790
6791 sec = asym_ptr->section;
6792 if (sec->owner != abfd && sec->output_section != NULL)
6793 sec = sec->output_section;
6794 if (sec->owner == abfd
6795 && (indx = sec->index) < elf_num_section_syms (abfd)
6796 && elf_section_syms (abfd)[indx] != NULL)
6797 asym_ptr->udata.i = elf_section_syms (abfd)[indx]->udata.i;
6798 }
6799
6800 idx = asym_ptr->udata.i;
6801
6802 if (idx == 0)
6803 {
6804 /* This case can occur when using --strip-symbol on a symbol
6805 which is used in a relocation entry. */
6806 _bfd_error_handler
6807 /* xgettext:c-format */
6808 (_("%pB: symbol `%s' required but not present"),
6809 abfd, bfd_asymbol_name (asym_ptr));
6810 bfd_set_error (bfd_error_no_symbols);
6811 return -1;
6812 }
6813
6814 #if DEBUG & 4
6815 {
6816 fprintf (stderr,
6817 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8x\n",
6818 (long) asym_ptr, asym_ptr->name, idx, flags);
6819 fflush (stderr);
6820 }
6821 #endif
6822
6823 return idx;
6824 }
6825
6826 /* Rewrite program header information. */
6827
6828 static bool
6829 rewrite_elf_program_header (bfd *ibfd, bfd *obfd, bfd_vma maxpagesize)
6830 {
6831 Elf_Internal_Ehdr *iehdr;
6832 struct elf_segment_map *map;
6833 struct elf_segment_map *map_first;
6834 struct elf_segment_map **pointer_to_map;
6835 Elf_Internal_Phdr *segment;
6836 asection *section;
6837 unsigned int i;
6838 unsigned int num_segments;
6839 bool phdr_included = false;
6840 bool p_paddr_valid;
6841 struct elf_segment_map *phdr_adjust_seg = NULL;
6842 unsigned int phdr_adjust_num = 0;
6843 const struct elf_backend_data *bed;
6844 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
6845
6846 bed = get_elf_backend_data (ibfd);
6847 iehdr = elf_elfheader (ibfd);
6848
6849 map_first = NULL;
6850 pointer_to_map = &map_first;
6851
6852 num_segments = elf_elfheader (ibfd)->e_phnum;
6853
6854 /* Returns the end address of the segment + 1. */
6855 #define SEGMENT_END(segment, start) \
6856 (start + (segment->p_memsz > segment->p_filesz \
6857 ? segment->p_memsz : segment->p_filesz))
6858
6859 #define SECTION_SIZE(section, segment) \
6860 (((section->flags & (SEC_HAS_CONTENTS | SEC_THREAD_LOCAL)) \
6861 != SEC_THREAD_LOCAL || segment->p_type == PT_TLS) \
6862 ? section->size : 0)
6863
6864 /* Returns TRUE if the given section is contained within
6865 the given segment. VMA addresses are compared. */
6866 #define IS_CONTAINED_BY_VMA(section, segment, opb) \
6867 (section->vma * (opb) >= segment->p_vaddr \
6868 && (section->vma * (opb) + SECTION_SIZE (section, segment) \
6869 <= (SEGMENT_END (segment, segment->p_vaddr))))
6870
6871 /* Returns TRUE if the given section is contained within
6872 the given segment. LMA addresses are compared. */
6873 #define IS_CONTAINED_BY_LMA(section, segment, base, opb) \
6874 (section->lma * (opb) >= base \
6875 && (section->lma + SECTION_SIZE (section, segment) / (opb) >= section->lma) \
6876 && (section->lma * (opb) + SECTION_SIZE (section, segment) \
6877 <= SEGMENT_END (segment, base)))
6878
6879 /* Handle PT_NOTE segment. */
6880 #define IS_NOTE(p, s) \
6881 (p->p_type == PT_NOTE \
6882 && elf_section_type (s) == SHT_NOTE \
6883 && (bfd_vma) s->filepos >= p->p_offset \
6884 && ((bfd_vma) s->filepos + s->size \
6885 <= p->p_offset + p->p_filesz))
6886
6887 /* Special case: corefile "NOTE" section containing regs, prpsinfo
6888 etc. */
6889 #define IS_COREFILE_NOTE(p, s) \
6890 (IS_NOTE (p, s) \
6891 && bfd_get_format (ibfd) == bfd_core \
6892 && s->vma == 0 \
6893 && s->lma == 0)
6894
6895 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6896 linker, which generates a PT_INTERP section with p_vaddr and
6897 p_memsz set to 0. */
6898 #define IS_SOLARIS_PT_INTERP(p, s) \
6899 (p->p_vaddr == 0 \
6900 && p->p_paddr == 0 \
6901 && p->p_memsz == 0 \
6902 && p->p_filesz > 0 \
6903 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6904 && s->size > 0 \
6905 && (bfd_vma) s->filepos >= p->p_offset \
6906 && ((bfd_vma) s->filepos + s->size \
6907 <= p->p_offset + p->p_filesz))
6908
6909 /* Decide if the given section should be included in the given segment.
6910 A section will be included if:
6911 1. It is within the address space of the segment -- we use the LMA
6912 if that is set for the segment and the VMA otherwise,
6913 2. It is an allocated section or a NOTE section in a PT_NOTE
6914 segment.
6915 3. There is an output section associated with it,
6916 4. The section has not already been allocated to a previous segment.
6917 5. PT_GNU_STACK segments do not include any sections.
6918 6. PT_TLS segment includes only SHF_TLS sections.
6919 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6920 8. PT_DYNAMIC should not contain empty sections at the beginning
6921 (with the possible exception of .dynamic). */
6922 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6923 ((((segment->p_paddr \
6924 ? IS_CONTAINED_BY_LMA (section, segment, segment->p_paddr, opb) \
6925 : IS_CONTAINED_BY_VMA (section, segment, opb)) \
6926 && (section->flags & SEC_ALLOC) != 0) \
6927 || IS_NOTE (segment, section)) \
6928 && segment->p_type != PT_GNU_STACK \
6929 && (segment->p_type != PT_TLS \
6930 || (section->flags & SEC_THREAD_LOCAL)) \
6931 && (segment->p_type == PT_LOAD \
6932 || segment->p_type == PT_TLS \
6933 || (section->flags & SEC_THREAD_LOCAL) == 0) \
6934 && (segment->p_type != PT_DYNAMIC \
6935 || SECTION_SIZE (section, segment) > 0 \
6936 || (segment->p_paddr \
6937 ? segment->p_paddr != section->lma * (opb) \
6938 : segment->p_vaddr != section->vma * (opb)) \
6939 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
6940 && (segment->p_type != PT_LOAD || !section->segment_mark))
6941
6942 /* If the output section of a section in the input segment is NULL,
6943 it is removed from the corresponding output segment. */
6944 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
6945 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
6946 && section->output_section != NULL)
6947
6948 /* Returns TRUE iff seg1 starts after the end of seg2. */
6949 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
6950 (seg1->field >= SEGMENT_END (seg2, seg2->field))
6951
6952 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
6953 their VMA address ranges and their LMA address ranges overlap.
6954 It is possible to have overlapping VMA ranges without overlapping LMA
6955 ranges. RedBoot images for example can have both .data and .bss mapped
6956 to the same VMA range, but with the .data section mapped to a different
6957 LMA. */
6958 #define SEGMENT_OVERLAPS(seg1, seg2) \
6959 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
6960 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
6961 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
6962 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
6963
6964 /* Initialise the segment mark field, and discard stupid alignment. */
6965 for (section = ibfd->sections; section != NULL; section = section->next)
6966 {
6967 asection *o = section->output_section;
6968 if (o != NULL && o->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
6969 o->alignment_power = 0;
6970 section->segment_mark = false;
6971 }
6972
6973 /* The Solaris linker creates program headers in which all the
6974 p_paddr fields are zero. When we try to objcopy or strip such a
6975 file, we get confused. Check for this case, and if we find it
6976 don't set the p_paddr_valid fields. */
6977 p_paddr_valid = false;
6978 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6979 i < num_segments;
6980 i++, segment++)
6981 if (segment->p_paddr != 0)
6982 {
6983 p_paddr_valid = true;
6984 break;
6985 }
6986
6987 /* Scan through the segments specified in the program header
6988 of the input BFD. For this first scan we look for overlaps
6989 in the loadable segments. These can be created by weird
6990 parameters to objcopy. Also, fix some solaris weirdness. */
6991 for (i = 0, segment = elf_tdata (ibfd)->phdr;
6992 i < num_segments;
6993 i++, segment++)
6994 {
6995 unsigned int j;
6996 Elf_Internal_Phdr *segment2;
6997
6998 if (segment->p_type == PT_INTERP)
6999 for (section = ibfd->sections; section; section = section->next)
7000 if (IS_SOLARIS_PT_INTERP (segment, section))
7001 {
7002 /* Mininal change so that the normal section to segment
7003 assignment code will work. */
7004 segment->p_vaddr = section->vma * opb;
7005 break;
7006 }
7007
7008 if (segment->p_type != PT_LOAD)
7009 {
7010 /* Remove PT_GNU_RELRO segment. */
7011 if (segment->p_type == PT_GNU_RELRO)
7012 segment->p_type = PT_NULL;
7013 continue;
7014 }
7015
7016 /* Determine if this segment overlaps any previous segments. */
7017 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
7018 {
7019 bfd_signed_vma extra_length;
7020
7021 if (segment2->p_type != PT_LOAD
7022 || !SEGMENT_OVERLAPS (segment, segment2))
7023 continue;
7024
7025 /* Merge the two segments together. */
7026 if (segment2->p_vaddr < segment->p_vaddr)
7027 {
7028 /* Extend SEGMENT2 to include SEGMENT and then delete
7029 SEGMENT. */
7030 extra_length = (SEGMENT_END (segment, segment->p_vaddr)
7031 - SEGMENT_END (segment2, segment2->p_vaddr));
7032
7033 if (extra_length > 0)
7034 {
7035 segment2->p_memsz += extra_length;
7036 segment2->p_filesz += extra_length;
7037 }
7038
7039 segment->p_type = PT_NULL;
7040
7041 /* Since we have deleted P we must restart the outer loop. */
7042 i = 0;
7043 segment = elf_tdata (ibfd)->phdr;
7044 break;
7045 }
7046 else
7047 {
7048 /* Extend SEGMENT to include SEGMENT2 and then delete
7049 SEGMENT2. */
7050 extra_length = (SEGMENT_END (segment2, segment2->p_vaddr)
7051 - SEGMENT_END (segment, segment->p_vaddr));
7052
7053 if (extra_length > 0)
7054 {
7055 segment->p_memsz += extra_length;
7056 segment->p_filesz += extra_length;
7057 }
7058
7059 segment2->p_type = PT_NULL;
7060 }
7061 }
7062 }
7063
7064 /* The second scan attempts to assign sections to segments. */
7065 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7066 i < num_segments;
7067 i++, segment++)
7068 {
7069 unsigned int section_count;
7070 asection **sections;
7071 asection *output_section;
7072 unsigned int isec;
7073 asection *matching_lma;
7074 asection *suggested_lma;
7075 unsigned int j;
7076 size_t amt;
7077 asection *first_section;
7078
7079 if (segment->p_type == PT_NULL)
7080 continue;
7081
7082 first_section = NULL;
7083 /* Compute how many sections might be placed into this segment. */
7084 for (section = ibfd->sections, section_count = 0;
7085 section != NULL;
7086 section = section->next)
7087 {
7088 /* Find the first section in the input segment, which may be
7089 removed from the corresponding output segment. */
7090 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb))
7091 {
7092 if (first_section == NULL)
7093 first_section = section;
7094 if (section->output_section != NULL)
7095 ++section_count;
7096 }
7097 }
7098
7099 /* Allocate a segment map big enough to contain
7100 all of the sections we have selected. */
7101 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7102 amt += section_count * sizeof (asection *);
7103 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7104 if (map == NULL)
7105 return false;
7106
7107 /* Initialise the fields of the segment map. Default to
7108 using the physical address of the segment in the input BFD. */
7109 map->next = NULL;
7110 map->p_type = segment->p_type;
7111 map->p_flags = segment->p_flags;
7112 map->p_flags_valid = 1;
7113
7114 if (map->p_type == PT_LOAD
7115 && (ibfd->flags & D_PAGED) != 0
7116 && maxpagesize > 1
7117 && segment->p_align > 1)
7118 {
7119 map->p_align = segment->p_align;
7120 if (segment->p_align > maxpagesize)
7121 map->p_align = maxpagesize;
7122 map->p_align_valid = 1;
7123 }
7124
7125 /* If the first section in the input segment is removed, there is
7126 no need to preserve segment physical address in the corresponding
7127 output segment. */
7128 if (!first_section || first_section->output_section != NULL)
7129 {
7130 map->p_paddr = segment->p_paddr;
7131 map->p_paddr_valid = p_paddr_valid;
7132 }
7133
7134 /* Determine if this segment contains the ELF file header
7135 and if it contains the program headers themselves. */
7136 map->includes_filehdr = (segment->p_offset == 0
7137 && segment->p_filesz >= iehdr->e_ehsize);
7138 map->includes_phdrs = 0;
7139
7140 if (!phdr_included || segment->p_type != PT_LOAD)
7141 {
7142 map->includes_phdrs =
7143 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7144 && (segment->p_offset + segment->p_filesz
7145 >= ((bfd_vma) iehdr->e_phoff
7146 + iehdr->e_phnum * iehdr->e_phentsize)));
7147
7148 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7149 phdr_included = true;
7150 }
7151
7152 if (section_count == 0)
7153 {
7154 /* Special segments, such as the PT_PHDR segment, may contain
7155 no sections, but ordinary, loadable segments should contain
7156 something. They are allowed by the ELF spec however, so only
7157 a warning is produced.
7158 There is however the valid use case of embedded systems which
7159 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7160 flash memory with zeros. No warning is shown for that case. */
7161 if (segment->p_type == PT_LOAD
7162 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7163 /* xgettext:c-format */
7164 _bfd_error_handler
7165 (_("%pB: warning: empty loadable segment detected"
7166 " at vaddr=%#" PRIx64 ", is this intentional?"),
7167 ibfd, (uint64_t) segment->p_vaddr);
7168
7169 map->p_vaddr_offset = segment->p_vaddr / opb;
7170 map->count = 0;
7171 *pointer_to_map = map;
7172 pointer_to_map = &map->next;
7173
7174 continue;
7175 }
7176
7177 /* Now scan the sections in the input BFD again and attempt
7178 to add their corresponding output sections to the segment map.
7179 The problem here is how to handle an output section which has
7180 been moved (ie had its LMA changed). There are four possibilities:
7181
7182 1. None of the sections have been moved.
7183 In this case we can continue to use the segment LMA from the
7184 input BFD.
7185
7186 2. All of the sections have been moved by the same amount.
7187 In this case we can change the segment's LMA to match the LMA
7188 of the first section.
7189
7190 3. Some of the sections have been moved, others have not.
7191 In this case those sections which have not been moved can be
7192 placed in the current segment which will have to have its size,
7193 and possibly its LMA changed, and a new segment or segments will
7194 have to be created to contain the other sections.
7195
7196 4. The sections have been moved, but not by the same amount.
7197 In this case we can change the segment's LMA to match the LMA
7198 of the first section and we will have to create a new segment
7199 or segments to contain the other sections.
7200
7201 In order to save time, we allocate an array to hold the section
7202 pointers that we are interested in. As these sections get assigned
7203 to a segment, they are removed from this array. */
7204
7205 amt = section_count * sizeof (asection *);
7206 sections = (asection **) bfd_malloc (amt);
7207 if (sections == NULL)
7208 return false;
7209
7210 /* Step One: Scan for segment vs section LMA conflicts.
7211 Also add the sections to the section array allocated above.
7212 Also add the sections to the current segment. In the common
7213 case, where the sections have not been moved, this means that
7214 we have completely filled the segment, and there is nothing
7215 more to do. */
7216 isec = 0;
7217 matching_lma = NULL;
7218 suggested_lma = NULL;
7219
7220 for (section = first_section, j = 0;
7221 section != NULL;
7222 section = section->next)
7223 {
7224 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed, opb))
7225 {
7226 output_section = section->output_section;
7227
7228 sections[j++] = section;
7229
7230 /* The Solaris native linker always sets p_paddr to 0.
7231 We try to catch that case here, and set it to the
7232 correct value. Note - some backends require that
7233 p_paddr be left as zero. */
7234 if (!p_paddr_valid
7235 && segment->p_vaddr != 0
7236 && !bed->want_p_paddr_set_to_zero
7237 && isec == 0
7238 && output_section->lma != 0
7239 && (align_power (segment->p_vaddr
7240 + (map->includes_filehdr
7241 ? iehdr->e_ehsize : 0)
7242 + (map->includes_phdrs
7243 ? iehdr->e_phnum * iehdr->e_phentsize
7244 : 0),
7245 output_section->alignment_power * opb)
7246 == (output_section->vma * opb)))
7247 map->p_paddr = segment->p_vaddr;
7248
7249 /* Match up the physical address of the segment with the
7250 LMA address of the output section. */
7251 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7252 opb)
7253 || IS_COREFILE_NOTE (segment, section)
7254 || (bed->want_p_paddr_set_to_zero
7255 && IS_CONTAINED_BY_VMA (output_section, segment, opb)))
7256 {
7257 if (matching_lma == NULL
7258 || output_section->lma < matching_lma->lma)
7259 matching_lma = output_section;
7260
7261 /* We assume that if the section fits within the segment
7262 then it does not overlap any other section within that
7263 segment. */
7264 map->sections[isec++] = output_section;
7265 }
7266 else if (suggested_lma == NULL)
7267 suggested_lma = output_section;
7268
7269 if (j == section_count)
7270 break;
7271 }
7272 }
7273
7274 BFD_ASSERT (j == section_count);
7275
7276 /* Step Two: Adjust the physical address of the current segment,
7277 if necessary. */
7278 if (isec == section_count)
7279 {
7280 /* All of the sections fitted within the segment as currently
7281 specified. This is the default case. Add the segment to
7282 the list of built segments and carry on to process the next
7283 program header in the input BFD. */
7284 map->count = section_count;
7285 *pointer_to_map = map;
7286 pointer_to_map = &map->next;
7287
7288 if (p_paddr_valid
7289 && !bed->want_p_paddr_set_to_zero)
7290 {
7291 bfd_vma hdr_size = 0;
7292 if (map->includes_filehdr)
7293 hdr_size = iehdr->e_ehsize;
7294 if (map->includes_phdrs)
7295 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7296
7297 /* Account for padding before the first section in the
7298 segment. */
7299 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7300 - matching_lma->lma);
7301 }
7302
7303 free (sections);
7304 continue;
7305 }
7306 else
7307 {
7308 /* Change the current segment's physical address to match
7309 the LMA of the first section that fitted, or if no
7310 section fitted, the first section. */
7311 if (matching_lma == NULL)
7312 matching_lma = suggested_lma;
7313
7314 map->p_paddr = matching_lma->lma * opb;
7315
7316 /* Offset the segment physical address from the lma
7317 to allow for space taken up by elf headers. */
7318 if (map->includes_phdrs)
7319 {
7320 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7321
7322 /* iehdr->e_phnum is just an estimate of the number
7323 of program headers that we will need. Make a note
7324 here of the number we used and the segment we chose
7325 to hold these headers, so that we can adjust the
7326 offset when we know the correct value. */
7327 phdr_adjust_num = iehdr->e_phnum;
7328 phdr_adjust_seg = map;
7329 }
7330
7331 if (map->includes_filehdr)
7332 {
7333 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7334 map->p_paddr -= iehdr->e_ehsize;
7335 /* We've subtracted off the size of headers from the
7336 first section lma, but there may have been some
7337 alignment padding before that section too. Try to
7338 account for that by adjusting the segment lma down to
7339 the same alignment. */
7340 if (segment->p_align != 0 && segment->p_align < align)
7341 align = segment->p_align;
7342 map->p_paddr &= -(align * opb);
7343 }
7344 }
7345
7346 /* Step Three: Loop over the sections again, this time assigning
7347 those that fit to the current segment and removing them from the
7348 sections array; but making sure not to leave large gaps. Once all
7349 possible sections have been assigned to the current segment it is
7350 added to the list of built segments and if sections still remain
7351 to be assigned, a new segment is constructed before repeating
7352 the loop. */
7353 isec = 0;
7354 do
7355 {
7356 map->count = 0;
7357 suggested_lma = NULL;
7358
7359 /* Fill the current segment with sections that fit. */
7360 for (j = 0; j < section_count; j++)
7361 {
7362 section = sections[j];
7363
7364 if (section == NULL)
7365 continue;
7366
7367 output_section = section->output_section;
7368
7369 BFD_ASSERT (output_section != NULL);
7370
7371 if (IS_CONTAINED_BY_LMA (output_section, segment, map->p_paddr,
7372 opb)
7373 || IS_COREFILE_NOTE (segment, section))
7374 {
7375 if (map->count == 0)
7376 {
7377 /* If the first section in a segment does not start at
7378 the beginning of the segment, then something is
7379 wrong. */
7380 if (align_power (map->p_paddr
7381 + (map->includes_filehdr
7382 ? iehdr->e_ehsize : 0)
7383 + (map->includes_phdrs
7384 ? iehdr->e_phnum * iehdr->e_phentsize
7385 : 0),
7386 output_section->alignment_power * opb)
7387 != output_section->lma * opb)
7388 goto sorry;
7389 }
7390 else
7391 {
7392 asection *prev_sec;
7393
7394 prev_sec = map->sections[map->count - 1];
7395
7396 /* If the gap between the end of the previous section
7397 and the start of this section is more than
7398 maxpagesize then we need to start a new segment. */
7399 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7400 maxpagesize)
7401 < BFD_ALIGN (output_section->lma, maxpagesize))
7402 || (prev_sec->lma + prev_sec->size
7403 > output_section->lma))
7404 {
7405 if (suggested_lma == NULL)
7406 suggested_lma = output_section;
7407
7408 continue;
7409 }
7410 }
7411
7412 map->sections[map->count++] = output_section;
7413 ++isec;
7414 sections[j] = NULL;
7415 if (segment->p_type == PT_LOAD)
7416 section->segment_mark = true;
7417 }
7418 else if (suggested_lma == NULL)
7419 suggested_lma = output_section;
7420 }
7421
7422 /* PR 23932. A corrupt input file may contain sections that cannot
7423 be assigned to any segment - because for example they have a
7424 negative size - or segments that do not contain any sections.
7425 But there are also valid reasons why a segment can be empty.
7426 So allow a count of zero. */
7427
7428 /* Add the current segment to the list of built segments. */
7429 *pointer_to_map = map;
7430 pointer_to_map = &map->next;
7431
7432 if (isec < section_count)
7433 {
7434 /* We still have not allocated all of the sections to
7435 segments. Create a new segment here, initialise it
7436 and carry on looping. */
7437 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7438 amt += section_count * sizeof (asection *);
7439 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7440 if (map == NULL)
7441 {
7442 free (sections);
7443 return false;
7444 }
7445
7446 /* Initialise the fields of the segment map. Set the physical
7447 physical address to the LMA of the first section that has
7448 not yet been assigned. */
7449 map->next = NULL;
7450 map->p_type = segment->p_type;
7451 map->p_flags = segment->p_flags;
7452 map->p_flags_valid = 1;
7453 map->p_paddr = suggested_lma->lma * opb;
7454 map->p_paddr_valid = p_paddr_valid;
7455 map->includes_filehdr = 0;
7456 map->includes_phdrs = 0;
7457 }
7458
7459 continue;
7460 sorry:
7461 bfd_set_error (bfd_error_sorry);
7462 free (sections);
7463 return false;
7464 }
7465 while (isec < section_count);
7466
7467 free (sections);
7468 }
7469
7470 elf_seg_map (obfd) = map_first;
7471
7472 /* If we had to estimate the number of program headers that were
7473 going to be needed, then check our estimate now and adjust
7474 the offset if necessary. */
7475 if (phdr_adjust_seg != NULL)
7476 {
7477 unsigned int count;
7478
7479 for (count = 0, map = map_first; map != NULL; map = map->next)
7480 count++;
7481
7482 if (count > phdr_adjust_num)
7483 phdr_adjust_seg->p_paddr
7484 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7485
7486 for (map = map_first; map != NULL; map = map->next)
7487 if (map->p_type == PT_PHDR)
7488 {
7489 bfd_vma adjust
7490 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7491 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7492 break;
7493 }
7494 }
7495
7496 #undef SEGMENT_END
7497 #undef SECTION_SIZE
7498 #undef IS_CONTAINED_BY_VMA
7499 #undef IS_CONTAINED_BY_LMA
7500 #undef IS_NOTE
7501 #undef IS_COREFILE_NOTE
7502 #undef IS_SOLARIS_PT_INTERP
7503 #undef IS_SECTION_IN_INPUT_SEGMENT
7504 #undef INCLUDE_SECTION_IN_SEGMENT
7505 #undef SEGMENT_AFTER_SEGMENT
7506 #undef SEGMENT_OVERLAPS
7507 return true;
7508 }
7509
7510 /* Copy ELF program header information. */
7511
7512 static bool
7513 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7514 {
7515 Elf_Internal_Ehdr *iehdr;
7516 struct elf_segment_map *map;
7517 struct elf_segment_map *map_first;
7518 struct elf_segment_map **pointer_to_map;
7519 Elf_Internal_Phdr *segment;
7520 unsigned int i;
7521 unsigned int num_segments;
7522 bool phdr_included = false;
7523 bool p_paddr_valid;
7524 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
7525
7526 iehdr = elf_elfheader (ibfd);
7527
7528 map_first = NULL;
7529 pointer_to_map = &map_first;
7530
7531 /* If all the segment p_paddr fields are zero, don't set
7532 map->p_paddr_valid. */
7533 p_paddr_valid = false;
7534 num_segments = elf_elfheader (ibfd)->e_phnum;
7535 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7536 i < num_segments;
7537 i++, segment++)
7538 if (segment->p_paddr != 0)
7539 {
7540 p_paddr_valid = true;
7541 break;
7542 }
7543
7544 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7545 i < num_segments;
7546 i++, segment++)
7547 {
7548 asection *section;
7549 unsigned int section_count;
7550 size_t amt;
7551 Elf_Internal_Shdr *this_hdr;
7552 asection *first_section = NULL;
7553 asection *lowest_section;
7554
7555 /* Compute how many sections are in this segment. */
7556 for (section = ibfd->sections, section_count = 0;
7557 section != NULL;
7558 section = section->next)
7559 {
7560 this_hdr = &(elf_section_data(section)->this_hdr);
7561 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7562 {
7563 if (first_section == NULL)
7564 first_section = section;
7565 section_count++;
7566 }
7567 }
7568
7569 /* Allocate a segment map big enough to contain
7570 all of the sections we have selected. */
7571 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7572 amt += section_count * sizeof (asection *);
7573 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7574 if (map == NULL)
7575 return false;
7576
7577 /* Initialize the fields of the output segment map with the
7578 input segment. */
7579 map->next = NULL;
7580 map->p_type = segment->p_type;
7581 map->p_flags = segment->p_flags;
7582 map->p_flags_valid = 1;
7583 map->p_paddr = segment->p_paddr;
7584 map->p_paddr_valid = p_paddr_valid;
7585 map->p_align = segment->p_align;
7586 map->p_align_valid = 1;
7587 map->p_vaddr_offset = 0;
7588
7589 if (map->p_type == PT_GNU_RELRO
7590 || map->p_type == PT_GNU_STACK)
7591 {
7592 /* The PT_GNU_RELRO segment may contain the first a few
7593 bytes in the .got.plt section even if the whole .got.plt
7594 section isn't in the PT_GNU_RELRO segment. We won't
7595 change the size of the PT_GNU_RELRO segment.
7596 Similarly, PT_GNU_STACK size is significant on uclinux
7597 systems. */
7598 map->p_size = segment->p_memsz;
7599 map->p_size_valid = 1;
7600 }
7601
7602 /* Determine if this segment contains the ELF file header
7603 and if it contains the program headers themselves. */
7604 map->includes_filehdr = (segment->p_offset == 0
7605 && segment->p_filesz >= iehdr->e_ehsize);
7606
7607 map->includes_phdrs = 0;
7608 if (! phdr_included || segment->p_type != PT_LOAD)
7609 {
7610 map->includes_phdrs =
7611 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7612 && (segment->p_offset + segment->p_filesz
7613 >= ((bfd_vma) iehdr->e_phoff
7614 + iehdr->e_phnum * iehdr->e_phentsize)));
7615
7616 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7617 phdr_included = true;
7618 }
7619
7620 lowest_section = NULL;
7621 if (section_count != 0)
7622 {
7623 unsigned int isec = 0;
7624
7625 for (section = first_section;
7626 section != NULL;
7627 section = section->next)
7628 {
7629 this_hdr = &(elf_section_data(section)->this_hdr);
7630 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7631 {
7632 map->sections[isec++] = section->output_section;
7633 if ((section->flags & SEC_ALLOC) != 0)
7634 {
7635 bfd_vma seg_off;
7636
7637 if (lowest_section == NULL
7638 || section->lma < lowest_section->lma)
7639 lowest_section = section;
7640
7641 /* Section lmas are set up from PT_LOAD header
7642 p_paddr in _bfd_elf_make_section_from_shdr.
7643 If this header has a p_paddr that disagrees
7644 with the section lma, flag the p_paddr as
7645 invalid. */
7646 if ((section->flags & SEC_LOAD) != 0)
7647 seg_off = this_hdr->sh_offset - segment->p_offset;
7648 else
7649 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7650 if (section->lma * opb - segment->p_paddr != seg_off)
7651 map->p_paddr_valid = false;
7652 }
7653 if (isec == section_count)
7654 break;
7655 }
7656 }
7657 }
7658
7659 if (section_count == 0)
7660 map->p_vaddr_offset = segment->p_vaddr / opb;
7661 else if (map->p_paddr_valid)
7662 {
7663 /* Account for padding before the first section in the segment. */
7664 bfd_vma hdr_size = 0;
7665 if (map->includes_filehdr)
7666 hdr_size = iehdr->e_ehsize;
7667 if (map->includes_phdrs)
7668 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7669
7670 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7671 - (lowest_section ? lowest_section->lma : 0));
7672 }
7673
7674 map->count = section_count;
7675 *pointer_to_map = map;
7676 pointer_to_map = &map->next;
7677 }
7678
7679 elf_seg_map (obfd) = map_first;
7680 return true;
7681 }
7682
7683 /* Copy private BFD data. This copies or rewrites ELF program header
7684 information. */
7685
7686 static bool
7687 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7688 {
7689 bfd_vma maxpagesize;
7690
7691 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7692 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7693 return true;
7694
7695 if (elf_tdata (ibfd)->phdr == NULL)
7696 return true;
7697
7698 if (ibfd->xvec == obfd->xvec)
7699 {
7700 /* Check to see if any sections in the input BFD
7701 covered by ELF program header have changed. */
7702 Elf_Internal_Phdr *segment;
7703 asection *section, *osec;
7704 unsigned int i, num_segments;
7705 Elf_Internal_Shdr *this_hdr;
7706 const struct elf_backend_data *bed;
7707
7708 bed = get_elf_backend_data (ibfd);
7709
7710 /* Regenerate the segment map if p_paddr is set to 0. */
7711 if (bed->want_p_paddr_set_to_zero)
7712 goto rewrite;
7713
7714 /* Initialize the segment mark field. */
7715 for (section = obfd->sections; section != NULL;
7716 section = section->next)
7717 section->segment_mark = false;
7718
7719 num_segments = elf_elfheader (ibfd)->e_phnum;
7720 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7721 i < num_segments;
7722 i++, segment++)
7723 {
7724 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7725 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7726 which severly confuses things, so always regenerate the segment
7727 map in this case. */
7728 if (segment->p_paddr == 0
7729 && segment->p_memsz == 0
7730 && (segment->p_type == PT_INTERP || segment->p_type == PT_DYNAMIC))
7731 goto rewrite;
7732
7733 for (section = ibfd->sections;
7734 section != NULL; section = section->next)
7735 {
7736 /* We mark the output section so that we know it comes
7737 from the input BFD. */
7738 osec = section->output_section;
7739 if (osec)
7740 osec->segment_mark = true;
7741
7742 /* Check if this section is covered by the segment. */
7743 this_hdr = &(elf_section_data(section)->this_hdr);
7744 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7745 {
7746 /* FIXME: Check if its output section is changed or
7747 removed. What else do we need to check? */
7748 if (osec == NULL
7749 || section->flags != osec->flags
7750 || section->lma != osec->lma
7751 || section->vma != osec->vma
7752 || section->size != osec->size
7753 || section->rawsize != osec->rawsize
7754 || section->alignment_power != osec->alignment_power)
7755 goto rewrite;
7756 }
7757 }
7758 }
7759
7760 /* Check to see if any output section do not come from the
7761 input BFD. */
7762 for (section = obfd->sections; section != NULL;
7763 section = section->next)
7764 {
7765 if (!section->segment_mark)
7766 goto rewrite;
7767 else
7768 section->segment_mark = false;
7769 }
7770
7771 return copy_elf_program_header (ibfd, obfd);
7772 }
7773
7774 rewrite:
7775 maxpagesize = 0;
7776 if (ibfd->xvec == obfd->xvec)
7777 {
7778 /* When rewriting program header, set the output maxpagesize to
7779 the maximum alignment of input PT_LOAD segments. */
7780 Elf_Internal_Phdr *segment;
7781 unsigned int i;
7782 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7783
7784 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7785 i < num_segments;
7786 i++, segment++)
7787 if (segment->p_type == PT_LOAD
7788 && maxpagesize < segment->p_align)
7789 {
7790 /* PR 17512: file: f17299af. */
7791 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7792 /* xgettext:c-format */
7793 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7794 PRIx64 " is too large"),
7795 ibfd, (uint64_t) segment->p_align);
7796 else
7797 maxpagesize = segment->p_align;
7798 }
7799 }
7800 if (maxpagesize == 0)
7801 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
7802
7803 return rewrite_elf_program_header (ibfd, obfd, maxpagesize);
7804 }
7805
7806 /* Initialize private output section information from input section. */
7807
7808 bool
7809 _bfd_elf_init_private_section_data (bfd *ibfd,
7810 asection *isec,
7811 bfd *obfd,
7812 asection *osec,
7813 struct bfd_link_info *link_info)
7814
7815 {
7816 Elf_Internal_Shdr *ihdr, *ohdr;
7817 bool final_link = (link_info != NULL
7818 && !bfd_link_relocatable (link_info));
7819
7820 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7821 || obfd->xvec->flavour != bfd_target_elf_flavour)
7822 return true;
7823
7824 BFD_ASSERT (elf_section_data (osec) != NULL);
7825
7826 /* If this is a known ABI section, ELF section type and flags may
7827 have been set up when OSEC was created. For normal sections we
7828 allow the user to override the type and flags other than
7829 SHF_MASKOS and SHF_MASKPROC. */
7830 if (elf_section_type (osec) == SHT_PROGBITS
7831 || elf_section_type (osec) == SHT_NOTE
7832 || elf_section_type (osec) == SHT_NOBITS)
7833 elf_section_type (osec) = SHT_NULL;
7834 /* For objcopy and relocatable link, copy the ELF section type from
7835 the input file if the BFD section flags are the same. (If they
7836 are different the user may be doing something like
7837 "objcopy --set-section-flags .text=alloc,data".) For a final
7838 link allow some flags that the linker clears to differ. */
7839 if (elf_section_type (osec) == SHT_NULL
7840 && (osec->flags == isec->flags
7841 || (final_link
7842 && ((osec->flags ^ isec->flags)
7843 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7844 elf_section_type (osec) = elf_section_type (isec);
7845
7846 /* FIXME: Is this correct for all OS/PROC specific flags? */
7847 elf_section_flags (osec) = (elf_section_flags (isec)
7848 & (SHF_MASKOS | SHF_MASKPROC));
7849
7850 /* Copy sh_info from input for mbind section. */
7851 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7852 && elf_section_flags (isec) & SHF_GNU_MBIND)
7853 elf_section_data (osec)->this_hdr.sh_info
7854 = elf_section_data (isec)->this_hdr.sh_info;
7855
7856 /* Set things up for objcopy and relocatable link. The output
7857 SHT_GROUP section will have its elf_next_in_group pointing back
7858 to the input group members. Ignore linker created group section.
7859 See elfNN_ia64_object_p in elfxx-ia64.c. */
7860 if ((link_info == NULL
7861 || !link_info->resolve_section_groups)
7862 && (elf_sec_group (isec) == NULL
7863 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7864 {
7865 if (elf_section_flags (isec) & SHF_GROUP)
7866 elf_section_flags (osec) |= SHF_GROUP;
7867 elf_next_in_group (osec) = elf_next_in_group (isec);
7868 elf_section_data (osec)->group = elf_section_data (isec)->group;
7869 }
7870
7871 /* If not decompress, preserve SHF_COMPRESSED. */
7872 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7873 elf_section_flags (osec) |= (elf_section_flags (isec)
7874 & SHF_COMPRESSED);
7875
7876 ihdr = &elf_section_data (isec)->this_hdr;
7877
7878 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7879 don't use the output section of the linked-to section since it
7880 may be NULL at this point. */
7881 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7882 {
7883 ohdr = &elf_section_data (osec)->this_hdr;
7884 ohdr->sh_flags |= SHF_LINK_ORDER;
7885 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7886 }
7887
7888 osec->use_rela_p = isec->use_rela_p;
7889
7890 return true;
7891 }
7892
7893 /* Copy private section information. This copies over the entsize
7894 field, and sometimes the info field. */
7895
7896 bool
7897 _bfd_elf_copy_private_section_data (bfd *ibfd,
7898 asection *isec,
7899 bfd *obfd,
7900 asection *osec)
7901 {
7902 Elf_Internal_Shdr *ihdr, *ohdr;
7903
7904 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7905 || obfd->xvec->flavour != bfd_target_elf_flavour)
7906 return true;
7907
7908 ihdr = &elf_section_data (isec)->this_hdr;
7909 ohdr = &elf_section_data (osec)->this_hdr;
7910
7911 ohdr->sh_entsize = ihdr->sh_entsize;
7912
7913 if (ihdr->sh_type == SHT_SYMTAB
7914 || ihdr->sh_type == SHT_DYNSYM
7915 || ihdr->sh_type == SHT_GNU_verneed
7916 || ihdr->sh_type == SHT_GNU_verdef)
7917 ohdr->sh_info = ihdr->sh_info;
7918
7919 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
7920 NULL);
7921 }
7922
7923 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
7924 necessary if we are removing either the SHT_GROUP section or any of
7925 the group member sections. DISCARDED is the value that a section's
7926 output_section has if the section will be discarded, NULL when this
7927 function is called from objcopy, bfd_abs_section_ptr when called
7928 from the linker. */
7929
7930 bool
7931 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
7932 {
7933 asection *isec;
7934
7935 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
7936 if (elf_section_type (isec) == SHT_GROUP)
7937 {
7938 asection *first = elf_next_in_group (isec);
7939 asection *s = first;
7940 bfd_size_type removed = 0;
7941
7942 while (s != NULL)
7943 {
7944 /* If this member section is being output but the
7945 SHT_GROUP section is not, then clear the group info
7946 set up by _bfd_elf_copy_private_section_data. */
7947 if (s->output_section != discarded
7948 && isec->output_section == discarded)
7949 {
7950 elf_section_flags (s->output_section) &= ~SHF_GROUP;
7951 elf_group_name (s->output_section) = NULL;
7952 }
7953 else
7954 {
7955 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
7956 if (s->output_section == discarded
7957 && isec->output_section != discarded)
7958 {
7959 /* Conversely, if the member section is not being
7960 output but the SHT_GROUP section is, then adjust
7961 its size. */
7962 removed += 4;
7963 if (elf_sec->rel.hdr != NULL
7964 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
7965 removed += 4;
7966 if (elf_sec->rela.hdr != NULL
7967 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
7968 removed += 4;
7969 }
7970 else
7971 {
7972 /* Also adjust for zero-sized relocation member
7973 section. */
7974 if (elf_sec->rel.hdr != NULL
7975 && elf_sec->rel.hdr->sh_size == 0)
7976 removed += 4;
7977 if (elf_sec->rela.hdr != NULL
7978 && elf_sec->rela.hdr->sh_size == 0)
7979 removed += 4;
7980 }
7981 }
7982 s = elf_next_in_group (s);
7983 if (s == first)
7984 break;
7985 }
7986 if (removed != 0)
7987 {
7988 if (discarded != NULL)
7989 {
7990 /* If we've been called for ld -r, then we need to
7991 adjust the input section size. */
7992 if (isec->rawsize == 0)
7993 isec->rawsize = isec->size;
7994 isec->size = isec->rawsize - removed;
7995 if (isec->size <= 4)
7996 {
7997 isec->size = 0;
7998 isec->flags |= SEC_EXCLUDE;
7999 }
8000 }
8001 else if (isec->output_section != NULL)
8002 {
8003 /* Adjust the output section size when called from
8004 objcopy. */
8005 isec->output_section->size -= removed;
8006 if (isec->output_section->size <= 4)
8007 {
8008 isec->output_section->size = 0;
8009 isec->output_section->flags |= SEC_EXCLUDE;
8010 }
8011 }
8012 }
8013 }
8014
8015 return true;
8016 }
8017
8018 /* Copy private header information. */
8019
8020 bool
8021 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
8022 {
8023 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8024 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8025 return true;
8026
8027 /* Copy over private BFD data if it has not already been copied.
8028 This must be done here, rather than in the copy_private_bfd_data
8029 entry point, because the latter is called after the section
8030 contents have been set, which means that the program headers have
8031 already been worked out. */
8032 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
8033 {
8034 if (! copy_private_bfd_data (ibfd, obfd))
8035 return false;
8036 }
8037
8038 return _bfd_elf_fixup_group_sections (ibfd, NULL);
8039 }
8040
8041 /* Copy private symbol information. If this symbol is in a section
8042 which we did not map into a BFD section, try to map the section
8043 index correctly. We use special macro definitions for the mapped
8044 section indices; these definitions are interpreted by the
8045 swap_out_syms function. */
8046
8047 #define MAP_ONESYMTAB (SHN_HIOS + 1)
8048 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
8049 #define MAP_STRTAB (SHN_HIOS + 3)
8050 #define MAP_SHSTRTAB (SHN_HIOS + 4)
8051 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
8052
8053 bool
8054 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
8055 asymbol *isymarg,
8056 bfd *obfd,
8057 asymbol *osymarg)
8058 {
8059 elf_symbol_type *isym, *osym;
8060
8061 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8062 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8063 return true;
8064
8065 isym = elf_symbol_from (isymarg);
8066 osym = elf_symbol_from (osymarg);
8067
8068 if (isym != NULL
8069 && isym->internal_elf_sym.st_shndx != 0
8070 && osym != NULL
8071 && bfd_is_abs_section (isym->symbol.section))
8072 {
8073 unsigned int shndx;
8074
8075 shndx = isym->internal_elf_sym.st_shndx;
8076 if (shndx == elf_onesymtab (ibfd))
8077 shndx = MAP_ONESYMTAB;
8078 else if (shndx == elf_dynsymtab (ibfd))
8079 shndx = MAP_DYNSYMTAB;
8080 else if (shndx == elf_strtab_sec (ibfd))
8081 shndx = MAP_STRTAB;
8082 else if (shndx == elf_shstrtab_sec (ibfd))
8083 shndx = MAP_SHSTRTAB;
8084 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
8085 shndx = MAP_SYM_SHNDX;
8086 osym->internal_elf_sym.st_shndx = shndx;
8087 }
8088
8089 return true;
8090 }
8091
8092 /* Swap out the symbols. */
8093
8094 static bool
8095 swap_out_syms (bfd *abfd,
8096 struct elf_strtab_hash **sttp,
8097 int relocatable_p,
8098 struct bfd_link_info *info)
8099 {
8100 const struct elf_backend_data *bed;
8101 unsigned int symcount;
8102 asymbol **syms;
8103 struct elf_strtab_hash *stt;
8104 Elf_Internal_Shdr *symtab_hdr;
8105 Elf_Internal_Shdr *symtab_shndx_hdr;
8106 Elf_Internal_Shdr *symstrtab_hdr;
8107 struct elf_sym_strtab *symstrtab;
8108 bfd_byte *outbound_syms;
8109 bfd_byte *outbound_shndx;
8110 unsigned long outbound_syms_index;
8111 unsigned int idx;
8112 unsigned int num_locals;
8113 size_t amt;
8114 bool name_local_sections;
8115
8116 if (!elf_map_symbols (abfd, &num_locals))
8117 return false;
8118
8119 /* Dump out the symtabs. */
8120 stt = _bfd_elf_strtab_init ();
8121 if (stt == NULL)
8122 return false;
8123
8124 bed = get_elf_backend_data (abfd);
8125 symcount = bfd_get_symcount (abfd);
8126 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8127 symtab_hdr->sh_type = SHT_SYMTAB;
8128 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8129 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8130 symtab_hdr->sh_info = num_locals + 1;
8131 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8132
8133 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8134 symstrtab_hdr->sh_type = SHT_STRTAB;
8135
8136 /* Allocate buffer to swap out the .strtab section. */
8137 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8138 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8139 {
8140 bfd_set_error (bfd_error_no_memory);
8141 _bfd_elf_strtab_free (stt);
8142 return false;
8143 }
8144
8145 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8146 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8147 {
8148 error_no_mem:
8149 bfd_set_error (bfd_error_no_memory);
8150 error_return:
8151 free (symstrtab);
8152 _bfd_elf_strtab_free (stt);
8153 return false;
8154 }
8155 symtab_hdr->contents = outbound_syms;
8156 outbound_syms_index = 0;
8157
8158 outbound_shndx = NULL;
8159
8160 if (elf_symtab_shndx_list (abfd))
8161 {
8162 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8163 if (symtab_shndx_hdr->sh_name != 0)
8164 {
8165 if (_bfd_mul_overflow (symcount + 1,
8166 sizeof (Elf_External_Sym_Shndx), &amt))
8167 goto error_no_mem;
8168 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8169 if (outbound_shndx == NULL)
8170 goto error_return;
8171
8172 symtab_shndx_hdr->contents = outbound_shndx;
8173 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8174 symtab_shndx_hdr->sh_size = amt;
8175 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8176 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8177 }
8178 /* FIXME: What about any other headers in the list ? */
8179 }
8180
8181 /* Now generate the data (for "contents"). */
8182 {
8183 /* Fill in zeroth symbol and swap it out. */
8184 Elf_Internal_Sym sym;
8185 sym.st_name = 0;
8186 sym.st_value = 0;
8187 sym.st_size = 0;
8188 sym.st_info = 0;
8189 sym.st_other = 0;
8190 sym.st_shndx = SHN_UNDEF;
8191 sym.st_target_internal = 0;
8192 symstrtab[0].sym = sym;
8193 symstrtab[0].dest_index = outbound_syms_index;
8194 outbound_syms_index++;
8195 }
8196
8197 name_local_sections
8198 = (bed->elf_backend_name_local_section_symbols
8199 && bed->elf_backend_name_local_section_symbols (abfd));
8200
8201 syms = bfd_get_outsymbols (abfd);
8202 for (idx = 0; idx < symcount;)
8203 {
8204 Elf_Internal_Sym sym;
8205 bfd_vma value = syms[idx]->value;
8206 elf_symbol_type *type_ptr;
8207 flagword flags = syms[idx]->flags;
8208 int type;
8209
8210 if (!name_local_sections
8211 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8212 {
8213 /* Local section symbols have no name. */
8214 sym.st_name = (unsigned long) -1;
8215 }
8216 else
8217 {
8218 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8219 to get the final offset for st_name. */
8220 sym.st_name
8221 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8222 false);
8223 if (sym.st_name == (unsigned long) -1)
8224 goto error_return;
8225 }
8226
8227 type_ptr = elf_symbol_from (syms[idx]);
8228
8229 if ((flags & BSF_SECTION_SYM) == 0
8230 && bfd_is_com_section (syms[idx]->section))
8231 {
8232 /* ELF common symbols put the alignment into the `value' field,
8233 and the size into the `size' field. This is backwards from
8234 how BFD handles it, so reverse it here. */
8235 sym.st_size = value;
8236 if (type_ptr == NULL
8237 || type_ptr->internal_elf_sym.st_value == 0)
8238 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8239 else
8240 sym.st_value = type_ptr->internal_elf_sym.st_value;
8241 sym.st_shndx = _bfd_elf_section_from_bfd_section
8242 (abfd, syms[idx]->section);
8243 }
8244 else
8245 {
8246 asection *sec = syms[idx]->section;
8247 unsigned int shndx;
8248
8249 if (sec->output_section)
8250 {
8251 value += sec->output_offset;
8252 sec = sec->output_section;
8253 }
8254
8255 /* Don't add in the section vma for relocatable output. */
8256 if (! relocatable_p)
8257 value += sec->vma;
8258 sym.st_value = value;
8259 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8260
8261 if (bfd_is_abs_section (sec)
8262 && type_ptr != NULL
8263 && type_ptr->internal_elf_sym.st_shndx != 0)
8264 {
8265 /* This symbol is in a real ELF section which we did
8266 not create as a BFD section. Undo the mapping done
8267 by copy_private_symbol_data. */
8268 shndx = type_ptr->internal_elf_sym.st_shndx;
8269 switch (shndx)
8270 {
8271 case MAP_ONESYMTAB:
8272 shndx = elf_onesymtab (abfd);
8273 break;
8274 case MAP_DYNSYMTAB:
8275 shndx = elf_dynsymtab (abfd);
8276 break;
8277 case MAP_STRTAB:
8278 shndx = elf_strtab_sec (abfd);
8279 break;
8280 case MAP_SHSTRTAB:
8281 shndx = elf_shstrtab_sec (abfd);
8282 break;
8283 case MAP_SYM_SHNDX:
8284 if (elf_symtab_shndx_list (abfd))
8285 shndx = elf_symtab_shndx_list (abfd)->ndx;
8286 break;
8287 case SHN_COMMON:
8288 case SHN_ABS:
8289 shndx = SHN_ABS;
8290 break;
8291 default:
8292 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8293 {
8294 if (bed->symbol_section_index)
8295 shndx = bed->symbol_section_index (abfd, type_ptr);
8296 /* Otherwise just leave the index alone. */
8297 }
8298 else
8299 {
8300 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8301 _bfd_error_handler (_("%pB: \
8302 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8303 abfd, shndx);
8304 shndx = SHN_ABS;
8305 }
8306 break;
8307 }
8308 }
8309 else
8310 {
8311 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8312
8313 if (shndx == SHN_BAD)
8314 {
8315 asection *sec2;
8316
8317 /* Writing this would be a hell of a lot easier if
8318 we had some decent documentation on bfd, and
8319 knew what to expect of the library, and what to
8320 demand of applications. For example, it
8321 appears that `objcopy' might not set the
8322 section of a symbol to be a section that is
8323 actually in the output file. */
8324 sec2 = bfd_get_section_by_name (abfd, sec->name);
8325 if (sec2 != NULL)
8326 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8327 if (shndx == SHN_BAD)
8328 {
8329 /* xgettext:c-format */
8330 _bfd_error_handler
8331 (_("unable to find equivalent output section"
8332 " for symbol '%s' from section '%s'"),
8333 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8334 sec->name);
8335 bfd_set_error (bfd_error_invalid_operation);
8336 goto error_return;
8337 }
8338 }
8339 }
8340
8341 sym.st_shndx = shndx;
8342 }
8343
8344 if ((flags & BSF_THREAD_LOCAL) != 0)
8345 type = STT_TLS;
8346 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8347 type = STT_GNU_IFUNC;
8348 else if ((flags & BSF_FUNCTION) != 0)
8349 type = STT_FUNC;
8350 else if ((flags & BSF_OBJECT) != 0)
8351 type = STT_OBJECT;
8352 else if ((flags & BSF_RELC) != 0)
8353 type = STT_RELC;
8354 else if ((flags & BSF_SRELC) != 0)
8355 type = STT_SRELC;
8356 else
8357 type = STT_NOTYPE;
8358
8359 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8360 type = STT_TLS;
8361
8362 /* Processor-specific types. */
8363 if (type_ptr != NULL
8364 && bed->elf_backend_get_symbol_type)
8365 type = ((*bed->elf_backend_get_symbol_type)
8366 (&type_ptr->internal_elf_sym, type));
8367
8368 if (flags & BSF_SECTION_SYM)
8369 {
8370 if (flags & BSF_GLOBAL)
8371 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8372 else
8373 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8374 }
8375 else if (bfd_is_com_section (syms[idx]->section))
8376 {
8377 if (type != STT_TLS)
8378 {
8379 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8380 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8381 ? STT_COMMON : STT_OBJECT);
8382 else
8383 type = ((flags & BSF_ELF_COMMON) != 0
8384 ? STT_COMMON : STT_OBJECT);
8385 }
8386 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8387 }
8388 else if (bfd_is_und_section (syms[idx]->section))
8389 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8390 ? STB_WEAK
8391 : STB_GLOBAL),
8392 type);
8393 else if (flags & BSF_FILE)
8394 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8395 else
8396 {
8397 int bind = STB_LOCAL;
8398
8399 if (flags & BSF_LOCAL)
8400 bind = STB_LOCAL;
8401 else if (flags & BSF_GNU_UNIQUE)
8402 bind = STB_GNU_UNIQUE;
8403 else if (flags & BSF_WEAK)
8404 bind = STB_WEAK;
8405 else if (flags & BSF_GLOBAL)
8406 bind = STB_GLOBAL;
8407
8408 sym.st_info = ELF_ST_INFO (bind, type);
8409 }
8410
8411 if (type_ptr != NULL)
8412 {
8413 sym.st_other = type_ptr->internal_elf_sym.st_other;
8414 sym.st_target_internal
8415 = type_ptr->internal_elf_sym.st_target_internal;
8416 }
8417 else
8418 {
8419 sym.st_other = 0;
8420 sym.st_target_internal = 0;
8421 }
8422
8423 idx++;
8424 symstrtab[idx].sym = sym;
8425 symstrtab[idx].dest_index = outbound_syms_index;
8426
8427 outbound_syms_index++;
8428 }
8429
8430 /* Finalize the .strtab section. */
8431 _bfd_elf_strtab_finalize (stt);
8432
8433 /* Swap out the .strtab section. */
8434 for (idx = 0; idx <= symcount; idx++)
8435 {
8436 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8437 if (elfsym->sym.st_name == (unsigned long) -1)
8438 elfsym->sym.st_name = 0;
8439 else
8440 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8441 elfsym->sym.st_name);
8442 if (info && info->callbacks->ctf_new_symbol)
8443 info->callbacks->ctf_new_symbol (elfsym->dest_index,
8444 &elfsym->sym);
8445
8446 /* Inform the linker of the addition of this symbol. */
8447
8448 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8449 (outbound_syms
8450 + (elfsym->dest_index
8451 * bed->s->sizeof_sym)),
8452 NPTR_ADD (outbound_shndx,
8453 (elfsym->dest_index
8454 * sizeof (Elf_External_Sym_Shndx))));
8455 }
8456 free (symstrtab);
8457
8458 *sttp = stt;
8459 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8460 symstrtab_hdr->sh_type = SHT_STRTAB;
8461 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8462 symstrtab_hdr->sh_addr = 0;
8463 symstrtab_hdr->sh_entsize = 0;
8464 symstrtab_hdr->sh_link = 0;
8465 symstrtab_hdr->sh_info = 0;
8466 symstrtab_hdr->sh_addralign = 1;
8467
8468 return true;
8469 }
8470
8471 /* Return the number of bytes required to hold the symtab vector.
8472
8473 Note that we base it on the count plus 1, since we will null terminate
8474 the vector allocated based on this size. However, the ELF symbol table
8475 always has a dummy entry as symbol #0, so it ends up even. */
8476
8477 long
8478 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8479 {
8480 bfd_size_type symcount;
8481 long symtab_size;
8482 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8483
8484 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8485 if (symcount > LONG_MAX / sizeof (asymbol *))
8486 {
8487 bfd_set_error (bfd_error_file_too_big);
8488 return -1;
8489 }
8490 symtab_size = symcount * (sizeof (asymbol *));
8491 if (symcount == 0)
8492 symtab_size = sizeof (asymbol *);
8493 else if (!bfd_write_p (abfd))
8494 {
8495 ufile_ptr filesize = bfd_get_file_size (abfd);
8496
8497 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8498 {
8499 bfd_set_error (bfd_error_file_truncated);
8500 return -1;
8501 }
8502 }
8503
8504 return symtab_size;
8505 }
8506
8507 long
8508 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8509 {
8510 bfd_size_type symcount;
8511 long symtab_size;
8512 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8513
8514 if (elf_dynsymtab (abfd) == 0)
8515 {
8516 bfd_set_error (bfd_error_invalid_operation);
8517 return -1;
8518 }
8519
8520 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8521 if (symcount > LONG_MAX / sizeof (asymbol *))
8522 {
8523 bfd_set_error (bfd_error_file_too_big);
8524 return -1;
8525 }
8526 symtab_size = symcount * (sizeof (asymbol *));
8527 if (symcount == 0)
8528 symtab_size = sizeof (asymbol *);
8529 else if (!bfd_write_p (abfd))
8530 {
8531 ufile_ptr filesize = bfd_get_file_size (abfd);
8532
8533 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8534 {
8535 bfd_set_error (bfd_error_file_truncated);
8536 return -1;
8537 }
8538 }
8539
8540 return symtab_size;
8541 }
8542
8543 long
8544 _bfd_elf_get_reloc_upper_bound (bfd *abfd, sec_ptr asect)
8545 {
8546 if (asect->reloc_count != 0 && !bfd_write_p (abfd))
8547 {
8548 /* Sanity check reloc section size. */
8549 struct bfd_elf_section_data *d = elf_section_data (asect);
8550 Elf_Internal_Shdr *rel_hdr = &d->this_hdr;
8551 bfd_size_type ext_rel_size = rel_hdr->sh_size;
8552 ufile_ptr filesize = bfd_get_file_size (abfd);
8553
8554 if (filesize != 0 && ext_rel_size > filesize)
8555 {
8556 bfd_set_error (bfd_error_file_truncated);
8557 return -1;
8558 }
8559 }
8560
8561 #if SIZEOF_LONG == SIZEOF_INT
8562 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8563 {
8564 bfd_set_error (bfd_error_file_too_big);
8565 return -1;
8566 }
8567 #endif
8568 return (asect->reloc_count + 1L) * sizeof (arelent *);
8569 }
8570
8571 /* Canonicalize the relocs. */
8572
8573 long
8574 _bfd_elf_canonicalize_reloc (bfd *abfd,
8575 sec_ptr section,
8576 arelent **relptr,
8577 asymbol **symbols)
8578 {
8579 arelent *tblptr;
8580 unsigned int i;
8581 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8582
8583 if (! bed->s->slurp_reloc_table (abfd, section, symbols, false))
8584 return -1;
8585
8586 tblptr = section->relocation;
8587 for (i = 0; i < section->reloc_count; i++)
8588 *relptr++ = tblptr++;
8589
8590 *relptr = NULL;
8591
8592 return section->reloc_count;
8593 }
8594
8595 long
8596 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8597 {
8598 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8599 long symcount = bed->s->slurp_symbol_table (abfd, allocation, false);
8600
8601 if (symcount >= 0)
8602 abfd->symcount = symcount;
8603 return symcount;
8604 }
8605
8606 long
8607 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8608 asymbol **allocation)
8609 {
8610 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8611 long symcount = bed->s->slurp_symbol_table (abfd, allocation, true);
8612
8613 if (symcount >= 0)
8614 abfd->dynsymcount = symcount;
8615 return symcount;
8616 }
8617
8618 /* Return the size required for the dynamic reloc entries. Any loadable
8619 section that was actually installed in the BFD, and has type SHT_REL
8620 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8621 dynamic reloc section. */
8622
8623 long
8624 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8625 {
8626 bfd_size_type count, ext_rel_size;
8627 asection *s;
8628
8629 if (elf_dynsymtab (abfd) == 0)
8630 {
8631 bfd_set_error (bfd_error_invalid_operation);
8632 return -1;
8633 }
8634
8635 count = 1;
8636 ext_rel_size = 0;
8637 for (s = abfd->sections; s != NULL; s = s->next)
8638 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8639 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8640 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8641 {
8642 ext_rel_size += s->size;
8643 if (ext_rel_size < s->size)
8644 {
8645 bfd_set_error (bfd_error_file_truncated);
8646 return -1;
8647 }
8648 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8649 if (count > LONG_MAX / sizeof (arelent *))
8650 {
8651 bfd_set_error (bfd_error_file_too_big);
8652 return -1;
8653 }
8654 }
8655 if (count > 1 && !bfd_write_p (abfd))
8656 {
8657 /* Sanity check reloc section sizes. */
8658 ufile_ptr filesize = bfd_get_file_size (abfd);
8659 if (filesize != 0 && ext_rel_size > filesize)
8660 {
8661 bfd_set_error (bfd_error_file_truncated);
8662 return -1;
8663 }
8664 }
8665 return count * sizeof (arelent *);
8666 }
8667
8668 /* Canonicalize the dynamic relocation entries. Note that we return the
8669 dynamic relocations as a single block, although they are actually
8670 associated with particular sections; the interface, which was
8671 designed for SunOS style shared libraries, expects that there is only
8672 one set of dynamic relocs. Any loadable section that was actually
8673 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8674 dynamic symbol table, is considered to be a dynamic reloc section. */
8675
8676 long
8677 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8678 arelent **storage,
8679 asymbol **syms)
8680 {
8681 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
8682 asection *s;
8683 long ret;
8684
8685 if (elf_dynsymtab (abfd) == 0)
8686 {
8687 bfd_set_error (bfd_error_invalid_operation);
8688 return -1;
8689 }
8690
8691 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8692 ret = 0;
8693 for (s = abfd->sections; s != NULL; s = s->next)
8694 {
8695 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8696 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8697 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8698 {
8699 arelent *p;
8700 long count, i;
8701
8702 if (! (*slurp_relocs) (abfd, s, syms, true))
8703 return -1;
8704 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8705 p = s->relocation;
8706 for (i = 0; i < count; i++)
8707 *storage++ = p++;
8708 ret += count;
8709 }
8710 }
8711
8712 *storage = NULL;
8713
8714 return ret;
8715 }
8716 \f
8717 /* Read in the version information. */
8718
8719 bool
8720 _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver)
8721 {
8722 bfd_byte *contents = NULL;
8723 unsigned int freeidx = 0;
8724 size_t amt;
8725
8726 if (elf_dynverref (abfd) != 0)
8727 {
8728 Elf_Internal_Shdr *hdr;
8729 Elf_External_Verneed *everneed;
8730 Elf_Internal_Verneed *iverneed;
8731 unsigned int i;
8732 bfd_byte *contents_end;
8733
8734 hdr = &elf_tdata (abfd)->dynverref_hdr;
8735
8736 if (hdr->sh_info == 0
8737 || hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8738 {
8739 error_return_bad_verref:
8740 _bfd_error_handler
8741 (_("%pB: .gnu.version_r invalid entry"), abfd);
8742 bfd_set_error (bfd_error_bad_value);
8743 error_return_verref:
8744 elf_tdata (abfd)->verref = NULL;
8745 elf_tdata (abfd)->cverrefs = 0;
8746 goto error_return;
8747 }
8748
8749 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8750 goto error_return_verref;
8751 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8752 if (contents == NULL)
8753 goto error_return_verref;
8754
8755 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8756 {
8757 bfd_set_error (bfd_error_file_too_big);
8758 goto error_return_verref;
8759 }
8760 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
8761 if (elf_tdata (abfd)->verref == NULL)
8762 goto error_return_verref;
8763
8764 BFD_ASSERT (sizeof (Elf_External_Verneed)
8765 == sizeof (Elf_External_Vernaux));
8766 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8767 everneed = (Elf_External_Verneed *) contents;
8768 iverneed = elf_tdata (abfd)->verref;
8769 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8770 {
8771 Elf_External_Vernaux *evernaux;
8772 Elf_Internal_Vernaux *ivernaux;
8773 unsigned int j;
8774
8775 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8776
8777 iverneed->vn_bfd = abfd;
8778
8779 iverneed->vn_filename =
8780 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8781 iverneed->vn_file);
8782 if (iverneed->vn_filename == NULL)
8783 goto error_return_bad_verref;
8784
8785 if (iverneed->vn_cnt == 0)
8786 iverneed->vn_auxptr = NULL;
8787 else
8788 {
8789 if (_bfd_mul_overflow (iverneed->vn_cnt,
8790 sizeof (Elf_Internal_Vernaux), &amt))
8791 {
8792 bfd_set_error (bfd_error_file_too_big);
8793 goto error_return_verref;
8794 }
8795 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8796 bfd_alloc (abfd, amt);
8797 if (iverneed->vn_auxptr == NULL)
8798 goto error_return_verref;
8799 }
8800
8801 if (iverneed->vn_aux
8802 > (size_t) (contents_end - (bfd_byte *) everneed))
8803 goto error_return_bad_verref;
8804
8805 evernaux = ((Elf_External_Vernaux *)
8806 ((bfd_byte *) everneed + iverneed->vn_aux));
8807 ivernaux = iverneed->vn_auxptr;
8808 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8809 {
8810 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8811
8812 ivernaux->vna_nodename =
8813 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8814 ivernaux->vna_name);
8815 if (ivernaux->vna_nodename == NULL)
8816 goto error_return_bad_verref;
8817
8818 if (ivernaux->vna_other > freeidx)
8819 freeidx = ivernaux->vna_other;
8820
8821 ivernaux->vna_nextptr = NULL;
8822 if (ivernaux->vna_next == 0)
8823 {
8824 iverneed->vn_cnt = j + 1;
8825 break;
8826 }
8827 if (j + 1 < iverneed->vn_cnt)
8828 ivernaux->vna_nextptr = ivernaux + 1;
8829
8830 if (ivernaux->vna_next
8831 > (size_t) (contents_end - (bfd_byte *) evernaux))
8832 goto error_return_bad_verref;
8833
8834 evernaux = ((Elf_External_Vernaux *)
8835 ((bfd_byte *) evernaux + ivernaux->vna_next));
8836 }
8837
8838 iverneed->vn_nextref = NULL;
8839 if (iverneed->vn_next == 0)
8840 break;
8841 if (i + 1 < hdr->sh_info)
8842 iverneed->vn_nextref = iverneed + 1;
8843
8844 if (iverneed->vn_next
8845 > (size_t) (contents_end - (bfd_byte *) everneed))
8846 goto error_return_bad_verref;
8847
8848 everneed = ((Elf_External_Verneed *)
8849 ((bfd_byte *) everneed + iverneed->vn_next));
8850 }
8851 elf_tdata (abfd)->cverrefs = i;
8852
8853 free (contents);
8854 contents = NULL;
8855 }
8856
8857 if (elf_dynverdef (abfd) != 0)
8858 {
8859 Elf_Internal_Shdr *hdr;
8860 Elf_External_Verdef *everdef;
8861 Elf_Internal_Verdef *iverdef;
8862 Elf_Internal_Verdef *iverdefarr;
8863 Elf_Internal_Verdef iverdefmem;
8864 unsigned int i;
8865 unsigned int maxidx;
8866 bfd_byte *contents_end_def, *contents_end_aux;
8867
8868 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8869
8870 if (hdr->sh_info == 0 || hdr->sh_size < sizeof (Elf_External_Verdef))
8871 {
8872 error_return_bad_verdef:
8873 _bfd_error_handler
8874 (_("%pB: .gnu.version_d invalid entry"), abfd);
8875 bfd_set_error (bfd_error_bad_value);
8876 error_return_verdef:
8877 elf_tdata (abfd)->verdef = NULL;
8878 elf_tdata (abfd)->cverdefs = 0;
8879 goto error_return;
8880 }
8881
8882 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8883 goto error_return_verdef;
8884 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8885 if (contents == NULL)
8886 goto error_return_verdef;
8887
8888 BFD_ASSERT (sizeof (Elf_External_Verdef)
8889 >= sizeof (Elf_External_Verdaux));
8890 contents_end_def = contents + hdr->sh_size
8891 - sizeof (Elf_External_Verdef);
8892 contents_end_aux = contents + hdr->sh_size
8893 - sizeof (Elf_External_Verdaux);
8894
8895 /* We know the number of entries in the section but not the maximum
8896 index. Therefore we have to run through all entries and find
8897 the maximum. */
8898 everdef = (Elf_External_Verdef *) contents;
8899 maxidx = 0;
8900 for (i = 0; i < hdr->sh_info; ++i)
8901 {
8902 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8903
8904 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
8905 goto error_return_bad_verdef;
8906 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
8907 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
8908
8909 if (iverdefmem.vd_next == 0)
8910 break;
8911
8912 if (iverdefmem.vd_next
8913 > (size_t) (contents_end_def - (bfd_byte *) everdef))
8914 goto error_return_bad_verdef;
8915
8916 everdef = ((Elf_External_Verdef *)
8917 ((bfd_byte *) everdef + iverdefmem.vd_next));
8918 }
8919
8920 if (default_imported_symver)
8921 {
8922 if (freeidx > maxidx)
8923 maxidx = ++freeidx;
8924 else
8925 freeidx = ++maxidx;
8926 }
8927 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
8928 {
8929 bfd_set_error (bfd_error_file_too_big);
8930 goto error_return_verdef;
8931 }
8932 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
8933 if (elf_tdata (abfd)->verdef == NULL)
8934 goto error_return_verdef;
8935
8936 elf_tdata (abfd)->cverdefs = maxidx;
8937
8938 everdef = (Elf_External_Verdef *) contents;
8939 iverdefarr = elf_tdata (abfd)->verdef;
8940 for (i = 0; i < hdr->sh_info; i++)
8941 {
8942 Elf_External_Verdaux *everdaux;
8943 Elf_Internal_Verdaux *iverdaux;
8944 unsigned int j;
8945
8946 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
8947
8948 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
8949 goto error_return_bad_verdef;
8950
8951 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
8952 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
8953
8954 iverdef->vd_bfd = abfd;
8955
8956 if (iverdef->vd_cnt == 0)
8957 iverdef->vd_auxptr = NULL;
8958 else
8959 {
8960 if (_bfd_mul_overflow (iverdef->vd_cnt,
8961 sizeof (Elf_Internal_Verdaux), &amt))
8962 {
8963 bfd_set_error (bfd_error_file_too_big);
8964 goto error_return_verdef;
8965 }
8966 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
8967 bfd_alloc (abfd, amt);
8968 if (iverdef->vd_auxptr == NULL)
8969 goto error_return_verdef;
8970 }
8971
8972 if (iverdef->vd_aux
8973 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
8974 goto error_return_bad_verdef;
8975
8976 everdaux = ((Elf_External_Verdaux *)
8977 ((bfd_byte *) everdef + iverdef->vd_aux));
8978 iverdaux = iverdef->vd_auxptr;
8979 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
8980 {
8981 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
8982
8983 iverdaux->vda_nodename =
8984 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8985 iverdaux->vda_name);
8986 if (iverdaux->vda_nodename == NULL)
8987 goto error_return_bad_verdef;
8988
8989 iverdaux->vda_nextptr = NULL;
8990 if (iverdaux->vda_next == 0)
8991 {
8992 iverdef->vd_cnt = j + 1;
8993 break;
8994 }
8995 if (j + 1 < iverdef->vd_cnt)
8996 iverdaux->vda_nextptr = iverdaux + 1;
8997
8998 if (iverdaux->vda_next
8999 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
9000 goto error_return_bad_verdef;
9001
9002 everdaux = ((Elf_External_Verdaux *)
9003 ((bfd_byte *) everdaux + iverdaux->vda_next));
9004 }
9005
9006 iverdef->vd_nodename = NULL;
9007 if (iverdef->vd_cnt)
9008 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
9009
9010 iverdef->vd_nextdef = NULL;
9011 if (iverdef->vd_next == 0)
9012 break;
9013 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
9014 iverdef->vd_nextdef = iverdef + 1;
9015
9016 everdef = ((Elf_External_Verdef *)
9017 ((bfd_byte *) everdef + iverdef->vd_next));
9018 }
9019
9020 free (contents);
9021 contents = NULL;
9022 }
9023 else if (default_imported_symver)
9024 {
9025 if (freeidx < 3)
9026 freeidx = 3;
9027 else
9028 freeidx++;
9029
9030 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
9031 {
9032 bfd_set_error (bfd_error_file_too_big);
9033 goto error_return;
9034 }
9035 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
9036 if (elf_tdata (abfd)->verdef == NULL)
9037 goto error_return;
9038
9039 elf_tdata (abfd)->cverdefs = freeidx;
9040 }
9041
9042 /* Create a default version based on the soname. */
9043 if (default_imported_symver)
9044 {
9045 Elf_Internal_Verdef *iverdef;
9046 Elf_Internal_Verdaux *iverdaux;
9047
9048 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
9049
9050 iverdef->vd_version = VER_DEF_CURRENT;
9051 iverdef->vd_flags = 0;
9052 iverdef->vd_ndx = freeidx;
9053 iverdef->vd_cnt = 1;
9054
9055 iverdef->vd_bfd = abfd;
9056
9057 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
9058 if (iverdef->vd_nodename == NULL)
9059 goto error_return_verdef;
9060 iverdef->vd_nextdef = NULL;
9061 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
9062 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
9063 if (iverdef->vd_auxptr == NULL)
9064 goto error_return_verdef;
9065
9066 iverdaux = iverdef->vd_auxptr;
9067 iverdaux->vda_nodename = iverdef->vd_nodename;
9068 }
9069
9070 return true;
9071
9072 error_return:
9073 free (contents);
9074 return false;
9075 }
9076 \f
9077 asymbol *
9078 _bfd_elf_make_empty_symbol (bfd *abfd)
9079 {
9080 elf_symbol_type *newsym;
9081
9082 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
9083 if (!newsym)
9084 return NULL;
9085 newsym->symbol.the_bfd = abfd;
9086 return &newsym->symbol;
9087 }
9088
9089 void
9090 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
9091 asymbol *symbol,
9092 symbol_info *ret)
9093 {
9094 bfd_symbol_info (symbol, ret);
9095 }
9096
9097 /* Return whether a symbol name implies a local symbol. Most targets
9098 use this function for the is_local_label_name entry point, but some
9099 override it. */
9100
9101 bool
9102 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
9103 const char *name)
9104 {
9105 /* Normal local symbols start with ``.L''. */
9106 if (name[0] == '.' && name[1] == 'L')
9107 return true;
9108
9109 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9110 DWARF debugging symbols starting with ``..''. */
9111 if (name[0] == '.' && name[1] == '.')
9112 return true;
9113
9114 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9115 emitting DWARF debugging output. I suspect this is actually a
9116 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9117 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9118 underscore to be emitted on some ELF targets). For ease of use,
9119 we treat such symbols as local. */
9120 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
9121 return true;
9122
9123 /* Treat assembler generated fake symbols, dollar local labels and
9124 forward-backward labels (aka local labels) as locals.
9125 These labels have the form:
9126
9127 L0^A.* (fake symbols)
9128
9129 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9130
9131 Versions which start with .L will have already been matched above,
9132 so we only need to match the rest. */
9133 if (name[0] == 'L' && ISDIGIT (name[1]))
9134 {
9135 bool ret = false;
9136 const char * p;
9137 char c;
9138
9139 for (p = name + 2; (c = *p); p++)
9140 {
9141 if (c == 1 || c == 2)
9142 {
9143 if (c == 1 && p == name + 2)
9144 /* A fake symbol. */
9145 return true;
9146
9147 /* FIXME: We are being paranoid here and treating symbols like
9148 L0^Bfoo as if there were non-local, on the grounds that the
9149 assembler will never generate them. But can any symbol
9150 containing an ASCII value in the range 1-31 ever be anything
9151 other than some kind of local ? */
9152 ret = true;
9153 }
9154
9155 if (! ISDIGIT (c))
9156 {
9157 ret = false;
9158 break;
9159 }
9160 }
9161 return ret;
9162 }
9163
9164 return false;
9165 }
9166
9167 alent *
9168 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9169 asymbol *symbol ATTRIBUTE_UNUSED)
9170 {
9171 abort ();
9172 return NULL;
9173 }
9174
9175 bool
9176 _bfd_elf_set_arch_mach (bfd *abfd,
9177 enum bfd_architecture arch,
9178 unsigned long machine)
9179 {
9180 /* If this isn't the right architecture for this backend, and this
9181 isn't the generic backend, fail. */
9182 if (arch != get_elf_backend_data (abfd)->arch
9183 && arch != bfd_arch_unknown
9184 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9185 return false;
9186
9187 return bfd_default_set_arch_mach (abfd, arch, machine);
9188 }
9189
9190 /* Find the nearest line to a particular section and offset,
9191 for error reporting. */
9192
9193 bool
9194 _bfd_elf_find_nearest_line (bfd *abfd,
9195 asymbol **symbols,
9196 asection *section,
9197 bfd_vma offset,
9198 const char **filename_ptr,
9199 const char **functionname_ptr,
9200 unsigned int *line_ptr,
9201 unsigned int *discriminator_ptr)
9202 {
9203 bool found;
9204
9205 if (_bfd_dwarf2_find_nearest_line (abfd, symbols, NULL, section, offset,
9206 filename_ptr, functionname_ptr,
9207 line_ptr, discriminator_ptr,
9208 dwarf_debug_sections,
9209 &elf_tdata (abfd)->dwarf2_find_line_info))
9210 return true;
9211
9212 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9213 filename_ptr, functionname_ptr, line_ptr))
9214 {
9215 if (!*functionname_ptr)
9216 _bfd_elf_find_function (abfd, symbols, section, offset,
9217 *filename_ptr ? NULL : filename_ptr,
9218 functionname_ptr);
9219 return true;
9220 }
9221
9222 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9223 &found, filename_ptr,
9224 functionname_ptr, line_ptr,
9225 &elf_tdata (abfd)->line_info))
9226 return false;
9227 if (found && (*functionname_ptr || *line_ptr))
9228 return true;
9229
9230 if (symbols == NULL)
9231 return false;
9232
9233 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9234 filename_ptr, functionname_ptr))
9235 return false;
9236
9237 *line_ptr = 0;
9238 return true;
9239 }
9240
9241 /* Find the line for a symbol. */
9242
9243 bool
9244 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9245 const char **filename_ptr, unsigned int *line_ptr)
9246 {
9247 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9248 filename_ptr, NULL, line_ptr, NULL,
9249 dwarf_debug_sections,
9250 &elf_tdata (abfd)->dwarf2_find_line_info);
9251 }
9252
9253 /* After a call to bfd_find_nearest_line, successive calls to
9254 bfd_find_inliner_info can be used to get source information about
9255 each level of function inlining that terminated at the address
9256 passed to bfd_find_nearest_line. Currently this is only supported
9257 for DWARF2 with appropriate DWARF3 extensions. */
9258
9259 bool
9260 _bfd_elf_find_inliner_info (bfd *abfd,
9261 const char **filename_ptr,
9262 const char **functionname_ptr,
9263 unsigned int *line_ptr)
9264 {
9265 bool found;
9266 found = _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9267 functionname_ptr, line_ptr,
9268 & elf_tdata (abfd)->dwarf2_find_line_info);
9269 return found;
9270 }
9271
9272 int
9273 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9274 {
9275 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9276 int ret = bed->s->sizeof_ehdr;
9277
9278 if (!bfd_link_relocatable (info))
9279 {
9280 bfd_size_type phdr_size = elf_program_header_size (abfd);
9281
9282 if (phdr_size == (bfd_size_type) -1)
9283 {
9284 struct elf_segment_map *m;
9285
9286 phdr_size = 0;
9287 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9288 phdr_size += bed->s->sizeof_phdr;
9289
9290 if (phdr_size == 0)
9291 phdr_size = get_program_header_size (abfd, info);
9292 }
9293
9294 elf_program_header_size (abfd) = phdr_size;
9295 ret += phdr_size;
9296 }
9297
9298 return ret;
9299 }
9300
9301 bool
9302 _bfd_elf_set_section_contents (bfd *abfd,
9303 sec_ptr section,
9304 const void *location,
9305 file_ptr offset,
9306 bfd_size_type count)
9307 {
9308 Elf_Internal_Shdr *hdr;
9309 file_ptr pos;
9310
9311 if (! abfd->output_has_begun
9312 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9313 return false;
9314
9315 if (!count)
9316 return true;
9317
9318 hdr = &elf_section_data (section)->this_hdr;
9319 if (hdr->sh_offset == (file_ptr) -1)
9320 {
9321 unsigned char *contents;
9322
9323 if (bfd_section_is_ctf (section))
9324 /* Nothing to do with this section: the contents are generated
9325 later. */
9326 return true;
9327
9328 if ((section->flags & SEC_ELF_COMPRESS) == 0)
9329 {
9330 _bfd_error_handler
9331 (_("%pB:%pA: error: attempting to write into an unallocated compressed section"),
9332 abfd, section);
9333 bfd_set_error (bfd_error_invalid_operation);
9334 return false;
9335 }
9336
9337 if ((offset + count) > hdr->sh_size)
9338 {
9339 _bfd_error_handler
9340 (_("%pB:%pA: error: attempting to write over the end of the section"),
9341 abfd, section);
9342
9343 bfd_set_error (bfd_error_invalid_operation);
9344 return false;
9345 }
9346
9347 contents = hdr->contents;
9348 if (contents == NULL)
9349 {
9350 _bfd_error_handler
9351 (_("%pB:%pA: error: attempting to write section into an empty buffer"),
9352 abfd, section);
9353
9354 bfd_set_error (bfd_error_invalid_operation);
9355 return false;
9356 }
9357
9358 memcpy (contents + offset, location, count);
9359 return true;
9360 }
9361
9362 pos = hdr->sh_offset + offset;
9363 if (bfd_seek (abfd, pos, SEEK_SET) != 0
9364 || bfd_bwrite (location, count, abfd) != count)
9365 return false;
9366
9367 return true;
9368 }
9369
9370 bool
9371 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9372 arelent *cache_ptr ATTRIBUTE_UNUSED,
9373 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9374 {
9375 abort ();
9376 return false;
9377 }
9378
9379 /* Try to convert a non-ELF reloc into an ELF one. */
9380
9381 bool
9382 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9383 {
9384 /* Check whether we really have an ELF howto. */
9385
9386 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9387 {
9388 bfd_reloc_code_real_type code;
9389 reloc_howto_type *howto;
9390
9391 /* Alien reloc: Try to determine its type to replace it with an
9392 equivalent ELF reloc. */
9393
9394 if (areloc->howto->pc_relative)
9395 {
9396 switch (areloc->howto->bitsize)
9397 {
9398 case 8:
9399 code = BFD_RELOC_8_PCREL;
9400 break;
9401 case 12:
9402 code = BFD_RELOC_12_PCREL;
9403 break;
9404 case 16:
9405 code = BFD_RELOC_16_PCREL;
9406 break;
9407 case 24:
9408 code = BFD_RELOC_24_PCREL;
9409 break;
9410 case 32:
9411 code = BFD_RELOC_32_PCREL;
9412 break;
9413 case 64:
9414 code = BFD_RELOC_64_PCREL;
9415 break;
9416 default:
9417 goto fail;
9418 }
9419
9420 howto = bfd_reloc_type_lookup (abfd, code);
9421
9422 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9423 {
9424 if (howto->pcrel_offset)
9425 areloc->addend += areloc->address;
9426 else
9427 areloc->addend -= areloc->address; /* addend is unsigned!! */
9428 }
9429 }
9430 else
9431 {
9432 switch (areloc->howto->bitsize)
9433 {
9434 case 8:
9435 code = BFD_RELOC_8;
9436 break;
9437 case 14:
9438 code = BFD_RELOC_14;
9439 break;
9440 case 16:
9441 code = BFD_RELOC_16;
9442 break;
9443 case 26:
9444 code = BFD_RELOC_26;
9445 break;
9446 case 32:
9447 code = BFD_RELOC_32;
9448 break;
9449 case 64:
9450 code = BFD_RELOC_64;
9451 break;
9452 default:
9453 goto fail;
9454 }
9455
9456 howto = bfd_reloc_type_lookup (abfd, code);
9457 }
9458
9459 if (howto)
9460 areloc->howto = howto;
9461 else
9462 goto fail;
9463 }
9464
9465 return true;
9466
9467 fail:
9468 /* xgettext:c-format */
9469 _bfd_error_handler (_("%pB: %s unsupported"),
9470 abfd, areloc->howto->name);
9471 bfd_set_error (bfd_error_sorry);
9472 return false;
9473 }
9474
9475 bool
9476 _bfd_elf_close_and_cleanup (bfd *abfd)
9477 {
9478 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9479 if (tdata != NULL
9480 && (bfd_get_format (abfd) == bfd_object
9481 || bfd_get_format (abfd) == bfd_core))
9482 {
9483 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9484 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9485 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9486 }
9487
9488 return _bfd_generic_close_and_cleanup (abfd);
9489 }
9490
9491 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9492 in the relocation's offset. Thus we cannot allow any sort of sanity
9493 range-checking to interfere. There is nothing else to do in processing
9494 this reloc. */
9495
9496 bfd_reloc_status_type
9497 _bfd_elf_rel_vtable_reloc_fn
9498 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9499 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9500 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9501 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9502 {
9503 return bfd_reloc_ok;
9504 }
9505 \f
9506 /* Elf core file support. Much of this only works on native
9507 toolchains, since we rely on knowing the
9508 machine-dependent procfs structure in order to pick
9509 out details about the corefile. */
9510
9511 #ifdef HAVE_SYS_PROCFS_H
9512 # include <sys/procfs.h>
9513 #endif
9514
9515 /* Return a PID that identifies a "thread" for threaded cores, or the
9516 PID of the main process for non-threaded cores. */
9517
9518 static int
9519 elfcore_make_pid (bfd *abfd)
9520 {
9521 int pid;
9522
9523 pid = elf_tdata (abfd)->core->lwpid;
9524 if (pid == 0)
9525 pid = elf_tdata (abfd)->core->pid;
9526
9527 return pid;
9528 }
9529
9530 /* If there isn't a section called NAME, make one, using
9531 data from SECT. Note, this function will generate a
9532 reference to NAME, so you shouldn't deallocate or
9533 overwrite it. */
9534
9535 static bool
9536 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9537 {
9538 asection *sect2;
9539
9540 if (bfd_get_section_by_name (abfd, name) != NULL)
9541 return true;
9542
9543 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9544 if (sect2 == NULL)
9545 return false;
9546
9547 sect2->size = sect->size;
9548 sect2->filepos = sect->filepos;
9549 sect2->alignment_power = sect->alignment_power;
9550 return true;
9551 }
9552
9553 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9554 actually creates up to two pseudosections:
9555 - For the single-threaded case, a section named NAME, unless
9556 such a section already exists.
9557 - For the multi-threaded case, a section named "NAME/PID", where
9558 PID is elfcore_make_pid (abfd).
9559 Both pseudosections have identical contents. */
9560 bool
9561 _bfd_elfcore_make_pseudosection (bfd *abfd,
9562 char *name,
9563 size_t size,
9564 ufile_ptr filepos)
9565 {
9566 char buf[100];
9567 char *threaded_name;
9568 size_t len;
9569 asection *sect;
9570
9571 /* Build the section name. */
9572
9573 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9574 len = strlen (buf) + 1;
9575 threaded_name = (char *) bfd_alloc (abfd, len);
9576 if (threaded_name == NULL)
9577 return false;
9578 memcpy (threaded_name, buf, len);
9579
9580 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9581 SEC_HAS_CONTENTS);
9582 if (sect == NULL)
9583 return false;
9584 sect->size = size;
9585 sect->filepos = filepos;
9586 sect->alignment_power = 2;
9587
9588 return elfcore_maybe_make_sect (abfd, name, sect);
9589 }
9590
9591 static bool
9592 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9593 size_t offs)
9594 {
9595 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9596 SEC_HAS_CONTENTS);
9597
9598 if (sect == NULL)
9599 return false;
9600
9601 sect->size = note->descsz - offs;
9602 sect->filepos = note->descpos + offs;
9603 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9604
9605 return true;
9606 }
9607
9608 /* prstatus_t exists on:
9609 solaris 2.5+
9610 linux 2.[01] + glibc
9611 unixware 4.2
9612 */
9613
9614 #if defined (HAVE_PRSTATUS_T)
9615
9616 static bool
9617 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9618 {
9619 size_t size;
9620 int offset;
9621
9622 if (note->descsz == sizeof (prstatus_t))
9623 {
9624 prstatus_t prstat;
9625
9626 size = sizeof (prstat.pr_reg);
9627 offset = offsetof (prstatus_t, pr_reg);
9628 memcpy (&prstat, note->descdata, sizeof (prstat));
9629
9630 /* Do not overwrite the core signal if it
9631 has already been set by another thread. */
9632 if (elf_tdata (abfd)->core->signal == 0)
9633 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9634 if (elf_tdata (abfd)->core->pid == 0)
9635 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9636
9637 /* pr_who exists on:
9638 solaris 2.5+
9639 unixware 4.2
9640 pr_who doesn't exist on:
9641 linux 2.[01]
9642 */
9643 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9644 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9645 #else
9646 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9647 #endif
9648 }
9649 #if defined (HAVE_PRSTATUS32_T)
9650 else if (note->descsz == sizeof (prstatus32_t))
9651 {
9652 /* 64-bit host, 32-bit corefile */
9653 prstatus32_t prstat;
9654
9655 size = sizeof (prstat.pr_reg);
9656 offset = offsetof (prstatus32_t, pr_reg);
9657 memcpy (&prstat, note->descdata, sizeof (prstat));
9658
9659 /* Do not overwrite the core signal if it
9660 has already been set by another thread. */
9661 if (elf_tdata (abfd)->core->signal == 0)
9662 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9663 if (elf_tdata (abfd)->core->pid == 0)
9664 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9665
9666 /* pr_who exists on:
9667 solaris 2.5+
9668 unixware 4.2
9669 pr_who doesn't exist on:
9670 linux 2.[01]
9671 */
9672 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9673 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9674 #else
9675 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9676 #endif
9677 }
9678 #endif /* HAVE_PRSTATUS32_T */
9679 else
9680 {
9681 /* Fail - we don't know how to handle any other
9682 note size (ie. data object type). */
9683 return true;
9684 }
9685
9686 /* Make a ".reg/999" section and a ".reg" section. */
9687 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9688 size, note->descpos + offset);
9689 }
9690 #endif /* defined (HAVE_PRSTATUS_T) */
9691
9692 /* Create a pseudosection containing the exact contents of NOTE. */
9693 static bool
9694 elfcore_make_note_pseudosection (bfd *abfd,
9695 char *name,
9696 Elf_Internal_Note *note)
9697 {
9698 return _bfd_elfcore_make_pseudosection (abfd, name,
9699 note->descsz, note->descpos);
9700 }
9701
9702 /* There isn't a consistent prfpregset_t across platforms,
9703 but it doesn't matter, because we don't have to pick this
9704 data structure apart. */
9705
9706 static bool
9707 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9708 {
9709 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9710 }
9711
9712 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9713 type of NT_PRXFPREG. Just include the whole note's contents
9714 literally. */
9715
9716 static bool
9717 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9718 {
9719 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9720 }
9721
9722 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9723 with a note type of NT_X86_XSTATE. Just include the whole note's
9724 contents literally. */
9725
9726 static bool
9727 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9728 {
9729 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9730 }
9731
9732 static bool
9733 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9734 {
9735 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9736 }
9737
9738 static bool
9739 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9740 {
9741 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9742 }
9743
9744 static bool
9745 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9746 {
9747 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9748 }
9749
9750 static bool
9751 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9752 {
9753 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9754 }
9755
9756 static bool
9757 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9758 {
9759 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9760 }
9761
9762 static bool
9763 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9764 {
9765 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9766 }
9767
9768 static bool
9769 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9770 {
9771 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9772 }
9773
9774 static bool
9775 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9776 {
9777 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9778 }
9779
9780 static bool
9781 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9782 {
9783 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9784 }
9785
9786 static bool
9787 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9788 {
9789 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9790 }
9791
9792 static bool
9793 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9794 {
9795 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9796 }
9797
9798 static bool
9799 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9800 {
9801 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9802 }
9803
9804 static bool
9805 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9806 {
9807 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9808 }
9809
9810 static bool
9811 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9812 {
9813 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9814 }
9815
9816 static bool
9817 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9818 {
9819 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9820 }
9821
9822 static bool
9823 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9824 {
9825 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9826 }
9827
9828 static bool
9829 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9830 {
9831 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9832 }
9833
9834 static bool
9835 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9836 {
9837 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9838 }
9839
9840 static bool
9841 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9842 {
9843 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9844 }
9845
9846 static bool
9847 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9848 {
9849 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9850 }
9851
9852 static bool
9853 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9854 {
9855 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9856 }
9857
9858 static bool
9859 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9860 {
9861 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9862 }
9863
9864 static bool
9865 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9866 {
9867 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9868 }
9869
9870 static bool
9871 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9872 {
9873 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9874 }
9875
9876 static bool
9877 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
9878 {
9879 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
9880 }
9881
9882 static bool
9883 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
9884 {
9885 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
9886 }
9887
9888 static bool
9889 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
9890 {
9891 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
9892 }
9893
9894 static bool
9895 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
9896 {
9897 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
9898 }
9899
9900 static bool
9901 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
9902 {
9903 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
9904 }
9905
9906 static bool
9907 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
9908 {
9909 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
9910 }
9911
9912 static bool
9913 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
9914 {
9915 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
9916 }
9917
9918 static bool
9919 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
9920 {
9921 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
9922 }
9923
9924 static bool
9925 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
9926 {
9927 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
9928 }
9929
9930 static bool
9931 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
9932 {
9933 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
9934 }
9935
9936 static bool
9937 elfcore_grok_aarch_mte (bfd *abfd, Elf_Internal_Note *note)
9938 {
9939 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-mte",
9940 note);
9941 }
9942
9943 static bool
9944 elfcore_grok_arc_v2 (bfd *abfd, Elf_Internal_Note *note)
9945 {
9946 return elfcore_make_note_pseudosection (abfd, ".reg-arc-v2", note);
9947 }
9948
9949 /* Convert NOTE into a bfd_section called ".reg-riscv-csr". Return TRUE if
9950 successful otherwise, return FALSE. */
9951
9952 static bool
9953 elfcore_grok_riscv_csr (bfd *abfd, Elf_Internal_Note *note)
9954 {
9955 return elfcore_make_note_pseudosection (abfd, ".reg-riscv-csr", note);
9956 }
9957
9958 /* Convert NOTE into a bfd_section called ".gdb-tdesc". Return TRUE if
9959 successful otherwise, return FALSE. */
9960
9961 static bool
9962 elfcore_grok_gdb_tdesc (bfd *abfd, Elf_Internal_Note *note)
9963 {
9964 return elfcore_make_note_pseudosection (abfd, ".gdb-tdesc", note);
9965 }
9966
9967 static bool
9968 elfcore_grok_loongarch_cpucfg (bfd *abfd, Elf_Internal_Note *note)
9969 {
9970 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-cpucfg", note);
9971 }
9972
9973 static bool
9974 elfcore_grok_loongarch_lbt (bfd *abfd, Elf_Internal_Note *note)
9975 {
9976 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lbt", note);
9977 }
9978
9979 static bool
9980 elfcore_grok_loongarch_lsx (bfd *abfd, Elf_Internal_Note *note)
9981 {
9982 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lsx", note);
9983 }
9984
9985 static bool
9986 elfcore_grok_loongarch_lasx (bfd *abfd, Elf_Internal_Note *note)
9987 {
9988 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lasx", note);
9989 }
9990
9991 #if defined (HAVE_PRPSINFO_T)
9992 typedef prpsinfo_t elfcore_psinfo_t;
9993 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
9994 typedef prpsinfo32_t elfcore_psinfo32_t;
9995 #endif
9996 #endif
9997
9998 #if defined (HAVE_PSINFO_T)
9999 typedef psinfo_t elfcore_psinfo_t;
10000 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
10001 typedef psinfo32_t elfcore_psinfo32_t;
10002 #endif
10003 #endif
10004
10005 /* return a malloc'ed copy of a string at START which is at
10006 most MAX bytes long, possibly without a terminating '\0'.
10007 the copy will always have a terminating '\0'. */
10008
10009 char *
10010 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
10011 {
10012 char *dups;
10013 char *end = (char *) memchr (start, '\0', max);
10014 size_t len;
10015
10016 if (end == NULL)
10017 len = max;
10018 else
10019 len = end - start;
10020
10021 dups = (char *) bfd_alloc (abfd, len + 1);
10022 if (dups == NULL)
10023 return NULL;
10024
10025 memcpy (dups, start, len);
10026 dups[len] = '\0';
10027
10028 return dups;
10029 }
10030
10031 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10032 static bool
10033 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
10034 {
10035 if (note->descsz == sizeof (elfcore_psinfo_t))
10036 {
10037 elfcore_psinfo_t psinfo;
10038
10039 memcpy (&psinfo, note->descdata, sizeof (psinfo));
10040
10041 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
10042 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
10043 #endif
10044 elf_tdata (abfd)->core->program
10045 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
10046 sizeof (psinfo.pr_fname));
10047
10048 elf_tdata (abfd)->core->command
10049 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
10050 sizeof (psinfo.pr_psargs));
10051 }
10052 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10053 else if (note->descsz == sizeof (elfcore_psinfo32_t))
10054 {
10055 /* 64-bit host, 32-bit corefile */
10056 elfcore_psinfo32_t psinfo;
10057
10058 memcpy (&psinfo, note->descdata, sizeof (psinfo));
10059
10060 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
10061 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
10062 #endif
10063 elf_tdata (abfd)->core->program
10064 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
10065 sizeof (psinfo.pr_fname));
10066
10067 elf_tdata (abfd)->core->command
10068 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
10069 sizeof (psinfo.pr_psargs));
10070 }
10071 #endif
10072
10073 else
10074 {
10075 /* Fail - we don't know how to handle any other
10076 note size (ie. data object type). */
10077 return true;
10078 }
10079
10080 /* Note that for some reason, a spurious space is tacked
10081 onto the end of the args in some (at least one anyway)
10082 implementations, so strip it off if it exists. */
10083
10084 {
10085 char *command = elf_tdata (abfd)->core->command;
10086 int n = strlen (command);
10087
10088 if (0 < n && command[n - 1] == ' ')
10089 command[n - 1] = '\0';
10090 }
10091
10092 return true;
10093 }
10094 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
10095
10096 #if defined (HAVE_PSTATUS_T)
10097 static bool
10098 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
10099 {
10100 if (note->descsz == sizeof (pstatus_t)
10101 #if defined (HAVE_PXSTATUS_T)
10102 || note->descsz == sizeof (pxstatus_t)
10103 #endif
10104 )
10105 {
10106 pstatus_t pstat;
10107
10108 memcpy (&pstat, note->descdata, sizeof (pstat));
10109
10110 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10111 }
10112 #if defined (HAVE_PSTATUS32_T)
10113 else if (note->descsz == sizeof (pstatus32_t))
10114 {
10115 /* 64-bit host, 32-bit corefile */
10116 pstatus32_t pstat;
10117
10118 memcpy (&pstat, note->descdata, sizeof (pstat));
10119
10120 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10121 }
10122 #endif
10123 /* Could grab some more details from the "representative"
10124 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
10125 NT_LWPSTATUS note, presumably. */
10126
10127 return true;
10128 }
10129 #endif /* defined (HAVE_PSTATUS_T) */
10130
10131 #if defined (HAVE_LWPSTATUS_T)
10132 static bool
10133 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
10134 {
10135 lwpstatus_t lwpstat;
10136 char buf[100];
10137 char *name;
10138 size_t len;
10139 asection *sect;
10140
10141 if (note->descsz != sizeof (lwpstat)
10142 #if defined (HAVE_LWPXSTATUS_T)
10143 && note->descsz != sizeof (lwpxstatus_t)
10144 #endif
10145 )
10146 return true;
10147
10148 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
10149
10150 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
10151 /* Do not overwrite the core signal if it has already been set by
10152 another thread. */
10153 if (elf_tdata (abfd)->core->signal == 0)
10154 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
10155
10156 /* Make a ".reg/999" section. */
10157
10158 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
10159 len = strlen (buf) + 1;
10160 name = bfd_alloc (abfd, len);
10161 if (name == NULL)
10162 return false;
10163 memcpy (name, buf, len);
10164
10165 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10166 if (sect == NULL)
10167 return false;
10168
10169 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10170 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
10171 sect->filepos = note->descpos
10172 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
10173 #endif
10174
10175 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10176 sect->size = sizeof (lwpstat.pr_reg);
10177 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
10178 #endif
10179
10180 sect->alignment_power = 2;
10181
10182 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
10183 return false;
10184
10185 /* Make a ".reg2/999" section */
10186
10187 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
10188 len = strlen (buf) + 1;
10189 name = bfd_alloc (abfd, len);
10190 if (name == NULL)
10191 return false;
10192 memcpy (name, buf, len);
10193
10194 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10195 if (sect == NULL)
10196 return false;
10197
10198 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10199 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10200 sect->filepos = note->descpos
10201 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10202 #endif
10203
10204 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10205 sect->size = sizeof (lwpstat.pr_fpreg);
10206 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10207 #endif
10208
10209 sect->alignment_power = 2;
10210
10211 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10212 }
10213 #endif /* defined (HAVE_LWPSTATUS_T) */
10214
10215 /* These constants, and the structure offsets used below, are defined by
10216 Cygwin's core_dump.h */
10217 #define NOTE_INFO_PROCESS 1
10218 #define NOTE_INFO_THREAD 2
10219 #define NOTE_INFO_MODULE 3
10220 #define NOTE_INFO_MODULE64 4
10221
10222 static bool
10223 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10224 {
10225 char buf[30];
10226 char *name;
10227 size_t len;
10228 unsigned int name_size;
10229 asection *sect;
10230 unsigned int type;
10231 int is_active_thread;
10232 bfd_vma base_addr;
10233
10234 if (note->descsz < 4)
10235 return true;
10236
10237 if (! startswith (note->namedata, "win32"))
10238 return true;
10239
10240 type = bfd_get_32 (abfd, note->descdata);
10241
10242 struct
10243 {
10244 const char *type_name;
10245 unsigned long min_size;
10246 } size_check[] =
10247 {
10248 { "NOTE_INFO_PROCESS", 12 },
10249 { "NOTE_INFO_THREAD", 12 },
10250 { "NOTE_INFO_MODULE", 12 },
10251 { "NOTE_INFO_MODULE64", 16 },
10252 };
10253
10254 if (type == 0 || type > (sizeof(size_check)/sizeof(size_check[0])))
10255 return true;
10256
10257 if (note->descsz < size_check[type - 1].min_size)
10258 {
10259 _bfd_error_handler (_("%pB: warning: win32pstatus %s of size %lu bytes is too small"),
10260 abfd, size_check[type - 1].type_name, note->descsz);
10261 return true;
10262 }
10263
10264 switch (type)
10265 {
10266 case NOTE_INFO_PROCESS:
10267 /* FIXME: need to add ->core->command. */
10268 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 4);
10269 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 8);
10270 break;
10271
10272 case NOTE_INFO_THREAD:
10273 /* Make a ".reg/<tid>" section containing the Win32 API thread CONTEXT
10274 structure. */
10275 /* thread_info.tid */
10276 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 4));
10277
10278 len = strlen (buf) + 1;
10279 name = (char *) bfd_alloc (abfd, len);
10280 if (name == NULL)
10281 return false;
10282
10283 memcpy (name, buf, len);
10284
10285 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10286 if (sect == NULL)
10287 return false;
10288
10289 /* sizeof (thread_info.thread_context) */
10290 sect->size = note->descsz - 12;
10291 /* offsetof (thread_info.thread_context) */
10292 sect->filepos = note->descpos + 12;
10293 sect->alignment_power = 2;
10294
10295 /* thread_info.is_active_thread */
10296 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10297
10298 if (is_active_thread)
10299 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10300 return false;
10301 break;
10302
10303 case NOTE_INFO_MODULE:
10304 case NOTE_INFO_MODULE64:
10305 /* Make a ".module/xxxxxxxx" section. */
10306 if (type == NOTE_INFO_MODULE)
10307 {
10308 /* module_info.base_address */
10309 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10310 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10311 /* module_info.module_name_size */
10312 name_size = bfd_get_32 (abfd, note->descdata + 8);
10313 }
10314 else /* NOTE_INFO_MODULE64 */
10315 {
10316 /* module_info.base_address */
10317 base_addr = bfd_get_64 (abfd, note->descdata + 4);
10318 sprintf (buf, ".module/%016lx", (unsigned long) base_addr);
10319 /* module_info.module_name_size */
10320 name_size = bfd_get_32 (abfd, note->descdata + 12);
10321 }
10322
10323 len = strlen (buf) + 1;
10324 name = (char *) bfd_alloc (abfd, len);
10325 if (name == NULL)
10326 return false;
10327
10328 memcpy (name, buf, len);
10329
10330 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10331
10332 if (sect == NULL)
10333 return false;
10334
10335 if (note->descsz < 12 + name_size)
10336 {
10337 _bfd_error_handler (_("%pB: win32pstatus NOTE_INFO_MODULE of size %lu is too small to contain a name of size %u"),
10338 abfd, note->descsz, name_size);
10339 return true;
10340 }
10341
10342 sect->size = note->descsz;
10343 sect->filepos = note->descpos;
10344 sect->alignment_power = 2;
10345 break;
10346
10347 default:
10348 return true;
10349 }
10350
10351 return true;
10352 }
10353
10354 static bool
10355 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10356 {
10357 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10358
10359 switch (note->type)
10360 {
10361 default:
10362 return true;
10363
10364 case NT_PRSTATUS:
10365 if (bed->elf_backend_grok_prstatus)
10366 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10367 return true;
10368 #if defined (HAVE_PRSTATUS_T)
10369 return elfcore_grok_prstatus (abfd, note);
10370 #else
10371 return true;
10372 #endif
10373
10374 #if defined (HAVE_PSTATUS_T)
10375 case NT_PSTATUS:
10376 return elfcore_grok_pstatus (abfd, note);
10377 #endif
10378
10379 #if defined (HAVE_LWPSTATUS_T)
10380 case NT_LWPSTATUS:
10381 return elfcore_grok_lwpstatus (abfd, note);
10382 #endif
10383
10384 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10385 return elfcore_grok_prfpreg (abfd, note);
10386
10387 case NT_WIN32PSTATUS:
10388 return elfcore_grok_win32pstatus (abfd, note);
10389
10390 case NT_PRXFPREG: /* Linux SSE extension */
10391 if (note->namesz == 6
10392 && strcmp (note->namedata, "LINUX") == 0)
10393 return elfcore_grok_prxfpreg (abfd, note);
10394 else
10395 return true;
10396
10397 case NT_X86_XSTATE: /* Linux XSAVE extension */
10398 if (note->namesz == 6
10399 && strcmp (note->namedata, "LINUX") == 0)
10400 return elfcore_grok_xstatereg (abfd, note);
10401 else
10402 return true;
10403
10404 case NT_PPC_VMX:
10405 if (note->namesz == 6
10406 && strcmp (note->namedata, "LINUX") == 0)
10407 return elfcore_grok_ppc_vmx (abfd, note);
10408 else
10409 return true;
10410
10411 case NT_PPC_VSX:
10412 if (note->namesz == 6
10413 && strcmp (note->namedata, "LINUX") == 0)
10414 return elfcore_grok_ppc_vsx (abfd, note);
10415 else
10416 return true;
10417
10418 case NT_PPC_TAR:
10419 if (note->namesz == 6
10420 && strcmp (note->namedata, "LINUX") == 0)
10421 return elfcore_grok_ppc_tar (abfd, note);
10422 else
10423 return true;
10424
10425 case NT_PPC_PPR:
10426 if (note->namesz == 6
10427 && strcmp (note->namedata, "LINUX") == 0)
10428 return elfcore_grok_ppc_ppr (abfd, note);
10429 else
10430 return true;
10431
10432 case NT_PPC_DSCR:
10433 if (note->namesz == 6
10434 && strcmp (note->namedata, "LINUX") == 0)
10435 return elfcore_grok_ppc_dscr (abfd, note);
10436 else
10437 return true;
10438
10439 case NT_PPC_EBB:
10440 if (note->namesz == 6
10441 && strcmp (note->namedata, "LINUX") == 0)
10442 return elfcore_grok_ppc_ebb (abfd, note);
10443 else
10444 return true;
10445
10446 case NT_PPC_PMU:
10447 if (note->namesz == 6
10448 && strcmp (note->namedata, "LINUX") == 0)
10449 return elfcore_grok_ppc_pmu (abfd, note);
10450 else
10451 return true;
10452
10453 case NT_PPC_TM_CGPR:
10454 if (note->namesz == 6
10455 && strcmp (note->namedata, "LINUX") == 0)
10456 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10457 else
10458 return true;
10459
10460 case NT_PPC_TM_CFPR:
10461 if (note->namesz == 6
10462 && strcmp (note->namedata, "LINUX") == 0)
10463 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10464 else
10465 return true;
10466
10467 case NT_PPC_TM_CVMX:
10468 if (note->namesz == 6
10469 && strcmp (note->namedata, "LINUX") == 0)
10470 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10471 else
10472 return true;
10473
10474 case NT_PPC_TM_CVSX:
10475 if (note->namesz == 6
10476 && strcmp (note->namedata, "LINUX") == 0)
10477 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10478 else
10479 return true;
10480
10481 case NT_PPC_TM_SPR:
10482 if (note->namesz == 6
10483 && strcmp (note->namedata, "LINUX") == 0)
10484 return elfcore_grok_ppc_tm_spr (abfd, note);
10485 else
10486 return true;
10487
10488 case NT_PPC_TM_CTAR:
10489 if (note->namesz == 6
10490 && strcmp (note->namedata, "LINUX") == 0)
10491 return elfcore_grok_ppc_tm_ctar (abfd, note);
10492 else
10493 return true;
10494
10495 case NT_PPC_TM_CPPR:
10496 if (note->namesz == 6
10497 && strcmp (note->namedata, "LINUX") == 0)
10498 return elfcore_grok_ppc_tm_cppr (abfd, note);
10499 else
10500 return true;
10501
10502 case NT_PPC_TM_CDSCR:
10503 if (note->namesz == 6
10504 && strcmp (note->namedata, "LINUX") == 0)
10505 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10506 else
10507 return true;
10508
10509 case NT_S390_HIGH_GPRS:
10510 if (note->namesz == 6
10511 && strcmp (note->namedata, "LINUX") == 0)
10512 return elfcore_grok_s390_high_gprs (abfd, note);
10513 else
10514 return true;
10515
10516 case NT_S390_TIMER:
10517 if (note->namesz == 6
10518 && strcmp (note->namedata, "LINUX") == 0)
10519 return elfcore_grok_s390_timer (abfd, note);
10520 else
10521 return true;
10522
10523 case NT_S390_TODCMP:
10524 if (note->namesz == 6
10525 && strcmp (note->namedata, "LINUX") == 0)
10526 return elfcore_grok_s390_todcmp (abfd, note);
10527 else
10528 return true;
10529
10530 case NT_S390_TODPREG:
10531 if (note->namesz == 6
10532 && strcmp (note->namedata, "LINUX") == 0)
10533 return elfcore_grok_s390_todpreg (abfd, note);
10534 else
10535 return true;
10536
10537 case NT_S390_CTRS:
10538 if (note->namesz == 6
10539 && strcmp (note->namedata, "LINUX") == 0)
10540 return elfcore_grok_s390_ctrs (abfd, note);
10541 else
10542 return true;
10543
10544 case NT_S390_PREFIX:
10545 if (note->namesz == 6
10546 && strcmp (note->namedata, "LINUX") == 0)
10547 return elfcore_grok_s390_prefix (abfd, note);
10548 else
10549 return true;
10550
10551 case NT_S390_LAST_BREAK:
10552 if (note->namesz == 6
10553 && strcmp (note->namedata, "LINUX") == 0)
10554 return elfcore_grok_s390_last_break (abfd, note);
10555 else
10556 return true;
10557
10558 case NT_S390_SYSTEM_CALL:
10559 if (note->namesz == 6
10560 && strcmp (note->namedata, "LINUX") == 0)
10561 return elfcore_grok_s390_system_call (abfd, note);
10562 else
10563 return true;
10564
10565 case NT_S390_TDB:
10566 if (note->namesz == 6
10567 && strcmp (note->namedata, "LINUX") == 0)
10568 return elfcore_grok_s390_tdb (abfd, note);
10569 else
10570 return true;
10571
10572 case NT_S390_VXRS_LOW:
10573 if (note->namesz == 6
10574 && strcmp (note->namedata, "LINUX") == 0)
10575 return elfcore_grok_s390_vxrs_low (abfd, note);
10576 else
10577 return true;
10578
10579 case NT_S390_VXRS_HIGH:
10580 if (note->namesz == 6
10581 && strcmp (note->namedata, "LINUX") == 0)
10582 return elfcore_grok_s390_vxrs_high (abfd, note);
10583 else
10584 return true;
10585
10586 case NT_S390_GS_CB:
10587 if (note->namesz == 6
10588 && strcmp (note->namedata, "LINUX") == 0)
10589 return elfcore_grok_s390_gs_cb (abfd, note);
10590 else
10591 return true;
10592
10593 case NT_S390_GS_BC:
10594 if (note->namesz == 6
10595 && strcmp (note->namedata, "LINUX") == 0)
10596 return elfcore_grok_s390_gs_bc (abfd, note);
10597 else
10598 return true;
10599
10600 case NT_ARC_V2:
10601 if (note->namesz == 6
10602 && strcmp (note->namedata, "LINUX") == 0)
10603 return elfcore_grok_arc_v2 (abfd, note);
10604 else
10605 return true;
10606
10607 case NT_ARM_VFP:
10608 if (note->namesz == 6
10609 && strcmp (note->namedata, "LINUX") == 0)
10610 return elfcore_grok_arm_vfp (abfd, note);
10611 else
10612 return true;
10613
10614 case NT_ARM_TLS:
10615 if (note->namesz == 6
10616 && strcmp (note->namedata, "LINUX") == 0)
10617 return elfcore_grok_aarch_tls (abfd, note);
10618 else
10619 return true;
10620
10621 case NT_ARM_HW_BREAK:
10622 if (note->namesz == 6
10623 && strcmp (note->namedata, "LINUX") == 0)
10624 return elfcore_grok_aarch_hw_break (abfd, note);
10625 else
10626 return true;
10627
10628 case NT_ARM_HW_WATCH:
10629 if (note->namesz == 6
10630 && strcmp (note->namedata, "LINUX") == 0)
10631 return elfcore_grok_aarch_hw_watch (abfd, note);
10632 else
10633 return true;
10634
10635 case NT_ARM_SVE:
10636 if (note->namesz == 6
10637 && strcmp (note->namedata, "LINUX") == 0)
10638 return elfcore_grok_aarch_sve (abfd, note);
10639 else
10640 return true;
10641
10642 case NT_ARM_PAC_MASK:
10643 if (note->namesz == 6
10644 && strcmp (note->namedata, "LINUX") == 0)
10645 return elfcore_grok_aarch_pauth (abfd, note);
10646 else
10647 return true;
10648
10649 case NT_ARM_TAGGED_ADDR_CTRL:
10650 if (note->namesz == 6
10651 && strcmp (note->namedata, "LINUX") == 0)
10652 return elfcore_grok_aarch_mte (abfd, note);
10653 else
10654 return true;
10655
10656 case NT_GDB_TDESC:
10657 if (note->namesz == 4
10658 && strcmp (note->namedata, "GDB") == 0)
10659 return elfcore_grok_gdb_tdesc (abfd, note);
10660 else
10661 return true;
10662
10663 case NT_RISCV_CSR:
10664 if (note->namesz == 4
10665 && strcmp (note->namedata, "GDB") == 0)
10666 return elfcore_grok_riscv_csr (abfd, note);
10667 else
10668 return true;
10669
10670 case NT_LARCH_CPUCFG:
10671 if (note->namesz == 6
10672 && strcmp (note->namedata, "LINUX") == 0)
10673 return elfcore_grok_loongarch_cpucfg (abfd, note);
10674 else
10675 return true;
10676
10677 case NT_LARCH_LBT:
10678 if (note->namesz == 6
10679 && strcmp (note->namedata, "LINUX") == 0)
10680 return elfcore_grok_loongarch_lbt (abfd, note);
10681 else
10682 return true;
10683
10684 case NT_LARCH_LSX:
10685 if (note->namesz == 6
10686 && strcmp (note->namedata, "LINUX") == 0)
10687 return elfcore_grok_loongarch_lsx (abfd, note);
10688 else
10689 return true;
10690
10691 case NT_LARCH_LASX:
10692 if (note->namesz == 6
10693 && strcmp (note->namedata, "LINUX") == 0)
10694 return elfcore_grok_loongarch_lasx (abfd, note);
10695 else
10696 return true;
10697
10698 case NT_PRPSINFO:
10699 case NT_PSINFO:
10700 if (bed->elf_backend_grok_psinfo)
10701 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10702 return true;
10703 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10704 return elfcore_grok_psinfo (abfd, note);
10705 #else
10706 return true;
10707 #endif
10708
10709 case NT_AUXV:
10710 return elfcore_make_auxv_note_section (abfd, note, 0);
10711
10712 case NT_FILE:
10713 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10714 note);
10715
10716 case NT_SIGINFO:
10717 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10718 note);
10719
10720 }
10721 }
10722
10723 static bool
10724 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10725 {
10726 struct bfd_build_id* build_id;
10727
10728 if (note->descsz == 0)
10729 return false;
10730
10731 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10732 if (build_id == NULL)
10733 return false;
10734
10735 build_id->size = note->descsz;
10736 memcpy (build_id->data, note->descdata, note->descsz);
10737 abfd->build_id = build_id;
10738
10739 return true;
10740 }
10741
10742 static bool
10743 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10744 {
10745 switch (note->type)
10746 {
10747 default:
10748 return true;
10749
10750 case NT_GNU_PROPERTY_TYPE_0:
10751 return _bfd_elf_parse_gnu_properties (abfd, note);
10752
10753 case NT_GNU_BUILD_ID:
10754 return elfobj_grok_gnu_build_id (abfd, note);
10755 }
10756 }
10757
10758 static bool
10759 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10760 {
10761 struct sdt_note *cur =
10762 (struct sdt_note *) bfd_alloc (abfd,
10763 sizeof (struct sdt_note) + note->descsz);
10764
10765 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10766 cur->size = (bfd_size_type) note->descsz;
10767 memcpy (cur->data, note->descdata, note->descsz);
10768
10769 elf_tdata (abfd)->sdt_note_head = cur;
10770
10771 return true;
10772 }
10773
10774 static bool
10775 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10776 {
10777 switch (note->type)
10778 {
10779 case NT_STAPSDT:
10780 return elfobj_grok_stapsdt_note_1 (abfd, note);
10781
10782 default:
10783 return true;
10784 }
10785 }
10786
10787 static bool
10788 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10789 {
10790 size_t offset;
10791
10792 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10793 {
10794 case ELFCLASS32:
10795 if (note->descsz < 108)
10796 return false;
10797 break;
10798
10799 case ELFCLASS64:
10800 if (note->descsz < 120)
10801 return false;
10802 break;
10803
10804 default:
10805 return false;
10806 }
10807
10808 /* Check for version 1 in pr_version. */
10809 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10810 return false;
10811
10812 offset = 4;
10813
10814 /* Skip over pr_psinfosz. */
10815 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10816 offset += 4;
10817 else
10818 {
10819 offset += 4; /* Padding before pr_psinfosz. */
10820 offset += 8;
10821 }
10822
10823 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10824 elf_tdata (abfd)->core->program
10825 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10826 offset += 17;
10827
10828 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10829 elf_tdata (abfd)->core->command
10830 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10831 offset += 81;
10832
10833 /* Padding before pr_pid. */
10834 offset += 2;
10835
10836 /* The pr_pid field was added in version "1a". */
10837 if (note->descsz < offset + 4)
10838 return true;
10839
10840 elf_tdata (abfd)->core->pid
10841 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10842
10843 return true;
10844 }
10845
10846 static bool
10847 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10848 {
10849 size_t offset;
10850 size_t size;
10851 size_t min_size;
10852
10853 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10854 Also compute minimum size of this note. */
10855 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10856 {
10857 case ELFCLASS32:
10858 offset = 4 + 4;
10859 min_size = offset + (4 * 2) + 4 + 4 + 4;
10860 break;
10861
10862 case ELFCLASS64:
10863 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10864 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10865 break;
10866
10867 default:
10868 return false;
10869 }
10870
10871 if (note->descsz < min_size)
10872 return false;
10873
10874 /* Check for version 1 in pr_version. */
10875 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10876 return false;
10877
10878 /* Extract size of pr_reg from pr_gregsetsz. */
10879 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
10880 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10881 {
10882 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10883 offset += 4 * 2;
10884 }
10885 else
10886 {
10887 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
10888 offset += 8 * 2;
10889 }
10890
10891 /* Skip over pr_osreldate. */
10892 offset += 4;
10893
10894 /* Read signal from pr_cursig. */
10895 if (elf_tdata (abfd)->core->signal == 0)
10896 elf_tdata (abfd)->core->signal
10897 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10898 offset += 4;
10899
10900 /* Read TID from pr_pid. */
10901 elf_tdata (abfd)->core->lwpid
10902 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10903 offset += 4;
10904
10905 /* Padding before pr_reg. */
10906 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
10907 offset += 4;
10908
10909 /* Make sure that there is enough data remaining in the note. */
10910 if ((note->descsz - offset) < size)
10911 return false;
10912
10913 /* Make a ".reg/999" section and a ".reg" section. */
10914 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
10915 size, note->descpos + offset);
10916 }
10917
10918 static bool
10919 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
10920 {
10921 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10922
10923 switch (note->type)
10924 {
10925 case NT_PRSTATUS:
10926 if (bed->elf_backend_grok_freebsd_prstatus)
10927 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
10928 return true;
10929 return elfcore_grok_freebsd_prstatus (abfd, note);
10930
10931 case NT_FPREGSET:
10932 return elfcore_grok_prfpreg (abfd, note);
10933
10934 case NT_PRPSINFO:
10935 return elfcore_grok_freebsd_psinfo (abfd, note);
10936
10937 case NT_FREEBSD_THRMISC:
10938 if (note->namesz == 8)
10939 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
10940 else
10941 return true;
10942
10943 case NT_FREEBSD_PROCSTAT_PROC:
10944 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
10945 note);
10946
10947 case NT_FREEBSD_PROCSTAT_FILES:
10948 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
10949 note);
10950
10951 case NT_FREEBSD_PROCSTAT_VMMAP:
10952 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
10953 note);
10954
10955 case NT_FREEBSD_PROCSTAT_AUXV:
10956 return elfcore_make_auxv_note_section (abfd, note, 4);
10957
10958 case NT_X86_XSTATE:
10959 if (note->namesz == 8)
10960 return elfcore_grok_xstatereg (abfd, note);
10961 else
10962 return true;
10963
10964 case NT_FREEBSD_PTLWPINFO:
10965 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
10966 note);
10967
10968 case NT_ARM_VFP:
10969 return elfcore_grok_arm_vfp (abfd, note);
10970
10971 default:
10972 return true;
10973 }
10974 }
10975
10976 static bool
10977 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
10978 {
10979 char *cp;
10980
10981 cp = strchr (note->namedata, '@');
10982 if (cp != NULL)
10983 {
10984 *lwpidp = atoi(cp + 1);
10985 return true;
10986 }
10987 return false;
10988 }
10989
10990 static bool
10991 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
10992 {
10993 if (note->descsz <= 0x7c + 31)
10994 return false;
10995
10996 /* Signal number at offset 0x08. */
10997 elf_tdata (abfd)->core->signal
10998 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
10999
11000 /* Process ID at offset 0x50. */
11001 elf_tdata (abfd)->core->pid
11002 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
11003
11004 /* Command name at 0x7c (max 32 bytes, including nul). */
11005 elf_tdata (abfd)->core->command
11006 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
11007
11008 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
11009 note);
11010 }
11011
11012 static bool
11013 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
11014 {
11015 int lwp;
11016
11017 if (elfcore_netbsd_get_lwpid (note, &lwp))
11018 elf_tdata (abfd)->core->lwpid = lwp;
11019
11020 switch (note->type)
11021 {
11022 case NT_NETBSDCORE_PROCINFO:
11023 /* NetBSD-specific core "procinfo". Note that we expect to
11024 find this note before any of the others, which is fine,
11025 since the kernel writes this note out first when it
11026 creates a core file. */
11027 return elfcore_grok_netbsd_procinfo (abfd, note);
11028 case NT_NETBSDCORE_AUXV:
11029 /* NetBSD-specific Elf Auxiliary Vector data. */
11030 return elfcore_make_auxv_note_section (abfd, note, 4);
11031 case NT_NETBSDCORE_LWPSTATUS:
11032 return elfcore_make_note_pseudosection (abfd,
11033 ".note.netbsdcore.lwpstatus",
11034 note);
11035 default:
11036 break;
11037 }
11038
11039 /* As of March 2020 there are no other machine-independent notes
11040 defined for NetBSD core files. If the note type is less
11041 than the start of the machine-dependent note types, we don't
11042 understand it. */
11043
11044 if (note->type < NT_NETBSDCORE_FIRSTMACH)
11045 return true;
11046
11047
11048 switch (bfd_get_arch (abfd))
11049 {
11050 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
11051 PT_GETFPREGS == mach+2. */
11052
11053 case bfd_arch_aarch64:
11054 case bfd_arch_alpha:
11055 case bfd_arch_sparc:
11056 switch (note->type)
11057 {
11058 case NT_NETBSDCORE_FIRSTMACH+0:
11059 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11060
11061 case NT_NETBSDCORE_FIRSTMACH+2:
11062 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11063
11064 default:
11065 return true;
11066 }
11067
11068 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
11069 There's also old PT___GETREGS40 == mach + 1 for old reg
11070 structure which lacks GBR. */
11071
11072 case bfd_arch_sh:
11073 switch (note->type)
11074 {
11075 case NT_NETBSDCORE_FIRSTMACH+3:
11076 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11077
11078 case NT_NETBSDCORE_FIRSTMACH+5:
11079 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11080
11081 default:
11082 return true;
11083 }
11084
11085 /* On all other arch's, PT_GETREGS == mach+1 and
11086 PT_GETFPREGS == mach+3. */
11087
11088 default:
11089 switch (note->type)
11090 {
11091 case NT_NETBSDCORE_FIRSTMACH+1:
11092 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11093
11094 case NT_NETBSDCORE_FIRSTMACH+3:
11095 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11096
11097 default:
11098 return true;
11099 }
11100 }
11101 /* NOTREACHED */
11102 }
11103
11104 static bool
11105 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
11106 {
11107 if (note->descsz <= 0x48 + 31)
11108 return false;
11109
11110 /* Signal number at offset 0x08. */
11111 elf_tdata (abfd)->core->signal
11112 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
11113
11114 /* Process ID at offset 0x20. */
11115 elf_tdata (abfd)->core->pid
11116 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
11117
11118 /* Command name at 0x48 (max 32 bytes, including nul). */
11119 elf_tdata (abfd)->core->command
11120 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
11121
11122 return true;
11123 }
11124
11125 /* Processes Solaris's process status note.
11126 sig_off ~ offsetof(prstatus_t, pr_cursig)
11127 pid_off ~ offsetof(prstatus_t, pr_pid)
11128 lwpid_off ~ offsetof(prstatus_t, pr_who)
11129 gregset_size ~ sizeof(gregset_t)
11130 gregset_offset ~ offsetof(prstatus_t, pr_reg) */
11131
11132 static bool
11133 elfcore_grok_solaris_prstatus (bfd *abfd, Elf_Internal_Note* note, int sig_off,
11134 int pid_off, int lwpid_off, size_t gregset_size,
11135 size_t gregset_offset)
11136 {
11137 asection *sect = NULL;
11138 elf_tdata (abfd)->core->signal
11139 = bfd_get_16 (abfd, note->descdata + sig_off);
11140 elf_tdata (abfd)->core->pid
11141 = bfd_get_32 (abfd, note->descdata + pid_off);
11142 elf_tdata (abfd)->core->lwpid
11143 = bfd_get_32 (abfd, note->descdata + lwpid_off);
11144
11145 sect = bfd_get_section_by_name (abfd, ".reg");
11146 if (sect != NULL)
11147 sect->size = gregset_size;
11148
11149 return _bfd_elfcore_make_pseudosection (abfd, ".reg", gregset_size,
11150 note->descpos + gregset_offset);
11151 }
11152
11153 /* Gets program and arguments from a core.
11154 prog_off ~ offsetof(prpsinfo | psinfo_t, pr_fname)
11155 comm_off ~ offsetof(prpsinfo | psinfo_t, pr_psargs) */
11156
11157 static bool
11158 elfcore_grok_solaris_info(bfd *abfd, Elf_Internal_Note* note,
11159 int prog_off, int comm_off)
11160 {
11161 elf_tdata (abfd)->core->program
11162 = _bfd_elfcore_strndup (abfd, note->descdata + prog_off, 16);
11163 elf_tdata (abfd)->core->command
11164 = _bfd_elfcore_strndup (abfd, note->descdata + comm_off, 80);
11165
11166 return true;
11167 }
11168
11169 /* Processes Solaris's LWP status note.
11170 gregset_size ~ sizeof(gregset_t)
11171 gregset_off ~ offsetof(lwpstatus_t, pr_reg)
11172 fpregset_size ~ sizeof(fpregset_t)
11173 fpregset_off ~ offsetof(lwpstatus_t, pr_fpreg) */
11174
11175 static bool
11176 elfcore_grok_solaris_lwpstatus (bfd *abfd, Elf_Internal_Note* note,
11177 size_t gregset_size, int gregset_off,
11178 size_t fpregset_size, int fpregset_off)
11179 {
11180 asection *sect = NULL;
11181 char reg2_section_name[16] = { 0 };
11182
11183 (void) snprintf (reg2_section_name, 16, "%s/%i", ".reg2",
11184 elf_tdata (abfd)->core->lwpid);
11185
11186 /* offsetof(lwpstatus_t, pr_lwpid) */
11187 elf_tdata (abfd)->core->lwpid
11188 = bfd_get_32 (abfd, note->descdata + 4);
11189 /* offsetof(lwpstatus_t, pr_cursig) */
11190 elf_tdata (abfd)->core->signal
11191 = bfd_get_16 (abfd, note->descdata + 12);
11192
11193 sect = bfd_get_section_by_name (abfd, ".reg");
11194 if (sect != NULL)
11195 sect->size = gregset_size;
11196 else if (!_bfd_elfcore_make_pseudosection (abfd, ".reg", gregset_size,
11197 note->descpos + gregset_off))
11198 return false;
11199
11200 sect = bfd_get_section_by_name (abfd, reg2_section_name);
11201 if (sect != NULL)
11202 {
11203 sect->size = fpregset_size;
11204 sect->filepos = note->descpos + fpregset_off;
11205 sect->alignment_power = 2;
11206 }
11207 else if (!_bfd_elfcore_make_pseudosection (abfd, ".reg2", fpregset_size,
11208 note->descpos + fpregset_off))
11209 return false;
11210
11211 return true;
11212 }
11213
11214 static bool
11215 elfcore_grok_solaris_note_impl (bfd *abfd, Elf_Internal_Note *note)
11216 {
11217 if (note == NULL)
11218 return false;
11219
11220 /* core files are identified as 32- or 64-bit, SPARC or x86,
11221 by the size of the descsz which matches the sizeof()
11222 the type appropriate for that note type (e.g., prstatus_t for
11223 SOLARIS_NT_PRSTATUS) for the corresponding architecture
11224 on Solaris. The core file bitness may differ from the bitness of
11225 gdb itself, so fixed values are used instead of sizeof().
11226 Appropriate fixed offsets are also used to obtain data from
11227 the note. */
11228
11229 switch ((int) note->type)
11230 {
11231 case SOLARIS_NT_PRSTATUS:
11232 switch (note->descsz)
11233 {
11234 case 508: /* sizeof(prstatus_t) SPARC 32-bit */
11235 return elfcore_grok_solaris_prstatus(abfd, note,
11236 136, 216, 308, 152, 356);
11237 case 904: /* sizeof(prstatus_t) SPARC 64-bit */
11238 return elfcore_grok_solaris_prstatus(abfd, note,
11239 264, 360, 520, 304, 600);
11240 case 432: /* sizeof(prstatus_t) Intel 32-bit */
11241 return elfcore_grok_solaris_prstatus(abfd, note,
11242 136, 216, 308, 76, 356);
11243 case 824: /* sizeof(prstatus_t) Intel 64-bit */
11244 return elfcore_grok_solaris_prstatus(abfd, note,
11245 264, 360, 520, 224, 600);
11246 default:
11247 return true;
11248 }
11249
11250 case SOLARIS_NT_PSINFO:
11251 case SOLARIS_NT_PRPSINFO:
11252 switch (note->descsz)
11253 {
11254 case 260: /* sizeof(prpsinfo_t) SPARC and Intel 32-bit */
11255 return elfcore_grok_solaris_info(abfd, note, 84, 100);
11256 case 328: /* sizeof(prpsinfo_t) SPARC and Intel 64-bit */
11257 return elfcore_grok_solaris_info(abfd, note, 120, 136);
11258 case 360: /* sizeof(psinfo_t) SPARC and Intel 32-bit */
11259 return elfcore_grok_solaris_info(abfd, note, 88, 104);
11260 case 440: /* sizeof(psinfo_t) SPARC and Intel 64-bit */
11261 return elfcore_grok_solaris_info(abfd, note, 136, 152);
11262 default:
11263 return true;
11264 }
11265
11266 case SOLARIS_NT_LWPSTATUS:
11267 switch (note->descsz)
11268 {
11269 case 896: /* sizeof(lwpstatus_t) SPARC 32-bit */
11270 return elfcore_grok_solaris_lwpstatus(abfd, note,
11271 152, 344, 400, 496);
11272 case 1392: /* sizeof(lwpstatus_t) SPARC 64-bit */
11273 return elfcore_grok_solaris_lwpstatus(abfd, note,
11274 304, 544, 544, 848);
11275 case 800: /* sizeof(lwpstatus_t) Intel 32-bit */
11276 return elfcore_grok_solaris_lwpstatus(abfd, note,
11277 76, 344, 380, 420);
11278 case 1296: /* sizeof(lwpstatus_t) Intel 64-bit */
11279 return elfcore_grok_solaris_lwpstatus(abfd, note,
11280 224, 544, 528, 768);
11281 default:
11282 return true;
11283 }
11284
11285 case SOLARIS_NT_LWPSINFO:
11286 /* sizeof(lwpsinfo_t) on 32- and 64-bit, respectively */
11287 if (note->descsz == 128 || note->descsz == 152)
11288 elf_tdata (abfd)->core->lwpid =
11289 bfd_get_32 (abfd, note->descdata + 4);
11290 break;
11291
11292 default:
11293 break;
11294 }
11295
11296 return true;
11297 }
11298
11299 /* For name starting with "CORE" this may be either a Solaris
11300 core file or a gdb-generated core file. Do Solaris-specific
11301 processing on selected note types first with
11302 elfcore_grok_solaris_note(), then process the note
11303 in elfcore_grok_note(). */
11304
11305 static bool
11306 elfcore_grok_solaris_note (bfd *abfd, Elf_Internal_Note *note)
11307 {
11308 if (!elfcore_grok_solaris_note_impl (abfd, note))
11309 return false;
11310
11311 return elfcore_grok_note (abfd, note);
11312 }
11313
11314 static bool
11315 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
11316 {
11317 if (note->type == NT_OPENBSD_PROCINFO)
11318 return elfcore_grok_openbsd_procinfo (abfd, note);
11319
11320 if (note->type == NT_OPENBSD_REGS)
11321 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11322
11323 if (note->type == NT_OPENBSD_FPREGS)
11324 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11325
11326 if (note->type == NT_OPENBSD_XFPREGS)
11327 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
11328
11329 if (note->type == NT_OPENBSD_AUXV)
11330 return elfcore_make_auxv_note_section (abfd, note, 0);
11331
11332 if (note->type == NT_OPENBSD_WCOOKIE)
11333 {
11334 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
11335 SEC_HAS_CONTENTS);
11336
11337 if (sect == NULL)
11338 return false;
11339 sect->size = note->descsz;
11340 sect->filepos = note->descpos;
11341 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
11342
11343 return true;
11344 }
11345
11346 return true;
11347 }
11348
11349 static bool
11350 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
11351 {
11352 void *ddata = note->descdata;
11353 char buf[100];
11354 char *name;
11355 asection *sect;
11356 short sig;
11357 unsigned flags;
11358
11359 if (note->descsz < 16)
11360 return false;
11361
11362 /* nto_procfs_status 'pid' field is at offset 0. */
11363 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
11364
11365 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
11366 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
11367
11368 /* nto_procfs_status 'flags' field is at offset 8. */
11369 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
11370
11371 /* nto_procfs_status 'what' field is at offset 14. */
11372 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
11373 {
11374 elf_tdata (abfd)->core->signal = sig;
11375 elf_tdata (abfd)->core->lwpid = *tid;
11376 }
11377
11378 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
11379 do not come from signals so we make sure we set the current
11380 thread just in case. */
11381 if (flags & 0x00000080)
11382 elf_tdata (abfd)->core->lwpid = *tid;
11383
11384 /* Make a ".qnx_core_status/%d" section. */
11385 sprintf (buf, ".qnx_core_status/%ld", *tid);
11386
11387 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11388 if (name == NULL)
11389 return false;
11390 strcpy (name, buf);
11391
11392 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11393 if (sect == NULL)
11394 return false;
11395
11396 sect->size = note->descsz;
11397 sect->filepos = note->descpos;
11398 sect->alignment_power = 2;
11399
11400 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
11401 }
11402
11403 static bool
11404 elfcore_grok_nto_regs (bfd *abfd,
11405 Elf_Internal_Note *note,
11406 long tid,
11407 char *base)
11408 {
11409 char buf[100];
11410 char *name;
11411 asection *sect;
11412
11413 /* Make a "(base)/%d" section. */
11414 sprintf (buf, "%s/%ld", base, tid);
11415
11416 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11417 if (name == NULL)
11418 return false;
11419 strcpy (name, buf);
11420
11421 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11422 if (sect == NULL)
11423 return false;
11424
11425 sect->size = note->descsz;
11426 sect->filepos = note->descpos;
11427 sect->alignment_power = 2;
11428
11429 /* This is the current thread. */
11430 if (elf_tdata (abfd)->core->lwpid == tid)
11431 return elfcore_maybe_make_sect (abfd, base, sect);
11432
11433 return true;
11434 }
11435
11436 #define BFD_QNT_CORE_INFO 7
11437 #define BFD_QNT_CORE_STATUS 8
11438 #define BFD_QNT_CORE_GREG 9
11439 #define BFD_QNT_CORE_FPREG 10
11440
11441 static bool
11442 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
11443 {
11444 /* Every GREG section has a STATUS section before it. Store the
11445 tid from the previous call to pass down to the next gregs
11446 function. */
11447 static long tid = 1;
11448
11449 switch (note->type)
11450 {
11451 case BFD_QNT_CORE_INFO:
11452 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
11453 case BFD_QNT_CORE_STATUS:
11454 return elfcore_grok_nto_status (abfd, note, &tid);
11455 case BFD_QNT_CORE_GREG:
11456 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
11457 case BFD_QNT_CORE_FPREG:
11458 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
11459 default:
11460 return true;
11461 }
11462 }
11463
11464 static bool
11465 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
11466 {
11467 char *name;
11468 asection *sect;
11469 size_t len;
11470
11471 /* Use note name as section name. */
11472 len = note->namesz;
11473 name = (char *) bfd_alloc (abfd, len);
11474 if (name == NULL)
11475 return false;
11476 memcpy (name, note->namedata, len);
11477 name[len - 1] = '\0';
11478
11479 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11480 if (sect == NULL)
11481 return false;
11482
11483 sect->size = note->descsz;
11484 sect->filepos = note->descpos;
11485 sect->alignment_power = 1;
11486
11487 return true;
11488 }
11489
11490 /* Function: elfcore_write_note
11491
11492 Inputs:
11493 buffer to hold note, and current size of buffer
11494 name of note
11495 type of note
11496 data for note
11497 size of data for note
11498
11499 Writes note to end of buffer. ELF64 notes are written exactly as
11500 for ELF32, despite the current (as of 2006) ELF gabi specifying
11501 that they ought to have 8-byte namesz and descsz field, and have
11502 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11503
11504 Return:
11505 Pointer to realloc'd buffer, *BUFSIZ updated. */
11506
11507 char *
11508 elfcore_write_note (bfd *abfd,
11509 char *buf,
11510 int *bufsiz,
11511 const char *name,
11512 int type,
11513 const void *input,
11514 int size)
11515 {
11516 Elf_External_Note *xnp;
11517 size_t namesz;
11518 size_t newspace;
11519 char *dest;
11520
11521 namesz = 0;
11522 if (name != NULL)
11523 namesz = strlen (name) + 1;
11524
11525 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11526
11527 buf = (char *) realloc (buf, *bufsiz + newspace);
11528 if (buf == NULL)
11529 return buf;
11530 dest = buf + *bufsiz;
11531 *bufsiz += newspace;
11532 xnp = (Elf_External_Note *) dest;
11533 H_PUT_32 (abfd, namesz, xnp->namesz);
11534 H_PUT_32 (abfd, size, xnp->descsz);
11535 H_PUT_32 (abfd, type, xnp->type);
11536 dest = xnp->name;
11537 if (name != NULL)
11538 {
11539 memcpy (dest, name, namesz);
11540 dest += namesz;
11541 while (namesz & 3)
11542 {
11543 *dest++ = '\0';
11544 ++namesz;
11545 }
11546 }
11547 memcpy (dest, input, size);
11548 dest += size;
11549 while (size & 3)
11550 {
11551 *dest++ = '\0';
11552 ++size;
11553 }
11554 return buf;
11555 }
11556
11557 /* gcc-8 warns (*) on all the strncpy calls in this function about
11558 possible string truncation. The "truncation" is not a bug. We
11559 have an external representation of structs with fields that are not
11560 necessarily NULL terminated and corresponding internal
11561 representation fields that are one larger so that they can always
11562 be NULL terminated.
11563 gcc versions between 4.2 and 4.6 do not allow pragma control of
11564 diagnostics inside functions, giving a hard error if you try to use
11565 the finer control available with later versions.
11566 gcc prior to 4.2 warns about diagnostic push and pop.
11567 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11568 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11569 (*) Depending on your system header files! */
11570 #if GCC_VERSION >= 8000
11571 # pragma GCC diagnostic push
11572 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11573 #endif
11574 char *
11575 elfcore_write_prpsinfo (bfd *abfd,
11576 char *buf,
11577 int *bufsiz,
11578 const char *fname,
11579 const char *psargs)
11580 {
11581 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11582
11583 if (bed->elf_backend_write_core_note != NULL)
11584 {
11585 char *ret;
11586 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11587 NT_PRPSINFO, fname, psargs);
11588 if (ret != NULL)
11589 return ret;
11590 }
11591
11592 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11593 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11594 if (bed->s->elfclass == ELFCLASS32)
11595 {
11596 # if defined (HAVE_PSINFO32_T)
11597 psinfo32_t data;
11598 int note_type = NT_PSINFO;
11599 # else
11600 prpsinfo32_t data;
11601 int note_type = NT_PRPSINFO;
11602 # endif
11603
11604 memset (&data, 0, sizeof (data));
11605 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11606 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11607 return elfcore_write_note (abfd, buf, bufsiz,
11608 "CORE", note_type, &data, sizeof (data));
11609 }
11610 else
11611 # endif
11612 {
11613 # if defined (HAVE_PSINFO_T)
11614 psinfo_t data;
11615 int note_type = NT_PSINFO;
11616 # else
11617 prpsinfo_t data;
11618 int note_type = NT_PRPSINFO;
11619 # endif
11620
11621 memset (&data, 0, sizeof (data));
11622 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11623 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11624 return elfcore_write_note (abfd, buf, bufsiz,
11625 "CORE", note_type, &data, sizeof (data));
11626 }
11627 #endif /* PSINFO_T or PRPSINFO_T */
11628
11629 free (buf);
11630 return NULL;
11631 }
11632 #if GCC_VERSION >= 8000
11633 # pragma GCC diagnostic pop
11634 #endif
11635
11636 char *
11637 elfcore_write_linux_prpsinfo32
11638 (bfd *abfd, char *buf, int *bufsiz,
11639 const struct elf_internal_linux_prpsinfo *prpsinfo)
11640 {
11641 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11642 {
11643 struct elf_external_linux_prpsinfo32_ugid16 data;
11644
11645 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11646 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11647 &data, sizeof (data));
11648 }
11649 else
11650 {
11651 struct elf_external_linux_prpsinfo32_ugid32 data;
11652
11653 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11654 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11655 &data, sizeof (data));
11656 }
11657 }
11658
11659 char *
11660 elfcore_write_linux_prpsinfo64
11661 (bfd *abfd, char *buf, int *bufsiz,
11662 const struct elf_internal_linux_prpsinfo *prpsinfo)
11663 {
11664 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11665 {
11666 struct elf_external_linux_prpsinfo64_ugid16 data;
11667
11668 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11669 return elfcore_write_note (abfd, buf, bufsiz,
11670 "CORE", NT_PRPSINFO, &data, sizeof (data));
11671 }
11672 else
11673 {
11674 struct elf_external_linux_prpsinfo64_ugid32 data;
11675
11676 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11677 return elfcore_write_note (abfd, buf, bufsiz,
11678 "CORE", NT_PRPSINFO, &data, sizeof (data));
11679 }
11680 }
11681
11682 char *
11683 elfcore_write_prstatus (bfd *abfd,
11684 char *buf,
11685 int *bufsiz,
11686 long pid,
11687 int cursig,
11688 const void *gregs)
11689 {
11690 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11691
11692 if (bed->elf_backend_write_core_note != NULL)
11693 {
11694 char *ret;
11695 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11696 NT_PRSTATUS,
11697 pid, cursig, gregs);
11698 if (ret != NULL)
11699 return ret;
11700 }
11701
11702 #if defined (HAVE_PRSTATUS_T)
11703 #if defined (HAVE_PRSTATUS32_T)
11704 if (bed->s->elfclass == ELFCLASS32)
11705 {
11706 prstatus32_t prstat;
11707
11708 memset (&prstat, 0, sizeof (prstat));
11709 prstat.pr_pid = pid;
11710 prstat.pr_cursig = cursig;
11711 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11712 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11713 NT_PRSTATUS, &prstat, sizeof (prstat));
11714 }
11715 else
11716 #endif
11717 {
11718 prstatus_t prstat;
11719
11720 memset (&prstat, 0, sizeof (prstat));
11721 prstat.pr_pid = pid;
11722 prstat.pr_cursig = cursig;
11723 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11724 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11725 NT_PRSTATUS, &prstat, sizeof (prstat));
11726 }
11727 #endif /* HAVE_PRSTATUS_T */
11728
11729 free (buf);
11730 return NULL;
11731 }
11732
11733 #if defined (HAVE_LWPSTATUS_T)
11734 char *
11735 elfcore_write_lwpstatus (bfd *abfd,
11736 char *buf,
11737 int *bufsiz,
11738 long pid,
11739 int cursig,
11740 const void *gregs)
11741 {
11742 lwpstatus_t lwpstat;
11743 const char *note_name = "CORE";
11744
11745 memset (&lwpstat, 0, sizeof (lwpstat));
11746 lwpstat.pr_lwpid = pid >> 16;
11747 lwpstat.pr_cursig = cursig;
11748 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11749 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11750 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11751 #if !defined(gregs)
11752 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11753 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11754 #else
11755 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11756 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11757 #endif
11758 #endif
11759 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11760 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11761 }
11762 #endif /* HAVE_LWPSTATUS_T */
11763
11764 #if defined (HAVE_PSTATUS_T)
11765 char *
11766 elfcore_write_pstatus (bfd *abfd,
11767 char *buf,
11768 int *bufsiz,
11769 long pid,
11770 int cursig ATTRIBUTE_UNUSED,
11771 const void *gregs ATTRIBUTE_UNUSED)
11772 {
11773 const char *note_name = "CORE";
11774 #if defined (HAVE_PSTATUS32_T)
11775 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11776
11777 if (bed->s->elfclass == ELFCLASS32)
11778 {
11779 pstatus32_t pstat;
11780
11781 memset (&pstat, 0, sizeof (pstat));
11782 pstat.pr_pid = pid & 0xffff;
11783 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11784 NT_PSTATUS, &pstat, sizeof (pstat));
11785 return buf;
11786 }
11787 else
11788 #endif
11789 {
11790 pstatus_t pstat;
11791
11792 memset (&pstat, 0, sizeof (pstat));
11793 pstat.pr_pid = pid & 0xffff;
11794 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11795 NT_PSTATUS, &pstat, sizeof (pstat));
11796 return buf;
11797 }
11798 }
11799 #endif /* HAVE_PSTATUS_T */
11800
11801 char *
11802 elfcore_write_prfpreg (bfd *abfd,
11803 char *buf,
11804 int *bufsiz,
11805 const void *fpregs,
11806 int size)
11807 {
11808 const char *note_name = "CORE";
11809 return elfcore_write_note (abfd, buf, bufsiz,
11810 note_name, NT_FPREGSET, fpregs, size);
11811 }
11812
11813 char *
11814 elfcore_write_prxfpreg (bfd *abfd,
11815 char *buf,
11816 int *bufsiz,
11817 const void *xfpregs,
11818 int size)
11819 {
11820 char *note_name = "LINUX";
11821 return elfcore_write_note (abfd, buf, bufsiz,
11822 note_name, NT_PRXFPREG, xfpregs, size);
11823 }
11824
11825 char *
11826 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11827 const void *xfpregs, int size)
11828 {
11829 char *note_name;
11830 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11831 note_name = "FreeBSD";
11832 else
11833 note_name = "LINUX";
11834 return elfcore_write_note (abfd, buf, bufsiz,
11835 note_name, NT_X86_XSTATE, xfpregs, size);
11836 }
11837
11838 char *
11839 elfcore_write_ppc_vmx (bfd *abfd,
11840 char *buf,
11841 int *bufsiz,
11842 const void *ppc_vmx,
11843 int size)
11844 {
11845 char *note_name = "LINUX";
11846 return elfcore_write_note (abfd, buf, bufsiz,
11847 note_name, NT_PPC_VMX, ppc_vmx, size);
11848 }
11849
11850 char *
11851 elfcore_write_ppc_vsx (bfd *abfd,
11852 char *buf,
11853 int *bufsiz,
11854 const void *ppc_vsx,
11855 int size)
11856 {
11857 char *note_name = "LINUX";
11858 return elfcore_write_note (abfd, buf, bufsiz,
11859 note_name, NT_PPC_VSX, ppc_vsx, size);
11860 }
11861
11862 char *
11863 elfcore_write_ppc_tar (bfd *abfd,
11864 char *buf,
11865 int *bufsiz,
11866 const void *ppc_tar,
11867 int size)
11868 {
11869 char *note_name = "LINUX";
11870 return elfcore_write_note (abfd, buf, bufsiz,
11871 note_name, NT_PPC_TAR, ppc_tar, size);
11872 }
11873
11874 char *
11875 elfcore_write_ppc_ppr (bfd *abfd,
11876 char *buf,
11877 int *bufsiz,
11878 const void *ppc_ppr,
11879 int size)
11880 {
11881 char *note_name = "LINUX";
11882 return elfcore_write_note (abfd, buf, bufsiz,
11883 note_name, NT_PPC_PPR, ppc_ppr, size);
11884 }
11885
11886 char *
11887 elfcore_write_ppc_dscr (bfd *abfd,
11888 char *buf,
11889 int *bufsiz,
11890 const void *ppc_dscr,
11891 int size)
11892 {
11893 char *note_name = "LINUX";
11894 return elfcore_write_note (abfd, buf, bufsiz,
11895 note_name, NT_PPC_DSCR, ppc_dscr, size);
11896 }
11897
11898 char *
11899 elfcore_write_ppc_ebb (bfd *abfd,
11900 char *buf,
11901 int *bufsiz,
11902 const void *ppc_ebb,
11903 int size)
11904 {
11905 char *note_name = "LINUX";
11906 return elfcore_write_note (abfd, buf, bufsiz,
11907 note_name, NT_PPC_EBB, ppc_ebb, size);
11908 }
11909
11910 char *
11911 elfcore_write_ppc_pmu (bfd *abfd,
11912 char *buf,
11913 int *bufsiz,
11914 const void *ppc_pmu,
11915 int size)
11916 {
11917 char *note_name = "LINUX";
11918 return elfcore_write_note (abfd, buf, bufsiz,
11919 note_name, NT_PPC_PMU, ppc_pmu, size);
11920 }
11921
11922 char *
11923 elfcore_write_ppc_tm_cgpr (bfd *abfd,
11924 char *buf,
11925 int *bufsiz,
11926 const void *ppc_tm_cgpr,
11927 int size)
11928 {
11929 char *note_name = "LINUX";
11930 return elfcore_write_note (abfd, buf, bufsiz,
11931 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
11932 }
11933
11934 char *
11935 elfcore_write_ppc_tm_cfpr (bfd *abfd,
11936 char *buf,
11937 int *bufsiz,
11938 const void *ppc_tm_cfpr,
11939 int size)
11940 {
11941 char *note_name = "LINUX";
11942 return elfcore_write_note (abfd, buf, bufsiz,
11943 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
11944 }
11945
11946 char *
11947 elfcore_write_ppc_tm_cvmx (bfd *abfd,
11948 char *buf,
11949 int *bufsiz,
11950 const void *ppc_tm_cvmx,
11951 int size)
11952 {
11953 char *note_name = "LINUX";
11954 return elfcore_write_note (abfd, buf, bufsiz,
11955 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
11956 }
11957
11958 char *
11959 elfcore_write_ppc_tm_cvsx (bfd *abfd,
11960 char *buf,
11961 int *bufsiz,
11962 const void *ppc_tm_cvsx,
11963 int size)
11964 {
11965 char *note_name = "LINUX";
11966 return elfcore_write_note (abfd, buf, bufsiz,
11967 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
11968 }
11969
11970 char *
11971 elfcore_write_ppc_tm_spr (bfd *abfd,
11972 char *buf,
11973 int *bufsiz,
11974 const void *ppc_tm_spr,
11975 int size)
11976 {
11977 char *note_name = "LINUX";
11978 return elfcore_write_note (abfd, buf, bufsiz,
11979 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
11980 }
11981
11982 char *
11983 elfcore_write_ppc_tm_ctar (bfd *abfd,
11984 char *buf,
11985 int *bufsiz,
11986 const void *ppc_tm_ctar,
11987 int size)
11988 {
11989 char *note_name = "LINUX";
11990 return elfcore_write_note (abfd, buf, bufsiz,
11991 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
11992 }
11993
11994 char *
11995 elfcore_write_ppc_tm_cppr (bfd *abfd,
11996 char *buf,
11997 int *bufsiz,
11998 const void *ppc_tm_cppr,
11999 int size)
12000 {
12001 char *note_name = "LINUX";
12002 return elfcore_write_note (abfd, buf, bufsiz,
12003 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
12004 }
12005
12006 char *
12007 elfcore_write_ppc_tm_cdscr (bfd *abfd,
12008 char *buf,
12009 int *bufsiz,
12010 const void *ppc_tm_cdscr,
12011 int size)
12012 {
12013 char *note_name = "LINUX";
12014 return elfcore_write_note (abfd, buf, bufsiz,
12015 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
12016 }
12017
12018 static char *
12019 elfcore_write_s390_high_gprs (bfd *abfd,
12020 char *buf,
12021 int *bufsiz,
12022 const void *s390_high_gprs,
12023 int size)
12024 {
12025 char *note_name = "LINUX";
12026 return elfcore_write_note (abfd, buf, bufsiz,
12027 note_name, NT_S390_HIGH_GPRS,
12028 s390_high_gprs, size);
12029 }
12030
12031 char *
12032 elfcore_write_s390_timer (bfd *abfd,
12033 char *buf,
12034 int *bufsiz,
12035 const void *s390_timer,
12036 int size)
12037 {
12038 char *note_name = "LINUX";
12039 return elfcore_write_note (abfd, buf, bufsiz,
12040 note_name, NT_S390_TIMER, s390_timer, size);
12041 }
12042
12043 char *
12044 elfcore_write_s390_todcmp (bfd *abfd,
12045 char *buf,
12046 int *bufsiz,
12047 const void *s390_todcmp,
12048 int size)
12049 {
12050 char *note_name = "LINUX";
12051 return elfcore_write_note (abfd, buf, bufsiz,
12052 note_name, NT_S390_TODCMP, s390_todcmp, size);
12053 }
12054
12055 char *
12056 elfcore_write_s390_todpreg (bfd *abfd,
12057 char *buf,
12058 int *bufsiz,
12059 const void *s390_todpreg,
12060 int size)
12061 {
12062 char *note_name = "LINUX";
12063 return elfcore_write_note (abfd, buf, bufsiz,
12064 note_name, NT_S390_TODPREG, s390_todpreg, size);
12065 }
12066
12067 char *
12068 elfcore_write_s390_ctrs (bfd *abfd,
12069 char *buf,
12070 int *bufsiz,
12071 const void *s390_ctrs,
12072 int size)
12073 {
12074 char *note_name = "LINUX";
12075 return elfcore_write_note (abfd, buf, bufsiz,
12076 note_name, NT_S390_CTRS, s390_ctrs, size);
12077 }
12078
12079 char *
12080 elfcore_write_s390_prefix (bfd *abfd,
12081 char *buf,
12082 int *bufsiz,
12083 const void *s390_prefix,
12084 int size)
12085 {
12086 char *note_name = "LINUX";
12087 return elfcore_write_note (abfd, buf, bufsiz,
12088 note_name, NT_S390_PREFIX, s390_prefix, size);
12089 }
12090
12091 char *
12092 elfcore_write_s390_last_break (bfd *abfd,
12093 char *buf,
12094 int *bufsiz,
12095 const void *s390_last_break,
12096 int size)
12097 {
12098 char *note_name = "LINUX";
12099 return elfcore_write_note (abfd, buf, bufsiz,
12100 note_name, NT_S390_LAST_BREAK,
12101 s390_last_break, size);
12102 }
12103
12104 char *
12105 elfcore_write_s390_system_call (bfd *abfd,
12106 char *buf,
12107 int *bufsiz,
12108 const void *s390_system_call,
12109 int size)
12110 {
12111 char *note_name = "LINUX";
12112 return elfcore_write_note (abfd, buf, bufsiz,
12113 note_name, NT_S390_SYSTEM_CALL,
12114 s390_system_call, size);
12115 }
12116
12117 char *
12118 elfcore_write_s390_tdb (bfd *abfd,
12119 char *buf,
12120 int *bufsiz,
12121 const void *s390_tdb,
12122 int size)
12123 {
12124 char *note_name = "LINUX";
12125 return elfcore_write_note (abfd, buf, bufsiz,
12126 note_name, NT_S390_TDB, s390_tdb, size);
12127 }
12128
12129 char *
12130 elfcore_write_s390_vxrs_low (bfd *abfd,
12131 char *buf,
12132 int *bufsiz,
12133 const void *s390_vxrs_low,
12134 int size)
12135 {
12136 char *note_name = "LINUX";
12137 return elfcore_write_note (abfd, buf, bufsiz,
12138 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
12139 }
12140
12141 char *
12142 elfcore_write_s390_vxrs_high (bfd *abfd,
12143 char *buf,
12144 int *bufsiz,
12145 const void *s390_vxrs_high,
12146 int size)
12147 {
12148 char *note_name = "LINUX";
12149 return elfcore_write_note (abfd, buf, bufsiz,
12150 note_name, NT_S390_VXRS_HIGH,
12151 s390_vxrs_high, size);
12152 }
12153
12154 char *
12155 elfcore_write_s390_gs_cb (bfd *abfd,
12156 char *buf,
12157 int *bufsiz,
12158 const void *s390_gs_cb,
12159 int size)
12160 {
12161 char *note_name = "LINUX";
12162 return elfcore_write_note (abfd, buf, bufsiz,
12163 note_name, NT_S390_GS_CB,
12164 s390_gs_cb, size);
12165 }
12166
12167 char *
12168 elfcore_write_s390_gs_bc (bfd *abfd,
12169 char *buf,
12170 int *bufsiz,
12171 const void *s390_gs_bc,
12172 int size)
12173 {
12174 char *note_name = "LINUX";
12175 return elfcore_write_note (abfd, buf, bufsiz,
12176 note_name, NT_S390_GS_BC,
12177 s390_gs_bc, size);
12178 }
12179
12180 char *
12181 elfcore_write_arm_vfp (bfd *abfd,
12182 char *buf,
12183 int *bufsiz,
12184 const void *arm_vfp,
12185 int size)
12186 {
12187 char *note_name = "LINUX";
12188 return elfcore_write_note (abfd, buf, bufsiz,
12189 note_name, NT_ARM_VFP, arm_vfp, size);
12190 }
12191
12192 char *
12193 elfcore_write_aarch_tls (bfd *abfd,
12194 char *buf,
12195 int *bufsiz,
12196 const void *aarch_tls,
12197 int size)
12198 {
12199 char *note_name = "LINUX";
12200 return elfcore_write_note (abfd, buf, bufsiz,
12201 note_name, NT_ARM_TLS, aarch_tls, size);
12202 }
12203
12204 char *
12205 elfcore_write_aarch_hw_break (bfd *abfd,
12206 char *buf,
12207 int *bufsiz,
12208 const void *aarch_hw_break,
12209 int size)
12210 {
12211 char *note_name = "LINUX";
12212 return elfcore_write_note (abfd, buf, bufsiz,
12213 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
12214 }
12215
12216 char *
12217 elfcore_write_aarch_hw_watch (bfd *abfd,
12218 char *buf,
12219 int *bufsiz,
12220 const void *aarch_hw_watch,
12221 int size)
12222 {
12223 char *note_name = "LINUX";
12224 return elfcore_write_note (abfd, buf, bufsiz,
12225 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
12226 }
12227
12228 char *
12229 elfcore_write_aarch_sve (bfd *abfd,
12230 char *buf,
12231 int *bufsiz,
12232 const void *aarch_sve,
12233 int size)
12234 {
12235 char *note_name = "LINUX";
12236 return elfcore_write_note (abfd, buf, bufsiz,
12237 note_name, NT_ARM_SVE, aarch_sve, size);
12238 }
12239
12240 char *
12241 elfcore_write_aarch_pauth (bfd *abfd,
12242 char *buf,
12243 int *bufsiz,
12244 const void *aarch_pauth,
12245 int size)
12246 {
12247 char *note_name = "LINUX";
12248 return elfcore_write_note (abfd, buf, bufsiz,
12249 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
12250 }
12251
12252 char *
12253 elfcore_write_aarch_mte (bfd *abfd,
12254 char *buf,
12255 int *bufsiz,
12256 const void *aarch_mte,
12257 int size)
12258 {
12259 char *note_name = "LINUX";
12260 return elfcore_write_note (abfd, buf, bufsiz,
12261 note_name, NT_ARM_TAGGED_ADDR_CTRL,
12262 aarch_mte,
12263 size);
12264 }
12265
12266 char *
12267 elfcore_write_arc_v2 (bfd *abfd,
12268 char *buf,
12269 int *bufsiz,
12270 const void *arc_v2,
12271 int size)
12272 {
12273 char *note_name = "LINUX";
12274 return elfcore_write_note (abfd, buf, bufsiz,
12275 note_name, NT_ARC_V2, arc_v2, size);
12276 }
12277
12278 char *
12279 elfcore_write_loongarch_cpucfg (bfd *abfd,
12280 char *buf,
12281 int *bufsiz,
12282 const void *loongarch_cpucfg,
12283 int size)
12284 {
12285 char *note_name = "LINUX";
12286 return elfcore_write_note (abfd, buf, bufsiz,
12287 note_name, NT_LARCH_CPUCFG,
12288 loongarch_cpucfg, size);
12289 }
12290
12291 char *
12292 elfcore_write_loongarch_lbt (bfd *abfd,
12293 char *buf,
12294 int *bufsiz,
12295 const void *loongarch_lbt,
12296 int size)
12297 {
12298 char *note_name = "LINUX";
12299 return elfcore_write_note (abfd, buf, bufsiz,
12300 note_name, NT_LARCH_LBT, loongarch_lbt, size);
12301 }
12302
12303 char *
12304 elfcore_write_loongarch_lsx (bfd *abfd,
12305 char *buf,
12306 int *bufsiz,
12307 const void *loongarch_lsx,
12308 int size)
12309 {
12310 char *note_name = "LINUX";
12311 return elfcore_write_note (abfd, buf, bufsiz,
12312 note_name, NT_LARCH_LSX, loongarch_lsx, size);
12313 }
12314
12315 char *
12316 elfcore_write_loongarch_lasx (bfd *abfd,
12317 char *buf,
12318 int *bufsiz,
12319 const void *loongarch_lasx,
12320 int size)
12321 {
12322 char *note_name = "LINUX";
12323 return elfcore_write_note (abfd, buf, bufsiz,
12324 note_name, NT_LARCH_LASX, loongarch_lasx, size);
12325 }
12326
12327 /* Write the buffer of csr values in CSRS (length SIZE) into the note
12328 buffer BUF and update *BUFSIZ. ABFD is the bfd the note is being
12329 written into. Return a pointer to the new start of the note buffer, to
12330 replace BUF which may no longer be valid. */
12331
12332 char *
12333 elfcore_write_riscv_csr (bfd *abfd,
12334 char *buf,
12335 int *bufsiz,
12336 const void *csrs,
12337 int size)
12338 {
12339 const char *note_name = "GDB";
12340 return elfcore_write_note (abfd, buf, bufsiz,
12341 note_name, NT_RISCV_CSR, csrs, size);
12342 }
12343
12344 /* Write the target description (a string) pointed to by TDESC, length
12345 SIZE, into the note buffer BUF, and update *BUFSIZ. ABFD is the bfd the
12346 note is being written into. Return a pointer to the new start of the
12347 note buffer, to replace BUF which may no longer be valid. */
12348
12349 char *
12350 elfcore_write_gdb_tdesc (bfd *abfd,
12351 char *buf,
12352 int *bufsiz,
12353 const void *tdesc,
12354 int size)
12355 {
12356 const char *note_name = "GDB";
12357 return elfcore_write_note (abfd, buf, bufsiz,
12358 note_name, NT_GDB_TDESC, tdesc, size);
12359 }
12360
12361 char *
12362 elfcore_write_register_note (bfd *abfd,
12363 char *buf,
12364 int *bufsiz,
12365 const char *section,
12366 const void *data,
12367 int size)
12368 {
12369 if (strcmp (section, ".reg2") == 0)
12370 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
12371 if (strcmp (section, ".reg-xfp") == 0)
12372 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
12373 if (strcmp (section, ".reg-xstate") == 0)
12374 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
12375 if (strcmp (section, ".reg-ppc-vmx") == 0)
12376 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
12377 if (strcmp (section, ".reg-ppc-vsx") == 0)
12378 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
12379 if (strcmp (section, ".reg-ppc-tar") == 0)
12380 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
12381 if (strcmp (section, ".reg-ppc-ppr") == 0)
12382 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
12383 if (strcmp (section, ".reg-ppc-dscr") == 0)
12384 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
12385 if (strcmp (section, ".reg-ppc-ebb") == 0)
12386 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
12387 if (strcmp (section, ".reg-ppc-pmu") == 0)
12388 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
12389 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
12390 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
12391 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
12392 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
12393 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
12394 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
12395 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
12396 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
12397 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
12398 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
12399 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
12400 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
12401 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
12402 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
12403 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
12404 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
12405 if (strcmp (section, ".reg-s390-high-gprs") == 0)
12406 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
12407 if (strcmp (section, ".reg-s390-timer") == 0)
12408 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
12409 if (strcmp (section, ".reg-s390-todcmp") == 0)
12410 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
12411 if (strcmp (section, ".reg-s390-todpreg") == 0)
12412 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
12413 if (strcmp (section, ".reg-s390-ctrs") == 0)
12414 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
12415 if (strcmp (section, ".reg-s390-prefix") == 0)
12416 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
12417 if (strcmp (section, ".reg-s390-last-break") == 0)
12418 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
12419 if (strcmp (section, ".reg-s390-system-call") == 0)
12420 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
12421 if (strcmp (section, ".reg-s390-tdb") == 0)
12422 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
12423 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
12424 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
12425 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
12426 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
12427 if (strcmp (section, ".reg-s390-gs-cb") == 0)
12428 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
12429 if (strcmp (section, ".reg-s390-gs-bc") == 0)
12430 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
12431 if (strcmp (section, ".reg-arm-vfp") == 0)
12432 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
12433 if (strcmp (section, ".reg-aarch-tls") == 0)
12434 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
12435 if (strcmp (section, ".reg-aarch-hw-break") == 0)
12436 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
12437 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
12438 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
12439 if (strcmp (section, ".reg-aarch-sve") == 0)
12440 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
12441 if (strcmp (section, ".reg-aarch-pauth") == 0)
12442 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
12443 if (strcmp (section, ".reg-aarch-mte") == 0)
12444 return elfcore_write_aarch_mte (abfd, buf, bufsiz, data, size);
12445 if (strcmp (section, ".reg-arc-v2") == 0)
12446 return elfcore_write_arc_v2 (abfd, buf, bufsiz, data, size);
12447 if (strcmp (section, ".gdb-tdesc") == 0)
12448 return elfcore_write_gdb_tdesc (abfd, buf, bufsiz, data, size);
12449 if (strcmp (section, ".reg-riscv-csr") == 0)
12450 return elfcore_write_riscv_csr (abfd, buf, bufsiz, data, size);
12451 if (strcmp (section, ".reg-loongarch-cpucfg") == 0)
12452 return elfcore_write_loongarch_cpucfg (abfd, buf, bufsiz, data, size);
12453 if (strcmp (section, ".reg-loongarch-lbt") == 0)
12454 return elfcore_write_loongarch_lbt (abfd, buf, bufsiz, data, size);
12455 if (strcmp (section, ".reg-loongarch-lsx") == 0)
12456 return elfcore_write_loongarch_lsx (abfd, buf, bufsiz, data, size);
12457 if (strcmp (section, ".reg-loongarch-lasx") == 0)
12458 return elfcore_write_loongarch_lasx (abfd, buf, bufsiz, data, size);
12459 return NULL;
12460 }
12461
12462 char *
12463 elfcore_write_file_note (bfd *obfd, char *note_data, int *note_size,
12464 const void *buf, int bufsiz)
12465 {
12466 return elfcore_write_note (obfd, note_data, note_size,
12467 "CORE", NT_FILE, buf, bufsiz);
12468 }
12469
12470 static bool
12471 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
12472 size_t align)
12473 {
12474 char *p;
12475
12476 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
12477 gABI specifies that PT_NOTE alignment should be aligned to 4
12478 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
12479 align is less than 4, we use 4 byte alignment. */
12480 if (align < 4)
12481 align = 4;
12482 if (align != 4 && align != 8)
12483 return false;
12484
12485 p = buf;
12486 while (p < buf + size)
12487 {
12488 Elf_External_Note *xnp = (Elf_External_Note *) p;
12489 Elf_Internal_Note in;
12490
12491 if (offsetof (Elf_External_Note, name) > buf - p + size)
12492 return false;
12493
12494 in.type = H_GET_32 (abfd, xnp->type);
12495
12496 in.namesz = H_GET_32 (abfd, xnp->namesz);
12497 in.namedata = xnp->name;
12498 if (in.namesz > buf - in.namedata + size)
12499 return false;
12500
12501 in.descsz = H_GET_32 (abfd, xnp->descsz);
12502 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
12503 in.descpos = offset + (in.descdata - buf);
12504 if (in.descsz != 0
12505 && (in.descdata >= buf + size
12506 || in.descsz > buf - in.descdata + size))
12507 return false;
12508
12509 switch (bfd_get_format (abfd))
12510 {
12511 default:
12512 return true;
12513
12514 case bfd_core:
12515 {
12516 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
12517 struct
12518 {
12519 const char * string;
12520 size_t len;
12521 bool (*func) (bfd *, Elf_Internal_Note *);
12522 }
12523 grokers[] =
12524 {
12525 GROKER_ELEMENT ("", elfcore_grok_note),
12526 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
12527 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
12528 GROKER_ELEMENT ("OpenBSD", elfcore_grok_openbsd_note),
12529 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
12530 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
12531 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note),
12532 GROKER_ELEMENT ("CORE", elfcore_grok_solaris_note)
12533 };
12534 #undef GROKER_ELEMENT
12535 int i;
12536
12537 for (i = ARRAY_SIZE (grokers); i--;)
12538 {
12539 if (in.namesz >= grokers[i].len
12540 && strncmp (in.namedata, grokers[i].string,
12541 grokers[i].len) == 0)
12542 {
12543 if (! grokers[i].func (abfd, & in))
12544 return false;
12545 break;
12546 }
12547 }
12548 break;
12549 }
12550
12551 case bfd_object:
12552 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
12553 {
12554 if (! elfobj_grok_gnu_note (abfd, &in))
12555 return false;
12556 }
12557 else if (in.namesz == sizeof "stapsdt"
12558 && strcmp (in.namedata, "stapsdt") == 0)
12559 {
12560 if (! elfobj_grok_stapsdt_note (abfd, &in))
12561 return false;
12562 }
12563 break;
12564 }
12565
12566 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
12567 }
12568
12569 return true;
12570 }
12571
12572 bool
12573 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
12574 size_t align)
12575 {
12576 char *buf;
12577
12578 if (size == 0 || (size + 1) == 0)
12579 return true;
12580
12581 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
12582 return false;
12583
12584 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
12585 if (buf == NULL)
12586 return false;
12587
12588 /* PR 17512: file: ec08f814
12589 0-termintate the buffer so that string searches will not overflow. */
12590 buf[size] = 0;
12591
12592 if (!elf_parse_notes (abfd, buf, size, offset, align))
12593 {
12594 free (buf);
12595 return false;
12596 }
12597
12598 free (buf);
12599 return true;
12600 }
12601 \f
12602 /* Providing external access to the ELF program header table. */
12603
12604 /* Return an upper bound on the number of bytes required to store a
12605 copy of ABFD's program header table entries. Return -1 if an error
12606 occurs; bfd_get_error will return an appropriate code. */
12607
12608 long
12609 bfd_get_elf_phdr_upper_bound (bfd *abfd)
12610 {
12611 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12612 {
12613 bfd_set_error (bfd_error_wrong_format);
12614 return -1;
12615 }
12616
12617 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
12618 }
12619
12620 /* Copy ABFD's program header table entries to *PHDRS. The entries
12621 will be stored as an array of Elf_Internal_Phdr structures, as
12622 defined in include/elf/internal.h. To find out how large the
12623 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12624
12625 Return the number of program header table entries read, or -1 if an
12626 error occurs; bfd_get_error will return an appropriate code. */
12627
12628 int
12629 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12630 {
12631 int num_phdrs;
12632
12633 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12634 {
12635 bfd_set_error (bfd_error_wrong_format);
12636 return -1;
12637 }
12638
12639 num_phdrs = elf_elfheader (abfd)->e_phnum;
12640 if (num_phdrs != 0)
12641 memcpy (phdrs, elf_tdata (abfd)->phdr,
12642 num_phdrs * sizeof (Elf_Internal_Phdr));
12643
12644 return num_phdrs;
12645 }
12646
12647 enum elf_reloc_type_class
12648 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12649 const asection *rel_sec ATTRIBUTE_UNUSED,
12650 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12651 {
12652 return reloc_class_normal;
12653 }
12654
12655 /* For RELA architectures, return the relocation value for a
12656 relocation against a local symbol. */
12657
12658 bfd_vma
12659 _bfd_elf_rela_local_sym (bfd *abfd,
12660 Elf_Internal_Sym *sym,
12661 asection **psec,
12662 Elf_Internal_Rela *rel)
12663 {
12664 asection *sec = *psec;
12665 bfd_vma relocation;
12666
12667 relocation = (sec->output_section->vma
12668 + sec->output_offset
12669 + sym->st_value);
12670 if ((sec->flags & SEC_MERGE)
12671 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12672 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12673 {
12674 rel->r_addend =
12675 _bfd_merged_section_offset (abfd, psec,
12676 elf_section_data (sec)->sec_info,
12677 sym->st_value + rel->r_addend);
12678 if (sec != *psec)
12679 {
12680 /* If we have changed the section, and our original section is
12681 marked with SEC_EXCLUDE, it means that the original
12682 SEC_MERGE section has been completely subsumed in some
12683 other SEC_MERGE section. In this case, we need to leave
12684 some info around for --emit-relocs. */
12685 if ((sec->flags & SEC_EXCLUDE) != 0)
12686 sec->kept_section = *psec;
12687 sec = *psec;
12688 }
12689 rel->r_addend -= relocation;
12690 rel->r_addend += sec->output_section->vma + sec->output_offset;
12691 }
12692 return relocation;
12693 }
12694
12695 bfd_vma
12696 _bfd_elf_rel_local_sym (bfd *abfd,
12697 Elf_Internal_Sym *sym,
12698 asection **psec,
12699 bfd_vma addend)
12700 {
12701 asection *sec = *psec;
12702
12703 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12704 return sym->st_value + addend;
12705
12706 return _bfd_merged_section_offset (abfd, psec,
12707 elf_section_data (sec)->sec_info,
12708 sym->st_value + addend);
12709 }
12710
12711 /* Adjust an address within a section. Given OFFSET within SEC, return
12712 the new offset within the section, based upon changes made to the
12713 section. Returns -1 if the offset is now invalid.
12714 The offset (in abnd out) is in target sized bytes, however big a
12715 byte may be. */
12716
12717 bfd_vma
12718 _bfd_elf_section_offset (bfd *abfd,
12719 struct bfd_link_info *info,
12720 asection *sec,
12721 bfd_vma offset)
12722 {
12723 switch (sec->sec_info_type)
12724 {
12725 case SEC_INFO_TYPE_STABS:
12726 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12727 offset);
12728 case SEC_INFO_TYPE_EH_FRAME:
12729 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12730
12731 default:
12732 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12733 {
12734 /* Reverse the offset. */
12735 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12736 bfd_size_type address_size = bed->s->arch_size / 8;
12737
12738 /* address_size and sec->size are in octets. Convert
12739 to bytes before subtracting the original offset. */
12740 offset = ((sec->size - address_size)
12741 / bfd_octets_per_byte (abfd, sec) - offset);
12742 }
12743 return offset;
12744 }
12745 }
12746 \f
12747 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12748 reconstruct an ELF file by reading the segments out of remote memory
12749 based on the ELF file header at EHDR_VMA and the ELF program headers it
12750 points to. If not null, *LOADBASEP is filled in with the difference
12751 between the VMAs from which the segments were read, and the VMAs the
12752 file headers (and hence BFD's idea of each section's VMA) put them at.
12753
12754 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12755 remote memory at target address VMA into the local buffer at MYADDR; it
12756 should return zero on success or an `errno' code on failure. TEMPL must
12757 be a BFD for an ELF target with the word size and byte order found in
12758 the remote memory. */
12759
12760 bfd *
12761 bfd_elf_bfd_from_remote_memory
12762 (bfd *templ,
12763 bfd_vma ehdr_vma,
12764 bfd_size_type size,
12765 bfd_vma *loadbasep,
12766 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12767 {
12768 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12769 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12770 }
12771 \f
12772 long
12773 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12774 long symcount ATTRIBUTE_UNUSED,
12775 asymbol **syms ATTRIBUTE_UNUSED,
12776 long dynsymcount,
12777 asymbol **dynsyms,
12778 asymbol **ret)
12779 {
12780 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12781 asection *relplt;
12782 asymbol *s;
12783 const char *relplt_name;
12784 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
12785 arelent *p;
12786 long count, i, n;
12787 size_t size;
12788 Elf_Internal_Shdr *hdr;
12789 char *names;
12790 asection *plt;
12791
12792 *ret = NULL;
12793
12794 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12795 return 0;
12796
12797 if (dynsymcount <= 0)
12798 return 0;
12799
12800 if (!bed->plt_sym_val)
12801 return 0;
12802
12803 relplt_name = bed->relplt_name;
12804 if (relplt_name == NULL)
12805 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12806 relplt = bfd_get_section_by_name (abfd, relplt_name);
12807 if (relplt == NULL)
12808 return 0;
12809
12810 hdr = &elf_section_data (relplt)->this_hdr;
12811 if (hdr->sh_link != elf_dynsymtab (abfd)
12812 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12813 return 0;
12814
12815 plt = bfd_get_section_by_name (abfd, ".plt");
12816 if (plt == NULL)
12817 return 0;
12818
12819 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12820 if (! (*slurp_relocs) (abfd, relplt, dynsyms, true))
12821 return -1;
12822
12823 count = relplt->size / hdr->sh_entsize;
12824 size = count * sizeof (asymbol);
12825 p = relplt->relocation;
12826 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12827 {
12828 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12829 if (p->addend != 0)
12830 {
12831 #ifdef BFD64
12832 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12833 #else
12834 size += sizeof ("+0x") - 1 + 8;
12835 #endif
12836 }
12837 }
12838
12839 s = *ret = (asymbol *) bfd_malloc (size);
12840 if (s == NULL)
12841 return -1;
12842
12843 names = (char *) (s + count);
12844 p = relplt->relocation;
12845 n = 0;
12846 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12847 {
12848 size_t len;
12849 bfd_vma addr;
12850
12851 addr = bed->plt_sym_val (i, plt, p);
12852 if (addr == (bfd_vma) -1)
12853 continue;
12854
12855 *s = **p->sym_ptr_ptr;
12856 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12857 we are defining a symbol, ensure one of them is set. */
12858 if ((s->flags & BSF_LOCAL) == 0)
12859 s->flags |= BSF_GLOBAL;
12860 s->flags |= BSF_SYNTHETIC;
12861 s->section = plt;
12862 s->value = addr - plt->vma;
12863 s->name = names;
12864 s->udata.p = NULL;
12865 len = strlen ((*p->sym_ptr_ptr)->name);
12866 memcpy (names, (*p->sym_ptr_ptr)->name, len);
12867 names += len;
12868 if (p->addend != 0)
12869 {
12870 char buf[30], *a;
12871
12872 memcpy (names, "+0x", sizeof ("+0x") - 1);
12873 names += sizeof ("+0x") - 1;
12874 bfd_sprintf_vma (abfd, buf, p->addend);
12875 for (a = buf; *a == '0'; ++a)
12876 ;
12877 len = strlen (a);
12878 memcpy (names, a, len);
12879 names += len;
12880 }
12881 memcpy (names, "@plt", sizeof ("@plt"));
12882 names += sizeof ("@plt");
12883 ++s, ++n;
12884 }
12885
12886 return n;
12887 }
12888
12889 /* It is only used by x86-64 so far.
12890 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
12891 but current usage would allow all of _bfd_std_section to be zero. */
12892 static const asymbol lcomm_sym
12893 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
12894 asection _bfd_elf_large_com_section
12895 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
12896 "LARGE_COMMON", 0, SEC_IS_COMMON);
12897
12898 bool
12899 _bfd_elf_final_write_processing (bfd *abfd)
12900 {
12901 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
12902
12903 i_ehdrp = elf_elfheader (abfd);
12904
12905 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12906 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
12907
12908 /* Set the osabi field to ELFOSABI_GNU if the binary contains
12909 SHF_GNU_MBIND or SHF_GNU_RETAIN sections or symbols of STT_GNU_IFUNC type
12910 or STB_GNU_UNIQUE binding. */
12911 if (elf_tdata (abfd)->has_gnu_osabi != 0)
12912 {
12913 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
12914 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
12915 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
12916 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
12917 {
12918 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
12919 _bfd_error_handler (_("GNU_MBIND section is supported only by GNU "
12920 "and FreeBSD targets"));
12921 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
12922 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is supported "
12923 "only by GNU and FreeBSD targets"));
12924 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
12925 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is supported "
12926 "only by GNU and FreeBSD targets"));
12927 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_retain)
12928 _bfd_error_handler (_("GNU_RETAIN section is supported "
12929 "only by GNU and FreeBSD targets"));
12930 bfd_set_error (bfd_error_sorry);
12931 return false;
12932 }
12933 }
12934 return true;
12935 }
12936
12937
12938 /* Return TRUE for ELF symbol types that represent functions.
12939 This is the default version of this function, which is sufficient for
12940 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
12941
12942 bool
12943 _bfd_elf_is_function_type (unsigned int type)
12944 {
12945 return (type == STT_FUNC
12946 || type == STT_GNU_IFUNC);
12947 }
12948
12949 /* If the ELF symbol SYM might be a function in SEC, return the
12950 function size and set *CODE_OFF to the function's entry point,
12951 otherwise return zero. */
12952
12953 bfd_size_type
12954 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
12955 bfd_vma *code_off)
12956 {
12957 bfd_size_type size;
12958 elf_symbol_type * elf_sym = (elf_symbol_type *) sym;
12959
12960 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
12961 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
12962 || sym->section != sec)
12963 return 0;
12964
12965 size = (sym->flags & BSF_SYNTHETIC) ? 0 : elf_sym->internal_elf_sym.st_size;
12966
12967 /* In theory we should check that the symbol's type satisfies
12968 _bfd_elf_is_function_type(), but there are some function-like
12969 symbols which would fail this test. (eg _start). Instead
12970 we check for hidden, local, notype symbols with zero size.
12971 This type of symbol is generated by the annobin plugin for gcc
12972 and clang, and should not be considered to be a function symbol. */
12973 if (size == 0
12974 && ((sym->flags & (BSF_SYNTHETIC | BSF_LOCAL)) == BSF_LOCAL)
12975 && ELF_ST_TYPE (elf_sym->internal_elf_sym.st_info) == STT_NOTYPE
12976 && ELF_ST_VISIBILITY (elf_sym->internal_elf_sym.st_other) == STV_HIDDEN)
12977 return 0;
12978
12979 *code_off = sym->value;
12980 /* Do not return 0 for the function's size. */
12981 return size ? size : 1;
12982 }
12983
12984 /* Set to non-zero to enable some debug messages. */
12985 #define DEBUG_SECONDARY_RELOCS 0
12986
12987 /* An internal-to-the-bfd-library only section type
12988 used to indicate a cached secondary reloc section. */
12989 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
12990
12991 /* Create a BFD section to hold a secondary reloc section. */
12992
12993 bool
12994 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
12995 Elf_Internal_Shdr *hdr,
12996 const char * name,
12997 unsigned int shindex)
12998 {
12999 /* We only support RELA secondary relocs. */
13000 if (hdr->sh_type != SHT_RELA)
13001 return false;
13002
13003 #if DEBUG_SECONDARY_RELOCS
13004 fprintf (stderr, "secondary reloc section %s encountered\n", name);
13005 #endif
13006 hdr->sh_type = SHT_SECONDARY_RELOC;
13007 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
13008 }
13009
13010 /* Read in any secondary relocs associated with SEC. */
13011
13012 bool
13013 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
13014 asection * sec,
13015 asymbol ** symbols,
13016 bool dynamic)
13017 {
13018 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
13019 asection * relsec;
13020 bool result = true;
13021 bfd_vma (*r_sym) (bfd_vma);
13022
13023 #if BFD_DEFAULT_TARGET_SIZE > 32
13024 if (bfd_arch_bits_per_address (abfd) != 32)
13025 r_sym = elf64_r_sym;
13026 else
13027 #endif
13028 r_sym = elf32_r_sym;
13029
13030 if (!elf_section_data (sec)->has_secondary_relocs)
13031 return true;
13032
13033 /* Discover if there are any secondary reloc sections
13034 associated with SEC. */
13035 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
13036 {
13037 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
13038
13039 if (hdr->sh_type == SHT_SECONDARY_RELOC
13040 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx
13041 && (hdr->sh_entsize == ebd->s->sizeof_rel
13042 || hdr->sh_entsize == ebd->s->sizeof_rela))
13043 {
13044 bfd_byte * native_relocs;
13045 bfd_byte * native_reloc;
13046 arelent * internal_relocs;
13047 arelent * internal_reloc;
13048 unsigned int i;
13049 unsigned int entsize;
13050 unsigned int symcount;
13051 unsigned int reloc_count;
13052 size_t amt;
13053
13054 if (ebd->elf_info_to_howto == NULL)
13055 return false;
13056
13057 #if DEBUG_SECONDARY_RELOCS
13058 fprintf (stderr, "read secondary relocs for %s from %s\n",
13059 sec->name, relsec->name);
13060 #endif
13061 entsize = hdr->sh_entsize;
13062
13063 native_relocs = bfd_malloc (hdr->sh_size);
13064 if (native_relocs == NULL)
13065 {
13066 result = false;
13067 continue;
13068 }
13069
13070 reloc_count = NUM_SHDR_ENTRIES (hdr);
13071 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
13072 {
13073 free (native_relocs);
13074 bfd_set_error (bfd_error_file_too_big);
13075 result = false;
13076 continue;
13077 }
13078
13079 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
13080 if (internal_relocs == NULL)
13081 {
13082 free (native_relocs);
13083 result = false;
13084 continue;
13085 }
13086
13087 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
13088 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
13089 != hdr->sh_size))
13090 {
13091 free (native_relocs);
13092 /* The internal_relocs will be freed when
13093 the memory for the bfd is released. */
13094 result = false;
13095 continue;
13096 }
13097
13098 if (dynamic)
13099 symcount = bfd_get_dynamic_symcount (abfd);
13100 else
13101 symcount = bfd_get_symcount (abfd);
13102
13103 for (i = 0, internal_reloc = internal_relocs,
13104 native_reloc = native_relocs;
13105 i < reloc_count;
13106 i++, internal_reloc++, native_reloc += entsize)
13107 {
13108 bool res;
13109 Elf_Internal_Rela rela;
13110
13111 if (entsize == ebd->s->sizeof_rel)
13112 ebd->s->swap_reloc_in (abfd, native_reloc, & rela);
13113 else /* entsize == ebd->s->sizeof_rela */
13114 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
13115
13116 /* The address of an ELF reloc is section relative for an object
13117 file, and absolute for an executable file or shared library.
13118 The address of a normal BFD reloc is always section relative,
13119 and the address of a dynamic reloc is absolute.. */
13120 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
13121 internal_reloc->address = rela.r_offset;
13122 else
13123 internal_reloc->address = rela.r_offset - sec->vma;
13124
13125 if (r_sym (rela.r_info) == STN_UNDEF)
13126 {
13127 /* FIXME: This and the error case below mean that we
13128 have a symbol on relocs that is not elf_symbol_type. */
13129 internal_reloc->sym_ptr_ptr =
13130 bfd_abs_section_ptr->symbol_ptr_ptr;
13131 }
13132 else if (r_sym (rela.r_info) > symcount)
13133 {
13134 _bfd_error_handler
13135 /* xgettext:c-format */
13136 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
13137 abfd, sec, i, (long) r_sym (rela.r_info));
13138 bfd_set_error (bfd_error_bad_value);
13139 internal_reloc->sym_ptr_ptr =
13140 bfd_abs_section_ptr->symbol_ptr_ptr;
13141 result = false;
13142 }
13143 else
13144 {
13145 asymbol **ps;
13146
13147 ps = symbols + r_sym (rela.r_info) - 1;
13148 internal_reloc->sym_ptr_ptr = ps;
13149 /* Make sure that this symbol is not removed by strip. */
13150 (*ps)->flags |= BSF_KEEP;
13151 }
13152
13153 internal_reloc->addend = rela.r_addend;
13154
13155 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
13156 if (! res || internal_reloc->howto == NULL)
13157 {
13158 #if DEBUG_SECONDARY_RELOCS
13159 fprintf (stderr, "there is no howto associated with reloc %lx\n",
13160 rela.r_info);
13161 #endif
13162 result = false;
13163 }
13164 }
13165
13166 free (native_relocs);
13167 /* Store the internal relocs. */
13168 elf_section_data (relsec)->sec_info = internal_relocs;
13169 }
13170 }
13171
13172 return result;
13173 }
13174
13175 /* Set the ELF section header fields of an output secondary reloc section. */
13176
13177 bool
13178 _bfd_elf_copy_special_section_fields (const bfd * ibfd ATTRIBUTE_UNUSED,
13179 bfd * obfd ATTRIBUTE_UNUSED,
13180 const Elf_Internal_Shdr * isection,
13181 Elf_Internal_Shdr * osection)
13182 {
13183 asection * isec;
13184 asection * osec;
13185 struct bfd_elf_section_data * esd;
13186
13187 if (isection == NULL)
13188 return false;
13189
13190 if (isection->sh_type != SHT_SECONDARY_RELOC)
13191 return true;
13192
13193 isec = isection->bfd_section;
13194 if (isec == NULL)
13195 return false;
13196
13197 osec = osection->bfd_section;
13198 if (osec == NULL)
13199 return false;
13200
13201 esd = elf_section_data (osec);
13202 BFD_ASSERT (esd->sec_info == NULL);
13203 esd->sec_info = elf_section_data (isec)->sec_info;
13204 osection->sh_type = SHT_RELA;
13205 osection->sh_link = elf_onesymtab (obfd);
13206 if (osection->sh_link == 0)
13207 {
13208 /* There is no symbol table - we are hosed... */
13209 _bfd_error_handler
13210 /* xgettext:c-format */
13211 (_("%pB(%pA): link section cannot be set because the output file does not have a symbol table"),
13212 obfd, osec);
13213 bfd_set_error (bfd_error_bad_value);
13214 return false;
13215 }
13216
13217 /* Find the output section that corresponds to the isection's sh_info link. */
13218 if (isection->sh_info == 0
13219 || isection->sh_info >= elf_numsections (ibfd))
13220 {
13221 _bfd_error_handler
13222 /* xgettext:c-format */
13223 (_("%pB(%pA): info section index is invalid"),
13224 obfd, osec);
13225 bfd_set_error (bfd_error_bad_value);
13226 return false;
13227 }
13228
13229 isection = elf_elfsections (ibfd)[isection->sh_info];
13230
13231 if (isection == NULL
13232 || isection->bfd_section == NULL
13233 || isection->bfd_section->output_section == NULL)
13234 {
13235 _bfd_error_handler
13236 /* xgettext:c-format */
13237 (_("%pB(%pA): info section index cannot be set because the section is not in the output"),
13238 obfd, osec);
13239 bfd_set_error (bfd_error_bad_value);
13240 return false;
13241 }
13242
13243 esd = elf_section_data (isection->bfd_section->output_section);
13244 BFD_ASSERT (esd != NULL);
13245 osection->sh_info = esd->this_idx;
13246 esd->has_secondary_relocs = true;
13247 #if DEBUG_SECONDARY_RELOCS
13248 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
13249 osec->name, osection->sh_link, osection->sh_info);
13250 fprintf (stderr, "mark section %s as having secondary relocs\n",
13251 bfd_section_name (isection->bfd_section->output_section));
13252 #endif
13253
13254 return true;
13255 }
13256
13257 /* Write out a secondary reloc section.
13258
13259 FIXME: Currently this function can result in a serious performance penalty
13260 for files with secondary relocs and lots of sections. The proper way to
13261 fix this is for _bfd_elf_copy_special_section_fields() to chain secondary
13262 relocs together and then to have this function just walk that chain. */
13263
13264 bool
13265 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
13266 {
13267 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
13268 bfd_vma addr_offset;
13269 asection * relsec;
13270 bfd_vma (*r_info) (bfd_vma, bfd_vma);
13271 bool result = true;
13272
13273 if (sec == NULL)
13274 return false;
13275
13276 #if BFD_DEFAULT_TARGET_SIZE > 32
13277 if (bfd_arch_bits_per_address (abfd) != 32)
13278 r_info = elf64_r_info;
13279 else
13280 #endif
13281 r_info = elf32_r_info;
13282
13283 /* The address of an ELF reloc is section relative for an object
13284 file, and absolute for an executable file or shared library.
13285 The address of a BFD reloc is always section relative. */
13286 addr_offset = 0;
13287 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
13288 addr_offset = sec->vma;
13289
13290 /* Discover if there are any secondary reloc sections
13291 associated with SEC. */
13292 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
13293 {
13294 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
13295 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
13296
13297 if (hdr->sh_type == SHT_RELA
13298 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
13299 {
13300 asymbol * last_sym;
13301 int last_sym_idx;
13302 unsigned int reloc_count;
13303 unsigned int idx;
13304 unsigned int entsize;
13305 arelent * src_irel;
13306 bfd_byte * dst_rela;
13307
13308 if (hdr->contents != NULL)
13309 {
13310 _bfd_error_handler
13311 /* xgettext:c-format */
13312 (_("%pB(%pA): error: secondary reloc section processed twice"),
13313 abfd, relsec);
13314 bfd_set_error (bfd_error_bad_value);
13315 result = false;
13316 continue;
13317 }
13318
13319 entsize = hdr->sh_entsize;
13320 if (entsize == 0)
13321 {
13322 _bfd_error_handler
13323 /* xgettext:c-format */
13324 (_("%pB(%pA): error: secondary reloc section has zero sized entries"),
13325 abfd, relsec);
13326 bfd_set_error (bfd_error_bad_value);
13327 result = false;
13328 continue;
13329 }
13330 else if (entsize != ebd->s->sizeof_rel
13331 && entsize != ebd->s->sizeof_rela)
13332 {
13333 _bfd_error_handler
13334 /* xgettext:c-format */
13335 (_("%pB(%pA): error: secondary reloc section has non-standard sized entries"),
13336 abfd, relsec);
13337 bfd_set_error (bfd_error_bad_value);
13338 result = false;
13339 continue;
13340 }
13341
13342 reloc_count = hdr->sh_size / entsize;
13343 if (reloc_count <= 0)
13344 {
13345 _bfd_error_handler
13346 /* xgettext:c-format */
13347 (_("%pB(%pA): error: secondary reloc section is empty!"),
13348 abfd, relsec);
13349 bfd_set_error (bfd_error_bad_value);
13350 result = false;
13351 continue;
13352 }
13353
13354 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
13355 if (hdr->contents == NULL)
13356 continue;
13357
13358 #if DEBUG_SECONDARY_RELOCS
13359 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
13360 reloc_count, sec->name, relsec->name);
13361 #endif
13362 last_sym = NULL;
13363 last_sym_idx = 0;
13364 dst_rela = hdr->contents;
13365 src_irel = (arelent *) esd->sec_info;
13366 if (src_irel == NULL)
13367 {
13368 _bfd_error_handler
13369 /* xgettext:c-format */
13370 (_("%pB(%pA): error: internal relocs missing for secondary reloc section"),
13371 abfd, relsec);
13372 bfd_set_error (bfd_error_bad_value);
13373 result = false;
13374 continue;
13375 }
13376
13377 for (idx = 0; idx < reloc_count; idx++, dst_rela += entsize)
13378 {
13379 Elf_Internal_Rela src_rela;
13380 arelent *ptr;
13381 asymbol *sym;
13382 int n;
13383
13384 ptr = src_irel + idx;
13385 if (ptr == NULL)
13386 {
13387 _bfd_error_handler
13388 /* xgettext:c-format */
13389 (_("%pB(%pA): error: reloc table entry %u is empty"),
13390 abfd, relsec, idx);
13391 bfd_set_error (bfd_error_bad_value);
13392 result = false;
13393 break;
13394 }
13395
13396 if (ptr->sym_ptr_ptr == NULL)
13397 {
13398 /* FIXME: Is this an error ? */
13399 n = 0;
13400 }
13401 else
13402 {
13403 sym = *ptr->sym_ptr_ptr;
13404
13405 if (sym == last_sym)
13406 n = last_sym_idx;
13407 else
13408 {
13409 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
13410 if (n < 0)
13411 {
13412 _bfd_error_handler
13413 /* xgettext:c-format */
13414 (_("%pB(%pA): error: secondary reloc %u references a missing symbol"),
13415 abfd, relsec, idx);
13416 bfd_set_error (bfd_error_bad_value);
13417 result = false;
13418 n = 0;
13419 }
13420
13421 last_sym = sym;
13422 last_sym_idx = n;
13423 }
13424
13425 if (sym->the_bfd != NULL
13426 && sym->the_bfd->xvec != abfd->xvec
13427 && ! _bfd_elf_validate_reloc (abfd, ptr))
13428 {
13429 _bfd_error_handler
13430 /* xgettext:c-format */
13431 (_("%pB(%pA): error: secondary reloc %u references a deleted symbol"),
13432 abfd, relsec, idx);
13433 bfd_set_error (bfd_error_bad_value);
13434 result = false;
13435 n = 0;
13436 }
13437 }
13438
13439 src_rela.r_offset = ptr->address + addr_offset;
13440 if (ptr->howto == NULL)
13441 {
13442 _bfd_error_handler
13443 /* xgettext:c-format */
13444 (_("%pB(%pA): error: secondary reloc %u is of an unknown type"),
13445 abfd, relsec, idx);
13446 bfd_set_error (bfd_error_bad_value);
13447 result = false;
13448 src_rela.r_info = r_info (0, 0);
13449 }
13450 else
13451 src_rela.r_info = r_info (n, ptr->howto->type);
13452 src_rela.r_addend = ptr->addend;
13453
13454 if (entsize == ebd->s->sizeof_rel)
13455 ebd->s->swap_reloc_out (abfd, &src_rela, dst_rela);
13456 else /* entsize == ebd->s->sizeof_rela */
13457 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
13458 }
13459 }
13460 }
13461
13462 return result;
13463 }