[Aarch64] Add Binutils support for MEC
[binutils-gdb.git] / bfd / elf.c
blob37f331b98cdf5101d8e9a1a28425c264cbf0a3a4
1 /* ELF executable support for BFD.
3 Copyright (C) 1993-2023 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
24 SECTION
25 ELF backends
27 BFD support for ELF formats is being worked on.
28 Currently, the best supported back ends are for sparc and i386
29 (running svr4 or Solaris 2).
31 Documentation of the internals of the support code still needs
32 to be written. The code is changing quickly enough that we
33 haven't bothered yet. */
35 /* For sparc64-cross-sparc32. */
36 #define _SYSCALL32
37 #include "sysdep.h"
38 #include <limits.h>
39 #include "bfd.h"
40 #include "bfdlink.h"
41 #include "libbfd.h"
42 #define ARCH_SIZE 0
43 #include "elf-bfd.h"
44 #include "libiberty.h"
45 #include "safe-ctype.h"
46 #include "elf-linux-core.h"
48 #ifdef CORE_HEADER
49 #include CORE_HEADER
50 #endif
52 static int elf_sort_sections (const void *, const void *);
53 static bool assign_file_positions_except_relocs (bfd *, struct bfd_link_info *);
54 static bool swap_out_syms (bfd *, struct elf_strtab_hash **, int,
55 struct bfd_link_info *);
56 static bool elf_parse_notes (bfd *abfd, char *buf, size_t size,
57 file_ptr offset, size_t align);
59 /* Swap version information in and out. The version information is
60 currently size independent. If that ever changes, this code will
61 need to move into elfcode.h. */
63 /* Swap in a Verdef structure. */
65 void
66 _bfd_elf_swap_verdef_in (bfd *abfd,
67 const Elf_External_Verdef *src,
68 Elf_Internal_Verdef *dst)
70 dst->vd_version = H_GET_16 (abfd, src->vd_version);
71 dst->vd_flags = H_GET_16 (abfd, src->vd_flags);
72 dst->vd_ndx = H_GET_16 (abfd, src->vd_ndx);
73 dst->vd_cnt = H_GET_16 (abfd, src->vd_cnt);
74 dst->vd_hash = H_GET_32 (abfd, src->vd_hash);
75 dst->vd_aux = H_GET_32 (abfd, src->vd_aux);
76 dst->vd_next = H_GET_32 (abfd, src->vd_next);
79 /* Swap out a Verdef structure. */
81 void
82 _bfd_elf_swap_verdef_out (bfd *abfd,
83 const Elf_Internal_Verdef *src,
84 Elf_External_Verdef *dst)
86 H_PUT_16 (abfd, src->vd_version, dst->vd_version);
87 H_PUT_16 (abfd, src->vd_flags, dst->vd_flags);
88 H_PUT_16 (abfd, src->vd_ndx, dst->vd_ndx);
89 H_PUT_16 (abfd, src->vd_cnt, dst->vd_cnt);
90 H_PUT_32 (abfd, src->vd_hash, dst->vd_hash);
91 H_PUT_32 (abfd, src->vd_aux, dst->vd_aux);
92 H_PUT_32 (abfd, src->vd_next, dst->vd_next);
95 /* Swap in a Verdaux structure. */
97 void
98 _bfd_elf_swap_verdaux_in (bfd *abfd,
99 const Elf_External_Verdaux *src,
100 Elf_Internal_Verdaux *dst)
102 dst->vda_name = H_GET_32 (abfd, src->vda_name);
103 dst->vda_next = H_GET_32 (abfd, src->vda_next);
106 /* Swap out a Verdaux structure. */
108 void
109 _bfd_elf_swap_verdaux_out (bfd *abfd,
110 const Elf_Internal_Verdaux *src,
111 Elf_External_Verdaux *dst)
113 H_PUT_32 (abfd, src->vda_name, dst->vda_name);
114 H_PUT_32 (abfd, src->vda_next, dst->vda_next);
117 /* Swap in a Verneed structure. */
119 void
120 _bfd_elf_swap_verneed_in (bfd *abfd,
121 const Elf_External_Verneed *src,
122 Elf_Internal_Verneed *dst)
124 dst->vn_version = H_GET_16 (abfd, src->vn_version);
125 dst->vn_cnt = H_GET_16 (abfd, src->vn_cnt);
126 dst->vn_file = H_GET_32 (abfd, src->vn_file);
127 dst->vn_aux = H_GET_32 (abfd, src->vn_aux);
128 dst->vn_next = H_GET_32 (abfd, src->vn_next);
131 /* Swap out a Verneed structure. */
133 void
134 _bfd_elf_swap_verneed_out (bfd *abfd,
135 const Elf_Internal_Verneed *src,
136 Elf_External_Verneed *dst)
138 H_PUT_16 (abfd, src->vn_version, dst->vn_version);
139 H_PUT_16 (abfd, src->vn_cnt, dst->vn_cnt);
140 H_PUT_32 (abfd, src->vn_file, dst->vn_file);
141 H_PUT_32 (abfd, src->vn_aux, dst->vn_aux);
142 H_PUT_32 (abfd, src->vn_next, dst->vn_next);
145 /* Swap in a Vernaux structure. */
147 void
148 _bfd_elf_swap_vernaux_in (bfd *abfd,
149 const Elf_External_Vernaux *src,
150 Elf_Internal_Vernaux *dst)
152 dst->vna_hash = H_GET_32 (abfd, src->vna_hash);
153 dst->vna_flags = H_GET_16 (abfd, src->vna_flags);
154 dst->vna_other = H_GET_16 (abfd, src->vna_other);
155 dst->vna_name = H_GET_32 (abfd, src->vna_name);
156 dst->vna_next = H_GET_32 (abfd, src->vna_next);
159 /* Swap out a Vernaux structure. */
161 void
162 _bfd_elf_swap_vernaux_out (bfd *abfd,
163 const Elf_Internal_Vernaux *src,
164 Elf_External_Vernaux *dst)
166 H_PUT_32 (abfd, src->vna_hash, dst->vna_hash);
167 H_PUT_16 (abfd, src->vna_flags, dst->vna_flags);
168 H_PUT_16 (abfd, src->vna_other, dst->vna_other);
169 H_PUT_32 (abfd, src->vna_name, dst->vna_name);
170 H_PUT_32 (abfd, src->vna_next, dst->vna_next);
173 /* Swap in a Versym structure. */
175 void
176 _bfd_elf_swap_versym_in (bfd *abfd,
177 const Elf_External_Versym *src,
178 Elf_Internal_Versym *dst)
180 dst->vs_vers = H_GET_16 (abfd, src->vs_vers);
183 /* Swap out a Versym structure. */
185 void
186 _bfd_elf_swap_versym_out (bfd *abfd,
187 const Elf_Internal_Versym *src,
188 Elf_External_Versym *dst)
190 H_PUT_16 (abfd, src->vs_vers, dst->vs_vers);
193 /* Standard ELF hash function. Do not change this function; you will
194 cause invalid hash tables to be generated. */
196 unsigned long
197 bfd_elf_hash (const char *namearg)
199 const unsigned char *name = (const unsigned char *) namearg;
200 unsigned long h = 0;
201 unsigned long g;
202 int ch;
204 while ((ch = *name++) != '\0')
206 h = (h << 4) + ch;
207 if ((g = (h & 0xf0000000)) != 0)
209 h ^= g >> 24;
210 /* The ELF ABI says `h &= ~g', but this is equivalent in
211 this case and on some machines one insn instead of two. */
212 h ^= g;
215 return h & 0xffffffff;
218 /* DT_GNU_HASH hash function. Do not change this function; you will
219 cause invalid hash tables to be generated. */
221 unsigned long
222 bfd_elf_gnu_hash (const char *namearg)
224 const unsigned char *name = (const unsigned char *) namearg;
225 unsigned long h = 5381;
226 unsigned char ch;
228 while ((ch = *name++) != '\0')
229 h = (h << 5) + h + ch;
230 return h & 0xffffffff;
233 /* Create a tdata field OBJECT_SIZE bytes in length, zeroed out and with
234 the object_id field of an elf_obj_tdata field set to OBJECT_ID. */
235 bool
236 bfd_elf_allocate_object (bfd *abfd,
237 size_t object_size,
238 enum elf_target_id object_id)
240 BFD_ASSERT (object_size >= sizeof (struct elf_obj_tdata));
241 abfd->tdata.any = bfd_zalloc (abfd, object_size);
242 if (abfd->tdata.any == NULL)
243 return false;
245 elf_object_id (abfd) = object_id;
246 if (abfd->direction != read_direction)
248 struct output_elf_obj_tdata *o = bfd_zalloc (abfd, sizeof *o);
249 if (o == NULL)
250 return false;
251 elf_tdata (abfd)->o = o;
252 elf_program_header_size (abfd) = (bfd_size_type) -1;
254 return true;
258 bool
259 bfd_elf_make_object (bfd *abfd)
261 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
262 return bfd_elf_allocate_object (abfd, sizeof (struct elf_obj_tdata),
263 bed->target_id);
266 bool
267 bfd_elf_mkcorefile (bfd *abfd)
269 /* I think this can be done just like an object file. */
270 if (!abfd->xvec->_bfd_set_format[(int) bfd_object] (abfd))
271 return false;
272 elf_tdata (abfd)->core = bfd_zalloc (abfd, sizeof (*elf_tdata (abfd)->core));
273 return elf_tdata (abfd)->core != NULL;
276 char *
277 bfd_elf_get_str_section (bfd *abfd, unsigned int shindex)
279 Elf_Internal_Shdr **i_shdrp;
280 bfd_byte *shstrtab = NULL;
281 file_ptr offset;
282 bfd_size_type shstrtabsize;
284 i_shdrp = elf_elfsections (abfd);
285 if (i_shdrp == 0
286 || shindex >= elf_numsections (abfd)
287 || i_shdrp[shindex] == 0)
288 return NULL;
290 shstrtab = i_shdrp[shindex]->contents;
291 if (shstrtab == NULL)
293 /* No cached one, attempt to read, and cache what we read. */
294 offset = i_shdrp[shindex]->sh_offset;
295 shstrtabsize = i_shdrp[shindex]->sh_size;
297 /* Allocate and clear an extra byte at the end, to prevent crashes
298 in case the string table is not terminated. */
299 if (shstrtabsize + 1 <= 1
300 || bfd_seek (abfd, offset, SEEK_SET) != 0
301 || (shstrtab = _bfd_alloc_and_read (abfd, shstrtabsize + 1,
302 shstrtabsize)) == NULL)
304 /* Once we've failed to read it, make sure we don't keep
305 trying. Otherwise, we'll keep allocating space for
306 the string table over and over. */
307 i_shdrp[shindex]->sh_size = 0;
309 else
310 shstrtab[shstrtabsize] = '\0';
311 i_shdrp[shindex]->contents = shstrtab;
313 return (char *) shstrtab;
316 char *
317 bfd_elf_string_from_elf_section (bfd *abfd,
318 unsigned int shindex,
319 unsigned int strindex)
321 Elf_Internal_Shdr *hdr;
323 if (strindex == 0)
324 return "";
326 if (elf_elfsections (abfd) == NULL || shindex >= elf_numsections (abfd))
327 return NULL;
329 hdr = elf_elfsections (abfd)[shindex];
331 if (hdr->contents == NULL)
333 if (hdr->sh_type != SHT_STRTAB && hdr->sh_type < SHT_LOOS)
335 /* PR 17512: file: f057ec89. */
336 /* xgettext:c-format */
337 _bfd_error_handler (_("%pB: attempt to load strings from"
338 " a non-string section (number %d)"),
339 abfd, shindex);
340 return NULL;
343 if (bfd_elf_get_str_section (abfd, shindex) == NULL)
344 return NULL;
346 else
348 /* PR 24273: The string section's contents may have already
349 been loaded elsewhere, eg because a corrupt file has the
350 string section index in the ELF header pointing at a group
351 section. So be paranoid, and test that the last byte of
352 the section is zero. */
353 if (hdr->sh_size == 0 || hdr->contents[hdr->sh_size - 1] != 0)
354 return NULL;
357 if (strindex >= hdr->sh_size)
359 unsigned int shstrndx = elf_elfheader(abfd)->e_shstrndx;
360 _bfd_error_handler
361 /* xgettext:c-format */
362 (_("%pB: invalid string offset %u >= %" PRIu64 " for section `%s'"),
363 abfd, strindex, (uint64_t) hdr->sh_size,
364 (shindex == shstrndx && strindex == hdr->sh_name
365 ? ".shstrtab"
366 : bfd_elf_string_from_elf_section (abfd, shstrndx, hdr->sh_name)));
367 return NULL;
370 return ((char *) hdr->contents) + strindex;
373 /* Read and convert symbols to internal format.
374 SYMCOUNT specifies the number of symbols to read, starting from
375 symbol SYMOFFSET. If any of INTSYM_BUF, EXTSYM_BUF or EXTSHNDX_BUF
376 are non-NULL, they are used to store the internal symbols, external
377 symbols, and symbol section index extensions, respectively.
378 Returns a pointer to the internal symbol buffer (malloced if necessary)
379 or NULL if there were no symbols or some kind of problem. */
381 Elf_Internal_Sym *
382 bfd_elf_get_elf_syms (bfd *ibfd,
383 Elf_Internal_Shdr *symtab_hdr,
384 size_t symcount,
385 size_t symoffset,
386 Elf_Internal_Sym *intsym_buf,
387 void *extsym_buf,
388 Elf_External_Sym_Shndx *extshndx_buf)
390 Elf_Internal_Shdr *shndx_hdr;
391 void *alloc_ext;
392 const bfd_byte *esym;
393 Elf_External_Sym_Shndx *alloc_extshndx;
394 Elf_External_Sym_Shndx *shndx;
395 Elf_Internal_Sym *alloc_intsym;
396 Elf_Internal_Sym *isym;
397 Elf_Internal_Sym *isymend;
398 const struct elf_backend_data *bed;
399 size_t extsym_size;
400 size_t amt;
401 file_ptr pos;
403 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
404 abort ();
406 if (symcount == 0)
407 return intsym_buf;
409 /* Normal syms might have section extension entries. */
410 shndx_hdr = NULL;
411 if (elf_symtab_shndx_list (ibfd) != NULL)
413 elf_section_list * entry;
414 Elf_Internal_Shdr **sections = elf_elfsections (ibfd);
416 /* Find an index section that is linked to this symtab section. */
417 for (entry = elf_symtab_shndx_list (ibfd); entry != NULL; entry = entry->next)
419 /* PR 20063. */
420 if (entry->hdr.sh_link >= elf_numsections (ibfd))
421 continue;
423 if (sections[entry->hdr.sh_link] == symtab_hdr)
425 shndx_hdr = & entry->hdr;
426 break;
430 if (shndx_hdr == NULL)
432 if (symtab_hdr == &elf_symtab_hdr (ibfd))
433 /* Not really accurate, but this was how the old code used
434 to work. */
435 shndx_hdr = &elf_symtab_shndx_list (ibfd)->hdr;
436 /* Otherwise we do nothing. The assumption is that
437 the index table will not be needed. */
441 /* Read the symbols. */
442 alloc_ext = NULL;
443 alloc_extshndx = NULL;
444 alloc_intsym = NULL;
445 bed = get_elf_backend_data (ibfd);
446 extsym_size = bed->s->sizeof_sym;
447 if (_bfd_mul_overflow (symcount, extsym_size, &amt))
449 bfd_set_error (bfd_error_file_too_big);
450 intsym_buf = NULL;
451 goto out;
453 pos = symtab_hdr->sh_offset + symoffset * extsym_size;
454 if (extsym_buf == NULL)
456 alloc_ext = bfd_malloc (amt);
457 extsym_buf = alloc_ext;
459 if (extsym_buf == NULL
460 || bfd_seek (ibfd, pos, SEEK_SET) != 0
461 || bfd_bread (extsym_buf, amt, ibfd) != amt)
463 intsym_buf = NULL;
464 goto out;
467 if (shndx_hdr == NULL || shndx_hdr->sh_size == 0)
468 extshndx_buf = NULL;
469 else
471 if (_bfd_mul_overflow (symcount, sizeof (Elf_External_Sym_Shndx), &amt))
473 bfd_set_error (bfd_error_file_too_big);
474 intsym_buf = NULL;
475 goto out;
477 pos = shndx_hdr->sh_offset + symoffset * sizeof (Elf_External_Sym_Shndx);
478 if (extshndx_buf == NULL)
480 alloc_extshndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
481 extshndx_buf = alloc_extshndx;
483 if (extshndx_buf == NULL
484 || bfd_seek (ibfd, pos, SEEK_SET) != 0
485 || bfd_bread (extshndx_buf, amt, ibfd) != amt)
487 intsym_buf = NULL;
488 goto out;
492 if (intsym_buf == NULL)
494 if (_bfd_mul_overflow (symcount, sizeof (Elf_Internal_Sym), &amt))
496 bfd_set_error (bfd_error_file_too_big);
497 goto out;
499 alloc_intsym = (Elf_Internal_Sym *) bfd_malloc (amt);
500 intsym_buf = alloc_intsym;
501 if (intsym_buf == NULL)
502 goto out;
505 /* Convert the symbols to internal form. */
506 isymend = intsym_buf + symcount;
507 for (esym = (const bfd_byte *) extsym_buf, isym = intsym_buf,
508 shndx = extshndx_buf;
509 isym < isymend;
510 esym += extsym_size, isym++, shndx = shndx != NULL ? shndx + 1 : NULL)
511 if (!(*bed->s->swap_symbol_in) (ibfd, esym, shndx, isym))
513 symoffset += (esym - (bfd_byte *) extsym_buf) / extsym_size;
514 /* xgettext:c-format */
515 _bfd_error_handler (_("%pB symbol number %lu references"
516 " nonexistent SHT_SYMTAB_SHNDX section"),
517 ibfd, (unsigned long) symoffset);
518 free (alloc_intsym);
519 intsym_buf = NULL;
520 goto out;
523 out:
524 free (alloc_ext);
525 free (alloc_extshndx);
527 return intsym_buf;
530 /* Look up a symbol name. */
531 const char *
532 bfd_elf_sym_name (bfd *abfd,
533 Elf_Internal_Shdr *symtab_hdr,
534 Elf_Internal_Sym *isym,
535 asection *sym_sec)
537 const char *name;
538 unsigned int iname = isym->st_name;
539 unsigned int shindex = symtab_hdr->sh_link;
541 if (iname == 0 && ELF_ST_TYPE (isym->st_info) == STT_SECTION
542 /* Check for a bogus st_shndx to avoid crashing. */
543 && isym->st_shndx < elf_numsections (abfd))
545 iname = elf_elfsections (abfd)[isym->st_shndx]->sh_name;
546 shindex = elf_elfheader (abfd)->e_shstrndx;
549 name = bfd_elf_string_from_elf_section (abfd, shindex, iname);
550 if (name == NULL)
551 name = "(null)";
552 else if (sym_sec && *name == '\0')
553 name = bfd_section_name (sym_sec);
555 return name;
558 /* Elf_Internal_Shdr->contents is an array of these for SHT_GROUP
559 sections. The first element is the flags, the rest are section
560 pointers. */
562 typedef union elf_internal_group {
563 Elf_Internal_Shdr *shdr;
564 unsigned int flags;
565 } Elf_Internal_Group;
567 /* Return the name of the group signature symbol. Why isn't the
568 signature just a string? */
570 static const char *
571 group_signature (bfd *abfd, Elf_Internal_Shdr *ghdr)
573 Elf_Internal_Shdr *hdr;
574 unsigned char esym[sizeof (Elf64_External_Sym)];
575 Elf_External_Sym_Shndx eshndx;
576 Elf_Internal_Sym isym;
578 /* First we need to ensure the symbol table is available. Make sure
579 that it is a symbol table section. */
580 if (ghdr->sh_link >= elf_numsections (abfd))
581 return NULL;
582 hdr = elf_elfsections (abfd) [ghdr->sh_link];
583 if (hdr->sh_type != SHT_SYMTAB
584 || ! bfd_section_from_shdr (abfd, ghdr->sh_link))
585 return NULL;
587 /* Go read the symbol. */
588 hdr = &elf_tdata (abfd)->symtab_hdr;
589 if (bfd_elf_get_elf_syms (abfd, hdr, 1, ghdr->sh_info,
590 &isym, esym, &eshndx) == NULL)
591 return NULL;
593 return bfd_elf_sym_name (abfd, hdr, &isym, NULL);
596 /* Set next_in_group list pointer, and group name for NEWSECT. */
598 static bool
599 setup_group (bfd *abfd, Elf_Internal_Shdr *hdr, asection *newsect)
601 unsigned int num_group = elf_tdata (abfd)->num_group;
603 /* If num_group is zero, read in all SHT_GROUP sections. The count
604 is set to -1 if there are no SHT_GROUP sections. */
605 if (num_group == 0)
607 unsigned int i, shnum;
609 /* First count the number of groups. If we have a SHT_GROUP
610 section with just a flag word (ie. sh_size is 4), ignore it. */
611 shnum = elf_numsections (abfd);
612 num_group = 0;
614 #define IS_VALID_GROUP_SECTION_HEADER(shdr, minsize) \
615 ( (shdr)->sh_type == SHT_GROUP \
616 && (shdr)->sh_size >= minsize \
617 && (shdr)->sh_entsize == GRP_ENTRY_SIZE \
618 && ((shdr)->sh_size % GRP_ENTRY_SIZE) == 0)
620 for (i = 0; i < shnum; i++)
622 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
624 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
625 num_group += 1;
628 if (num_group == 0)
630 num_group = (unsigned) -1;
631 elf_tdata (abfd)->num_group = num_group;
632 elf_tdata (abfd)->group_sect_ptr = NULL;
634 else
636 /* We keep a list of elf section headers for group sections,
637 so we can find them quickly. */
638 size_t amt;
640 elf_tdata (abfd)->num_group = num_group;
641 amt = num_group * sizeof (Elf_Internal_Shdr *);
642 elf_tdata (abfd)->group_sect_ptr
643 = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
644 if (elf_tdata (abfd)->group_sect_ptr == NULL)
645 return false;
646 num_group = 0;
648 for (i = 0; i < shnum; i++)
650 Elf_Internal_Shdr *shdr = elf_elfsections (abfd)[i];
652 if (IS_VALID_GROUP_SECTION_HEADER (shdr, 2 * GRP_ENTRY_SIZE))
654 unsigned char *src;
655 Elf_Internal_Group *dest;
657 /* Make sure the group section has a BFD section
658 attached to it. */
659 if (!bfd_section_from_shdr (abfd, i))
660 return false;
662 /* Add to list of sections. */
663 elf_tdata (abfd)->group_sect_ptr[num_group] = shdr;
664 num_group += 1;
666 /* Read the raw contents. */
667 BFD_ASSERT (sizeof (*dest) >= 4 && sizeof (*dest) % 4 == 0);
668 shdr->contents = NULL;
669 if (_bfd_mul_overflow (shdr->sh_size,
670 sizeof (*dest) / 4, &amt)
671 || bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0
672 || !(shdr->contents
673 = _bfd_alloc_and_read (abfd, amt, shdr->sh_size)))
675 _bfd_error_handler
676 /* xgettext:c-format */
677 (_("%pB: invalid size field in group section"
678 " header: %#" PRIx64 ""),
679 abfd, (uint64_t) shdr->sh_size);
680 bfd_set_error (bfd_error_bad_value);
681 -- num_group;
682 continue;
685 /* Translate raw contents, a flag word followed by an
686 array of elf section indices all in target byte order,
687 to the flag word followed by an array of elf section
688 pointers. */
689 src = shdr->contents + shdr->sh_size;
690 dest = (Elf_Internal_Group *) (shdr->contents + amt);
692 while (1)
694 unsigned int idx;
696 src -= 4;
697 --dest;
698 idx = H_GET_32 (abfd, src);
699 if (src == shdr->contents)
701 dest->shdr = NULL;
702 dest->flags = idx;
703 if (shdr->bfd_section != NULL && (idx & GRP_COMDAT))
704 shdr->bfd_section->flags
705 |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
706 break;
708 if (idx < shnum)
710 dest->shdr = elf_elfsections (abfd)[idx];
711 /* PR binutils/23199: All sections in a
712 section group should be marked with
713 SHF_GROUP. But some tools generate
714 broken objects without SHF_GROUP. Fix
715 them up here. */
716 dest->shdr->sh_flags |= SHF_GROUP;
718 if (idx >= shnum
719 || dest->shdr->sh_type == SHT_GROUP)
721 _bfd_error_handler
722 (_("%pB: invalid entry in SHT_GROUP section [%u]"),
723 abfd, i);
724 dest->shdr = NULL;
730 /* PR 17510: Corrupt binaries might contain invalid groups. */
731 if (num_group != (unsigned) elf_tdata (abfd)->num_group)
733 elf_tdata (abfd)->num_group = num_group;
735 /* If all groups are invalid then fail. */
736 if (num_group == 0)
738 elf_tdata (abfd)->group_sect_ptr = NULL;
739 elf_tdata (abfd)->num_group = num_group = -1;
740 _bfd_error_handler
741 (_("%pB: no valid group sections found"), abfd);
742 bfd_set_error (bfd_error_bad_value);
748 if (num_group != (unsigned) -1)
750 unsigned int search_offset = elf_tdata (abfd)->group_search_offset;
751 unsigned int j;
753 for (j = 0; j < num_group; j++)
755 /* Begin search from previous found group. */
756 unsigned i = (j + search_offset) % num_group;
758 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
759 Elf_Internal_Group *idx;
760 bfd_size_type n_elt;
762 if (shdr == NULL)
763 continue;
765 idx = (Elf_Internal_Group *) shdr->contents;
766 if (idx == NULL || shdr->sh_size < 4)
768 /* See PR 21957 for a reproducer. */
769 /* xgettext:c-format */
770 _bfd_error_handler (_("%pB: group section '%pA' has no contents"),
771 abfd, shdr->bfd_section);
772 elf_tdata (abfd)->group_sect_ptr[i] = NULL;
773 bfd_set_error (bfd_error_bad_value);
774 return false;
776 n_elt = shdr->sh_size / 4;
778 /* Look through this group's sections to see if current
779 section is a member. */
780 while (--n_elt != 0)
781 if ((++idx)->shdr == hdr)
783 asection *s = NULL;
785 /* We are a member of this group. Go looking through
786 other members to see if any others are linked via
787 next_in_group. */
788 idx = (Elf_Internal_Group *) shdr->contents;
789 n_elt = shdr->sh_size / 4;
790 while (--n_elt != 0)
791 if ((++idx)->shdr != NULL
792 && (s = idx->shdr->bfd_section) != NULL
793 && elf_next_in_group (s) != NULL)
794 break;
795 if (n_elt != 0)
797 /* Snarf the group name from other member, and
798 insert current section in circular list. */
799 elf_group_name (newsect) = elf_group_name (s);
800 elf_next_in_group (newsect) = elf_next_in_group (s);
801 elf_next_in_group (s) = newsect;
803 else
805 const char *gname;
807 gname = group_signature (abfd, shdr);
808 if (gname == NULL)
809 return false;
810 elf_group_name (newsect) = gname;
812 /* Start a circular list with one element. */
813 elf_next_in_group (newsect) = newsect;
816 /* If the group section has been created, point to the
817 new member. */
818 if (shdr->bfd_section != NULL)
819 elf_next_in_group (shdr->bfd_section) = newsect;
821 elf_tdata (abfd)->group_search_offset = i;
822 j = num_group - 1;
823 break;
828 if (elf_group_name (newsect) == NULL)
830 /* xgettext:c-format */
831 _bfd_error_handler (_("%pB: no group info for section '%pA'"),
832 abfd, newsect);
833 /* PR 29532: Return true here, even though the group info has not been
834 read. Separate debug info files can have empty group sections, but
835 we do not want this to prevent them from being loaded as otherwise
836 GDB will not be able to use them. */
837 return true;
839 return true;
842 bool
843 _bfd_elf_setup_sections (bfd *abfd)
845 unsigned int i;
846 unsigned int num_group = elf_tdata (abfd)->num_group;
847 bool result = true;
848 asection *s;
850 /* Process SHF_LINK_ORDER. */
851 for (s = abfd->sections; s != NULL; s = s->next)
853 Elf_Internal_Shdr *this_hdr = &elf_section_data (s)->this_hdr;
854 if ((this_hdr->sh_flags & SHF_LINK_ORDER) != 0)
856 unsigned int elfsec = this_hdr->sh_link;
857 /* An sh_link value of 0 is now allowed. It indicates that linked
858 to section has already been discarded, but that the current
859 section has been retained for some other reason. This linking
860 section is still a candidate for later garbage collection
861 however. */
862 if (elfsec == 0)
864 elf_linked_to_section (s) = NULL;
866 else
868 asection *linksec = NULL;
870 if (elfsec < elf_numsections (abfd))
872 this_hdr = elf_elfsections (abfd)[elfsec];
873 linksec = this_hdr->bfd_section;
876 /* PR 1991, 2008:
877 Some strip/objcopy may leave an incorrect value in
878 sh_link. We don't want to proceed. */
879 if (linksec == NULL)
881 _bfd_error_handler
882 /* xgettext:c-format */
883 (_("%pB: sh_link [%d] in section `%pA' is incorrect"),
884 s->owner, elfsec, s);
885 result = false;
888 elf_linked_to_section (s) = linksec;
891 else if (this_hdr->sh_type == SHT_GROUP
892 && elf_next_in_group (s) == NULL)
894 _bfd_error_handler
895 /* xgettext:c-format */
896 (_("%pB: SHT_GROUP section [index %d] has no SHF_GROUP sections"),
897 abfd, elf_section_data (s)->this_idx);
898 result = false;
902 /* Process section groups. */
903 if (num_group == (unsigned) -1)
904 return result;
906 for (i = 0; i < num_group; i++)
908 Elf_Internal_Shdr *shdr = elf_tdata (abfd)->group_sect_ptr[i];
909 Elf_Internal_Group *idx;
910 unsigned int n_elt;
912 /* PR binutils/18758: Beware of corrupt binaries with invalid
913 group data. */
914 if (shdr == NULL || shdr->bfd_section == NULL || shdr->contents == NULL)
916 _bfd_error_handler
917 /* xgettext:c-format */
918 (_("%pB: section group entry number %u is corrupt"),
919 abfd, i);
920 result = false;
921 continue;
924 idx = (Elf_Internal_Group *) shdr->contents;
925 n_elt = shdr->sh_size / 4;
927 while (--n_elt != 0)
929 ++ idx;
931 if (idx->shdr == NULL)
932 continue;
933 else if (idx->shdr->bfd_section)
934 elf_sec_group (idx->shdr->bfd_section) = shdr->bfd_section;
935 else if (idx->shdr->sh_type != SHT_RELA
936 && idx->shdr->sh_type != SHT_REL)
938 /* There are some unknown sections in the group. */
939 _bfd_error_handler
940 /* xgettext:c-format */
941 (_("%pB: unknown type [%#x] section `%s' in group [%pA]"),
942 abfd,
943 idx->shdr->sh_type,
944 bfd_elf_string_from_elf_section (abfd,
945 (elf_elfheader (abfd)
946 ->e_shstrndx),
947 idx->shdr->sh_name),
948 shdr->bfd_section);
949 result = false;
954 return result;
957 bool
958 bfd_elf_is_group_section (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
960 return elf_next_in_group (sec) != NULL;
963 const char *
964 bfd_elf_group_name (bfd *abfd ATTRIBUTE_UNUSED, const asection *sec)
966 if (elf_sec_group (sec) != NULL)
967 return elf_group_name (sec);
968 return NULL;
971 /* This a copy of lto_section defined in GCC (lto-streamer.h). */
973 struct lto_section
975 int16_t major_version;
976 int16_t minor_version;
977 unsigned char slim_object;
979 /* Flags is a private field that is not defined publicly. */
980 uint16_t flags;
983 /* Make a BFD section from an ELF section. We store a pointer to the
984 BFD section in the bfd_section field of the header. */
986 bool
987 _bfd_elf_make_section_from_shdr (bfd *abfd,
988 Elf_Internal_Shdr *hdr,
989 const char *name,
990 int shindex)
992 asection *newsect;
993 flagword flags;
994 const struct elf_backend_data *bed;
995 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
997 if (hdr->bfd_section != NULL)
998 return true;
1000 newsect = bfd_make_section_anyway (abfd, name);
1001 if (newsect == NULL)
1002 return false;
1004 hdr->bfd_section = newsect;
1005 elf_section_data (newsect)->this_hdr = *hdr;
1006 elf_section_data (newsect)->this_idx = shindex;
1008 /* Always use the real type/flags. */
1009 elf_section_type (newsect) = hdr->sh_type;
1010 elf_section_flags (newsect) = hdr->sh_flags;
1012 newsect->filepos = hdr->sh_offset;
1014 flags = SEC_NO_FLAGS;
1015 if (hdr->sh_type != SHT_NOBITS)
1016 flags |= SEC_HAS_CONTENTS;
1017 if (hdr->sh_type == SHT_GROUP)
1018 flags |= SEC_GROUP;
1019 if ((hdr->sh_flags & SHF_ALLOC) != 0)
1021 flags |= SEC_ALLOC;
1022 if (hdr->sh_type != SHT_NOBITS)
1023 flags |= SEC_LOAD;
1025 if ((hdr->sh_flags & SHF_WRITE) == 0)
1026 flags |= SEC_READONLY;
1027 if ((hdr->sh_flags & SHF_EXECINSTR) != 0)
1028 flags |= SEC_CODE;
1029 else if ((flags & SEC_LOAD) != 0)
1030 flags |= SEC_DATA;
1031 if ((hdr->sh_flags & SHF_MERGE) != 0)
1033 flags |= SEC_MERGE;
1034 newsect->entsize = hdr->sh_entsize;
1036 if ((hdr->sh_flags & SHF_STRINGS) != 0)
1037 flags |= SEC_STRINGS;
1038 if (hdr->sh_flags & SHF_GROUP)
1039 if (!setup_group (abfd, hdr, newsect))
1040 return false;
1041 if ((hdr->sh_flags & SHF_TLS) != 0)
1042 flags |= SEC_THREAD_LOCAL;
1043 if ((hdr->sh_flags & SHF_EXCLUDE) != 0)
1044 flags |= SEC_EXCLUDE;
1046 switch (elf_elfheader (abfd)->e_ident[EI_OSABI])
1048 /* FIXME: We should not recognize SHF_GNU_MBIND for ELFOSABI_NONE,
1049 but binutils as of 2019-07-23 did not set the EI_OSABI header
1050 byte. */
1051 case ELFOSABI_GNU:
1052 case ELFOSABI_FREEBSD:
1053 if ((hdr->sh_flags & SHF_GNU_RETAIN) != 0)
1054 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_retain;
1055 /* Fall through */
1056 case ELFOSABI_NONE:
1057 if ((hdr->sh_flags & SHF_GNU_MBIND) != 0)
1058 elf_tdata (abfd)->has_gnu_osabi |= elf_gnu_osabi_mbind;
1059 break;
1062 if ((flags & SEC_ALLOC) == 0)
1064 /* The debugging sections appear to be recognized only by name,
1065 not any sort of flag. Their SEC_ALLOC bits are cleared. */
1066 if (name [0] == '.')
1068 if (startswith (name, ".debug")
1069 || startswith (name, ".gnu.debuglto_.debug_")
1070 || startswith (name, ".gnu.linkonce.wi.")
1071 || startswith (name, ".zdebug"))
1072 flags |= SEC_DEBUGGING | SEC_ELF_OCTETS;
1073 else if (startswith (name, GNU_BUILD_ATTRS_SECTION_NAME)
1074 || startswith (name, ".note.gnu"))
1076 flags |= SEC_ELF_OCTETS;
1077 opb = 1;
1079 else if (startswith (name, ".line")
1080 || startswith (name, ".stab")
1081 || strcmp (name, ".gdb_index") == 0)
1082 flags |= SEC_DEBUGGING;
1086 if (!bfd_set_section_vma (newsect, hdr->sh_addr / opb)
1087 || !bfd_set_section_size (newsect, hdr->sh_size)
1088 || !bfd_set_section_alignment (newsect, bfd_log2 (hdr->sh_addralign
1089 & -hdr->sh_addralign)))
1090 return false;
1092 /* As a GNU extension, if the name begins with .gnu.linkonce, we
1093 only link a single copy of the section. This is used to support
1094 g++. g++ will emit each template expansion in its own section.
1095 The symbols will be defined as weak, so that multiple definitions
1096 are permitted. The GNU linker extension is to actually discard
1097 all but one of the sections. */
1098 if (startswith (name, ".gnu.linkonce")
1099 && elf_next_in_group (newsect) == NULL)
1100 flags |= SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD;
1102 if (!bfd_set_section_flags (newsect, flags))
1103 return false;
1105 bed = get_elf_backend_data (abfd);
1106 if (bed->elf_backend_section_flags)
1107 if (!bed->elf_backend_section_flags (hdr))
1108 return false;
1110 /* We do not parse the PT_NOTE segments as we are interested even in the
1111 separate debug info files which may have the segments offsets corrupted.
1112 PT_NOTEs from the core files are currently not parsed using BFD. */
1113 if (hdr->sh_type == SHT_NOTE && hdr->sh_size != 0)
1115 bfd_byte *contents;
1117 if (!bfd_malloc_and_get_section (abfd, newsect, &contents))
1118 return false;
1120 elf_parse_notes (abfd, (char *) contents, hdr->sh_size,
1121 hdr->sh_offset, hdr->sh_addralign);
1122 free (contents);
1125 if ((newsect->flags & SEC_ALLOC) != 0)
1127 Elf_Internal_Phdr *phdr;
1128 unsigned int i, nload;
1130 /* Some ELF linkers produce binaries with all the program header
1131 p_paddr fields zero. If we have such a binary with more than
1132 one PT_LOAD header, then leave the section lma equal to vma
1133 so that we don't create sections with overlapping lma. */
1134 phdr = elf_tdata (abfd)->phdr;
1135 for (nload = 0, i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1136 if (phdr->p_paddr != 0)
1137 break;
1138 else if (phdr->p_type == PT_LOAD && phdr->p_memsz != 0)
1139 ++nload;
1140 if (i >= elf_elfheader (abfd)->e_phnum && nload > 1)
1141 return true;
1143 phdr = elf_tdata (abfd)->phdr;
1144 for (i = 0; i < elf_elfheader (abfd)->e_phnum; i++, phdr++)
1146 if (((phdr->p_type == PT_LOAD
1147 && (hdr->sh_flags & SHF_TLS) == 0)
1148 || phdr->p_type == PT_TLS)
1149 && ELF_SECTION_IN_SEGMENT (hdr, phdr))
1151 if ((newsect->flags & SEC_LOAD) == 0)
1152 newsect->lma = (phdr->p_paddr
1153 + hdr->sh_addr - phdr->p_vaddr) / opb;
1154 else
1155 /* We used to use the same adjustment for SEC_LOAD
1156 sections, but that doesn't work if the segment
1157 is packed with code from multiple VMAs.
1158 Instead we calculate the section LMA based on
1159 the segment LMA. It is assumed that the
1160 segment will contain sections with contiguous
1161 LMAs, even if the VMAs are not. */
1162 newsect->lma = (phdr->p_paddr
1163 + hdr->sh_offset - phdr->p_offset) / opb;
1165 /* With contiguous segments, we can't tell from file
1166 offsets whether a section with zero size should
1167 be placed at the end of one segment or the
1168 beginning of the next. Decide based on vaddr. */
1169 if (hdr->sh_addr >= phdr->p_vaddr
1170 && (hdr->sh_addr + hdr->sh_size
1171 <= phdr->p_vaddr + phdr->p_memsz))
1172 break;
1177 /* Compress/decompress DWARF debug sections with names: .debug_*,
1178 .zdebug_*, .gnu.debuglto_.debug_, after the section flags is set. */
1179 if ((newsect->flags & SEC_DEBUGGING) != 0
1180 && (newsect->flags & SEC_HAS_CONTENTS) != 0
1181 && (newsect->flags & SEC_ELF_OCTETS) != 0)
1183 enum { nothing, compress, decompress } action = nothing;
1184 int compression_header_size;
1185 bfd_size_type uncompressed_size;
1186 unsigned int uncompressed_align_power;
1187 enum compression_type ch_type = ch_none;
1188 bool compressed
1189 = bfd_is_section_compressed_info (abfd, newsect,
1190 &compression_header_size,
1191 &uncompressed_size,
1192 &uncompressed_align_power,
1193 &ch_type);
1195 /* Should we decompress? */
1196 if ((abfd->flags & BFD_DECOMPRESS) != 0 && compressed)
1197 action = decompress;
1199 /* Should we compress? Or convert to a different compression? */
1200 else if ((abfd->flags & BFD_COMPRESS) != 0
1201 && newsect->size != 0
1202 && compression_header_size >= 0
1203 && uncompressed_size > 0)
1205 if (!compressed)
1206 action = compress;
1207 else
1209 enum compression_type new_ch_type = ch_none;
1210 if ((abfd->flags & BFD_COMPRESS_GABI) != 0)
1211 new_ch_type = ((abfd->flags & BFD_COMPRESS_ZSTD) != 0
1212 ? ch_compress_zstd : ch_compress_zlib);
1213 if (new_ch_type != ch_type)
1214 action = compress;
1218 if (action == compress)
1220 if (!bfd_init_section_compress_status (abfd, newsect))
1222 _bfd_error_handler
1223 /* xgettext:c-format */
1224 (_("%pB: unable to compress section %s"), abfd, name);
1225 return false;
1228 else if (action == decompress)
1230 if (!bfd_init_section_decompress_status (abfd, newsect))
1232 _bfd_error_handler
1233 /* xgettext:c-format */
1234 (_("%pB: unable to decompress section %s"), abfd, name);
1235 return false;
1237 #ifndef HAVE_ZSTD
1238 if (newsect->compress_status == DECOMPRESS_SECTION_ZSTD)
1240 _bfd_error_handler
1241 /* xgettext:c-format */
1242 (_ ("%pB: section %s is compressed with zstd, but BFD "
1243 "is not built with zstd support"),
1244 abfd, name);
1245 newsect->compress_status = COMPRESS_SECTION_NONE;
1246 return false;
1248 #endif
1249 if (abfd->is_linker_input
1250 && name[1] == 'z')
1252 /* Rename section from .zdebug_* to .debug_* so that ld
1253 scripts will see this section as a debug section. */
1254 char *new_name = bfd_zdebug_name_to_debug (abfd, name);
1255 if (new_name == NULL)
1256 return false;
1257 bfd_rename_section (newsect, new_name);
1262 /* GCC uses .gnu.lto_.lto.<some_hash> as a LTO bytecode information
1263 section. */
1264 if (startswith (name, ".gnu.lto_.lto."))
1266 struct lto_section lsection;
1267 if (bfd_get_section_contents (abfd, newsect, &lsection, 0,
1268 sizeof (struct lto_section)))
1269 abfd->lto_slim_object = lsection.slim_object;
1272 return true;
1275 const char *const bfd_elf_section_type_names[] =
1277 "SHT_NULL", "SHT_PROGBITS", "SHT_SYMTAB", "SHT_STRTAB",
1278 "SHT_RELA", "SHT_HASH", "SHT_DYNAMIC", "SHT_NOTE",
1279 "SHT_NOBITS", "SHT_REL", "SHT_SHLIB", "SHT_DYNSYM",
1282 /* ELF relocs are against symbols. If we are producing relocatable
1283 output, and the reloc is against an external symbol, and nothing
1284 has given us any additional addend, the resulting reloc will also
1285 be against the same symbol. In such a case, we don't want to
1286 change anything about the way the reloc is handled, since it will
1287 all be done at final link time. Rather than put special case code
1288 into bfd_perform_relocation, all the reloc types use this howto
1289 function, or should call this function for relocatable output. */
1291 bfd_reloc_status_type
1292 bfd_elf_generic_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1293 arelent *reloc_entry,
1294 asymbol *symbol,
1295 void *data ATTRIBUTE_UNUSED,
1296 asection *input_section,
1297 bfd *output_bfd,
1298 char **error_message ATTRIBUTE_UNUSED)
1300 if (output_bfd != NULL
1301 && (symbol->flags & BSF_SECTION_SYM) == 0
1302 && (! reloc_entry->howto->partial_inplace
1303 || reloc_entry->addend == 0))
1305 reloc_entry->address += input_section->output_offset;
1306 return bfd_reloc_ok;
1309 /* In some cases the relocation should be treated as output section
1310 relative, as when linking ELF DWARF into PE COFF. Many ELF
1311 targets lack section relative relocations and instead use
1312 ordinary absolute relocations for references between DWARF
1313 sections. That is arguably a bug in those targets but it happens
1314 to work for the usual case of linking to non-loaded ELF debug
1315 sections with VMAs forced to zero. PE COFF on the other hand
1316 doesn't allow a section VMA of zero. */
1317 if (output_bfd == NULL
1318 && !reloc_entry->howto->pc_relative
1319 && (symbol->section->flags & SEC_DEBUGGING) != 0
1320 && (input_section->flags & SEC_DEBUGGING) != 0)
1321 reloc_entry->addend -= symbol->section->output_section->vma;
1323 return bfd_reloc_continue;
1326 /* Returns TRUE if section A matches section B.
1327 Names, addresses and links may be different, but everything else
1328 should be the same. */
1330 static bool
1331 section_match (const Elf_Internal_Shdr * a,
1332 const Elf_Internal_Shdr * b)
1334 if (a->sh_type != b->sh_type
1335 || ((a->sh_flags ^ b->sh_flags) & ~SHF_INFO_LINK) != 0
1336 || a->sh_addralign != b->sh_addralign
1337 || a->sh_entsize != b->sh_entsize)
1338 return false;
1339 if (a->sh_type == SHT_SYMTAB
1340 || a->sh_type == SHT_STRTAB)
1341 return true;
1342 return a->sh_size == b->sh_size;
1345 /* Find a section in OBFD that has the same characteristics
1346 as IHEADER. Return the index of this section or SHN_UNDEF if
1347 none can be found. Check's section HINT first, as this is likely
1348 to be the correct section. */
1350 static unsigned int
1351 find_link (const bfd *obfd, const Elf_Internal_Shdr *iheader,
1352 const unsigned int hint)
1354 Elf_Internal_Shdr ** oheaders = elf_elfsections (obfd);
1355 unsigned int i;
1357 BFD_ASSERT (iheader != NULL);
1359 /* See PR 20922 for a reproducer of the NULL test. */
1360 if (hint < elf_numsections (obfd)
1361 && oheaders[hint] != NULL
1362 && section_match (oheaders[hint], iheader))
1363 return hint;
1365 for (i = 1; i < elf_numsections (obfd); i++)
1367 Elf_Internal_Shdr * oheader = oheaders[i];
1369 if (oheader == NULL)
1370 continue;
1371 if (section_match (oheader, iheader))
1372 /* FIXME: Do we care if there is a potential for
1373 multiple matches ? */
1374 return i;
1377 return SHN_UNDEF;
1380 /* PR 19938: Attempt to set the ELF section header fields of an OS or
1381 Processor specific section, based upon a matching input section.
1382 Returns TRUE upon success, FALSE otherwise. */
1384 static bool
1385 copy_special_section_fields (const bfd *ibfd,
1386 bfd *obfd,
1387 const Elf_Internal_Shdr *iheader,
1388 Elf_Internal_Shdr *oheader,
1389 const unsigned int secnum)
1391 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
1392 const Elf_Internal_Shdr **iheaders
1393 = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1394 bool changed = false;
1395 unsigned int sh_link;
1397 if (oheader->sh_type == SHT_NOBITS)
1399 /* This is a feature for objcopy --only-keep-debug:
1400 When a section's type is changed to NOBITS, we preserve
1401 the sh_link and sh_info fields so that they can be
1402 matched up with the original.
1404 Note: Strictly speaking these assignments are wrong.
1405 The sh_link and sh_info fields should point to the
1406 relevent sections in the output BFD, which may not be in
1407 the same location as they were in the input BFD. But
1408 the whole point of this action is to preserve the
1409 original values of the sh_link and sh_info fields, so
1410 that they can be matched up with the section headers in
1411 the original file. So strictly speaking we may be
1412 creating an invalid ELF file, but it is only for a file
1413 that just contains debug info and only for sections
1414 without any contents. */
1415 if (oheader->sh_link == 0)
1416 oheader->sh_link = iheader->sh_link;
1417 if (oheader->sh_info == 0)
1418 oheader->sh_info = iheader->sh_info;
1419 return true;
1422 /* Allow the target a chance to decide how these fields should be set. */
1423 if (bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1424 iheader, oheader))
1425 return true;
1427 /* We have an iheader which might match oheader, and which has non-zero
1428 sh_info and/or sh_link fields. Attempt to follow those links and find
1429 the section in the output bfd which corresponds to the linked section
1430 in the input bfd. */
1431 if (iheader->sh_link != SHN_UNDEF)
1433 /* See PR 20931 for a reproducer. */
1434 if (iheader->sh_link >= elf_numsections (ibfd))
1436 _bfd_error_handler
1437 /* xgettext:c-format */
1438 (_("%pB: invalid sh_link field (%d) in section number %d"),
1439 ibfd, iheader->sh_link, secnum);
1440 return false;
1443 sh_link = find_link (obfd, iheaders[iheader->sh_link], iheader->sh_link);
1444 if (sh_link != SHN_UNDEF)
1446 oheader->sh_link = sh_link;
1447 changed = true;
1449 else
1450 /* FIXME: Should we install iheader->sh_link
1451 if we could not find a match ? */
1452 _bfd_error_handler
1453 /* xgettext:c-format */
1454 (_("%pB: failed to find link section for section %d"), obfd, secnum);
1457 if (iheader->sh_info)
1459 /* The sh_info field can hold arbitrary information, but if the
1460 SHF_LINK_INFO flag is set then it should be interpreted as a
1461 section index. */
1462 if (iheader->sh_flags & SHF_INFO_LINK)
1464 sh_link = find_link (obfd, iheaders[iheader->sh_info],
1465 iheader->sh_info);
1466 if (sh_link != SHN_UNDEF)
1467 oheader->sh_flags |= SHF_INFO_LINK;
1469 else
1470 /* No idea what it means - just copy it. */
1471 sh_link = iheader->sh_info;
1473 if (sh_link != SHN_UNDEF)
1475 oheader->sh_info = sh_link;
1476 changed = true;
1478 else
1479 _bfd_error_handler
1480 /* xgettext:c-format */
1481 (_("%pB: failed to find info section for section %d"), obfd, secnum);
1484 return changed;
1487 /* Copy the program header and other data from one object module to
1488 another. */
1490 bool
1491 _bfd_elf_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
1493 const Elf_Internal_Shdr **iheaders
1494 = (const Elf_Internal_Shdr **) elf_elfsections (ibfd);
1495 Elf_Internal_Shdr **oheaders = elf_elfsections (obfd);
1496 const struct elf_backend_data *bed;
1497 unsigned int i;
1499 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
1500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
1501 return true;
1503 if (!elf_flags_init (obfd))
1505 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
1506 elf_flags_init (obfd) = true;
1509 elf_gp (obfd) = elf_gp (ibfd);
1511 /* Also copy the EI_OSABI field. */
1512 elf_elfheader (obfd)->e_ident[EI_OSABI] =
1513 elf_elfheader (ibfd)->e_ident[EI_OSABI];
1515 /* If set, copy the EI_ABIVERSION field. */
1516 if (elf_elfheader (ibfd)->e_ident[EI_ABIVERSION])
1517 elf_elfheader (obfd)->e_ident[EI_ABIVERSION]
1518 = elf_elfheader (ibfd)->e_ident[EI_ABIVERSION];
1520 /* Copy object attributes. */
1521 _bfd_elf_copy_obj_attributes (ibfd, obfd);
1523 if (iheaders == NULL || oheaders == NULL)
1524 return true;
1526 bed = get_elf_backend_data (obfd);
1528 /* Possibly copy other fields in the section header. */
1529 for (i = 1; i < elf_numsections (obfd); i++)
1531 unsigned int j;
1532 Elf_Internal_Shdr * oheader = oheaders[i];
1534 /* Ignore ordinary sections. SHT_NOBITS sections are considered however
1535 because of a special case need for generating separate debug info
1536 files. See below for more details. */
1537 if (oheader == NULL
1538 || (oheader->sh_type != SHT_NOBITS
1539 && oheader->sh_type < SHT_LOOS))
1540 continue;
1542 /* Ignore empty sections, and sections whose
1543 fields have already been initialised. */
1544 if (oheader->sh_size == 0
1545 || (oheader->sh_info != 0 && oheader->sh_link != 0))
1546 continue;
1548 /* Scan for the matching section in the input bfd.
1549 First we try for a direct mapping between the input and
1550 output sections. */
1551 for (j = 1; j < elf_numsections (ibfd); j++)
1553 const Elf_Internal_Shdr * iheader = iheaders[j];
1555 if (iheader == NULL)
1556 continue;
1558 if (oheader->bfd_section != NULL
1559 && iheader->bfd_section != NULL
1560 && iheader->bfd_section->output_section != NULL
1561 && iheader->bfd_section->output_section == oheader->bfd_section)
1563 /* We have found a connection from the input section to
1564 the output section. Attempt to copy the header fields.
1565 If this fails then do not try any further sections -
1566 there should only be a one-to-one mapping between
1567 input and output. */
1568 if (!copy_special_section_fields (ibfd, obfd,
1569 iheader, oheader, i))
1570 j = elf_numsections (ibfd);
1571 break;
1575 if (j < elf_numsections (ibfd))
1576 continue;
1578 /* That failed. So try to deduce the corresponding input section.
1579 Unfortunately we cannot compare names as the output string table
1580 is empty, so instead we check size, address and type. */
1581 for (j = 1; j < elf_numsections (ibfd); j++)
1583 const Elf_Internal_Shdr * iheader = iheaders[j];
1585 if (iheader == NULL)
1586 continue;
1588 /* Try matching fields in the input section's header.
1589 Since --only-keep-debug turns all non-debug sections into
1590 SHT_NOBITS sections, the output SHT_NOBITS type matches any
1591 input type. */
1592 if ((oheader->sh_type == SHT_NOBITS
1593 || iheader->sh_type == oheader->sh_type)
1594 && (iheader->sh_flags & ~ SHF_INFO_LINK)
1595 == (oheader->sh_flags & ~ SHF_INFO_LINK)
1596 && iheader->sh_addralign == oheader->sh_addralign
1597 && iheader->sh_entsize == oheader->sh_entsize
1598 && iheader->sh_size == oheader->sh_size
1599 && iheader->sh_addr == oheader->sh_addr
1600 && (iheader->sh_info != oheader->sh_info
1601 || iheader->sh_link != oheader->sh_link))
1603 if (copy_special_section_fields (ibfd, obfd, iheader, oheader, i))
1604 break;
1608 if (j == elf_numsections (ibfd) && oheader->sh_type >= SHT_LOOS)
1610 /* Final attempt. Call the backend copy function
1611 with a NULL input section. */
1612 (void) bed->elf_backend_copy_special_section_fields (ibfd, obfd,
1613 NULL, oheader);
1617 return true;
1620 static const char *
1621 get_segment_type (unsigned int p_type)
1623 const char *pt;
1624 switch (p_type)
1626 case PT_NULL: pt = "NULL"; break;
1627 case PT_LOAD: pt = "LOAD"; break;
1628 case PT_DYNAMIC: pt = "DYNAMIC"; break;
1629 case PT_INTERP: pt = "INTERP"; break;
1630 case PT_NOTE: pt = "NOTE"; break;
1631 case PT_SHLIB: pt = "SHLIB"; break;
1632 case PT_PHDR: pt = "PHDR"; break;
1633 case PT_TLS: pt = "TLS"; break;
1634 case PT_GNU_EH_FRAME: pt = "EH_FRAME"; break;
1635 case PT_GNU_STACK: pt = "STACK"; break;
1636 case PT_GNU_RELRO: pt = "RELRO"; break;
1637 case PT_GNU_SFRAME: pt = "SFRAME"; break;
1638 default: pt = NULL; break;
1640 return pt;
1643 /* Print out the program headers. */
1645 bool
1646 _bfd_elf_print_private_bfd_data (bfd *abfd, void *farg)
1648 FILE *f = (FILE *) farg;
1649 Elf_Internal_Phdr *p;
1650 asection *s;
1651 bfd_byte *dynbuf = NULL;
1653 p = elf_tdata (abfd)->phdr;
1654 if (p != NULL)
1656 unsigned int i, c;
1658 fprintf (f, _("\nProgram Header:\n"));
1659 c = elf_elfheader (abfd)->e_phnum;
1660 for (i = 0; i < c; i++, p++)
1662 const char *pt = get_segment_type (p->p_type);
1663 char buf[20];
1665 if (pt == NULL)
1667 sprintf (buf, "0x%lx", p->p_type);
1668 pt = buf;
1670 fprintf (f, "%8s off 0x", pt);
1671 bfd_fprintf_vma (abfd, f, p->p_offset);
1672 fprintf (f, " vaddr 0x");
1673 bfd_fprintf_vma (abfd, f, p->p_vaddr);
1674 fprintf (f, " paddr 0x");
1675 bfd_fprintf_vma (abfd, f, p->p_paddr);
1676 fprintf (f, " align 2**%u\n", bfd_log2 (p->p_align));
1677 fprintf (f, " filesz 0x");
1678 bfd_fprintf_vma (abfd, f, p->p_filesz);
1679 fprintf (f, " memsz 0x");
1680 bfd_fprintf_vma (abfd, f, p->p_memsz);
1681 fprintf (f, " flags %c%c%c",
1682 (p->p_flags & PF_R) != 0 ? 'r' : '-',
1683 (p->p_flags & PF_W) != 0 ? 'w' : '-',
1684 (p->p_flags & PF_X) != 0 ? 'x' : '-');
1685 if ((p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X)) != 0)
1686 fprintf (f, " %lx", p->p_flags &~ (unsigned) (PF_R | PF_W | PF_X));
1687 fprintf (f, "\n");
1691 s = bfd_get_section_by_name (abfd, ".dynamic");
1692 if (s != NULL && (s->flags & SEC_HAS_CONTENTS) != 0)
1694 unsigned int elfsec;
1695 unsigned long shlink;
1696 bfd_byte *extdyn, *extdynend;
1697 size_t extdynsize;
1698 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1700 fprintf (f, _("\nDynamic Section:\n"));
1702 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
1703 goto error_return;
1705 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1706 if (elfsec == SHN_BAD)
1707 goto error_return;
1708 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1710 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1711 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1713 for (extdyn = dynbuf, extdynend = dynbuf + s->size;
1714 (size_t) (extdynend - extdyn) >= extdynsize;
1715 extdyn += extdynsize)
1717 Elf_Internal_Dyn dyn;
1718 const char *name = "";
1719 char ab[20];
1720 bool stringp;
1721 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
1723 (*swap_dyn_in) (abfd, extdyn, &dyn);
1725 if (dyn.d_tag == DT_NULL)
1726 break;
1728 stringp = false;
1729 switch (dyn.d_tag)
1731 default:
1732 if (bed->elf_backend_get_target_dtag)
1733 name = (*bed->elf_backend_get_target_dtag) (dyn.d_tag);
1735 if (!strcmp (name, ""))
1737 sprintf (ab, "%#" PRIx64, (uint64_t) dyn.d_tag);
1738 name = ab;
1740 break;
1742 case DT_NEEDED: name = "NEEDED"; stringp = true; break;
1743 case DT_PLTRELSZ: name = "PLTRELSZ"; break;
1744 case DT_PLTGOT: name = "PLTGOT"; break;
1745 case DT_HASH: name = "HASH"; break;
1746 case DT_STRTAB: name = "STRTAB"; break;
1747 case DT_SYMTAB: name = "SYMTAB"; break;
1748 case DT_RELA: name = "RELA"; break;
1749 case DT_RELASZ: name = "RELASZ"; break;
1750 case DT_RELAENT: name = "RELAENT"; break;
1751 case DT_STRSZ: name = "STRSZ"; break;
1752 case DT_SYMENT: name = "SYMENT"; break;
1753 case DT_INIT: name = "INIT"; break;
1754 case DT_FINI: name = "FINI"; break;
1755 case DT_SONAME: name = "SONAME"; stringp = true; break;
1756 case DT_RPATH: name = "RPATH"; stringp = true; break;
1757 case DT_SYMBOLIC: name = "SYMBOLIC"; break;
1758 case DT_REL: name = "REL"; break;
1759 case DT_RELSZ: name = "RELSZ"; break;
1760 case DT_RELENT: name = "RELENT"; break;
1761 case DT_RELR: name = "RELR"; break;
1762 case DT_RELRSZ: name = "RELRSZ"; break;
1763 case DT_RELRENT: name = "RELRENT"; break;
1764 case DT_PLTREL: name = "PLTREL"; break;
1765 case DT_DEBUG: name = "DEBUG"; break;
1766 case DT_TEXTREL: name = "TEXTREL"; break;
1767 case DT_JMPREL: name = "JMPREL"; break;
1768 case DT_BIND_NOW: name = "BIND_NOW"; break;
1769 case DT_INIT_ARRAY: name = "INIT_ARRAY"; break;
1770 case DT_FINI_ARRAY: name = "FINI_ARRAY"; break;
1771 case DT_INIT_ARRAYSZ: name = "INIT_ARRAYSZ"; break;
1772 case DT_FINI_ARRAYSZ: name = "FINI_ARRAYSZ"; break;
1773 case DT_RUNPATH: name = "RUNPATH"; stringp = true; break;
1774 case DT_FLAGS: name = "FLAGS"; break;
1775 case DT_PREINIT_ARRAY: name = "PREINIT_ARRAY"; break;
1776 case DT_PREINIT_ARRAYSZ: name = "PREINIT_ARRAYSZ"; break;
1777 case DT_CHECKSUM: name = "CHECKSUM"; break;
1778 case DT_PLTPADSZ: name = "PLTPADSZ"; break;
1779 case DT_MOVEENT: name = "MOVEENT"; break;
1780 case DT_MOVESZ: name = "MOVESZ"; break;
1781 case DT_FEATURE: name = "FEATURE"; break;
1782 case DT_POSFLAG_1: name = "POSFLAG_1"; break;
1783 case DT_SYMINSZ: name = "SYMINSZ"; break;
1784 case DT_SYMINENT: name = "SYMINENT"; break;
1785 case DT_CONFIG: name = "CONFIG"; stringp = true; break;
1786 case DT_DEPAUDIT: name = "DEPAUDIT"; stringp = true; break;
1787 case DT_AUDIT: name = "AUDIT"; stringp = true; break;
1788 case DT_PLTPAD: name = "PLTPAD"; break;
1789 case DT_MOVETAB: name = "MOVETAB"; break;
1790 case DT_SYMINFO: name = "SYMINFO"; break;
1791 case DT_RELACOUNT: name = "RELACOUNT"; break;
1792 case DT_RELCOUNT: name = "RELCOUNT"; break;
1793 case DT_FLAGS_1: name = "FLAGS_1"; break;
1794 case DT_VERSYM: name = "VERSYM"; break;
1795 case DT_VERDEF: name = "VERDEF"; break;
1796 case DT_VERDEFNUM: name = "VERDEFNUM"; break;
1797 case DT_VERNEED: name = "VERNEED"; break;
1798 case DT_VERNEEDNUM: name = "VERNEEDNUM"; break;
1799 case DT_AUXILIARY: name = "AUXILIARY"; stringp = true; break;
1800 case DT_USED: name = "USED"; break;
1801 case DT_FILTER: name = "FILTER"; stringp = true; break;
1802 case DT_GNU_HASH: name = "GNU_HASH"; break;
1805 fprintf (f, " %-20s ", name);
1806 if (! stringp)
1808 fprintf (f, "0x");
1809 bfd_fprintf_vma (abfd, f, dyn.d_un.d_val);
1811 else
1813 const char *string;
1814 unsigned int tagv = dyn.d_un.d_val;
1816 string = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1817 if (string == NULL)
1818 goto error_return;
1819 fprintf (f, "%s", string);
1821 fprintf (f, "\n");
1824 free (dynbuf);
1825 dynbuf = NULL;
1828 if ((elf_dynverdef (abfd) != 0 && elf_tdata (abfd)->verdef == NULL)
1829 || (elf_dynverref (abfd) != 0 && elf_tdata (abfd)->verref == NULL))
1831 if (! _bfd_elf_slurp_version_tables (abfd, false))
1832 return false;
1835 if (elf_dynverdef (abfd) != 0)
1837 Elf_Internal_Verdef *t;
1839 fprintf (f, _("\nVersion definitions:\n"));
1840 for (t = elf_tdata (abfd)->verdef; t != NULL; t = t->vd_nextdef)
1842 fprintf (f, "%d 0x%2.2x 0x%8.8lx %s\n", t->vd_ndx,
1843 t->vd_flags, t->vd_hash,
1844 t->vd_nodename ? t->vd_nodename : "<corrupt>");
1845 if (t->vd_auxptr != NULL && t->vd_auxptr->vda_nextptr != NULL)
1847 Elf_Internal_Verdaux *a;
1849 fprintf (f, "\t");
1850 for (a = t->vd_auxptr->vda_nextptr;
1851 a != NULL;
1852 a = a->vda_nextptr)
1853 fprintf (f, "%s ",
1854 a->vda_nodename ? a->vda_nodename : "<corrupt>");
1855 fprintf (f, "\n");
1860 if (elf_dynverref (abfd) != 0)
1862 Elf_Internal_Verneed *t;
1864 fprintf (f, _("\nVersion References:\n"));
1865 for (t = elf_tdata (abfd)->verref; t != NULL; t = t->vn_nextref)
1867 Elf_Internal_Vernaux *a;
1869 fprintf (f, _(" required from %s:\n"),
1870 t->vn_filename ? t->vn_filename : "<corrupt>");
1871 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1872 fprintf (f, " 0x%8.8lx 0x%2.2x %2.2d %s\n", a->vna_hash,
1873 a->vna_flags, a->vna_other,
1874 a->vna_nodename ? a->vna_nodename : "<corrupt>");
1878 return true;
1880 error_return:
1881 free (dynbuf);
1882 return false;
1885 /* Get version name. If BASE_P is TRUE, return "Base" for VER_FLG_BASE
1886 and return symbol version for symbol version itself. */
1888 const char *
1889 _bfd_elf_get_symbol_version_string (bfd *abfd, asymbol *symbol,
1890 bool base_p,
1891 bool *hidden)
1893 const char *version_string = NULL;
1894 if (elf_dynversym (abfd) != 0
1895 && (elf_dynverdef (abfd) != 0 || elf_dynverref (abfd) != 0))
1897 unsigned int vernum = ((elf_symbol_type *) symbol)->version;
1899 *hidden = (vernum & VERSYM_HIDDEN) != 0;
1900 vernum &= VERSYM_VERSION;
1902 if (vernum == 0)
1903 version_string = "";
1904 else if (vernum == 1
1905 && (vernum > elf_tdata (abfd)->cverdefs
1906 || (elf_tdata (abfd)->verdef[0].vd_flags
1907 == VER_FLG_BASE)))
1908 version_string = base_p ? "Base" : "";
1909 else if (vernum <= elf_tdata (abfd)->cverdefs)
1911 const char *nodename
1912 = elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1913 version_string = "";
1914 if (base_p
1915 || nodename == NULL
1916 || symbol->name == NULL
1917 || strcmp (symbol->name, nodename) != 0)
1918 version_string = nodename;
1920 else
1922 Elf_Internal_Verneed *t;
1924 version_string = _("<corrupt>");
1925 for (t = elf_tdata (abfd)->verref;
1926 t != NULL;
1927 t = t->vn_nextref)
1929 Elf_Internal_Vernaux *a;
1931 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1933 if (a->vna_other == vernum)
1935 *hidden = true;
1936 version_string = a->vna_nodename;
1937 break;
1943 return version_string;
1946 /* Display ELF-specific fields of a symbol. */
1948 void
1949 bfd_elf_print_symbol (bfd *abfd,
1950 void *filep,
1951 asymbol *symbol,
1952 bfd_print_symbol_type how)
1954 FILE *file = (FILE *) filep;
1955 switch (how)
1957 case bfd_print_symbol_name:
1958 fprintf (file, "%s", symbol->name);
1959 break;
1960 case bfd_print_symbol_more:
1961 fprintf (file, "elf ");
1962 bfd_fprintf_vma (abfd, file, symbol->value);
1963 fprintf (file, " %x", symbol->flags);
1964 break;
1965 case bfd_print_symbol_all:
1967 const char *section_name;
1968 const char *name = NULL;
1969 const struct elf_backend_data *bed;
1970 unsigned char st_other;
1971 bfd_vma val;
1972 const char *version_string;
1973 bool hidden;
1975 section_name = symbol->section ? symbol->section->name : "(*none*)";
1977 bed = get_elf_backend_data (abfd);
1978 if (bed->elf_backend_print_symbol_all)
1979 name = (*bed->elf_backend_print_symbol_all) (abfd, filep, symbol);
1981 if (name == NULL)
1983 name = symbol->name;
1984 bfd_print_symbol_vandf (abfd, file, symbol);
1987 fprintf (file, " %s\t", section_name);
1988 /* Print the "other" value for a symbol. For common symbols,
1989 we've already printed the size; now print the alignment.
1990 For other symbols, we have no specified alignment, and
1991 we've printed the address; now print the size. */
1992 if (symbol->section && bfd_is_com_section (symbol->section))
1993 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
1994 else
1995 val = ((elf_symbol_type *) symbol)->internal_elf_sym.st_size;
1996 bfd_fprintf_vma (abfd, file, val);
1998 /* If we have version information, print it. */
1999 version_string = _bfd_elf_get_symbol_version_string (abfd,
2000 symbol,
2001 true,
2002 &hidden);
2003 if (version_string)
2005 if (!hidden)
2006 fprintf (file, " %-11s", version_string);
2007 else
2009 int i;
2011 fprintf (file, " (%s)", version_string);
2012 for (i = 10 - strlen (version_string); i > 0; --i)
2013 putc (' ', file);
2017 /* If the st_other field is not zero, print it. */
2018 st_other = ((elf_symbol_type *) symbol)->internal_elf_sym.st_other;
2020 switch (st_other)
2022 case 0: break;
2023 case STV_INTERNAL: fprintf (file, " .internal"); break;
2024 case STV_HIDDEN: fprintf (file, " .hidden"); break;
2025 case STV_PROTECTED: fprintf (file, " .protected"); break;
2026 default:
2027 /* Some other non-defined flags are also present, so print
2028 everything hex. */
2029 fprintf (file, " 0x%02x", (unsigned int) st_other);
2032 fprintf (file, " %s", name);
2034 break;
2038 /* ELF .o/exec file reading */
2040 /* Create a new bfd section from an ELF section header. */
2042 bool
2043 bfd_section_from_shdr (bfd *abfd, unsigned int shindex)
2045 Elf_Internal_Shdr *hdr;
2046 Elf_Internal_Ehdr *ehdr;
2047 const struct elf_backend_data *bed;
2048 const char *name;
2049 bool ret = true;
2051 if (shindex >= elf_numsections (abfd))
2052 return false;
2054 /* PR17512: A corrupt ELF binary might contain a loop of sections via
2055 sh_link or sh_info. Detect this here, by refusing to load a
2056 section that we are already in the process of loading. */
2057 if (elf_tdata (abfd)->being_created[shindex])
2059 _bfd_error_handler
2060 (_("%pB: warning: loop in section dependencies detected"), abfd);
2061 return false;
2063 elf_tdata (abfd)->being_created[shindex] = true;
2065 hdr = elf_elfsections (abfd)[shindex];
2066 ehdr = elf_elfheader (abfd);
2067 name = bfd_elf_string_from_elf_section (abfd, ehdr->e_shstrndx,
2068 hdr->sh_name);
2069 if (name == NULL)
2070 goto fail;
2072 bed = get_elf_backend_data (abfd);
2073 switch (hdr->sh_type)
2075 case SHT_NULL:
2076 /* Inactive section. Throw it away. */
2077 goto success;
2079 case SHT_PROGBITS: /* Normal section with contents. */
2080 case SHT_NOBITS: /* .bss section. */
2081 case SHT_HASH: /* .hash section. */
2082 case SHT_NOTE: /* .note section. */
2083 case SHT_INIT_ARRAY: /* .init_array section. */
2084 case SHT_FINI_ARRAY: /* .fini_array section. */
2085 case SHT_PREINIT_ARRAY: /* .preinit_array section. */
2086 case SHT_GNU_LIBLIST: /* .gnu.liblist section. */
2087 case SHT_GNU_HASH: /* .gnu.hash section. */
2088 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2089 goto success;
2091 case SHT_DYNAMIC: /* Dynamic linking information. */
2092 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2093 goto fail;
2095 if (hdr->sh_link > elf_numsections (abfd))
2097 /* PR 10478: Accept Solaris binaries with a sh_link field
2098 set to SHN_BEFORE (LORESERVE) or SHN_AFTER (LORESERVE+1). */
2099 switch (bfd_get_arch (abfd))
2101 case bfd_arch_i386:
2102 case bfd_arch_sparc:
2103 if (hdr->sh_link == (SHN_LORESERVE & 0xffff)
2104 || hdr->sh_link == ((SHN_LORESERVE + 1) & 0xffff))
2105 break;
2106 /* Otherwise fall through. */
2107 default:
2108 goto fail;
2111 else if (elf_elfsections (abfd)[hdr->sh_link] == NULL)
2112 goto fail;
2113 else if (elf_elfsections (abfd)[hdr->sh_link]->sh_type != SHT_STRTAB)
2115 Elf_Internal_Shdr *dynsymhdr;
2117 /* The shared libraries distributed with hpux11 have a bogus
2118 sh_link field for the ".dynamic" section. Find the
2119 string table for the ".dynsym" section instead. */
2120 if (elf_dynsymtab (abfd) != 0)
2122 dynsymhdr = elf_elfsections (abfd)[elf_dynsymtab (abfd)];
2123 hdr->sh_link = dynsymhdr->sh_link;
2125 else
2127 unsigned int i, num_sec;
2129 num_sec = elf_numsections (abfd);
2130 for (i = 1; i < num_sec; i++)
2132 dynsymhdr = elf_elfsections (abfd)[i];
2133 if (dynsymhdr->sh_type == SHT_DYNSYM)
2135 hdr->sh_link = dynsymhdr->sh_link;
2136 break;
2141 goto success;
2143 case SHT_SYMTAB: /* A symbol table. */
2144 if (elf_onesymtab (abfd) == shindex)
2145 goto success;
2147 if (hdr->sh_entsize != bed->s->sizeof_sym)
2148 goto fail;
2150 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2152 if (hdr->sh_size != 0)
2153 goto fail;
2154 /* Some assemblers erroneously set sh_info to one with a
2155 zero sh_size. ld sees this as a global symbol count
2156 of (unsigned) -1. Fix it here. */
2157 hdr->sh_info = 0;
2158 goto success;
2161 /* PR 18854: A binary might contain more than one symbol table.
2162 Unusual, but possible. Warn, but continue. */
2163 if (elf_onesymtab (abfd) != 0)
2165 _bfd_error_handler
2166 /* xgettext:c-format */
2167 (_("%pB: warning: multiple symbol tables detected"
2168 " - ignoring the table in section %u"),
2169 abfd, shindex);
2170 goto success;
2172 elf_onesymtab (abfd) = shindex;
2173 elf_symtab_hdr (abfd) = *hdr;
2174 elf_elfsections (abfd)[shindex] = hdr = & elf_symtab_hdr (abfd);
2175 abfd->flags |= HAS_SYMS;
2177 /* Sometimes a shared object will map in the symbol table. If
2178 SHF_ALLOC is set, and this is a shared object, then we also
2179 treat this section as a BFD section. We can not base the
2180 decision purely on SHF_ALLOC, because that flag is sometimes
2181 set in a relocatable object file, which would confuse the
2182 linker. */
2183 if ((hdr->sh_flags & SHF_ALLOC) != 0
2184 && (abfd->flags & DYNAMIC) != 0
2185 && ! _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2186 shindex))
2187 goto fail;
2189 /* Go looking for SHT_SYMTAB_SHNDX too, since if there is one we
2190 can't read symbols without that section loaded as well. It
2191 is most likely specified by the next section header. */
2193 elf_section_list * entry;
2194 unsigned int i, num_sec;
2196 for (entry = elf_symtab_shndx_list (abfd); entry; entry = entry->next)
2197 if (entry->hdr.sh_link == shindex)
2198 goto success;
2200 num_sec = elf_numsections (abfd);
2201 for (i = shindex + 1; i < num_sec; i++)
2203 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2205 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2206 && hdr2->sh_link == shindex)
2207 break;
2210 if (i == num_sec)
2211 for (i = 1; i < shindex; i++)
2213 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2215 if (hdr2->sh_type == SHT_SYMTAB_SHNDX
2216 && hdr2->sh_link == shindex)
2217 break;
2220 if (i != shindex)
2221 ret = bfd_section_from_shdr (abfd, i);
2222 /* else FIXME: we have failed to find the symbol table.
2223 Should we issue an error? */
2224 goto success;
2227 case SHT_DYNSYM: /* A dynamic symbol table. */
2228 if (elf_dynsymtab (abfd) == shindex)
2229 goto success;
2231 if (hdr->sh_entsize != bed->s->sizeof_sym)
2232 goto fail;
2234 if (hdr->sh_info * hdr->sh_entsize > hdr->sh_size)
2236 if (hdr->sh_size != 0)
2237 goto fail;
2239 /* Some linkers erroneously set sh_info to one with a
2240 zero sh_size. ld sees this as a global symbol count
2241 of (unsigned) -1. Fix it here. */
2242 hdr->sh_info = 0;
2243 goto success;
2246 /* PR 18854: A binary might contain more than one dynamic symbol table.
2247 Unusual, but possible. Warn, but continue. */
2248 if (elf_dynsymtab (abfd) != 0)
2250 _bfd_error_handler
2251 /* xgettext:c-format */
2252 (_("%pB: warning: multiple dynamic symbol tables detected"
2253 " - ignoring the table in section %u"),
2254 abfd, shindex);
2255 goto success;
2257 elf_dynsymtab (abfd) = shindex;
2258 elf_tdata (abfd)->dynsymtab_hdr = *hdr;
2259 elf_elfsections (abfd)[shindex] = hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2260 abfd->flags |= HAS_SYMS;
2262 /* Besides being a symbol table, we also treat this as a regular
2263 section, so that objcopy can handle it. */
2264 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2265 goto success;
2267 case SHT_SYMTAB_SHNDX: /* Symbol section indices when >64k sections. */
2269 elf_section_list * entry;
2271 for (entry = elf_symtab_shndx_list (abfd); entry; entry = entry->next)
2272 if (entry->ndx == shindex)
2273 goto success;
2275 entry = bfd_alloc (abfd, sizeof (*entry));
2276 if (entry == NULL)
2277 goto fail;
2278 entry->ndx = shindex;
2279 entry->hdr = * hdr;
2280 entry->next = elf_symtab_shndx_list (abfd);
2281 elf_symtab_shndx_list (abfd) = entry;
2282 elf_elfsections (abfd)[shindex] = & entry->hdr;
2283 goto success;
2286 case SHT_STRTAB: /* A string table. */
2287 if (hdr->bfd_section != NULL)
2288 goto success;
2290 if (ehdr->e_shstrndx == shindex)
2292 elf_tdata (abfd)->shstrtab_hdr = *hdr;
2293 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
2294 goto success;
2297 if (elf_elfsections (abfd)[elf_onesymtab (abfd)]->sh_link == shindex)
2299 symtab_strtab:
2300 elf_tdata (abfd)->strtab_hdr = *hdr;
2301 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
2302 goto success;
2305 if (elf_elfsections (abfd)[elf_dynsymtab (abfd)]->sh_link == shindex)
2307 dynsymtab_strtab:
2308 elf_tdata (abfd)->dynstrtab_hdr = *hdr;
2309 hdr = &elf_tdata (abfd)->dynstrtab_hdr;
2310 elf_elfsections (abfd)[shindex] = hdr;
2311 /* We also treat this as a regular section, so that objcopy
2312 can handle it. */
2313 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name,
2314 shindex);
2315 goto success;
2318 /* If the string table isn't one of the above, then treat it as a
2319 regular section. We need to scan all the headers to be sure,
2320 just in case this strtab section appeared before the above. */
2321 if (elf_onesymtab (abfd) == 0 || elf_dynsymtab (abfd) == 0)
2323 unsigned int i, num_sec;
2325 num_sec = elf_numsections (abfd);
2326 for (i = 1; i < num_sec; i++)
2328 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
2329 if (hdr2->sh_link == shindex)
2331 /* Prevent endless recursion on broken objects. */
2332 if (i == shindex)
2333 goto fail;
2334 if (! bfd_section_from_shdr (abfd, i))
2335 goto fail;
2336 if (elf_onesymtab (abfd) == i)
2337 goto symtab_strtab;
2338 if (elf_dynsymtab (abfd) == i)
2339 goto dynsymtab_strtab;
2343 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2344 goto success;
2346 case SHT_REL:
2347 case SHT_RELA:
2348 case SHT_RELR:
2349 /* *These* do a lot of work -- but build no sections! */
2351 asection *target_sect;
2352 Elf_Internal_Shdr *hdr2, **p_hdr;
2353 unsigned int num_sec = elf_numsections (abfd);
2354 struct bfd_elf_section_data *esdt;
2355 bfd_size_type size;
2357 if (hdr->sh_type == SHT_REL)
2358 size = bed->s->sizeof_rel;
2359 else if (hdr->sh_type == SHT_RELA)
2360 size = bed->s->sizeof_rela;
2361 else
2362 size = bed->s->arch_size / 8;
2363 if (hdr->sh_entsize != size)
2364 goto fail;
2366 /* Check for a bogus link to avoid crashing. */
2367 if (hdr->sh_link >= num_sec)
2369 _bfd_error_handler
2370 /* xgettext:c-format */
2371 (_("%pB: invalid link %u for reloc section %s (index %u)"),
2372 abfd, hdr->sh_link, name, shindex);
2373 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2374 goto success;
2377 /* Get the symbol table. */
2378 if ((elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_SYMTAB
2379 || elf_elfsections (abfd)[hdr->sh_link]->sh_type == SHT_DYNSYM)
2380 && ! bfd_section_from_shdr (abfd, hdr->sh_link))
2381 goto fail;
2383 /* If this is an alloc section in an executable or shared
2384 library, or the reloc section does not use the main symbol
2385 table we don't treat it as a reloc section. BFD can't
2386 adequately represent such a section, so at least for now,
2387 we don't try. We just present it as a normal section. We
2388 also can't use it as a reloc section if it points to the
2389 null section, an invalid section, another reloc section, or
2390 its sh_link points to the null section. */
2391 if (((abfd->flags & (DYNAMIC | EXEC_P)) != 0
2392 && (hdr->sh_flags & SHF_ALLOC) != 0)
2393 || hdr->sh_type == SHT_RELR
2394 || hdr->sh_link == SHN_UNDEF
2395 || hdr->sh_link != elf_onesymtab (abfd)
2396 || hdr->sh_info == SHN_UNDEF
2397 || hdr->sh_info >= num_sec
2398 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_REL
2399 || elf_elfsections (abfd)[hdr->sh_info]->sh_type == SHT_RELA)
2401 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2402 goto success;
2405 if (! bfd_section_from_shdr (abfd, hdr->sh_info))
2406 goto fail;
2408 target_sect = bfd_section_from_elf_index (abfd, hdr->sh_info);
2409 if (target_sect == NULL)
2410 goto fail;
2412 esdt = elf_section_data (target_sect);
2413 if (hdr->sh_type == SHT_RELA)
2414 p_hdr = &esdt->rela.hdr;
2415 else
2416 p_hdr = &esdt->rel.hdr;
2418 /* PR 17512: file: 0b4f81b7.
2419 Also see PR 24456, for a file which deliberately has two reloc
2420 sections. */
2421 if (*p_hdr != NULL)
2423 if (!bed->init_secondary_reloc_section (abfd, hdr, name, shindex))
2425 _bfd_error_handler
2426 /* xgettext:c-format */
2427 (_("%pB: warning: secondary relocation section '%s' "
2428 "for section %pA found - ignoring"),
2429 abfd, name, target_sect);
2431 else
2432 esdt->has_secondary_relocs = true;
2433 goto success;
2436 hdr2 = (Elf_Internal_Shdr *) bfd_alloc (abfd, sizeof (*hdr2));
2437 if (hdr2 == NULL)
2438 goto fail;
2439 *hdr2 = *hdr;
2440 *p_hdr = hdr2;
2441 elf_elfsections (abfd)[shindex] = hdr2;
2442 target_sect->reloc_count += (NUM_SHDR_ENTRIES (hdr)
2443 * bed->s->int_rels_per_ext_rel);
2444 target_sect->flags |= SEC_RELOC;
2445 target_sect->relocation = NULL;
2446 target_sect->rel_filepos = hdr->sh_offset;
2447 /* In the section to which the relocations apply, mark whether
2448 its relocations are of the REL or RELA variety. */
2449 if (hdr->sh_size != 0)
2451 if (hdr->sh_type == SHT_RELA)
2452 target_sect->use_rela_p = 1;
2454 abfd->flags |= HAS_RELOC;
2455 goto success;
2458 case SHT_GNU_verdef:
2459 if (hdr->sh_info != 0)
2460 elf_dynverdef (abfd) = shindex;
2461 elf_tdata (abfd)->dynverdef_hdr = *hdr;
2462 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2463 goto success;
2465 case SHT_GNU_versym:
2466 if (hdr->sh_entsize != sizeof (Elf_External_Versym))
2467 goto fail;
2469 elf_dynversym (abfd) = shindex;
2470 elf_tdata (abfd)->dynversym_hdr = *hdr;
2471 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2472 goto success;
2474 case SHT_GNU_verneed:
2475 if (hdr->sh_info != 0)
2476 elf_dynverref (abfd) = shindex;
2477 elf_tdata (abfd)->dynverref_hdr = *hdr;
2478 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2479 goto success;
2481 case SHT_SHLIB:
2482 goto success;
2484 case SHT_GROUP:
2485 if (! IS_VALID_GROUP_SECTION_HEADER (hdr, GRP_ENTRY_SIZE))
2486 goto fail;
2488 if (!_bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2489 goto fail;
2491 goto success;
2493 default:
2494 /* Possibly an attributes section. */
2495 if (hdr->sh_type == SHT_GNU_ATTRIBUTES
2496 || hdr->sh_type == bed->obj_attrs_section_type)
2498 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2499 goto fail;
2500 _bfd_elf_parse_attributes (abfd, hdr);
2501 goto success;
2504 /* Check for any processor-specific section types. */
2505 if (bed->elf_backend_section_from_shdr (abfd, hdr, name, shindex))
2506 goto success;
2508 if (hdr->sh_type >= SHT_LOUSER && hdr->sh_type <= SHT_HIUSER)
2510 if ((hdr->sh_flags & SHF_ALLOC) != 0)
2511 /* FIXME: How to properly handle allocated section reserved
2512 for applications? */
2513 _bfd_error_handler
2514 /* xgettext:c-format */
2515 (_("%pB: unknown type [%#x] section `%s'"),
2516 abfd, hdr->sh_type, name);
2517 else
2519 /* Allow sections reserved for applications. */
2520 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2521 goto success;
2524 else if (hdr->sh_type >= SHT_LOPROC
2525 && hdr->sh_type <= SHT_HIPROC)
2526 /* FIXME: We should handle this section. */
2527 _bfd_error_handler
2528 /* xgettext:c-format */
2529 (_("%pB: unknown type [%#x] section `%s'"),
2530 abfd, hdr->sh_type, name);
2531 else if (hdr->sh_type >= SHT_LOOS && hdr->sh_type <= SHT_HIOS)
2533 /* Unrecognised OS-specific sections. */
2534 if ((hdr->sh_flags & SHF_OS_NONCONFORMING) != 0)
2535 /* SHF_OS_NONCONFORMING indicates that special knowledge is
2536 required to correctly process the section and the file should
2537 be rejected with an error message. */
2538 _bfd_error_handler
2539 /* xgettext:c-format */
2540 (_("%pB: unknown type [%#x] section `%s'"),
2541 abfd, hdr->sh_type, name);
2542 else
2544 /* Otherwise it should be processed. */
2545 ret = _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
2546 goto success;
2549 else
2550 /* FIXME: We should handle this section. */
2551 _bfd_error_handler
2552 /* xgettext:c-format */
2553 (_("%pB: unknown type [%#x] section `%s'"),
2554 abfd, hdr->sh_type, name);
2556 goto fail;
2559 fail:
2560 ret = false;
2561 success:
2562 elf_tdata (abfd)->being_created[shindex] = false;
2563 return ret;
2566 /* Return the local symbol specified by ABFD, R_SYMNDX. */
2568 Elf_Internal_Sym *
2569 bfd_sym_from_r_symndx (struct sym_cache *cache,
2570 bfd *abfd,
2571 unsigned long r_symndx)
2573 unsigned int ent = r_symndx % LOCAL_SYM_CACHE_SIZE;
2575 if (cache->abfd != abfd || cache->indx[ent] != r_symndx)
2577 Elf_Internal_Shdr *symtab_hdr;
2578 unsigned char esym[sizeof (Elf64_External_Sym)];
2579 Elf_External_Sym_Shndx eshndx;
2581 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2582 if (bfd_elf_get_elf_syms (abfd, symtab_hdr, 1, r_symndx,
2583 &cache->sym[ent], esym, &eshndx) == NULL)
2584 return NULL;
2586 if (cache->abfd != abfd)
2588 memset (cache->indx, -1, sizeof (cache->indx));
2589 cache->abfd = abfd;
2591 cache->indx[ent] = r_symndx;
2594 return &cache->sym[ent];
2597 /* Given an ELF section number, retrieve the corresponding BFD
2598 section. */
2600 asection *
2601 bfd_section_from_elf_index (bfd *abfd, unsigned int sec_index)
2603 if (sec_index >= elf_numsections (abfd))
2604 return NULL;
2605 return elf_elfsections (abfd)[sec_index]->bfd_section;
2608 static const struct bfd_elf_special_section special_sections_b[] =
2610 { STRING_COMMA_LEN (".bss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2611 { NULL, 0, 0, 0, 0 }
2614 static const struct bfd_elf_special_section special_sections_c[] =
2616 { STRING_COMMA_LEN (".comment"), 0, SHT_PROGBITS, 0 },
2617 { STRING_COMMA_LEN (".ctf"), 0, SHT_PROGBITS, 0 },
2618 { NULL, 0, 0, 0, 0 }
2621 static const struct bfd_elf_special_section special_sections_d[] =
2623 { STRING_COMMA_LEN (".data"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2624 { STRING_COMMA_LEN (".data1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2625 /* There are more DWARF sections than these, but they needn't be added here
2626 unless you have to cope with broken compilers that don't emit section
2627 attributes or you want to help the user writing assembler. */
2628 { STRING_COMMA_LEN (".debug"), 0, SHT_PROGBITS, 0 },
2629 { STRING_COMMA_LEN (".debug_line"), 0, SHT_PROGBITS, 0 },
2630 { STRING_COMMA_LEN (".debug_info"), 0, SHT_PROGBITS, 0 },
2631 { STRING_COMMA_LEN (".debug_abbrev"), 0, SHT_PROGBITS, 0 },
2632 { STRING_COMMA_LEN (".debug_aranges"), 0, SHT_PROGBITS, 0 },
2633 { STRING_COMMA_LEN (".dynamic"), 0, SHT_DYNAMIC, SHF_ALLOC },
2634 { STRING_COMMA_LEN (".dynstr"), 0, SHT_STRTAB, SHF_ALLOC },
2635 { STRING_COMMA_LEN (".dynsym"), 0, SHT_DYNSYM, SHF_ALLOC },
2636 { NULL, 0, 0, 0, 0 }
2639 static const struct bfd_elf_special_section special_sections_f[] =
2641 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2642 { STRING_COMMA_LEN (".fini_array"), -2, SHT_FINI_ARRAY, SHF_ALLOC + SHF_WRITE },
2643 { NULL, 0 , 0, 0, 0 }
2646 static const struct bfd_elf_special_section special_sections_g[] =
2648 { STRING_COMMA_LEN (".gnu.linkonce.b"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2649 { STRING_COMMA_LEN (".gnu.linkonce.n"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2650 { STRING_COMMA_LEN (".gnu.linkonce.p"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2651 { STRING_COMMA_LEN (".gnu.lto_"), -1, SHT_PROGBITS, SHF_EXCLUDE },
2652 { STRING_COMMA_LEN (".got"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2653 { STRING_COMMA_LEN (".gnu.version"), 0, SHT_GNU_versym, 0 },
2654 { STRING_COMMA_LEN (".gnu.version_d"), 0, SHT_GNU_verdef, 0 },
2655 { STRING_COMMA_LEN (".gnu.version_r"), 0, SHT_GNU_verneed, 0 },
2656 { STRING_COMMA_LEN (".gnu.liblist"), 0, SHT_GNU_LIBLIST, SHF_ALLOC },
2657 { STRING_COMMA_LEN (".gnu.conflict"), 0, SHT_RELA, SHF_ALLOC },
2658 { STRING_COMMA_LEN (".gnu.hash"), 0, SHT_GNU_HASH, SHF_ALLOC },
2659 { NULL, 0, 0, 0, 0 }
2662 static const struct bfd_elf_special_section special_sections_h[] =
2664 { STRING_COMMA_LEN (".hash"), 0, SHT_HASH, SHF_ALLOC },
2665 { NULL, 0, 0, 0, 0 }
2668 static const struct bfd_elf_special_section special_sections_i[] =
2670 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2671 { STRING_COMMA_LEN (".init_array"), -2, SHT_INIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2672 { STRING_COMMA_LEN (".interp"), 0, SHT_PROGBITS, 0 },
2673 { NULL, 0, 0, 0, 0 }
2676 static const struct bfd_elf_special_section special_sections_l[] =
2678 { STRING_COMMA_LEN (".line"), 0, SHT_PROGBITS, 0 },
2679 { NULL, 0, 0, 0, 0 }
2682 static const struct bfd_elf_special_section special_sections_n[] =
2684 { STRING_COMMA_LEN (".noinit"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2685 { STRING_COMMA_LEN (".note.GNU-stack"), 0, SHT_PROGBITS, 0 },
2686 { STRING_COMMA_LEN (".note"), -1, SHT_NOTE, 0 },
2687 { NULL, 0, 0, 0, 0 }
2690 static const struct bfd_elf_special_section special_sections_p[] =
2692 { STRING_COMMA_LEN (".persistent.bss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2693 { STRING_COMMA_LEN (".persistent"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2694 { STRING_COMMA_LEN (".preinit_array"), -2, SHT_PREINIT_ARRAY, SHF_ALLOC + SHF_WRITE },
2695 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2696 { NULL, 0, 0, 0, 0 }
2699 static const struct bfd_elf_special_section special_sections_r[] =
2701 { STRING_COMMA_LEN (".rodata"), -2, SHT_PROGBITS, SHF_ALLOC },
2702 { STRING_COMMA_LEN (".rodata1"), 0, SHT_PROGBITS, SHF_ALLOC },
2703 { STRING_COMMA_LEN (".relr.dyn"), 0, SHT_RELR, SHF_ALLOC },
2704 { STRING_COMMA_LEN (".rela"), -1, SHT_RELA, 0 },
2705 { STRING_COMMA_LEN (".rel"), -1, SHT_REL, 0 },
2706 { NULL, 0, 0, 0, 0 }
2709 static const struct bfd_elf_special_section special_sections_s[] =
2711 { STRING_COMMA_LEN (".shstrtab"), 0, SHT_STRTAB, 0 },
2712 { STRING_COMMA_LEN (".strtab"), 0, SHT_STRTAB, 0 },
2713 { STRING_COMMA_LEN (".symtab"), 0, SHT_SYMTAB, 0 },
2714 /* See struct bfd_elf_special_section declaration for the semantics of
2715 this special case where .prefix_length != strlen (.prefix). */
2716 { ".stabstr", 5, 3, SHT_STRTAB, 0 },
2717 { NULL, 0, 0, 0, 0 }
2720 static const struct bfd_elf_special_section special_sections_t[] =
2722 { STRING_COMMA_LEN (".text"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_EXECINSTR },
2723 { STRING_COMMA_LEN (".tbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2724 { STRING_COMMA_LEN (".tdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_TLS },
2725 { NULL, 0, 0, 0, 0 }
2728 static const struct bfd_elf_special_section special_sections_z[] =
2730 { STRING_COMMA_LEN (".zdebug_line"), 0, SHT_PROGBITS, 0 },
2731 { STRING_COMMA_LEN (".zdebug_info"), 0, SHT_PROGBITS, 0 },
2732 { STRING_COMMA_LEN (".zdebug_abbrev"), 0, SHT_PROGBITS, 0 },
2733 { STRING_COMMA_LEN (".zdebug_aranges"), 0, SHT_PROGBITS, 0 },
2734 { NULL, 0, 0, 0, 0 }
2737 static const struct bfd_elf_special_section * const special_sections[] =
2739 special_sections_b, /* 'b' */
2740 special_sections_c, /* 'c' */
2741 special_sections_d, /* 'd' */
2742 NULL, /* 'e' */
2743 special_sections_f, /* 'f' */
2744 special_sections_g, /* 'g' */
2745 special_sections_h, /* 'h' */
2746 special_sections_i, /* 'i' */
2747 NULL, /* 'j' */
2748 NULL, /* 'k' */
2749 special_sections_l, /* 'l' */
2750 NULL, /* 'm' */
2751 special_sections_n, /* 'n' */
2752 NULL, /* 'o' */
2753 special_sections_p, /* 'p' */
2754 NULL, /* 'q' */
2755 special_sections_r, /* 'r' */
2756 special_sections_s, /* 's' */
2757 special_sections_t, /* 't' */
2758 NULL, /* 'u' */
2759 NULL, /* 'v' */
2760 NULL, /* 'w' */
2761 NULL, /* 'x' */
2762 NULL, /* 'y' */
2763 special_sections_z /* 'z' */
2766 const struct bfd_elf_special_section *
2767 _bfd_elf_get_special_section (const char *name,
2768 const struct bfd_elf_special_section *spec,
2769 unsigned int rela)
2771 int i;
2772 int len;
2774 len = strlen (name);
2776 for (i = 0; spec[i].prefix != NULL; i++)
2778 int suffix_len;
2779 int prefix_len = spec[i].prefix_length;
2781 if (len < prefix_len)
2782 continue;
2783 if (memcmp (name, spec[i].prefix, prefix_len) != 0)
2784 continue;
2786 suffix_len = spec[i].suffix_length;
2787 if (suffix_len <= 0)
2789 if (name[prefix_len] != 0)
2791 if (suffix_len == 0)
2792 continue;
2793 if (name[prefix_len] != '.'
2794 && (suffix_len == -2
2795 || (rela && spec[i].type == SHT_REL)))
2796 continue;
2799 else
2801 if (len < prefix_len + suffix_len)
2802 continue;
2803 if (memcmp (name + len - suffix_len,
2804 spec[i].prefix + prefix_len,
2805 suffix_len) != 0)
2806 continue;
2808 return &spec[i];
2811 return NULL;
2814 const struct bfd_elf_special_section *
2815 _bfd_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2817 int i;
2818 const struct bfd_elf_special_section *spec;
2819 const struct elf_backend_data *bed;
2821 /* See if this is one of the special sections. */
2822 if (sec->name == NULL)
2823 return NULL;
2825 bed = get_elf_backend_data (abfd);
2826 spec = bed->special_sections;
2827 if (spec)
2829 spec = _bfd_elf_get_special_section (sec->name,
2830 bed->special_sections,
2831 sec->use_rela_p);
2832 if (spec != NULL)
2833 return spec;
2836 if (sec->name[0] != '.')
2837 return NULL;
2839 i = sec->name[1] - 'b';
2840 if (i < 0 || i > 'z' - 'b')
2841 return NULL;
2843 spec = special_sections[i];
2845 if (spec == NULL)
2846 return NULL;
2848 return _bfd_elf_get_special_section (sec->name, spec, sec->use_rela_p);
2851 bool
2852 _bfd_elf_new_section_hook (bfd *abfd, asection *sec)
2854 struct bfd_elf_section_data *sdata;
2855 const struct elf_backend_data *bed;
2856 const struct bfd_elf_special_section *ssect;
2858 sdata = (struct bfd_elf_section_data *) sec->used_by_bfd;
2859 if (sdata == NULL)
2861 sdata = (struct bfd_elf_section_data *) bfd_zalloc (abfd,
2862 sizeof (*sdata));
2863 if (sdata == NULL)
2864 return false;
2865 sec->used_by_bfd = sdata;
2868 /* Indicate whether or not this section should use RELA relocations. */
2869 bed = get_elf_backend_data (abfd);
2870 sec->use_rela_p = bed->default_use_rela_p;
2872 /* Set up ELF section type and flags for newly created sections, if
2873 there is an ABI mandated section. */
2874 ssect = (*bed->get_sec_type_attr) (abfd, sec);
2875 if (ssect != NULL)
2877 elf_section_type (sec) = ssect->type;
2878 elf_section_flags (sec) = ssect->attr;
2881 return _bfd_generic_new_section_hook (abfd, sec);
2884 /* Create a new bfd section from an ELF program header.
2886 Since program segments have no names, we generate a synthetic name
2887 of the form segment<NUM>, where NUM is generally the index in the
2888 program header table. For segments that are split (see below) we
2889 generate the names segment<NUM>a and segment<NUM>b.
2891 Note that some program segments may have a file size that is different than
2892 (less than) the memory size. All this means is that at execution the
2893 system must allocate the amount of memory specified by the memory size,
2894 but only initialize it with the first "file size" bytes read from the
2895 file. This would occur for example, with program segments consisting
2896 of combined data+bss.
2898 To handle the above situation, this routine generates TWO bfd sections
2899 for the single program segment. The first has the length specified by
2900 the file size of the segment, and the second has the length specified
2901 by the difference between the two sizes. In effect, the segment is split
2902 into its initialized and uninitialized parts. */
2904 bool
2905 _bfd_elf_make_section_from_phdr (bfd *abfd,
2906 Elf_Internal_Phdr *hdr,
2907 int hdr_index,
2908 const char *type_name)
2910 asection *newsect;
2911 char *name;
2912 char namebuf[64];
2913 size_t len;
2914 int split;
2915 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
2917 split = ((hdr->p_memsz > 0)
2918 && (hdr->p_filesz > 0)
2919 && (hdr->p_memsz > hdr->p_filesz));
2921 if (hdr->p_filesz > 0)
2923 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "a" : "");
2924 len = strlen (namebuf) + 1;
2925 name = (char *) bfd_alloc (abfd, len);
2926 if (!name)
2927 return false;
2928 memcpy (name, namebuf, len);
2929 newsect = bfd_make_section (abfd, name);
2930 if (newsect == NULL)
2931 return false;
2932 newsect->vma = hdr->p_vaddr / opb;
2933 newsect->lma = hdr->p_paddr / opb;
2934 newsect->size = hdr->p_filesz;
2935 newsect->filepos = hdr->p_offset;
2936 newsect->flags |= SEC_HAS_CONTENTS;
2937 newsect->alignment_power = bfd_log2 (hdr->p_align);
2938 if (hdr->p_type == PT_LOAD)
2940 newsect->flags |= SEC_ALLOC;
2941 newsect->flags |= SEC_LOAD;
2942 if (hdr->p_flags & PF_X)
2944 /* FIXME: all we known is that it has execute PERMISSION,
2945 may be data. */
2946 newsect->flags |= SEC_CODE;
2949 if (!(hdr->p_flags & PF_W))
2951 newsect->flags |= SEC_READONLY;
2955 if (hdr->p_memsz > hdr->p_filesz)
2957 bfd_vma align;
2959 sprintf (namebuf, "%s%d%s", type_name, hdr_index, split ? "b" : "");
2960 len = strlen (namebuf) + 1;
2961 name = (char *) bfd_alloc (abfd, len);
2962 if (!name)
2963 return false;
2964 memcpy (name, namebuf, len);
2965 newsect = bfd_make_section (abfd, name);
2966 if (newsect == NULL)
2967 return false;
2968 newsect->vma = (hdr->p_vaddr + hdr->p_filesz) / opb;
2969 newsect->lma = (hdr->p_paddr + hdr->p_filesz) / opb;
2970 newsect->size = hdr->p_memsz - hdr->p_filesz;
2971 newsect->filepos = hdr->p_offset + hdr->p_filesz;
2972 align = newsect->vma & -newsect->vma;
2973 if (align == 0 || align > hdr->p_align)
2974 align = hdr->p_align;
2975 newsect->alignment_power = bfd_log2 (align);
2976 if (hdr->p_type == PT_LOAD)
2978 newsect->flags |= SEC_ALLOC;
2979 if (hdr->p_flags & PF_X)
2980 newsect->flags |= SEC_CODE;
2982 if (!(hdr->p_flags & PF_W))
2983 newsect->flags |= SEC_READONLY;
2986 return true;
2989 static bool
2990 _bfd_elf_core_find_build_id (bfd *templ, bfd_vma offset)
2992 /* The return value is ignored. Build-ids are considered optional. */
2993 if (templ->xvec->flavour == bfd_target_elf_flavour)
2994 return (*get_elf_backend_data (templ)->elf_backend_core_find_build_id)
2995 (templ, offset);
2996 return false;
2999 bool
3000 bfd_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int hdr_index)
3002 const struct elf_backend_data *bed;
3004 switch (hdr->p_type)
3006 case PT_NULL:
3007 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "null");
3009 case PT_LOAD:
3010 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "load"))
3011 return false;
3012 if (bfd_get_format (abfd) == bfd_core && abfd->build_id == NULL)
3013 _bfd_elf_core_find_build_id (abfd, hdr->p_offset);
3014 return true;
3016 case PT_DYNAMIC:
3017 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "dynamic");
3019 case PT_INTERP:
3020 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "interp");
3022 case PT_NOTE:
3023 if (! _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "note"))
3024 return false;
3025 if (! elf_read_notes (abfd, hdr->p_offset, hdr->p_filesz,
3026 hdr->p_align))
3027 return false;
3028 return true;
3030 case PT_SHLIB:
3031 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "shlib");
3033 case PT_PHDR:
3034 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "phdr");
3036 case PT_GNU_EH_FRAME:
3037 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3038 "eh_frame_hdr");
3040 case PT_GNU_STACK:
3041 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "stack");
3043 case PT_GNU_RELRO:
3044 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index, "relro");
3046 case PT_GNU_SFRAME:
3047 return _bfd_elf_make_section_from_phdr (abfd, hdr, hdr_index,
3048 "sframe");
3050 default:
3051 /* Check for any processor-specific program segment types. */
3052 bed = get_elf_backend_data (abfd);
3053 return bed->elf_backend_section_from_phdr (abfd, hdr, hdr_index, "proc");
3057 /* Return the REL_HDR for SEC, assuming there is only a single one, either
3058 REL or RELA. */
3060 Elf_Internal_Shdr *
3061 _bfd_elf_single_rel_hdr (asection *sec)
3063 if (elf_section_data (sec)->rel.hdr)
3065 BFD_ASSERT (elf_section_data (sec)->rela.hdr == NULL);
3066 return elf_section_data (sec)->rel.hdr;
3068 else
3069 return elf_section_data (sec)->rela.hdr;
3072 static bool
3073 _bfd_elf_set_reloc_sh_name (bfd *abfd,
3074 Elf_Internal_Shdr *rel_hdr,
3075 const char *sec_name,
3076 bool use_rela_p)
3078 char *name = (char *) bfd_alloc (abfd,
3079 sizeof ".rela" + strlen (sec_name));
3080 if (name == NULL)
3081 return false;
3083 sprintf (name, "%s%s", use_rela_p ? ".rela" : ".rel", sec_name);
3084 rel_hdr->sh_name =
3085 (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd), name,
3086 false);
3087 if (rel_hdr->sh_name == (unsigned int) -1)
3088 return false;
3090 return true;
3093 /* Allocate and initialize a section-header for a new reloc section,
3094 containing relocations against ASECT. It is stored in RELDATA. If
3095 USE_RELA_P is TRUE, we use RELA relocations; otherwise, we use REL
3096 relocations. */
3098 static bool
3099 _bfd_elf_init_reloc_shdr (bfd *abfd,
3100 struct bfd_elf_section_reloc_data *reldata,
3101 const char *sec_name,
3102 bool use_rela_p,
3103 bool delay_st_name_p)
3105 Elf_Internal_Shdr *rel_hdr;
3106 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3108 BFD_ASSERT (reldata->hdr == NULL);
3109 rel_hdr = bfd_zalloc (abfd, sizeof (*rel_hdr));
3110 reldata->hdr = rel_hdr;
3112 if (delay_st_name_p)
3113 rel_hdr->sh_name = (unsigned int) -1;
3114 else if (!_bfd_elf_set_reloc_sh_name (abfd, rel_hdr, sec_name,
3115 use_rela_p))
3116 return false;
3117 rel_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
3118 rel_hdr->sh_entsize = (use_rela_p
3119 ? bed->s->sizeof_rela
3120 : bed->s->sizeof_rel);
3121 rel_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
3122 rel_hdr->sh_flags = 0;
3123 rel_hdr->sh_addr = 0;
3124 rel_hdr->sh_size = 0;
3125 rel_hdr->sh_offset = 0;
3127 return true;
3130 /* Return the default section type based on the passed in section flags. */
3133 bfd_elf_get_default_section_type (flagword flags)
3135 if ((flags & (SEC_ALLOC | SEC_IS_COMMON)) != 0
3136 && (flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
3137 return SHT_NOBITS;
3138 return SHT_PROGBITS;
3141 struct fake_section_arg
3143 struct bfd_link_info *link_info;
3144 bool failed;
3147 /* Set up an ELF internal section header for a section. */
3149 static void
3150 elf_fake_sections (bfd *abfd, asection *asect, void *fsarg)
3152 struct fake_section_arg *arg = (struct fake_section_arg *)fsarg;
3153 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3154 struct bfd_elf_section_data *esd = elf_section_data (asect);
3155 Elf_Internal_Shdr *this_hdr;
3156 unsigned int sh_type;
3157 const char *name = asect->name;
3158 bool delay_st_name_p = false;
3159 bfd_vma mask;
3161 if (arg->failed)
3163 /* We already failed; just get out of the bfd_map_over_sections
3164 loop. */
3165 return;
3168 this_hdr = &esd->this_hdr;
3170 /* ld: compress DWARF debug sections with names: .debug_*. */
3171 if (arg->link_info
3172 && (abfd->flags & BFD_COMPRESS) != 0
3173 && (asect->flags & SEC_DEBUGGING) != 0
3174 && name[1] == 'd'
3175 && name[6] == '_')
3177 /* If this section will be compressed, delay adding section
3178 name to section name section after it is compressed in
3179 _bfd_elf_assign_file_positions_for_non_load. */
3180 delay_st_name_p = true;
3183 if (delay_st_name_p)
3184 this_hdr->sh_name = (unsigned int) -1;
3185 else
3187 this_hdr->sh_name
3188 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3189 name, false);
3190 if (this_hdr->sh_name == (unsigned int) -1)
3192 arg->failed = true;
3193 return;
3197 /* Don't clear sh_flags. Assembler may set additional bits. */
3199 if ((asect->flags & SEC_ALLOC) != 0
3200 || asect->user_set_vma)
3201 this_hdr->sh_addr = asect->vma * bfd_octets_per_byte (abfd, asect);
3202 else
3203 this_hdr->sh_addr = 0;
3205 this_hdr->sh_offset = 0;
3206 this_hdr->sh_size = asect->size;
3207 this_hdr->sh_link = 0;
3208 /* PR 17512: file: 0eb809fe, 8b0535ee. */
3209 if (asect->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
3211 _bfd_error_handler
3212 /* xgettext:c-format */
3213 (_("%pB: error: alignment power %d of section `%pA' is too big"),
3214 abfd, asect->alignment_power, asect);
3215 arg->failed = true;
3216 return;
3218 /* Set sh_addralign to the highest power of two given by alignment
3219 consistent with the section VMA. Linker scripts can force VMA. */
3220 mask = ((bfd_vma) 1 << asect->alignment_power) | this_hdr->sh_addr;
3221 this_hdr->sh_addralign = mask & -mask;
3222 /* The sh_entsize and sh_info fields may have been set already by
3223 copy_private_section_data. */
3225 this_hdr->bfd_section = asect;
3226 this_hdr->contents = NULL;
3228 /* If the section type is unspecified, we set it based on
3229 asect->flags. */
3230 if (asect->type != 0)
3231 sh_type = asect->type;
3232 else if ((asect->flags & SEC_GROUP) != 0)
3233 sh_type = SHT_GROUP;
3234 else
3235 sh_type = bfd_elf_get_default_section_type (asect->flags);
3237 if (this_hdr->sh_type == SHT_NULL)
3238 this_hdr->sh_type = sh_type;
3239 else if (this_hdr->sh_type == SHT_NOBITS
3240 && sh_type == SHT_PROGBITS
3241 && (asect->flags & SEC_ALLOC) != 0)
3243 /* Warn if we are changing a NOBITS section to PROGBITS, but
3244 allow the link to proceed. This can happen when users link
3245 non-bss input sections to bss output sections, or emit data
3246 to a bss output section via a linker script. */
3247 _bfd_error_handler
3248 (_("warning: section `%pA' type changed to PROGBITS"), asect);
3249 this_hdr->sh_type = sh_type;
3252 switch (this_hdr->sh_type)
3254 default:
3255 break;
3257 case SHT_STRTAB:
3258 case SHT_NOTE:
3259 case SHT_NOBITS:
3260 case SHT_PROGBITS:
3261 break;
3263 case SHT_INIT_ARRAY:
3264 case SHT_FINI_ARRAY:
3265 case SHT_PREINIT_ARRAY:
3266 this_hdr->sh_entsize = bed->s->arch_size / 8;
3267 break;
3269 case SHT_HASH:
3270 this_hdr->sh_entsize = bed->s->sizeof_hash_entry;
3271 break;
3273 case SHT_DYNSYM:
3274 this_hdr->sh_entsize = bed->s->sizeof_sym;
3275 break;
3277 case SHT_DYNAMIC:
3278 this_hdr->sh_entsize = bed->s->sizeof_dyn;
3279 break;
3281 case SHT_RELA:
3282 if (get_elf_backend_data (abfd)->may_use_rela_p)
3283 this_hdr->sh_entsize = bed->s->sizeof_rela;
3284 break;
3286 case SHT_REL:
3287 if (get_elf_backend_data (abfd)->may_use_rel_p)
3288 this_hdr->sh_entsize = bed->s->sizeof_rel;
3289 break;
3291 case SHT_GNU_versym:
3292 this_hdr->sh_entsize = sizeof (Elf_External_Versym);
3293 break;
3295 case SHT_GNU_verdef:
3296 this_hdr->sh_entsize = 0;
3297 /* objcopy or strip will copy over sh_info, but may not set
3298 cverdefs. The linker will set cverdefs, but sh_info will be
3299 zero. */
3300 if (this_hdr->sh_info == 0)
3301 this_hdr->sh_info = elf_tdata (abfd)->cverdefs;
3302 else
3303 BFD_ASSERT (elf_tdata (abfd)->cverdefs == 0
3304 || this_hdr->sh_info == elf_tdata (abfd)->cverdefs);
3305 break;
3307 case SHT_GNU_verneed:
3308 this_hdr->sh_entsize = 0;
3309 /* objcopy or strip will copy over sh_info, but may not set
3310 cverrefs. The linker will set cverrefs, but sh_info will be
3311 zero. */
3312 if (this_hdr->sh_info == 0)
3313 this_hdr->sh_info = elf_tdata (abfd)->cverrefs;
3314 else
3315 BFD_ASSERT (elf_tdata (abfd)->cverrefs == 0
3316 || this_hdr->sh_info == elf_tdata (abfd)->cverrefs);
3317 break;
3319 case SHT_GROUP:
3320 this_hdr->sh_entsize = GRP_ENTRY_SIZE;
3321 break;
3323 case SHT_GNU_HASH:
3324 this_hdr->sh_entsize = bed->s->arch_size == 64 ? 0 : 4;
3325 break;
3328 if ((asect->flags & SEC_ALLOC) != 0)
3329 this_hdr->sh_flags |= SHF_ALLOC;
3330 if ((asect->flags & SEC_READONLY) == 0)
3331 this_hdr->sh_flags |= SHF_WRITE;
3332 if ((asect->flags & SEC_CODE) != 0)
3333 this_hdr->sh_flags |= SHF_EXECINSTR;
3334 if ((asect->flags & SEC_MERGE) != 0)
3336 this_hdr->sh_flags |= SHF_MERGE;
3337 this_hdr->sh_entsize = asect->entsize;
3339 if ((asect->flags & SEC_STRINGS) != 0)
3340 this_hdr->sh_flags |= SHF_STRINGS;
3341 if ((asect->flags & SEC_GROUP) == 0 && elf_group_name (asect) != NULL)
3342 this_hdr->sh_flags |= SHF_GROUP;
3343 if ((asect->flags & SEC_THREAD_LOCAL) != 0)
3345 this_hdr->sh_flags |= SHF_TLS;
3346 if (asect->size == 0
3347 && (asect->flags & SEC_HAS_CONTENTS) == 0)
3349 struct bfd_link_order *o = asect->map_tail.link_order;
3351 this_hdr->sh_size = 0;
3352 if (o != NULL)
3354 this_hdr->sh_size = o->offset + o->size;
3355 if (this_hdr->sh_size != 0)
3356 this_hdr->sh_type = SHT_NOBITS;
3360 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
3361 this_hdr->sh_flags |= SHF_EXCLUDE;
3363 /* If the section has relocs, set up a section header for the
3364 SHT_REL[A] section. If two relocation sections are required for
3365 this section, it is up to the processor-specific back-end to
3366 create the other. */
3367 if ((asect->flags & SEC_RELOC) != 0)
3369 /* When doing a relocatable link, create both REL and RELA sections if
3370 needed. */
3371 if (arg->link_info
3372 /* Do the normal setup if we wouldn't create any sections here. */
3373 && esd->rel.count + esd->rela.count > 0
3374 && (bfd_link_relocatable (arg->link_info)
3375 || arg->link_info->emitrelocations))
3377 if (esd->rel.count && esd->rel.hdr == NULL
3378 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rel, name,
3379 false, delay_st_name_p))
3381 arg->failed = true;
3382 return;
3384 if (esd->rela.count && esd->rela.hdr == NULL
3385 && !_bfd_elf_init_reloc_shdr (abfd, &esd->rela, name,
3386 true, delay_st_name_p))
3388 arg->failed = true;
3389 return;
3392 else if (!_bfd_elf_init_reloc_shdr (abfd,
3393 (asect->use_rela_p
3394 ? &esd->rela : &esd->rel),
3395 name,
3396 asect->use_rela_p,
3397 delay_st_name_p))
3399 arg->failed = true;
3400 return;
3404 /* Check for processor-specific section types. */
3405 sh_type = this_hdr->sh_type;
3406 if (bed->elf_backend_fake_sections
3407 && !(*bed->elf_backend_fake_sections) (abfd, this_hdr, asect))
3409 arg->failed = true;
3410 return;
3413 if (sh_type == SHT_NOBITS && asect->size != 0)
3415 /* Don't change the header type from NOBITS if we are being
3416 called for objcopy --only-keep-debug. */
3417 this_hdr->sh_type = sh_type;
3421 /* Fill in the contents of a SHT_GROUP section. Called from
3422 _bfd_elf_compute_section_file_positions for gas, objcopy, and
3423 when ELF targets use the generic linker, ld. Called for ld -r
3424 from bfd_elf_final_link. */
3426 void
3427 bfd_elf_set_group_contents (bfd *abfd, asection *sec, void *failedptrarg)
3429 bool *failedptr = (bool *) failedptrarg;
3430 asection *elt, *first;
3431 unsigned char *loc;
3432 bool gas;
3434 /* Ignore linker created group section. See elfNN_ia64_object_p in
3435 elfxx-ia64.c. */
3436 if ((sec->flags & (SEC_GROUP | SEC_LINKER_CREATED)) != SEC_GROUP
3437 || sec->size == 0
3438 || *failedptr)
3439 return;
3441 if (elf_section_data (sec)->this_hdr.sh_info == 0)
3443 unsigned long symindx = 0;
3445 /* elf_group_id will have been set up by objcopy and the
3446 generic linker. */
3447 if (elf_group_id (sec) != NULL)
3448 symindx = elf_group_id (sec)->udata.i;
3450 if (symindx == 0)
3452 /* If called from the assembler, swap_out_syms will have set up
3453 elf_section_syms.
3454 PR 25699: A corrupt input file could contain bogus group info. */
3455 if (sec->index >= elf_num_section_syms (abfd)
3456 || elf_section_syms (abfd)[sec->index] == NULL)
3458 *failedptr = true;
3459 return;
3461 symindx = elf_section_syms (abfd)[sec->index]->udata.i;
3463 elf_section_data (sec)->this_hdr.sh_info = symindx;
3465 else if (elf_section_data (sec)->this_hdr.sh_info == (unsigned int) -2)
3467 /* The ELF backend linker sets sh_info to -2 when the group
3468 signature symbol is global, and thus the index can't be
3469 set until all local symbols are output. */
3470 asection *igroup;
3471 struct bfd_elf_section_data *sec_data;
3472 unsigned long symndx;
3473 unsigned long extsymoff;
3474 struct elf_link_hash_entry *h;
3476 /* The point of this little dance to the first SHF_GROUP section
3477 then back to the SHT_GROUP section is that this gets us to
3478 the SHT_GROUP in the input object. */
3479 igroup = elf_sec_group (elf_next_in_group (sec));
3480 sec_data = elf_section_data (igroup);
3481 symndx = sec_data->this_hdr.sh_info;
3482 extsymoff = 0;
3483 if (!elf_bad_symtab (igroup->owner))
3485 Elf_Internal_Shdr *symtab_hdr;
3487 symtab_hdr = &elf_tdata (igroup->owner)->symtab_hdr;
3488 extsymoff = symtab_hdr->sh_info;
3490 h = elf_sym_hashes (igroup->owner)[symndx - extsymoff];
3491 while (h->root.type == bfd_link_hash_indirect
3492 || h->root.type == bfd_link_hash_warning)
3493 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3495 elf_section_data (sec)->this_hdr.sh_info = h->indx;
3498 /* The contents won't be allocated for "ld -r" or objcopy. */
3499 gas = true;
3500 if (sec->contents == NULL)
3502 gas = false;
3503 sec->contents = (unsigned char *) bfd_alloc (abfd, sec->size);
3505 /* Arrange for the section to be written out. */
3506 elf_section_data (sec)->this_hdr.contents = sec->contents;
3507 if (sec->contents == NULL)
3509 *failedptr = true;
3510 return;
3514 loc = sec->contents + sec->size;
3516 /* Get the pointer to the first section in the group that gas
3517 squirreled away here. objcopy arranges for this to be set to the
3518 start of the input section group. */
3519 first = elt = elf_next_in_group (sec);
3521 /* First element is a flag word. Rest of section is elf section
3522 indices for all the sections of the group. Write them backwards
3523 just to keep the group in the same order as given in .section
3524 directives, not that it matters. */
3525 while (elt != NULL)
3527 asection *s;
3529 s = elt;
3530 if (!gas)
3531 s = s->output_section;
3532 if (s != NULL
3533 && !bfd_is_abs_section (s))
3535 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
3536 struct bfd_elf_section_data *input_elf_sec = elf_section_data (elt);
3538 if (elf_sec->rel.hdr != NULL
3539 && (gas
3540 || (input_elf_sec->rel.hdr != NULL
3541 && input_elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0))
3543 elf_sec->rel.hdr->sh_flags |= SHF_GROUP;
3544 loc -= 4;
3545 if (loc == sec->contents)
3546 break;
3547 H_PUT_32 (abfd, elf_sec->rel.idx, loc);
3549 if (elf_sec->rela.hdr != NULL
3550 && (gas
3551 || (input_elf_sec->rela.hdr != NULL
3552 && input_elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0))
3554 elf_sec->rela.hdr->sh_flags |= SHF_GROUP;
3555 loc -= 4;
3556 if (loc == sec->contents)
3557 break;
3558 H_PUT_32 (abfd, elf_sec->rela.idx, loc);
3560 loc -= 4;
3561 if (loc == sec->contents)
3562 break;
3563 H_PUT_32 (abfd, elf_sec->this_idx, loc);
3565 elt = elf_next_in_group (elt);
3566 if (elt == first)
3567 break;
3570 /* We should always get here with loc == sec->contents + 4, but it is
3571 possible to craft bogus SHT_GROUP sections that will cause segfaults
3572 in objcopy without checking loc here and in the loop above. */
3573 if (loc == sec->contents)
3574 BFD_ASSERT (0);
3575 else
3577 loc -= 4;
3578 if (loc != sec->contents)
3580 BFD_ASSERT (0);
3581 memset (sec->contents + 4, 0, loc - sec->contents);
3582 loc = sec->contents;
3586 H_PUT_32 (abfd, sec->flags & SEC_LINK_ONCE ? GRP_COMDAT : 0, loc);
3589 /* Given NAME, the name of a relocation section stripped of its
3590 .rel/.rela prefix, return the section in ABFD to which the
3591 relocations apply. */
3593 asection *
3594 _bfd_elf_plt_get_reloc_section (bfd *abfd, const char *name)
3596 /* If a target needs .got.plt section, relocations in rela.plt/rel.plt
3597 section likely apply to .got.plt or .got section. */
3598 if (get_elf_backend_data (abfd)->want_got_plt
3599 && strcmp (name, ".plt") == 0)
3601 asection *sec;
3603 name = ".got.plt";
3604 sec = bfd_get_section_by_name (abfd, name);
3605 if (sec != NULL)
3606 return sec;
3607 name = ".got";
3610 return bfd_get_section_by_name (abfd, name);
3613 /* Return the section to which RELOC_SEC applies. */
3615 static asection *
3616 elf_get_reloc_section (asection *reloc_sec)
3618 const char *name;
3619 unsigned int type;
3620 bfd *abfd;
3621 const struct elf_backend_data *bed;
3623 type = elf_section_data (reloc_sec)->this_hdr.sh_type;
3624 if (type != SHT_REL && type != SHT_RELA)
3625 return NULL;
3627 /* We look up the section the relocs apply to by name. */
3628 name = reloc_sec->name;
3629 if (!startswith (name, ".rel"))
3630 return NULL;
3631 name += 4;
3632 if (type == SHT_RELA && *name++ != 'a')
3633 return NULL;
3635 abfd = reloc_sec->owner;
3636 bed = get_elf_backend_data (abfd);
3637 return bed->get_reloc_section (abfd, name);
3640 /* Assign all ELF section numbers. The dummy first section is handled here
3641 too. The link/info pointers for the standard section types are filled
3642 in here too, while we're at it. LINK_INFO will be 0 when arriving
3643 here for gas, objcopy, and when using the generic ELF linker. */
3645 static bool
3646 assign_section_numbers (bfd *abfd, struct bfd_link_info *link_info)
3648 struct elf_obj_tdata *t = elf_tdata (abfd);
3649 asection *sec;
3650 unsigned int section_number;
3651 Elf_Internal_Shdr **i_shdrp;
3652 struct bfd_elf_section_data *d;
3653 bool need_symtab;
3654 size_t amt;
3656 section_number = 1;
3658 _bfd_elf_strtab_clear_all_refs (elf_shstrtab (abfd));
3660 /* SHT_GROUP sections are in relocatable files only. */
3661 if (link_info == NULL || !link_info->resolve_section_groups)
3663 size_t reloc_count = 0;
3665 /* Put SHT_GROUP sections first. */
3666 for (sec = abfd->sections; sec != NULL; sec = sec->next)
3668 d = elf_section_data (sec);
3670 if (d->this_hdr.sh_type == SHT_GROUP)
3672 if (sec->flags & SEC_LINKER_CREATED)
3674 /* Remove the linker created SHT_GROUP sections. */
3675 bfd_section_list_remove (abfd, sec);
3676 abfd->section_count--;
3678 else
3679 d->this_idx = section_number++;
3682 /* Count relocations. */
3683 reloc_count += sec->reloc_count;
3686 /* Set/clear HAS_RELOC depending on whether there are relocations. */
3687 if (reloc_count == 0)
3688 abfd->flags &= ~HAS_RELOC;
3689 else
3690 abfd->flags |= HAS_RELOC;
3693 for (sec = abfd->sections; sec; sec = sec->next)
3695 d = elf_section_data (sec);
3697 if (d->this_hdr.sh_type != SHT_GROUP)
3698 d->this_idx = section_number++;
3699 if (d->this_hdr.sh_name != (unsigned int) -1)
3700 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->this_hdr.sh_name);
3701 if (d->rel.hdr)
3703 d->rel.idx = section_number++;
3704 if (d->rel.hdr->sh_name != (unsigned int) -1)
3705 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rel.hdr->sh_name);
3707 else
3708 d->rel.idx = 0;
3710 if (d->rela.hdr)
3712 d->rela.idx = section_number++;
3713 if (d->rela.hdr->sh_name != (unsigned int) -1)
3714 _bfd_elf_strtab_addref (elf_shstrtab (abfd), d->rela.hdr->sh_name);
3716 else
3717 d->rela.idx = 0;
3720 need_symtab = (bfd_get_symcount (abfd) > 0
3721 || (link_info == NULL
3722 && ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
3723 == HAS_RELOC)));
3724 if (need_symtab)
3726 elf_onesymtab (abfd) = section_number++;
3727 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->symtab_hdr.sh_name);
3728 if (section_number > ((SHN_LORESERVE - 2) & 0xFFFF))
3730 elf_section_list *entry;
3732 BFD_ASSERT (elf_symtab_shndx_list (abfd) == NULL);
3734 entry = bfd_zalloc (abfd, sizeof (*entry));
3735 entry->ndx = section_number++;
3736 elf_symtab_shndx_list (abfd) = entry;
3737 entry->hdr.sh_name
3738 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
3739 ".symtab_shndx", false);
3740 if (entry->hdr.sh_name == (unsigned int) -1)
3741 return false;
3743 elf_strtab_sec (abfd) = section_number++;
3744 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->strtab_hdr.sh_name);
3747 elf_shstrtab_sec (abfd) = section_number++;
3748 _bfd_elf_strtab_addref (elf_shstrtab (abfd), t->shstrtab_hdr.sh_name);
3749 elf_elfheader (abfd)->e_shstrndx = elf_shstrtab_sec (abfd);
3751 if (section_number >= SHN_LORESERVE)
3753 /* xgettext:c-format */
3754 _bfd_error_handler (_("%pB: too many sections: %u"),
3755 abfd, section_number);
3756 return false;
3759 elf_numsections (abfd) = section_number;
3760 elf_elfheader (abfd)->e_shnum = section_number;
3762 /* Set up the list of section header pointers, in agreement with the
3763 indices. */
3764 amt = section_number * sizeof (Elf_Internal_Shdr *);
3765 i_shdrp = (Elf_Internal_Shdr **) bfd_zalloc (abfd, amt);
3766 if (i_shdrp == NULL)
3767 return false;
3769 i_shdrp[0] = (Elf_Internal_Shdr *) bfd_zalloc (abfd,
3770 sizeof (Elf_Internal_Shdr));
3771 if (i_shdrp[0] == NULL)
3773 bfd_release (abfd, i_shdrp);
3774 return false;
3777 elf_elfsections (abfd) = i_shdrp;
3779 i_shdrp[elf_shstrtab_sec (abfd)] = &t->shstrtab_hdr;
3780 if (need_symtab)
3782 i_shdrp[elf_onesymtab (abfd)] = &t->symtab_hdr;
3783 if (elf_numsections (abfd) > (SHN_LORESERVE & 0xFFFF))
3785 elf_section_list * entry = elf_symtab_shndx_list (abfd);
3786 BFD_ASSERT (entry != NULL);
3787 i_shdrp[entry->ndx] = & entry->hdr;
3788 entry->hdr.sh_link = elf_onesymtab (abfd);
3790 i_shdrp[elf_strtab_sec (abfd)] = &t->strtab_hdr;
3791 t->symtab_hdr.sh_link = elf_strtab_sec (abfd);
3794 for (sec = abfd->sections; sec; sec = sec->next)
3796 asection *s;
3798 d = elf_section_data (sec);
3800 i_shdrp[d->this_idx] = &d->this_hdr;
3801 if (d->rel.idx != 0)
3802 i_shdrp[d->rel.idx] = d->rel.hdr;
3803 if (d->rela.idx != 0)
3804 i_shdrp[d->rela.idx] = d->rela.hdr;
3806 /* Fill in the sh_link and sh_info fields while we're at it. */
3808 /* sh_link of a reloc section is the section index of the symbol
3809 table. sh_info is the section index of the section to which
3810 the relocation entries apply. */
3811 if (d->rel.idx != 0)
3813 d->rel.hdr->sh_link = elf_onesymtab (abfd);
3814 d->rel.hdr->sh_info = d->this_idx;
3815 d->rel.hdr->sh_flags |= SHF_INFO_LINK;
3817 if (d->rela.idx != 0)
3819 d->rela.hdr->sh_link = elf_onesymtab (abfd);
3820 d->rela.hdr->sh_info = d->this_idx;
3821 d->rela.hdr->sh_flags |= SHF_INFO_LINK;
3824 /* We need to set up sh_link for SHF_LINK_ORDER. */
3825 if ((d->this_hdr.sh_flags & SHF_LINK_ORDER) != 0)
3827 s = elf_linked_to_section (sec);
3828 /* We can now have a NULL linked section pointer.
3829 This happens when the sh_link field is 0, which is done
3830 when a linked to section is discarded but the linking
3831 section has been retained for some reason. */
3832 if (s)
3834 /* Check discarded linkonce section. */
3835 if (discarded_section (s))
3837 asection *kept;
3838 _bfd_error_handler
3839 /* xgettext:c-format */
3840 (_("%pB: sh_link of section `%pA' points to"
3841 " discarded section `%pA' of `%pB'"),
3842 abfd, d->this_hdr.bfd_section, s, s->owner);
3843 /* Point to the kept section if it has the same
3844 size as the discarded one. */
3845 kept = _bfd_elf_check_kept_section (s, link_info);
3846 if (kept == NULL)
3848 bfd_set_error (bfd_error_bad_value);
3849 return false;
3851 s = kept;
3853 /* Handle objcopy. */
3854 else if (s->output_section == NULL)
3856 _bfd_error_handler
3857 /* xgettext:c-format */
3858 (_("%pB: sh_link of section `%pA' points to"
3859 " removed section `%pA' of `%pB'"),
3860 abfd, d->this_hdr.bfd_section, s, s->owner);
3861 bfd_set_error (bfd_error_bad_value);
3862 return false;
3864 s = s->output_section;
3865 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3869 switch (d->this_hdr.sh_type)
3871 case SHT_REL:
3872 case SHT_RELA:
3873 /* A reloc section which we are treating as a normal BFD
3874 section. sh_link is the section index of the symbol
3875 table. sh_info is the section index of the section to
3876 which the relocation entries apply. We assume that an
3877 allocated reloc section uses the dynamic symbol table
3878 if there is one. Otherwise we guess the normal symbol
3879 table. FIXME: How can we be sure? */
3880 if (d->this_hdr.sh_link == 0 && (sec->flags & SEC_ALLOC) != 0)
3882 s = bfd_get_section_by_name (abfd, ".dynsym");
3883 if (s != NULL)
3884 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3886 if (d->this_hdr.sh_link == 0)
3887 d->this_hdr.sh_link = elf_onesymtab (abfd);
3889 s = elf_get_reloc_section (sec);
3890 if (s != NULL)
3892 d->this_hdr.sh_info = elf_section_data (s)->this_idx;
3893 d->this_hdr.sh_flags |= SHF_INFO_LINK;
3895 break;
3897 case SHT_STRTAB:
3898 /* We assume that a section named .stab*str is a stabs
3899 string section. We look for a section with the same name
3900 but without the trailing ``str'', and set its sh_link
3901 field to point to this section. */
3902 if (startswith (sec->name, ".stab")
3903 && strcmp (sec->name + strlen (sec->name) - 3, "str") == 0)
3905 size_t len;
3906 char *alc;
3908 len = strlen (sec->name);
3909 alc = (char *) bfd_malloc (len - 2);
3910 if (alc == NULL)
3911 return false;
3912 memcpy (alc, sec->name, len - 3);
3913 alc[len - 3] = '\0';
3914 s = bfd_get_section_by_name (abfd, alc);
3915 free (alc);
3916 if (s != NULL)
3918 elf_section_data (s)->this_hdr.sh_link = d->this_idx;
3920 /* This is a .stab section. */
3921 elf_section_data (s)->this_hdr.sh_entsize = 12;
3924 break;
3926 case SHT_DYNAMIC:
3927 case SHT_DYNSYM:
3928 case SHT_GNU_verneed:
3929 case SHT_GNU_verdef:
3930 /* sh_link is the section header index of the string table
3931 used for the dynamic entries, or the symbol table, or the
3932 version strings. */
3933 s = bfd_get_section_by_name (abfd, ".dynstr");
3934 if (s != NULL)
3935 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3936 break;
3938 case SHT_GNU_LIBLIST:
3939 /* sh_link is the section header index of the prelink library
3940 list used for the dynamic entries, or the symbol table, or
3941 the version strings. */
3942 s = bfd_get_section_by_name (abfd, ((sec->flags & SEC_ALLOC)
3943 ? ".dynstr" : ".gnu.libstr"));
3944 if (s != NULL)
3945 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3946 break;
3948 case SHT_HASH:
3949 case SHT_GNU_HASH:
3950 case SHT_GNU_versym:
3951 /* sh_link is the section header index of the symbol table
3952 this hash table or version table is for. */
3953 s = bfd_get_section_by_name (abfd, ".dynsym");
3954 if (s != NULL)
3955 d->this_hdr.sh_link = elf_section_data (s)->this_idx;
3956 break;
3958 case SHT_GROUP:
3959 d->this_hdr.sh_link = elf_onesymtab (abfd);
3963 /* Delay setting sh_name to _bfd_elf_write_object_contents so that
3964 _bfd_elf_assign_file_positions_for_non_load can convert DWARF
3965 debug section name from .debug_* to .zdebug_* if needed. */
3967 return true;
3970 static bool
3971 sym_is_global (bfd *abfd, asymbol *sym)
3973 /* If the backend has a special mapping, use it. */
3974 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3975 if (bed->elf_backend_sym_is_global)
3976 return (*bed->elf_backend_sym_is_global) (abfd, sym);
3978 return ((sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE)) != 0
3979 || bfd_is_und_section (bfd_asymbol_section (sym))
3980 || bfd_is_com_section (bfd_asymbol_section (sym)));
3983 /* Filter global symbols of ABFD to include in the import library. All
3984 SYMCOUNT symbols of ABFD can be examined from their pointers in
3985 SYMS. Pointers of symbols to keep should be stored contiguously at
3986 the beginning of that array.
3988 Returns the number of symbols to keep. */
3990 unsigned int
3991 _bfd_elf_filter_global_symbols (bfd *abfd, struct bfd_link_info *info,
3992 asymbol **syms, long symcount)
3994 long src_count, dst_count = 0;
3996 for (src_count = 0; src_count < symcount; src_count++)
3998 asymbol *sym = syms[src_count];
3999 char *name = (char *) bfd_asymbol_name (sym);
4000 struct bfd_link_hash_entry *h;
4002 if (!sym_is_global (abfd, sym))
4003 continue;
4005 h = bfd_link_hash_lookup (info->hash, name, false, false, false);
4006 if (h == NULL)
4007 continue;
4008 if (h->type != bfd_link_hash_defined && h->type != bfd_link_hash_defweak)
4009 continue;
4010 if (h->linker_def || h->ldscript_def)
4011 continue;
4013 syms[dst_count++] = sym;
4016 syms[dst_count] = NULL;
4018 return dst_count;
4021 /* Don't output section symbols for sections that are not going to be
4022 output, that are duplicates or there is no BFD section. */
4024 static bool
4025 ignore_section_sym (bfd *abfd, asymbol *sym)
4027 elf_symbol_type *type_ptr;
4029 if (sym == NULL)
4030 return false;
4032 if ((sym->flags & BSF_SECTION_SYM) == 0)
4033 return false;
4035 /* Ignore the section symbol if it isn't used. */
4036 if ((sym->flags & BSF_SECTION_SYM_USED) == 0)
4037 return true;
4039 if (sym->section == NULL)
4040 return true;
4042 type_ptr = elf_symbol_from (sym);
4043 return ((type_ptr != NULL
4044 && type_ptr->internal_elf_sym.st_shndx != 0
4045 && bfd_is_abs_section (sym->section))
4046 || !(sym->section->owner == abfd
4047 || (sym->section->output_section != NULL
4048 && sym->section->output_section->owner == abfd
4049 && sym->section->output_offset == 0)
4050 || bfd_is_abs_section (sym->section)));
4053 /* Map symbol from it's internal number to the external number, moving
4054 all local symbols to be at the head of the list. */
4056 static bool
4057 elf_map_symbols (bfd *abfd, unsigned int *pnum_locals)
4059 unsigned int symcount = bfd_get_symcount (abfd);
4060 asymbol **syms = bfd_get_outsymbols (abfd);
4061 asymbol **sect_syms;
4062 unsigned int num_locals = 0;
4063 unsigned int num_globals = 0;
4064 unsigned int num_locals2 = 0;
4065 unsigned int num_globals2 = 0;
4066 unsigned int max_index = 0;
4067 unsigned int idx;
4068 asection *asect;
4069 asymbol **new_syms;
4070 size_t amt;
4072 #ifdef DEBUG
4073 fprintf (stderr, "elf_map_symbols\n");
4074 fflush (stderr);
4075 #endif
4077 for (asect = abfd->sections; asect; asect = asect->next)
4079 if (max_index < asect->index)
4080 max_index = asect->index;
4083 max_index++;
4084 amt = max_index * sizeof (asymbol *);
4085 sect_syms = (asymbol **) bfd_zalloc (abfd, amt);
4086 if (sect_syms == NULL)
4087 return false;
4088 elf_section_syms (abfd) = sect_syms;
4089 elf_num_section_syms (abfd) = max_index;
4091 /* Init sect_syms entries for any section symbols we have already
4092 decided to output. */
4093 for (idx = 0; idx < symcount; idx++)
4095 asymbol *sym = syms[idx];
4097 if ((sym->flags & BSF_SECTION_SYM) != 0
4098 && sym->value == 0
4099 && !ignore_section_sym (abfd, sym)
4100 && !bfd_is_abs_section (sym->section))
4102 asection *sec = sym->section;
4104 if (sec->owner != abfd)
4105 sec = sec->output_section;
4107 sect_syms[sec->index] = syms[idx];
4111 /* Classify all of the symbols. */
4112 for (idx = 0; idx < symcount; idx++)
4114 if (sym_is_global (abfd, syms[idx]))
4115 num_globals++;
4116 else if (!ignore_section_sym (abfd, syms[idx]))
4117 num_locals++;
4120 /* We will be adding a section symbol for each normal BFD section. Most
4121 sections will already have a section symbol in outsymbols, but
4122 eg. SHT_GROUP sections will not, and we need the section symbol mapped
4123 at least in that case. */
4124 for (asect = abfd->sections; asect; asect = asect->next)
4126 asymbol *sym = asect->symbol;
4127 /* Don't include ignored section symbols. */
4128 if (!ignore_section_sym (abfd, sym)
4129 && sect_syms[asect->index] == NULL)
4131 if (!sym_is_global (abfd, asect->symbol))
4132 num_locals++;
4133 else
4134 num_globals++;
4138 /* Now sort the symbols so the local symbols are first. */
4139 amt = (num_locals + num_globals) * sizeof (asymbol *);
4140 new_syms = (asymbol **) bfd_alloc (abfd, amt);
4141 if (new_syms == NULL)
4142 return false;
4144 for (idx = 0; idx < symcount; idx++)
4146 asymbol *sym = syms[idx];
4147 unsigned int i;
4149 if (sym_is_global (abfd, sym))
4150 i = num_locals + num_globals2++;
4151 /* Don't include ignored section symbols. */
4152 else if (!ignore_section_sym (abfd, sym))
4153 i = num_locals2++;
4154 else
4155 continue;
4156 new_syms[i] = sym;
4157 sym->udata.i = i + 1;
4159 for (asect = abfd->sections; asect; asect = asect->next)
4161 asymbol *sym = asect->symbol;
4162 if (!ignore_section_sym (abfd, sym)
4163 && sect_syms[asect->index] == NULL)
4165 unsigned int i;
4167 sect_syms[asect->index] = sym;
4168 if (!sym_is_global (abfd, sym))
4169 i = num_locals2++;
4170 else
4171 i = num_locals + num_globals2++;
4172 new_syms[i] = sym;
4173 sym->udata.i = i + 1;
4177 bfd_set_symtab (abfd, new_syms, num_locals + num_globals);
4179 *pnum_locals = num_locals;
4180 return true;
4183 /* Align to the maximum file alignment that could be required for any
4184 ELF data structure. */
4186 static inline file_ptr
4187 align_file_position (file_ptr off, int align)
4189 return (off + align - 1) & ~(align - 1);
4192 /* Assign a file position to a section, optionally aligning to the
4193 required section alignment. */
4195 file_ptr
4196 _bfd_elf_assign_file_position_for_section (Elf_Internal_Shdr *i_shdrp,
4197 file_ptr offset,
4198 bool align)
4200 if (align && i_shdrp->sh_addralign > 1)
4201 offset = BFD_ALIGN (offset, i_shdrp->sh_addralign & -i_shdrp->sh_addralign);
4202 i_shdrp->sh_offset = offset;
4203 if (i_shdrp->bfd_section != NULL)
4204 i_shdrp->bfd_section->filepos = offset;
4205 if (i_shdrp->sh_type != SHT_NOBITS)
4206 offset += i_shdrp->sh_size;
4207 return offset;
4210 /* Compute the file positions we are going to put the sections at, and
4211 otherwise prepare to begin writing out the ELF file. If LINK_INFO
4212 is not NULL, this is being called by the ELF backend linker. */
4214 bool
4215 _bfd_elf_compute_section_file_positions (bfd *abfd,
4216 struct bfd_link_info *link_info)
4218 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4219 struct fake_section_arg fsargs;
4220 bool failed;
4221 struct elf_strtab_hash *strtab = NULL;
4222 Elf_Internal_Shdr *shstrtab_hdr;
4223 bool need_symtab;
4225 if (abfd->output_has_begun)
4226 return true;
4228 /* Do any elf backend specific processing first. */
4229 if (bed->elf_backend_begin_write_processing)
4230 (*bed->elf_backend_begin_write_processing) (abfd, link_info);
4232 if (!(*bed->elf_backend_init_file_header) (abfd, link_info))
4233 return false;
4235 fsargs.failed = false;
4236 fsargs.link_info = link_info;
4237 bfd_map_over_sections (abfd, elf_fake_sections, &fsargs);
4238 if (fsargs.failed)
4239 return false;
4241 if (!assign_section_numbers (abfd, link_info))
4242 return false;
4244 /* The backend linker builds symbol table information itself. */
4245 need_symtab = (link_info == NULL
4246 && (bfd_get_symcount (abfd) > 0
4247 || ((abfd->flags & (EXEC_P | DYNAMIC | HAS_RELOC))
4248 == HAS_RELOC)));
4249 if (need_symtab)
4251 /* Non-zero if doing a relocatable link. */
4252 int relocatable_p = ! (abfd->flags & (EXEC_P | DYNAMIC));
4254 if (! swap_out_syms (abfd, &strtab, relocatable_p, link_info))
4255 return false;
4258 failed = false;
4259 if (link_info == NULL)
4261 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
4262 if (failed)
4263 return false;
4266 shstrtab_hdr = &elf_tdata (abfd)->shstrtab_hdr;
4267 /* sh_name was set in init_file_header. */
4268 shstrtab_hdr->sh_type = SHT_STRTAB;
4269 shstrtab_hdr->sh_flags = bed->elf_strtab_flags;
4270 shstrtab_hdr->sh_addr = 0;
4271 /* sh_size is set in _bfd_elf_assign_file_positions_for_non_load. */
4272 shstrtab_hdr->sh_entsize = 0;
4273 shstrtab_hdr->sh_link = 0;
4274 shstrtab_hdr->sh_info = 0;
4275 /* sh_offset is set in _bfd_elf_assign_file_positions_for_non_load. */
4276 shstrtab_hdr->sh_addralign = 1;
4278 if (!assign_file_positions_except_relocs (abfd, link_info))
4279 return false;
4281 if (need_symtab)
4283 file_ptr off;
4284 Elf_Internal_Shdr *hdr;
4286 off = elf_next_file_pos (abfd);
4288 hdr = & elf_symtab_hdr (abfd);
4289 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4291 if (elf_symtab_shndx_list (abfd) != NULL)
4293 hdr = & elf_symtab_shndx_list (abfd)->hdr;
4294 if (hdr->sh_size != 0)
4295 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4296 /* FIXME: What about other symtab_shndx sections in the list ? */
4299 hdr = &elf_tdata (abfd)->strtab_hdr;
4300 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
4302 elf_next_file_pos (abfd) = off;
4304 /* Now that we know where the .strtab section goes, write it
4305 out. */
4306 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
4307 || ! _bfd_elf_strtab_emit (abfd, strtab))
4308 return false;
4309 _bfd_elf_strtab_free (strtab);
4312 abfd->output_has_begun = true;
4314 return true;
4317 /* Retrieve .eh_frame_hdr. Prior to size_dynamic_sections the
4318 function effectively returns whether --eh-frame-hdr is given on the
4319 command line. After size_dynamic_sections the result reflects
4320 whether .eh_frame_hdr will actually be output (sizing isn't done
4321 until ldemul_after_allocation). */
4323 static asection *
4324 elf_eh_frame_hdr (const struct bfd_link_info *info)
4326 if (info != NULL && is_elf_hash_table (info->hash))
4327 return elf_hash_table (info)->eh_info.hdr_sec;
4328 return NULL;
4331 /* Make an initial estimate of the size of the program header. If we
4332 get the number wrong here, we'll redo section placement. */
4334 static bfd_size_type
4335 get_program_header_size (bfd *abfd, struct bfd_link_info *info)
4337 size_t segs;
4338 asection *s;
4339 const struct elf_backend_data *bed;
4341 /* Assume we will need exactly two PT_LOAD segments: one for text
4342 and one for data. */
4343 segs = 2;
4345 s = bfd_get_section_by_name (abfd, ".interp");
4346 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4348 /* If we have a loadable interpreter section, we need a
4349 PT_INTERP segment. In this case, assume we also need a
4350 PT_PHDR segment, although that may not be true for all
4351 targets. */
4352 segs += 2;
4355 if (bfd_get_section_by_name (abfd, ".dynamic") != NULL)
4357 /* We need a PT_DYNAMIC segment. */
4358 ++segs;
4361 if (info != NULL && info->relro)
4363 /* We need a PT_GNU_RELRO segment. */
4364 ++segs;
4367 if (elf_eh_frame_hdr (info))
4369 /* We need a PT_GNU_EH_FRAME segment. */
4370 ++segs;
4373 if (elf_stack_flags (abfd))
4375 /* We need a PT_GNU_STACK segment. */
4376 ++segs;
4379 if (elf_sframe (abfd))
4381 /* We need a PT_GNU_SFRAME segment. */
4382 ++segs;
4385 s = bfd_get_section_by_name (abfd,
4386 NOTE_GNU_PROPERTY_SECTION_NAME);
4387 if (s != NULL && s->size != 0)
4389 /* We need a PT_GNU_PROPERTY segment. */
4390 ++segs;
4393 for (s = abfd->sections; s != NULL; s = s->next)
4395 if ((s->flags & SEC_LOAD) != 0
4396 && elf_section_type (s) == SHT_NOTE)
4398 unsigned int alignment_power;
4399 /* We need a PT_NOTE segment. */
4400 ++segs;
4401 /* Try to create just one PT_NOTE segment for all adjacent
4402 loadable SHT_NOTE sections. gABI requires that within a
4403 PT_NOTE segment (and also inside of each SHT_NOTE section)
4404 each note should have the same alignment. So we check
4405 whether the sections are correctly aligned. */
4406 alignment_power = s->alignment_power;
4407 while (s->next != NULL
4408 && s->next->alignment_power == alignment_power
4409 && (s->next->flags & SEC_LOAD) != 0
4410 && elf_section_type (s->next) == SHT_NOTE)
4411 s = s->next;
4415 for (s = abfd->sections; s != NULL; s = s->next)
4417 if (s->flags & SEC_THREAD_LOCAL)
4419 /* We need a PT_TLS segment. */
4420 ++segs;
4421 break;
4425 bed = get_elf_backend_data (abfd);
4427 if ((abfd->flags & D_PAGED) != 0
4428 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
4430 /* Add a PT_GNU_MBIND segment for each mbind section. */
4431 bfd_vma commonpagesize;
4432 unsigned int page_align_power;
4434 if (info != NULL)
4435 commonpagesize = info->commonpagesize;
4436 else
4437 commonpagesize = bed->commonpagesize;
4438 page_align_power = bfd_log2 (commonpagesize);
4439 for (s = abfd->sections; s != NULL; s = s->next)
4440 if (elf_section_flags (s) & SHF_GNU_MBIND)
4442 if (elf_section_data (s)->this_hdr.sh_info > PT_GNU_MBIND_NUM)
4444 _bfd_error_handler
4445 /* xgettext:c-format */
4446 (_("%pB: GNU_MBIND section `%pA' has invalid "
4447 "sh_info field: %d"),
4448 abfd, s, elf_section_data (s)->this_hdr.sh_info);
4449 continue;
4451 /* Align mbind section to page size. */
4452 if (s->alignment_power < page_align_power)
4453 s->alignment_power = page_align_power;
4454 segs ++;
4458 /* Let the backend count up any program headers it might need. */
4459 if (bed->elf_backend_additional_program_headers)
4461 int a;
4463 a = (*bed->elf_backend_additional_program_headers) (abfd, info);
4464 if (a == -1)
4465 abort ();
4466 segs += a;
4469 return segs * bed->s->sizeof_phdr;
4472 /* Find the segment that contains the output_section of section. */
4474 Elf_Internal_Phdr *
4475 _bfd_elf_find_segment_containing_section (bfd * abfd, asection * section)
4477 struct elf_segment_map *m;
4478 Elf_Internal_Phdr *p;
4480 for (m = elf_seg_map (abfd), p = elf_tdata (abfd)->phdr;
4481 m != NULL;
4482 m = m->next, p++)
4484 int i;
4486 for (i = m->count - 1; i >= 0; i--)
4487 if (m->sections[i] == section)
4488 return p;
4491 return NULL;
4494 /* Create a mapping from a set of sections to a program segment. */
4496 static struct elf_segment_map *
4497 make_mapping (bfd *abfd,
4498 asection **sections,
4499 unsigned int from,
4500 unsigned int to,
4501 bool phdr)
4503 struct elf_segment_map *m;
4504 unsigned int i;
4505 asection **hdrpp;
4506 size_t amt;
4508 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
4509 amt += (to - from) * sizeof (asection *);
4510 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4511 if (m == NULL)
4512 return NULL;
4513 m->next = NULL;
4514 m->p_type = PT_LOAD;
4515 for (i = from, hdrpp = sections + from; i < to; i++, hdrpp++)
4516 m->sections[i - from] = *hdrpp;
4517 m->count = to - from;
4519 if (from == 0 && phdr)
4521 /* Include the headers in the first PT_LOAD segment. */
4522 m->includes_filehdr = 1;
4523 m->includes_phdrs = 1;
4526 return m;
4529 /* Create the PT_DYNAMIC segment, which includes DYNSEC. Returns NULL
4530 on failure. */
4532 struct elf_segment_map *
4533 _bfd_elf_make_dynamic_segment (bfd *abfd, asection *dynsec)
4535 struct elf_segment_map *m;
4537 m = (struct elf_segment_map *) bfd_zalloc (abfd,
4538 sizeof (struct elf_segment_map));
4539 if (m == NULL)
4540 return NULL;
4541 m->next = NULL;
4542 m->p_type = PT_DYNAMIC;
4543 m->count = 1;
4544 m->sections[0] = dynsec;
4546 return m;
4549 /* Possibly add or remove segments from the segment map. */
4551 static bool
4552 elf_modify_segment_map (bfd *abfd,
4553 struct bfd_link_info *info,
4554 bool remove_empty_load)
4556 struct elf_segment_map **m;
4557 const struct elf_backend_data *bed;
4559 /* The placement algorithm assumes that non allocated sections are
4560 not in PT_LOAD segments. We ensure this here by removing such
4561 sections from the segment map. We also remove excluded
4562 sections. Finally, any PT_LOAD segment without sections is
4563 removed. */
4564 m = &elf_seg_map (abfd);
4565 while (*m)
4567 unsigned int i, new_count;
4569 for (new_count = 0, i = 0; i < (*m)->count; i++)
4571 if (((*m)->sections[i]->flags & SEC_EXCLUDE) == 0
4572 && (((*m)->sections[i]->flags & SEC_ALLOC) != 0
4573 || (*m)->p_type != PT_LOAD))
4575 (*m)->sections[new_count] = (*m)->sections[i];
4576 new_count++;
4579 (*m)->count = new_count;
4581 if (remove_empty_load
4582 && (*m)->p_type == PT_LOAD
4583 && (*m)->count == 0
4584 && !(*m)->includes_phdrs)
4585 *m = (*m)->next;
4586 else
4587 m = &(*m)->next;
4590 bed = get_elf_backend_data (abfd);
4591 if (bed->elf_backend_modify_segment_map != NULL)
4593 if (!(*bed->elf_backend_modify_segment_map) (abfd, info))
4594 return false;
4597 return true;
4600 #define IS_TBSS(s) \
4601 ((s->flags & (SEC_THREAD_LOCAL | SEC_LOAD)) == SEC_THREAD_LOCAL)
4603 /* Set up a mapping from BFD sections to program segments. Update
4604 NEED_LAYOUT if the section layout is changed. */
4606 bool
4607 _bfd_elf_map_sections_to_segments (bfd *abfd,
4608 struct bfd_link_info *info,
4609 bool *need_layout)
4611 unsigned int count;
4612 struct elf_segment_map *m;
4613 asection **sections = NULL;
4614 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
4615 bool no_user_phdrs;
4617 no_user_phdrs = elf_seg_map (abfd) == NULL;
4619 if (info != NULL)
4621 info->user_phdrs = !no_user_phdrs;
4623 /* Size the relative relocations if DT_RELR is enabled. */
4624 if (info->enable_dt_relr
4625 && need_layout != NULL
4626 && bed->size_relative_relocs
4627 && !bed->size_relative_relocs (info, need_layout))
4628 info->callbacks->einfo
4629 (_("%F%P: failed to size relative relocations\n"));
4632 if (no_user_phdrs && bfd_count_sections (abfd) != 0)
4634 asection *s;
4635 unsigned int i;
4636 struct elf_segment_map *mfirst;
4637 struct elf_segment_map **pm;
4638 asection *last_hdr;
4639 bfd_vma last_size;
4640 unsigned int hdr_index;
4641 bfd_vma maxpagesize;
4642 asection **hdrpp;
4643 bool phdr_in_segment;
4644 bool writable;
4645 bool executable;
4646 unsigned int tls_count = 0;
4647 asection *first_tls = NULL;
4648 asection *first_mbind = NULL;
4649 asection *dynsec, *eh_frame_hdr;
4650 asection *sframe;
4651 size_t amt;
4652 bfd_vma addr_mask, wrap_to = 0; /* Bytes. */
4653 bfd_size_type phdr_size; /* Octets/bytes. */
4654 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
4656 /* Select the allocated sections, and sort them. */
4658 amt = bfd_count_sections (abfd) * sizeof (asection *);
4659 sections = (asection **) bfd_malloc (amt);
4660 if (sections == NULL)
4661 goto error_return;
4663 /* Calculate top address, avoiding undefined behaviour of shift
4664 left operator when shift count is equal to size of type
4665 being shifted. */
4666 addr_mask = ((bfd_vma) 1 << (bfd_arch_bits_per_address (abfd) - 1)) - 1;
4667 addr_mask = (addr_mask << 1) + 1;
4669 i = 0;
4670 for (s = abfd->sections; s != NULL; s = s->next)
4672 if ((s->flags & SEC_ALLOC) != 0)
4674 /* target_index is unused until bfd_elf_final_link
4675 starts output of section symbols. Use it to make
4676 qsort stable. */
4677 s->target_index = i;
4678 sections[i] = s;
4679 ++i;
4680 /* A wrapping section potentially clashes with header. */
4681 if (((s->lma + s->size / opb) & addr_mask) < (s->lma & addr_mask))
4682 wrap_to = (s->lma + s->size / opb) & addr_mask;
4685 BFD_ASSERT (i <= bfd_count_sections (abfd));
4686 count = i;
4688 qsort (sections, (size_t) count, sizeof (asection *), elf_sort_sections);
4690 phdr_size = elf_program_header_size (abfd);
4691 if (phdr_size == (bfd_size_type) -1)
4692 phdr_size = get_program_header_size (abfd, info);
4693 phdr_size += bed->s->sizeof_ehdr;
4694 /* phdr_size is compared to LMA values which are in bytes. */
4695 phdr_size /= opb;
4696 if (info != NULL)
4697 maxpagesize = info->maxpagesize;
4698 else
4699 maxpagesize = bed->maxpagesize;
4700 if (maxpagesize == 0)
4701 maxpagesize = 1;
4702 phdr_in_segment = info != NULL && info->load_phdrs;
4703 if (count != 0
4704 && (((sections[0]->lma & addr_mask) & (maxpagesize - 1))
4705 >= (phdr_size & (maxpagesize - 1))))
4706 /* For compatibility with old scripts that may not be using
4707 SIZEOF_HEADERS, add headers when it looks like space has
4708 been left for them. */
4709 phdr_in_segment = true;
4711 /* Build the mapping. */
4712 mfirst = NULL;
4713 pm = &mfirst;
4715 /* If we have a .interp section, then create a PT_PHDR segment for
4716 the program headers and a PT_INTERP segment for the .interp
4717 section. */
4718 s = bfd_get_section_by_name (abfd, ".interp");
4719 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->size != 0)
4721 amt = sizeof (struct elf_segment_map);
4722 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4723 if (m == NULL)
4724 goto error_return;
4725 m->next = NULL;
4726 m->p_type = PT_PHDR;
4727 m->p_flags = PF_R;
4728 m->p_flags_valid = 1;
4729 m->includes_phdrs = 1;
4730 phdr_in_segment = true;
4731 *pm = m;
4732 pm = &m->next;
4734 amt = sizeof (struct elf_segment_map);
4735 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
4736 if (m == NULL)
4737 goto error_return;
4738 m->next = NULL;
4739 m->p_type = PT_INTERP;
4740 m->count = 1;
4741 m->sections[0] = s;
4743 *pm = m;
4744 pm = &m->next;
4747 /* Look through the sections. We put sections in the same program
4748 segment when the start of the second section can be placed within
4749 a few bytes of the end of the first section. */
4750 last_hdr = NULL;
4751 last_size = 0;
4752 hdr_index = 0;
4753 writable = false;
4754 executable = false;
4755 dynsec = bfd_get_section_by_name (abfd, ".dynamic");
4756 if (dynsec != NULL
4757 && (dynsec->flags & SEC_LOAD) == 0)
4758 dynsec = NULL;
4760 if ((abfd->flags & D_PAGED) == 0)
4761 phdr_in_segment = false;
4763 /* Deal with -Ttext or something similar such that the first section
4764 is not adjacent to the program headers. This is an
4765 approximation, since at this point we don't know exactly how many
4766 program headers we will need. */
4767 if (phdr_in_segment && count > 0)
4769 bfd_vma phdr_lma; /* Bytes. */
4770 bool separate_phdr = false;
4772 phdr_lma = (sections[0]->lma - phdr_size) & addr_mask & -maxpagesize;
4773 if (info != NULL
4774 && info->separate_code
4775 && (sections[0]->flags & SEC_CODE) != 0)
4777 /* If data sections should be separate from code and
4778 thus not executable, and the first section is
4779 executable then put the file and program headers in
4780 their own PT_LOAD. */
4781 separate_phdr = true;
4782 if ((((phdr_lma + phdr_size - 1) & addr_mask & -maxpagesize)
4783 == (sections[0]->lma & addr_mask & -maxpagesize)))
4785 /* The file and program headers are currently on the
4786 same page as the first section. Put them on the
4787 previous page if we can. */
4788 if (phdr_lma >= maxpagesize)
4789 phdr_lma -= maxpagesize;
4790 else
4791 separate_phdr = false;
4794 if ((sections[0]->lma & addr_mask) < phdr_lma
4795 || (sections[0]->lma & addr_mask) < phdr_size)
4796 /* If file and program headers would be placed at the end
4797 of memory then it's probably better to omit them. */
4798 phdr_in_segment = false;
4799 else if (phdr_lma < wrap_to)
4800 /* If a section wraps around to where we'll be placing
4801 file and program headers, then the headers will be
4802 overwritten. */
4803 phdr_in_segment = false;
4804 else if (separate_phdr)
4806 m = make_mapping (abfd, sections, 0, 0, phdr_in_segment);
4807 if (m == NULL)
4808 goto error_return;
4809 m->p_paddr = phdr_lma * opb;
4810 m->p_vaddr_offset
4811 = (sections[0]->vma - phdr_size) & addr_mask & -maxpagesize;
4812 m->p_paddr_valid = 1;
4813 *pm = m;
4814 pm = &m->next;
4815 phdr_in_segment = false;
4819 for (i = 0, hdrpp = sections; i < count; i++, hdrpp++)
4821 asection *hdr;
4822 bool new_segment;
4824 hdr = *hdrpp;
4826 /* See if this section and the last one will fit in the same
4827 segment. */
4829 if (last_hdr == NULL)
4831 /* If we don't have a segment yet, then we don't need a new
4832 one (we build the last one after this loop). */
4833 new_segment = false;
4835 else if (last_hdr->lma - last_hdr->vma != hdr->lma - hdr->vma)
4837 /* If this section has a different relation between the
4838 virtual address and the load address, then we need a new
4839 segment. */
4840 new_segment = true;
4842 else if (hdr->lma < last_hdr->lma + last_size
4843 || last_hdr->lma + last_size < last_hdr->lma)
4845 /* If this section has a load address that makes it overlap
4846 the previous section, then we need a new segment. */
4847 new_segment = true;
4849 else if ((abfd->flags & D_PAGED) != 0
4850 && (((last_hdr->lma + last_size - 1) & -maxpagesize)
4851 == (hdr->lma & -maxpagesize)))
4853 /* If we are demand paged then we can't map two disk
4854 pages onto the same memory page. */
4855 new_segment = false;
4857 /* In the next test we have to be careful when last_hdr->lma is close
4858 to the end of the address space. If the aligned address wraps
4859 around to the start of the address space, then there are no more
4860 pages left in memory and it is OK to assume that the current
4861 section can be included in the current segment. */
4862 else if ((BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4863 + maxpagesize > last_hdr->lma)
4864 && (BFD_ALIGN (last_hdr->lma + last_size, maxpagesize)
4865 + maxpagesize <= hdr->lma))
4867 /* If putting this section in this segment would force us to
4868 skip a page in the segment, then we need a new segment. */
4869 new_segment = true;
4871 else if ((last_hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0
4872 && (hdr->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) != 0)
4874 /* We don't want to put a loaded section after a
4875 nonloaded (ie. bss style) section in the same segment
4876 as that will force the non-loaded section to be loaded.
4877 Consider .tbss sections as loaded for this purpose. */
4878 new_segment = true;
4880 else if ((abfd->flags & D_PAGED) == 0)
4882 /* If the file is not demand paged, which means that we
4883 don't require the sections to be correctly aligned in the
4884 file, then there is no other reason for a new segment. */
4885 new_segment = false;
4887 else if (info != NULL
4888 && info->separate_code
4889 && executable != ((hdr->flags & SEC_CODE) != 0))
4891 new_segment = true;
4893 else if (! writable
4894 && (hdr->flags & SEC_READONLY) == 0)
4896 /* We don't want to put a writable section in a read only
4897 segment. */
4898 new_segment = true;
4900 else
4902 /* Otherwise, we can use the same segment. */
4903 new_segment = false;
4906 /* Allow interested parties a chance to override our decision. */
4907 if (last_hdr != NULL
4908 && info != NULL
4909 && info->callbacks->override_segment_assignment != NULL)
4910 new_segment
4911 = info->callbacks->override_segment_assignment (info, abfd, hdr,
4912 last_hdr,
4913 new_segment);
4915 if (! new_segment)
4917 if ((hdr->flags & SEC_READONLY) == 0)
4918 writable = true;
4919 if ((hdr->flags & SEC_CODE) != 0)
4920 executable = true;
4921 last_hdr = hdr;
4922 /* .tbss sections effectively have zero size. */
4923 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4924 continue;
4927 /* We need a new program segment. We must create a new program
4928 header holding all the sections from hdr_index until hdr. */
4930 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4931 if (m == NULL)
4932 goto error_return;
4934 *pm = m;
4935 pm = &m->next;
4937 if ((hdr->flags & SEC_READONLY) == 0)
4938 writable = true;
4939 else
4940 writable = false;
4942 if ((hdr->flags & SEC_CODE) == 0)
4943 executable = false;
4944 else
4945 executable = true;
4947 last_hdr = hdr;
4948 /* .tbss sections effectively have zero size. */
4949 last_size = (!IS_TBSS (hdr) ? hdr->size : 0) / opb;
4950 hdr_index = i;
4951 phdr_in_segment = false;
4954 /* Create a final PT_LOAD program segment, but not if it's just
4955 for .tbss. */
4956 if (last_hdr != NULL
4957 && (i - hdr_index != 1
4958 || !IS_TBSS (last_hdr)))
4960 m = make_mapping (abfd, sections, hdr_index, i, phdr_in_segment);
4961 if (m == NULL)
4962 goto error_return;
4964 *pm = m;
4965 pm = &m->next;
4968 /* If there is a .dynamic section, throw in a PT_DYNAMIC segment. */
4969 if (dynsec != NULL)
4971 m = _bfd_elf_make_dynamic_segment (abfd, dynsec);
4972 if (m == NULL)
4973 goto error_return;
4974 *pm = m;
4975 pm = &m->next;
4978 /* For each batch of consecutive loadable SHT_NOTE sections,
4979 add a PT_NOTE segment. We don't use bfd_get_section_by_name,
4980 because if we link together nonloadable .note sections and
4981 loadable .note sections, we will generate two .note sections
4982 in the output file. */
4983 for (s = abfd->sections; s != NULL; s = s->next)
4985 if ((s->flags & SEC_LOAD) != 0
4986 && elf_section_type (s) == SHT_NOTE)
4988 asection *s2;
4989 unsigned int alignment_power = s->alignment_power;
4991 count = 1;
4992 for (s2 = s; s2->next != NULL; s2 = s2->next)
4994 if (s2->next->alignment_power == alignment_power
4995 && (s2->next->flags & SEC_LOAD) != 0
4996 && elf_section_type (s2->next) == SHT_NOTE
4997 && align_power (s2->lma + s2->size / opb,
4998 alignment_power)
4999 == s2->next->lma)
5000 count++;
5001 else
5002 break;
5004 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5005 amt += count * sizeof (asection *);
5006 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5007 if (m == NULL)
5008 goto error_return;
5009 m->next = NULL;
5010 m->p_type = PT_NOTE;
5011 m->count = count;
5012 while (count > 1)
5014 m->sections[m->count - count--] = s;
5015 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5016 s = s->next;
5018 m->sections[m->count - 1] = s;
5019 BFD_ASSERT ((s->flags & SEC_THREAD_LOCAL) == 0);
5020 *pm = m;
5021 pm = &m->next;
5023 if (s->flags & SEC_THREAD_LOCAL)
5025 if (! tls_count)
5026 first_tls = s;
5027 tls_count++;
5029 if (first_mbind == NULL
5030 && (elf_section_flags (s) & SHF_GNU_MBIND) != 0)
5031 first_mbind = s;
5034 /* If there are any SHF_TLS output sections, add PT_TLS segment. */
5035 if (tls_count > 0)
5037 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
5038 amt += tls_count * sizeof (asection *);
5039 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5040 if (m == NULL)
5041 goto error_return;
5042 m->next = NULL;
5043 m->p_type = PT_TLS;
5044 m->count = tls_count;
5045 /* Mandated PF_R. */
5046 m->p_flags = PF_R;
5047 m->p_flags_valid = 1;
5048 s = first_tls;
5049 for (i = 0; i < tls_count; ++i)
5051 if ((s->flags & SEC_THREAD_LOCAL) == 0)
5053 _bfd_error_handler
5054 (_("%pB: TLS sections are not adjacent:"), abfd);
5055 s = first_tls;
5056 i = 0;
5057 while (i < tls_count)
5059 if ((s->flags & SEC_THREAD_LOCAL) != 0)
5061 _bfd_error_handler (_(" TLS: %pA"), s);
5062 i++;
5064 else
5065 _bfd_error_handler (_(" non-TLS: %pA"), s);
5066 s = s->next;
5068 bfd_set_error (bfd_error_bad_value);
5069 goto error_return;
5071 m->sections[i] = s;
5072 s = s->next;
5075 *pm = m;
5076 pm = &m->next;
5079 if (first_mbind
5080 && (abfd->flags & D_PAGED) != 0
5081 && (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0)
5082 for (s = first_mbind; s != NULL; s = s->next)
5083 if ((elf_section_flags (s) & SHF_GNU_MBIND) != 0
5084 && elf_section_data (s)->this_hdr.sh_info <= PT_GNU_MBIND_NUM)
5086 /* Mandated PF_R. */
5087 unsigned long p_flags = PF_R;
5088 if ((s->flags & SEC_READONLY) == 0)
5089 p_flags |= PF_W;
5090 if ((s->flags & SEC_CODE) != 0)
5091 p_flags |= PF_X;
5093 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5094 m = bfd_zalloc (abfd, amt);
5095 if (m == NULL)
5096 goto error_return;
5097 m->next = NULL;
5098 m->p_type = (PT_GNU_MBIND_LO
5099 + elf_section_data (s)->this_hdr.sh_info);
5100 m->count = 1;
5101 m->p_flags_valid = 1;
5102 m->sections[0] = s;
5103 m->p_flags = p_flags;
5105 *pm = m;
5106 pm = &m->next;
5109 s = bfd_get_section_by_name (abfd,
5110 NOTE_GNU_PROPERTY_SECTION_NAME);
5111 if (s != NULL && s->size != 0)
5113 amt = sizeof (struct elf_segment_map) + sizeof (asection *);
5114 m = bfd_zalloc (abfd, amt);
5115 if (m == NULL)
5116 goto error_return;
5117 m->next = NULL;
5118 m->p_type = PT_GNU_PROPERTY;
5119 m->count = 1;
5120 m->p_flags_valid = 1;
5121 m->sections[0] = s;
5122 m->p_flags = PF_R;
5123 *pm = m;
5124 pm = &m->next;
5127 /* If there is a .eh_frame_hdr section, throw in a PT_GNU_EH_FRAME
5128 segment. */
5129 eh_frame_hdr = elf_eh_frame_hdr (info);
5130 if (eh_frame_hdr != NULL
5131 && (eh_frame_hdr->output_section->flags & SEC_LOAD) != 0)
5133 amt = sizeof (struct elf_segment_map);
5134 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5135 if (m == NULL)
5136 goto error_return;
5137 m->next = NULL;
5138 m->p_type = PT_GNU_EH_FRAME;
5139 m->count = 1;
5140 m->sections[0] = eh_frame_hdr->output_section;
5142 *pm = m;
5143 pm = &m->next;
5146 /* If there is a .sframe section, throw in a PT_GNU_SFRAME
5147 segment. */
5148 sframe = elf_sframe (abfd);
5149 if (sframe != NULL
5150 && (sframe->output_section->flags & SEC_LOAD) != 0
5151 && sframe->size != 0)
5153 amt = sizeof (struct elf_segment_map);
5154 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5155 if (m == NULL)
5156 goto error_return;
5157 m->next = NULL;
5158 m->p_type = PT_GNU_SFRAME;
5159 m->count = 1;
5160 m->sections[0] = sframe->output_section;
5162 *pm = m;
5163 pm = &m->next;
5166 if (elf_stack_flags (abfd))
5168 amt = sizeof (struct elf_segment_map);
5169 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5170 if (m == NULL)
5171 goto error_return;
5172 m->next = NULL;
5173 m->p_type = PT_GNU_STACK;
5174 m->p_flags = elf_stack_flags (abfd);
5175 m->p_align = bed->stack_align;
5176 m->p_flags_valid = 1;
5177 m->p_align_valid = m->p_align != 0;
5178 if (info->stacksize > 0)
5180 m->p_size = info->stacksize;
5181 m->p_size_valid = 1;
5184 *pm = m;
5185 pm = &m->next;
5188 if (info != NULL && info->relro)
5190 for (m = mfirst; m != NULL; m = m->next)
5192 if (m->p_type == PT_LOAD
5193 && m->count != 0
5194 && m->sections[0]->vma >= info->relro_start
5195 && m->sections[0]->vma < info->relro_end)
5197 i = m->count;
5198 while (--i != (unsigned) -1)
5200 if (m->sections[i]->size > 0
5201 && (m->sections[i]->flags & SEC_LOAD) != 0
5202 && (m->sections[i]->flags & SEC_HAS_CONTENTS) != 0)
5203 break;
5206 if (i != (unsigned) -1)
5207 break;
5211 /* Make a PT_GNU_RELRO segment only when it isn't empty. */
5212 if (m != NULL)
5214 amt = sizeof (struct elf_segment_map);
5215 m = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
5216 if (m == NULL)
5217 goto error_return;
5218 m->next = NULL;
5219 m->p_type = PT_GNU_RELRO;
5220 *pm = m;
5221 pm = &m->next;
5225 free (sections);
5226 elf_seg_map (abfd) = mfirst;
5229 if (!elf_modify_segment_map (abfd, info, no_user_phdrs))
5230 return false;
5232 for (count = 0, m = elf_seg_map (abfd); m != NULL; m = m->next)
5233 ++count;
5234 elf_program_header_size (abfd) = count * bed->s->sizeof_phdr;
5236 return true;
5238 error_return:
5239 free (sections);
5240 return false;
5243 /* Sort sections by address. */
5245 static int
5246 elf_sort_sections (const void *arg1, const void *arg2)
5248 const asection *sec1 = *(const asection **) arg1;
5249 const asection *sec2 = *(const asection **) arg2;
5250 bfd_size_type size1, size2;
5252 /* Sort by LMA first, since this is the address used to
5253 place the section into a segment. */
5254 if (sec1->lma < sec2->lma)
5255 return -1;
5256 else if (sec1->lma > sec2->lma)
5257 return 1;
5259 /* Then sort by VMA. Normally the LMA and the VMA will be
5260 the same, and this will do nothing. */
5261 if (sec1->vma < sec2->vma)
5262 return -1;
5263 else if (sec1->vma > sec2->vma)
5264 return 1;
5266 /* Put !SEC_LOAD sections after SEC_LOAD ones. */
5268 #define TOEND(x) (((x)->flags & (SEC_LOAD | SEC_THREAD_LOCAL)) == 0 \
5269 && (x)->size != 0)
5271 if (TOEND (sec1))
5273 if (!TOEND (sec2))
5274 return 1;
5276 else if (TOEND (sec2))
5277 return -1;
5279 #undef TOEND
5281 /* Sort by size, to put zero sized sections
5282 before others at the same address. */
5284 size1 = (sec1->flags & SEC_LOAD) ? sec1->size : 0;
5285 size2 = (sec2->flags & SEC_LOAD) ? sec2->size : 0;
5287 if (size1 < size2)
5288 return -1;
5289 if (size1 > size2)
5290 return 1;
5292 return sec1->target_index - sec2->target_index;
5295 /* This qsort comparison functions sorts PT_LOAD segments first and
5296 by p_paddr, for assign_file_positions_for_load_sections. */
5298 static int
5299 elf_sort_segments (const void *arg1, const void *arg2)
5301 const struct elf_segment_map *m1 = *(const struct elf_segment_map **) arg1;
5302 const struct elf_segment_map *m2 = *(const struct elf_segment_map **) arg2;
5304 if (m1->p_type != m2->p_type)
5306 if (m1->p_type == PT_NULL)
5307 return 1;
5308 if (m2->p_type == PT_NULL)
5309 return -1;
5310 return m1->p_type < m2->p_type ? -1 : 1;
5312 if (m1->includes_filehdr != m2->includes_filehdr)
5313 return m1->includes_filehdr ? -1 : 1;
5314 if (m1->no_sort_lma != m2->no_sort_lma)
5315 return m1->no_sort_lma ? -1 : 1;
5316 if (m1->p_type == PT_LOAD && !m1->no_sort_lma)
5318 bfd_vma lma1, lma2; /* Octets. */
5319 lma1 = 0;
5320 if (m1->p_paddr_valid)
5321 lma1 = m1->p_paddr;
5322 else if (m1->count != 0)
5324 unsigned int opb = bfd_octets_per_byte (m1->sections[0]->owner,
5325 m1->sections[0]);
5326 lma1 = (m1->sections[0]->lma + m1->p_vaddr_offset) * opb;
5328 lma2 = 0;
5329 if (m2->p_paddr_valid)
5330 lma2 = m2->p_paddr;
5331 else if (m2->count != 0)
5333 unsigned int opb = bfd_octets_per_byte (m2->sections[0]->owner,
5334 m2->sections[0]);
5335 lma2 = (m2->sections[0]->lma + m2->p_vaddr_offset) * opb;
5337 if (lma1 != lma2)
5338 return lma1 < lma2 ? -1 : 1;
5340 if (m1->idx != m2->idx)
5341 return m1->idx < m2->idx ? -1 : 1;
5342 return 0;
5345 /* Ian Lance Taylor writes:
5347 We shouldn't be using % with a negative signed number. That's just
5348 not good. We have to make sure either that the number is not
5349 negative, or that the number has an unsigned type. When the types
5350 are all the same size they wind up as unsigned. When file_ptr is a
5351 larger signed type, the arithmetic winds up as signed long long,
5352 which is wrong.
5354 What we're trying to say here is something like ``increase OFF by
5355 the least amount that will cause it to be equal to the VMA modulo
5356 the page size.'' */
5357 /* In other words, something like:
5359 vma_offset = m->sections[0]->vma % bed->maxpagesize;
5360 off_offset = off % bed->maxpagesize;
5361 if (vma_offset < off_offset)
5362 adjustment = vma_offset + bed->maxpagesize - off_offset;
5363 else
5364 adjustment = vma_offset - off_offset;
5366 which can be collapsed into the expression below. */
5368 static file_ptr
5369 vma_page_aligned_bias (bfd_vma vma, ufile_ptr off, bfd_vma maxpagesize)
5371 /* PR binutils/16199: Handle an alignment of zero. */
5372 if (maxpagesize == 0)
5373 maxpagesize = 1;
5374 return ((vma - off) % maxpagesize);
5377 static void
5378 print_segment_map (const struct elf_segment_map *m)
5380 unsigned int j;
5381 const char *pt = get_segment_type (m->p_type);
5382 char buf[32];
5384 if (pt == NULL)
5386 if (m->p_type >= PT_LOPROC && m->p_type <= PT_HIPROC)
5387 sprintf (buf, "LOPROC+%7.7x",
5388 (unsigned int) (m->p_type - PT_LOPROC));
5389 else if (m->p_type >= PT_LOOS && m->p_type <= PT_HIOS)
5390 sprintf (buf, "LOOS+%7.7x",
5391 (unsigned int) (m->p_type - PT_LOOS));
5392 else
5393 snprintf (buf, sizeof (buf), "%8.8x",
5394 (unsigned int) m->p_type);
5395 pt = buf;
5397 fflush (stdout);
5398 fprintf (stderr, "%s:", pt);
5399 for (j = 0; j < m->count; j++)
5400 fprintf (stderr, " %s", m->sections [j]->name);
5401 putc ('\n',stderr);
5402 fflush (stderr);
5405 static bool
5406 write_zeros (bfd *abfd, file_ptr pos, bfd_size_type len)
5408 void *buf;
5409 bool ret;
5411 if (bfd_seek (abfd, pos, SEEK_SET) != 0)
5412 return false;
5413 buf = bfd_zmalloc (len);
5414 if (buf == NULL)
5415 return false;
5416 ret = bfd_bwrite (buf, len, abfd) == len;
5417 free (buf);
5418 return ret;
5421 /* Assign file positions to the sections based on the mapping from
5422 sections to segments. This function also sets up some fields in
5423 the file header. */
5425 static bool
5426 assign_file_positions_for_load_sections (bfd *abfd,
5427 struct bfd_link_info *link_info)
5429 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5430 struct elf_segment_map *m;
5431 struct elf_segment_map *phdr_load_seg;
5432 Elf_Internal_Phdr *phdrs;
5433 Elf_Internal_Phdr *p;
5434 file_ptr off; /* Octets. */
5435 bfd_size_type maxpagesize;
5436 unsigned int alloc, actual;
5437 unsigned int i, j;
5438 struct elf_segment_map **sorted_seg_map;
5439 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
5441 if (link_info == NULL
5442 && !_bfd_elf_map_sections_to_segments (abfd, link_info, NULL))
5443 return false;
5445 alloc = 0;
5446 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
5447 m->idx = alloc++;
5449 if (alloc)
5451 elf_elfheader (abfd)->e_phoff = bed->s->sizeof_ehdr;
5452 elf_elfheader (abfd)->e_phentsize = bed->s->sizeof_phdr;
5454 else
5456 /* PR binutils/12467. */
5457 elf_elfheader (abfd)->e_phoff = 0;
5458 elf_elfheader (abfd)->e_phentsize = 0;
5461 elf_elfheader (abfd)->e_phnum = alloc;
5463 if (elf_program_header_size (abfd) == (bfd_size_type) -1)
5465 actual = alloc;
5466 elf_program_header_size (abfd) = alloc * bed->s->sizeof_phdr;
5468 else
5470 actual = elf_program_header_size (abfd) / bed->s->sizeof_phdr;
5471 BFD_ASSERT (elf_program_header_size (abfd)
5472 == actual * bed->s->sizeof_phdr);
5473 BFD_ASSERT (actual >= alloc);
5476 if (alloc == 0)
5478 elf_next_file_pos (abfd) = bed->s->sizeof_ehdr;
5479 return true;
5482 /* We're writing the size in elf_program_header_size (abfd),
5483 see assign_file_positions_except_relocs, so make sure we have
5484 that amount allocated, with trailing space cleared.
5485 The variable alloc contains the computed need, while
5486 elf_program_header_size (abfd) contains the size used for the
5487 layout.
5488 See ld/emultempl/elf-generic.em:gld${EMULATION_NAME}_map_segments
5489 where the layout is forced to according to a larger size in the
5490 last iterations for the testcase ld-elf/header. */
5491 phdrs = bfd_zalloc (abfd, (actual * sizeof (*phdrs)
5492 + alloc * sizeof (*sorted_seg_map)));
5493 sorted_seg_map = (struct elf_segment_map **) (phdrs + actual);
5494 elf_tdata (abfd)->phdr = phdrs;
5495 if (phdrs == NULL)
5496 return false;
5498 for (m = elf_seg_map (abfd), j = 0; m != NULL; m = m->next, j++)
5500 sorted_seg_map[j] = m;
5501 /* If elf_segment_map is not from map_sections_to_segments, the
5502 sections may not be correctly ordered. NOTE: sorting should
5503 not be done to the PT_NOTE section of a corefile, which may
5504 contain several pseudo-sections artificially created by bfd.
5505 Sorting these pseudo-sections breaks things badly. */
5506 if (m->count > 1
5507 && !(elf_elfheader (abfd)->e_type == ET_CORE
5508 && m->p_type == PT_NOTE))
5510 for (i = 0; i < m->count; i++)
5511 m->sections[i]->target_index = i;
5512 qsort (m->sections, (size_t) m->count, sizeof (asection *),
5513 elf_sort_sections);
5516 if (alloc > 1)
5517 qsort (sorted_seg_map, alloc, sizeof (*sorted_seg_map),
5518 elf_sort_segments);
5520 maxpagesize = 1;
5521 if ((abfd->flags & D_PAGED) != 0)
5523 if (link_info != NULL)
5524 maxpagesize = link_info->maxpagesize;
5525 else
5526 maxpagesize = bed->maxpagesize;
5529 /* Sections must map to file offsets past the ELF file header. */
5530 off = bed->s->sizeof_ehdr;
5531 /* And if one of the PT_LOAD headers doesn't include the program
5532 headers then we'll be mapping program headers in the usual
5533 position after the ELF file header. */
5534 phdr_load_seg = NULL;
5535 for (j = 0; j < alloc; j++)
5537 m = sorted_seg_map[j];
5538 if (m->p_type != PT_LOAD)
5539 break;
5540 if (m->includes_phdrs)
5542 phdr_load_seg = m;
5543 break;
5546 if (phdr_load_seg == NULL)
5547 off += actual * bed->s->sizeof_phdr;
5549 for (j = 0; j < alloc; j++)
5551 asection **secpp;
5552 bfd_vma off_adjust; /* Octets. */
5553 bool no_contents;
5554 bfd_size_type p_align;
5555 bool p_align_p;
5557 /* An ELF segment (described by Elf_Internal_Phdr) may contain a
5558 number of sections with contents contributing to both p_filesz
5559 and p_memsz, followed by a number of sections with no contents
5560 that just contribute to p_memsz. In this loop, OFF tracks next
5561 available file offset for PT_LOAD and PT_NOTE segments. */
5562 m = sorted_seg_map[j];
5563 p = phdrs + m->idx;
5564 p->p_type = m->p_type;
5565 p->p_flags = m->p_flags;
5566 p_align = bed->p_align;
5567 p_align_p = false;
5569 if (m->count == 0)
5570 p->p_vaddr = m->p_vaddr_offset * opb;
5571 else
5572 p->p_vaddr = (m->sections[0]->vma + m->p_vaddr_offset) * opb;
5574 if (m->p_paddr_valid)
5575 p->p_paddr = m->p_paddr;
5576 else if (m->count == 0)
5577 p->p_paddr = 0;
5578 else
5579 p->p_paddr = (m->sections[0]->lma + m->p_vaddr_offset) * opb;
5581 if (p->p_type == PT_LOAD
5582 && (abfd->flags & D_PAGED) != 0)
5584 /* p_align in demand paged PT_LOAD segments effectively stores
5585 the maximum page size. When copying an executable with
5586 objcopy, we set m->p_align from the input file. Use this
5587 value for maxpagesize rather than bed->maxpagesize, which
5588 may be different. Note that we use maxpagesize for PT_TLS
5589 segment alignment later in this function, so we are relying
5590 on at least one PT_LOAD segment appearing before a PT_TLS
5591 segment. */
5592 if (m->p_align_valid)
5593 maxpagesize = m->p_align;
5594 else if (p_align != 0
5595 && (link_info == NULL
5596 || !link_info->maxpagesize_is_set))
5597 /* Set p_align to the default p_align value while laying
5598 out segments aligning to the maximum page size or the
5599 largest section alignment. The run-time loader can
5600 align segments to the default p_align value or the
5601 maximum page size, depending on system page size. */
5602 p_align_p = true;
5604 p->p_align = maxpagesize;
5606 else if (m->p_align_valid)
5607 p->p_align = m->p_align;
5608 else if (m->count == 0)
5609 p->p_align = 1 << bed->s->log_file_align;
5611 if (m == phdr_load_seg)
5613 if (!m->includes_filehdr)
5614 p->p_offset = off;
5615 off += actual * bed->s->sizeof_phdr;
5618 no_contents = false;
5619 off_adjust = 0;
5620 if (p->p_type == PT_LOAD
5621 && m->count > 0)
5623 bfd_size_type align; /* Bytes. */
5624 unsigned int align_power = 0;
5626 if (m->p_align_valid)
5627 align = p->p_align;
5628 else
5630 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5632 unsigned int secalign;
5634 secalign = bfd_section_alignment (*secpp);
5635 if (secalign > align_power)
5636 align_power = secalign;
5638 align = (bfd_size_type) 1 << align_power;
5639 if (align < maxpagesize)
5641 /* If a section requires alignment higher than the
5642 default p_align value, don't set p_align to the
5643 default p_align value. */
5644 if (align > p_align)
5645 p_align_p = false;
5646 align = maxpagesize;
5648 else
5650 /* If a section requires alignment higher than the
5651 maximum page size, set p_align to the section
5652 alignment. */
5653 p_align_p = true;
5654 p_align = align;
5658 for (i = 0; i < m->count; i++)
5659 if ((m->sections[i]->flags & (SEC_LOAD | SEC_HAS_CONTENTS)) == 0)
5660 /* If we aren't making room for this section, then
5661 it must be SHT_NOBITS regardless of what we've
5662 set via struct bfd_elf_special_section. */
5663 elf_section_type (m->sections[i]) = SHT_NOBITS;
5665 /* Find out whether this segment contains any loadable
5666 sections. */
5667 no_contents = true;
5668 for (i = 0; i < m->count; i++)
5669 if (elf_section_type (m->sections[i]) != SHT_NOBITS)
5671 no_contents = false;
5672 break;
5675 off_adjust = vma_page_aligned_bias (p->p_vaddr, off, align * opb);
5677 /* Broken hardware and/or kernel require that files do not
5678 map the same page with different permissions on some hppa
5679 processors. */
5680 if (j != 0
5681 && (abfd->flags & D_PAGED) != 0
5682 && bed->no_page_alias
5683 && (off & (maxpagesize - 1)) != 0
5684 && ((off & -maxpagesize)
5685 == ((off + off_adjust) & -maxpagesize)))
5686 off_adjust += maxpagesize;
5687 off += off_adjust;
5688 if (no_contents)
5690 /* We shouldn't need to align the segment on disk since
5691 the segment doesn't need file space, but the gABI
5692 arguably requires the alignment and glibc ld.so
5693 checks it. So to comply with the alignment
5694 requirement but not waste file space, we adjust
5695 p_offset for just this segment. (OFF_ADJUST is
5696 subtracted from OFF later.) This may put p_offset
5697 past the end of file, but that shouldn't matter. */
5699 else
5700 off_adjust = 0;
5702 /* Make sure the .dynamic section is the first section in the
5703 PT_DYNAMIC segment. */
5704 else if (p->p_type == PT_DYNAMIC
5705 && m->count > 1
5706 && strcmp (m->sections[0]->name, ".dynamic") != 0)
5708 _bfd_error_handler
5709 (_("%pB: The first section in the PT_DYNAMIC segment"
5710 " is not the .dynamic section"),
5711 abfd);
5712 bfd_set_error (bfd_error_bad_value);
5713 return false;
5715 /* Set the note section type to SHT_NOTE. */
5716 else if (p->p_type == PT_NOTE)
5717 for (i = 0; i < m->count; i++)
5718 elf_section_type (m->sections[i]) = SHT_NOTE;
5720 if (m->includes_filehdr)
5722 if (!m->p_flags_valid)
5723 p->p_flags |= PF_R;
5724 p->p_filesz = bed->s->sizeof_ehdr;
5725 p->p_memsz = bed->s->sizeof_ehdr;
5726 if (p->p_type == PT_LOAD)
5728 if (m->count > 0)
5730 if (p->p_vaddr < (bfd_vma) off
5731 || (!m->p_paddr_valid
5732 && p->p_paddr < (bfd_vma) off))
5734 _bfd_error_handler
5735 (_("%pB: not enough room for program headers,"
5736 " try linking with -N"),
5737 abfd);
5738 bfd_set_error (bfd_error_bad_value);
5739 return false;
5741 p->p_vaddr -= off;
5742 if (!m->p_paddr_valid)
5743 p->p_paddr -= off;
5746 else if (sorted_seg_map[0]->includes_filehdr)
5748 Elf_Internal_Phdr *filehdr = phdrs + sorted_seg_map[0]->idx;
5749 p->p_vaddr = filehdr->p_vaddr;
5750 if (!m->p_paddr_valid)
5751 p->p_paddr = filehdr->p_paddr;
5755 if (m->includes_phdrs)
5757 if (!m->p_flags_valid)
5758 p->p_flags |= PF_R;
5759 p->p_filesz += actual * bed->s->sizeof_phdr;
5760 p->p_memsz += actual * bed->s->sizeof_phdr;
5761 if (!m->includes_filehdr)
5763 if (p->p_type == PT_LOAD)
5765 elf_elfheader (abfd)->e_phoff = p->p_offset;
5766 if (m->count > 0)
5768 p->p_vaddr -= off - p->p_offset;
5769 if (!m->p_paddr_valid)
5770 p->p_paddr -= off - p->p_offset;
5773 else if (phdr_load_seg != NULL)
5775 Elf_Internal_Phdr *phdr = phdrs + phdr_load_seg->idx;
5776 bfd_vma phdr_off = 0; /* Octets. */
5777 if (phdr_load_seg->includes_filehdr)
5778 phdr_off = bed->s->sizeof_ehdr;
5779 p->p_vaddr = phdr->p_vaddr + phdr_off;
5780 if (!m->p_paddr_valid)
5781 p->p_paddr = phdr->p_paddr + phdr_off;
5782 p->p_offset = phdr->p_offset + phdr_off;
5784 else
5785 p->p_offset = bed->s->sizeof_ehdr;
5789 if (p->p_type == PT_LOAD
5790 || (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core))
5792 if (!m->includes_filehdr && !m->includes_phdrs)
5794 p->p_offset = off;
5795 if (no_contents)
5797 /* Put meaningless p_offset for PT_LOAD segments
5798 without file contents somewhere within the first
5799 page, in an attempt to not point past EOF. */
5800 bfd_size_type align = maxpagesize;
5801 if (align < p->p_align)
5802 align = p->p_align;
5803 if (align < 1)
5804 align = 1;
5805 p->p_offset = off % align;
5808 else
5810 file_ptr adjust; /* Octets. */
5812 adjust = off - (p->p_offset + p->p_filesz);
5813 if (!no_contents)
5814 p->p_filesz += adjust;
5815 p->p_memsz += adjust;
5819 /* Set up p_filesz, p_memsz, p_align and p_flags from the section
5820 maps. Set filepos for sections in PT_LOAD segments, and in
5821 core files, for sections in PT_NOTE segments.
5822 assign_file_positions_for_non_load_sections will set filepos
5823 for other sections and update p_filesz for other segments. */
5824 for (i = 0, secpp = m->sections; i < m->count; i++, secpp++)
5826 asection *sec;
5827 bfd_size_type align;
5828 Elf_Internal_Shdr *this_hdr;
5830 sec = *secpp;
5831 this_hdr = &elf_section_data (sec)->this_hdr;
5832 align = (bfd_size_type) 1 << bfd_section_alignment (sec);
5834 if ((p->p_type == PT_LOAD
5835 || p->p_type == PT_TLS)
5836 && (this_hdr->sh_type != SHT_NOBITS
5837 || ((this_hdr->sh_flags & SHF_ALLOC) != 0
5838 && ((this_hdr->sh_flags & SHF_TLS) == 0
5839 || p->p_type == PT_TLS))))
5841 bfd_vma p_start = p->p_paddr; /* Octets. */
5842 bfd_vma p_end = p_start + p->p_memsz; /* Octets. */
5843 bfd_vma s_start = sec->lma * opb; /* Octets. */
5844 bfd_vma adjust = s_start - p_end; /* Octets. */
5846 if (adjust != 0
5847 && (s_start < p_end
5848 || p_end < p_start))
5850 _bfd_error_handler
5851 /* xgettext:c-format */
5852 (_("%pB: section %pA lma %#" PRIx64
5853 " adjusted to %#" PRIx64),
5854 abfd, sec, (uint64_t) s_start / opb,
5855 (uint64_t) p_end / opb);
5856 adjust = 0;
5857 sec->lma = p_end / opb;
5859 p->p_memsz += adjust;
5861 if (p->p_type == PT_LOAD)
5863 if (this_hdr->sh_type != SHT_NOBITS)
5865 off_adjust = 0;
5866 if (p->p_filesz + adjust < p->p_memsz)
5868 /* We have a PROGBITS section following NOBITS ones.
5869 Allocate file space for the NOBITS section(s) and
5870 zero it. */
5871 adjust = p->p_memsz - p->p_filesz;
5872 if (!write_zeros (abfd, off, adjust))
5873 return false;
5876 /* We only adjust sh_offset in SHT_NOBITS sections
5877 as would seem proper for their address when the
5878 section is first in the segment. sh_offset
5879 doesn't really have any significance for
5880 SHT_NOBITS anyway, apart from a notional position
5881 relative to other sections. Historically we
5882 didn't bother with adjusting sh_offset and some
5883 programs depend on it not being adjusted. See
5884 pr12921 and pr25662. */
5885 if (this_hdr->sh_type != SHT_NOBITS || i == 0)
5887 off += adjust;
5888 if (this_hdr->sh_type == SHT_NOBITS)
5889 off_adjust += adjust;
5892 if (this_hdr->sh_type != SHT_NOBITS)
5893 p->p_filesz += adjust;
5896 if (p->p_type == PT_NOTE && bfd_get_format (abfd) == bfd_core)
5898 /* The section at i == 0 is the one that actually contains
5899 everything. */
5900 if (i == 0)
5902 this_hdr->sh_offset = sec->filepos = off;
5903 off += this_hdr->sh_size;
5904 p->p_filesz = this_hdr->sh_size;
5905 p->p_memsz = 0;
5906 p->p_align = 1;
5908 else
5910 /* The rest are fake sections that shouldn't be written. */
5911 sec->filepos = 0;
5912 sec->size = 0;
5913 sec->flags = 0;
5914 continue;
5917 else
5919 if (p->p_type == PT_LOAD)
5921 this_hdr->sh_offset = sec->filepos = off;
5922 if (this_hdr->sh_type != SHT_NOBITS)
5923 off += this_hdr->sh_size;
5925 else if (this_hdr->sh_type == SHT_NOBITS
5926 && (this_hdr->sh_flags & SHF_TLS) != 0
5927 && this_hdr->sh_offset == 0)
5929 /* This is a .tbss section that didn't get a PT_LOAD.
5930 (See _bfd_elf_map_sections_to_segments "Create a
5931 final PT_LOAD".) Set sh_offset to the value it
5932 would have if we had created a zero p_filesz and
5933 p_memsz PT_LOAD header for the section. This
5934 also makes the PT_TLS header have the same
5935 p_offset value. */
5936 bfd_vma adjust = vma_page_aligned_bias (this_hdr->sh_addr,
5937 off, align);
5938 this_hdr->sh_offset = sec->filepos = off + adjust;
5941 if (this_hdr->sh_type != SHT_NOBITS)
5943 p->p_filesz += this_hdr->sh_size;
5944 /* A load section without SHF_ALLOC is something like
5945 a note section in a PT_NOTE segment. These take
5946 file space but are not loaded into memory. */
5947 if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5948 p->p_memsz += this_hdr->sh_size;
5950 else if ((this_hdr->sh_flags & SHF_ALLOC) != 0)
5952 if (p->p_type == PT_TLS)
5953 p->p_memsz += this_hdr->sh_size;
5955 /* .tbss is special. It doesn't contribute to p_memsz of
5956 normal segments. */
5957 else if ((this_hdr->sh_flags & SHF_TLS) == 0)
5958 p->p_memsz += this_hdr->sh_size;
5961 if (align > p->p_align
5962 && !m->p_align_valid
5963 && (p->p_type != PT_LOAD
5964 || (abfd->flags & D_PAGED) == 0))
5965 p->p_align = align;
5968 if (!m->p_flags_valid)
5970 p->p_flags |= PF_R;
5971 if ((this_hdr->sh_flags & SHF_EXECINSTR) != 0)
5972 p->p_flags |= PF_X;
5973 if ((this_hdr->sh_flags & SHF_WRITE) != 0)
5974 p->p_flags |= PF_W;
5978 off -= off_adjust;
5980 /* PR ld/20815 - Check that the program header segment, if
5981 present, will be loaded into memory. */
5982 if (p->p_type == PT_PHDR
5983 && phdr_load_seg == NULL
5984 && !(bed->elf_backend_allow_non_load_phdr != NULL
5985 && bed->elf_backend_allow_non_load_phdr (abfd, phdrs, alloc)))
5987 /* The fix for this error is usually to edit the linker script being
5988 used and set up the program headers manually. Either that or
5989 leave room for the headers at the start of the SECTIONS. */
5990 _bfd_error_handler (_("%pB: error: PHDR segment not covered"
5991 " by LOAD segment"),
5992 abfd);
5993 if (link_info == NULL)
5994 return false;
5995 /* Arrange for the linker to exit with an error, deleting
5996 the output file unless --noinhibit-exec is given. */
5997 link_info->callbacks->info ("%X");
6000 /* Check that all sections are in a PT_LOAD segment.
6001 Don't check funky gdb generated core files. */
6002 if (p->p_type == PT_LOAD && bfd_get_format (abfd) != bfd_core)
6004 bool check_vma = true;
6006 for (i = 1; i < m->count; i++)
6007 if (m->sections[i]->vma == m->sections[i - 1]->vma
6008 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i])
6009 ->this_hdr), p) != 0
6010 && ELF_SECTION_SIZE (&(elf_section_data (m->sections[i - 1])
6011 ->this_hdr), p) != 0)
6013 /* Looks like we have overlays packed into the segment. */
6014 check_vma = false;
6015 break;
6018 for (i = 0; i < m->count; i++)
6020 Elf_Internal_Shdr *this_hdr;
6021 asection *sec;
6023 sec = m->sections[i];
6024 this_hdr = &(elf_section_data(sec)->this_hdr);
6025 if (!ELF_SECTION_IN_SEGMENT_1 (this_hdr, p, check_vma, 0)
6026 && !ELF_TBSS_SPECIAL (this_hdr, p))
6028 _bfd_error_handler
6029 /* xgettext:c-format */
6030 (_("%pB: section `%pA' can't be allocated in segment %d"),
6031 abfd, sec, j);
6032 print_segment_map (m);
6036 if (p_align_p)
6037 p->p_align = p_align;
6041 elf_next_file_pos (abfd) = off;
6043 if (link_info != NULL
6044 && phdr_load_seg != NULL
6045 && phdr_load_seg->includes_filehdr)
6047 /* There is a segment that contains both the file headers and the
6048 program headers, so provide a symbol __ehdr_start pointing there.
6049 A program can use this to examine itself robustly. */
6051 struct elf_link_hash_entry *hash
6052 = elf_link_hash_lookup (elf_hash_table (link_info), "__ehdr_start",
6053 false, false, true);
6054 /* If the symbol was referenced and not defined, define it. */
6055 if (hash != NULL
6056 && (hash->root.type == bfd_link_hash_new
6057 || hash->root.type == bfd_link_hash_undefined
6058 || hash->root.type == bfd_link_hash_undefweak
6059 || hash->root.type == bfd_link_hash_common))
6061 asection *s = NULL;
6062 bfd_vma filehdr_vaddr = phdrs[phdr_load_seg->idx].p_vaddr / opb;
6064 if (phdr_load_seg->count != 0)
6065 /* The segment contains sections, so use the first one. */
6066 s = phdr_load_seg->sections[0];
6067 else
6068 /* Use the first (i.e. lowest-addressed) section in any segment. */
6069 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
6070 if (m->p_type == PT_LOAD && m->count != 0)
6072 s = m->sections[0];
6073 break;
6076 if (s != NULL)
6078 hash->root.u.def.value = filehdr_vaddr - s->vma;
6079 hash->root.u.def.section = s;
6081 else
6083 hash->root.u.def.value = filehdr_vaddr;
6084 hash->root.u.def.section = bfd_abs_section_ptr;
6087 hash->root.type = bfd_link_hash_defined;
6088 hash->def_regular = 1;
6089 hash->non_elf = 0;
6093 return true;
6096 /* Determine if a bfd is a debuginfo file. Unfortunately there
6097 is no defined method for detecting such files, so we have to
6098 use heuristics instead. */
6100 bool
6101 is_debuginfo_file (bfd *abfd)
6103 if (abfd == NULL || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
6104 return false;
6106 Elf_Internal_Shdr **start_headers = elf_elfsections (abfd);
6107 Elf_Internal_Shdr **end_headers = start_headers + elf_numsections (abfd);
6108 Elf_Internal_Shdr **headerp;
6110 for (headerp = start_headers; headerp < end_headers; headerp ++)
6112 Elf_Internal_Shdr *header = * headerp;
6114 /* Debuginfo files do not have any allocated SHT_PROGBITS sections.
6115 The only allocated sections are SHT_NOBITS or SHT_NOTES. */
6116 if ((header->sh_flags & SHF_ALLOC) == SHF_ALLOC
6117 && header->sh_type != SHT_NOBITS
6118 && header->sh_type != SHT_NOTE)
6119 return false;
6122 return true;
6125 /* Assign file positions for other sections, except for compressed debug
6126 and sections assigned in _bfd_elf_assign_file_positions_for_non_load. */
6128 static bool
6129 assign_file_positions_for_non_load_sections (bfd *abfd,
6130 struct bfd_link_info *link_info)
6132 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6133 Elf_Internal_Shdr **i_shdrpp;
6134 Elf_Internal_Shdr **hdrpp, **end_hdrpp;
6135 Elf_Internal_Phdr *phdrs;
6136 Elf_Internal_Phdr *p;
6137 struct elf_segment_map *m;
6138 file_ptr off;
6139 unsigned int opb = bfd_octets_per_byte (abfd, NULL);
6140 bfd_vma maxpagesize;
6142 if (link_info != NULL)
6143 maxpagesize = link_info->maxpagesize;
6144 else
6145 maxpagesize = bed->maxpagesize;
6146 i_shdrpp = elf_elfsections (abfd);
6147 end_hdrpp = i_shdrpp + elf_numsections (abfd);
6148 off = elf_next_file_pos (abfd);
6149 for (hdrpp = i_shdrpp + 1; hdrpp < end_hdrpp; hdrpp++)
6151 Elf_Internal_Shdr *hdr;
6152 bfd_vma align;
6154 hdr = *hdrpp;
6155 if (hdr->bfd_section != NULL
6156 && (hdr->bfd_section->filepos != 0
6157 || (hdr->sh_type == SHT_NOBITS
6158 && hdr->contents == NULL)))
6159 BFD_ASSERT (hdr->sh_offset == hdr->bfd_section->filepos);
6160 else if ((hdr->sh_flags & SHF_ALLOC) != 0)
6162 if (hdr->sh_size != 0
6163 /* PR 24717 - debuginfo files are known to be not strictly
6164 compliant with the ELF standard. In particular they often
6165 have .note.gnu.property sections that are outside of any
6166 loadable segment. This is not a problem for such files,
6167 so do not warn about them. */
6168 && ! is_debuginfo_file (abfd))
6169 _bfd_error_handler
6170 /* xgettext:c-format */
6171 (_("%pB: warning: allocated section `%s' not in segment"),
6172 abfd,
6173 (hdr->bfd_section == NULL
6174 ? "*unknown*"
6175 : hdr->bfd_section->name));
6176 /* We don't need to page align empty sections. */
6177 if ((abfd->flags & D_PAGED) != 0 && hdr->sh_size != 0)
6178 align = maxpagesize;
6179 else
6180 align = hdr->sh_addralign & -hdr->sh_addralign;
6181 off += vma_page_aligned_bias (hdr->sh_addr, off, align);
6182 off = _bfd_elf_assign_file_position_for_section (hdr, off,
6183 false);
6185 else if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6186 && hdr->bfd_section == NULL)
6187 /* We don't know the offset of these sections yet:
6188 their size has not been decided. */
6189 || (abfd->is_linker_output
6190 && hdr->bfd_section != NULL
6191 && (hdr->sh_name == -1u
6192 || bfd_section_is_ctf (hdr->bfd_section)))
6193 || hdr == i_shdrpp[elf_onesymtab (abfd)]
6194 || (elf_symtab_shndx_list (abfd) != NULL
6195 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6196 || hdr == i_shdrpp[elf_strtab_sec (abfd)]
6197 || hdr == i_shdrpp[elf_shstrtab_sec (abfd)])
6198 hdr->sh_offset = -1;
6199 else
6200 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
6202 elf_next_file_pos (abfd) = off;
6204 /* Now that we have set the section file positions, we can set up
6205 the file positions for the non PT_LOAD segments. */
6206 phdrs = elf_tdata (abfd)->phdr;
6207 for (m = elf_seg_map (abfd), p = phdrs; m != NULL; m = m->next, p++)
6209 if (p->p_type == PT_GNU_RELRO)
6211 bfd_vma start, end; /* Bytes. */
6212 bool ok;
6214 if (link_info != NULL)
6216 /* During linking the range of the RELRO segment is passed
6217 in link_info. Note that there may be padding between
6218 relro_start and the first RELRO section. */
6219 start = link_info->relro_start;
6220 end = link_info->relro_end;
6222 else if (m->count != 0)
6224 if (!m->p_size_valid)
6225 abort ();
6226 start = m->sections[0]->vma;
6227 end = start + m->p_size / opb;
6229 else
6231 start = 0;
6232 end = 0;
6235 ok = false;
6236 if (start < end)
6238 struct elf_segment_map *lm;
6239 const Elf_Internal_Phdr *lp;
6240 unsigned int i;
6242 /* Find a LOAD segment containing a section in the RELRO
6243 segment. */
6244 for (lm = elf_seg_map (abfd), lp = phdrs;
6245 lm != NULL;
6246 lm = lm->next, lp++)
6248 if (lp->p_type == PT_LOAD
6249 && lm->count != 0
6250 && (lm->sections[lm->count - 1]->vma
6251 + (!IS_TBSS (lm->sections[lm->count - 1])
6252 ? lm->sections[lm->count - 1]->size / opb
6253 : 0)) > start
6254 && lm->sections[0]->vma < end)
6255 break;
6258 if (lm != NULL)
6260 /* Find the section starting the RELRO segment. */
6261 for (i = 0; i < lm->count; i++)
6263 asection *s = lm->sections[i];
6264 if (s->vma >= start
6265 && s->vma < end
6266 && s->size != 0)
6267 break;
6270 if (i < lm->count)
6272 p->p_vaddr = lm->sections[i]->vma * opb;
6273 p->p_paddr = lm->sections[i]->lma * opb;
6274 p->p_offset = lm->sections[i]->filepos;
6275 p->p_memsz = end * opb - p->p_vaddr;
6276 p->p_filesz = p->p_memsz;
6278 /* The RELRO segment typically ends a few bytes
6279 into .got.plt but other layouts are possible.
6280 In cases where the end does not match any
6281 loaded section (for instance is in file
6282 padding), trim p_filesz back to correspond to
6283 the end of loaded section contents. */
6284 if (p->p_filesz > lp->p_vaddr + lp->p_filesz - p->p_vaddr)
6285 p->p_filesz = lp->p_vaddr + lp->p_filesz - p->p_vaddr;
6287 /* Preserve the alignment and flags if they are
6288 valid. The gold linker generates RW/4 for
6289 the PT_GNU_RELRO section. It is better for
6290 objcopy/strip to honor these attributes
6291 otherwise gdb will choke when using separate
6292 debug files. */
6293 if (!m->p_align_valid)
6294 p->p_align = 1;
6295 if (!m->p_flags_valid)
6296 p->p_flags = PF_R;
6297 ok = true;
6302 if (!ok)
6304 if (link_info != NULL)
6305 _bfd_error_handler
6306 (_("%pB: warning: unable to allocate any sections"
6307 " to PT_GNU_RELRO segment"),
6308 abfd);
6309 memset (p, 0, sizeof *p);
6312 else if (p->p_type == PT_GNU_STACK)
6314 if (m->p_size_valid)
6315 p->p_memsz = m->p_size;
6317 else if (m->count != 0)
6319 unsigned int i;
6321 if (p->p_type != PT_LOAD
6322 && (p->p_type != PT_NOTE
6323 || bfd_get_format (abfd) != bfd_core))
6325 /* A user specified segment layout may include a PHDR
6326 segment that overlaps with a LOAD segment... */
6327 if (p->p_type == PT_PHDR)
6329 m->count = 0;
6330 continue;
6333 if (m->includes_filehdr || m->includes_phdrs)
6335 /* PR 17512: file: 2195325e. */
6336 _bfd_error_handler
6337 (_("%pB: error: non-load segment %d includes file header "
6338 "and/or program header"),
6339 abfd, (int) (p - phdrs));
6340 return false;
6343 p->p_filesz = 0;
6344 p->p_offset = m->sections[0]->filepos;
6345 for (i = m->count; i-- != 0;)
6347 asection *sect = m->sections[i];
6348 Elf_Internal_Shdr *hdr = &elf_section_data (sect)->this_hdr;
6349 if (hdr->sh_type != SHT_NOBITS)
6351 p->p_filesz = sect->filepos - p->p_offset + hdr->sh_size;
6352 /* NB: p_memsz of the loadable PT_NOTE segment
6353 should be the same as p_filesz. */
6354 if (p->p_type == PT_NOTE
6355 && (hdr->sh_flags & SHF_ALLOC) != 0)
6356 p->p_memsz = p->p_filesz;
6357 break;
6364 return true;
6367 static elf_section_list *
6368 find_section_in_list (unsigned int i, elf_section_list * list)
6370 for (;list != NULL; list = list->next)
6371 if (list->ndx == i)
6372 break;
6373 return list;
6376 /* Work out the file positions of all the sections. This is called by
6377 _bfd_elf_compute_section_file_positions. All the section sizes and
6378 VMAs must be known before this is called.
6380 Reloc sections come in two flavours: Those processed specially as
6381 "side-channel" data attached to a section to which they apply, and
6382 those that bfd doesn't process as relocations. The latter sort are
6383 stored in a normal bfd section by bfd_section_from_shdr. We don't
6384 consider the former sort here, unless they form part of the loadable
6385 image. Reloc sections not assigned here (and compressed debugging
6386 sections and CTF sections which nothing else in the file can rely
6387 upon) will be handled later by assign_file_positions_for_relocs.
6389 We also don't set the positions of the .symtab and .strtab here. */
6391 static bool
6392 assign_file_positions_except_relocs (bfd *abfd,
6393 struct bfd_link_info *link_info)
6395 struct elf_obj_tdata *tdata = elf_tdata (abfd);
6396 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
6397 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6398 unsigned int alloc;
6400 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0
6401 && bfd_get_format (abfd) != bfd_core)
6403 Elf_Internal_Shdr ** const i_shdrpp = elf_elfsections (abfd);
6404 unsigned int num_sec = elf_numsections (abfd);
6405 Elf_Internal_Shdr **hdrpp;
6406 unsigned int i;
6407 file_ptr off;
6409 /* Start after the ELF header. */
6410 off = i_ehdrp->e_ehsize;
6412 /* We are not creating an executable, which means that we are
6413 not creating a program header, and that the actual order of
6414 the sections in the file is unimportant. */
6415 for (i = 1, hdrpp = i_shdrpp + 1; i < num_sec; i++, hdrpp++)
6417 Elf_Internal_Shdr *hdr;
6419 hdr = *hdrpp;
6420 if (((hdr->sh_type == SHT_REL || hdr->sh_type == SHT_RELA)
6421 && hdr->bfd_section == NULL)
6422 /* Do not assign offsets for these sections yet: we don't know
6423 their sizes. */
6424 || (abfd->is_linker_output
6425 && hdr->bfd_section != NULL
6426 && (hdr->sh_name == -1u
6427 || bfd_section_is_ctf (hdr->bfd_section)))
6428 || i == elf_onesymtab (abfd)
6429 || (elf_symtab_shndx_list (abfd) != NULL
6430 && hdr == i_shdrpp[elf_symtab_shndx_list (abfd)->ndx])
6431 || i == elf_strtab_sec (abfd)
6432 || i == elf_shstrtab_sec (abfd))
6434 hdr->sh_offset = -1;
6436 else
6437 off = _bfd_elf_assign_file_position_for_section (hdr, off, true);
6440 elf_next_file_pos (abfd) = off;
6441 elf_program_header_size (abfd) = 0;
6443 else
6445 /* Assign file positions for the loaded sections based on the
6446 assignment of sections to segments. */
6447 if (!assign_file_positions_for_load_sections (abfd, link_info))
6448 return false;
6450 /* And for non-load sections. */
6451 if (!assign_file_positions_for_non_load_sections (abfd, link_info))
6452 return false;
6455 if (!(*bed->elf_backend_modify_headers) (abfd, link_info))
6456 return false;
6458 /* Write out the program headers. */
6459 alloc = i_ehdrp->e_phnum;
6460 if (alloc != 0)
6462 if (link_info != NULL && ! link_info->no_warn_rwx_segments)
6464 /* Memory resident segments with non-zero size and RWX
6465 permissions are a security risk, so we generate a warning
6466 here if we are creating any. */
6467 unsigned int i;
6469 for (i = 0; i < alloc; i++)
6471 const Elf_Internal_Phdr * phdr = tdata->phdr + i;
6473 if (phdr->p_memsz == 0)
6474 continue;
6476 if (phdr->p_type == PT_TLS && (phdr->p_flags & PF_X))
6477 _bfd_error_handler (_("warning: %pB has a TLS segment"
6478 " with execute permission"),
6479 abfd);
6480 else if (phdr->p_type == PT_LOAD
6481 && ((phdr->p_flags & (PF_R | PF_W | PF_X))
6482 == (PF_R | PF_W | PF_X)))
6483 _bfd_error_handler (_("warning: %pB has a LOAD segment"
6484 " with RWX permissions"),
6485 abfd);
6489 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0
6490 || bed->s->write_out_phdrs (abfd, tdata->phdr, alloc) != 0)
6491 return false;
6494 return true;
6497 bool
6498 _bfd_elf_init_file_header (bfd *abfd,
6499 struct bfd_link_info *info ATTRIBUTE_UNUSED)
6501 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form. */
6502 struct elf_strtab_hash *shstrtab;
6503 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6505 i_ehdrp = elf_elfheader (abfd);
6507 shstrtab = _bfd_elf_strtab_init ();
6508 if (shstrtab == NULL)
6509 return false;
6511 elf_shstrtab (abfd) = shstrtab;
6513 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
6514 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
6515 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
6516 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
6518 i_ehdrp->e_ident[EI_CLASS] = bed->s->elfclass;
6519 i_ehdrp->e_ident[EI_DATA] =
6520 bfd_big_endian (abfd) ? ELFDATA2MSB : ELFDATA2LSB;
6521 i_ehdrp->e_ident[EI_VERSION] = bed->s->ev_current;
6523 if ((abfd->flags & DYNAMIC) != 0)
6524 i_ehdrp->e_type = ET_DYN;
6525 else if ((abfd->flags & EXEC_P) != 0)
6526 i_ehdrp->e_type = ET_EXEC;
6527 else if (bfd_get_format (abfd) == bfd_core)
6528 i_ehdrp->e_type = ET_CORE;
6529 else
6530 i_ehdrp->e_type = ET_REL;
6532 switch (bfd_get_arch (abfd))
6534 case bfd_arch_unknown:
6535 i_ehdrp->e_machine = EM_NONE;
6536 break;
6538 /* There used to be a long list of cases here, each one setting
6539 e_machine to the same EM_* macro #defined as ELF_MACHINE_CODE
6540 in the corresponding bfd definition. To avoid duplication,
6541 the switch was removed. Machines that need special handling
6542 can generally do it in elf_backend_final_write_processing(),
6543 unless they need the information earlier than the final write.
6544 Such need can generally be supplied by replacing the tests for
6545 e_machine with the conditions used to determine it. */
6546 default:
6547 i_ehdrp->e_machine = bed->elf_machine_code;
6550 i_ehdrp->e_version = bed->s->ev_current;
6551 i_ehdrp->e_ehsize = bed->s->sizeof_ehdr;
6553 /* No program header, for now. */
6554 i_ehdrp->e_phoff = 0;
6555 i_ehdrp->e_phentsize = 0;
6556 i_ehdrp->e_phnum = 0;
6558 /* Each bfd section is section header entry. */
6559 i_ehdrp->e_entry = bfd_get_start_address (abfd);
6560 i_ehdrp->e_shentsize = bed->s->sizeof_shdr;
6562 elf_tdata (abfd)->symtab_hdr.sh_name =
6563 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".symtab", false);
6564 elf_tdata (abfd)->strtab_hdr.sh_name =
6565 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".strtab", false);
6566 elf_tdata (abfd)->shstrtab_hdr.sh_name =
6567 (unsigned int) _bfd_elf_strtab_add (shstrtab, ".shstrtab", false);
6568 if (elf_tdata (abfd)->symtab_hdr.sh_name == (unsigned int) -1
6569 || elf_tdata (abfd)->strtab_hdr.sh_name == (unsigned int) -1
6570 || elf_tdata (abfd)->shstrtab_hdr.sh_name == (unsigned int) -1)
6571 return false;
6573 return true;
6576 /* Set e_type in ELF header to ET_EXEC for -pie -Ttext-segment=.
6578 FIXME: We used to have code here to sort the PT_LOAD segments into
6579 ascending order, as per the ELF spec. But this breaks some programs,
6580 including the Linux kernel. But really either the spec should be
6581 changed or the programs updated. */
6583 bool
6584 _bfd_elf_modify_headers (bfd *obfd, struct bfd_link_info *link_info)
6586 if (link_info != NULL && bfd_link_pie (link_info))
6588 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (obfd);
6589 unsigned int num_segments = i_ehdrp->e_phnum;
6590 struct elf_obj_tdata *tdata = elf_tdata (obfd);
6591 Elf_Internal_Phdr *segment = tdata->phdr;
6592 Elf_Internal_Phdr *end_segment = &segment[num_segments];
6594 /* Find the lowest p_vaddr in PT_LOAD segments. */
6595 bfd_vma p_vaddr = (bfd_vma) -1;
6596 for (; segment < end_segment; segment++)
6597 if (segment->p_type == PT_LOAD && p_vaddr > segment->p_vaddr)
6598 p_vaddr = segment->p_vaddr;
6600 /* Set e_type to ET_EXEC if the lowest p_vaddr in PT_LOAD
6601 segments is non-zero. */
6602 if (p_vaddr)
6603 i_ehdrp->e_type = ET_EXEC;
6605 return true;
6608 /* Assign file positions for all the reloc sections which are not part
6609 of the loadable file image, and the file position of section headers. */
6611 static bool
6612 _bfd_elf_assign_file_positions_for_non_load (bfd *abfd)
6614 file_ptr off;
6615 Elf_Internal_Shdr **shdrpp, **end_shdrpp;
6616 Elf_Internal_Shdr *shdrp;
6617 Elf_Internal_Ehdr *i_ehdrp;
6618 const struct elf_backend_data *bed;
6620 off = elf_next_file_pos (abfd);
6622 shdrpp = elf_elfsections (abfd);
6623 end_shdrpp = shdrpp + elf_numsections (abfd);
6624 for (shdrpp++; shdrpp < end_shdrpp; shdrpp++)
6626 shdrp = *shdrpp;
6627 if (shdrp->sh_offset == -1)
6629 asection *sec = shdrp->bfd_section;
6630 if (sec == NULL
6631 || shdrp->sh_type == SHT_REL
6632 || shdrp->sh_type == SHT_RELA)
6634 else if (bfd_section_is_ctf (sec))
6636 /* Update section size and contents. */
6637 shdrp->sh_size = sec->size;
6638 shdrp->contents = sec->contents;
6640 else if (shdrp->sh_name == -1u)
6642 const char *name = sec->name;
6643 struct bfd_elf_section_data *d;
6645 /* Compress DWARF debug sections. */
6646 if (!bfd_compress_section (abfd, sec, shdrp->contents))
6647 return false;
6649 if (sec->compress_status == COMPRESS_SECTION_DONE
6650 && (abfd->flags & BFD_COMPRESS_GABI) == 0
6651 && name[1] == 'd')
6653 /* If section is compressed with zlib-gnu, convert
6654 section name from .debug_* to .zdebug_*. */
6655 char *new_name = bfd_debug_name_to_zdebug (abfd, name);
6656 if (new_name == NULL)
6657 return false;
6658 name = new_name;
6660 /* Add section name to section name section. */
6661 shdrp->sh_name
6662 = (unsigned int) _bfd_elf_strtab_add (elf_shstrtab (abfd),
6663 name, false);
6664 d = elf_section_data (sec);
6666 /* Add reloc section name to section name section. */
6667 if (d->rel.hdr
6668 && !_bfd_elf_set_reloc_sh_name (abfd, d->rel.hdr,
6669 name, false))
6670 return false;
6671 if (d->rela.hdr
6672 && !_bfd_elf_set_reloc_sh_name (abfd, d->rela.hdr,
6673 name, true))
6674 return false;
6676 /* Update section size and contents. */
6677 shdrp->sh_size = sec->size;
6678 shdrp->contents = sec->contents;
6679 sec->contents = NULL;
6682 off = _bfd_elf_assign_file_position_for_section (shdrp, off, true);
6686 /* Place section name section after DWARF debug sections have been
6687 compressed. */
6688 _bfd_elf_strtab_finalize (elf_shstrtab (abfd));
6689 shdrp = &elf_tdata (abfd)->shstrtab_hdr;
6690 shdrp->sh_size = _bfd_elf_strtab_size (elf_shstrtab (abfd));
6691 off = _bfd_elf_assign_file_position_for_section (shdrp, off, true);
6693 /* Place the section headers. */
6694 i_ehdrp = elf_elfheader (abfd);
6695 bed = get_elf_backend_data (abfd);
6696 off = align_file_position (off, 1 << bed->s->log_file_align);
6697 i_ehdrp->e_shoff = off;
6698 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
6699 elf_next_file_pos (abfd) = off;
6701 return true;
6704 bool
6705 _bfd_elf_write_object_contents (bfd *abfd)
6707 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6708 Elf_Internal_Shdr **i_shdrp;
6709 bool failed;
6710 unsigned int count, num_sec;
6711 struct elf_obj_tdata *t;
6713 if (! abfd->output_has_begun
6714 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
6715 return false;
6716 /* Do not rewrite ELF data when the BFD has been opened for update.
6717 abfd->output_has_begun was set to TRUE on opening, so creation of
6718 new sections, and modification of existing section sizes was
6719 restricted. This means the ELF header, program headers and
6720 section headers can't have changed. If the contents of any
6721 sections has been modified, then those changes have already been
6722 written to the BFD. */
6723 else if (abfd->direction == both_direction)
6725 BFD_ASSERT (abfd->output_has_begun);
6726 return true;
6729 i_shdrp = elf_elfsections (abfd);
6731 failed = false;
6732 bfd_map_over_sections (abfd, bed->s->write_relocs, &failed);
6733 if (failed)
6734 return false;
6736 if (!_bfd_elf_assign_file_positions_for_non_load (abfd))
6737 return false;
6739 /* After writing the headers, we need to write the sections too... */
6740 num_sec = elf_numsections (abfd);
6741 for (count = 1; count < num_sec; count++)
6743 i_shdrp[count]->sh_name
6744 = _bfd_elf_strtab_offset (elf_shstrtab (abfd),
6745 i_shdrp[count]->sh_name);
6746 if (bed->elf_backend_section_processing)
6747 if (!(*bed->elf_backend_section_processing) (abfd, i_shdrp[count]))
6748 return false;
6749 if (i_shdrp[count]->contents)
6751 bfd_size_type amt = i_shdrp[count]->sh_size;
6753 if (bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET) != 0
6754 || bfd_bwrite (i_shdrp[count]->contents, amt, abfd) != amt)
6755 return false;
6759 /* Write out the section header names. */
6760 t = elf_tdata (abfd);
6761 if (elf_shstrtab (abfd) != NULL
6762 && (bfd_seek (abfd, t->shstrtab_hdr.sh_offset, SEEK_SET) != 0
6763 || !_bfd_elf_strtab_emit (abfd, elf_shstrtab (abfd))))
6764 return false;
6766 if (!(*bed->elf_backend_final_write_processing) (abfd))
6767 return false;
6769 if (!bed->s->write_shdrs_and_ehdr (abfd))
6770 return false;
6772 /* This is last since write_shdrs_and_ehdr can touch i_shdrp[0]. */
6773 if (t->o->build_id.after_write_object_contents != NULL
6774 && !(*t->o->build_id.after_write_object_contents) (abfd))
6775 return false;
6776 if (t->o->package_metadata.after_write_object_contents != NULL
6777 && !(*t->o->package_metadata.after_write_object_contents) (abfd))
6778 return false;
6780 return true;
6783 bool
6784 _bfd_elf_write_corefile_contents (bfd *abfd)
6786 /* Hopefully this can be done just like an object file. */
6787 return _bfd_elf_write_object_contents (abfd);
6790 /* Given a section, search the header to find them. */
6792 unsigned int
6793 _bfd_elf_section_from_bfd_section (bfd *abfd, struct bfd_section *asect)
6795 const struct elf_backend_data *bed;
6796 unsigned int sec_index;
6798 if (elf_section_data (asect) != NULL
6799 && elf_section_data (asect)->this_idx != 0)
6800 return elf_section_data (asect)->this_idx;
6802 if (bfd_is_abs_section (asect))
6803 sec_index = SHN_ABS;
6804 else if (bfd_is_com_section (asect))
6805 sec_index = SHN_COMMON;
6806 else if (bfd_is_und_section (asect))
6807 sec_index = SHN_UNDEF;
6808 else
6809 sec_index = SHN_BAD;
6811 bed = get_elf_backend_data (abfd);
6812 if (bed->elf_backend_section_from_bfd_section)
6814 int retval = sec_index;
6816 if ((*bed->elf_backend_section_from_bfd_section) (abfd, asect, &retval))
6817 return retval;
6820 if (sec_index == SHN_BAD)
6821 bfd_set_error (bfd_error_nonrepresentable_section);
6823 return sec_index;
6826 /* Given a BFD symbol, return the index in the ELF symbol table, or -1
6827 on error. */
6830 _bfd_elf_symbol_from_bfd_symbol (bfd *abfd, asymbol **asym_ptr_ptr)
6832 asymbol *asym_ptr = *asym_ptr_ptr;
6833 int idx;
6834 flagword flags = asym_ptr->flags;
6836 /* When gas creates relocations against local labels, it creates its
6837 own symbol for the section, but does put the symbol into the
6838 symbol chain, so udata is 0. When the linker is generating
6839 relocatable output, this section symbol may be for one of the
6840 input sections rather than the output section. */
6841 if (asym_ptr->udata.i == 0
6842 && (flags & BSF_SECTION_SYM)
6843 && asym_ptr->section)
6845 asection *sec;
6847 sec = asym_ptr->section;
6848 if (sec->owner != abfd && sec->output_section != NULL)
6849 sec = sec->output_section;
6850 if (sec->owner == abfd
6851 && sec->index < elf_num_section_syms (abfd)
6852 && elf_section_syms (abfd)[sec->index] != NULL)
6853 asym_ptr->udata.i = elf_section_syms (abfd)[sec->index]->udata.i;
6856 idx = asym_ptr->udata.i;
6858 if (idx == 0)
6860 /* This case can occur when using --strip-symbol on a symbol
6861 which is used in a relocation entry. */
6862 _bfd_error_handler
6863 /* xgettext:c-format */
6864 (_("%pB: symbol `%s' required but not present"),
6865 abfd, bfd_asymbol_name (asym_ptr));
6866 bfd_set_error (bfd_error_no_symbols);
6867 return -1;
6870 #if DEBUG & 4
6872 fprintf (stderr,
6873 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d,"
6874 " flags = 0x%.8x\n",
6875 (long) asym_ptr, asym_ptr->name, idx, flags);
6876 fflush (stderr);
6878 #endif
6880 return idx;
6883 static inline bfd_vma
6884 segment_size (Elf_Internal_Phdr *segment)
6886 return (segment->p_memsz > segment->p_filesz
6887 ? segment->p_memsz : segment->p_filesz);
6891 /* Returns the end address of the segment + 1. */
6892 static inline bfd_vma
6893 segment_end (Elf_Internal_Phdr *segment, bfd_vma start)
6895 return start + segment_size (segment);
6898 static inline bfd_size_type
6899 section_size (asection *section, Elf_Internal_Phdr *segment)
6901 if ((section->flags & SEC_HAS_CONTENTS) != 0
6902 || (section->flags & SEC_THREAD_LOCAL) == 0
6903 || segment->p_type == PT_TLS)
6904 return section->size;
6905 return 0;
6908 /* Returns TRUE if the given section is contained within the given
6909 segment. LMA addresses are compared against PADDR when
6910 bed->want_p_paddr_set_to_zero is false, VMA against VADDR when true. */
6911 static bool
6912 is_contained_by (asection *section, Elf_Internal_Phdr *segment,
6913 bfd_vma paddr, bfd_vma vaddr, unsigned int opb,
6914 const struct elf_backend_data *bed)
6916 bfd_vma seg_addr = !bed->want_p_paddr_set_to_zero ? paddr : vaddr;
6917 bfd_vma addr = !bed->want_p_paddr_set_to_zero ? section->lma : section->vma;
6918 bfd_vma octet;
6919 if (_bfd_mul_overflow (addr, opb, &octet))
6920 return false;
6921 /* The third and fourth lines below are testing that the section end
6922 address is within the segment. It's written this way to avoid
6923 overflow. Add seg_addr + section_size to both sides of the
6924 inequality to make it obvious. */
6925 return (octet >= seg_addr
6926 && segment_size (segment) >= section_size (section, segment)
6927 && (octet - seg_addr
6928 <= segment_size (segment) - section_size (section, segment)));
6931 /* Handle PT_NOTE segment. */
6932 static bool
6933 is_note (asection *s, Elf_Internal_Phdr *p)
6935 return (p->p_type == PT_NOTE
6936 && elf_section_type (s) == SHT_NOTE
6937 && (ufile_ptr) s->filepos >= p->p_offset
6938 && p->p_filesz >= s->size
6939 && (ufile_ptr) s->filepos - p->p_offset <= p->p_filesz - s->size);
6942 /* Rewrite program header information. */
6944 static bool
6945 rewrite_elf_program_header (bfd *ibfd, bfd *obfd, bfd_vma maxpagesize)
6947 Elf_Internal_Ehdr *iehdr;
6948 struct elf_segment_map *map;
6949 struct elf_segment_map *map_first;
6950 struct elf_segment_map **pointer_to_map;
6951 Elf_Internal_Phdr *segment;
6952 asection *section;
6953 unsigned int i;
6954 unsigned int num_segments;
6955 bool phdr_included = false;
6956 bool p_paddr_valid;
6957 struct elf_segment_map *phdr_adjust_seg = NULL;
6958 unsigned int phdr_adjust_num = 0;
6959 const struct elf_backend_data *bed;
6960 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
6962 bed = get_elf_backend_data (ibfd);
6963 iehdr = elf_elfheader (ibfd);
6965 map_first = NULL;
6966 pointer_to_map = &map_first;
6968 num_segments = elf_elfheader (ibfd)->e_phnum;
6970 /* The complicated case when p_vaddr is 0 is to handle the Solaris
6971 linker, which generates a PT_INTERP section with p_vaddr and
6972 p_memsz set to 0. */
6973 #define IS_SOLARIS_PT_INTERP(p, s) \
6974 (p->p_vaddr == 0 \
6975 && p->p_paddr == 0 \
6976 && p->p_memsz == 0 \
6977 && p->p_filesz > 0 \
6978 && (s->flags & SEC_HAS_CONTENTS) != 0 \
6979 && s->size > 0 \
6980 && (bfd_vma) s->filepos >= p->p_offset \
6981 && ((bfd_vma) s->filepos + s->size \
6982 <= p->p_offset + p->p_filesz))
6984 /* Decide if the given section should be included in the given segment.
6985 A section will be included if:
6986 1. It is within the address space of the segment -- we use the LMA
6987 if that is set for the segment and the VMA otherwise,
6988 2. It is an allocated section or a NOTE section in a PT_NOTE
6989 segment.
6990 3. There is an output section associated with it,
6991 4. The section has not already been allocated to a previous segment.
6992 5. PT_GNU_STACK segments do not include any sections.
6993 6. PT_TLS segment includes only SHF_TLS sections.
6994 7. SHF_TLS sections are only in PT_TLS or PT_LOAD segments.
6995 8. PT_DYNAMIC should not contain empty sections at the beginning
6996 (with the possible exception of .dynamic). */
6997 #define IS_SECTION_IN_INPUT_SEGMENT(section, segment, bed, opb) \
6998 (((is_contained_by (section, segment, segment->p_paddr, \
6999 segment->p_vaddr, opb, bed) \
7000 && (section->flags & SEC_ALLOC) != 0) \
7001 || is_note (section, segment)) \
7002 && segment->p_type != PT_GNU_STACK \
7003 && (segment->p_type != PT_TLS \
7004 || (section->flags & SEC_THREAD_LOCAL)) \
7005 && (segment->p_type == PT_LOAD \
7006 || segment->p_type == PT_TLS \
7007 || (section->flags & SEC_THREAD_LOCAL) == 0) \
7008 && (segment->p_type != PT_DYNAMIC \
7009 || section_size (section, segment) > 0 \
7010 || (segment->p_paddr \
7011 ? segment->p_paddr != section->lma * (opb) \
7012 : segment->p_vaddr != section->vma * (opb)) \
7013 || (strcmp (bfd_section_name (section), ".dynamic") == 0)) \
7014 && (segment->p_type != PT_LOAD || !section->segment_mark))
7016 /* If the output section of a section in the input segment is NULL,
7017 it is removed from the corresponding output segment. */
7018 #define INCLUDE_SECTION_IN_SEGMENT(section, segment, bed, opb) \
7019 (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb) \
7020 && section->output_section != NULL)
7022 /* Returns TRUE iff seg1 starts after the end of seg2. */
7023 #define SEGMENT_AFTER_SEGMENT(seg1, seg2, field) \
7024 (seg1->field >= segment_end (seg2, seg2->field))
7026 /* Returns TRUE iff seg1 and seg2 overlap. Segments overlap iff both
7027 their VMA address ranges and their LMA address ranges overlap.
7028 It is possible to have overlapping VMA ranges without overlapping LMA
7029 ranges. RedBoot images for example can have both .data and .bss mapped
7030 to the same VMA range, but with the .data section mapped to a different
7031 LMA. */
7032 #define SEGMENT_OVERLAPS(seg1, seg2) \
7033 ( !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_vaddr) \
7034 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_vaddr)) \
7035 && !(SEGMENT_AFTER_SEGMENT (seg1, seg2, p_paddr) \
7036 || SEGMENT_AFTER_SEGMENT (seg2, seg1, p_paddr)))
7038 /* Initialise the segment mark field, and discard stupid alignment. */
7039 for (section = ibfd->sections; section != NULL; section = section->next)
7041 asection *o = section->output_section;
7042 if (o != NULL && o->alignment_power >= (sizeof (bfd_vma) * 8) - 1)
7043 o->alignment_power = 0;
7044 section->segment_mark = false;
7047 /* The Solaris linker creates program headers in which all the
7048 p_paddr fields are zero. When we try to objcopy or strip such a
7049 file, we get confused. Check for this case, and if we find it
7050 don't set the p_paddr_valid fields. */
7051 p_paddr_valid = false;
7052 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7053 i < num_segments;
7054 i++, segment++)
7055 if (segment->p_paddr != 0)
7057 p_paddr_valid = true;
7058 break;
7061 /* Scan through the segments specified in the program header
7062 of the input BFD. For this first scan we look for overlaps
7063 in the loadable segments. These can be created by weird
7064 parameters to objcopy. Also, fix some solaris weirdness. */
7065 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7066 i < num_segments;
7067 i++, segment++)
7069 unsigned int j;
7070 Elf_Internal_Phdr *segment2;
7072 if (segment->p_type == PT_INTERP)
7073 for (section = ibfd->sections; section; section = section->next)
7074 if (IS_SOLARIS_PT_INTERP (segment, section))
7076 /* Mininal change so that the normal section to segment
7077 assignment code will work. */
7078 segment->p_vaddr = section->vma * opb;
7079 break;
7082 if (segment->p_type != PT_LOAD)
7084 /* Remove PT_GNU_RELRO segment. */
7085 if (segment->p_type == PT_GNU_RELRO)
7086 segment->p_type = PT_NULL;
7087 continue;
7090 /* Determine if this segment overlaps any previous segments. */
7091 for (j = 0, segment2 = elf_tdata (ibfd)->phdr; j < i; j++, segment2++)
7093 bfd_signed_vma extra_length;
7095 if (segment2->p_type != PT_LOAD
7096 || !SEGMENT_OVERLAPS (segment, segment2))
7097 continue;
7099 /* Merge the two segments together. */
7100 if (segment2->p_vaddr < segment->p_vaddr)
7102 /* Extend SEGMENT2 to include SEGMENT and then delete
7103 SEGMENT. */
7104 extra_length = (segment_end (segment, segment->p_vaddr)
7105 - segment_end (segment2, segment2->p_vaddr));
7107 if (extra_length > 0)
7109 segment2->p_memsz += extra_length;
7110 segment2->p_filesz += extra_length;
7113 segment->p_type = PT_NULL;
7115 /* Since we have deleted P we must restart the outer loop. */
7116 i = 0;
7117 segment = elf_tdata (ibfd)->phdr;
7118 break;
7120 else
7122 /* Extend SEGMENT to include SEGMENT2 and then delete
7123 SEGMENT2. */
7124 extra_length = (segment_end (segment2, segment2->p_vaddr)
7125 - segment_end (segment, segment->p_vaddr));
7127 if (extra_length > 0)
7129 segment->p_memsz += extra_length;
7130 segment->p_filesz += extra_length;
7133 segment2->p_type = PT_NULL;
7138 /* The second scan attempts to assign sections to segments. */
7139 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7140 i < num_segments;
7141 i++, segment++)
7143 unsigned int section_count;
7144 asection **sections;
7145 asection *output_section;
7146 unsigned int isec;
7147 asection *matching_lma;
7148 asection *suggested_lma;
7149 unsigned int j;
7150 size_t amt;
7151 asection *first_section;
7153 if (segment->p_type == PT_NULL)
7154 continue;
7156 first_section = NULL;
7157 /* Compute how many sections might be placed into this segment. */
7158 for (section = ibfd->sections, section_count = 0;
7159 section != NULL;
7160 section = section->next)
7162 /* Find the first section in the input segment, which may be
7163 removed from the corresponding output segment. */
7164 if (IS_SECTION_IN_INPUT_SEGMENT (section, segment, bed, opb))
7166 if (first_section == NULL)
7167 first_section = section;
7168 if (section->output_section != NULL)
7169 ++section_count;
7173 /* Allocate a segment map big enough to contain
7174 all of the sections we have selected. */
7175 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7176 amt += section_count * sizeof (asection *);
7177 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7178 if (map == NULL)
7179 return false;
7181 /* Initialise the fields of the segment map. Default to
7182 using the physical address of the segment in the input BFD. */
7183 map->next = NULL;
7184 map->p_type = segment->p_type;
7185 map->p_flags = segment->p_flags;
7186 map->p_flags_valid = 1;
7188 if (map->p_type == PT_LOAD
7189 && (ibfd->flags & D_PAGED) != 0
7190 && maxpagesize > 1
7191 && segment->p_align > 1)
7193 map->p_align = segment->p_align;
7194 if (segment->p_align > maxpagesize)
7195 map->p_align = maxpagesize;
7196 map->p_align_valid = 1;
7199 /* If the first section in the input segment is removed, there is
7200 no need to preserve segment physical address in the corresponding
7201 output segment. */
7202 if (!first_section || first_section->output_section != NULL)
7204 map->p_paddr = segment->p_paddr;
7205 map->p_paddr_valid = p_paddr_valid;
7208 /* Determine if this segment contains the ELF file header
7209 and if it contains the program headers themselves. */
7210 map->includes_filehdr = (segment->p_offset == 0
7211 && segment->p_filesz >= iehdr->e_ehsize);
7212 map->includes_phdrs = 0;
7214 if (!phdr_included || segment->p_type != PT_LOAD)
7216 map->includes_phdrs =
7217 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7218 && (segment->p_offset + segment->p_filesz
7219 >= ((bfd_vma) iehdr->e_phoff
7220 + iehdr->e_phnum * iehdr->e_phentsize)));
7222 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7223 phdr_included = true;
7226 if (section_count == 0)
7228 /* Special segments, such as the PT_PHDR segment, may contain
7229 no sections, but ordinary, loadable segments should contain
7230 something. They are allowed by the ELF spec however, so only
7231 a warning is produced.
7232 There is however the valid use case of embedded systems which
7233 have segments with p_filesz of 0 and a p_memsz > 0 to initialize
7234 flash memory with zeros. No warning is shown for that case. */
7235 if (segment->p_type == PT_LOAD
7236 && (segment->p_filesz > 0 || segment->p_memsz == 0))
7237 /* xgettext:c-format */
7238 _bfd_error_handler
7239 (_("%pB: warning: empty loadable segment detected"
7240 " at vaddr=%#" PRIx64 ", is this intentional?"),
7241 ibfd, (uint64_t) segment->p_vaddr);
7243 map->p_vaddr_offset = segment->p_vaddr / opb;
7244 map->count = 0;
7245 *pointer_to_map = map;
7246 pointer_to_map = &map->next;
7248 continue;
7251 /* Now scan the sections in the input BFD again and attempt
7252 to add their corresponding output sections to the segment map.
7253 The problem here is how to handle an output section which has
7254 been moved (ie had its LMA changed). There are four possibilities:
7256 1. None of the sections have been moved.
7257 In this case we can continue to use the segment LMA from the
7258 input BFD.
7260 2. All of the sections have been moved by the same amount.
7261 In this case we can change the segment's LMA to match the LMA
7262 of the first section.
7264 3. Some of the sections have been moved, others have not.
7265 In this case those sections which have not been moved can be
7266 placed in the current segment which will have to have its size,
7267 and possibly its LMA changed, and a new segment or segments will
7268 have to be created to contain the other sections.
7270 4. The sections have been moved, but not by the same amount.
7271 In this case we can change the segment's LMA to match the LMA
7272 of the first section and we will have to create a new segment
7273 or segments to contain the other sections.
7275 In order to save time, we allocate an array to hold the section
7276 pointers that we are interested in. As these sections get assigned
7277 to a segment, they are removed from this array. */
7279 amt = section_count * sizeof (asection *);
7280 sections = (asection **) bfd_malloc (amt);
7281 if (sections == NULL)
7282 return false;
7284 /* Step One: Scan for segment vs section LMA conflicts.
7285 Also add the sections to the section array allocated above.
7286 Also add the sections to the current segment. In the common
7287 case, where the sections have not been moved, this means that
7288 we have completely filled the segment, and there is nothing
7289 more to do. */
7290 isec = 0;
7291 matching_lma = NULL;
7292 suggested_lma = NULL;
7294 for (section = first_section, j = 0;
7295 section != NULL;
7296 section = section->next)
7298 if (INCLUDE_SECTION_IN_SEGMENT (section, segment, bed, opb))
7300 output_section = section->output_section;
7302 sections[j++] = section;
7304 /* The Solaris native linker always sets p_paddr to 0.
7305 We try to catch that case here, and set it to the
7306 correct value. Note - some backends require that
7307 p_paddr be left as zero. */
7308 if (!p_paddr_valid
7309 && segment->p_vaddr != 0
7310 && !bed->want_p_paddr_set_to_zero
7311 && isec == 0
7312 && output_section->lma != 0
7313 && (align_power (segment->p_vaddr
7314 + (map->includes_filehdr
7315 ? iehdr->e_ehsize : 0)
7316 + (map->includes_phdrs
7317 ? iehdr->e_phnum * iehdr->e_phentsize
7318 : 0),
7319 output_section->alignment_power * opb)
7320 == (output_section->vma * opb)))
7321 map->p_paddr = segment->p_vaddr;
7323 /* Match up the physical address of the segment with the
7324 LMA address of the output section. */
7325 if (is_contained_by (output_section, segment, map->p_paddr,
7326 map->p_paddr + map->p_vaddr_offset, opb, bed)
7327 || is_note (section, segment))
7329 if (matching_lma == NULL
7330 || output_section->lma < matching_lma->lma)
7331 matching_lma = output_section;
7333 /* We assume that if the section fits within the segment
7334 then it does not overlap any other section within that
7335 segment. */
7336 map->sections[isec++] = output_section;
7338 else if (suggested_lma == NULL)
7339 suggested_lma = output_section;
7341 if (j == section_count)
7342 break;
7346 BFD_ASSERT (j == section_count);
7348 /* Step Two: Adjust the physical address of the current segment,
7349 if necessary. */
7350 if (isec == section_count)
7352 /* All of the sections fitted within the segment as currently
7353 specified. This is the default case. Add the segment to
7354 the list of built segments and carry on to process the next
7355 program header in the input BFD. */
7356 map->count = section_count;
7357 *pointer_to_map = map;
7358 pointer_to_map = &map->next;
7360 if (p_paddr_valid
7361 && !bed->want_p_paddr_set_to_zero)
7363 bfd_vma hdr_size = 0;
7364 if (map->includes_filehdr)
7365 hdr_size = iehdr->e_ehsize;
7366 if (map->includes_phdrs)
7367 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7369 /* Account for padding before the first section in the
7370 segment. */
7371 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7372 - matching_lma->lma);
7375 free (sections);
7376 continue;
7378 else
7380 /* Change the current segment's physical address to match
7381 the LMA of the first section that fitted, or if no
7382 section fitted, the first section. */
7383 if (matching_lma == NULL)
7384 matching_lma = suggested_lma;
7386 map->p_paddr = matching_lma->lma * opb;
7388 /* Offset the segment physical address from the lma
7389 to allow for space taken up by elf headers. */
7390 if (map->includes_phdrs)
7392 map->p_paddr -= iehdr->e_phnum * iehdr->e_phentsize;
7394 /* iehdr->e_phnum is just an estimate of the number
7395 of program headers that we will need. Make a note
7396 here of the number we used and the segment we chose
7397 to hold these headers, so that we can adjust the
7398 offset when we know the correct value. */
7399 phdr_adjust_num = iehdr->e_phnum;
7400 phdr_adjust_seg = map;
7403 if (map->includes_filehdr)
7405 bfd_vma align = (bfd_vma) 1 << matching_lma->alignment_power;
7406 map->p_paddr -= iehdr->e_ehsize;
7407 /* We've subtracted off the size of headers from the
7408 first section lma, but there may have been some
7409 alignment padding before that section too. Try to
7410 account for that by adjusting the segment lma down to
7411 the same alignment. */
7412 if (segment->p_align != 0 && segment->p_align < align)
7413 align = segment->p_align;
7414 map->p_paddr &= -(align * opb);
7418 /* Step Three: Loop over the sections again, this time assigning
7419 those that fit to the current segment and removing them from the
7420 sections array; but making sure not to leave large gaps. Once all
7421 possible sections have been assigned to the current segment it is
7422 added to the list of built segments and if sections still remain
7423 to be assigned, a new segment is constructed before repeating
7424 the loop. */
7425 isec = 0;
7428 map->count = 0;
7429 suggested_lma = NULL;
7431 /* Fill the current segment with sections that fit. */
7432 for (j = 0; j < section_count; j++)
7434 section = sections[j];
7436 if (section == NULL)
7437 continue;
7439 output_section = section->output_section;
7441 BFD_ASSERT (output_section != NULL);
7443 if (is_contained_by (output_section, segment, map->p_paddr,
7444 map->p_paddr + map->p_vaddr_offset, opb, bed)
7445 || is_note (section, segment))
7447 if (map->count == 0)
7449 /* If the first section in a segment does not start at
7450 the beginning of the segment, then something is
7451 wrong. */
7452 if (align_power (map->p_paddr
7453 + (map->includes_filehdr
7454 ? iehdr->e_ehsize : 0)
7455 + (map->includes_phdrs
7456 ? iehdr->e_phnum * iehdr->e_phentsize
7457 : 0),
7458 output_section->alignment_power * opb)
7459 != output_section->lma * opb)
7460 goto sorry;
7462 else
7464 asection *prev_sec;
7466 prev_sec = map->sections[map->count - 1];
7468 /* If the gap between the end of the previous section
7469 and the start of this section is more than
7470 maxpagesize then we need to start a new segment. */
7471 if ((BFD_ALIGN (prev_sec->lma + prev_sec->size,
7472 maxpagesize)
7473 < BFD_ALIGN (output_section->lma, maxpagesize))
7474 || (prev_sec->lma + prev_sec->size
7475 > output_section->lma))
7477 if (suggested_lma == NULL)
7478 suggested_lma = output_section;
7480 continue;
7484 map->sections[map->count++] = output_section;
7485 ++isec;
7486 sections[j] = NULL;
7487 if (segment->p_type == PT_LOAD)
7488 section->segment_mark = true;
7490 else if (suggested_lma == NULL)
7491 suggested_lma = output_section;
7494 /* PR 23932. A corrupt input file may contain sections that cannot
7495 be assigned to any segment - because for example they have a
7496 negative size - or segments that do not contain any sections.
7497 But there are also valid reasons why a segment can be empty.
7498 So allow a count of zero. */
7500 /* Add the current segment to the list of built segments. */
7501 *pointer_to_map = map;
7502 pointer_to_map = &map->next;
7504 if (isec < section_count)
7506 /* We still have not allocated all of the sections to
7507 segments. Create a new segment here, initialise it
7508 and carry on looping. */
7509 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7510 amt += section_count * sizeof (asection *);
7511 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7512 if (map == NULL)
7514 free (sections);
7515 return false;
7518 /* Initialise the fields of the segment map. Set the physical
7519 physical address to the LMA of the first section that has
7520 not yet been assigned. */
7521 map->next = NULL;
7522 map->p_type = segment->p_type;
7523 map->p_flags = segment->p_flags;
7524 map->p_flags_valid = 1;
7525 map->p_paddr = suggested_lma->lma * opb;
7526 map->p_paddr_valid = p_paddr_valid;
7527 map->includes_filehdr = 0;
7528 map->includes_phdrs = 0;
7531 continue;
7532 sorry:
7533 bfd_set_error (bfd_error_sorry);
7534 free (sections);
7535 return false;
7537 while (isec < section_count);
7539 free (sections);
7542 elf_seg_map (obfd) = map_first;
7544 /* If we had to estimate the number of program headers that were
7545 going to be needed, then check our estimate now and adjust
7546 the offset if necessary. */
7547 if (phdr_adjust_seg != NULL)
7549 unsigned int count;
7551 for (count = 0, map = map_first; map != NULL; map = map->next)
7552 count++;
7554 if (count > phdr_adjust_num)
7555 phdr_adjust_seg->p_paddr
7556 -= (count - phdr_adjust_num) * iehdr->e_phentsize;
7558 for (map = map_first; map != NULL; map = map->next)
7559 if (map->p_type == PT_PHDR)
7561 bfd_vma adjust
7562 = phdr_adjust_seg->includes_filehdr ? iehdr->e_ehsize : 0;
7563 map->p_paddr = phdr_adjust_seg->p_paddr + adjust;
7564 break;
7568 #undef IS_SOLARIS_PT_INTERP
7569 #undef IS_SECTION_IN_INPUT_SEGMENT
7570 #undef INCLUDE_SECTION_IN_SEGMENT
7571 #undef SEGMENT_AFTER_SEGMENT
7572 #undef SEGMENT_OVERLAPS
7573 return true;
7576 /* Return true if p_align in the ELF program header in ABFD is valid. */
7578 static bool
7579 elf_is_p_align_valid (bfd *abfd)
7581 unsigned int i;
7582 Elf_Internal_Phdr *segment;
7583 unsigned int num_segments;
7584 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7585 bfd_size_type maxpagesize = bed->maxpagesize;
7586 bfd_size_type p_align = bed->p_align;
7588 /* Return true if the default p_align value isn't set or the maximum
7589 page size is the same as the minimum page size. */
7590 if (p_align == 0 || maxpagesize == bed->minpagesize)
7591 return true;
7593 /* When the default p_align value is set, p_align may be set to the
7594 default p_align value while segments are aligned to the maximum
7595 page size. In this case, the input p_align will be ignored and
7596 the maximum page size will be used to align the output segments. */
7597 segment = elf_tdata (abfd)->phdr;
7598 num_segments = elf_elfheader (abfd)->e_phnum;
7599 for (i = 0; i < num_segments; i++, segment++)
7600 if (segment->p_type == PT_LOAD
7601 && (segment->p_align != p_align
7602 || vma_page_aligned_bias (segment->p_vaddr,
7603 segment->p_offset,
7604 maxpagesize) != 0))
7605 return true;
7607 return false;
7610 /* Copy ELF program header information. */
7612 static bool
7613 copy_elf_program_header (bfd *ibfd, bfd *obfd)
7615 Elf_Internal_Ehdr *iehdr;
7616 struct elf_segment_map *map;
7617 struct elf_segment_map *map_first;
7618 struct elf_segment_map **pointer_to_map;
7619 Elf_Internal_Phdr *segment;
7620 unsigned int i;
7621 unsigned int num_segments;
7622 bool phdr_included = false;
7623 bool p_paddr_valid;
7624 bool p_palign_valid;
7625 unsigned int opb = bfd_octets_per_byte (ibfd, NULL);
7627 iehdr = elf_elfheader (ibfd);
7629 map_first = NULL;
7630 pointer_to_map = &map_first;
7632 /* If all the segment p_paddr fields are zero, don't set
7633 map->p_paddr_valid. */
7634 p_paddr_valid = false;
7635 num_segments = elf_elfheader (ibfd)->e_phnum;
7636 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7637 i < num_segments;
7638 i++, segment++)
7639 if (segment->p_paddr != 0)
7641 p_paddr_valid = true;
7642 break;
7645 p_palign_valid = elf_is_p_align_valid (ibfd);
7647 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7648 i < num_segments;
7649 i++, segment++)
7651 asection *section;
7652 unsigned int section_count;
7653 size_t amt;
7654 Elf_Internal_Shdr *this_hdr;
7655 asection *first_section = NULL;
7656 asection *lowest_section;
7658 /* Compute how many sections are in this segment. */
7659 for (section = ibfd->sections, section_count = 0;
7660 section != NULL;
7661 section = section->next)
7663 this_hdr = &(elf_section_data(section)->this_hdr);
7664 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7666 if (first_section == NULL)
7667 first_section = section;
7668 section_count++;
7672 /* Allocate a segment map big enough to contain
7673 all of the sections we have selected. */
7674 amt = sizeof (struct elf_segment_map) - sizeof (asection *);
7675 amt += section_count * sizeof (asection *);
7676 map = (struct elf_segment_map *) bfd_zalloc (obfd, amt);
7677 if (map == NULL)
7678 return false;
7680 /* Initialize the fields of the output segment map with the
7681 input segment. */
7682 map->next = NULL;
7683 map->p_type = segment->p_type;
7684 map->p_flags = segment->p_flags;
7685 map->p_flags_valid = 1;
7686 map->p_paddr = segment->p_paddr;
7687 map->p_paddr_valid = p_paddr_valid;
7688 map->p_align = segment->p_align;
7689 /* Keep p_align of PT_GNU_STACK for stack alignment. */
7690 map->p_align_valid = (map->p_type == PT_GNU_STACK
7691 || p_palign_valid);
7692 map->p_vaddr_offset = 0;
7694 if (map->p_type == PT_GNU_RELRO
7695 || map->p_type == PT_GNU_STACK)
7697 /* The PT_GNU_RELRO segment may contain the first a few
7698 bytes in the .got.plt section even if the whole .got.plt
7699 section isn't in the PT_GNU_RELRO segment. We won't
7700 change the size of the PT_GNU_RELRO segment.
7701 Similarly, PT_GNU_STACK size is significant on uclinux
7702 systems. */
7703 map->p_size = segment->p_memsz;
7704 map->p_size_valid = 1;
7707 /* Determine if this segment contains the ELF file header
7708 and if it contains the program headers themselves. */
7709 map->includes_filehdr = (segment->p_offset == 0
7710 && segment->p_filesz >= iehdr->e_ehsize);
7712 map->includes_phdrs = 0;
7713 if (! phdr_included || segment->p_type != PT_LOAD)
7715 map->includes_phdrs =
7716 (segment->p_offset <= (bfd_vma) iehdr->e_phoff
7717 && (segment->p_offset + segment->p_filesz
7718 >= ((bfd_vma) iehdr->e_phoff
7719 + iehdr->e_phnum * iehdr->e_phentsize)));
7721 if (segment->p_type == PT_LOAD && map->includes_phdrs)
7722 phdr_included = true;
7725 lowest_section = NULL;
7726 if (section_count != 0)
7728 unsigned int isec = 0;
7730 for (section = first_section;
7731 section != NULL;
7732 section = section->next)
7734 this_hdr = &(elf_section_data(section)->this_hdr);
7735 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7737 map->sections[isec++] = section->output_section;
7738 if ((section->flags & SEC_ALLOC) != 0)
7740 bfd_vma seg_off;
7742 if (lowest_section == NULL
7743 || section->lma < lowest_section->lma)
7744 lowest_section = section;
7746 /* Section lmas are set up from PT_LOAD header
7747 p_paddr in _bfd_elf_make_section_from_shdr.
7748 If this header has a p_paddr that disagrees
7749 with the section lma, flag the p_paddr as
7750 invalid. */
7751 if ((section->flags & SEC_LOAD) != 0)
7752 seg_off = this_hdr->sh_offset - segment->p_offset;
7753 else
7754 seg_off = this_hdr->sh_addr - segment->p_vaddr;
7755 if (section->lma * opb - segment->p_paddr != seg_off)
7756 map->p_paddr_valid = false;
7758 if (isec == section_count)
7759 break;
7764 if (section_count == 0)
7765 map->p_vaddr_offset = segment->p_vaddr / opb;
7766 else if (map->p_paddr_valid)
7768 /* Account for padding before the first section in the segment. */
7769 bfd_vma hdr_size = 0;
7770 if (map->includes_filehdr)
7771 hdr_size = iehdr->e_ehsize;
7772 if (map->includes_phdrs)
7773 hdr_size += iehdr->e_phnum * iehdr->e_phentsize;
7775 map->p_vaddr_offset = ((map->p_paddr + hdr_size) / opb
7776 - (lowest_section ? lowest_section->lma : 0));
7779 map->count = section_count;
7780 *pointer_to_map = map;
7781 pointer_to_map = &map->next;
7784 elf_seg_map (obfd) = map_first;
7785 return true;
7788 /* Copy private BFD data. This copies or rewrites ELF program header
7789 information. */
7791 static bool
7792 copy_private_bfd_data (bfd *ibfd, bfd *obfd)
7794 bfd_vma maxpagesize;
7796 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
7797 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
7798 return true;
7800 if (elf_tdata (ibfd)->phdr == NULL)
7801 return true;
7803 if (ibfd->xvec == obfd->xvec)
7805 /* Check to see if any sections in the input BFD
7806 covered by ELF program header have changed. */
7807 Elf_Internal_Phdr *segment;
7808 asection *section, *osec;
7809 unsigned int i, num_segments;
7810 Elf_Internal_Shdr *this_hdr;
7811 const struct elf_backend_data *bed;
7813 bed = get_elf_backend_data (ibfd);
7815 /* Regenerate the segment map if p_paddr is set to 0. */
7816 if (bed->want_p_paddr_set_to_zero)
7817 goto rewrite;
7819 /* Initialize the segment mark field. */
7820 for (section = obfd->sections; section != NULL;
7821 section = section->next)
7822 section->segment_mark = false;
7824 num_segments = elf_elfheader (ibfd)->e_phnum;
7825 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7826 i < num_segments;
7827 i++, segment++)
7829 /* PR binutils/3535. The Solaris linker always sets the p_paddr
7830 and p_memsz fields of special segments (DYNAMIC, INTERP) to 0
7831 which severly confuses things, so always regenerate the segment
7832 map in this case. */
7833 if (segment->p_paddr == 0
7834 && segment->p_memsz == 0
7835 && (segment->p_type == PT_INTERP
7836 || segment->p_type == PT_DYNAMIC))
7837 goto rewrite;
7839 for (section = ibfd->sections;
7840 section != NULL; section = section->next)
7842 /* We mark the output section so that we know it comes
7843 from the input BFD. */
7844 osec = section->output_section;
7845 if (osec)
7846 osec->segment_mark = true;
7848 /* Check if this section is covered by the segment. */
7849 this_hdr = &(elf_section_data(section)->this_hdr);
7850 if (ELF_SECTION_IN_SEGMENT (this_hdr, segment))
7852 /* FIXME: Check if its output section is changed or
7853 removed. What else do we need to check? */
7854 if (osec == NULL
7855 || section->flags != osec->flags
7856 || section->lma != osec->lma
7857 || section->vma != osec->vma
7858 || section->size != osec->size
7859 || section->rawsize != osec->rawsize
7860 || section->alignment_power != osec->alignment_power)
7861 goto rewrite;
7866 /* Check to see if any output section do not come from the
7867 input BFD. */
7868 for (section = obfd->sections; section != NULL;
7869 section = section->next)
7871 if (!section->segment_mark)
7872 goto rewrite;
7873 else
7874 section->segment_mark = false;
7877 return copy_elf_program_header (ibfd, obfd);
7880 rewrite:
7881 maxpagesize = 0;
7882 if (ibfd->xvec == obfd->xvec)
7884 /* When rewriting program header, set the output maxpagesize to
7885 the maximum alignment of input PT_LOAD segments. */
7886 Elf_Internal_Phdr *segment;
7887 unsigned int i;
7888 unsigned int num_segments = elf_elfheader (ibfd)->e_phnum;
7890 for (i = 0, segment = elf_tdata (ibfd)->phdr;
7891 i < num_segments;
7892 i++, segment++)
7893 if (segment->p_type == PT_LOAD
7894 && maxpagesize < segment->p_align)
7896 /* PR 17512: file: f17299af. */
7897 if (segment->p_align > (bfd_vma) 1 << ((sizeof (bfd_vma) * 8) - 2))
7898 /* xgettext:c-format */
7899 _bfd_error_handler (_("%pB: warning: segment alignment of %#"
7900 PRIx64 " is too large"),
7901 ibfd, (uint64_t) segment->p_align);
7902 else
7903 maxpagesize = segment->p_align;
7906 if (maxpagesize == 0)
7907 maxpagesize = get_elf_backend_data (obfd)->maxpagesize;
7909 return rewrite_elf_program_header (ibfd, obfd, maxpagesize);
7912 /* Initialize private output section information from input section. */
7914 bool
7915 _bfd_elf_init_private_section_data (bfd *ibfd,
7916 asection *isec,
7917 bfd *obfd,
7918 asection *osec,
7919 struct bfd_link_info *link_info)
7922 Elf_Internal_Shdr *ihdr, *ohdr;
7923 bool final_link = (link_info != NULL
7924 && !bfd_link_relocatable (link_info));
7926 if (ibfd->xvec->flavour != bfd_target_elf_flavour
7927 || obfd->xvec->flavour != bfd_target_elf_flavour)
7928 return true;
7930 BFD_ASSERT (elf_section_data (osec) != NULL);
7932 /* If this is a known ABI section, ELF section type and flags may
7933 have been set up when OSEC was created. For normal sections we
7934 allow the user to override the type and flags other than
7935 SHF_MASKOS and SHF_MASKPROC. */
7936 if (elf_section_type (osec) == SHT_PROGBITS
7937 || elf_section_type (osec) == SHT_NOTE
7938 || elf_section_type (osec) == SHT_NOBITS)
7939 elf_section_type (osec) = SHT_NULL;
7940 /* For objcopy and relocatable link, copy the ELF section type from
7941 the input file if the BFD section flags are the same. (If they
7942 are different the user may be doing something like
7943 "objcopy --set-section-flags .text=alloc,data".) For a final
7944 link allow some flags that the linker clears to differ. */
7945 if (elf_section_type (osec) == SHT_NULL
7946 && (osec->flags == isec->flags
7947 || (final_link
7948 && ((osec->flags ^ isec->flags)
7949 & ~(SEC_LINK_ONCE | SEC_LINK_DUPLICATES | SEC_RELOC)) == 0)))
7950 elf_section_type (osec) = elf_section_type (isec);
7952 /* FIXME: Is this correct for all OS/PROC specific flags? */
7953 elf_section_flags (osec) = (elf_section_flags (isec)
7954 & (SHF_MASKOS | SHF_MASKPROC));
7956 /* Copy sh_info from input for mbind section. */
7957 if ((elf_tdata (ibfd)->has_gnu_osabi & elf_gnu_osabi_mbind) != 0
7958 && elf_section_flags (isec) & SHF_GNU_MBIND)
7959 elf_section_data (osec)->this_hdr.sh_info
7960 = elf_section_data (isec)->this_hdr.sh_info;
7962 /* Set things up for objcopy and relocatable link. The output
7963 SHT_GROUP section will have its elf_next_in_group pointing back
7964 to the input group members. Ignore linker created group section.
7965 See elfNN_ia64_object_p in elfxx-ia64.c. */
7966 if ((link_info == NULL
7967 || !link_info->resolve_section_groups)
7968 && (elf_sec_group (isec) == NULL
7969 || (elf_sec_group (isec)->flags & SEC_LINKER_CREATED) == 0))
7971 if (elf_section_flags (isec) & SHF_GROUP)
7972 elf_section_flags (osec) |= SHF_GROUP;
7973 elf_next_in_group (osec) = elf_next_in_group (isec);
7974 elf_section_data (osec)->group = elf_section_data (isec)->group;
7977 /* If not decompress, preserve SHF_COMPRESSED. */
7978 if (!final_link && (ibfd->flags & BFD_DECOMPRESS) == 0)
7979 elf_section_flags (osec) |= (elf_section_flags (isec)
7980 & SHF_COMPRESSED);
7982 ihdr = &elf_section_data (isec)->this_hdr;
7984 /* We need to handle elf_linked_to_section for SHF_LINK_ORDER. We
7985 don't use the output section of the linked-to section since it
7986 may be NULL at this point. */
7987 if ((ihdr->sh_flags & SHF_LINK_ORDER) != 0)
7989 ohdr = &elf_section_data (osec)->this_hdr;
7990 ohdr->sh_flags |= SHF_LINK_ORDER;
7991 elf_linked_to_section (osec) = elf_linked_to_section (isec);
7994 osec->use_rela_p = isec->use_rela_p;
7996 return true;
7999 /* Copy private section information. This copies over the entsize
8000 field, and sometimes the info field. */
8002 bool
8003 _bfd_elf_copy_private_section_data (bfd *ibfd,
8004 asection *isec,
8005 bfd *obfd,
8006 asection *osec)
8008 Elf_Internal_Shdr *ihdr, *ohdr;
8010 if (ibfd->xvec->flavour != bfd_target_elf_flavour
8011 || obfd->xvec->flavour != bfd_target_elf_flavour)
8012 return true;
8014 ihdr = &elf_section_data (isec)->this_hdr;
8015 ohdr = &elf_section_data (osec)->this_hdr;
8017 ohdr->sh_entsize = ihdr->sh_entsize;
8019 if (ihdr->sh_type == SHT_SYMTAB
8020 || ihdr->sh_type == SHT_DYNSYM
8021 || ihdr->sh_type == SHT_GNU_verneed
8022 || ihdr->sh_type == SHT_GNU_verdef)
8023 ohdr->sh_info = ihdr->sh_info;
8025 return _bfd_elf_init_private_section_data (ibfd, isec, obfd, osec,
8026 NULL);
8029 /* Look at all the SHT_GROUP sections in IBFD, making any adjustments
8030 necessary if we are removing either the SHT_GROUP section or any of
8031 the group member sections. DISCARDED is the value that a section's
8032 output_section has if the section will be discarded, NULL when this
8033 function is called from objcopy, bfd_abs_section_ptr when called
8034 from the linker. */
8036 bool
8037 _bfd_elf_fixup_group_sections (bfd *ibfd, asection *discarded)
8039 asection *isec;
8041 for (isec = ibfd->sections; isec != NULL; isec = isec->next)
8042 if (elf_section_type (isec) == SHT_GROUP)
8044 asection *first = elf_next_in_group (isec);
8045 asection *s = first;
8046 bfd_size_type removed = 0;
8048 while (s != NULL)
8050 /* If this member section is being output but the
8051 SHT_GROUP section is not, then clear the group info
8052 set up by _bfd_elf_copy_private_section_data. */
8053 if (s->output_section != discarded
8054 && isec->output_section == discarded)
8056 elf_section_flags (s->output_section) &= ~SHF_GROUP;
8057 elf_group_name (s->output_section) = NULL;
8059 else
8061 struct bfd_elf_section_data *elf_sec = elf_section_data (s);
8062 if (s->output_section == discarded
8063 && isec->output_section != discarded)
8065 /* Conversely, if the member section is not being
8066 output but the SHT_GROUP section is, then adjust
8067 its size. */
8068 removed += 4;
8069 if (elf_sec->rel.hdr != NULL
8070 && (elf_sec->rel.hdr->sh_flags & SHF_GROUP) != 0)
8071 removed += 4;
8072 if (elf_sec->rela.hdr != NULL
8073 && (elf_sec->rela.hdr->sh_flags & SHF_GROUP) != 0)
8074 removed += 4;
8076 else
8078 /* Also adjust for zero-sized relocation member
8079 section. */
8080 if (elf_sec->rel.hdr != NULL
8081 && elf_sec->rel.hdr->sh_size == 0)
8082 removed += 4;
8083 if (elf_sec->rela.hdr != NULL
8084 && elf_sec->rela.hdr->sh_size == 0)
8085 removed += 4;
8088 s = elf_next_in_group (s);
8089 if (s == first)
8090 break;
8092 if (removed != 0)
8094 if (discarded != NULL)
8096 /* If we've been called for ld -r, then we need to
8097 adjust the input section size. */
8098 if (isec->rawsize == 0)
8099 isec->rawsize = isec->size;
8100 isec->size = isec->rawsize - removed;
8101 if (isec->size <= 4)
8103 isec->size = 0;
8104 isec->flags |= SEC_EXCLUDE;
8107 else if (isec->output_section != NULL)
8109 /* Adjust the output section size when called from
8110 objcopy. */
8111 isec->output_section->size -= removed;
8112 if (isec->output_section->size <= 4)
8114 isec->output_section->size = 0;
8115 isec->output_section->flags |= SEC_EXCLUDE;
8121 return true;
8124 /* Copy private header information. */
8126 bool
8127 _bfd_elf_copy_private_header_data (bfd *ibfd, bfd *obfd)
8129 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8130 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8131 return true;
8133 /* Copy over private BFD data if it has not already been copied.
8134 This must be done here, rather than in the copy_private_bfd_data
8135 entry point, because the latter is called after the section
8136 contents have been set, which means that the program headers have
8137 already been worked out. */
8138 if (elf_seg_map (obfd) == NULL && elf_tdata (ibfd)->phdr != NULL)
8140 if (! copy_private_bfd_data (ibfd, obfd))
8141 return false;
8144 return _bfd_elf_fixup_group_sections (ibfd, NULL);
8147 /* Copy private symbol information. If this symbol is in a section
8148 which we did not map into a BFD section, try to map the section
8149 index correctly. We use special macro definitions for the mapped
8150 section indices; these definitions are interpreted by the
8151 swap_out_syms function. */
8153 #define MAP_ONESYMTAB (SHN_HIOS + 1)
8154 #define MAP_DYNSYMTAB (SHN_HIOS + 2)
8155 #define MAP_STRTAB (SHN_HIOS + 3)
8156 #define MAP_SHSTRTAB (SHN_HIOS + 4)
8157 #define MAP_SYM_SHNDX (SHN_HIOS + 5)
8159 bool
8160 _bfd_elf_copy_private_symbol_data (bfd *ibfd,
8161 asymbol *isymarg,
8162 bfd *obfd,
8163 asymbol *osymarg)
8165 elf_symbol_type *isym, *osym;
8167 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
8168 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
8169 return true;
8171 isym = elf_symbol_from (isymarg);
8172 osym = elf_symbol_from (osymarg);
8174 if (isym != NULL
8175 && isym->internal_elf_sym.st_shndx != 0
8176 && osym != NULL
8177 && bfd_is_abs_section (isym->symbol.section))
8179 unsigned int shndx;
8181 shndx = isym->internal_elf_sym.st_shndx;
8182 if (shndx == elf_onesymtab (ibfd))
8183 shndx = MAP_ONESYMTAB;
8184 else if (shndx == elf_dynsymtab (ibfd))
8185 shndx = MAP_DYNSYMTAB;
8186 else if (shndx == elf_strtab_sec (ibfd))
8187 shndx = MAP_STRTAB;
8188 else if (shndx == elf_shstrtab_sec (ibfd))
8189 shndx = MAP_SHSTRTAB;
8190 else if (find_section_in_list (shndx, elf_symtab_shndx_list (ibfd)))
8191 shndx = MAP_SYM_SHNDX;
8192 osym->internal_elf_sym.st_shndx = shndx;
8195 return true;
8198 /* Swap out the symbols. */
8200 static bool
8201 swap_out_syms (bfd *abfd,
8202 struct elf_strtab_hash **sttp,
8203 int relocatable_p,
8204 struct bfd_link_info *info)
8206 const struct elf_backend_data *bed;
8207 unsigned int symcount;
8208 asymbol **syms;
8209 struct elf_strtab_hash *stt;
8210 Elf_Internal_Shdr *symtab_hdr;
8211 Elf_Internal_Shdr *symtab_shndx_hdr;
8212 Elf_Internal_Shdr *symstrtab_hdr;
8213 struct elf_sym_strtab *symstrtab;
8214 bfd_byte *outbound_syms;
8215 bfd_byte *outbound_shndx;
8216 unsigned long outbound_syms_index;
8217 unsigned int idx;
8218 unsigned int num_locals;
8219 size_t amt;
8220 bool name_local_sections;
8222 if (!elf_map_symbols (abfd, &num_locals))
8223 return false;
8225 /* Dump out the symtabs. */
8226 stt = _bfd_elf_strtab_init ();
8227 if (stt == NULL)
8228 return false;
8230 bed = get_elf_backend_data (abfd);
8231 symcount = bfd_get_symcount (abfd);
8232 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8233 symtab_hdr->sh_type = SHT_SYMTAB;
8234 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8235 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
8236 symtab_hdr->sh_info = num_locals + 1;
8237 symtab_hdr->sh_addralign = (bfd_vma) 1 << bed->s->log_file_align;
8239 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8240 symstrtab_hdr->sh_type = SHT_STRTAB;
8242 /* Allocate buffer to swap out the .strtab section. */
8243 if (_bfd_mul_overflow (symcount + 1, sizeof (*symstrtab), &amt)
8244 || (symstrtab = (struct elf_sym_strtab *) bfd_malloc (amt)) == NULL)
8246 bfd_set_error (bfd_error_no_memory);
8247 _bfd_elf_strtab_free (stt);
8248 return false;
8251 if (_bfd_mul_overflow (symcount + 1, bed->s->sizeof_sym, &amt)
8252 || (outbound_syms = (bfd_byte *) bfd_alloc (abfd, amt)) == NULL)
8254 error_no_mem:
8255 bfd_set_error (bfd_error_no_memory);
8256 error_return:
8257 free (symstrtab);
8258 _bfd_elf_strtab_free (stt);
8259 return false;
8261 symtab_hdr->contents = outbound_syms;
8262 outbound_syms_index = 0;
8264 outbound_shndx = NULL;
8266 if (elf_symtab_shndx_list (abfd))
8268 symtab_shndx_hdr = & elf_symtab_shndx_list (abfd)->hdr;
8269 if (symtab_shndx_hdr->sh_name != 0)
8271 if (_bfd_mul_overflow (symcount + 1,
8272 sizeof (Elf_External_Sym_Shndx), &amt))
8273 goto error_no_mem;
8274 outbound_shndx = (bfd_byte *) bfd_zalloc (abfd, amt);
8275 if (outbound_shndx == NULL)
8276 goto error_return;
8278 symtab_shndx_hdr->contents = outbound_shndx;
8279 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8280 symtab_shndx_hdr->sh_size = amt;
8281 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8282 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8284 /* FIXME: What about any other headers in the list ? */
8287 /* Now generate the data (for "contents"). */
8289 /* Fill in zeroth symbol and swap it out. */
8290 Elf_Internal_Sym sym;
8291 sym.st_name = 0;
8292 sym.st_value = 0;
8293 sym.st_size = 0;
8294 sym.st_info = 0;
8295 sym.st_other = 0;
8296 sym.st_shndx = SHN_UNDEF;
8297 sym.st_target_internal = 0;
8298 symstrtab[0].sym = sym;
8299 symstrtab[0].dest_index = outbound_syms_index;
8300 outbound_syms_index++;
8303 name_local_sections
8304 = (bed->elf_backend_name_local_section_symbols
8305 && bed->elf_backend_name_local_section_symbols (abfd));
8307 syms = bfd_get_outsymbols (abfd);
8308 for (idx = 0; idx < symcount;)
8310 Elf_Internal_Sym sym;
8311 bfd_vma value = syms[idx]->value;
8312 elf_symbol_type *type_ptr;
8313 flagword flags = syms[idx]->flags;
8314 int type;
8316 if (!name_local_sections
8317 && (flags & (BSF_SECTION_SYM | BSF_GLOBAL)) == BSF_SECTION_SYM)
8319 /* Local section symbols have no name. */
8320 sym.st_name = (unsigned long) -1;
8322 else
8324 /* Call _bfd_elf_strtab_offset after _bfd_elf_strtab_finalize
8325 to get the final offset for st_name. */
8326 sym.st_name
8327 = (unsigned long) _bfd_elf_strtab_add (stt, syms[idx]->name,
8328 false);
8329 if (sym.st_name == (unsigned long) -1)
8330 goto error_return;
8333 type_ptr = elf_symbol_from (syms[idx]);
8335 if ((flags & BSF_SECTION_SYM) == 0
8336 && bfd_is_com_section (syms[idx]->section))
8338 /* ELF common symbols put the alignment into the `value' field,
8339 and the size into the `size' field. This is backwards from
8340 how BFD handles it, so reverse it here. */
8341 sym.st_size = value;
8342 if (type_ptr == NULL
8343 || type_ptr->internal_elf_sym.st_value == 0)
8344 sym.st_value = value >= 16 ? 16 : (1 << bfd_log2 (value));
8345 else
8346 sym.st_value = type_ptr->internal_elf_sym.st_value;
8347 sym.st_shndx = _bfd_elf_section_from_bfd_section
8348 (abfd, syms[idx]->section);
8350 else
8352 asection *sec = syms[idx]->section;
8353 unsigned int shndx;
8355 if (sec->output_section)
8357 value += sec->output_offset;
8358 sec = sec->output_section;
8361 /* Don't add in the section vma for relocatable output. */
8362 if (! relocatable_p)
8363 value += sec->vma;
8364 sym.st_value = value;
8365 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
8367 if (bfd_is_abs_section (sec)
8368 && type_ptr != NULL
8369 && type_ptr->internal_elf_sym.st_shndx != 0)
8371 /* This symbol is in a real ELF section which we did
8372 not create as a BFD section. Undo the mapping done
8373 by copy_private_symbol_data. */
8374 shndx = type_ptr->internal_elf_sym.st_shndx;
8375 switch (shndx)
8377 case MAP_ONESYMTAB:
8378 shndx = elf_onesymtab (abfd);
8379 break;
8380 case MAP_DYNSYMTAB:
8381 shndx = elf_dynsymtab (abfd);
8382 break;
8383 case MAP_STRTAB:
8384 shndx = elf_strtab_sec (abfd);
8385 break;
8386 case MAP_SHSTRTAB:
8387 shndx = elf_shstrtab_sec (abfd);
8388 break;
8389 case MAP_SYM_SHNDX:
8390 if (elf_symtab_shndx_list (abfd))
8391 shndx = elf_symtab_shndx_list (abfd)->ndx;
8392 break;
8393 case SHN_COMMON:
8394 case SHN_ABS:
8395 shndx = SHN_ABS;
8396 break;
8397 default:
8398 if (shndx >= SHN_LOPROC && shndx <= SHN_HIOS)
8400 if (bed->symbol_section_index)
8401 shndx = bed->symbol_section_index (abfd, type_ptr);
8402 /* Otherwise just leave the index alone. */
8404 else
8406 if (shndx > SHN_HIOS && shndx < SHN_HIRESERVE)
8407 _bfd_error_handler (_("%pB: \
8408 Unable to handle section index %x in ELF symbol. Using ABS instead."),
8409 abfd, shndx);
8410 shndx = SHN_ABS;
8412 break;
8415 else
8417 shndx = _bfd_elf_section_from_bfd_section (abfd, sec);
8419 if (shndx == SHN_BAD)
8421 asection *sec2;
8423 /* Writing this would be a hell of a lot easier if
8424 we had some decent documentation on bfd, and
8425 knew what to expect of the library, and what to
8426 demand of applications. For example, it
8427 appears that `objcopy' might not set the
8428 section of a symbol to be a section that is
8429 actually in the output file. */
8430 sec2 = bfd_get_section_by_name (abfd, sec->name);
8431 if (sec2 != NULL)
8432 shndx = _bfd_elf_section_from_bfd_section (abfd, sec2);
8433 if (shndx == SHN_BAD)
8435 /* xgettext:c-format */
8436 _bfd_error_handler
8437 (_("unable to find equivalent output section"
8438 " for symbol '%s' from section '%s'"),
8439 syms[idx]->name ? syms[idx]->name : "<Local sym>",
8440 sec->name);
8441 bfd_set_error (bfd_error_invalid_operation);
8442 goto error_return;
8447 sym.st_shndx = shndx;
8450 if ((flags & BSF_THREAD_LOCAL) != 0)
8451 type = STT_TLS;
8452 else if ((flags & BSF_GNU_INDIRECT_FUNCTION) != 0)
8453 type = STT_GNU_IFUNC;
8454 else if ((flags & BSF_FUNCTION) != 0)
8455 type = STT_FUNC;
8456 else if ((flags & BSF_OBJECT) != 0)
8457 type = STT_OBJECT;
8458 else if ((flags & BSF_RELC) != 0)
8459 type = STT_RELC;
8460 else if ((flags & BSF_SRELC) != 0)
8461 type = STT_SRELC;
8462 else
8463 type = STT_NOTYPE;
8465 if (syms[idx]->section->flags & SEC_THREAD_LOCAL)
8466 type = STT_TLS;
8468 /* Processor-specific types. */
8469 if (type_ptr != NULL
8470 && bed->elf_backend_get_symbol_type)
8471 type = ((*bed->elf_backend_get_symbol_type)
8472 (&type_ptr->internal_elf_sym, type));
8474 if (flags & BSF_SECTION_SYM)
8476 if (flags & BSF_GLOBAL)
8477 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_SECTION);
8478 else
8479 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8481 else if (bfd_is_com_section (syms[idx]->section))
8483 if (type != STT_TLS)
8485 if ((abfd->flags & BFD_CONVERT_ELF_COMMON))
8486 type = ((abfd->flags & BFD_USE_ELF_STT_COMMON)
8487 ? STT_COMMON : STT_OBJECT);
8488 else
8489 type = ((flags & BSF_ELF_COMMON) != 0
8490 ? STT_COMMON : STT_OBJECT);
8492 sym.st_info = ELF_ST_INFO (STB_GLOBAL, type);
8494 else if (bfd_is_und_section (syms[idx]->section))
8495 sym.st_info = ELF_ST_INFO (((flags & BSF_WEAK)
8496 ? STB_WEAK
8497 : STB_GLOBAL),
8498 type);
8499 else if (flags & BSF_FILE)
8500 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
8501 else
8503 int bind = STB_LOCAL;
8505 if (flags & BSF_LOCAL)
8506 bind = STB_LOCAL;
8507 else if (flags & BSF_GNU_UNIQUE)
8508 bind = STB_GNU_UNIQUE;
8509 else if (flags & BSF_WEAK)
8510 bind = STB_WEAK;
8511 else if (flags & BSF_GLOBAL)
8512 bind = STB_GLOBAL;
8514 sym.st_info = ELF_ST_INFO (bind, type);
8517 if (type_ptr != NULL)
8519 sym.st_other = type_ptr->internal_elf_sym.st_other;
8520 sym.st_target_internal
8521 = type_ptr->internal_elf_sym.st_target_internal;
8523 else
8525 sym.st_other = 0;
8526 sym.st_target_internal = 0;
8529 idx++;
8530 symstrtab[idx].sym = sym;
8531 symstrtab[idx].dest_index = outbound_syms_index;
8533 outbound_syms_index++;
8536 /* Finalize the .strtab section. */
8537 _bfd_elf_strtab_finalize (stt);
8539 /* Swap out the .strtab section. */
8540 for (idx = 0; idx <= symcount; idx++)
8542 struct elf_sym_strtab *elfsym = &symstrtab[idx];
8543 if (elfsym->sym.st_name == (unsigned long) -1)
8544 elfsym->sym.st_name = 0;
8545 else
8546 elfsym->sym.st_name = _bfd_elf_strtab_offset (stt,
8547 elfsym->sym.st_name);
8548 if (info && info->callbacks->ctf_new_symbol)
8549 info->callbacks->ctf_new_symbol (elfsym->dest_index,
8550 &elfsym->sym);
8552 /* Inform the linker of the addition of this symbol. */
8554 bed->s->swap_symbol_out (abfd, &elfsym->sym,
8555 (outbound_syms
8556 + (elfsym->dest_index
8557 * bed->s->sizeof_sym)),
8558 NPTR_ADD (outbound_shndx,
8559 (elfsym->dest_index
8560 * sizeof (Elf_External_Sym_Shndx))));
8562 free (symstrtab);
8564 *sttp = stt;
8565 symstrtab_hdr->sh_size = _bfd_elf_strtab_size (stt);
8566 symstrtab_hdr->sh_type = SHT_STRTAB;
8567 symstrtab_hdr->sh_flags = bed->elf_strtab_flags;
8568 symstrtab_hdr->sh_addr = 0;
8569 symstrtab_hdr->sh_entsize = 0;
8570 symstrtab_hdr->sh_link = 0;
8571 symstrtab_hdr->sh_info = 0;
8572 symstrtab_hdr->sh_addralign = 1;
8574 return true;
8577 /* Return the number of bytes required to hold the symtab vector.
8579 Note that we base it on the count plus 1, since we will null terminate
8580 the vector allocated based on this size. However, the ELF symbol table
8581 always has a dummy entry as symbol #0, so it ends up even. */
8583 long
8584 _bfd_elf_get_symtab_upper_bound (bfd *abfd)
8586 bfd_size_type symcount;
8587 long symtab_size;
8588 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
8590 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8591 if (symcount > LONG_MAX / sizeof (asymbol *))
8593 bfd_set_error (bfd_error_file_too_big);
8594 return -1;
8596 symtab_size = symcount * (sizeof (asymbol *));
8597 if (symcount == 0)
8598 symtab_size = sizeof (asymbol *);
8599 else if (!bfd_write_p (abfd))
8601 ufile_ptr filesize = bfd_get_file_size (abfd);
8603 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8605 bfd_set_error (bfd_error_file_truncated);
8606 return -1;
8610 return symtab_size;
8613 long
8614 _bfd_elf_get_dynamic_symtab_upper_bound (bfd *abfd)
8616 bfd_size_type symcount;
8617 long symtab_size;
8618 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->dynsymtab_hdr;
8620 if (elf_dynsymtab (abfd) == 0)
8622 bfd_set_error (bfd_error_invalid_operation);
8623 return -1;
8626 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
8627 if (symcount > LONG_MAX / sizeof (asymbol *))
8629 bfd_set_error (bfd_error_file_too_big);
8630 return -1;
8632 symtab_size = symcount * (sizeof (asymbol *));
8633 if (symcount == 0)
8634 symtab_size = sizeof (asymbol *);
8635 else if (!bfd_write_p (abfd))
8637 ufile_ptr filesize = bfd_get_file_size (abfd);
8639 if (filesize != 0 && (unsigned long) symtab_size > filesize)
8641 bfd_set_error (bfd_error_file_truncated);
8642 return -1;
8646 return symtab_size;
8649 long
8650 _bfd_elf_get_reloc_upper_bound (bfd *abfd, sec_ptr asect)
8652 if (asect->reloc_count != 0 && !bfd_write_p (abfd))
8654 /* Sanity check reloc section size. */
8655 ufile_ptr filesize = bfd_get_file_size (abfd);
8657 if (filesize != 0)
8659 struct bfd_elf_section_data *d = elf_section_data (asect);
8660 bfd_size_type rel_size = d->rel.hdr ? d->rel.hdr->sh_size : 0;
8661 bfd_size_type rela_size = d->rela.hdr ? d->rela.hdr->sh_size : 0;
8663 if (rel_size + rela_size > filesize
8664 || rel_size + rela_size < rel_size)
8666 bfd_set_error (bfd_error_file_truncated);
8667 return -1;
8672 #if SIZEOF_LONG == SIZEOF_INT
8673 if (asect->reloc_count >= LONG_MAX / sizeof (arelent *))
8675 bfd_set_error (bfd_error_file_too_big);
8676 return -1;
8678 #endif
8679 return (asect->reloc_count + 1L) * sizeof (arelent *);
8682 /* Canonicalize the relocs. */
8684 long
8685 _bfd_elf_canonicalize_reloc (bfd *abfd,
8686 sec_ptr section,
8687 arelent **relptr,
8688 asymbol **symbols)
8690 arelent *tblptr;
8691 unsigned int i;
8692 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8694 if (! bed->s->slurp_reloc_table (abfd, section, symbols, false))
8695 return -1;
8697 tblptr = section->relocation;
8698 for (i = 0; i < section->reloc_count; i++)
8699 *relptr++ = tblptr++;
8701 *relptr = NULL;
8703 return section->reloc_count;
8706 long
8707 _bfd_elf_canonicalize_symtab (bfd *abfd, asymbol **allocation)
8709 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8710 long symcount = bed->s->slurp_symbol_table (abfd, allocation, false);
8712 if (symcount >= 0)
8713 abfd->symcount = symcount;
8714 return symcount;
8717 long
8718 _bfd_elf_canonicalize_dynamic_symtab (bfd *abfd,
8719 asymbol **allocation)
8721 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8722 long symcount = bed->s->slurp_symbol_table (abfd, allocation, true);
8724 if (symcount >= 0)
8725 abfd->dynsymcount = symcount;
8726 return symcount;
8729 /* Return the size required for the dynamic reloc entries. Any loadable
8730 section that was actually installed in the BFD, and has type SHT_REL
8731 or SHT_RELA, and uses the dynamic symbol table, is considered to be a
8732 dynamic reloc section. */
8734 long
8735 _bfd_elf_get_dynamic_reloc_upper_bound (bfd *abfd)
8737 bfd_size_type count, ext_rel_size;
8738 asection *s;
8740 if (elf_dynsymtab (abfd) == 0)
8742 bfd_set_error (bfd_error_invalid_operation);
8743 return -1;
8746 count = 1;
8747 ext_rel_size = 0;
8748 for (s = abfd->sections; s != NULL; s = s->next)
8749 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8750 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8751 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8753 ext_rel_size += s->size;
8754 if (ext_rel_size < s->size)
8756 bfd_set_error (bfd_error_file_truncated);
8757 return -1;
8759 count += s->size / elf_section_data (s)->this_hdr.sh_entsize;
8760 if (count > LONG_MAX / sizeof (arelent *))
8762 bfd_set_error (bfd_error_file_too_big);
8763 return -1;
8766 if (count > 1 && !bfd_write_p (abfd))
8768 /* Sanity check reloc section sizes. */
8769 ufile_ptr filesize = bfd_get_file_size (abfd);
8770 if (filesize != 0 && ext_rel_size > filesize)
8772 bfd_set_error (bfd_error_file_truncated);
8773 return -1;
8776 return count * sizeof (arelent *);
8779 /* Canonicalize the dynamic relocation entries. Note that we return the
8780 dynamic relocations as a single block, although they are actually
8781 associated with particular sections; the interface, which was
8782 designed for SunOS style shared libraries, expects that there is only
8783 one set of dynamic relocs. Any loadable section that was actually
8784 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses the
8785 dynamic symbol table, is considered to be a dynamic reloc section. */
8787 long
8788 _bfd_elf_canonicalize_dynamic_reloc (bfd *abfd,
8789 arelent **storage,
8790 asymbol **syms)
8792 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
8793 asection *s;
8794 long ret;
8796 if (elf_dynsymtab (abfd) == 0)
8798 bfd_set_error (bfd_error_invalid_operation);
8799 return -1;
8802 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
8803 ret = 0;
8804 for (s = abfd->sections; s != NULL; s = s->next)
8806 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
8807 && (elf_section_data (s)->this_hdr.sh_type == SHT_REL
8808 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
8810 arelent *p;
8811 long count, i;
8813 if (! (*slurp_relocs) (abfd, s, syms, true))
8814 return -1;
8815 count = s->size / elf_section_data (s)->this_hdr.sh_entsize;
8816 p = s->relocation;
8817 for (i = 0; i < count; i++)
8818 *storage++ = p++;
8819 ret += count;
8823 *storage = NULL;
8825 return ret;
8828 /* Read in the version information. */
8830 bool
8831 _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver)
8833 bfd_byte *contents = NULL;
8834 unsigned int freeidx = 0;
8835 size_t amt;
8837 if (elf_dynverref (abfd) != 0)
8839 Elf_Internal_Shdr *hdr;
8840 Elf_External_Verneed *everneed;
8841 Elf_Internal_Verneed *iverneed;
8842 unsigned int i;
8843 bfd_byte *contents_end;
8845 hdr = &elf_tdata (abfd)->dynverref_hdr;
8847 if (hdr->sh_info > hdr->sh_size / sizeof (Elf_External_Verneed))
8849 error_return_bad_verref:
8850 _bfd_error_handler
8851 (_("%pB: .gnu.version_r invalid entry"), abfd);
8852 bfd_set_error (bfd_error_bad_value);
8853 error_return_verref:
8854 elf_tdata (abfd)->verref = NULL;
8855 elf_tdata (abfd)->cverrefs = 0;
8856 goto error_return;
8859 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8860 goto error_return_verref;
8861 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8862 if (contents == NULL)
8863 goto error_return_verref;
8865 if (_bfd_mul_overflow (hdr->sh_info, sizeof (Elf_Internal_Verneed), &amt))
8867 bfd_set_error (bfd_error_file_too_big);
8868 goto error_return_verref;
8870 if (amt == 0)
8871 goto error_return_verref;
8872 elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_zalloc (abfd, amt);
8873 if (elf_tdata (abfd)->verref == NULL)
8874 goto error_return_verref;
8876 BFD_ASSERT (sizeof (Elf_External_Verneed)
8877 == sizeof (Elf_External_Vernaux));
8878 contents_end = contents + hdr->sh_size - sizeof (Elf_External_Verneed);
8879 everneed = (Elf_External_Verneed *) contents;
8880 iverneed = elf_tdata (abfd)->verref;
8881 for (i = 0; i < hdr->sh_info; i++, iverneed++)
8883 Elf_External_Vernaux *evernaux;
8884 Elf_Internal_Vernaux *ivernaux;
8885 unsigned int j;
8887 _bfd_elf_swap_verneed_in (abfd, everneed, iverneed);
8889 iverneed->vn_bfd = abfd;
8891 iverneed->vn_filename =
8892 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8893 iverneed->vn_file);
8894 if (iverneed->vn_filename == NULL)
8895 goto error_return_bad_verref;
8897 if (iverneed->vn_cnt == 0)
8898 iverneed->vn_auxptr = NULL;
8899 else
8901 if (_bfd_mul_overflow (iverneed->vn_cnt,
8902 sizeof (Elf_Internal_Vernaux), &amt))
8904 bfd_set_error (bfd_error_file_too_big);
8905 goto error_return_verref;
8907 iverneed->vn_auxptr = (struct elf_internal_vernaux *)
8908 bfd_alloc (abfd, amt);
8909 if (iverneed->vn_auxptr == NULL)
8910 goto error_return_verref;
8913 if (iverneed->vn_aux
8914 > (size_t) (contents_end - (bfd_byte *) everneed))
8915 goto error_return_bad_verref;
8917 evernaux = ((Elf_External_Vernaux *)
8918 ((bfd_byte *) everneed + iverneed->vn_aux));
8919 ivernaux = iverneed->vn_auxptr;
8920 for (j = 0; j < iverneed->vn_cnt; j++, ivernaux++)
8922 _bfd_elf_swap_vernaux_in (abfd, evernaux, ivernaux);
8924 ivernaux->vna_nodename =
8925 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
8926 ivernaux->vna_name);
8927 if (ivernaux->vna_nodename == NULL)
8928 goto error_return_bad_verref;
8930 if (ivernaux->vna_other > freeidx)
8931 freeidx = ivernaux->vna_other;
8933 ivernaux->vna_nextptr = NULL;
8934 if (ivernaux->vna_next == 0)
8936 iverneed->vn_cnt = j + 1;
8937 break;
8939 if (j + 1 < iverneed->vn_cnt)
8940 ivernaux->vna_nextptr = ivernaux + 1;
8942 if (ivernaux->vna_next
8943 > (size_t) (contents_end - (bfd_byte *) evernaux))
8944 goto error_return_bad_verref;
8946 evernaux = ((Elf_External_Vernaux *)
8947 ((bfd_byte *) evernaux + ivernaux->vna_next));
8950 iverneed->vn_nextref = NULL;
8951 if (iverneed->vn_next == 0)
8952 break;
8953 if (i + 1 < hdr->sh_info)
8954 iverneed->vn_nextref = iverneed + 1;
8956 if (iverneed->vn_next
8957 > (size_t) (contents_end - (bfd_byte *) everneed))
8958 goto error_return_bad_verref;
8960 everneed = ((Elf_External_Verneed *)
8961 ((bfd_byte *) everneed + iverneed->vn_next));
8963 elf_tdata (abfd)->cverrefs = i;
8965 free (contents);
8966 contents = NULL;
8969 if (elf_dynverdef (abfd) != 0)
8971 Elf_Internal_Shdr *hdr;
8972 Elf_External_Verdef *everdef;
8973 Elf_Internal_Verdef *iverdef;
8974 Elf_Internal_Verdef *iverdefarr;
8975 Elf_Internal_Verdef iverdefmem;
8976 unsigned int i;
8977 unsigned int maxidx;
8978 bfd_byte *contents_end_def, *contents_end_aux;
8980 hdr = &elf_tdata (abfd)->dynverdef_hdr;
8982 if (hdr->sh_size < sizeof (Elf_External_Verdef))
8984 error_return_bad_verdef:
8985 _bfd_error_handler
8986 (_("%pB: .gnu.version_d invalid entry"), abfd);
8987 bfd_set_error (bfd_error_bad_value);
8988 error_return_verdef:
8989 elf_tdata (abfd)->verdef = NULL;
8990 elf_tdata (abfd)->cverdefs = 0;
8991 goto error_return;
8994 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0)
8995 goto error_return_verdef;
8996 contents = _bfd_malloc_and_read (abfd, hdr->sh_size, hdr->sh_size);
8997 if (contents == NULL)
8998 goto error_return_verdef;
9000 BFD_ASSERT (sizeof (Elf_External_Verdef)
9001 >= sizeof (Elf_External_Verdaux));
9002 contents_end_def = contents + hdr->sh_size
9003 - sizeof (Elf_External_Verdef);
9004 contents_end_aux = contents + hdr->sh_size
9005 - sizeof (Elf_External_Verdaux);
9007 /* We know the number of entries in the section but not the maximum
9008 index. Therefore we have to run through all entries and find
9009 the maximum. */
9010 everdef = (Elf_External_Verdef *) contents;
9011 maxidx = 0;
9012 for (i = 0; i < hdr->sh_info; ++i)
9014 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
9016 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) == 0)
9017 goto error_return_bad_verdef;
9018 if ((iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION)) > maxidx)
9019 maxidx = iverdefmem.vd_ndx & ((unsigned) VERSYM_VERSION);
9021 if (iverdefmem.vd_next == 0)
9022 break;
9024 if (iverdefmem.vd_next
9025 > (size_t) (contents_end_def - (bfd_byte *) everdef))
9026 goto error_return_bad_verdef;
9028 everdef = ((Elf_External_Verdef *)
9029 ((bfd_byte *) everdef + iverdefmem.vd_next));
9032 if (default_imported_symver)
9034 if (freeidx > maxidx)
9035 maxidx = ++freeidx;
9036 else
9037 freeidx = ++maxidx;
9039 if (_bfd_mul_overflow (maxidx, sizeof (Elf_Internal_Verdef), &amt))
9041 bfd_set_error (bfd_error_file_too_big);
9042 goto error_return_verdef;
9044 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
9045 if (elf_tdata (abfd)->verdef == NULL)
9046 goto error_return_verdef;
9048 elf_tdata (abfd)->cverdefs = maxidx;
9050 everdef = (Elf_External_Verdef *) contents;
9051 iverdefarr = elf_tdata (abfd)->verdef;
9052 for (i = 0; i < hdr->sh_info; i++)
9054 Elf_External_Verdaux *everdaux;
9055 Elf_Internal_Verdaux *iverdaux;
9056 unsigned int j;
9058 _bfd_elf_swap_verdef_in (abfd, everdef, &iverdefmem);
9060 if ((iverdefmem.vd_ndx & VERSYM_VERSION) == 0)
9061 goto error_return_bad_verdef;
9063 iverdef = &iverdefarr[(iverdefmem.vd_ndx & VERSYM_VERSION) - 1];
9064 memcpy (iverdef, &iverdefmem, offsetof (Elf_Internal_Verdef, vd_bfd));
9066 iverdef->vd_bfd = abfd;
9068 if (iverdef->vd_cnt == 0)
9069 iverdef->vd_auxptr = NULL;
9070 else
9072 if (_bfd_mul_overflow (iverdef->vd_cnt,
9073 sizeof (Elf_Internal_Verdaux), &amt))
9075 bfd_set_error (bfd_error_file_too_big);
9076 goto error_return_verdef;
9078 iverdef->vd_auxptr = (struct elf_internal_verdaux *)
9079 bfd_alloc (abfd, amt);
9080 if (iverdef->vd_auxptr == NULL)
9081 goto error_return_verdef;
9084 if (iverdef->vd_aux
9085 > (size_t) (contents_end_aux - (bfd_byte *) everdef))
9086 goto error_return_bad_verdef;
9088 everdaux = ((Elf_External_Verdaux *)
9089 ((bfd_byte *) everdef + iverdef->vd_aux));
9090 iverdaux = iverdef->vd_auxptr;
9091 for (j = 0; j < iverdef->vd_cnt; j++, iverdaux++)
9093 _bfd_elf_swap_verdaux_in (abfd, everdaux, iverdaux);
9095 iverdaux->vda_nodename =
9096 bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
9097 iverdaux->vda_name);
9098 if (iverdaux->vda_nodename == NULL)
9099 goto error_return_bad_verdef;
9101 iverdaux->vda_nextptr = NULL;
9102 if (iverdaux->vda_next == 0)
9104 iverdef->vd_cnt = j + 1;
9105 break;
9107 if (j + 1 < iverdef->vd_cnt)
9108 iverdaux->vda_nextptr = iverdaux + 1;
9110 if (iverdaux->vda_next
9111 > (size_t) (contents_end_aux - (bfd_byte *) everdaux))
9112 goto error_return_bad_verdef;
9114 everdaux = ((Elf_External_Verdaux *)
9115 ((bfd_byte *) everdaux + iverdaux->vda_next));
9118 iverdef->vd_nodename = NULL;
9119 if (iverdef->vd_cnt)
9120 iverdef->vd_nodename = iverdef->vd_auxptr->vda_nodename;
9122 iverdef->vd_nextdef = NULL;
9123 if (iverdef->vd_next == 0)
9124 break;
9125 if ((size_t) (iverdef - iverdefarr) + 1 < maxidx)
9126 iverdef->vd_nextdef = iverdef + 1;
9128 everdef = ((Elf_External_Verdef *)
9129 ((bfd_byte *) everdef + iverdef->vd_next));
9132 free (contents);
9133 contents = NULL;
9135 else if (default_imported_symver)
9137 if (freeidx < 3)
9138 freeidx = 3;
9139 else
9140 freeidx++;
9142 if (_bfd_mul_overflow (freeidx, sizeof (Elf_Internal_Verdef), &amt))
9144 bfd_set_error (bfd_error_file_too_big);
9145 goto error_return;
9147 elf_tdata (abfd)->verdef = (Elf_Internal_Verdef *) bfd_zalloc (abfd, amt);
9148 if (elf_tdata (abfd)->verdef == NULL)
9149 goto error_return;
9151 elf_tdata (abfd)->cverdefs = freeidx;
9154 /* Create a default version based on the soname. */
9155 if (default_imported_symver)
9157 Elf_Internal_Verdef *iverdef;
9158 Elf_Internal_Verdaux *iverdaux;
9160 iverdef = &elf_tdata (abfd)->verdef[freeidx - 1];
9162 iverdef->vd_version = VER_DEF_CURRENT;
9163 iverdef->vd_flags = 0;
9164 iverdef->vd_ndx = freeidx;
9165 iverdef->vd_cnt = 1;
9167 iverdef->vd_bfd = abfd;
9169 iverdef->vd_nodename = bfd_elf_get_dt_soname (abfd);
9170 if (iverdef->vd_nodename == NULL)
9171 goto error_return_verdef;
9172 iverdef->vd_nextdef = NULL;
9173 iverdef->vd_auxptr = ((struct elf_internal_verdaux *)
9174 bfd_zalloc (abfd, sizeof (Elf_Internal_Verdaux)));
9175 if (iverdef->vd_auxptr == NULL)
9176 goto error_return_verdef;
9178 iverdaux = iverdef->vd_auxptr;
9179 iverdaux->vda_nodename = iverdef->vd_nodename;
9182 return true;
9184 error_return:
9185 free (contents);
9186 return false;
9189 asymbol *
9190 _bfd_elf_make_empty_symbol (bfd *abfd)
9192 elf_symbol_type *newsym;
9194 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (*newsym));
9195 if (!newsym)
9196 return NULL;
9197 newsym->symbol.the_bfd = abfd;
9198 return &newsym->symbol;
9201 void
9202 _bfd_elf_get_symbol_info (bfd *abfd ATTRIBUTE_UNUSED,
9203 asymbol *symbol,
9204 symbol_info *ret)
9206 bfd_symbol_info (symbol, ret);
9209 /* Return whether a symbol name implies a local symbol. Most targets
9210 use this function for the is_local_label_name entry point, but some
9211 override it. */
9213 bool
9214 _bfd_elf_is_local_label_name (bfd *abfd ATTRIBUTE_UNUSED,
9215 const char *name)
9217 /* Normal local symbols start with ``.L''. */
9218 if (name[0] == '.' && name[1] == 'L')
9219 return true;
9221 /* At least some SVR4 compilers (e.g., UnixWare 2.1 cc) generate
9222 DWARF debugging symbols starting with ``..''. */
9223 if (name[0] == '.' && name[1] == '.')
9224 return true;
9226 /* gcc will sometimes generate symbols beginning with ``_.L_'' when
9227 emitting DWARF debugging output. I suspect this is actually a
9228 small bug in gcc (it calls ASM_OUTPUT_LABEL when it should call
9229 ASM_GENERATE_INTERNAL_LABEL, and this causes the leading
9230 underscore to be emitted on some ELF targets). For ease of use,
9231 we treat such symbols as local. */
9232 if (name[0] == '_' && name[1] == '.' && name[2] == 'L' && name[3] == '_')
9233 return true;
9235 /* Treat assembler generated fake symbols, dollar local labels and
9236 forward-backward labels (aka local labels) as locals.
9237 These labels have the form:
9239 L0^A.* (fake symbols)
9241 [.]?L[0123456789]+{^A|^B}[0123456789]* (local labels)
9243 Versions which start with .L will have already been matched above,
9244 so we only need to match the rest. */
9245 if (name[0] == 'L' && ISDIGIT (name[1]))
9247 bool ret = false;
9248 const char * p;
9249 char c;
9251 for (p = name + 2; (c = *p); p++)
9253 if (c == 1 || c == 2)
9255 if (c == 1 && p == name + 2)
9256 /* A fake symbol. */
9257 return true;
9259 /* FIXME: We are being paranoid here and treating symbols like
9260 L0^Bfoo as if there were non-local, on the grounds that the
9261 assembler will never generate them. But can any symbol
9262 containing an ASCII value in the range 1-31 ever be anything
9263 other than some kind of local ? */
9264 ret = true;
9267 if (! ISDIGIT (c))
9269 ret = false;
9270 break;
9273 return ret;
9276 return false;
9279 alent *
9280 _bfd_elf_get_lineno (bfd *abfd ATTRIBUTE_UNUSED,
9281 asymbol *symbol ATTRIBUTE_UNUSED)
9283 abort ();
9284 return NULL;
9287 bool
9288 _bfd_elf_set_arch_mach (bfd *abfd,
9289 enum bfd_architecture arch,
9290 unsigned long machine)
9292 /* If this isn't the right architecture for this backend, and this
9293 isn't the generic backend, fail. */
9294 if (arch != get_elf_backend_data (abfd)->arch
9295 && arch != bfd_arch_unknown
9296 && get_elf_backend_data (abfd)->arch != bfd_arch_unknown)
9297 return false;
9299 return bfd_default_set_arch_mach (abfd, arch, machine);
9302 /* Find the nearest line to a particular section and offset,
9303 for error reporting. */
9305 bool
9306 _bfd_elf_find_nearest_line (bfd *abfd,
9307 asymbol **symbols,
9308 asection *section,
9309 bfd_vma offset,
9310 const char **filename_ptr,
9311 const char **functionname_ptr,
9312 unsigned int *line_ptr,
9313 unsigned int *discriminator_ptr)
9315 return _bfd_elf_find_nearest_line_with_alt (abfd, NULL, symbols, section,
9316 offset, filename_ptr,
9317 functionname_ptr, line_ptr,
9318 discriminator_ptr);
9321 /* Find the nearest line to a particular section and offset,
9322 for error reporting. ALT_BFD representing a .gnu_debugaltlink file
9323 can be optionally specified. */
9325 bool
9326 _bfd_elf_find_nearest_line_with_alt (bfd *abfd,
9327 const char *alt_filename,
9328 asymbol **symbols,
9329 asection *section,
9330 bfd_vma offset,
9331 const char **filename_ptr,
9332 const char **functionname_ptr,
9333 unsigned int *line_ptr,
9334 unsigned int *discriminator_ptr)
9336 bool found;
9338 if (_bfd_dwarf2_find_nearest_line_with_alt (abfd, alt_filename, symbols, NULL,
9339 section, offset, filename_ptr,
9340 functionname_ptr, line_ptr,
9341 discriminator_ptr,
9342 dwarf_debug_sections,
9343 &elf_tdata (abfd)->dwarf2_find_line_info))
9344 return true;
9346 if (_bfd_dwarf1_find_nearest_line (abfd, symbols, section, offset,
9347 filename_ptr, functionname_ptr, line_ptr))
9349 if (!*functionname_ptr)
9350 _bfd_elf_find_function (abfd, symbols, section, offset,
9351 *filename_ptr ? NULL : filename_ptr,
9352 functionname_ptr);
9353 return true;
9356 if (! _bfd_stab_section_find_nearest_line (abfd, symbols, section, offset,
9357 &found, filename_ptr,
9358 functionname_ptr, line_ptr,
9359 &elf_tdata (abfd)->line_info))
9360 return false;
9361 if (found && (*functionname_ptr || *line_ptr))
9362 return true;
9364 if (symbols == NULL)
9365 return false;
9367 if (! _bfd_elf_find_function (abfd, symbols, section, offset,
9368 filename_ptr, functionname_ptr))
9369 return false;
9371 *line_ptr = 0;
9372 return true;
9375 /* Find the line for a symbol. */
9377 bool
9378 _bfd_elf_find_line (bfd *abfd, asymbol **symbols, asymbol *symbol,
9379 const char **filename_ptr, unsigned int *line_ptr)
9381 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9382 return _bfd_dwarf2_find_nearest_line (abfd, symbols, symbol, NULL, 0,
9383 filename_ptr, NULL, line_ptr, NULL,
9384 dwarf_debug_sections,
9385 &tdata->dwarf2_find_line_info);
9388 /* After a call to bfd_find_nearest_line, successive calls to
9389 bfd_find_inliner_info can be used to get source information about
9390 each level of function inlining that terminated at the address
9391 passed to bfd_find_nearest_line. Currently this is only supported
9392 for DWARF2 with appropriate DWARF3 extensions. */
9394 bool
9395 _bfd_elf_find_inliner_info (bfd *abfd,
9396 const char **filename_ptr,
9397 const char **functionname_ptr,
9398 unsigned int *line_ptr)
9400 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9401 return _bfd_dwarf2_find_inliner_info (abfd, filename_ptr,
9402 functionname_ptr, line_ptr,
9403 &tdata->dwarf2_find_line_info);
9407 _bfd_elf_sizeof_headers (bfd *abfd, struct bfd_link_info *info)
9409 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9410 int ret = bed->s->sizeof_ehdr;
9412 if (!bfd_link_relocatable (info))
9414 bfd_size_type phdr_size = elf_program_header_size (abfd);
9416 if (phdr_size == (bfd_size_type) -1)
9418 struct elf_segment_map *m;
9420 phdr_size = 0;
9421 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
9422 phdr_size += bed->s->sizeof_phdr;
9424 if (phdr_size == 0)
9425 phdr_size = get_program_header_size (abfd, info);
9428 elf_program_header_size (abfd) = phdr_size;
9429 ret += phdr_size;
9432 return ret;
9435 bool
9436 _bfd_elf_set_section_contents (bfd *abfd,
9437 sec_ptr section,
9438 const void *location,
9439 file_ptr offset,
9440 bfd_size_type count)
9442 Elf_Internal_Shdr *hdr;
9444 if (! abfd->output_has_begun
9445 && ! _bfd_elf_compute_section_file_positions (abfd, NULL))
9446 return false;
9448 if (!count)
9449 return true;
9451 hdr = &elf_section_data (section)->this_hdr;
9452 if (hdr->sh_offset == (file_ptr) -1)
9454 unsigned char *contents;
9456 if (bfd_section_is_ctf (section))
9457 /* Nothing to do with this section: the contents are generated
9458 later. */
9459 return true;
9461 if ((offset + count) > hdr->sh_size)
9463 _bfd_error_handler
9464 (_("%pB:%pA: error: attempting to write"
9465 " over the end of the section"),
9466 abfd, section);
9468 bfd_set_error (bfd_error_invalid_operation);
9469 return false;
9472 contents = hdr->contents;
9473 if (contents == NULL)
9475 _bfd_error_handler
9476 (_("%pB:%pA: error: attempting to write"
9477 " section into an empty buffer"),
9478 abfd, section);
9480 bfd_set_error (bfd_error_invalid_operation);
9481 return false;
9484 memcpy (contents + offset, location, count);
9485 return true;
9488 return _bfd_generic_set_section_contents (abfd, section,
9489 location, offset, count);
9492 bool
9493 _bfd_elf_no_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
9494 arelent *cache_ptr ATTRIBUTE_UNUSED,
9495 Elf_Internal_Rela *dst ATTRIBUTE_UNUSED)
9497 abort ();
9498 return false;
9501 /* Try to convert a non-ELF reloc into an ELF one. */
9503 bool
9504 _bfd_elf_validate_reloc (bfd *abfd, arelent *areloc)
9506 /* Check whether we really have an ELF howto. */
9508 if ((*areloc->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec)
9510 bfd_reloc_code_real_type code;
9511 reloc_howto_type *howto;
9513 /* Alien reloc: Try to determine its type to replace it with an
9514 equivalent ELF reloc. */
9516 if (areloc->howto->pc_relative)
9518 switch (areloc->howto->bitsize)
9520 case 8:
9521 code = BFD_RELOC_8_PCREL;
9522 break;
9523 case 12:
9524 code = BFD_RELOC_12_PCREL;
9525 break;
9526 case 16:
9527 code = BFD_RELOC_16_PCREL;
9528 break;
9529 case 24:
9530 code = BFD_RELOC_24_PCREL;
9531 break;
9532 case 32:
9533 code = BFD_RELOC_32_PCREL;
9534 break;
9535 case 64:
9536 code = BFD_RELOC_64_PCREL;
9537 break;
9538 default:
9539 goto fail;
9542 howto = bfd_reloc_type_lookup (abfd, code);
9544 if (howto && areloc->howto->pcrel_offset != howto->pcrel_offset)
9546 if (howto->pcrel_offset)
9547 areloc->addend += areloc->address;
9548 else
9549 areloc->addend -= areloc->address; /* addend is unsigned!! */
9552 else
9554 switch (areloc->howto->bitsize)
9556 case 8:
9557 code = BFD_RELOC_8;
9558 break;
9559 case 14:
9560 code = BFD_RELOC_14;
9561 break;
9562 case 16:
9563 code = BFD_RELOC_16;
9564 break;
9565 case 26:
9566 code = BFD_RELOC_26;
9567 break;
9568 case 32:
9569 code = BFD_RELOC_32;
9570 break;
9571 case 64:
9572 code = BFD_RELOC_64;
9573 break;
9574 default:
9575 goto fail;
9578 howto = bfd_reloc_type_lookup (abfd, code);
9581 if (howto)
9582 areloc->howto = howto;
9583 else
9584 goto fail;
9587 return true;
9589 fail:
9590 /* xgettext:c-format */
9591 _bfd_error_handler (_("%pB: %s unsupported"),
9592 abfd, areloc->howto->name);
9593 bfd_set_error (bfd_error_sorry);
9594 return false;
9597 bool
9598 _bfd_elf_close_and_cleanup (bfd *abfd)
9600 struct elf_obj_tdata *tdata = elf_tdata (abfd);
9601 if (tdata != NULL
9602 && (bfd_get_format (abfd) == bfd_object
9603 || bfd_get_format (abfd) == bfd_core))
9605 if (elf_tdata (abfd)->o != NULL && elf_shstrtab (abfd) != NULL)
9606 _bfd_elf_strtab_free (elf_shstrtab (abfd));
9607 _bfd_dwarf2_cleanup_debug_info (abfd, &tdata->dwarf2_find_line_info);
9608 _bfd_stab_cleanup (abfd, &tdata->line_info);
9611 return _bfd_generic_close_and_cleanup (abfd);
9614 /* For Rel targets, we encode meaningful data for BFD_RELOC_VTABLE_ENTRY
9615 in the relocation's offset. Thus we cannot allow any sort of sanity
9616 range-checking to interfere. There is nothing else to do in processing
9617 this reloc. */
9619 bfd_reloc_status_type
9620 _bfd_elf_rel_vtable_reloc_fn
9621 (bfd *abfd ATTRIBUTE_UNUSED, arelent *re ATTRIBUTE_UNUSED,
9622 struct bfd_symbol *symbol ATTRIBUTE_UNUSED,
9623 void *data ATTRIBUTE_UNUSED, asection *is ATTRIBUTE_UNUSED,
9624 bfd *obfd ATTRIBUTE_UNUSED, char **errmsg ATTRIBUTE_UNUSED)
9626 return bfd_reloc_ok;
9629 /* Elf core file support. Much of this only works on native
9630 toolchains, since we rely on knowing the
9631 machine-dependent procfs structure in order to pick
9632 out details about the corefile. */
9634 #ifdef HAVE_SYS_PROCFS_H
9635 # include <sys/procfs.h>
9636 #endif
9638 /* Return a PID that identifies a "thread" for threaded cores, or the
9639 PID of the main process for non-threaded cores. */
9641 static int
9642 elfcore_make_pid (bfd *abfd)
9644 int pid;
9646 pid = elf_tdata (abfd)->core->lwpid;
9647 if (pid == 0)
9648 pid = elf_tdata (abfd)->core->pid;
9650 return pid;
9653 /* If there isn't a section called NAME, make one, using data from
9654 SECT. Note, this function will generate a reference to NAME, so
9655 you shouldn't deallocate or overwrite it. */
9657 static bool
9658 elfcore_maybe_make_sect (bfd *abfd, char *name, asection *sect)
9660 asection *sect2;
9662 if (bfd_get_section_by_name (abfd, name) != NULL)
9663 return true;
9665 sect2 = bfd_make_section_with_flags (abfd, name, sect->flags);
9666 if (sect2 == NULL)
9667 return false;
9669 sect2->size = sect->size;
9670 sect2->filepos = sect->filepos;
9671 sect2->alignment_power = sect->alignment_power;
9672 return true;
9675 /* Create a pseudosection containing SIZE bytes at FILEPOS. This
9676 actually creates up to two pseudosections:
9677 - For the single-threaded case, a section named NAME, unless
9678 such a section already exists.
9679 - For the multi-threaded case, a section named "NAME/PID", where
9680 PID is elfcore_make_pid (abfd).
9681 Both pseudosections have identical contents. */
9682 bool
9683 _bfd_elfcore_make_pseudosection (bfd *abfd,
9684 char *name,
9685 size_t size,
9686 ufile_ptr filepos)
9688 char buf[100];
9689 char *threaded_name;
9690 size_t len;
9691 asection *sect;
9693 /* Build the section name. */
9695 sprintf (buf, "%s/%d", name, elfcore_make_pid (abfd));
9696 len = strlen (buf) + 1;
9697 threaded_name = (char *) bfd_alloc (abfd, len);
9698 if (threaded_name == NULL)
9699 return false;
9700 memcpy (threaded_name, buf, len);
9702 sect = bfd_make_section_anyway_with_flags (abfd, threaded_name,
9703 SEC_HAS_CONTENTS);
9704 if (sect == NULL)
9705 return false;
9706 sect->size = size;
9707 sect->filepos = filepos;
9708 sect->alignment_power = 2;
9710 return elfcore_maybe_make_sect (abfd, name, sect);
9713 static bool
9714 elfcore_make_auxv_note_section (bfd *abfd, Elf_Internal_Note *note,
9715 size_t offs)
9717 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".auxv",
9718 SEC_HAS_CONTENTS);
9720 if (sect == NULL)
9721 return false;
9723 sect->size = note->descsz - offs;
9724 sect->filepos = note->descpos + offs;
9725 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
9727 return true;
9730 /* prstatus_t exists on:
9731 solaris 2.5+
9732 linux 2.[01] + glibc
9733 unixware 4.2
9736 #if defined (HAVE_PRSTATUS_T)
9738 static bool
9739 elfcore_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
9741 size_t size;
9742 int offset;
9744 if (note->descsz == sizeof (prstatus_t))
9746 prstatus_t prstat;
9748 size = sizeof (prstat.pr_reg);
9749 offset = offsetof (prstatus_t, pr_reg);
9750 memcpy (&prstat, note->descdata, sizeof (prstat));
9752 /* Do not overwrite the core signal if it
9753 has already been set by another thread. */
9754 if (elf_tdata (abfd)->core->signal == 0)
9755 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9756 if (elf_tdata (abfd)->core->pid == 0)
9757 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9759 /* pr_who exists on:
9760 solaris 2.5+
9761 unixware 4.2
9762 pr_who doesn't exist on:
9763 linux 2.[01]
9765 #if defined (HAVE_PRSTATUS_T_PR_WHO)
9766 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9767 #else
9768 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9769 #endif
9771 #if defined (HAVE_PRSTATUS32_T)
9772 else if (note->descsz == sizeof (prstatus32_t))
9774 /* 64-bit host, 32-bit corefile */
9775 prstatus32_t prstat;
9777 size = sizeof (prstat.pr_reg);
9778 offset = offsetof (prstatus32_t, pr_reg);
9779 memcpy (&prstat, note->descdata, sizeof (prstat));
9781 /* Do not overwrite the core signal if it
9782 has already been set by another thread. */
9783 if (elf_tdata (abfd)->core->signal == 0)
9784 elf_tdata (abfd)->core->signal = prstat.pr_cursig;
9785 if (elf_tdata (abfd)->core->pid == 0)
9786 elf_tdata (abfd)->core->pid = prstat.pr_pid;
9788 /* pr_who exists on:
9789 solaris 2.5+
9790 unixware 4.2
9791 pr_who doesn't exist on:
9792 linux 2.[01]
9794 #if defined (HAVE_PRSTATUS32_T_PR_WHO)
9795 elf_tdata (abfd)->core->lwpid = prstat.pr_who;
9796 #else
9797 elf_tdata (abfd)->core->lwpid = prstat.pr_pid;
9798 #endif
9800 #endif /* HAVE_PRSTATUS32_T */
9801 else
9803 /* Fail - we don't know how to handle any other
9804 note size (ie. data object type). */
9805 return true;
9808 /* Make a ".reg/999" section and a ".reg" section. */
9809 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
9810 size, note->descpos + offset);
9812 #endif /* defined (HAVE_PRSTATUS_T) */
9814 /* Create a pseudosection containing the exact contents of NOTE. */
9815 static bool
9816 elfcore_make_note_pseudosection (bfd *abfd,
9817 char *name,
9818 Elf_Internal_Note *note)
9820 return _bfd_elfcore_make_pseudosection (abfd, name,
9821 note->descsz, note->descpos);
9824 /* There isn't a consistent prfpregset_t across platforms,
9825 but it doesn't matter, because we don't have to pick this
9826 data structure apart. */
9828 static bool
9829 elfcore_grok_prfpreg (bfd *abfd, Elf_Internal_Note *note)
9831 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
9834 /* Linux dumps the Intel SSE regs in a note named "LINUX" with a note
9835 type of NT_PRXFPREG. Just include the whole note's contents
9836 literally. */
9838 static bool
9839 elfcore_grok_prxfpreg (bfd *abfd, Elf_Internal_Note *note)
9841 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
9844 /* Linux dumps the Intel XSAVE extended state in a note named "LINUX"
9845 with a note type of NT_X86_XSTATE. Just include the whole note's
9846 contents literally. */
9848 static bool
9849 elfcore_grok_xstatereg (bfd *abfd, Elf_Internal_Note *note)
9851 return elfcore_make_note_pseudosection (abfd, ".reg-xstate", note);
9854 static bool
9855 elfcore_grok_ppc_vmx (bfd *abfd, Elf_Internal_Note *note)
9857 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vmx", note);
9860 static bool
9861 elfcore_grok_ppc_vsx (bfd *abfd, Elf_Internal_Note *note)
9863 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-vsx", note);
9866 static bool
9867 elfcore_grok_ppc_tar (bfd *abfd, Elf_Internal_Note *note)
9869 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tar", note);
9872 static bool
9873 elfcore_grok_ppc_ppr (bfd *abfd, Elf_Internal_Note *note)
9875 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ppr", note);
9878 static bool
9879 elfcore_grok_ppc_dscr (bfd *abfd, Elf_Internal_Note *note)
9881 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-dscr", note);
9884 static bool
9885 elfcore_grok_ppc_ebb (bfd *abfd, Elf_Internal_Note *note)
9887 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-ebb", note);
9890 static bool
9891 elfcore_grok_ppc_pmu (bfd *abfd, Elf_Internal_Note *note)
9893 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-pmu", note);
9896 static bool
9897 elfcore_grok_ppc_tm_cgpr (bfd *abfd, Elf_Internal_Note *note)
9899 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cgpr", note);
9902 static bool
9903 elfcore_grok_ppc_tm_cfpr (bfd *abfd, Elf_Internal_Note *note)
9905 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cfpr", note);
9908 static bool
9909 elfcore_grok_ppc_tm_cvmx (bfd *abfd, Elf_Internal_Note *note)
9911 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvmx", note);
9914 static bool
9915 elfcore_grok_ppc_tm_cvsx (bfd *abfd, Elf_Internal_Note *note)
9917 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cvsx", note);
9920 static bool
9921 elfcore_grok_ppc_tm_spr (bfd *abfd, Elf_Internal_Note *note)
9923 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-spr", note);
9926 static bool
9927 elfcore_grok_ppc_tm_ctar (bfd *abfd, Elf_Internal_Note *note)
9929 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-ctar", note);
9932 static bool
9933 elfcore_grok_ppc_tm_cppr (bfd *abfd, Elf_Internal_Note *note)
9935 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cppr", note);
9938 static bool
9939 elfcore_grok_ppc_tm_cdscr (bfd *abfd, Elf_Internal_Note *note)
9941 return elfcore_make_note_pseudosection (abfd, ".reg-ppc-tm-cdscr", note);
9944 static bool
9945 elfcore_grok_s390_high_gprs (bfd *abfd, Elf_Internal_Note *note)
9947 return elfcore_make_note_pseudosection (abfd, ".reg-s390-high-gprs", note);
9950 static bool
9951 elfcore_grok_s390_timer (bfd *abfd, Elf_Internal_Note *note)
9953 return elfcore_make_note_pseudosection (abfd, ".reg-s390-timer", note);
9956 static bool
9957 elfcore_grok_s390_todcmp (bfd *abfd, Elf_Internal_Note *note)
9959 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todcmp", note);
9962 static bool
9963 elfcore_grok_s390_todpreg (bfd *abfd, Elf_Internal_Note *note)
9965 return elfcore_make_note_pseudosection (abfd, ".reg-s390-todpreg", note);
9968 static bool
9969 elfcore_grok_s390_ctrs (bfd *abfd, Elf_Internal_Note *note)
9971 return elfcore_make_note_pseudosection (abfd, ".reg-s390-ctrs", note);
9974 static bool
9975 elfcore_grok_s390_prefix (bfd *abfd, Elf_Internal_Note *note)
9977 return elfcore_make_note_pseudosection (abfd, ".reg-s390-prefix", note);
9980 static bool
9981 elfcore_grok_s390_last_break (bfd *abfd, Elf_Internal_Note *note)
9983 return elfcore_make_note_pseudosection (abfd, ".reg-s390-last-break", note);
9986 static bool
9987 elfcore_grok_s390_system_call (bfd *abfd, Elf_Internal_Note *note)
9989 return elfcore_make_note_pseudosection (abfd, ".reg-s390-system-call", note);
9992 static bool
9993 elfcore_grok_s390_tdb (bfd *abfd, Elf_Internal_Note *note)
9995 return elfcore_make_note_pseudosection (abfd, ".reg-s390-tdb", note);
9998 static bool
9999 elfcore_grok_s390_vxrs_low (bfd *abfd, Elf_Internal_Note *note)
10001 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-low", note);
10004 static bool
10005 elfcore_grok_s390_vxrs_high (bfd *abfd, Elf_Internal_Note *note)
10007 return elfcore_make_note_pseudosection (abfd, ".reg-s390-vxrs-high", note);
10010 static bool
10011 elfcore_grok_s390_gs_cb (bfd *abfd, Elf_Internal_Note *note)
10013 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-cb", note);
10016 static bool
10017 elfcore_grok_s390_gs_bc (bfd *abfd, Elf_Internal_Note *note)
10019 return elfcore_make_note_pseudosection (abfd, ".reg-s390-gs-bc", note);
10022 static bool
10023 elfcore_grok_arm_vfp (bfd *abfd, Elf_Internal_Note *note)
10025 return elfcore_make_note_pseudosection (abfd, ".reg-arm-vfp", note);
10028 static bool
10029 elfcore_grok_aarch_tls (bfd *abfd, Elf_Internal_Note *note)
10031 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-tls", note);
10034 static bool
10035 elfcore_grok_aarch_hw_break (bfd *abfd, Elf_Internal_Note *note)
10037 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-break", note);
10040 static bool
10041 elfcore_grok_aarch_hw_watch (bfd *abfd, Elf_Internal_Note *note)
10043 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-hw-watch", note);
10046 static bool
10047 elfcore_grok_aarch_sve (bfd *abfd, Elf_Internal_Note *note)
10049 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-sve", note);
10052 static bool
10053 elfcore_grok_aarch_pauth (bfd *abfd, Elf_Internal_Note *note)
10055 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-pauth", note);
10058 static bool
10059 elfcore_grok_aarch_mte (bfd *abfd, Elf_Internal_Note *note)
10061 return elfcore_make_note_pseudosection (abfd, ".reg-aarch-mte",
10062 note);
10065 static bool
10066 elfcore_grok_arc_v2 (bfd *abfd, Elf_Internal_Note *note)
10068 return elfcore_make_note_pseudosection (abfd, ".reg-arc-v2", note);
10071 /* Convert NOTE into a bfd_section called ".reg-riscv-csr". Return TRUE if
10072 successful otherwise, return FALSE. */
10074 static bool
10075 elfcore_grok_riscv_csr (bfd *abfd, Elf_Internal_Note *note)
10077 return elfcore_make_note_pseudosection (abfd, ".reg-riscv-csr", note);
10080 /* Convert NOTE into a bfd_section called ".gdb-tdesc". Return TRUE if
10081 successful otherwise, return FALSE. */
10083 static bool
10084 elfcore_grok_gdb_tdesc (bfd *abfd, Elf_Internal_Note *note)
10086 return elfcore_make_note_pseudosection (abfd, ".gdb-tdesc", note);
10089 static bool
10090 elfcore_grok_loongarch_cpucfg (bfd *abfd, Elf_Internal_Note *note)
10092 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-cpucfg", note);
10095 static bool
10096 elfcore_grok_loongarch_lbt (bfd *abfd, Elf_Internal_Note *note)
10098 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lbt", note);
10101 static bool
10102 elfcore_grok_loongarch_lsx (bfd *abfd, Elf_Internal_Note *note)
10104 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lsx", note);
10107 static bool
10108 elfcore_grok_loongarch_lasx (bfd *abfd, Elf_Internal_Note *note)
10110 return elfcore_make_note_pseudosection (abfd, ".reg-loongarch-lasx", note);
10113 #if defined (HAVE_PRPSINFO_T)
10114 typedef prpsinfo_t elfcore_psinfo_t;
10115 #if defined (HAVE_PRPSINFO32_T) /* Sparc64 cross Sparc32 */
10116 typedef prpsinfo32_t elfcore_psinfo32_t;
10117 #endif
10118 #endif
10120 #if defined (HAVE_PSINFO_T)
10121 typedef psinfo_t elfcore_psinfo_t;
10122 #if defined (HAVE_PSINFO32_T) /* Sparc64 cross Sparc32 */
10123 typedef psinfo32_t elfcore_psinfo32_t;
10124 #endif
10125 #endif
10127 /* return a malloc'ed copy of a string at START which is at
10128 most MAX bytes long, possibly without a terminating '\0'.
10129 the copy will always have a terminating '\0'. */
10131 char *
10132 _bfd_elfcore_strndup (bfd *abfd, char *start, size_t max)
10134 char *dups;
10135 char *end = (char *) memchr (start, '\0', max);
10136 size_t len;
10138 if (end == NULL)
10139 len = max;
10140 else
10141 len = end - start;
10143 dups = (char *) bfd_alloc (abfd, len + 1);
10144 if (dups == NULL)
10145 return NULL;
10147 memcpy (dups, start, len);
10148 dups[len] = '\0';
10150 return dups;
10153 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10154 static bool
10155 elfcore_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
10157 if (note->descsz == sizeof (elfcore_psinfo_t))
10159 elfcore_psinfo_t psinfo;
10161 memcpy (&psinfo, note->descdata, sizeof (psinfo));
10163 #if defined (HAVE_PSINFO_T_PR_PID) || defined (HAVE_PRPSINFO_T_PR_PID)
10164 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
10165 #endif
10166 elf_tdata (abfd)->core->program
10167 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
10168 sizeof (psinfo.pr_fname));
10170 elf_tdata (abfd)->core->command
10171 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
10172 sizeof (psinfo.pr_psargs));
10174 #if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
10175 else if (note->descsz == sizeof (elfcore_psinfo32_t))
10177 /* 64-bit host, 32-bit corefile */
10178 elfcore_psinfo32_t psinfo;
10180 memcpy (&psinfo, note->descdata, sizeof (psinfo));
10182 #if defined (HAVE_PSINFO32_T_PR_PID) || defined (HAVE_PRPSINFO32_T_PR_PID)
10183 elf_tdata (abfd)->core->pid = psinfo.pr_pid;
10184 #endif
10185 elf_tdata (abfd)->core->program
10186 = _bfd_elfcore_strndup (abfd, psinfo.pr_fname,
10187 sizeof (psinfo.pr_fname));
10189 elf_tdata (abfd)->core->command
10190 = _bfd_elfcore_strndup (abfd, psinfo.pr_psargs,
10191 sizeof (psinfo.pr_psargs));
10193 #endif
10195 else
10197 /* Fail - we don't know how to handle any other
10198 note size (ie. data object type). */
10199 return true;
10202 /* Note that for some reason, a spurious space is tacked
10203 onto the end of the args in some (at least one anyway)
10204 implementations, so strip it off if it exists. */
10207 char *command = elf_tdata (abfd)->core->command;
10208 int n = strlen (command);
10210 if (0 < n && command[n - 1] == ' ')
10211 command[n - 1] = '\0';
10214 return true;
10216 #endif /* defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T) */
10218 #if defined (HAVE_PSTATUS_T)
10219 static bool
10220 elfcore_grok_pstatus (bfd *abfd, Elf_Internal_Note *note)
10222 if (note->descsz == sizeof (pstatus_t)
10223 #if defined (HAVE_PXSTATUS_T)
10224 || note->descsz == sizeof (pxstatus_t)
10225 #endif
10228 pstatus_t pstat;
10230 memcpy (&pstat, note->descdata, sizeof (pstat));
10232 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10234 #if defined (HAVE_PSTATUS32_T)
10235 else if (note->descsz == sizeof (pstatus32_t))
10237 /* 64-bit host, 32-bit corefile */
10238 pstatus32_t pstat;
10240 memcpy (&pstat, note->descdata, sizeof (pstat));
10242 elf_tdata (abfd)->core->pid = pstat.pr_pid;
10244 #endif
10245 /* Could grab some more details from the "representative"
10246 lwpstatus_t in pstat.pr_lwp, but we'll catch it all in an
10247 NT_LWPSTATUS note, presumably. */
10249 return true;
10251 #endif /* defined (HAVE_PSTATUS_T) */
10253 #if defined (HAVE_LWPSTATUS_T)
10254 static bool
10255 elfcore_grok_lwpstatus (bfd *abfd, Elf_Internal_Note *note)
10257 lwpstatus_t lwpstat;
10258 char buf[100];
10259 char *name;
10260 size_t len;
10261 asection *sect;
10263 if (note->descsz != sizeof (lwpstat)
10264 #if defined (HAVE_LWPXSTATUS_T)
10265 && note->descsz != sizeof (lwpxstatus_t)
10266 #endif
10268 return true;
10270 memcpy (&lwpstat, note->descdata, sizeof (lwpstat));
10272 elf_tdata (abfd)->core->lwpid = lwpstat.pr_lwpid;
10273 /* Do not overwrite the core signal if it has already been set by
10274 another thread. */
10275 if (elf_tdata (abfd)->core->signal == 0)
10276 elf_tdata (abfd)->core->signal = lwpstat.pr_cursig;
10278 /* Make a ".reg/999" section. */
10280 sprintf (buf, ".reg/%d", elfcore_make_pid (abfd));
10281 len = strlen (buf) + 1;
10282 name = bfd_alloc (abfd, len);
10283 if (name == NULL)
10284 return false;
10285 memcpy (name, buf, len);
10287 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10288 if (sect == NULL)
10289 return false;
10291 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10292 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.gregs);
10293 sect->filepos = note->descpos
10294 + offsetof (lwpstatus_t, pr_context.uc_mcontext.gregs);
10295 #endif
10297 #if defined (HAVE_LWPSTATUS_T_PR_REG)
10298 sect->size = sizeof (lwpstat.pr_reg);
10299 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_reg);
10300 #endif
10302 sect->alignment_power = 2;
10304 if (!elfcore_maybe_make_sect (abfd, ".reg", sect))
10305 return false;
10307 /* Make a ".reg2/999" section */
10309 sprintf (buf, ".reg2/%d", elfcore_make_pid (abfd));
10310 len = strlen (buf) + 1;
10311 name = bfd_alloc (abfd, len);
10312 if (name == NULL)
10313 return false;
10314 memcpy (name, buf, len);
10316 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10317 if (sect == NULL)
10318 return false;
10320 #if defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
10321 sect->size = sizeof (lwpstat.pr_context.uc_mcontext.fpregs);
10322 sect->filepos = note->descpos
10323 + offsetof (lwpstatus_t, pr_context.uc_mcontext.fpregs);
10324 #endif
10326 #if defined (HAVE_LWPSTATUS_T_PR_FPREG)
10327 sect->size = sizeof (lwpstat.pr_fpreg);
10328 sect->filepos = note->descpos + offsetof (lwpstatus_t, pr_fpreg);
10329 #endif
10331 sect->alignment_power = 2;
10333 return elfcore_maybe_make_sect (abfd, ".reg2", sect);
10335 #endif /* defined (HAVE_LWPSTATUS_T) */
10337 /* These constants, and the structure offsets used below, are defined by
10338 Cygwin's core_dump.h */
10339 #define NOTE_INFO_PROCESS 1
10340 #define NOTE_INFO_THREAD 2
10341 #define NOTE_INFO_MODULE 3
10342 #define NOTE_INFO_MODULE64 4
10344 static bool
10345 elfcore_grok_win32pstatus (bfd *abfd, Elf_Internal_Note *note)
10347 char buf[30];
10348 char *name;
10349 size_t len;
10350 unsigned int name_size;
10351 asection *sect;
10352 unsigned int type;
10353 int is_active_thread;
10354 bfd_vma base_addr;
10356 if (note->descsz < 4)
10357 return true;
10359 if (! startswith (note->namedata, "win32"))
10360 return true;
10362 type = bfd_get_32 (abfd, note->descdata);
10364 struct
10366 const char *type_name;
10367 unsigned long min_size;
10368 } size_check[] =
10370 { "NOTE_INFO_PROCESS", 12 },
10371 { "NOTE_INFO_THREAD", 12 },
10372 { "NOTE_INFO_MODULE", 12 },
10373 { "NOTE_INFO_MODULE64", 16 },
10376 if (type == 0 || type > (sizeof(size_check)/sizeof(size_check[0])))
10377 return true;
10379 if (note->descsz < size_check[type - 1].min_size)
10381 _bfd_error_handler (_("%pB: warning: win32pstatus %s of size %lu bytes"
10382 " is too small"),
10383 abfd, size_check[type - 1].type_name, note->descsz);
10384 return true;
10387 switch (type)
10389 case NOTE_INFO_PROCESS:
10390 /* FIXME: need to add ->core->command. */
10391 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, note->descdata + 4);
10392 elf_tdata (abfd)->core->signal = bfd_get_32 (abfd, note->descdata + 8);
10393 break;
10395 case NOTE_INFO_THREAD:
10396 /* Make a ".reg/<tid>" section containing the Win32 API thread CONTEXT
10397 structure. */
10398 /* thread_info.tid */
10399 sprintf (buf, ".reg/%ld", (long) bfd_get_32 (abfd, note->descdata + 4));
10401 len = strlen (buf) + 1;
10402 name = (char *) bfd_alloc (abfd, len);
10403 if (name == NULL)
10404 return false;
10406 memcpy (name, buf, len);
10408 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10409 if (sect == NULL)
10410 return false;
10412 /* sizeof (thread_info.thread_context) */
10413 sect->size = note->descsz - 12;
10414 /* offsetof (thread_info.thread_context) */
10415 sect->filepos = note->descpos + 12;
10416 sect->alignment_power = 2;
10418 /* thread_info.is_active_thread */
10419 is_active_thread = bfd_get_32 (abfd, note->descdata + 8);
10421 if (is_active_thread)
10422 if (! elfcore_maybe_make_sect (abfd, ".reg", sect))
10423 return false;
10424 break;
10426 case NOTE_INFO_MODULE:
10427 case NOTE_INFO_MODULE64:
10428 /* Make a ".module/xxxxxxxx" section. */
10429 if (type == NOTE_INFO_MODULE)
10431 /* module_info.base_address */
10432 base_addr = bfd_get_32 (abfd, note->descdata + 4);
10433 sprintf (buf, ".module/%08lx", (unsigned long) base_addr);
10434 /* module_info.module_name_size */
10435 name_size = bfd_get_32 (abfd, note->descdata + 8);
10437 else /* NOTE_INFO_MODULE64 */
10439 /* module_info.base_address */
10440 base_addr = bfd_get_64 (abfd, note->descdata + 4);
10441 sprintf (buf, ".module/%016lx", (unsigned long) base_addr);
10442 /* module_info.module_name_size */
10443 name_size = bfd_get_32 (abfd, note->descdata + 12);
10446 len = strlen (buf) + 1;
10447 name = (char *) bfd_alloc (abfd, len);
10448 if (name == NULL)
10449 return false;
10451 memcpy (name, buf, len);
10453 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
10455 if (sect == NULL)
10456 return false;
10458 if (note->descsz < 12 + name_size)
10460 _bfd_error_handler (_("%pB: win32pstatus NOTE_INFO_MODULE of size %lu"
10461 " is too small to contain a name of size %u"),
10462 abfd, note->descsz, name_size);
10463 return true;
10466 sect->size = note->descsz;
10467 sect->filepos = note->descpos;
10468 sect->alignment_power = 2;
10469 break;
10471 default:
10472 return true;
10475 return true;
10478 static bool
10479 elfcore_grok_note (bfd *abfd, Elf_Internal_Note *note)
10481 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10483 switch (note->type)
10485 default:
10486 return true;
10488 case NT_PRSTATUS:
10489 if (bed->elf_backend_grok_prstatus)
10490 if ((*bed->elf_backend_grok_prstatus) (abfd, note))
10491 return true;
10492 #if defined (HAVE_PRSTATUS_T)
10493 return elfcore_grok_prstatus (abfd, note);
10494 #else
10495 return true;
10496 #endif
10498 #if defined (HAVE_PSTATUS_T)
10499 case NT_PSTATUS:
10500 return elfcore_grok_pstatus (abfd, note);
10501 #endif
10503 #if defined (HAVE_LWPSTATUS_T)
10504 case NT_LWPSTATUS:
10505 return elfcore_grok_lwpstatus (abfd, note);
10506 #endif
10508 case NT_FPREGSET: /* FIXME: rename to NT_PRFPREG */
10509 return elfcore_grok_prfpreg (abfd, note);
10511 case NT_WIN32PSTATUS:
10512 return elfcore_grok_win32pstatus (abfd, note);
10514 case NT_PRXFPREG: /* Linux SSE extension */
10515 if (note->namesz == 6
10516 && strcmp (note->namedata, "LINUX") == 0)
10517 return elfcore_grok_prxfpreg (abfd, note);
10518 else
10519 return true;
10521 case NT_X86_XSTATE: /* Linux XSAVE extension */
10522 if (note->namesz == 6
10523 && strcmp (note->namedata, "LINUX") == 0)
10524 return elfcore_grok_xstatereg (abfd, note);
10525 else
10526 return true;
10528 case NT_PPC_VMX:
10529 if (note->namesz == 6
10530 && strcmp (note->namedata, "LINUX") == 0)
10531 return elfcore_grok_ppc_vmx (abfd, note);
10532 else
10533 return true;
10535 case NT_PPC_VSX:
10536 if (note->namesz == 6
10537 && strcmp (note->namedata, "LINUX") == 0)
10538 return elfcore_grok_ppc_vsx (abfd, note);
10539 else
10540 return true;
10542 case NT_PPC_TAR:
10543 if (note->namesz == 6
10544 && strcmp (note->namedata, "LINUX") == 0)
10545 return elfcore_grok_ppc_tar (abfd, note);
10546 else
10547 return true;
10549 case NT_PPC_PPR:
10550 if (note->namesz == 6
10551 && strcmp (note->namedata, "LINUX") == 0)
10552 return elfcore_grok_ppc_ppr (abfd, note);
10553 else
10554 return true;
10556 case NT_PPC_DSCR:
10557 if (note->namesz == 6
10558 && strcmp (note->namedata, "LINUX") == 0)
10559 return elfcore_grok_ppc_dscr (abfd, note);
10560 else
10561 return true;
10563 case NT_PPC_EBB:
10564 if (note->namesz == 6
10565 && strcmp (note->namedata, "LINUX") == 0)
10566 return elfcore_grok_ppc_ebb (abfd, note);
10567 else
10568 return true;
10570 case NT_PPC_PMU:
10571 if (note->namesz == 6
10572 && strcmp (note->namedata, "LINUX") == 0)
10573 return elfcore_grok_ppc_pmu (abfd, note);
10574 else
10575 return true;
10577 case NT_PPC_TM_CGPR:
10578 if (note->namesz == 6
10579 && strcmp (note->namedata, "LINUX") == 0)
10580 return elfcore_grok_ppc_tm_cgpr (abfd, note);
10581 else
10582 return true;
10584 case NT_PPC_TM_CFPR:
10585 if (note->namesz == 6
10586 && strcmp (note->namedata, "LINUX") == 0)
10587 return elfcore_grok_ppc_tm_cfpr (abfd, note);
10588 else
10589 return true;
10591 case NT_PPC_TM_CVMX:
10592 if (note->namesz == 6
10593 && strcmp (note->namedata, "LINUX") == 0)
10594 return elfcore_grok_ppc_tm_cvmx (abfd, note);
10595 else
10596 return true;
10598 case NT_PPC_TM_CVSX:
10599 if (note->namesz == 6
10600 && strcmp (note->namedata, "LINUX") == 0)
10601 return elfcore_grok_ppc_tm_cvsx (abfd, note);
10602 else
10603 return true;
10605 case NT_PPC_TM_SPR:
10606 if (note->namesz == 6
10607 && strcmp (note->namedata, "LINUX") == 0)
10608 return elfcore_grok_ppc_tm_spr (abfd, note);
10609 else
10610 return true;
10612 case NT_PPC_TM_CTAR:
10613 if (note->namesz == 6
10614 && strcmp (note->namedata, "LINUX") == 0)
10615 return elfcore_grok_ppc_tm_ctar (abfd, note);
10616 else
10617 return true;
10619 case NT_PPC_TM_CPPR:
10620 if (note->namesz == 6
10621 && strcmp (note->namedata, "LINUX") == 0)
10622 return elfcore_grok_ppc_tm_cppr (abfd, note);
10623 else
10624 return true;
10626 case NT_PPC_TM_CDSCR:
10627 if (note->namesz == 6
10628 && strcmp (note->namedata, "LINUX") == 0)
10629 return elfcore_grok_ppc_tm_cdscr (abfd, note);
10630 else
10631 return true;
10633 case NT_S390_HIGH_GPRS:
10634 if (note->namesz == 6
10635 && strcmp (note->namedata, "LINUX") == 0)
10636 return elfcore_grok_s390_high_gprs (abfd, note);
10637 else
10638 return true;
10640 case NT_S390_TIMER:
10641 if (note->namesz == 6
10642 && strcmp (note->namedata, "LINUX") == 0)
10643 return elfcore_grok_s390_timer (abfd, note);
10644 else
10645 return true;
10647 case NT_S390_TODCMP:
10648 if (note->namesz == 6
10649 && strcmp (note->namedata, "LINUX") == 0)
10650 return elfcore_grok_s390_todcmp (abfd, note);
10651 else
10652 return true;
10654 case NT_S390_TODPREG:
10655 if (note->namesz == 6
10656 && strcmp (note->namedata, "LINUX") == 0)
10657 return elfcore_grok_s390_todpreg (abfd, note);
10658 else
10659 return true;
10661 case NT_S390_CTRS:
10662 if (note->namesz == 6
10663 && strcmp (note->namedata, "LINUX") == 0)
10664 return elfcore_grok_s390_ctrs (abfd, note);
10665 else
10666 return true;
10668 case NT_S390_PREFIX:
10669 if (note->namesz == 6
10670 && strcmp (note->namedata, "LINUX") == 0)
10671 return elfcore_grok_s390_prefix (abfd, note);
10672 else
10673 return true;
10675 case NT_S390_LAST_BREAK:
10676 if (note->namesz == 6
10677 && strcmp (note->namedata, "LINUX") == 0)
10678 return elfcore_grok_s390_last_break (abfd, note);
10679 else
10680 return true;
10682 case NT_S390_SYSTEM_CALL:
10683 if (note->namesz == 6
10684 && strcmp (note->namedata, "LINUX") == 0)
10685 return elfcore_grok_s390_system_call (abfd, note);
10686 else
10687 return true;
10689 case NT_S390_TDB:
10690 if (note->namesz == 6
10691 && strcmp (note->namedata, "LINUX") == 0)
10692 return elfcore_grok_s390_tdb (abfd, note);
10693 else
10694 return true;
10696 case NT_S390_VXRS_LOW:
10697 if (note->namesz == 6
10698 && strcmp (note->namedata, "LINUX") == 0)
10699 return elfcore_grok_s390_vxrs_low (abfd, note);
10700 else
10701 return true;
10703 case NT_S390_VXRS_HIGH:
10704 if (note->namesz == 6
10705 && strcmp (note->namedata, "LINUX") == 0)
10706 return elfcore_grok_s390_vxrs_high (abfd, note);
10707 else
10708 return true;
10710 case NT_S390_GS_CB:
10711 if (note->namesz == 6
10712 && strcmp (note->namedata, "LINUX") == 0)
10713 return elfcore_grok_s390_gs_cb (abfd, note);
10714 else
10715 return true;
10717 case NT_S390_GS_BC:
10718 if (note->namesz == 6
10719 && strcmp (note->namedata, "LINUX") == 0)
10720 return elfcore_grok_s390_gs_bc (abfd, note);
10721 else
10722 return true;
10724 case NT_ARC_V2:
10725 if (note->namesz == 6
10726 && strcmp (note->namedata, "LINUX") == 0)
10727 return elfcore_grok_arc_v2 (abfd, note);
10728 else
10729 return true;
10731 case NT_ARM_VFP:
10732 if (note->namesz == 6
10733 && strcmp (note->namedata, "LINUX") == 0)
10734 return elfcore_grok_arm_vfp (abfd, note);
10735 else
10736 return true;
10738 case NT_ARM_TLS:
10739 if (note->namesz == 6
10740 && strcmp (note->namedata, "LINUX") == 0)
10741 return elfcore_grok_aarch_tls (abfd, note);
10742 else
10743 return true;
10745 case NT_ARM_HW_BREAK:
10746 if (note->namesz == 6
10747 && strcmp (note->namedata, "LINUX") == 0)
10748 return elfcore_grok_aarch_hw_break (abfd, note);
10749 else
10750 return true;
10752 case NT_ARM_HW_WATCH:
10753 if (note->namesz == 6
10754 && strcmp (note->namedata, "LINUX") == 0)
10755 return elfcore_grok_aarch_hw_watch (abfd, note);
10756 else
10757 return true;
10759 case NT_ARM_SVE:
10760 if (note->namesz == 6
10761 && strcmp (note->namedata, "LINUX") == 0)
10762 return elfcore_grok_aarch_sve (abfd, note);
10763 else
10764 return true;
10766 case NT_ARM_PAC_MASK:
10767 if (note->namesz == 6
10768 && strcmp (note->namedata, "LINUX") == 0)
10769 return elfcore_grok_aarch_pauth (abfd, note);
10770 else
10771 return true;
10773 case NT_ARM_TAGGED_ADDR_CTRL:
10774 if (note->namesz == 6
10775 && strcmp (note->namedata, "LINUX") == 0)
10776 return elfcore_grok_aarch_mte (abfd, note);
10777 else
10778 return true;
10780 case NT_GDB_TDESC:
10781 if (note->namesz == 4
10782 && strcmp (note->namedata, "GDB") == 0)
10783 return elfcore_grok_gdb_tdesc (abfd, note);
10784 else
10785 return true;
10787 case NT_RISCV_CSR:
10788 if (note->namesz == 4
10789 && strcmp (note->namedata, "GDB") == 0)
10790 return elfcore_grok_riscv_csr (abfd, note);
10791 else
10792 return true;
10794 case NT_LARCH_CPUCFG:
10795 if (note->namesz == 6
10796 && strcmp (note->namedata, "LINUX") == 0)
10797 return elfcore_grok_loongarch_cpucfg (abfd, note);
10798 else
10799 return true;
10801 case NT_LARCH_LBT:
10802 if (note->namesz == 6
10803 && strcmp (note->namedata, "LINUX") == 0)
10804 return elfcore_grok_loongarch_lbt (abfd, note);
10805 else
10806 return true;
10808 case NT_LARCH_LSX:
10809 if (note->namesz == 6
10810 && strcmp (note->namedata, "LINUX") == 0)
10811 return elfcore_grok_loongarch_lsx (abfd, note);
10812 else
10813 return true;
10815 case NT_LARCH_LASX:
10816 if (note->namesz == 6
10817 && strcmp (note->namedata, "LINUX") == 0)
10818 return elfcore_grok_loongarch_lasx (abfd, note);
10819 else
10820 return true;
10822 case NT_PRPSINFO:
10823 case NT_PSINFO:
10824 if (bed->elf_backend_grok_psinfo)
10825 if ((*bed->elf_backend_grok_psinfo) (abfd, note))
10826 return true;
10827 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
10828 return elfcore_grok_psinfo (abfd, note);
10829 #else
10830 return true;
10831 #endif
10833 case NT_AUXV:
10834 return elfcore_make_auxv_note_section (abfd, note, 0);
10836 case NT_FILE:
10837 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.file",
10838 note);
10840 case NT_SIGINFO:
10841 return elfcore_make_note_pseudosection (abfd, ".note.linuxcore.siginfo",
10842 note);
10847 static bool
10848 elfobj_grok_gnu_build_id (bfd *abfd, Elf_Internal_Note *note)
10850 struct bfd_build_id* build_id;
10852 if (note->descsz == 0)
10853 return false;
10855 build_id = bfd_alloc (abfd, sizeof (struct bfd_build_id) - 1 + note->descsz);
10856 if (build_id == NULL)
10857 return false;
10859 build_id->size = note->descsz;
10860 memcpy (build_id->data, note->descdata, note->descsz);
10861 abfd->build_id = build_id;
10863 return true;
10866 static bool
10867 elfobj_grok_gnu_note (bfd *abfd, Elf_Internal_Note *note)
10869 switch (note->type)
10871 default:
10872 return true;
10874 case NT_GNU_PROPERTY_TYPE_0:
10875 return _bfd_elf_parse_gnu_properties (abfd, note);
10877 case NT_GNU_BUILD_ID:
10878 return elfobj_grok_gnu_build_id (abfd, note);
10882 static bool
10883 elfobj_grok_stapsdt_note_1 (bfd *abfd, Elf_Internal_Note *note)
10885 struct sdt_note *cur =
10886 (struct sdt_note *) bfd_alloc (abfd,
10887 sizeof (struct sdt_note) + note->descsz);
10889 cur->next = (struct sdt_note *) (elf_tdata (abfd))->sdt_note_head;
10890 cur->size = (bfd_size_type) note->descsz;
10891 memcpy (cur->data, note->descdata, note->descsz);
10893 elf_tdata (abfd)->sdt_note_head = cur;
10895 return true;
10898 static bool
10899 elfobj_grok_stapsdt_note (bfd *abfd, Elf_Internal_Note *note)
10901 switch (note->type)
10903 case NT_STAPSDT:
10904 return elfobj_grok_stapsdt_note_1 (abfd, note);
10906 default:
10907 return true;
10911 static bool
10912 elfcore_grok_freebsd_psinfo (bfd *abfd, Elf_Internal_Note *note)
10914 size_t offset;
10916 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10918 case ELFCLASS32:
10919 if (note->descsz < 108)
10920 return false;
10921 break;
10923 case ELFCLASS64:
10924 if (note->descsz < 120)
10925 return false;
10926 break;
10928 default:
10929 return false;
10932 /* Check for version 1 in pr_version. */
10933 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
10934 return false;
10936 offset = 4;
10938 /* Skip over pr_psinfosz. */
10939 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
10940 offset += 4;
10941 else
10943 offset += 4; /* Padding before pr_psinfosz. */
10944 offset += 8;
10947 /* pr_fname is PRFNAMESZ (16) + 1 bytes in size. */
10948 elf_tdata (abfd)->core->program
10949 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 17);
10950 offset += 17;
10952 /* pr_psargs is PRARGSZ (80) + 1 bytes in size. */
10953 elf_tdata (abfd)->core->command
10954 = _bfd_elfcore_strndup (abfd, note->descdata + offset, 81);
10955 offset += 81;
10957 /* Padding before pr_pid. */
10958 offset += 2;
10960 /* The pr_pid field was added in version "1a". */
10961 if (note->descsz < offset + 4)
10962 return true;
10964 elf_tdata (abfd)->core->pid
10965 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
10967 return true;
10970 static bool
10971 elfcore_grok_freebsd_prstatus (bfd *abfd, Elf_Internal_Note *note)
10973 size_t offset;
10974 size_t size;
10975 size_t min_size;
10977 /* Compute offset of pr_getregsz, skipping over pr_statussz.
10978 Also compute minimum size of this note. */
10979 switch (elf_elfheader (abfd)->e_ident[EI_CLASS])
10981 case ELFCLASS32:
10982 offset = 4 + 4;
10983 min_size = offset + (4 * 2) + 4 + 4 + 4;
10984 break;
10986 case ELFCLASS64:
10987 offset = 4 + 4 + 8; /* Includes padding before pr_statussz. */
10988 min_size = offset + (8 * 2) + 4 + 4 + 4 + 4;
10989 break;
10991 default:
10992 return false;
10995 if (note->descsz < min_size)
10996 return false;
10998 /* Check for version 1 in pr_version. */
10999 if (bfd_h_get_32 (abfd, (bfd_byte *) note->descdata) != 1)
11000 return false;
11002 /* Extract size of pr_reg from pr_gregsetsz. */
11003 /* Skip over pr_gregsetsz and pr_fpregsetsz. */
11004 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS32)
11006 size = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
11007 offset += 4 * 2;
11009 else
11011 size = bfd_h_get_64 (abfd, (bfd_byte *) note->descdata + offset);
11012 offset += 8 * 2;
11015 /* Skip over pr_osreldate. */
11016 offset += 4;
11018 /* Read signal from pr_cursig. */
11019 if (elf_tdata (abfd)->core->signal == 0)
11020 elf_tdata (abfd)->core->signal
11021 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
11022 offset += 4;
11024 /* Read TID from pr_pid. */
11025 elf_tdata (abfd)->core->lwpid
11026 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + offset);
11027 offset += 4;
11029 /* Padding before pr_reg. */
11030 if (elf_elfheader (abfd)->e_ident[EI_CLASS] == ELFCLASS64)
11031 offset += 4;
11033 /* Make sure that there is enough data remaining in the note. */
11034 if ((note->descsz - offset) < size)
11035 return false;
11037 /* Make a ".reg/999" section and a ".reg" section. */
11038 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
11039 size, note->descpos + offset);
11042 static bool
11043 elfcore_grok_freebsd_note (bfd *abfd, Elf_Internal_Note *note)
11045 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11047 switch (note->type)
11049 case NT_PRSTATUS:
11050 if (bed->elf_backend_grok_freebsd_prstatus)
11051 if ((*bed->elf_backend_grok_freebsd_prstatus) (abfd, note))
11052 return true;
11053 return elfcore_grok_freebsd_prstatus (abfd, note);
11055 case NT_FPREGSET:
11056 return elfcore_grok_prfpreg (abfd, note);
11058 case NT_PRPSINFO:
11059 return elfcore_grok_freebsd_psinfo (abfd, note);
11061 case NT_FREEBSD_THRMISC:
11062 return elfcore_make_note_pseudosection (abfd, ".thrmisc", note);
11064 case NT_FREEBSD_PROCSTAT_PROC:
11065 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.proc",
11066 note);
11068 case NT_FREEBSD_PROCSTAT_FILES:
11069 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.files",
11070 note);
11072 case NT_FREEBSD_PROCSTAT_VMMAP:
11073 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.vmmap",
11074 note);
11076 case NT_FREEBSD_PROCSTAT_AUXV:
11077 return elfcore_make_auxv_note_section (abfd, note, 4);
11079 case NT_FREEBSD_X86_SEGBASES:
11080 return elfcore_make_note_pseudosection (abfd, ".reg-x86-segbases", note);
11082 case NT_X86_XSTATE:
11083 return elfcore_grok_xstatereg (abfd, note);
11085 case NT_FREEBSD_PTLWPINFO:
11086 return elfcore_make_note_pseudosection (abfd, ".note.freebsdcore.lwpinfo",
11087 note);
11089 case NT_ARM_TLS:
11090 return elfcore_grok_aarch_tls (abfd, note);
11092 case NT_ARM_VFP:
11093 return elfcore_grok_arm_vfp (abfd, note);
11095 default:
11096 return true;
11100 static bool
11101 elfcore_netbsd_get_lwpid (Elf_Internal_Note *note, int *lwpidp)
11103 char *cp;
11105 cp = strchr (note->namedata, '@');
11106 if (cp != NULL)
11108 *lwpidp = atoi(cp + 1);
11109 return true;
11111 return false;
11114 static bool
11115 elfcore_grok_netbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
11117 if (note->descsz <= 0x7c + 31)
11118 return false;
11120 /* Signal number at offset 0x08. */
11121 elf_tdata (abfd)->core->signal
11122 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
11124 /* Process ID at offset 0x50. */
11125 elf_tdata (abfd)->core->pid
11126 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x50);
11128 /* Command name at 0x7c (max 32 bytes, including nul). */
11129 elf_tdata (abfd)->core->command
11130 = _bfd_elfcore_strndup (abfd, note->descdata + 0x7c, 31);
11132 return elfcore_make_note_pseudosection (abfd, ".note.netbsdcore.procinfo",
11133 note);
11136 static bool
11137 elfcore_grok_netbsd_note (bfd *abfd, Elf_Internal_Note *note)
11139 int lwp;
11141 if (elfcore_netbsd_get_lwpid (note, &lwp))
11142 elf_tdata (abfd)->core->lwpid = lwp;
11144 switch (note->type)
11146 case NT_NETBSDCORE_PROCINFO:
11147 /* NetBSD-specific core "procinfo". Note that we expect to
11148 find this note before any of the others, which is fine,
11149 since the kernel writes this note out first when it
11150 creates a core file. */
11151 return elfcore_grok_netbsd_procinfo (abfd, note);
11152 case NT_NETBSDCORE_AUXV:
11153 /* NetBSD-specific Elf Auxiliary Vector data. */
11154 return elfcore_make_auxv_note_section (abfd, note, 4);
11155 case NT_NETBSDCORE_LWPSTATUS:
11156 return elfcore_make_note_pseudosection (abfd,
11157 ".note.netbsdcore.lwpstatus",
11158 note);
11159 default:
11160 break;
11163 /* As of March 2020 there are no other machine-independent notes
11164 defined for NetBSD core files. If the note type is less
11165 than the start of the machine-dependent note types, we don't
11166 understand it. */
11168 if (note->type < NT_NETBSDCORE_FIRSTMACH)
11169 return true;
11172 switch (bfd_get_arch (abfd))
11174 /* On the Alpha, SPARC (32-bit and 64-bit), PT_GETREGS == mach+0 and
11175 PT_GETFPREGS == mach+2. */
11177 case bfd_arch_aarch64:
11178 case bfd_arch_alpha:
11179 case bfd_arch_sparc:
11180 switch (note->type)
11182 case NT_NETBSDCORE_FIRSTMACH+0:
11183 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11185 case NT_NETBSDCORE_FIRSTMACH+2:
11186 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11188 default:
11189 return true;
11192 /* On SuperH, PT_GETREGS == mach+3 and PT_GETFPREGS == mach+5.
11193 There's also old PT___GETREGS40 == mach + 1 for old reg
11194 structure which lacks GBR. */
11196 case bfd_arch_sh:
11197 switch (note->type)
11199 case NT_NETBSDCORE_FIRSTMACH+3:
11200 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11202 case NT_NETBSDCORE_FIRSTMACH+5:
11203 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11205 default:
11206 return true;
11209 /* On all other arch's, PT_GETREGS == mach+1 and
11210 PT_GETFPREGS == mach+3. */
11212 default:
11213 switch (note->type)
11215 case NT_NETBSDCORE_FIRSTMACH+1:
11216 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11218 case NT_NETBSDCORE_FIRSTMACH+3:
11219 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11221 default:
11222 return true;
11225 /* NOTREACHED */
11228 static bool
11229 elfcore_grok_openbsd_procinfo (bfd *abfd, Elf_Internal_Note *note)
11231 if (note->descsz <= 0x48 + 31)
11232 return false;
11234 /* Signal number at offset 0x08. */
11235 elf_tdata (abfd)->core->signal
11236 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x08);
11238 /* Process ID at offset 0x20. */
11239 elf_tdata (abfd)->core->pid
11240 = bfd_h_get_32 (abfd, (bfd_byte *) note->descdata + 0x20);
11242 /* Command name at 0x48 (max 32 bytes, including nul). */
11243 elf_tdata (abfd)->core->command
11244 = _bfd_elfcore_strndup (abfd, note->descdata + 0x48, 31);
11246 return true;
11249 /* Processes Solaris's process status note.
11250 sig_off ~ offsetof(prstatus_t, pr_cursig)
11251 pid_off ~ offsetof(prstatus_t, pr_pid)
11252 lwpid_off ~ offsetof(prstatus_t, pr_who)
11253 gregset_size ~ sizeof(gregset_t)
11254 gregset_offset ~ offsetof(prstatus_t, pr_reg) */
11256 static bool
11257 elfcore_grok_solaris_prstatus (bfd *abfd, Elf_Internal_Note* note, int sig_off,
11258 int pid_off, int lwpid_off, size_t gregset_size,
11259 size_t gregset_offset)
11261 asection *sect = NULL;
11262 elf_tdata (abfd)->core->signal
11263 = bfd_get_16 (abfd, note->descdata + sig_off);
11264 elf_tdata (abfd)->core->pid
11265 = bfd_get_32 (abfd, note->descdata + pid_off);
11266 elf_tdata (abfd)->core->lwpid
11267 = bfd_get_32 (abfd, note->descdata + lwpid_off);
11269 sect = bfd_get_section_by_name (abfd, ".reg");
11270 if (sect != NULL)
11271 sect->size = gregset_size;
11273 return _bfd_elfcore_make_pseudosection (abfd, ".reg", gregset_size,
11274 note->descpos + gregset_offset);
11277 /* Gets program and arguments from a core.
11278 prog_off ~ offsetof(prpsinfo | psinfo_t, pr_fname)
11279 comm_off ~ offsetof(prpsinfo | psinfo_t, pr_psargs) */
11281 static bool
11282 elfcore_grok_solaris_info(bfd *abfd, Elf_Internal_Note* note,
11283 int prog_off, int comm_off)
11285 elf_tdata (abfd)->core->program
11286 = _bfd_elfcore_strndup (abfd, note->descdata + prog_off, 16);
11287 elf_tdata (abfd)->core->command
11288 = _bfd_elfcore_strndup (abfd, note->descdata + comm_off, 80);
11290 return true;
11293 /* Processes Solaris's LWP status note.
11294 gregset_size ~ sizeof(gregset_t)
11295 gregset_off ~ offsetof(lwpstatus_t, pr_reg)
11296 fpregset_size ~ sizeof(fpregset_t)
11297 fpregset_off ~ offsetof(lwpstatus_t, pr_fpreg) */
11299 static bool
11300 elfcore_grok_solaris_lwpstatus (bfd *abfd, Elf_Internal_Note* note,
11301 size_t gregset_size, int gregset_off,
11302 size_t fpregset_size, int fpregset_off)
11304 asection *sect = NULL;
11305 char reg2_section_name[16] = { 0 };
11307 (void) snprintf (reg2_section_name, 16, "%s/%i", ".reg2",
11308 elf_tdata (abfd)->core->lwpid);
11310 /* offsetof(lwpstatus_t, pr_lwpid) */
11311 elf_tdata (abfd)->core->lwpid
11312 = bfd_get_32 (abfd, note->descdata + 4);
11313 /* offsetof(lwpstatus_t, pr_cursig) */
11314 elf_tdata (abfd)->core->signal
11315 = bfd_get_16 (abfd, note->descdata + 12);
11317 sect = bfd_get_section_by_name (abfd, ".reg");
11318 if (sect != NULL)
11319 sect->size = gregset_size;
11320 else if (!_bfd_elfcore_make_pseudosection (abfd, ".reg", gregset_size,
11321 note->descpos + gregset_off))
11322 return false;
11324 sect = bfd_get_section_by_name (abfd, reg2_section_name);
11325 if (sect != NULL)
11327 sect->size = fpregset_size;
11328 sect->filepos = note->descpos + fpregset_off;
11329 sect->alignment_power = 2;
11331 else if (!_bfd_elfcore_make_pseudosection (abfd, ".reg2", fpregset_size,
11332 note->descpos + fpregset_off))
11333 return false;
11335 return true;
11338 static bool
11339 elfcore_grok_solaris_note_impl (bfd *abfd, Elf_Internal_Note *note)
11341 if (note == NULL)
11342 return false;
11344 /* core files are identified as 32- or 64-bit, SPARC or x86,
11345 by the size of the descsz which matches the sizeof()
11346 the type appropriate for that note type (e.g., prstatus_t for
11347 SOLARIS_NT_PRSTATUS) for the corresponding architecture
11348 on Solaris. The core file bitness may differ from the bitness of
11349 gdb itself, so fixed values are used instead of sizeof().
11350 Appropriate fixed offsets are also used to obtain data from
11351 the note. */
11353 switch ((int) note->type)
11355 case SOLARIS_NT_PRSTATUS:
11356 switch (note->descsz)
11358 case 508: /* sizeof(prstatus_t) SPARC 32-bit */
11359 return elfcore_grok_solaris_prstatus(abfd, note,
11360 136, 216, 308, 152, 356);
11361 case 904: /* sizeof(prstatus_t) SPARC 64-bit */
11362 return elfcore_grok_solaris_prstatus(abfd, note,
11363 264, 360, 520, 304, 600);
11364 case 432: /* sizeof(prstatus_t) Intel 32-bit */
11365 return elfcore_grok_solaris_prstatus(abfd, note,
11366 136, 216, 308, 76, 356);
11367 case 824: /* sizeof(prstatus_t) Intel 64-bit */
11368 return elfcore_grok_solaris_prstatus(abfd, note,
11369 264, 360, 520, 224, 600);
11370 default:
11371 return true;
11374 case SOLARIS_NT_PSINFO:
11375 case SOLARIS_NT_PRPSINFO:
11376 switch (note->descsz)
11378 case 260: /* sizeof(prpsinfo_t) SPARC and Intel 32-bit */
11379 return elfcore_grok_solaris_info(abfd, note, 84, 100);
11380 case 328: /* sizeof(prpsinfo_t) SPARC and Intel 64-bit */
11381 return elfcore_grok_solaris_info(abfd, note, 120, 136);
11382 case 360: /* sizeof(psinfo_t) SPARC and Intel 32-bit */
11383 return elfcore_grok_solaris_info(abfd, note, 88, 104);
11384 case 440: /* sizeof(psinfo_t) SPARC and Intel 64-bit */
11385 return elfcore_grok_solaris_info(abfd, note, 136, 152);
11386 default:
11387 return true;
11390 case SOLARIS_NT_LWPSTATUS:
11391 switch (note->descsz)
11393 case 896: /* sizeof(lwpstatus_t) SPARC 32-bit */
11394 return elfcore_grok_solaris_lwpstatus(abfd, note,
11395 152, 344, 400, 496);
11396 case 1392: /* sizeof(lwpstatus_t) SPARC 64-bit */
11397 return elfcore_grok_solaris_lwpstatus(abfd, note,
11398 304, 544, 544, 848);
11399 case 800: /* sizeof(lwpstatus_t) Intel 32-bit */
11400 return elfcore_grok_solaris_lwpstatus(abfd, note,
11401 76, 344, 380, 420);
11402 case 1296: /* sizeof(lwpstatus_t) Intel 64-bit */
11403 return elfcore_grok_solaris_lwpstatus(abfd, note,
11404 224, 544, 528, 768);
11405 default:
11406 return true;
11409 case SOLARIS_NT_LWPSINFO:
11410 /* sizeof(lwpsinfo_t) on 32- and 64-bit, respectively */
11411 if (note->descsz == 128 || note->descsz == 152)
11412 elf_tdata (abfd)->core->lwpid =
11413 bfd_get_32 (abfd, note->descdata + 4);
11414 break;
11416 default:
11417 break;
11420 return true;
11423 /* For name starting with "CORE" this may be either a Solaris
11424 core file or a gdb-generated core file. Do Solaris-specific
11425 processing on selected note types first with
11426 elfcore_grok_solaris_note(), then process the note
11427 in elfcore_grok_note(). */
11429 static bool
11430 elfcore_grok_solaris_note (bfd *abfd, Elf_Internal_Note *note)
11432 if (!elfcore_grok_solaris_note_impl (abfd, note))
11433 return false;
11435 return elfcore_grok_note (abfd, note);
11438 static bool
11439 elfcore_grok_openbsd_note (bfd *abfd, Elf_Internal_Note *note)
11441 if (note->type == NT_OPENBSD_PROCINFO)
11442 return elfcore_grok_openbsd_procinfo (abfd, note);
11444 if (note->type == NT_OPENBSD_REGS)
11445 return elfcore_make_note_pseudosection (abfd, ".reg", note);
11447 if (note->type == NT_OPENBSD_FPREGS)
11448 return elfcore_make_note_pseudosection (abfd, ".reg2", note);
11450 if (note->type == NT_OPENBSD_XFPREGS)
11451 return elfcore_make_note_pseudosection (abfd, ".reg-xfp", note);
11453 if (note->type == NT_OPENBSD_AUXV)
11454 return elfcore_make_auxv_note_section (abfd, note, 0);
11456 if (note->type == NT_OPENBSD_WCOOKIE)
11458 asection *sect = bfd_make_section_anyway_with_flags (abfd, ".wcookie",
11459 SEC_HAS_CONTENTS);
11461 if (sect == NULL)
11462 return false;
11463 sect->size = note->descsz;
11464 sect->filepos = note->descpos;
11465 sect->alignment_power = 1 + bfd_get_arch_size (abfd) / 32;
11467 return true;
11470 return true;
11473 static bool
11474 elfcore_grok_nto_status (bfd *abfd, Elf_Internal_Note *note, long *tid)
11476 void *ddata = note->descdata;
11477 char buf[100];
11478 char *name;
11479 asection *sect;
11480 short sig;
11481 unsigned flags;
11483 if (note->descsz < 16)
11484 return false;
11486 /* nto_procfs_status 'pid' field is at offset 0. */
11487 elf_tdata (abfd)->core->pid = bfd_get_32 (abfd, (bfd_byte *) ddata);
11489 /* nto_procfs_status 'tid' field is at offset 4. Pass it back. */
11490 *tid = bfd_get_32 (abfd, (bfd_byte *) ddata + 4);
11492 /* nto_procfs_status 'flags' field is at offset 8. */
11493 flags = bfd_get_32 (abfd, (bfd_byte *) ddata + 8);
11495 /* nto_procfs_status 'what' field is at offset 14. */
11496 if ((sig = bfd_get_16 (abfd, (bfd_byte *) ddata + 14)) > 0)
11498 elf_tdata (abfd)->core->signal = sig;
11499 elf_tdata (abfd)->core->lwpid = *tid;
11502 /* _DEBUG_FLAG_CURTID (current thread) is 0x80. Some cores
11503 do not come from signals so we make sure we set the current
11504 thread just in case. */
11505 if (flags & 0x00000080)
11506 elf_tdata (abfd)->core->lwpid = *tid;
11508 /* Make a ".qnx_core_status/%d" section. */
11509 sprintf (buf, ".qnx_core_status/%ld", *tid);
11511 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11512 if (name == NULL)
11513 return false;
11514 strcpy (name, buf);
11516 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11517 if (sect == NULL)
11518 return false;
11520 sect->size = note->descsz;
11521 sect->filepos = note->descpos;
11522 sect->alignment_power = 2;
11524 return (elfcore_maybe_make_sect (abfd, ".qnx_core_status", sect));
11527 static bool
11528 elfcore_grok_nto_regs (bfd *abfd,
11529 Elf_Internal_Note *note,
11530 long tid,
11531 char *base)
11533 char buf[100];
11534 char *name;
11535 asection *sect;
11537 /* Make a "(base)/%d" section. */
11538 sprintf (buf, "%s/%ld", base, tid);
11540 name = (char *) bfd_alloc (abfd, strlen (buf) + 1);
11541 if (name == NULL)
11542 return false;
11543 strcpy (name, buf);
11545 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11546 if (sect == NULL)
11547 return false;
11549 sect->size = note->descsz;
11550 sect->filepos = note->descpos;
11551 sect->alignment_power = 2;
11553 /* This is the current thread. */
11554 if (elf_tdata (abfd)->core->lwpid == tid)
11555 return elfcore_maybe_make_sect (abfd, base, sect);
11557 return true;
11560 #define BFD_QNT_CORE_INFO 7
11561 #define BFD_QNT_CORE_STATUS 8
11562 #define BFD_QNT_CORE_GREG 9
11563 #define BFD_QNT_CORE_FPREG 10
11565 static bool
11566 elfcore_grok_nto_note (bfd *abfd, Elf_Internal_Note *note)
11568 /* Every GREG section has a STATUS section before it. Store the
11569 tid from the previous call to pass down to the next gregs
11570 function. */
11571 static long tid = 1;
11573 switch (note->type)
11575 case BFD_QNT_CORE_INFO:
11576 return elfcore_make_note_pseudosection (abfd, ".qnx_core_info", note);
11577 case BFD_QNT_CORE_STATUS:
11578 return elfcore_grok_nto_status (abfd, note, &tid);
11579 case BFD_QNT_CORE_GREG:
11580 return elfcore_grok_nto_regs (abfd, note, tid, ".reg");
11581 case BFD_QNT_CORE_FPREG:
11582 return elfcore_grok_nto_regs (abfd, note, tid, ".reg2");
11583 default:
11584 return true;
11588 static bool
11589 elfcore_grok_spu_note (bfd *abfd, Elf_Internal_Note *note)
11591 char *name;
11592 asection *sect;
11593 size_t len;
11595 /* Use note name as section name. */
11596 len = note->namesz;
11597 name = (char *) bfd_alloc (abfd, len);
11598 if (name == NULL)
11599 return false;
11600 memcpy (name, note->namedata, len);
11601 name[len - 1] = '\0';
11603 sect = bfd_make_section_anyway_with_flags (abfd, name, SEC_HAS_CONTENTS);
11604 if (sect == NULL)
11605 return false;
11607 sect->size = note->descsz;
11608 sect->filepos = note->descpos;
11609 sect->alignment_power = 1;
11611 return true;
11614 /* Function: elfcore_write_note
11616 Inputs:
11617 buffer to hold note, and current size of buffer
11618 name of note
11619 type of note
11620 data for note
11621 size of data for note
11623 Writes note to end of buffer. ELF64 notes are written exactly as
11624 for ELF32, despite the current (as of 2006) ELF gabi specifying
11625 that they ought to have 8-byte namesz and descsz field, and have
11626 8-byte alignment. Other writers, eg. Linux kernel, do the same.
11628 Return:
11629 Pointer to realloc'd buffer, *BUFSIZ updated. */
11631 char *
11632 elfcore_write_note (bfd *abfd,
11633 char *buf,
11634 int *bufsiz,
11635 const char *name,
11636 int type,
11637 const void *input,
11638 int size)
11640 Elf_External_Note *xnp;
11641 size_t namesz;
11642 size_t newspace;
11643 char *dest;
11645 namesz = 0;
11646 if (name != NULL)
11647 namesz = strlen (name) + 1;
11649 newspace = 12 + ((namesz + 3) & -4) + ((size + 3) & -4);
11651 buf = (char *) realloc (buf, *bufsiz + newspace);
11652 if (buf == NULL)
11653 return buf;
11654 dest = buf + *bufsiz;
11655 *bufsiz += newspace;
11656 xnp = (Elf_External_Note *) dest;
11657 H_PUT_32 (abfd, namesz, xnp->namesz);
11658 H_PUT_32 (abfd, size, xnp->descsz);
11659 H_PUT_32 (abfd, type, xnp->type);
11660 dest = xnp->name;
11661 if (name != NULL)
11663 memcpy (dest, name, namesz);
11664 dest += namesz;
11665 while (namesz & 3)
11667 *dest++ = '\0';
11668 ++namesz;
11671 memcpy (dest, input, size);
11672 dest += size;
11673 while (size & 3)
11675 *dest++ = '\0';
11676 ++size;
11678 return buf;
11681 /* gcc-8 warns (*) on all the strncpy calls in this function about
11682 possible string truncation. The "truncation" is not a bug. We
11683 have an external representation of structs with fields that are not
11684 necessarily NULL terminated and corresponding internal
11685 representation fields that are one larger so that they can always
11686 be NULL terminated.
11687 gcc versions between 4.2 and 4.6 do not allow pragma control of
11688 diagnostics inside functions, giving a hard error if you try to use
11689 the finer control available with later versions.
11690 gcc prior to 4.2 warns about diagnostic push and pop.
11691 gcc-5, gcc-6 and gcc-7 warn that -Wstringop-truncation is unknown,
11692 unless you also add #pragma GCC diagnostic ignored "-Wpragma".
11693 (*) Depending on your system header files! */
11694 #if GCC_VERSION >= 8000
11695 # pragma GCC diagnostic push
11696 # pragma GCC diagnostic ignored "-Wstringop-truncation"
11697 #endif
11698 char *
11699 elfcore_write_prpsinfo (bfd *abfd,
11700 char *buf,
11701 int *bufsiz,
11702 const char *fname,
11703 const char *psargs)
11705 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11707 if (bed->elf_backend_write_core_note != NULL)
11709 char *ret;
11710 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11711 NT_PRPSINFO, fname, psargs);
11712 if (ret != NULL)
11713 return ret;
11716 #if defined (HAVE_PRPSINFO_T) || defined (HAVE_PSINFO_T)
11717 # if defined (HAVE_PRPSINFO32_T) || defined (HAVE_PSINFO32_T)
11718 if (bed->s->elfclass == ELFCLASS32)
11720 # if defined (HAVE_PSINFO32_T)
11721 psinfo32_t data;
11722 int note_type = NT_PSINFO;
11723 # else
11724 prpsinfo32_t data;
11725 int note_type = NT_PRPSINFO;
11726 # endif
11728 memset (&data, 0, sizeof (data));
11729 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11730 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11731 return elfcore_write_note (abfd, buf, bufsiz,
11732 "CORE", note_type, &data, sizeof (data));
11734 else
11735 # endif
11737 # if defined (HAVE_PSINFO_T)
11738 psinfo_t data;
11739 int note_type = NT_PSINFO;
11740 # else
11741 prpsinfo_t data;
11742 int note_type = NT_PRPSINFO;
11743 # endif
11745 memset (&data, 0, sizeof (data));
11746 strncpy (data.pr_fname, fname, sizeof (data.pr_fname));
11747 strncpy (data.pr_psargs, psargs, sizeof (data.pr_psargs));
11748 return elfcore_write_note (abfd, buf, bufsiz,
11749 "CORE", note_type, &data, sizeof (data));
11751 #endif /* PSINFO_T or PRPSINFO_T */
11753 free (buf);
11754 return NULL;
11756 #if GCC_VERSION >= 8000
11757 # pragma GCC diagnostic pop
11758 #endif
11760 char *
11761 elfcore_write_linux_prpsinfo32
11762 (bfd *abfd, char *buf, int *bufsiz,
11763 const struct elf_internal_linux_prpsinfo *prpsinfo)
11765 if (get_elf_backend_data (abfd)->linux_prpsinfo32_ugid16)
11767 struct elf_external_linux_prpsinfo32_ugid16 data;
11769 swap_linux_prpsinfo32_ugid16_out (abfd, prpsinfo, &data);
11770 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11771 &data, sizeof (data));
11773 else
11775 struct elf_external_linux_prpsinfo32_ugid32 data;
11777 swap_linux_prpsinfo32_ugid32_out (abfd, prpsinfo, &data);
11778 return elfcore_write_note (abfd, buf, bufsiz, "CORE", NT_PRPSINFO,
11779 &data, sizeof (data));
11783 char *
11784 elfcore_write_linux_prpsinfo64
11785 (bfd *abfd, char *buf, int *bufsiz,
11786 const struct elf_internal_linux_prpsinfo *prpsinfo)
11788 if (get_elf_backend_data (abfd)->linux_prpsinfo64_ugid16)
11790 struct elf_external_linux_prpsinfo64_ugid16 data;
11792 swap_linux_prpsinfo64_ugid16_out (abfd, prpsinfo, &data);
11793 return elfcore_write_note (abfd, buf, bufsiz,
11794 "CORE", NT_PRPSINFO, &data, sizeof (data));
11796 else
11798 struct elf_external_linux_prpsinfo64_ugid32 data;
11800 swap_linux_prpsinfo64_ugid32_out (abfd, prpsinfo, &data);
11801 return elfcore_write_note (abfd, buf, bufsiz,
11802 "CORE", NT_PRPSINFO, &data, sizeof (data));
11806 char *
11807 elfcore_write_prstatus (bfd *abfd,
11808 char *buf,
11809 int *bufsiz,
11810 long pid,
11811 int cursig,
11812 const void *gregs)
11814 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11816 if (bed->elf_backend_write_core_note != NULL)
11818 char *ret;
11819 ret = (*bed->elf_backend_write_core_note) (abfd, buf, bufsiz,
11820 NT_PRSTATUS,
11821 pid, cursig, gregs);
11822 if (ret != NULL)
11823 return ret;
11826 #if defined (HAVE_PRSTATUS_T)
11827 #if defined (HAVE_PRSTATUS32_T)
11828 if (bed->s->elfclass == ELFCLASS32)
11830 prstatus32_t prstat;
11832 memset (&prstat, 0, sizeof (prstat));
11833 prstat.pr_pid = pid;
11834 prstat.pr_cursig = cursig;
11835 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11836 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11837 NT_PRSTATUS, &prstat, sizeof (prstat));
11839 else
11840 #endif
11842 prstatus_t prstat;
11844 memset (&prstat, 0, sizeof (prstat));
11845 prstat.pr_pid = pid;
11846 prstat.pr_cursig = cursig;
11847 memcpy (&prstat.pr_reg, gregs, sizeof (prstat.pr_reg));
11848 return elfcore_write_note (abfd, buf, bufsiz, "CORE",
11849 NT_PRSTATUS, &prstat, sizeof (prstat));
11851 #endif /* HAVE_PRSTATUS_T */
11853 free (buf);
11854 return NULL;
11857 #if defined (HAVE_LWPSTATUS_T)
11858 char *
11859 elfcore_write_lwpstatus (bfd *abfd,
11860 char *buf,
11861 int *bufsiz,
11862 long pid,
11863 int cursig,
11864 const void *gregs)
11866 lwpstatus_t lwpstat;
11867 const char *note_name = "CORE";
11869 memset (&lwpstat, 0, sizeof (lwpstat));
11870 lwpstat.pr_lwpid = pid >> 16;
11871 lwpstat.pr_cursig = cursig;
11872 #if defined (HAVE_LWPSTATUS_T_PR_REG)
11873 memcpy (&lwpstat.pr_reg, gregs, sizeof (lwpstat.pr_reg));
11874 #elif defined (HAVE_LWPSTATUS_T_PR_CONTEXT)
11875 #if !defined(gregs)
11876 memcpy (lwpstat.pr_context.uc_mcontext.gregs,
11877 gregs, sizeof (lwpstat.pr_context.uc_mcontext.gregs));
11878 #else
11879 memcpy (lwpstat.pr_context.uc_mcontext.__gregs,
11880 gregs, sizeof (lwpstat.pr_context.uc_mcontext.__gregs));
11881 #endif
11882 #endif
11883 return elfcore_write_note (abfd, buf, bufsiz, note_name,
11884 NT_LWPSTATUS, &lwpstat, sizeof (lwpstat));
11886 #endif /* HAVE_LWPSTATUS_T */
11888 #if defined (HAVE_PSTATUS_T)
11889 char *
11890 elfcore_write_pstatus (bfd *abfd,
11891 char *buf,
11892 int *bufsiz,
11893 long pid,
11894 int cursig ATTRIBUTE_UNUSED,
11895 const void *gregs ATTRIBUTE_UNUSED)
11897 const char *note_name = "CORE";
11898 #if defined (HAVE_PSTATUS32_T)
11899 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
11901 if (bed->s->elfclass == ELFCLASS32)
11903 pstatus32_t pstat;
11905 memset (&pstat, 0, sizeof (pstat));
11906 pstat.pr_pid = pid & 0xffff;
11907 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11908 NT_PSTATUS, &pstat, sizeof (pstat));
11909 return buf;
11911 else
11912 #endif
11914 pstatus_t pstat;
11916 memset (&pstat, 0, sizeof (pstat));
11917 pstat.pr_pid = pid & 0xffff;
11918 buf = elfcore_write_note (abfd, buf, bufsiz, note_name,
11919 NT_PSTATUS, &pstat, sizeof (pstat));
11920 return buf;
11923 #endif /* HAVE_PSTATUS_T */
11925 char *
11926 elfcore_write_prfpreg (bfd *abfd,
11927 char *buf,
11928 int *bufsiz,
11929 const void *fpregs,
11930 int size)
11932 const char *note_name = "CORE";
11933 return elfcore_write_note (abfd, buf, bufsiz,
11934 note_name, NT_FPREGSET, fpregs, size);
11937 char *
11938 elfcore_write_prxfpreg (bfd *abfd,
11939 char *buf,
11940 int *bufsiz,
11941 const void *xfpregs,
11942 int size)
11944 char *note_name = "LINUX";
11945 return elfcore_write_note (abfd, buf, bufsiz,
11946 note_name, NT_PRXFPREG, xfpregs, size);
11949 char *
11950 elfcore_write_xstatereg (bfd *abfd, char *buf, int *bufsiz,
11951 const void *xfpregs, int size)
11953 char *note_name;
11954 if (get_elf_backend_data (abfd)->elf_osabi == ELFOSABI_FREEBSD)
11955 note_name = "FreeBSD";
11956 else
11957 note_name = "LINUX";
11958 return elfcore_write_note (abfd, buf, bufsiz,
11959 note_name, NT_X86_XSTATE, xfpregs, size);
11962 char *
11963 elfcore_write_x86_segbases (bfd *abfd, char *buf, int *bufsiz,
11964 const void *regs, int size)
11966 char *note_name = "FreeBSD";
11967 return elfcore_write_note (abfd, buf, bufsiz,
11968 note_name, NT_FREEBSD_X86_SEGBASES, regs, size);
11971 char *
11972 elfcore_write_ppc_vmx (bfd *abfd,
11973 char *buf,
11974 int *bufsiz,
11975 const void *ppc_vmx,
11976 int size)
11978 char *note_name = "LINUX";
11979 return elfcore_write_note (abfd, buf, bufsiz,
11980 note_name, NT_PPC_VMX, ppc_vmx, size);
11983 char *
11984 elfcore_write_ppc_vsx (bfd *abfd,
11985 char *buf,
11986 int *bufsiz,
11987 const void *ppc_vsx,
11988 int size)
11990 char *note_name = "LINUX";
11991 return elfcore_write_note (abfd, buf, bufsiz,
11992 note_name, NT_PPC_VSX, ppc_vsx, size);
11995 char *
11996 elfcore_write_ppc_tar (bfd *abfd,
11997 char *buf,
11998 int *bufsiz,
11999 const void *ppc_tar,
12000 int size)
12002 char *note_name = "LINUX";
12003 return elfcore_write_note (abfd, buf, bufsiz,
12004 note_name, NT_PPC_TAR, ppc_tar, size);
12007 char *
12008 elfcore_write_ppc_ppr (bfd *abfd,
12009 char *buf,
12010 int *bufsiz,
12011 const void *ppc_ppr,
12012 int size)
12014 char *note_name = "LINUX";
12015 return elfcore_write_note (abfd, buf, bufsiz,
12016 note_name, NT_PPC_PPR, ppc_ppr, size);
12019 char *
12020 elfcore_write_ppc_dscr (bfd *abfd,
12021 char *buf,
12022 int *bufsiz,
12023 const void *ppc_dscr,
12024 int size)
12026 char *note_name = "LINUX";
12027 return elfcore_write_note (abfd, buf, bufsiz,
12028 note_name, NT_PPC_DSCR, ppc_dscr, size);
12031 char *
12032 elfcore_write_ppc_ebb (bfd *abfd,
12033 char *buf,
12034 int *bufsiz,
12035 const void *ppc_ebb,
12036 int size)
12038 char *note_name = "LINUX";
12039 return elfcore_write_note (abfd, buf, bufsiz,
12040 note_name, NT_PPC_EBB, ppc_ebb, size);
12043 char *
12044 elfcore_write_ppc_pmu (bfd *abfd,
12045 char *buf,
12046 int *bufsiz,
12047 const void *ppc_pmu,
12048 int size)
12050 char *note_name = "LINUX";
12051 return elfcore_write_note (abfd, buf, bufsiz,
12052 note_name, NT_PPC_PMU, ppc_pmu, size);
12055 char *
12056 elfcore_write_ppc_tm_cgpr (bfd *abfd,
12057 char *buf,
12058 int *bufsiz,
12059 const void *ppc_tm_cgpr,
12060 int size)
12062 char *note_name = "LINUX";
12063 return elfcore_write_note (abfd, buf, bufsiz,
12064 note_name, NT_PPC_TM_CGPR, ppc_tm_cgpr, size);
12067 char *
12068 elfcore_write_ppc_tm_cfpr (bfd *abfd,
12069 char *buf,
12070 int *bufsiz,
12071 const void *ppc_tm_cfpr,
12072 int size)
12074 char *note_name = "LINUX";
12075 return elfcore_write_note (abfd, buf, bufsiz,
12076 note_name, NT_PPC_TM_CFPR, ppc_tm_cfpr, size);
12079 char *
12080 elfcore_write_ppc_tm_cvmx (bfd *abfd,
12081 char *buf,
12082 int *bufsiz,
12083 const void *ppc_tm_cvmx,
12084 int size)
12086 char *note_name = "LINUX";
12087 return elfcore_write_note (abfd, buf, bufsiz,
12088 note_name, NT_PPC_TM_CVMX, ppc_tm_cvmx, size);
12091 char *
12092 elfcore_write_ppc_tm_cvsx (bfd *abfd,
12093 char *buf,
12094 int *bufsiz,
12095 const void *ppc_tm_cvsx,
12096 int size)
12098 char *note_name = "LINUX";
12099 return elfcore_write_note (abfd, buf, bufsiz,
12100 note_name, NT_PPC_TM_CVSX, ppc_tm_cvsx, size);
12103 char *
12104 elfcore_write_ppc_tm_spr (bfd *abfd,
12105 char *buf,
12106 int *bufsiz,
12107 const void *ppc_tm_spr,
12108 int size)
12110 char *note_name = "LINUX";
12111 return elfcore_write_note (abfd, buf, bufsiz,
12112 note_name, NT_PPC_TM_SPR, ppc_tm_spr, size);
12115 char *
12116 elfcore_write_ppc_tm_ctar (bfd *abfd,
12117 char *buf,
12118 int *bufsiz,
12119 const void *ppc_tm_ctar,
12120 int size)
12122 char *note_name = "LINUX";
12123 return elfcore_write_note (abfd, buf, bufsiz,
12124 note_name, NT_PPC_TM_CTAR, ppc_tm_ctar, size);
12127 char *
12128 elfcore_write_ppc_tm_cppr (bfd *abfd,
12129 char *buf,
12130 int *bufsiz,
12131 const void *ppc_tm_cppr,
12132 int size)
12134 char *note_name = "LINUX";
12135 return elfcore_write_note (abfd, buf, bufsiz,
12136 note_name, NT_PPC_TM_CPPR, ppc_tm_cppr, size);
12139 char *
12140 elfcore_write_ppc_tm_cdscr (bfd *abfd,
12141 char *buf,
12142 int *bufsiz,
12143 const void *ppc_tm_cdscr,
12144 int size)
12146 char *note_name = "LINUX";
12147 return elfcore_write_note (abfd, buf, bufsiz,
12148 note_name, NT_PPC_TM_CDSCR, ppc_tm_cdscr, size);
12151 static char *
12152 elfcore_write_s390_high_gprs (bfd *abfd,
12153 char *buf,
12154 int *bufsiz,
12155 const void *s390_high_gprs,
12156 int size)
12158 char *note_name = "LINUX";
12159 return elfcore_write_note (abfd, buf, bufsiz,
12160 note_name, NT_S390_HIGH_GPRS,
12161 s390_high_gprs, size);
12164 char *
12165 elfcore_write_s390_timer (bfd *abfd,
12166 char *buf,
12167 int *bufsiz,
12168 const void *s390_timer,
12169 int size)
12171 char *note_name = "LINUX";
12172 return elfcore_write_note (abfd, buf, bufsiz,
12173 note_name, NT_S390_TIMER, s390_timer, size);
12176 char *
12177 elfcore_write_s390_todcmp (bfd *abfd,
12178 char *buf,
12179 int *bufsiz,
12180 const void *s390_todcmp,
12181 int size)
12183 char *note_name = "LINUX";
12184 return elfcore_write_note (abfd, buf, bufsiz,
12185 note_name, NT_S390_TODCMP, s390_todcmp, size);
12188 char *
12189 elfcore_write_s390_todpreg (bfd *abfd,
12190 char *buf,
12191 int *bufsiz,
12192 const void *s390_todpreg,
12193 int size)
12195 char *note_name = "LINUX";
12196 return elfcore_write_note (abfd, buf, bufsiz,
12197 note_name, NT_S390_TODPREG, s390_todpreg, size);
12200 char *
12201 elfcore_write_s390_ctrs (bfd *abfd,
12202 char *buf,
12203 int *bufsiz,
12204 const void *s390_ctrs,
12205 int size)
12207 char *note_name = "LINUX";
12208 return elfcore_write_note (abfd, buf, bufsiz,
12209 note_name, NT_S390_CTRS, s390_ctrs, size);
12212 char *
12213 elfcore_write_s390_prefix (bfd *abfd,
12214 char *buf,
12215 int *bufsiz,
12216 const void *s390_prefix,
12217 int size)
12219 char *note_name = "LINUX";
12220 return elfcore_write_note (abfd, buf, bufsiz,
12221 note_name, NT_S390_PREFIX, s390_prefix, size);
12224 char *
12225 elfcore_write_s390_last_break (bfd *abfd,
12226 char *buf,
12227 int *bufsiz,
12228 const void *s390_last_break,
12229 int size)
12231 char *note_name = "LINUX";
12232 return elfcore_write_note (abfd, buf, bufsiz,
12233 note_name, NT_S390_LAST_BREAK,
12234 s390_last_break, size);
12237 char *
12238 elfcore_write_s390_system_call (bfd *abfd,
12239 char *buf,
12240 int *bufsiz,
12241 const void *s390_system_call,
12242 int size)
12244 char *note_name = "LINUX";
12245 return elfcore_write_note (abfd, buf, bufsiz,
12246 note_name, NT_S390_SYSTEM_CALL,
12247 s390_system_call, size);
12250 char *
12251 elfcore_write_s390_tdb (bfd *abfd,
12252 char *buf,
12253 int *bufsiz,
12254 const void *s390_tdb,
12255 int size)
12257 char *note_name = "LINUX";
12258 return elfcore_write_note (abfd, buf, bufsiz,
12259 note_name, NT_S390_TDB, s390_tdb, size);
12262 char *
12263 elfcore_write_s390_vxrs_low (bfd *abfd,
12264 char *buf,
12265 int *bufsiz,
12266 const void *s390_vxrs_low,
12267 int size)
12269 char *note_name = "LINUX";
12270 return elfcore_write_note (abfd, buf, bufsiz,
12271 note_name, NT_S390_VXRS_LOW, s390_vxrs_low, size);
12274 char *
12275 elfcore_write_s390_vxrs_high (bfd *abfd,
12276 char *buf,
12277 int *bufsiz,
12278 const void *s390_vxrs_high,
12279 int size)
12281 char *note_name = "LINUX";
12282 return elfcore_write_note (abfd, buf, bufsiz,
12283 note_name, NT_S390_VXRS_HIGH,
12284 s390_vxrs_high, size);
12287 char *
12288 elfcore_write_s390_gs_cb (bfd *abfd,
12289 char *buf,
12290 int *bufsiz,
12291 const void *s390_gs_cb,
12292 int size)
12294 char *note_name = "LINUX";
12295 return elfcore_write_note (abfd, buf, bufsiz,
12296 note_name, NT_S390_GS_CB,
12297 s390_gs_cb, size);
12300 char *
12301 elfcore_write_s390_gs_bc (bfd *abfd,
12302 char *buf,
12303 int *bufsiz,
12304 const void *s390_gs_bc,
12305 int size)
12307 char *note_name = "LINUX";
12308 return elfcore_write_note (abfd, buf, bufsiz,
12309 note_name, NT_S390_GS_BC,
12310 s390_gs_bc, size);
12313 char *
12314 elfcore_write_arm_vfp (bfd *abfd,
12315 char *buf,
12316 int *bufsiz,
12317 const void *arm_vfp,
12318 int size)
12320 char *note_name = "LINUX";
12321 return elfcore_write_note (abfd, buf, bufsiz,
12322 note_name, NT_ARM_VFP, arm_vfp, size);
12325 char *
12326 elfcore_write_aarch_tls (bfd *abfd,
12327 char *buf,
12328 int *bufsiz,
12329 const void *aarch_tls,
12330 int size)
12332 char *note_name = "LINUX";
12333 return elfcore_write_note (abfd, buf, bufsiz,
12334 note_name, NT_ARM_TLS, aarch_tls, size);
12337 char *
12338 elfcore_write_aarch_hw_break (bfd *abfd,
12339 char *buf,
12340 int *bufsiz,
12341 const void *aarch_hw_break,
12342 int size)
12344 char *note_name = "LINUX";
12345 return elfcore_write_note (abfd, buf, bufsiz,
12346 note_name, NT_ARM_HW_BREAK, aarch_hw_break, size);
12349 char *
12350 elfcore_write_aarch_hw_watch (bfd *abfd,
12351 char *buf,
12352 int *bufsiz,
12353 const void *aarch_hw_watch,
12354 int size)
12356 char *note_name = "LINUX";
12357 return elfcore_write_note (abfd, buf, bufsiz,
12358 note_name, NT_ARM_HW_WATCH, aarch_hw_watch, size);
12361 char *
12362 elfcore_write_aarch_sve (bfd *abfd,
12363 char *buf,
12364 int *bufsiz,
12365 const void *aarch_sve,
12366 int size)
12368 char *note_name = "LINUX";
12369 return elfcore_write_note (abfd, buf, bufsiz,
12370 note_name, NT_ARM_SVE, aarch_sve, size);
12373 char *
12374 elfcore_write_aarch_pauth (bfd *abfd,
12375 char *buf,
12376 int *bufsiz,
12377 const void *aarch_pauth,
12378 int size)
12380 char *note_name = "LINUX";
12381 return elfcore_write_note (abfd, buf, bufsiz,
12382 note_name, NT_ARM_PAC_MASK, aarch_pauth, size);
12385 char *
12386 elfcore_write_aarch_mte (bfd *abfd,
12387 char *buf,
12388 int *bufsiz,
12389 const void *aarch_mte,
12390 int size)
12392 char *note_name = "LINUX";
12393 return elfcore_write_note (abfd, buf, bufsiz,
12394 note_name, NT_ARM_TAGGED_ADDR_CTRL,
12395 aarch_mte,
12396 size);
12399 char *
12400 elfcore_write_arc_v2 (bfd *abfd,
12401 char *buf,
12402 int *bufsiz,
12403 const void *arc_v2,
12404 int size)
12406 char *note_name = "LINUX";
12407 return elfcore_write_note (abfd, buf, bufsiz,
12408 note_name, NT_ARC_V2, arc_v2, size);
12411 char *
12412 elfcore_write_loongarch_cpucfg (bfd *abfd,
12413 char *buf,
12414 int *bufsiz,
12415 const void *loongarch_cpucfg,
12416 int size)
12418 char *note_name = "LINUX";
12419 return elfcore_write_note (abfd, buf, bufsiz,
12420 note_name, NT_LARCH_CPUCFG,
12421 loongarch_cpucfg, size);
12424 char *
12425 elfcore_write_loongarch_lbt (bfd *abfd,
12426 char *buf,
12427 int *bufsiz,
12428 const void *loongarch_lbt,
12429 int size)
12431 char *note_name = "LINUX";
12432 return elfcore_write_note (abfd, buf, bufsiz,
12433 note_name, NT_LARCH_LBT, loongarch_lbt, size);
12436 char *
12437 elfcore_write_loongarch_lsx (bfd *abfd,
12438 char *buf,
12439 int *bufsiz,
12440 const void *loongarch_lsx,
12441 int size)
12443 char *note_name = "LINUX";
12444 return elfcore_write_note (abfd, buf, bufsiz,
12445 note_name, NT_LARCH_LSX, loongarch_lsx, size);
12448 char *
12449 elfcore_write_loongarch_lasx (bfd *abfd,
12450 char *buf,
12451 int *bufsiz,
12452 const void *loongarch_lasx,
12453 int size)
12455 char *note_name = "LINUX";
12456 return elfcore_write_note (abfd, buf, bufsiz,
12457 note_name, NT_LARCH_LASX, loongarch_lasx, size);
12460 /* Write the buffer of csr values in CSRS (length SIZE) into the note
12461 buffer BUF and update *BUFSIZ. ABFD is the bfd the note is being
12462 written into. Return a pointer to the new start of the note buffer, to
12463 replace BUF which may no longer be valid. */
12465 char *
12466 elfcore_write_riscv_csr (bfd *abfd,
12467 char *buf,
12468 int *bufsiz,
12469 const void *csrs,
12470 int size)
12472 const char *note_name = "GDB";
12473 return elfcore_write_note (abfd, buf, bufsiz,
12474 note_name, NT_RISCV_CSR, csrs, size);
12477 /* Write the target description (a string) pointed to by TDESC, length
12478 SIZE, into the note buffer BUF, and update *BUFSIZ. ABFD is the bfd the
12479 note is being written into. Return a pointer to the new start of the
12480 note buffer, to replace BUF which may no longer be valid. */
12482 char *
12483 elfcore_write_gdb_tdesc (bfd *abfd,
12484 char *buf,
12485 int *bufsiz,
12486 const void *tdesc,
12487 int size)
12489 const char *note_name = "GDB";
12490 return elfcore_write_note (abfd, buf, bufsiz,
12491 note_name, NT_GDB_TDESC, tdesc, size);
12494 char *
12495 elfcore_write_register_note (bfd *abfd,
12496 char *buf,
12497 int *bufsiz,
12498 const char *section,
12499 const void *data,
12500 int size)
12502 if (strcmp (section, ".reg2") == 0)
12503 return elfcore_write_prfpreg (abfd, buf, bufsiz, data, size);
12504 if (strcmp (section, ".reg-xfp") == 0)
12505 return elfcore_write_prxfpreg (abfd, buf, bufsiz, data, size);
12506 if (strcmp (section, ".reg-xstate") == 0)
12507 return elfcore_write_xstatereg (abfd, buf, bufsiz, data, size);
12508 if (strcmp (section, ".reg-x86-segbases") == 0)
12509 return elfcore_write_x86_segbases (abfd, buf, bufsiz, data, size);
12510 if (strcmp (section, ".reg-ppc-vmx") == 0)
12511 return elfcore_write_ppc_vmx (abfd, buf, bufsiz, data, size);
12512 if (strcmp (section, ".reg-ppc-vsx") == 0)
12513 return elfcore_write_ppc_vsx (abfd, buf, bufsiz, data, size);
12514 if (strcmp (section, ".reg-ppc-tar") == 0)
12515 return elfcore_write_ppc_tar (abfd, buf, bufsiz, data, size);
12516 if (strcmp (section, ".reg-ppc-ppr") == 0)
12517 return elfcore_write_ppc_ppr (abfd, buf, bufsiz, data, size);
12518 if (strcmp (section, ".reg-ppc-dscr") == 0)
12519 return elfcore_write_ppc_dscr (abfd, buf, bufsiz, data, size);
12520 if (strcmp (section, ".reg-ppc-ebb") == 0)
12521 return elfcore_write_ppc_ebb (abfd, buf, bufsiz, data, size);
12522 if (strcmp (section, ".reg-ppc-pmu") == 0)
12523 return elfcore_write_ppc_pmu (abfd, buf, bufsiz, data, size);
12524 if (strcmp (section, ".reg-ppc-tm-cgpr") == 0)
12525 return elfcore_write_ppc_tm_cgpr (abfd, buf, bufsiz, data, size);
12526 if (strcmp (section, ".reg-ppc-tm-cfpr") == 0)
12527 return elfcore_write_ppc_tm_cfpr (abfd, buf, bufsiz, data, size);
12528 if (strcmp (section, ".reg-ppc-tm-cvmx") == 0)
12529 return elfcore_write_ppc_tm_cvmx (abfd, buf, bufsiz, data, size);
12530 if (strcmp (section, ".reg-ppc-tm-cvsx") == 0)
12531 return elfcore_write_ppc_tm_cvsx (abfd, buf, bufsiz, data, size);
12532 if (strcmp (section, ".reg-ppc-tm-spr") == 0)
12533 return elfcore_write_ppc_tm_spr (abfd, buf, bufsiz, data, size);
12534 if (strcmp (section, ".reg-ppc-tm-ctar") == 0)
12535 return elfcore_write_ppc_tm_ctar (abfd, buf, bufsiz, data, size);
12536 if (strcmp (section, ".reg-ppc-tm-cppr") == 0)
12537 return elfcore_write_ppc_tm_cppr (abfd, buf, bufsiz, data, size);
12538 if (strcmp (section, ".reg-ppc-tm-cdscr") == 0)
12539 return elfcore_write_ppc_tm_cdscr (abfd, buf, bufsiz, data, size);
12540 if (strcmp (section, ".reg-s390-high-gprs") == 0)
12541 return elfcore_write_s390_high_gprs (abfd, buf, bufsiz, data, size);
12542 if (strcmp (section, ".reg-s390-timer") == 0)
12543 return elfcore_write_s390_timer (abfd, buf, bufsiz, data, size);
12544 if (strcmp (section, ".reg-s390-todcmp") == 0)
12545 return elfcore_write_s390_todcmp (abfd, buf, bufsiz, data, size);
12546 if (strcmp (section, ".reg-s390-todpreg") == 0)
12547 return elfcore_write_s390_todpreg (abfd, buf, bufsiz, data, size);
12548 if (strcmp (section, ".reg-s390-ctrs") == 0)
12549 return elfcore_write_s390_ctrs (abfd, buf, bufsiz, data, size);
12550 if (strcmp (section, ".reg-s390-prefix") == 0)
12551 return elfcore_write_s390_prefix (abfd, buf, bufsiz, data, size);
12552 if (strcmp (section, ".reg-s390-last-break") == 0)
12553 return elfcore_write_s390_last_break (abfd, buf, bufsiz, data, size);
12554 if (strcmp (section, ".reg-s390-system-call") == 0)
12555 return elfcore_write_s390_system_call (abfd, buf, bufsiz, data, size);
12556 if (strcmp (section, ".reg-s390-tdb") == 0)
12557 return elfcore_write_s390_tdb (abfd, buf, bufsiz, data, size);
12558 if (strcmp (section, ".reg-s390-vxrs-low") == 0)
12559 return elfcore_write_s390_vxrs_low (abfd, buf, bufsiz, data, size);
12560 if (strcmp (section, ".reg-s390-vxrs-high") == 0)
12561 return elfcore_write_s390_vxrs_high (abfd, buf, bufsiz, data, size);
12562 if (strcmp (section, ".reg-s390-gs-cb") == 0)
12563 return elfcore_write_s390_gs_cb (abfd, buf, bufsiz, data, size);
12564 if (strcmp (section, ".reg-s390-gs-bc") == 0)
12565 return elfcore_write_s390_gs_bc (abfd, buf, bufsiz, data, size);
12566 if (strcmp (section, ".reg-arm-vfp") == 0)
12567 return elfcore_write_arm_vfp (abfd, buf, bufsiz, data, size);
12568 if (strcmp (section, ".reg-aarch-tls") == 0)
12569 return elfcore_write_aarch_tls (abfd, buf, bufsiz, data, size);
12570 if (strcmp (section, ".reg-aarch-hw-break") == 0)
12571 return elfcore_write_aarch_hw_break (abfd, buf, bufsiz, data, size);
12572 if (strcmp (section, ".reg-aarch-hw-watch") == 0)
12573 return elfcore_write_aarch_hw_watch (abfd, buf, bufsiz, data, size);
12574 if (strcmp (section, ".reg-aarch-sve") == 0)
12575 return elfcore_write_aarch_sve (abfd, buf, bufsiz, data, size);
12576 if (strcmp (section, ".reg-aarch-pauth") == 0)
12577 return elfcore_write_aarch_pauth (abfd, buf, bufsiz, data, size);
12578 if (strcmp (section, ".reg-aarch-mte") == 0)
12579 return elfcore_write_aarch_mte (abfd, buf, bufsiz, data, size);
12580 if (strcmp (section, ".reg-arc-v2") == 0)
12581 return elfcore_write_arc_v2 (abfd, buf, bufsiz, data, size);
12582 if (strcmp (section, ".gdb-tdesc") == 0)
12583 return elfcore_write_gdb_tdesc (abfd, buf, bufsiz, data, size);
12584 if (strcmp (section, ".reg-riscv-csr") == 0)
12585 return elfcore_write_riscv_csr (abfd, buf, bufsiz, data, size);
12586 if (strcmp (section, ".reg-loongarch-cpucfg") == 0)
12587 return elfcore_write_loongarch_cpucfg (abfd, buf, bufsiz, data, size);
12588 if (strcmp (section, ".reg-loongarch-lbt") == 0)
12589 return elfcore_write_loongarch_lbt (abfd, buf, bufsiz, data, size);
12590 if (strcmp (section, ".reg-loongarch-lsx") == 0)
12591 return elfcore_write_loongarch_lsx (abfd, buf, bufsiz, data, size);
12592 if (strcmp (section, ".reg-loongarch-lasx") == 0)
12593 return elfcore_write_loongarch_lasx (abfd, buf, bufsiz, data, size);
12594 return NULL;
12597 char *
12598 elfcore_write_file_note (bfd *obfd, char *note_data, int *note_size,
12599 const void *buf, int bufsiz)
12601 return elfcore_write_note (obfd, note_data, note_size,
12602 "CORE", NT_FILE, buf, bufsiz);
12605 static bool
12606 elf_parse_notes (bfd *abfd, char *buf, size_t size, file_ptr offset,
12607 size_t align)
12609 char *p;
12611 /* NB: CORE PT_NOTE segments may have p_align values of 0 or 1.
12612 gABI specifies that PT_NOTE alignment should be aligned to 4
12613 bytes for 32-bit objects and to 8 bytes for 64-bit objects. If
12614 align is less than 4, we use 4 byte alignment. */
12615 if (align < 4)
12616 align = 4;
12617 if (align != 4 && align != 8)
12618 return false;
12620 p = buf;
12621 while (p < buf + size)
12623 Elf_External_Note *xnp = (Elf_External_Note *) p;
12624 Elf_Internal_Note in;
12626 if (offsetof (Elf_External_Note, name) > buf - p + size)
12627 return false;
12629 in.type = H_GET_32 (abfd, xnp->type);
12631 in.namesz = H_GET_32 (abfd, xnp->namesz);
12632 in.namedata = xnp->name;
12633 if (in.namesz > buf - in.namedata + size)
12634 return false;
12636 in.descsz = H_GET_32 (abfd, xnp->descsz);
12637 in.descdata = p + ELF_NOTE_DESC_OFFSET (in.namesz, align);
12638 in.descpos = offset + (in.descdata - buf);
12639 if (in.descsz != 0
12640 && (in.descdata >= buf + size
12641 || in.descsz > buf - in.descdata + size))
12642 return false;
12644 switch (bfd_get_format (abfd))
12646 default:
12647 return true;
12649 case bfd_core:
12651 #define GROKER_ELEMENT(S,F) {S, sizeof (S) - 1, F}
12652 struct
12654 const char * string;
12655 size_t len;
12656 bool (*func) (bfd *, Elf_Internal_Note *);
12658 grokers[] =
12660 GROKER_ELEMENT ("", elfcore_grok_note),
12661 GROKER_ELEMENT ("FreeBSD", elfcore_grok_freebsd_note),
12662 GROKER_ELEMENT ("NetBSD-CORE", elfcore_grok_netbsd_note),
12663 GROKER_ELEMENT ("OpenBSD", elfcore_grok_openbsd_note),
12664 GROKER_ELEMENT ("QNX", elfcore_grok_nto_note),
12665 GROKER_ELEMENT ("SPU/", elfcore_grok_spu_note),
12666 GROKER_ELEMENT ("GNU", elfobj_grok_gnu_note),
12667 GROKER_ELEMENT ("CORE", elfcore_grok_solaris_note)
12669 #undef GROKER_ELEMENT
12670 int i;
12672 for (i = ARRAY_SIZE (grokers); i--;)
12674 if (in.namesz >= grokers[i].len
12675 && strncmp (in.namedata, grokers[i].string,
12676 grokers[i].len) == 0)
12678 if (! grokers[i].func (abfd, & in))
12679 return false;
12680 break;
12683 break;
12686 case bfd_object:
12687 if (in.namesz == sizeof "GNU" && strcmp (in.namedata, "GNU") == 0)
12689 if (! elfobj_grok_gnu_note (abfd, &in))
12690 return false;
12692 else if (in.namesz == sizeof "stapsdt"
12693 && strcmp (in.namedata, "stapsdt") == 0)
12695 if (! elfobj_grok_stapsdt_note (abfd, &in))
12696 return false;
12698 break;
12701 p += ELF_NOTE_NEXT_OFFSET (in.namesz, in.descsz, align);
12704 return true;
12707 bool
12708 elf_read_notes (bfd *abfd, file_ptr offset, bfd_size_type size,
12709 size_t align)
12711 char *buf;
12713 if (size == 0 || (size + 1) == 0)
12714 return true;
12716 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
12717 return false;
12719 buf = (char *) _bfd_malloc_and_read (abfd, size + 1, size);
12720 if (buf == NULL)
12721 return false;
12723 /* PR 17512: file: ec08f814
12724 0-termintate the buffer so that string searches will not overflow. */
12725 buf[size] = 0;
12727 if (!elf_parse_notes (abfd, buf, size, offset, align))
12729 free (buf);
12730 return false;
12733 free (buf);
12734 return true;
12737 /* Providing external access to the ELF program header table. */
12739 /* Return an upper bound on the number of bytes required to store a
12740 copy of ABFD's program header table entries. Return -1 if an error
12741 occurs; bfd_get_error will return an appropriate code. */
12743 long
12744 bfd_get_elf_phdr_upper_bound (bfd *abfd)
12746 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12748 bfd_set_error (bfd_error_wrong_format);
12749 return -1;
12752 return elf_elfheader (abfd)->e_phnum * sizeof (Elf_Internal_Phdr);
12755 /* Copy ABFD's program header table entries to *PHDRS. The entries
12756 will be stored as an array of Elf_Internal_Phdr structures, as
12757 defined in include/elf/internal.h. To find out how large the
12758 buffer needs to be, call bfd_get_elf_phdr_upper_bound.
12760 Return the number of program header table entries read, or -1 if an
12761 error occurs; bfd_get_error will return an appropriate code. */
12764 bfd_get_elf_phdrs (bfd *abfd, void *phdrs)
12766 int num_phdrs;
12768 if (abfd->xvec->flavour != bfd_target_elf_flavour)
12770 bfd_set_error (bfd_error_wrong_format);
12771 return -1;
12774 num_phdrs = elf_elfheader (abfd)->e_phnum;
12775 if (num_phdrs != 0)
12776 memcpy (phdrs, elf_tdata (abfd)->phdr,
12777 num_phdrs * sizeof (Elf_Internal_Phdr));
12779 return num_phdrs;
12782 enum elf_reloc_type_class
12783 _bfd_elf_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
12784 const asection *rel_sec ATTRIBUTE_UNUSED,
12785 const Elf_Internal_Rela *rela ATTRIBUTE_UNUSED)
12787 return reloc_class_normal;
12790 /* For RELA architectures, return the relocation value for a
12791 relocation against a local symbol. */
12793 bfd_vma
12794 _bfd_elf_rela_local_sym (bfd *abfd,
12795 Elf_Internal_Sym *sym,
12796 asection **psec,
12797 Elf_Internal_Rela *rel)
12799 asection *sec = *psec;
12800 bfd_vma relocation;
12802 relocation = (sec->output_section->vma
12803 + sec->output_offset
12804 + sym->st_value);
12805 if ((sec->flags & SEC_MERGE)
12806 && ELF_ST_TYPE (sym->st_info) == STT_SECTION
12807 && sec->sec_info_type == SEC_INFO_TYPE_MERGE)
12809 rel->r_addend =
12810 _bfd_merged_section_offset (abfd, psec,
12811 elf_section_data (sec)->sec_info,
12812 sym->st_value + rel->r_addend);
12813 if (sec != *psec)
12815 /* If we have changed the section, and our original section is
12816 marked with SEC_EXCLUDE, it means that the original
12817 SEC_MERGE section has been completely subsumed in some
12818 other SEC_MERGE section. In this case, we need to leave
12819 some info around for --emit-relocs. */
12820 if ((sec->flags & SEC_EXCLUDE) != 0)
12821 sec->kept_section = *psec;
12822 sec = *psec;
12824 rel->r_addend -= relocation;
12825 rel->r_addend += sec->output_section->vma + sec->output_offset;
12827 return relocation;
12830 bfd_vma
12831 _bfd_elf_rel_local_sym (bfd *abfd,
12832 Elf_Internal_Sym *sym,
12833 asection **psec,
12834 bfd_vma addend)
12836 asection *sec = *psec;
12838 if (sec->sec_info_type != SEC_INFO_TYPE_MERGE)
12839 return sym->st_value + addend;
12841 return _bfd_merged_section_offset (abfd, psec,
12842 elf_section_data (sec)->sec_info,
12843 sym->st_value + addend);
12846 /* Adjust an address within a section. Given OFFSET within SEC, return
12847 the new offset within the section, based upon changes made to the
12848 section. Returns -1 if the offset is now invalid.
12849 The offset (in abnd out) is in target sized bytes, however big a
12850 byte may be. */
12852 bfd_vma
12853 _bfd_elf_section_offset (bfd *abfd,
12854 struct bfd_link_info *info,
12855 asection *sec,
12856 bfd_vma offset)
12858 switch (sec->sec_info_type)
12860 case SEC_INFO_TYPE_STABS:
12861 return _bfd_stab_section_offset (sec, elf_section_data (sec)->sec_info,
12862 offset);
12863 case SEC_INFO_TYPE_EH_FRAME:
12864 return _bfd_elf_eh_frame_section_offset (abfd, info, sec, offset);
12866 default:
12867 if ((sec->flags & SEC_ELF_REVERSE_COPY) != 0)
12869 /* Reverse the offset. */
12870 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12871 bfd_size_type address_size = bed->s->arch_size / 8;
12873 /* address_size and sec->size are in octets. Convert
12874 to bytes before subtracting the original offset. */
12875 offset = ((sec->size - address_size)
12876 / bfd_octets_per_byte (abfd, sec) - offset);
12878 return offset;
12882 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
12883 reconstruct an ELF file by reading the segments out of remote memory
12884 based on the ELF file header at EHDR_VMA and the ELF program headers it
12885 points to. If not null, *LOADBASEP is filled in with the difference
12886 between the VMAs from which the segments were read, and the VMAs the
12887 file headers (and hence BFD's idea of each section's VMA) put them at.
12889 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
12890 remote memory at target address VMA into the local buffer at MYADDR; it
12891 should return zero on success or an `errno' code on failure. TEMPL must
12892 be a BFD for an ELF target with the word size and byte order found in
12893 the remote memory. */
12895 bfd *
12896 bfd_elf_bfd_from_remote_memory
12897 (bfd *templ,
12898 bfd_vma ehdr_vma,
12899 bfd_size_type size,
12900 bfd_vma *loadbasep,
12901 int (*target_read_memory) (bfd_vma, bfd_byte *, bfd_size_type))
12903 return (*get_elf_backend_data (templ)->elf_backend_bfd_from_remote_memory)
12904 (templ, ehdr_vma, size, loadbasep, target_read_memory);
12907 long
12908 _bfd_elf_get_synthetic_symtab (bfd *abfd,
12909 long symcount ATTRIBUTE_UNUSED,
12910 asymbol **syms ATTRIBUTE_UNUSED,
12911 long dynsymcount,
12912 asymbol **dynsyms,
12913 asymbol **ret)
12915 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
12916 asection *relplt;
12917 asymbol *s;
12918 const char *relplt_name;
12919 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
12920 arelent *p;
12921 long count, i, n;
12922 size_t size;
12923 Elf_Internal_Shdr *hdr;
12924 char *names;
12925 asection *plt;
12927 *ret = NULL;
12929 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
12930 return 0;
12932 if (dynsymcount <= 0)
12933 return 0;
12935 if (!bed->plt_sym_val)
12936 return 0;
12938 relplt_name = bed->relplt_name;
12939 if (relplt_name == NULL)
12940 relplt_name = bed->rela_plts_and_copies_p ? ".rela.plt" : ".rel.plt";
12941 relplt = bfd_get_section_by_name (abfd, relplt_name);
12942 if (relplt == NULL)
12943 return 0;
12945 hdr = &elf_section_data (relplt)->this_hdr;
12946 if (hdr->sh_link != elf_dynsymtab (abfd)
12947 || (hdr->sh_type != SHT_REL && hdr->sh_type != SHT_RELA))
12948 return 0;
12950 plt = bfd_get_section_by_name (abfd, ".plt");
12951 if (plt == NULL)
12952 return 0;
12954 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
12955 if (! (*slurp_relocs) (abfd, relplt, dynsyms, true))
12956 return -1;
12958 count = relplt->size / hdr->sh_entsize;
12959 size = count * sizeof (asymbol);
12960 p = relplt->relocation;
12961 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12963 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
12964 if (p->addend != 0)
12966 #ifdef BFD64
12967 size += sizeof ("+0x") - 1 + 8 + 8 * (bed->s->elfclass == ELFCLASS64);
12968 #else
12969 size += sizeof ("+0x") - 1 + 8;
12970 #endif
12974 s = *ret = (asymbol *) bfd_malloc (size);
12975 if (s == NULL)
12976 return -1;
12978 names = (char *) (s + count);
12979 p = relplt->relocation;
12980 n = 0;
12981 for (i = 0; i < count; i++, p += bed->s->int_rels_per_ext_rel)
12983 size_t len;
12984 bfd_vma addr;
12986 addr = bed->plt_sym_val (i, plt, p);
12987 if (addr == (bfd_vma) -1)
12988 continue;
12990 *s = **p->sym_ptr_ptr;
12991 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
12992 we are defining a symbol, ensure one of them is set. */
12993 if ((s->flags & BSF_LOCAL) == 0)
12994 s->flags |= BSF_GLOBAL;
12995 s->flags |= BSF_SYNTHETIC;
12996 s->section = plt;
12997 s->value = addr - plt->vma;
12998 s->name = names;
12999 s->udata.p = NULL;
13000 len = strlen ((*p->sym_ptr_ptr)->name);
13001 memcpy (names, (*p->sym_ptr_ptr)->name, len);
13002 names += len;
13003 if (p->addend != 0)
13005 char buf[30], *a;
13007 memcpy (names, "+0x", sizeof ("+0x") - 1);
13008 names += sizeof ("+0x") - 1;
13009 bfd_sprintf_vma (abfd, buf, p->addend);
13010 for (a = buf; *a == '0'; ++a)
13012 len = strlen (a);
13013 memcpy (names, a, len);
13014 names += len;
13016 memcpy (names, "@plt", sizeof ("@plt"));
13017 names += sizeof ("@plt");
13018 ++s, ++n;
13021 return n;
13024 /* It is only used by x86-64 so far.
13025 ??? This repeats *COM* id of zero. sec->id is supposed to be unique,
13026 but current usage would allow all of _bfd_std_section to be zero. */
13027 static const asymbol lcomm_sym
13028 = GLOBAL_SYM_INIT ("LARGE_COMMON", &_bfd_elf_large_com_section);
13029 asection _bfd_elf_large_com_section
13030 = BFD_FAKE_SECTION (_bfd_elf_large_com_section, &lcomm_sym,
13031 "LARGE_COMMON", 0, SEC_IS_COMMON);
13033 bool
13034 _bfd_elf_final_write_processing (bfd *abfd)
13036 Elf_Internal_Ehdr *i_ehdrp; /* ELF file header, internal form. */
13038 i_ehdrp = elf_elfheader (abfd);
13040 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
13041 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
13043 /* Set the osabi field to ELFOSABI_GNU if the binary contains
13044 SHF_GNU_MBIND or SHF_GNU_RETAIN sections or symbols of STT_GNU_IFUNC type
13045 or STB_GNU_UNIQUE binding. */
13046 if (elf_tdata (abfd)->has_gnu_osabi != 0)
13048 if (i_ehdrp->e_ident[EI_OSABI] == ELFOSABI_NONE)
13049 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_GNU;
13050 else if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU
13051 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_FREEBSD)
13053 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_mbind)
13054 _bfd_error_handler (_("GNU_MBIND section is supported only by GNU "
13055 "and FreeBSD targets"));
13056 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_ifunc)
13057 _bfd_error_handler (_("symbol type STT_GNU_IFUNC is supported "
13058 "only by GNU and FreeBSD targets"));
13059 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_unique)
13060 _bfd_error_handler (_("symbol binding STB_GNU_UNIQUE is supported "
13061 "only by GNU and FreeBSD targets"));
13062 if (elf_tdata (abfd)->has_gnu_osabi & elf_gnu_osabi_retain)
13063 _bfd_error_handler (_("GNU_RETAIN section is supported "
13064 "only by GNU and FreeBSD targets"));
13065 bfd_set_error (bfd_error_sorry);
13066 return false;
13069 return true;
13073 /* Return TRUE for ELF symbol types that represent functions.
13074 This is the default version of this function, which is sufficient for
13075 most targets. It returns true if TYPE is STT_FUNC or STT_GNU_IFUNC. */
13077 bool
13078 _bfd_elf_is_function_type (unsigned int type)
13080 return (type == STT_FUNC
13081 || type == STT_GNU_IFUNC);
13084 /* If the ELF symbol SYM might be a function in SEC, return the
13085 function size and set *CODE_OFF to the function's entry point,
13086 otherwise return zero. */
13088 bfd_size_type
13089 _bfd_elf_maybe_function_sym (const asymbol *sym, asection *sec,
13090 bfd_vma *code_off)
13092 bfd_size_type size;
13093 elf_symbol_type * elf_sym = (elf_symbol_type *) sym;
13095 if ((sym->flags & (BSF_SECTION_SYM | BSF_FILE | BSF_OBJECT
13096 | BSF_THREAD_LOCAL | BSF_RELC | BSF_SRELC)) != 0
13097 || sym->section != sec)
13098 return 0;
13100 size = (sym->flags & BSF_SYNTHETIC) ? 0 : elf_sym->internal_elf_sym.st_size;
13102 /* In theory we should check that the symbol's type satisfies
13103 _bfd_elf_is_function_type(), but there are some function-like
13104 symbols which would fail this test. (eg _start). Instead
13105 we check for hidden, local, notype symbols with zero size.
13106 This type of symbol is generated by the annobin plugin for gcc
13107 and clang, and should not be considered to be a function symbol. */
13108 if (size == 0
13109 && ((sym->flags & (BSF_SYNTHETIC | BSF_LOCAL)) == BSF_LOCAL)
13110 && ELF_ST_TYPE (elf_sym->internal_elf_sym.st_info) == STT_NOTYPE
13111 && ELF_ST_VISIBILITY (elf_sym->internal_elf_sym.st_other) == STV_HIDDEN)
13112 return 0;
13114 *code_off = sym->value;
13115 /* Do not return 0 for the function's size. */
13116 return size ? size : 1;
13119 /* Set to non-zero to enable some debug messages. */
13120 #define DEBUG_SECONDARY_RELOCS 0
13122 /* An internal-to-the-bfd-library only section type
13123 used to indicate a cached secondary reloc section. */
13124 #define SHT_SECONDARY_RELOC (SHT_LOOS + SHT_RELA)
13126 /* Create a BFD section to hold a secondary reloc section. */
13128 bool
13129 _bfd_elf_init_secondary_reloc_section (bfd * abfd,
13130 Elf_Internal_Shdr *hdr,
13131 const char * name,
13132 unsigned int shindex)
13134 /* We only support RELA secondary relocs. */
13135 if (hdr->sh_type != SHT_RELA)
13136 return false;
13138 #if DEBUG_SECONDARY_RELOCS
13139 fprintf (stderr, "secondary reloc section %s encountered\n", name);
13140 #endif
13141 hdr->sh_type = SHT_SECONDARY_RELOC;
13142 return _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex);
13145 /* Read in any secondary relocs associated with SEC. */
13147 bool
13148 _bfd_elf_slurp_secondary_reloc_section (bfd * abfd,
13149 asection * sec,
13150 asymbol ** symbols,
13151 bool dynamic)
13153 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
13154 asection * relsec;
13155 bool result = true;
13156 bfd_vma (*r_sym) (bfd_vma);
13157 ufile_ptr filesize;
13159 #if BFD_DEFAULT_TARGET_SIZE > 32
13160 if (bfd_arch_bits_per_address (abfd) != 32)
13161 r_sym = elf64_r_sym;
13162 else
13163 #endif
13164 r_sym = elf32_r_sym;
13166 if (!elf_section_data (sec)->has_secondary_relocs)
13167 return true;
13169 /* Discover if there are any secondary reloc sections
13170 associated with SEC. */
13171 filesize = bfd_get_file_size (abfd);
13172 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
13174 Elf_Internal_Shdr * hdr = & elf_section_data (relsec)->this_hdr;
13176 if (hdr->sh_type == SHT_SECONDARY_RELOC
13177 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx
13178 && (hdr->sh_entsize == ebd->s->sizeof_rel
13179 || hdr->sh_entsize == ebd->s->sizeof_rela))
13181 bfd_byte * native_relocs;
13182 bfd_byte * native_reloc;
13183 arelent * internal_relocs;
13184 arelent * internal_reloc;
13185 size_t i;
13186 unsigned int entsize;
13187 unsigned int symcount;
13188 bfd_size_type reloc_count;
13189 size_t amt;
13191 if (ebd->elf_info_to_howto == NULL)
13192 return false;
13194 #if DEBUG_SECONDARY_RELOCS
13195 fprintf (stderr, "read secondary relocs for %s from %s\n",
13196 sec->name, relsec->name);
13197 #endif
13198 entsize = hdr->sh_entsize;
13200 if (filesize != 0
13201 && ((ufile_ptr) hdr->sh_offset > filesize
13202 || hdr->sh_size > filesize - hdr->sh_offset))
13204 bfd_set_error (bfd_error_file_truncated);
13205 result = false;
13206 continue;
13209 native_relocs = bfd_malloc (hdr->sh_size);
13210 if (native_relocs == NULL)
13212 result = false;
13213 continue;
13216 reloc_count = NUM_SHDR_ENTRIES (hdr);
13217 if (_bfd_mul_overflow (reloc_count, sizeof (arelent), & amt))
13219 free (native_relocs);
13220 bfd_set_error (bfd_error_file_too_big);
13221 result = false;
13222 continue;
13225 internal_relocs = (arelent *) bfd_alloc (abfd, amt);
13226 if (internal_relocs == NULL)
13228 free (native_relocs);
13229 result = false;
13230 continue;
13233 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) != 0
13234 || (bfd_bread (native_relocs, hdr->sh_size, abfd)
13235 != hdr->sh_size))
13237 free (native_relocs);
13238 /* The internal_relocs will be freed when
13239 the memory for the bfd is released. */
13240 result = false;
13241 continue;
13244 if (dynamic)
13245 symcount = bfd_get_dynamic_symcount (abfd);
13246 else
13247 symcount = bfd_get_symcount (abfd);
13249 for (i = 0, internal_reloc = internal_relocs,
13250 native_reloc = native_relocs;
13251 i < reloc_count;
13252 i++, internal_reloc++, native_reloc += entsize)
13254 bool res;
13255 Elf_Internal_Rela rela;
13257 if (entsize == ebd->s->sizeof_rel)
13258 ebd->s->swap_reloc_in (abfd, native_reloc, & rela);
13259 else /* entsize == ebd->s->sizeof_rela */
13260 ebd->s->swap_reloca_in (abfd, native_reloc, & rela);
13262 /* The address of an ELF reloc is section relative for an object
13263 file, and absolute for an executable file or shared library.
13264 The address of a normal BFD reloc is always section relative,
13265 and the address of a dynamic reloc is absolute.. */
13266 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
13267 internal_reloc->address = rela.r_offset;
13268 else
13269 internal_reloc->address = rela.r_offset - sec->vma;
13271 if (r_sym (rela.r_info) == STN_UNDEF)
13273 /* FIXME: This and the error case below mean that we
13274 have a symbol on relocs that is not elf_symbol_type. */
13275 internal_reloc->sym_ptr_ptr =
13276 bfd_abs_section_ptr->symbol_ptr_ptr;
13278 else if (r_sym (rela.r_info) > symcount)
13280 _bfd_error_handler
13281 /* xgettext:c-format */
13282 (_("%pB(%pA): relocation %zu has invalid symbol index %lu"),
13283 abfd, sec, i, (long) r_sym (rela.r_info));
13284 bfd_set_error (bfd_error_bad_value);
13285 internal_reloc->sym_ptr_ptr =
13286 bfd_abs_section_ptr->symbol_ptr_ptr;
13287 result = false;
13289 else
13291 asymbol **ps;
13293 ps = symbols + r_sym (rela.r_info) - 1;
13294 internal_reloc->sym_ptr_ptr = ps;
13295 /* Make sure that this symbol is not removed by strip. */
13296 (*ps)->flags |= BSF_KEEP;
13299 internal_reloc->addend = rela.r_addend;
13301 res = ebd->elf_info_to_howto (abfd, internal_reloc, & rela);
13302 if (! res || internal_reloc->howto == NULL)
13304 #if DEBUG_SECONDARY_RELOCS
13305 fprintf (stderr,
13306 "there is no howto associated with reloc %lx\n",
13307 rela.r_info);
13308 #endif
13309 result = false;
13313 free (native_relocs);
13314 /* Store the internal relocs. */
13315 elf_section_data (relsec)->sec_info = internal_relocs;
13319 return result;
13322 /* Set the ELF section header fields of an output secondary reloc section. */
13324 bool
13325 _bfd_elf_copy_special_section_fields (const bfd *ibfd ATTRIBUTE_UNUSED,
13326 bfd *obfd ATTRIBUTE_UNUSED,
13327 const Elf_Internal_Shdr *isection,
13328 Elf_Internal_Shdr *osection)
13330 asection * isec;
13331 asection * osec;
13332 struct bfd_elf_section_data * esd;
13334 if (isection == NULL)
13335 return false;
13337 if (isection->sh_type != SHT_SECONDARY_RELOC)
13338 return true;
13340 isec = isection->bfd_section;
13341 if (isec == NULL)
13342 return false;
13344 osec = osection->bfd_section;
13345 if (osec == NULL)
13346 return false;
13348 esd = elf_section_data (osec);
13349 BFD_ASSERT (esd->sec_info == NULL);
13350 esd->sec_info = elf_section_data (isec)->sec_info;
13351 osection->sh_type = SHT_RELA;
13352 osection->sh_link = elf_onesymtab (obfd);
13353 if (osection->sh_link == 0)
13355 /* There is no symbol table - we are hosed... */
13356 _bfd_error_handler
13357 /* xgettext:c-format */
13358 (_("%pB(%pA): link section cannot be set"
13359 " because the output file does not have a symbol table"),
13360 obfd, osec);
13361 bfd_set_error (bfd_error_bad_value);
13362 return false;
13365 /* Find the output section that corresponds to the isection's
13366 sh_info link. */
13367 if (isection->sh_info == 0
13368 || isection->sh_info >= elf_numsections (ibfd))
13370 _bfd_error_handler
13371 /* xgettext:c-format */
13372 (_("%pB(%pA): info section index is invalid"),
13373 obfd, osec);
13374 bfd_set_error (bfd_error_bad_value);
13375 return false;
13378 isection = elf_elfsections (ibfd)[isection->sh_info];
13380 if (isection == NULL
13381 || isection->bfd_section == NULL
13382 || isection->bfd_section->output_section == NULL)
13384 _bfd_error_handler
13385 /* xgettext:c-format */
13386 (_("%pB(%pA): info section index cannot be set"
13387 " because the section is not in the output"),
13388 obfd, osec);
13389 bfd_set_error (bfd_error_bad_value);
13390 return false;
13393 esd = elf_section_data (isection->bfd_section->output_section);
13394 BFD_ASSERT (esd != NULL);
13395 osection->sh_info = esd->this_idx;
13396 esd->has_secondary_relocs = true;
13397 #if DEBUG_SECONDARY_RELOCS
13398 fprintf (stderr, "update header of %s, sh_link = %u, sh_info = %u\n",
13399 osec->name, osection->sh_link, osection->sh_info);
13400 fprintf (stderr, "mark section %s as having secondary relocs\n",
13401 bfd_section_name (isection->bfd_section->output_section));
13402 #endif
13404 return true;
13407 /* Write out a secondary reloc section.
13409 FIXME: Currently this function can result in a serious performance penalty
13410 for files with secondary relocs and lots of sections. The proper way to
13411 fix this is for _bfd_elf_copy_special_section_fields() to chain secondary
13412 relocs together and then to have this function just walk that chain. */
13414 bool
13415 _bfd_elf_write_secondary_reloc_section (bfd *abfd, asection *sec)
13417 const struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
13418 bfd_vma addr_offset;
13419 asection * relsec;
13420 bfd_vma (*r_info) (bfd_vma, bfd_vma);
13421 bool result = true;
13423 if (sec == NULL)
13424 return false;
13426 #if BFD_DEFAULT_TARGET_SIZE > 32
13427 if (bfd_arch_bits_per_address (abfd) != 32)
13428 r_info = elf64_r_info;
13429 else
13430 #endif
13431 r_info = elf32_r_info;
13433 /* The address of an ELF reloc is section relative for an object
13434 file, and absolute for an executable file or shared library.
13435 The address of a BFD reloc is always section relative. */
13436 addr_offset = 0;
13437 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
13438 addr_offset = sec->vma;
13440 /* Discover if there are any secondary reloc sections
13441 associated with SEC. */
13442 for (relsec = abfd->sections; relsec != NULL; relsec = relsec->next)
13444 const struct bfd_elf_section_data * const esd = elf_section_data (relsec);
13445 Elf_Internal_Shdr * const hdr = (Elf_Internal_Shdr *) & esd->this_hdr;
13447 if (hdr->sh_type == SHT_RELA
13448 && hdr->sh_info == (unsigned) elf_section_data (sec)->this_idx)
13450 asymbol * last_sym;
13451 int last_sym_idx;
13452 size_t reloc_count;
13453 size_t idx;
13454 bfd_size_type entsize;
13455 arelent * src_irel;
13456 bfd_byte * dst_rela;
13458 if (hdr->contents != NULL)
13460 _bfd_error_handler
13461 /* xgettext:c-format */
13462 (_("%pB(%pA): error: secondary reloc section processed twice"),
13463 abfd, relsec);
13464 bfd_set_error (bfd_error_bad_value);
13465 result = false;
13466 continue;
13469 entsize = hdr->sh_entsize;
13470 if (entsize == 0)
13472 _bfd_error_handler
13473 /* xgettext:c-format */
13474 (_("%pB(%pA): error: secondary reloc section"
13475 " has zero sized entries"),
13476 abfd, relsec);
13477 bfd_set_error (bfd_error_bad_value);
13478 result = false;
13479 continue;
13481 else if (entsize != ebd->s->sizeof_rel
13482 && entsize != ebd->s->sizeof_rela)
13484 _bfd_error_handler
13485 /* xgettext:c-format */
13486 (_("%pB(%pA): error: secondary reloc section"
13487 " has non-standard sized entries"),
13488 abfd, relsec);
13489 bfd_set_error (bfd_error_bad_value);
13490 result = false;
13491 continue;
13494 reloc_count = hdr->sh_size / entsize;
13495 hdr->sh_size = entsize * reloc_count;
13496 if (reloc_count == 0)
13498 _bfd_error_handler
13499 /* xgettext:c-format */
13500 (_("%pB(%pA): error: secondary reloc section is empty!"),
13501 abfd, relsec);
13502 bfd_set_error (bfd_error_bad_value);
13503 result = false;
13504 continue;
13507 hdr->contents = bfd_alloc (abfd, hdr->sh_size);
13508 if (hdr->contents == NULL)
13509 continue;
13511 #if DEBUG_SECONDARY_RELOCS
13512 fprintf (stderr, "write %u secondary relocs for %s from %s\n",
13513 reloc_count, sec->name, relsec->name);
13514 #endif
13515 last_sym = NULL;
13516 last_sym_idx = 0;
13517 dst_rela = hdr->contents;
13518 src_irel = (arelent *) esd->sec_info;
13519 if (src_irel == NULL)
13521 _bfd_error_handler
13522 /* xgettext:c-format */
13523 (_("%pB(%pA): error: internal relocs missing"
13524 " for secondary reloc section"),
13525 abfd, relsec);
13526 bfd_set_error (bfd_error_bad_value);
13527 result = false;
13528 continue;
13531 for (idx = 0; idx < reloc_count; idx++, dst_rela += entsize)
13533 Elf_Internal_Rela src_rela;
13534 arelent *ptr;
13535 asymbol *sym;
13536 int n;
13538 ptr = src_irel + idx;
13539 if (ptr == NULL)
13541 _bfd_error_handler
13542 /* xgettext:c-format */
13543 (_("%pB(%pA): error: reloc table entry %zu is empty"),
13544 abfd, relsec, idx);
13545 bfd_set_error (bfd_error_bad_value);
13546 result = false;
13547 break;
13550 if (ptr->sym_ptr_ptr == NULL)
13552 /* FIXME: Is this an error ? */
13553 n = 0;
13555 else
13557 sym = *ptr->sym_ptr_ptr;
13559 if (sym == last_sym)
13560 n = last_sym_idx;
13561 else
13563 n = _bfd_elf_symbol_from_bfd_symbol (abfd, & sym);
13564 if (n < 0)
13566 _bfd_error_handler
13567 /* xgettext:c-format */
13568 (_("%pB(%pA): error: secondary reloc %zu"
13569 " references a missing symbol"),
13570 abfd, relsec, idx);
13571 bfd_set_error (bfd_error_bad_value);
13572 result = false;
13573 n = 0;
13576 last_sym = sym;
13577 last_sym_idx = n;
13580 if (sym->the_bfd != NULL
13581 && sym->the_bfd->xvec != abfd->xvec
13582 && ! _bfd_elf_validate_reloc (abfd, ptr))
13584 _bfd_error_handler
13585 /* xgettext:c-format */
13586 (_("%pB(%pA): error: secondary reloc %zu"
13587 " references a deleted symbol"),
13588 abfd, relsec, idx);
13589 bfd_set_error (bfd_error_bad_value);
13590 result = false;
13591 n = 0;
13595 src_rela.r_offset = ptr->address + addr_offset;
13596 if (ptr->howto == NULL)
13598 _bfd_error_handler
13599 /* xgettext:c-format */
13600 (_("%pB(%pA): error: secondary reloc %zu"
13601 " is of an unknown type"),
13602 abfd, relsec, idx);
13603 bfd_set_error (bfd_error_bad_value);
13604 result = false;
13605 src_rela.r_info = r_info (0, 0);
13607 else
13608 src_rela.r_info = r_info (n, ptr->howto->type);
13609 src_rela.r_addend = ptr->addend;
13611 if (entsize == ebd->s->sizeof_rel)
13612 ebd->s->swap_reloc_out (abfd, &src_rela, dst_rela);
13613 else /* entsize == ebd->s->sizeof_rela */
13614 ebd->s->swap_reloca_out (abfd, &src_rela, dst_rela);
13619 return result;