Correct spelling of "relocatable".
[deliverable/binutils-gdb.git] / bfd / elfcode.h
CommitLineData
252b5132 1/* ELF executable support for BFD.
7898deda 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
45d6a902 3 2001, 2002, 2003 Free Software Foundation, Inc.
252b5132
RH
4
5 Written by Fred Fish @ Cygnus Support, from information published
6 in "UNIX System V Release 4, Programmers Guide: ANSI C and
7 Programming Support Tools". Sufficient support for gdb.
8
9 Rewritten by Mark Eichin @ Cygnus Support, from information
10 published in "System V Application Binary Interface", chapters 4
11 and 5, as well as the various "Processor Supplement" documents
12 derived from it. Added support for assembler and other object file
13 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
14 Meissner (Open Software Foundation), and Peter Hoogenboom (University
15 of Utah) to finish and extend this.
16
17This file is part of BFD, the Binary File Descriptor library.
18
19This program is free software; you can redistribute it and/or modify
20it under the terms of the GNU General Public License as published by
21the Free Software Foundation; either version 2 of the License, or
22(at your option) any later version.
23
24This program is distributed in the hope that it will be useful,
25but WITHOUT ANY WARRANTY; without even the implied warranty of
26MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
27GNU General Public License for more details.
28
29You should have received a copy of the GNU General Public License
30along with this program; if not, write to the Free Software
31Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
32
33/* Problems and other issues to resolve.
34
35 (1) BFD expects there to be some fixed number of "sections" in
36 the object file. I.E. there is a "section_count" variable in the
37 bfd structure which contains the number of sections. However, ELF
38 supports multiple "views" of a file. In particular, with current
39 implementations, executable files typically have two tables, a
40 program header table and a section header table, both of which
41 partition the executable.
42
43 In ELF-speak, the "linking view" of the file uses the section header
44 table to access "sections" within the file, and the "execution view"
45 uses the program header table to access "segments" within the file.
46 "Segments" typically may contain all the data from one or more
47 "sections".
48
49 Note that the section header table is optional in ELF executables,
50 but it is this information that is most useful to gdb. If the
51 section header table is missing, then gdb should probably try
52 to make do with the program header table. (FIXME)
53
54 (2) The code in this file is compiled twice, once in 32-bit mode and
55 once in 64-bit mode. More of it should be made size-independent
56 and moved into elf.c.
57
58 (3) ELF section symbols are handled rather sloppily now. This should
59 be cleaned up, and ELF section symbols reconciled with BFD section
60 symbols.
61
62 (4) We need a published spec for 64-bit ELF. We've got some stuff here
63 that we're using for SPARC V9 64-bit chips, but don't assume that
64 it's cast in stone.
65 */
66
67#include "bfd.h"
68#include "sysdep.h"
210ba1e8 69#include "libiberty.h"
252b5132
RH
70#include "bfdlink.h"
71#include "libbfd.h"
72#include "elf-bfd.h"
73
74/* Renaming structures, typedefs, macros and functions to be size-specific. */
75#define Elf_External_Ehdr NAME(Elf,External_Ehdr)
76#define Elf_External_Sym NAME(Elf,External_Sym)
77#define Elf_External_Shdr NAME(Elf,External_Shdr)
78#define Elf_External_Phdr NAME(Elf,External_Phdr)
79#define Elf_External_Rel NAME(Elf,External_Rel)
80#define Elf_External_Rela NAME(Elf,External_Rela)
81#define Elf_External_Dyn NAME(Elf,External_Dyn)
82
83#define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
84#define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
85#define elf_core_file_matches_executable_p \
86 NAME(bfd_elf,core_file_matches_executable_p)
87#define elf_object_p NAME(bfd_elf,object_p)
88#define elf_core_file_p NAME(bfd_elf,core_file_p)
89#define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
90#define elf_get_dynamic_symtab_upper_bound \
91 NAME(bfd_elf,get_dynamic_symtab_upper_bound)
92#define elf_swap_reloc_in NAME(bfd_elf,swap_reloc_in)
93#define elf_swap_reloca_in NAME(bfd_elf,swap_reloca_in)
94#define elf_swap_reloc_out NAME(bfd_elf,swap_reloc_out)
95#define elf_swap_reloca_out NAME(bfd_elf,swap_reloca_out)
96#define elf_swap_symbol_in NAME(bfd_elf,swap_symbol_in)
97#define elf_swap_symbol_out NAME(bfd_elf,swap_symbol_out)
98#define elf_swap_phdr_in NAME(bfd_elf,swap_phdr_in)
99#define elf_swap_phdr_out NAME(bfd_elf,swap_phdr_out)
100#define elf_swap_dyn_in NAME(bfd_elf,swap_dyn_in)
101#define elf_swap_dyn_out NAME(bfd_elf,swap_dyn_out)
102#define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
103#define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
104#define elf_slurp_symbol_table NAME(bfd_elf,slurp_symbol_table)
105#define elf_get_symtab NAME(bfd_elf,get_symtab)
106#define elf_canonicalize_dynamic_symtab \
107 NAME(bfd_elf,canonicalize_dynamic_symtab)
108#define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
109#define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
110#define elf_get_lineno NAME(bfd_elf,get_lineno)
111#define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
112#define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
113#define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
114#define elf_set_section_contents NAME(bfd_elf,set_section_contents)
115#define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
116#define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
117#define elf_find_section NAME(bfd_elf,find_section)
118#define elf_bfd_link_add_symbols NAME(bfd_elf,bfd_link_add_symbols)
119#define elf_add_dynamic_entry NAME(bfd_elf,add_dynamic_entry)
120#define elf_write_shdrs_and_ehdr NAME(bfd_elf,write_shdrs_and_ehdr)
121#define elf_write_out_phdrs NAME(bfd_elf,write_out_phdrs)
b9f66672
JL
122#define elf_write_relocs NAME(bfd_elf,write_relocs)
123#define elf_slurp_reloc_table NAME(bfd_elf,slurp_reloc_table)
73d074b4
DJ
124#define elf_bfd_discard_info NAME(bfd_elf,discard_info)
125#define elf_reloc_symbol_deleted_p NAME(_bfd_elf,reloc_symbol_deleted_p)
252b5132
RH
126#define elf_link_record_dynamic_symbol _bfd_elf_link_record_dynamic_symbol
127#define elf_bfd_final_link NAME(bfd_elf,bfd_final_link)
128#define elf_create_pointer_linker_section NAME(bfd_elf,create_pointer_linker_section)
129#define elf_finish_pointer_linker_section NAME(bfd_elf,finish_pointer_linker_section)
130#define elf_gc_sections NAME(_bfd_elf,gc_sections)
131#define elf_gc_common_finalize_got_offsets \
132 NAME(_bfd_elf,gc_common_finalize_got_offsets)
133#define elf_gc_common_final_link NAME(_bfd_elf,gc_common_final_link)
134#define elf_gc_record_vtinherit NAME(_bfd_elf,gc_record_vtinherit)
135#define elf_gc_record_vtentry NAME(_bfd_elf,gc_record_vtentry)
30b30c21
RH
136#define elf_link_record_local_dynamic_symbol \
137 NAME(_bfd_elf,link_record_local_dynamic_symbol)
252b5132
RH
138
139#if ARCH_SIZE == 64
140#define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
141#define ELF_R_SYM(X) ELF64_R_SYM(X)
142#define ELF_R_TYPE(X) ELF64_R_TYPE(X)
143#define ELFCLASS ELFCLASS64
144#define FILE_ALIGN 8
145#define LOG_FILE_ALIGN 3
146#endif
147#if ARCH_SIZE == 32
148#define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
149#define ELF_R_SYM(X) ELF32_R_SYM(X)
150#define ELF_R_TYPE(X) ELF32_R_TYPE(X)
151#define ELFCLASS ELFCLASS32
152#define FILE_ALIGN 4
153#define LOG_FILE_ALIGN 2
154#endif
155
156/* Static functions */
157
158static void elf_swap_ehdr_in
159 PARAMS ((bfd *, const Elf_External_Ehdr *, Elf_Internal_Ehdr *));
160static void elf_swap_ehdr_out
161 PARAMS ((bfd *, const Elf_Internal_Ehdr *, Elf_External_Ehdr *));
162static void elf_swap_shdr_in
163 PARAMS ((bfd *, const Elf_External_Shdr *, Elf_Internal_Shdr *));
164static void elf_swap_shdr_out
165 PARAMS ((bfd *, const Elf_Internal_Shdr *, Elf_External_Shdr *));
166
167#define elf_stringtab_init _bfd_elf_stringtab_init
168
169#define section_from_elf_index bfd_section_from_elf_index
170
b34976b6 171static bfd_boolean elf_slurp_reloc_table_from_section
42fdc509 172 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, bfd_size_type,
b34976b6 173 arelent *, asymbol **, bfd_boolean));
252b5132 174
b34976b6 175static bfd_boolean elf_file_p PARAMS ((Elf_External_Ehdr *));
252b5132
RH
176
177#ifdef DEBUG
178static void elf_debug_section PARAMS ((int, Elf_Internal_Shdr *));
179static void elf_debug_file PARAMS ((Elf_Internal_Ehdr *));
180static char *elf_symbol_flags PARAMS ((flagword));
181#endif
182\f
183/* Structure swapping routines */
184
185/* Should perhaps use put_offset, put_word, etc. For now, the two versions
186 can be handled by explicitly specifying 32 bits or "the long type". */
187#if ARCH_SIZE == 64
dc810e39
AM
188#define H_PUT_WORD H_PUT_64
189#define H_PUT_SIGNED_WORD H_PUT_S64
190#define H_GET_WORD H_GET_64
191#define H_GET_SIGNED_WORD H_GET_S64
252b5132
RH
192#endif
193#if ARCH_SIZE == 32
dc810e39
AM
194#define H_PUT_WORD H_PUT_32
195#define H_PUT_SIGNED_WORD H_PUT_S32
196#define H_GET_WORD H_GET_32
197#define H_GET_SIGNED_WORD H_GET_S32
252b5132
RH
198#endif
199
200/* Translate an ELF symbol in external format into an ELF symbol in internal
3e932841 201 format. */
252b5132
RH
202
203void
73ff0d56 204elf_swap_symbol_in (abfd, psrc, pshn, dst)
252b5132 205 bfd *abfd;
f8ecb12b
AM
206 const PTR psrc;
207 const PTR pshn;
252b5132
RH
208 Elf_Internal_Sym *dst;
209{
73ff0d56
AM
210 const Elf_External_Sym *src = (const Elf_External_Sym *) psrc;
211 const Elf_External_Sym_Shndx *shndx = (const Elf_External_Sym_Shndx *) pshn;
86dc0f79
RH
212 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
213
dc810e39 214 dst->st_name = H_GET_32 (abfd, src->st_name);
86dc0f79 215 if (signed_vma)
dc810e39 216 dst->st_value = H_GET_SIGNED_WORD (abfd, src->st_value);
86dc0f79 217 else
dc810e39
AM
218 dst->st_value = H_GET_WORD (abfd, src->st_value);
219 dst->st_size = H_GET_WORD (abfd, src->st_size);
220 dst->st_info = H_GET_8 (abfd, src->st_info);
221 dst->st_other = H_GET_8 (abfd, src->st_other);
222 dst->st_shndx = H_GET_16 (abfd, src->st_shndx);
9ad5cbcf
AM
223 if (dst->st_shndx == SHN_XINDEX)
224 {
225 if (shndx == NULL)
226 abort ();
227 dst->st_shndx = H_GET_32 (abfd, shndx->est_shndx);
228 }
252b5132
RH
229}
230
231/* Translate an ELF symbol in internal format into an ELF symbol in external
3e932841 232 format. */
252b5132
RH
233
234void
9ad5cbcf 235elf_swap_symbol_out (abfd, src, cdst, shndx)
252b5132
RH
236 bfd *abfd;
237 const Elf_Internal_Sym *src;
238 PTR cdst;
9ad5cbcf 239 PTR shndx;
252b5132 240{
9ad5cbcf 241 unsigned int tmp;
252b5132 242 Elf_External_Sym *dst = (Elf_External_Sym *) cdst;
dc810e39
AM
243 H_PUT_32 (abfd, src->st_name, dst->st_name);
244 H_PUT_WORD (abfd, src->st_value, dst->st_value);
245 H_PUT_WORD (abfd, src->st_size, dst->st_size);
246 H_PUT_8 (abfd, src->st_info, dst->st_info);
247 H_PUT_8 (abfd, src->st_other, dst->st_other);
9ad5cbcf
AM
248 tmp = src->st_shndx;
249 if (tmp > SHN_HIRESERVE)
250 {
251 if (shndx == NULL)
252 abort ();
253 H_PUT_32 (abfd, tmp, shndx);
254 tmp = SHN_XINDEX;
255 }
256 H_PUT_16 (abfd, tmp, dst->st_shndx);
252b5132
RH
257}
258
252b5132 259/* Translate an ELF file header in external format into an ELF file header in
3e932841 260 internal format. */
252b5132
RH
261
262static void
263elf_swap_ehdr_in (abfd, src, dst)
264 bfd *abfd;
265 const Elf_External_Ehdr *src;
266 Elf_Internal_Ehdr *dst;
267{
448cafa4 268 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
252b5132 269 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
dc810e39
AM
270 dst->e_type = H_GET_16 (abfd, src->e_type);
271 dst->e_machine = H_GET_16 (abfd, src->e_machine);
272 dst->e_version = H_GET_32 (abfd, src->e_version);
448cafa4 273 if (signed_vma)
dc810e39 274 dst->e_entry = H_GET_SIGNED_WORD (abfd, src->e_entry);
448cafa4 275 else
dc810e39
AM
276 dst->e_entry = H_GET_WORD (abfd, src->e_entry);
277 dst->e_phoff = H_GET_WORD (abfd, src->e_phoff);
278 dst->e_shoff = H_GET_WORD (abfd, src->e_shoff);
279 dst->e_flags = H_GET_32 (abfd, src->e_flags);
280 dst->e_ehsize = H_GET_16 (abfd, src->e_ehsize);
281 dst->e_phentsize = H_GET_16 (abfd, src->e_phentsize);
282 dst->e_phnum = H_GET_16 (abfd, src->e_phnum);
283 dst->e_shentsize = H_GET_16 (abfd, src->e_shentsize);
284 dst->e_shnum = H_GET_16 (abfd, src->e_shnum);
285 dst->e_shstrndx = H_GET_16 (abfd, src->e_shstrndx);
252b5132
RH
286}
287
288/* Translate an ELF file header in internal format into an ELF file header in
3e932841 289 external format. */
252b5132
RH
290
291static void
292elf_swap_ehdr_out (abfd, src, dst)
293 bfd *abfd;
294 const Elf_Internal_Ehdr *src;
295 Elf_External_Ehdr *dst;
296{
5732c114 297 unsigned int tmp;
448cafa4 298 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
252b5132 299 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
3e932841 300 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
301 H_PUT_16 (abfd, src->e_type, dst->e_type);
302 H_PUT_16 (abfd, src->e_machine, dst->e_machine);
303 H_PUT_32 (abfd, src->e_version, dst->e_version);
448cafa4 304 if (signed_vma)
dc810e39 305 H_PUT_SIGNED_WORD (abfd, src->e_entry, dst->e_entry);
448cafa4 306 else
dc810e39
AM
307 H_PUT_WORD (abfd, src->e_entry, dst->e_entry);
308 H_PUT_WORD (abfd, src->e_phoff, dst->e_phoff);
309 H_PUT_WORD (abfd, src->e_shoff, dst->e_shoff);
310 H_PUT_32 (abfd, src->e_flags, dst->e_flags);
311 H_PUT_16 (abfd, src->e_ehsize, dst->e_ehsize);
312 H_PUT_16 (abfd, src->e_phentsize, dst->e_phentsize);
313 H_PUT_16 (abfd, src->e_phnum, dst->e_phnum);
314 H_PUT_16 (abfd, src->e_shentsize, dst->e_shentsize);
5732c114
AM
315 tmp = src->e_shnum;
316 if (tmp >= SHN_LORESERVE)
317 tmp = SHN_UNDEF;
318 H_PUT_16 (abfd, tmp, dst->e_shnum);
319 tmp = src->e_shstrndx;
320 if (tmp >= SHN_LORESERVE)
321 tmp = SHN_XINDEX;
322 H_PUT_16 (abfd, tmp, dst->e_shstrndx);
252b5132
RH
323}
324
252b5132 325/* Translate an ELF section header table entry in external format into an
3e932841 326 ELF section header table entry in internal format. */
252b5132
RH
327
328static void
329elf_swap_shdr_in (abfd, src, dst)
330 bfd *abfd;
331 const Elf_External_Shdr *src;
332 Elf_Internal_Shdr *dst;
333{
86dc0f79
RH
334 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
335
dc810e39
AM
336 dst->sh_name = H_GET_32 (abfd, src->sh_name);
337 dst->sh_type = H_GET_32 (abfd, src->sh_type);
338 dst->sh_flags = H_GET_WORD (abfd, src->sh_flags);
86dc0f79 339 if (signed_vma)
dc810e39 340 dst->sh_addr = H_GET_SIGNED_WORD (abfd, src->sh_addr);
86dc0f79 341 else
dc810e39
AM
342 dst->sh_addr = H_GET_WORD (abfd, src->sh_addr);
343 dst->sh_offset = H_GET_WORD (abfd, src->sh_offset);
344 dst->sh_size = H_GET_WORD (abfd, src->sh_size);
345 dst->sh_link = H_GET_32 (abfd, src->sh_link);
346 dst->sh_info = H_GET_32 (abfd, src->sh_info);
347 dst->sh_addralign = H_GET_WORD (abfd, src->sh_addralign);
348 dst->sh_entsize = H_GET_WORD (abfd, src->sh_entsize);
252b5132
RH
349 dst->bfd_section = NULL;
350 dst->contents = NULL;
351}
352
353/* Translate an ELF section header table entry in internal format into an
3e932841 354 ELF section header table entry in external format. */
252b5132
RH
355
356static void
357elf_swap_shdr_out (abfd, src, dst)
358 bfd *abfd;
359 const Elf_Internal_Shdr *src;
360 Elf_External_Shdr *dst;
361{
3e932841 362 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
363 H_PUT_32 (abfd, src->sh_name, dst->sh_name);
364 H_PUT_32 (abfd, src->sh_type, dst->sh_type);
365 H_PUT_WORD (abfd, src->sh_flags, dst->sh_flags);
366 H_PUT_WORD (abfd, src->sh_addr, dst->sh_addr);
367 H_PUT_WORD (abfd, src->sh_offset, dst->sh_offset);
368 H_PUT_WORD (abfd, src->sh_size, dst->sh_size);
369 H_PUT_32 (abfd, src->sh_link, dst->sh_link);
370 H_PUT_32 (abfd, src->sh_info, dst->sh_info);
371 H_PUT_WORD (abfd, src->sh_addralign, dst->sh_addralign);
372 H_PUT_WORD (abfd, src->sh_entsize, dst->sh_entsize);
252b5132
RH
373}
374
252b5132 375/* Translate an ELF program header table entry in external format into an
3e932841 376 ELF program header table entry in internal format. */
252b5132
RH
377
378void
379elf_swap_phdr_in (abfd, src, dst)
380 bfd *abfd;
381 const Elf_External_Phdr *src;
382 Elf_Internal_Phdr *dst;
383{
86dc0f79
RH
384 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
385
dc810e39
AM
386 dst->p_type = H_GET_32 (abfd, src->p_type);
387 dst->p_flags = H_GET_32 (abfd, src->p_flags);
388 dst->p_offset = H_GET_WORD (abfd, src->p_offset);
86dc0f79
RH
389 if (signed_vma)
390 {
dc810e39
AM
391 dst->p_vaddr = H_GET_SIGNED_WORD (abfd, src->p_vaddr);
392 dst->p_paddr = H_GET_SIGNED_WORD (abfd, src->p_paddr);
86dc0f79
RH
393 }
394 else
395 {
dc810e39
AM
396 dst->p_vaddr = H_GET_WORD (abfd, src->p_vaddr);
397 dst->p_paddr = H_GET_WORD (abfd, src->p_paddr);
86dc0f79 398 }
dc810e39
AM
399 dst->p_filesz = H_GET_WORD (abfd, src->p_filesz);
400 dst->p_memsz = H_GET_WORD (abfd, src->p_memsz);
401 dst->p_align = H_GET_WORD (abfd, src->p_align);
252b5132
RH
402}
403
404void
405elf_swap_phdr_out (abfd, src, dst)
406 bfd *abfd;
407 const Elf_Internal_Phdr *src;
408 Elf_External_Phdr *dst;
409{
3e932841 410 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
411 H_PUT_32 (abfd, src->p_type, dst->p_type);
412 H_PUT_WORD (abfd, src->p_offset, dst->p_offset);
413 H_PUT_WORD (abfd, src->p_vaddr, dst->p_vaddr);
414 H_PUT_WORD (abfd, src->p_paddr, dst->p_paddr);
415 H_PUT_WORD (abfd, src->p_filesz, dst->p_filesz);
416 H_PUT_WORD (abfd, src->p_memsz, dst->p_memsz);
417 H_PUT_32 (abfd, src->p_flags, dst->p_flags);
418 H_PUT_WORD (abfd, src->p_align, dst->p_align);
252b5132
RH
419}
420
3e932841 421/* Translate an ELF reloc from external format to internal format. */
947216bf
AM
422void
423elf_swap_reloc_in (abfd, s, dst)
252b5132 424 bfd *abfd;
947216bf
AM
425 const bfd_byte *s;
426 Elf_Internal_Rela *dst;
252b5132 427{
947216bf 428 const Elf_External_Rel *src = (const Elf_External_Rel *) s;
dc810e39
AM
429 dst->r_offset = H_GET_WORD (abfd, src->r_offset);
430 dst->r_info = H_GET_WORD (abfd, src->r_info);
947216bf 431 dst->r_addend = 0;
252b5132
RH
432}
433
947216bf
AM
434void
435elf_swap_reloca_in (abfd, s, dst)
252b5132 436 bfd *abfd;
947216bf 437 const bfd_byte *s;
252b5132
RH
438 Elf_Internal_Rela *dst;
439{
947216bf 440 const Elf_External_Rela *src = (const Elf_External_Rela *) s;
dc810e39
AM
441 dst->r_offset = H_GET_WORD (abfd, src->r_offset);
442 dst->r_info = H_GET_WORD (abfd, src->r_info);
443 dst->r_addend = H_GET_SIGNED_WORD (abfd, src->r_addend);
252b5132
RH
444}
445
3e932841 446/* Translate an ELF reloc from internal format to external format. */
947216bf
AM
447void
448elf_swap_reloc_out (abfd, src, d)
252b5132 449 bfd *abfd;
947216bf
AM
450 const Elf_Internal_Rela *src;
451 bfd_byte *d;
252b5132 452{
947216bf 453 Elf_External_Rel *dst = (Elf_External_Rel *) d;
dc810e39
AM
454 H_PUT_WORD (abfd, src->r_offset, dst->r_offset);
455 H_PUT_WORD (abfd, src->r_info, dst->r_info);
252b5132
RH
456}
457
947216bf
AM
458void
459elf_swap_reloca_out (abfd, src, d)
252b5132
RH
460 bfd *abfd;
461 const Elf_Internal_Rela *src;
947216bf 462 bfd_byte *d;
252b5132 463{
947216bf 464 Elf_External_Rela *dst = (Elf_External_Rela *) d;
dc810e39
AM
465 H_PUT_WORD (abfd, src->r_offset, dst->r_offset);
466 H_PUT_WORD (abfd, src->r_info, dst->r_info);
467 H_PUT_SIGNED_WORD (abfd, src->r_addend, dst->r_addend);
252b5132
RH
468}
469
470INLINE void
471elf_swap_dyn_in (abfd, p, dst)
472 bfd *abfd;
473 const PTR p;
474 Elf_Internal_Dyn *dst;
475{
476 const Elf_External_Dyn *src = (const Elf_External_Dyn *) p;
477
dc810e39
AM
478 dst->d_tag = H_GET_WORD (abfd, src->d_tag);
479 dst->d_un.d_val = H_GET_WORD (abfd, src->d_un.d_val);
252b5132
RH
480}
481
482INLINE void
c7ac6ff8 483elf_swap_dyn_out (abfd, src, p)
252b5132
RH
484 bfd *abfd;
485 const Elf_Internal_Dyn *src;
c7ac6ff8 486 PTR p;
252b5132 487{
c7ac6ff8
MM
488 Elf_External_Dyn *dst = (Elf_External_Dyn *) p;
489
dc810e39
AM
490 H_PUT_WORD (abfd, src->d_tag, dst->d_tag);
491 H_PUT_WORD (abfd, src->d_un.d_val, dst->d_un.d_val);
252b5132
RH
492}
493\f
494/* ELF .o/exec file reading */
495
252b5132
RH
496/* Begin processing a given object.
497
498 First we validate the file by reading in the ELF header and checking
499 the magic number. */
500
b34976b6 501static INLINE bfd_boolean
252b5132
RH
502elf_file_p (x_ehdrp)
503 Elf_External_Ehdr *x_ehdrp;
504{
505 return ((x_ehdrp->e_ident[EI_MAG0] == ELFMAG0)
506 && (x_ehdrp->e_ident[EI_MAG1] == ELFMAG1)
507 && (x_ehdrp->e_ident[EI_MAG2] == ELFMAG2)
508 && (x_ehdrp->e_ident[EI_MAG3] == ELFMAG3));
509}
510
511/* Check to see if the file associated with ABFD matches the target vector
512 that ABFD points to.
513
514 Note that we may be called several times with the same ABFD, but different
515 target vectors, most of which will not match. We have to avoid leaving
516 any side effects in ABFD, or any data it points to (like tdata), if the
517 file does not match the target vector. */
518
519const bfd_target *
520elf_object_p (abfd)
521 bfd *abfd;
522{
523 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
524 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
525 Elf_External_Shdr x_shdr; /* Section header table entry, external form */
5732c114 526 Elf_Internal_Shdr i_shdr;
ed591155 527 Elf_Internal_Shdr *i_shdrp; /* Section header table, internal form */
252b5132
RH
528 unsigned int shindex;
529 char *shstrtab; /* Internal copy of section header stringtab */
530 struct elf_backend_data *ebd;
ed591155 531 struct bfd_preserve preserve;
252b5132 532 asection *s;
dc810e39 533 bfd_size_type amt;
252b5132 534
e84d6fca 535 preserve.marker = NULL;
a17cc40f 536
252b5132
RH
537 /* Read in the ELF header in external format. */
538
dc810e39
AM
539 if (bfd_bread ((PTR) & x_ehdr, (bfd_size_type) sizeof (x_ehdr), abfd)
540 != sizeof (x_ehdr))
252b5132
RH
541 {
542 if (bfd_get_error () != bfd_error_system_call)
543 goto got_wrong_format_error;
544 else
545 goto got_no_match;
546 }
547
548 /* Now check to see if we have a valid ELF file, and one that BFD can
549 make use of. The magic number must match, the address size ('class')
550 and byte-swapping must match our XVEC entry, and it must have a
551 section header table (FIXME: See comments re sections at top of this
3e932841 552 file). */
252b5132 553
82e51918
AM
554 if (! elf_file_p (&x_ehdr)
555 || x_ehdr.e_ident[EI_VERSION] != EV_CURRENT
556 || x_ehdr.e_ident[EI_CLASS] != ELFCLASS)
252b5132
RH
557 goto got_wrong_format_error;
558
559 /* Check that file's byte order matches xvec's */
560 switch (x_ehdr.e_ident[EI_DATA])
561 {
562 case ELFDATA2MSB: /* Big-endian */
563 if (! bfd_header_big_endian (abfd))
564 goto got_wrong_format_error;
565 break;
566 case ELFDATA2LSB: /* Little-endian */
567 if (! bfd_header_little_endian (abfd))
568 goto got_wrong_format_error;
569 break;
570 case ELFDATANONE: /* No data encoding specified */
571 default: /* Unknown data encoding specified */
572 goto got_wrong_format_error;
573 }
574
575 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
576 the tdata pointer in the bfd. */
577
dc810e39 578 amt = sizeof (struct elf_obj_tdata);
e84d6fca
AM
579 preserve.marker = bfd_zalloc (abfd, amt);
580 if (preserve.marker == NULL)
252b5132 581 goto got_no_match;
e84d6fca 582 if (!bfd_preserve_save (abfd, &preserve))
ed591155
AM
583 goto got_no_match;
584
e84d6fca
AM
585 elf_tdata (abfd) = preserve.marker;
586
252b5132
RH
587 /* Now that we know the byte order, swap in the rest of the header */
588 i_ehdrp = elf_elfheader (abfd);
589 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
590#if DEBUG & 1
591 elf_debug_file (i_ehdrp);
592#endif
593
594 /* Reject ET_CORE (header indicates core file, not object file) */
595 if (i_ehdrp->e_type == ET_CORE)
596 goto got_wrong_format_error;
597
0c35f01a
AM
598 /* If this is a relocatable file and there is no section header
599 table, then we're hosed. */
600 if (i_ehdrp->e_shoff == 0 && i_ehdrp->e_type == ET_REL)
252b5132
RH
601 goto got_wrong_format_error;
602
603 /* As a simple sanity check, verify that the what BFD thinks is the
604 size of each section header table entry actually matches the size
0c35f01a
AM
605 recorded in the file, but only if there are any sections. */
606 if (i_ehdrp->e_shentsize != sizeof (x_shdr) && i_ehdrp->e_shnum != 0)
252b5132
RH
607 goto got_wrong_format_error;
608
7ece0d85
JJ
609 /* Further sanity check. */
610 if (i_ehdrp->e_shoff == 0 && i_ehdrp->e_shnum != 0)
611 goto got_wrong_format_error;
612
252b5132
RH
613 ebd = get_elf_backend_data (abfd);
614
615 /* Check that the ELF e_machine field matches what this particular
616 BFD format expects. */
617 if (ebd->elf_machine_code != i_ehdrp->e_machine
e84d6fca
AM
618 && (ebd->elf_machine_alt1 == 0
619 || i_ehdrp->e_machine != ebd->elf_machine_alt1)
620 && (ebd->elf_machine_alt2 == 0
621 || i_ehdrp->e_machine != ebd->elf_machine_alt2))
252b5132
RH
622 {
623 const bfd_target * const *target_ptr;
624
625 if (ebd->elf_machine_code != EM_NONE)
626 goto got_wrong_format_error;
627
628 /* This is the generic ELF target. Let it match any ELF target
629 for which we do not have a specific backend. */
630 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
631 {
632 struct elf_backend_data *back;
633
634 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
635 continue;
636 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
637 if (back->elf_machine_code == i_ehdrp->e_machine
638 || (back->elf_machine_alt1 != 0
639 && back->elf_machine_alt1 == i_ehdrp->e_machine)
640 || (back->elf_machine_alt2 != 0
641 && back->elf_machine_alt2 == i_ehdrp->e_machine))
642 {
643 /* target_ptr is an ELF backend which matches this
644 object file, so reject the generic ELF target. */
645 goto got_wrong_format_error;
646 }
647 }
648 }
649
650 if (i_ehdrp->e_type == ET_EXEC)
651 abfd->flags |= EXEC_P;
652 else if (i_ehdrp->e_type == ET_DYN)
653 abfd->flags |= DYNAMIC;
654
655 if (i_ehdrp->e_phnum > 0)
656 abfd->flags |= D_PAGED;
657
658 if (! bfd_default_set_arch_mach (abfd, ebd->arch, 0))
659 {
660 /* It's OK if this fails for the generic target. */
661 if (ebd->elf_machine_code != EM_NONE)
662 goto got_no_match;
663 }
664
3e932841 665 /* Remember the entry point specified in the ELF file header. */
448cafa4 666 bfd_set_start_address (abfd, i_ehdrp->e_entry);
252b5132 667
7ece0d85
JJ
668 if (i_ehdrp->e_shoff != 0)
669 {
670 /* Seek to the section header table in the file. */
671 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET) != 0)
672 goto got_no_match;
5732c114 673
7ece0d85
JJ
674 /* Read the first section header at index 0, and convert to internal
675 form. */
676 if (bfd_bread ((PTR) & x_shdr, (bfd_size_type) sizeof x_shdr, abfd)
677 != sizeof (x_shdr))
678 goto got_no_match;
679 elf_swap_shdr_in (abfd, &x_shdr, &i_shdr);
5732c114 680
7ece0d85
JJ
681 /* If the section count is zero, the actual count is in the first
682 section header. */
683 if (i_ehdrp->e_shnum == SHN_UNDEF)
684 i_ehdrp->e_shnum = i_shdr.sh_size;
5732c114 685
7ece0d85
JJ
686 /* And similarly for the string table index. */
687 if (i_ehdrp->e_shstrndx == SHN_XINDEX)
688 i_ehdrp->e_shstrndx = i_shdr.sh_link;
689 }
5732c114 690
252b5132 691 /* Allocate space for a copy of the section header table in
5732c114 692 internal form. */
0c35f01a
AM
693 if (i_ehdrp->e_shnum != 0)
694 {
5732c114 695 Elf_Internal_Shdr *shdrp;
9ad5cbcf 696 unsigned int num_sec;
5732c114 697
0c35f01a
AM
698 amt = sizeof (*i_shdrp) * i_ehdrp->e_shnum;
699 i_shdrp = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
5732c114
AM
700 if (!i_shdrp)
701 goto got_no_match;
9ad5cbcf
AM
702 num_sec = i_ehdrp->e_shnum;
703 if (num_sec > SHN_LORESERVE)
704 num_sec += SHN_HIRESERVE + 1 - SHN_LORESERVE;
705 elf_numsections (abfd) = num_sec;
706 amt = sizeof (i_shdrp) * num_sec;
0c35f01a 707 elf_elfsections (abfd) = (Elf_Internal_Shdr **) bfd_alloc (abfd, amt);
5732c114 708 if (!elf_elfsections (abfd))
0c35f01a 709 goto got_no_match;
5732c114
AM
710
711 memcpy (i_shdrp, &i_shdr, sizeof (*i_shdrp));
712 shdrp = i_shdrp;
713 shindex = 0;
9ad5cbcf 714 if (num_sec > SHN_LORESERVE)
5732c114
AM
715 {
716 for ( ; shindex < SHN_LORESERVE; shindex++)
717 elf_elfsections (abfd)[shindex] = shdrp++;
718 for ( ; shindex < SHN_HIRESERVE + 1; shindex++)
9ad5cbcf 719 elf_elfsections (abfd)[shindex] = i_shdrp;
5732c114 720 }
9ad5cbcf 721 for ( ; shindex < num_sec; shindex++)
5732c114 722 elf_elfsections (abfd)[shindex] = shdrp++;
5732c114 723
ed591155
AM
724 /* Read in the rest of the section header table and convert it
725 to internal form. */
726 for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++)
727 {
728 if (bfd_bread ((PTR) & x_shdr, (bfd_size_type) sizeof x_shdr, abfd)
729 != sizeof (x_shdr))
730 goto got_no_match;
731 elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex);
732
733 /* If the section is loaded, but not page aligned, clear
734 D_PAGED. */
735 if (i_shdrp[shindex].sh_size != 0
736 && (i_shdrp[shindex].sh_flags & SHF_ALLOC) != 0
737 && i_shdrp[shindex].sh_type != SHT_NOBITS
738 && (((i_shdrp[shindex].sh_addr - i_shdrp[shindex].sh_offset)
739 % ebd->maxpagesize)
740 != 0))
741 abfd->flags &= ~D_PAGED;
742 }
252b5132 743 }
ed591155 744
7ece0d85 745 if (i_ehdrp->e_shstrndx && i_ehdrp->e_shoff)
252b5132
RH
746 {
747 if (! bfd_section_from_shdr (abfd, i_ehdrp->e_shstrndx))
748 goto got_no_match;
749 }
750
751 /* Read in the program headers. */
752 if (i_ehdrp->e_phnum == 0)
753 elf_tdata (abfd)->phdr = NULL;
754 else
755 {
756 Elf_Internal_Phdr *i_phdr;
757 unsigned int i;
758
dc810e39
AM
759 amt = i_ehdrp->e_phnum * sizeof (Elf_Internal_Phdr);
760 elf_tdata (abfd)->phdr = (Elf_Internal_Phdr *) bfd_alloc (abfd, amt);
252b5132
RH
761 if (elf_tdata (abfd)->phdr == NULL)
762 goto got_no_match;
dc810e39 763 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_phoff, SEEK_SET) != 0)
252b5132
RH
764 goto got_no_match;
765 i_phdr = elf_tdata (abfd)->phdr;
766 for (i = 0; i < i_ehdrp->e_phnum; i++, i_phdr++)
767 {
768 Elf_External_Phdr x_phdr;
769
dc810e39 770 if (bfd_bread ((PTR) &x_phdr, (bfd_size_type) sizeof x_phdr, abfd)
252b5132
RH
771 != sizeof x_phdr)
772 goto got_no_match;
773 elf_swap_phdr_in (abfd, &x_phdr, i_phdr);
774 }
775 }
776
777 /* Read in the string table containing the names of the sections. We
3e932841 778 will need the base pointer to this table later. */
252b5132
RH
779 /* We read this inline now, so that we don't have to go through
780 bfd_section_from_shdr with it (since this particular strtab is
781 used to find all of the ELF section names.) */
782
7ece0d85 783 if (i_ehdrp->e_shstrndx != 0 && i_ehdrp->e_shoff)
252b5132 784 {
9ad5cbcf
AM
785 unsigned int num_sec;
786
0c35f01a
AM
787 shstrtab = bfd_elf_get_str_section (abfd, i_ehdrp->e_shstrndx);
788 if (!shstrtab)
252b5132 789 goto got_no_match;
0c35f01a
AM
790
791 /* Once all of the section headers have been read and converted, we
792 can start processing them. Note that the first section header is
793 a dummy placeholder entry, so we ignore it. */
9ad5cbcf
AM
794 num_sec = elf_numsections (abfd);
795 for (shindex = 1; shindex < num_sec; shindex++)
0c35f01a
AM
796 {
797 if (! bfd_section_from_shdr (abfd, shindex))
798 goto got_no_match;
9ad5cbcf
AM
799 if (shindex == SHN_LORESERVE - 1)
800 shindex += SHN_HIRESERVE + 1 - SHN_LORESERVE;
0c35f01a 801 }
252b5132
RH
802 }
803
804 /* Let the backend double check the format and override global
805 information. */
806 if (ebd->elf_backend_object_p)
807 {
82e51918 808 if (! (*ebd->elf_backend_object_p) (abfd))
252b5132
RH
809 goto got_wrong_format_error;
810 }
811
812 /* If we have created any reloc sections that are associated with
813 debugging sections, mark the reloc sections as debugging as well. */
814 for (s = abfd->sections; s != NULL; s = s->next)
815 {
816 if ((elf_section_data (s)->this_hdr.sh_type == SHT_REL
817 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA)
818 && elf_section_data (s)->this_hdr.sh_info > 0)
819 {
820 unsigned long targ_index;
821 asection *targ_sec;
822
823 targ_index = elf_section_data (s)->this_hdr.sh_info;
824 targ_sec = bfd_section_from_elf_index (abfd, targ_index);
825 if (targ_sec != NULL
826 && (targ_sec->flags & SEC_DEBUGGING) != 0)
827 s->flags |= SEC_DEBUGGING;
828 }
829 }
830
e84d6fca
AM
831 bfd_preserve_finish (abfd, &preserve);
832 return abfd->xvec;
252b5132
RH
833
834 got_wrong_format_error:
a77a9fef
HPN
835 /* There is way too much undoing of half-known state here. The caller,
836 bfd_check_format_matches, really shouldn't iterate on live bfd's to
837 check match/no-match like it does. We have to rely on that a call to
838 bfd_default_set_arch_mach with the previously known mach, undoes what
839 was done by the first bfd_default_set_arch_mach (with mach 0) here.
840 For this to work, only elf-data and the mach may be changed by the
841 target-specific elf_backend_object_p function. Note that saving the
842 whole bfd here and restoring it would be even worse; the first thing
843 you notice is that the cached bfd file position gets out of sync. */
252b5132 844 bfd_set_error (bfd_error_wrong_format);
ed591155 845
252b5132 846 got_no_match:
e84d6fca
AM
847 if (preserve.marker != NULL)
848 bfd_preserve_restore (abfd, &preserve);
ed591155 849 return NULL;
252b5132
RH
850}
851\f
852/* ELF .o/exec file writing */
853
854/* Write out the relocs. */
855
b9f66672
JL
856void
857elf_write_relocs (abfd, sec, data)
252b5132
RH
858 bfd *abfd;
859 asection *sec;
860 PTR data;
861{
b34976b6 862 bfd_boolean *failedp = (bfd_boolean *) data;
252b5132 863 Elf_Internal_Shdr *rela_hdr;
947216bf
AM
864 bfd_vma addr_offset;
865 void (*swap_out) PARAMS ((bfd *, const Elf_Internal_Rela *, bfd_byte *));
866 size_t extsize;
867 bfd_byte *dst_rela;
252b5132 868 unsigned int idx;
947216bf
AM
869 asymbol *last_sym;
870 int last_sym_idx;
252b5132
RH
871
872 /* If we have already failed, don't do anything. */
873 if (*failedp)
874 return;
875
876 if ((sec->flags & SEC_RELOC) == 0)
877 return;
878
879 /* The linker backend writes the relocs out itself, and sets the
880 reloc_count field to zero to inhibit writing them here. Also,
881 sometimes the SEC_RELOC flag gets set even when there aren't any
882 relocs. */
883 if (sec->reloc_count == 0)
884 return;
885
886 rela_hdr = &elf_section_data (sec)->rel_hdr;
887
888 rela_hdr->sh_size = rela_hdr->sh_entsize * sec->reloc_count;
889 rela_hdr->contents = (PTR) bfd_alloc (abfd, rela_hdr->sh_size);
890 if (rela_hdr->contents == NULL)
891 {
b34976b6 892 *failedp = TRUE;
252b5132
RH
893 return;
894 }
895
bf572ba0
MM
896 /* Figure out whether the relocations are RELA or REL relocations. */
897 if (rela_hdr->sh_type == SHT_RELA)
947216bf
AM
898 {
899 swap_out = elf_swap_reloca_out;
900 extsize = sizeof (Elf_External_Rela);
901 }
bf572ba0 902 else if (rela_hdr->sh_type == SHT_REL)
947216bf
AM
903 {
904 swap_out = elf_swap_reloc_out;
905 extsize = sizeof (Elf_External_Rel);
906 }
bf572ba0
MM
907 else
908 /* Every relocation section should be either an SHT_RELA or an
909 SHT_REL section. */
910 abort ();
911
947216bf
AM
912 /* The address of an ELF reloc is section relative for an object
913 file, and absolute for an executable file or shared library.
914 The address of a BFD reloc is always section relative. */
915 addr_offset = 0;
916 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
917 addr_offset = sec->vma;
918
3e932841 919 /* orelocation has the data, reloc_count has the count... */
947216bf
AM
920 last_sym = 0;
921 last_sym_idx = 0;
922 dst_rela = rela_hdr->contents;
252b5132 923
947216bf
AM
924 for (idx = 0; idx < sec->reloc_count; idx++, dst_rela += extsize)
925 {
926 Elf_Internal_Rela src_rela;
927 arelent *ptr;
928 asymbol *sym;
929 int n;
930
931 ptr = sec->orelocation[idx];
932 sym = *ptr->sym_ptr_ptr;
933 if (sym == last_sym)
934 n = last_sym_idx;
935 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
936 n = STN_UNDEF;
937 else
252b5132 938 {
947216bf
AM
939 last_sym = sym;
940 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
941 if (n < 0)
252b5132 942 {
b34976b6 943 *failedp = TRUE;
252b5132
RH
944 return;
945 }
947216bf 946 last_sym_idx = n;
252b5132 947 }
252b5132 948
947216bf
AM
949 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
950 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
951 && ! _bfd_elf_validate_reloc (abfd, ptr))
252b5132 952 {
b34976b6 953 *failedp = TRUE;
947216bf 954 return;
252b5132 955 }
947216bf
AM
956
957 src_rela.r_offset = ptr->address + addr_offset;
958 src_rela.r_info = ELF_R_INFO (n, ptr->howto->type);
959 src_rela.r_addend = ptr->addend;
960 (*swap_out) (abfd, &src_rela, dst_rela);
252b5132
RH
961 }
962}
963
964/* Write out the program headers. */
965
966int
967elf_write_out_phdrs (abfd, phdr, count)
968 bfd *abfd;
969 const Elf_Internal_Phdr *phdr;
dc810e39 970 unsigned int count;
252b5132
RH
971{
972 while (count--)
973 {
974 Elf_External_Phdr extphdr;
975 elf_swap_phdr_out (abfd, phdr, &extphdr);
dc810e39
AM
976 if (bfd_bwrite (&extphdr, (bfd_size_type) sizeof (Elf_External_Phdr),
977 abfd) != sizeof (Elf_External_Phdr))
252b5132
RH
978 return -1;
979 phdr++;
980 }
981 return 0;
982}
983
984/* Write out the section headers and the ELF file header. */
985
b34976b6 986bfd_boolean
252b5132
RH
987elf_write_shdrs_and_ehdr (abfd)
988 bfd *abfd;
989{
990 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
991 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
992 Elf_External_Shdr *x_shdrp; /* Section header table, external form */
993 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
994 unsigned int count;
dc810e39 995 bfd_size_type amt;
252b5132
RH
996
997 i_ehdrp = elf_elfheader (abfd);
998 i_shdrp = elf_elfsections (abfd);
999
3e932841 1000 /* swap the header before spitting it out... */
252b5132
RH
1001
1002#if DEBUG & 1
1003 elf_debug_file (i_ehdrp);
1004#endif
1005 elf_swap_ehdr_out (abfd, i_ehdrp, &x_ehdr);
dc810e39 1006 amt = sizeof (x_ehdr);
252b5132 1007 if (bfd_seek (abfd, (file_ptr) 0, SEEK_SET) != 0
dc810e39 1008 || bfd_bwrite ((PTR) & x_ehdr, amt, abfd) != amt)
b34976b6 1009 return FALSE;
252b5132 1010
5732c114
AM
1011 /* Some fields in the first section header handle overflow of ehdr
1012 fields. */
1013 if (i_ehdrp->e_shnum >= SHN_LORESERVE)
1014 i_shdrp[0]->sh_size = i_ehdrp->e_shnum;
1015 if (i_ehdrp->e_shstrndx >= SHN_LORESERVE)
1016 i_shdrp[0]->sh_link = i_ehdrp->e_shstrndx;
1017
3e932841 1018 /* at this point we've concocted all the ELF sections... */
5732c114
AM
1019 amt = i_ehdrp->e_shnum;
1020 amt *= sizeof (*x_shdrp);
dc810e39 1021 x_shdrp = (Elf_External_Shdr *) bfd_alloc (abfd, amt);
252b5132 1022 if (!x_shdrp)
b34976b6 1023 return FALSE;
252b5132 1024
5732c114 1025 for (count = 0; count < i_ehdrp->e_shnum; i_shdrp++, count++)
252b5132
RH
1026 {
1027#if DEBUG & 2
5732c114 1028 elf_debug_section (count, *i_shdrp);
252b5132 1029#endif
5732c114 1030 elf_swap_shdr_out (abfd, *i_shdrp, x_shdrp + count);
b34976b6 1031
5732c114
AM
1032 if (count == SHN_LORESERVE - 1)
1033 i_shdrp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
1034 }
1035 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET) != 0
dc810e39 1036 || bfd_bwrite ((PTR) x_shdrp, amt, abfd) != amt)
b34976b6 1037 return FALSE;
252b5132 1038
3e932841 1039 /* need to dump the string table too... */
252b5132 1040
b34976b6 1041 return TRUE;
252b5132
RH
1042}
1043
1044long
1045elf_slurp_symbol_table (abfd, symptrs, dynamic)
1046 bfd *abfd;
1047 asymbol **symptrs; /* Buffer for generated bfd symbols */
b34976b6 1048 bfd_boolean dynamic;
252b5132
RH
1049{
1050 Elf_Internal_Shdr *hdr;
1051 Elf_Internal_Shdr *verhdr;
1052 unsigned long symcount; /* Number of external ELF symbols */
1053 elf_symbol_type *sym; /* Pointer to current bfd symbol */
1054 elf_symbol_type *symbase; /* Buffer for generated bfd symbols */
6cdc0ccc
AM
1055 Elf_Internal_Sym *isym;
1056 Elf_Internal_Sym *isymend;
1057 Elf_Internal_Sym *isymbuf = NULL;
1058 Elf_External_Versym *xver;
1059 Elf_External_Versym *xverbuf = NULL;
1060 struct elf_backend_data *ebd;
dc810e39 1061 bfd_size_type amt;
252b5132
RH
1062
1063 /* Read each raw ELF symbol, converting from external ELF form to
1064 internal ELF form, and then using the information to create a
1065 canonical bfd symbol table entry.
1066
1067 Note that we allocate the initial bfd canonical symbol buffer
1068 based on a one-to-one mapping of the ELF symbols to canonical
1069 symbols. We actually use all the ELF symbols, so there will be no
1070 space left over at the end. When we have all the symbols, we
3e932841 1071 build the caller's pointer vector. */
252b5132
RH
1072
1073 if (! dynamic)
1074 {
1075 hdr = &elf_tdata (abfd)->symtab_hdr;
1076 verhdr = NULL;
1077 }
1078 else
1079 {
1080 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1081 if (elf_dynversym (abfd) == 0)
1082 verhdr = NULL;
1083 else
1084 verhdr = &elf_tdata (abfd)->dynversym_hdr;
1085 if ((elf_tdata (abfd)->dynverdef_section != 0
1086 && elf_tdata (abfd)->verdef == NULL)
1087 || (elf_tdata (abfd)->dynverref_section != 0
1088 && elf_tdata (abfd)->verref == NULL))
1089 {
1090 if (! _bfd_elf_slurp_version_tables (abfd))
1091 return -1;
1092 }
1093 }
1094
6cdc0ccc 1095 ebd = get_elf_backend_data (abfd);
252b5132 1096 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
252b5132
RH
1097 if (symcount == 0)
1098 sym = symbase = NULL;
1099 else
1100 {
6cdc0ccc
AM
1101 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, symcount, 0,
1102 NULL, NULL, NULL);
1103 if (isymbuf == NULL)
1104 return -1;
252b5132 1105
dc810e39
AM
1106 amt = symcount;
1107 amt *= sizeof (elf_symbol_type);
1108 symbase = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132 1109 if (symbase == (elf_symbol_type *) NULL)
9ad5cbcf 1110 goto error_return;
252b5132
RH
1111
1112 /* Read the raw ELF version symbol information. */
252b5132
RH
1113 if (verhdr != NULL
1114 && verhdr->sh_size / sizeof (Elf_External_Versym) != symcount)
1115 {
1116 (*_bfd_error_handler)
1117 (_("%s: version count (%ld) does not match symbol count (%ld)"),
1118 abfd->filename,
1119 (long) (verhdr->sh_size / sizeof (Elf_External_Versym)),
1120 symcount);
1121
1122 /* Slurp in the symbols without the version information,
1123 since that is more helpful than just quitting. */
1124 verhdr = NULL;
1125 }
1126
1127 if (verhdr != NULL)
1128 {
1129 if (bfd_seek (abfd, verhdr->sh_offset, SEEK_SET) != 0)
1130 goto error_return;
1131
6cdc0ccc
AM
1132 xverbuf = (Elf_External_Versym *) bfd_malloc (verhdr->sh_size);
1133 if (xverbuf == NULL && verhdr->sh_size != 0)
252b5132
RH
1134 goto error_return;
1135
6cdc0ccc 1136 if (bfd_bread ((PTR) xverbuf, verhdr->sh_size, abfd)
252b5132
RH
1137 != verhdr->sh_size)
1138 goto error_return;
1139 }
1140
1141 /* Skip first symbol, which is a null dummy. */
6cdc0ccc
AM
1142 xver = xverbuf;
1143 if (xver != NULL)
1144 ++xver;
1145 isymend = isymbuf + symcount;
1146 for (isym = isymbuf + 1, sym = symbase; isym < isymend; isym++, sym++)
252b5132 1147 {
6cdc0ccc 1148 memcpy (&sym->internal_elf_sym, isym, sizeof (Elf_Internal_Sym));
252b5132
RH
1149 sym->symbol.the_bfd = abfd;
1150
1151 sym->symbol.name = bfd_elf_string_from_elf_section (abfd,
1152 hdr->sh_link,
6cdc0ccc 1153 isym->st_name);
252b5132 1154
6cdc0ccc 1155 sym->symbol.value = isym->st_value;
252b5132 1156
6cdc0ccc 1157 if (isym->st_shndx == SHN_UNDEF)
9ad5cbcf
AM
1158 {
1159 sym->symbol.section = bfd_und_section_ptr;
1160 }
6cdc0ccc
AM
1161 else if (isym->st_shndx < SHN_LORESERVE
1162 || isym->st_shndx > SHN_HIRESERVE)
252b5132
RH
1163 {
1164 sym->symbol.section = section_from_elf_index (abfd,
6cdc0ccc 1165 isym->st_shndx);
252b5132
RH
1166 if (sym->symbol.section == NULL)
1167 {
1168 /* This symbol is in a section for which we did not
1169 create a BFD section. Just use bfd_abs_section,
1170 although it is wrong. FIXME. */
1171 sym->symbol.section = bfd_abs_section_ptr;
1172 }
1173 }
6cdc0ccc 1174 else if (isym->st_shndx == SHN_ABS)
252b5132
RH
1175 {
1176 sym->symbol.section = bfd_abs_section_ptr;
1177 }
6cdc0ccc 1178 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
1179 {
1180 sym->symbol.section = bfd_com_section_ptr;
1181 /* Elf puts the alignment into the `value' field, and
1182 the size into the `size' field. BFD wants to see the
1183 size in the value field, and doesn't care (at the
1184 moment) about the alignment. */
6cdc0ccc 1185 sym->symbol.value = isym->st_size;
252b5132 1186 }
252b5132
RH
1187 else
1188 sym->symbol.section = bfd_abs_section_ptr;
1189
1049f94e 1190 /* If this is a relocatable file, then the symbol value is
252b5132
RH
1191 already section relative. */
1192 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1193 sym->symbol.value -= sym->symbol.section->vma;
1194
6cdc0ccc 1195 switch (ELF_ST_BIND (isym->st_info))
252b5132
RH
1196 {
1197 case STB_LOCAL:
1198 sym->symbol.flags |= BSF_LOCAL;
1199 break;
1200 case STB_GLOBAL:
6cdc0ccc 1201 if (isym->st_shndx != SHN_UNDEF && isym->st_shndx != SHN_COMMON)
252b5132
RH
1202 sym->symbol.flags |= BSF_GLOBAL;
1203 break;
1204 case STB_WEAK:
1205 sym->symbol.flags |= BSF_WEAK;
1206 break;
1207 }
1208
6cdc0ccc 1209 switch (ELF_ST_TYPE (isym->st_info))
252b5132
RH
1210 {
1211 case STT_SECTION:
1212 sym->symbol.flags |= BSF_SECTION_SYM | BSF_DEBUGGING;
1213 break;
1214 case STT_FILE:
1215 sym->symbol.flags |= BSF_FILE | BSF_DEBUGGING;
1216 break;
1217 case STT_FUNC:
1218 sym->symbol.flags |= BSF_FUNCTION;
1219 break;
1220 case STT_OBJECT:
1221 sym->symbol.flags |= BSF_OBJECT;
1222 break;
1223 }
1224
1225 if (dynamic)
1226 sym->symbol.flags |= BSF_DYNAMIC;
1227
6cdc0ccc 1228 if (xver != NULL)
252b5132
RH
1229 {
1230 Elf_Internal_Versym iversym;
1231
6cdc0ccc 1232 _bfd_elf_swap_versym_in (abfd, xver, &iversym);
252b5132 1233 sym->version = iversym.vs_vers;
6cdc0ccc 1234 xver++;
252b5132
RH
1235 }
1236
1237 /* Do some backend-specific processing on this symbol. */
6cdc0ccc
AM
1238 if (ebd->elf_backend_symbol_processing)
1239 (*ebd->elf_backend_symbol_processing) (abfd, &sym->symbol);
252b5132
RH
1240 }
1241 }
1242
1243 /* Do some backend-specific processing on this symbol table. */
6cdc0ccc
AM
1244 if (ebd->elf_backend_symbol_table_processing)
1245 (*ebd->elf_backend_symbol_table_processing) (abfd, symbase, symcount);
252b5132
RH
1246
1247 /* We rely on the zalloc to clear out the final symbol entry. */
1248
1249 symcount = sym - symbase;
1250
1251 /* Fill in the user's symbol pointer vector if needed. */
1252 if (symptrs)
1253 {
1254 long l = symcount;
1255
1256 sym = symbase;
1257 while (l-- > 0)
1258 {
1259 *symptrs++ = &sym->symbol;
1260 sym++;
1261 }
1262 *symptrs = 0; /* Final null pointer */
1263 }
1264
6cdc0ccc
AM
1265 if (xverbuf != NULL)
1266 free (xverbuf);
1267 if (isymbuf != NULL && hdr->contents != (unsigned char *) isymbuf)
1268 free (isymbuf);
252b5132 1269 return symcount;
9ad5cbcf 1270
252b5132 1271error_return:
6cdc0ccc
AM
1272 if (xverbuf != NULL)
1273 free (xverbuf);
1274 if (isymbuf != NULL && hdr->contents != (unsigned char *) isymbuf)
1275 free (isymbuf);
252b5132
RH
1276 return -1;
1277}
1278
60bcf0fa 1279/* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
42fdc509 1280 them. */
252b5132 1281
b34976b6 1282static bfd_boolean
42fdc509
MM
1283elf_slurp_reloc_table_from_section (abfd, asect, rel_hdr, reloc_count,
1284 relents, symbols, dynamic)
252b5132
RH
1285 bfd *abfd;
1286 asection *asect;
42fdc509
MM
1287 Elf_Internal_Shdr *rel_hdr;
1288 bfd_size_type reloc_count;
1289 arelent *relents;
252b5132 1290 asymbol **symbols;
b34976b6 1291 bfd_boolean dynamic;
252b5132
RH
1292{
1293 struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
252b5132
RH
1294 PTR allocated = NULL;
1295 bfd_byte *native_relocs;
252b5132
RH
1296 arelent *relent;
1297 unsigned int i;
1298 int entsize;
5ad8645c 1299 unsigned int symcount;
252b5132 1300
dc810e39 1301 allocated = (PTR) bfd_malloc (rel_hdr->sh_size);
252b5132
RH
1302 if (allocated == NULL)
1303 goto error_return;
1304
1305 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 1306 || (bfd_bread (allocated, rel_hdr->sh_size, abfd)
252b5132
RH
1307 != rel_hdr->sh_size))
1308 goto error_return;
1309
1310 native_relocs = (bfd_byte *) allocated;
1311
252b5132
RH
1312 entsize = rel_hdr->sh_entsize;
1313 BFD_ASSERT (entsize == sizeof (Elf_External_Rel)
1314 || entsize == sizeof (Elf_External_Rela));
1315
5ad8645c
AM
1316 if (dynamic)
1317 symcount = bfd_get_dynamic_symcount (abfd);
1318 else
1319 symcount = bfd_get_symcount (abfd);
1320
252b5132
RH
1321 for (i = 0, relent = relents;
1322 i < reloc_count;
1323 i++, relent++, native_relocs += entsize)
1324 {
1325 Elf_Internal_Rela rela;
252b5132
RH
1326
1327 if (entsize == sizeof (Elf_External_Rela))
947216bf 1328 elf_swap_reloca_in (abfd, native_relocs, &rela);
252b5132 1329 else
947216bf 1330 elf_swap_reloc_in (abfd, native_relocs, &rela);
252b5132
RH
1331
1332 /* The address of an ELF reloc is section relative for an object
1333 file, and absolute for an executable file or shared library.
1334 The address of a normal BFD reloc is always section relative,
1335 and the address of a dynamic reloc is absolute.. */
1336 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
1337 relent->address = rela.r_offset;
1338 else
1339 relent->address = rela.r_offset - asect->vma;
1340
1341 if (ELF_R_SYM (rela.r_info) == 0)
1342 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
05a487dc 1343 else if (ELF_R_SYM (rela.r_info) > symcount)
1f70368c
DJ
1344 {
1345 (*_bfd_error_handler)
1346 (_("%s(%s): relocation %d has invalid symbol index %ld"),
1347 abfd->filename, asect->name, i, ELF_R_SYM (rela.r_info));
1348 relent->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
1349 }
252b5132
RH
1350 else
1351 {
1352 asymbol **ps, *s;
1353
1354 ps = symbols + ELF_R_SYM (rela.r_info) - 1;
1355 s = *ps;
1356
1357 /* Canonicalize ELF section symbols. FIXME: Why? */
1358 if ((s->flags & BSF_SECTION_SYM) == 0)
1359 relent->sym_ptr_ptr = ps;
1360 else
1361 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
1362 }
1363
1364 relent->addend = rela.r_addend;
1365
90fff0d4
DJ
1366 if ((entsize == sizeof (Elf_External_Rela)
1367 && ebd->elf_info_to_howto != NULL)
1368 || ebd->elf_info_to_howto_rel == NULL)
252b5132
RH
1369 (*ebd->elf_info_to_howto) (abfd, relent, &rela);
1370 else
947216bf 1371 (*ebd->elf_info_to_howto_rel) (abfd, relent, &rela);
252b5132
RH
1372 }
1373
252b5132
RH
1374 if (allocated != NULL)
1375 free (allocated);
1376
b34976b6 1377 return TRUE;
252b5132
RH
1378
1379 error_return:
1380 if (allocated != NULL)
1381 free (allocated);
b34976b6 1382 return FALSE;
252b5132
RH
1383}
1384
42fdc509
MM
1385/* Read in and swap the external relocs. */
1386
b34976b6 1387bfd_boolean
42fdc509
MM
1388elf_slurp_reloc_table (abfd, asect, symbols, dynamic)
1389 bfd *abfd;
1390 asection *asect;
1391 asymbol **symbols;
b34976b6 1392 bfd_boolean dynamic;
42fdc509
MM
1393{
1394 struct bfd_elf_section_data * const d = elf_section_data (asect);
1395 Elf_Internal_Shdr *rel_hdr;
1396 Elf_Internal_Shdr *rel_hdr2;
1397 bfd_size_type reloc_count;
1398 bfd_size_type reloc_count2;
1399 arelent *relents;
dc810e39 1400 bfd_size_type amt;
42fdc509
MM
1401
1402 if (asect->relocation != NULL)
b34976b6 1403 return TRUE;
42fdc509
MM
1404
1405 if (! dynamic)
1406 {
1407 if ((asect->flags & SEC_RELOC) == 0
1408 || asect->reloc_count == 0)
b34976b6 1409 return TRUE;
42fdc509
MM
1410
1411 rel_hdr = &d->rel_hdr;
d9bc7a44 1412 reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
42fdc509 1413 rel_hdr2 = d->rel_hdr2;
d9bc7a44 1414 reloc_count2 = (rel_hdr2 ? NUM_SHDR_ENTRIES (rel_hdr2) : 0);
42fdc509
MM
1415
1416 BFD_ASSERT (asect->reloc_count == reloc_count + reloc_count2);
1417 BFD_ASSERT (asect->rel_filepos == rel_hdr->sh_offset
1418 || (rel_hdr2 && asect->rel_filepos == rel_hdr2->sh_offset));
1419
1420 }
1421 else
1422 {
57e21bef
MM
1423 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
1424 case because relocations against this section may use the
1425 dynamic symbol table, and in that case bfd_section_from_shdr
1426 in elf.c does not update the RELOC_COUNT. */
42fdc509 1427 if (asect->_raw_size == 0)
b34976b6 1428 return TRUE;
42fdc509
MM
1429
1430 rel_hdr = &d->this_hdr;
d9bc7a44 1431 reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
42fdc509 1432 rel_hdr2 = NULL;
57e21bef 1433 reloc_count2 = 0;
42fdc509
MM
1434 }
1435
dc810e39
AM
1436 amt = (reloc_count + reloc_count2) * sizeof (arelent);
1437 relents = (arelent *) bfd_alloc (abfd, amt);
42fdc509 1438 if (relents == NULL)
b34976b6 1439 return FALSE;
42fdc509
MM
1440
1441 if (!elf_slurp_reloc_table_from_section (abfd, asect,
1442 rel_hdr, reloc_count,
1443 relents,
1444 symbols, dynamic))
b34976b6 1445 return FALSE;
60bcf0fa
NC
1446
1447 if (rel_hdr2
42fdc509
MM
1448 && !elf_slurp_reloc_table_from_section (abfd, asect,
1449 rel_hdr2, reloc_count2,
1450 relents + reloc_count,
1451 symbols, dynamic))
b34976b6 1452 return FALSE;
42fdc509 1453
42fdc509 1454 asect->relocation = relents;
b34976b6 1455 return TRUE;
42fdc509
MM
1456}
1457
252b5132
RH
1458#ifdef DEBUG
1459static void
1460elf_debug_section (num, hdr)
1461 int num;
1462 Elf_Internal_Shdr *hdr;
1463{
1464 fprintf (stderr, "\nSection#%d '%s' 0x%.8lx\n", num,
1465 hdr->bfd_section != NULL ? hdr->bfd_section->name : "",
1466 (long) hdr);
1467 fprintf (stderr,
1468 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
1469 (long) hdr->sh_name,
1470 (long) hdr->sh_type,
1471 (long) hdr->sh_flags);
1472 fprintf (stderr,
1473 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
1474 (long) hdr->sh_addr,
1475 (long) hdr->sh_offset,
1476 (long) hdr->sh_size);
1477 fprintf (stderr,
1478 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
1479 (long) hdr->sh_link,
1480 (long) hdr->sh_info,
1481 (long) hdr->sh_addralign);
1482 fprintf (stderr, "sh_entsize = %ld\n",
1483 (long) hdr->sh_entsize);
1484 fflush (stderr);
1485}
1486
1487static void
1488elf_debug_file (ehdrp)
1489 Elf_Internal_Ehdr *ehdrp;
1490{
1491 fprintf (stderr, "e_entry = 0x%.8lx\n", (long) ehdrp->e_entry);
1492 fprintf (stderr, "e_phoff = %ld\n", (long) ehdrp->e_phoff);
1493 fprintf (stderr, "e_phnum = %ld\n", (long) ehdrp->e_phnum);
1494 fprintf (stderr, "e_phentsize = %ld\n", (long) ehdrp->e_phentsize);
1495 fprintf (stderr, "e_shoff = %ld\n", (long) ehdrp->e_shoff);
1496 fprintf (stderr, "e_shnum = %ld\n", (long) ehdrp->e_shnum);
1497 fprintf (stderr, "e_shentsize = %ld\n", (long) ehdrp->e_shentsize);
1498}
1499
1500static char *
1501elf_symbol_flags (flags)
1502 flagword flags;
1503{
1504 static char buffer[1024];
1505
1506 buffer[0] = '\0';
1507 if (flags & BSF_LOCAL)
1508 strcat (buffer, " local");
1509
1510 if (flags & BSF_GLOBAL)
1511 strcat (buffer, " global");
1512
1513 if (flags & BSF_DEBUGGING)
1514 strcat (buffer, " debug");
1515
1516 if (flags & BSF_FUNCTION)
1517 strcat (buffer, " function");
1518
1519 if (flags & BSF_KEEP)
1520 strcat (buffer, " keep");
1521
1522 if (flags & BSF_KEEP_G)
1523 strcat (buffer, " keep_g");
1524
1525 if (flags & BSF_WEAK)
1526 strcat (buffer, " weak");
1527
1528 if (flags & BSF_SECTION_SYM)
1529 strcat (buffer, " section-sym");
1530
1531 if (flags & BSF_OLD_COMMON)
1532 strcat (buffer, " old-common");
1533
1534 if (flags & BSF_NOT_AT_END)
1535 strcat (buffer, " not-at-end");
1536
1537 if (flags & BSF_CONSTRUCTOR)
1538 strcat (buffer, " constructor");
1539
1540 if (flags & BSF_WARNING)
1541 strcat (buffer, " warning");
1542
1543 if (flags & BSF_INDIRECT)
1544 strcat (buffer, " indirect");
1545
1546 if (flags & BSF_FILE)
1547 strcat (buffer, " file");
1548
1549 if (flags & DYNAMIC)
1550 strcat (buffer, " dynamic");
1551
1552 if (flags & ~(BSF_LOCAL
1553 | BSF_GLOBAL
1554 | BSF_DEBUGGING
1555 | BSF_FUNCTION
1556 | BSF_KEEP
1557 | BSF_KEEP_G
1558 | BSF_WEAK
1559 | BSF_SECTION_SYM
1560 | BSF_OLD_COMMON
1561 | BSF_NOT_AT_END
1562 | BSF_CONSTRUCTOR
1563 | BSF_WARNING
1564 | BSF_INDIRECT
1565 | BSF_FILE
1566 | BSF_DYNAMIC))
1567 strcat (buffer, " unknown-bits");
1568
1569 return buffer;
1570}
1571#endif
1572\f
8d6337fe
RM
1573/* Create a new BFD as if by bfd_openr. Rather than opening a file,
1574 reconstruct an ELF file by reading the segments out of remote memory
1575 based on the ELF file header at EHDR_VMA and the ELF program headers it
1576 points to. If not null, *LOADBASEP is filled in with the difference
1577 between the VMAs from which the segments were read, and the VMAs the
1578 file headers (and hence BFD's idea of each section's VMA) put them at.
1579
1580 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
1581 remote memory at target address VMA into the local buffer at MYADDR; it
1582 should return zero on success or an `errno' code on failure. TEMPL must
1583 be a BFD for a target with the word size and byte order found in the
1584 remote memory. */
1585
1586bfd *
1587NAME(_bfd_elf,bfd_from_remote_memory) (templ, ehdr_vma, loadbasep,
1588 target_read_memory)
1589 bfd *templ;
1590 bfd_vma ehdr_vma;
1591 bfd_vma *loadbasep;
1592 int (*target_read_memory) PARAMS ((bfd_vma vma, char *myaddr, int len));
1593{
1594 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
1595 Elf_Internal_Ehdr i_ehdr; /* Elf file header, internal form */
1596 Elf_External_Phdr *x_phdrs;
1597 Elf_Internal_Phdr *i_phdrs, *last_phdr;
1598 bfd *nbfd;
1599 struct bfd_in_memory *bim;
1600 int contents_size;
1601 char *contents;
1602 int err;
1603 unsigned int i;
1604 bfd_vma loadbase;
1605
1606 /* Read in the ELF header in external format. */
1607 err = target_read_memory (ehdr_vma, (char *) &x_ehdr, sizeof x_ehdr);
1608 if (err)
1609 {
1610 bfd_set_error (bfd_error_system_call);
1611 errno = err;
1612 return NULL;
1613 }
1614
1615 /* Now check to see if we have a valid ELF file, and one that BFD can
1616 make use of. The magic number must match, the address size ('class')
1617 and byte-swapping must match our XVEC entry. */
1618
1619 if (! elf_file_p (&x_ehdr)
1620 || x_ehdr.e_ident[EI_VERSION] != EV_CURRENT
1621 || x_ehdr.e_ident[EI_CLASS] != ELFCLASS)
1622 {
1623 bfd_set_error (bfd_error_wrong_format);
1624 return NULL;
1625 }
1626
1627 /* Check that file's byte order matches xvec's */
1628 switch (x_ehdr.e_ident[EI_DATA])
1629 {
1630 case ELFDATA2MSB: /* Big-endian */
1631 if (! bfd_header_big_endian (templ))
1632 {
1633 bfd_set_error (bfd_error_wrong_format);
1634 return NULL;
1635 }
1636 break;
1637 case ELFDATA2LSB: /* Little-endian */
1638 if (! bfd_header_little_endian (templ))
1639 {
1640 bfd_set_error (bfd_error_wrong_format);
1641 return NULL;
1642 }
1643 break;
1644 case ELFDATANONE: /* No data encoding specified */
1645 default: /* Unknown data encoding specified */
1646 bfd_set_error (bfd_error_wrong_format);
1647 return NULL;
1648 }
1649
1650 elf_swap_ehdr_in (templ, &x_ehdr, &i_ehdr);
1651
1652 /* The file header tells where to find the program headers.
1653 These are what we use to actually choose what to read. */
1654
1655 if (i_ehdr.e_phentsize != sizeof (Elf_External_Phdr) || i_ehdr.e_phnum == 0)
1656 {
1657 bfd_set_error (bfd_error_wrong_format);
1658 return NULL;
1659 }
1660
1661 x_phdrs = (Elf_External_Phdr *)
1662 bfd_malloc (i_ehdr.e_phnum * (sizeof *x_phdrs + sizeof *i_phdrs));
1663 if (x_phdrs == NULL)
1664 {
1665 bfd_set_error (bfd_error_no_memory);
1666 return NULL;
1667 }
1668 err = target_read_memory (ehdr_vma + i_ehdr.e_phoff, (char *) x_phdrs,
1669 i_ehdr.e_phnum * sizeof x_phdrs[0]);
1670 if (err)
1671 {
1672 free (x_phdrs);
1673 bfd_set_error (bfd_error_system_call);
1674 errno = err;
1675 return NULL;
1676 }
1677 i_phdrs = (Elf_Internal_Phdr *) &x_phdrs[i_ehdr.e_phnum];
1678
1679 contents_size = 0;
1680 last_phdr = NULL;
1681 loadbase = ehdr_vma;
1682 for (i = 0; i < i_ehdr.e_phnum; ++i)
1683 {
1684 elf_swap_phdr_in (templ, &x_phdrs[i], &i_phdrs[i]);
1685 if (i_phdrs[i].p_type == PT_LOAD)
1686 {
1687 bfd_vma segment_end;
1688 segment_end = (i_phdrs[i].p_offset + i_phdrs[i].p_filesz
1689 + i_phdrs[i].p_align - 1) & -i_phdrs[i].p_align;
1690 if (segment_end > (bfd_vma) contents_size)
1691 contents_size = segment_end;
1692
1693 if ((i_phdrs[i].p_offset & -i_phdrs[i].p_align) == 0)
1694 loadbase = ehdr_vma - (i_phdrs[i].p_vaddr & -i_phdrs[i].p_align);
1695
1696 last_phdr = &i_phdrs[i];
1697 }
1698 }
1699 if (last_phdr == NULL)
1700 {
1701 /* There were no PT_LOAD segments, so we don't have anything to read. */
1702 free (x_phdrs);
1703 bfd_set_error (bfd_error_wrong_format);
1704 return NULL;
1705 }
1706
1707 /* Trim the last segment so we don't bother with zeros in the last page
1708 that are off the end of the file. However, if the extra bit in that
1709 page includes the section headers, keep them. */
1710 if ((bfd_vma) contents_size > last_phdr->p_offset + last_phdr->p_filesz
1711 && (bfd_vma) contents_size >= (i_ehdr.e_shoff
1712 + i_ehdr.e_shnum * i_ehdr.e_shentsize))
1713 {
1714 contents_size = last_phdr->p_offset + last_phdr->p_filesz;
1715 if ((bfd_vma) contents_size < (i_ehdr.e_shoff
1716 + i_ehdr.e_shnum * i_ehdr.e_shentsize))
1717 contents_size = i_ehdr.e_shoff + i_ehdr.e_shnum * i_ehdr.e_shentsize;
1718 }
1719 else
1720 contents_size = last_phdr->p_offset + last_phdr->p_filesz;
1721
1722 /* Now we know the size of the whole image we want read in. */
1723 contents = (char *) bfd_zmalloc ((bfd_size_type) contents_size);
1724 if (contents == NULL)
1725 {
1726 free (x_phdrs);
1727 bfd_set_error (bfd_error_no_memory);
1728 return NULL;
1729 }
1730
1731 for (i = 0; i < i_ehdr.e_phnum; ++i)
1732 if (i_phdrs[i].p_type == PT_LOAD)
1733 {
1734 bfd_vma start = i_phdrs[i].p_offset & -i_phdrs[i].p_align;
1735 bfd_vma end = (i_phdrs[i].p_offset + i_phdrs[i].p_filesz
1736 + i_phdrs[i].p_align - 1) & -i_phdrs[i].p_align;
1737 if (end > (bfd_vma) contents_size)
1738 end = contents_size;
1739 err = target_read_memory ((loadbase + i_phdrs[i].p_vaddr)
1740 & -i_phdrs[i].p_align,
1741 contents + start, end - start);
1742 if (err)
1743 {
1744 free (x_phdrs);
1745 free (contents);
1746 bfd_set_error (bfd_error_system_call);
1747 errno = err;
1748 return NULL;
1749 }
1750 }
1751 free (x_phdrs);
1752
1753 /* If the segments visible in memory didn't include the section headers,
1754 then clear them from the file header. */
1755 if ((bfd_vma) contents_size < (i_ehdr.e_shoff
1756 + i_ehdr.e_shnum * i_ehdr.e_shentsize))
1757 {
1758 memset (&x_ehdr.e_shoff, 0, sizeof x_ehdr.e_shoff);
1759 memset (&x_ehdr.e_shnum, 0, sizeof x_ehdr.e_shnum);
1760 memset (&x_ehdr.e_shstrndx, 0, sizeof x_ehdr.e_shstrndx);
1761 }
1762
1763 /* This will normally have been in the first PT_LOAD segment. But it
1764 conceivably could be missing, and we might have just changed it. */
1765 memcpy (contents, &x_ehdr, sizeof x_ehdr);
1766
1767 /* Now we have a memory image of the ELF file contents. Make a BFD. */
1768 bim = ((struct bfd_in_memory *)
1769 bfd_malloc ((bfd_size_type) sizeof (struct bfd_in_memory)));
1770 if (bim == NULL)
1771 {
1772 free (contents);
1773 bfd_set_error (bfd_error_no_memory);
1774 return NULL;
1775 }
1776 nbfd = _bfd_new_bfd ();
1777 if (nbfd == NULL)
1778 {
1779 free (bim);
1780 free (contents);
1781 bfd_set_error (bfd_error_no_memory);
1782 return NULL;
1783 }
1784 nbfd->filename = "<in-memory>";
1785 nbfd->xvec = templ->xvec;
1786 bim->size = contents_size;
1787 bim->buffer = contents;
1788 nbfd->iostream = (PTR) bim;
1789 nbfd->flags = BFD_IN_MEMORY;
1790 nbfd->direction = read_direction;
1791 nbfd->mtime = time (NULL);
1792 nbfd->mtime_set = TRUE;
1793
1794 if (loadbasep)
1795 *loadbasep = loadbase;
1796 return nbfd;
1797}
1798\f
252b5132
RH
1799#include "elfcore.h"
1800#include "elflink.h"
1801\f
1802/* Size-dependent data and functions. */
1803const struct elf_size_info NAME(_bfd_elf,size_info) = {
1804 sizeof (Elf_External_Ehdr),
1805 sizeof (Elf_External_Phdr),
1806 sizeof (Elf_External_Shdr),
1807 sizeof (Elf_External_Rel),
1808 sizeof (Elf_External_Rela),
1809 sizeof (Elf_External_Sym),
1810 sizeof (Elf_External_Dyn),
1811 sizeof (Elf_External_Note),
70bcb145 1812 4,
c7ac6ff8 1813 1,
45d6a902 1814 ARCH_SIZE, LOG_FILE_ALIGN,
252b5132
RH
1815 ELFCLASS, EV_CURRENT,
1816 elf_write_out_phdrs,
1817 elf_write_shdrs_and_ehdr,
b9f66672 1818 elf_write_relocs,
73ff0d56 1819 elf_swap_symbol_in,
252b5132
RH
1820 elf_swap_symbol_out,
1821 elf_slurp_reloc_table,
1822 elf_slurp_symbol_table,
c7ac6ff8
MM
1823 elf_swap_dyn_in,
1824 elf_swap_dyn_out,
947216bf
AM
1825 elf_swap_reloc_in,
1826 elf_swap_reloc_out,
1827 elf_swap_reloca_in,
1828 elf_swap_reloca_out
252b5132 1829};
This page took 0.347292 seconds and 4 git commands to generate.