* libiberty.h (xexit): Use __volatile__ to avoid losing if
[deliverable/binutils-gdb.git] / bfd / elfcode.h
CommitLineData
244ffee7 1/* ELF executable support for BFD.
b9d5cdf0 2 Copyright 1991, 1992, 1993, 1994 Free Software Foundation, Inc.
244ffee7
JK
3
4 Written by Fred Fish @ Cygnus Support, from information published
5 in "UNIX System V Release 4, Programmers Guide: ANSI C and
6 Programming Support Tools". Sufficient support for gdb.
7
8 Rewritten by Mark Eichin @ Cygnus Support, from information
9 published in "System V Application Binary Interface", chapters 4
10 and 5, as well as the various "Processor Supplement" documents
11 derived from it. Added support for assembler and other object file
12 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
13 Meissner (Open Software Foundation), and Peter Hoogenboom (University
14 of Utah) to finish and extend this.
15
16This file is part of BFD, the Binary File Descriptor library.
17
18This program is free software; you can redistribute it and/or modify
19it under the terms of the GNU General Public License as published by
20the Free Software Foundation; either version 2 of the License, or
21(at your option) any later version.
22
23This program is distributed in the hope that it will be useful,
24but WITHOUT ANY WARRANTY; without even the implied warranty of
25MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
26GNU General Public License for more details.
27
28You should have received a copy of the GNU General Public License
29along with this program; if not, write to the Free Software
30Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
31
244ffee7
JK
32/* Problems and other issues to resolve.
33
34 (1) BFD expects there to be some fixed number of "sections" in
35 the object file. I.E. there is a "section_count" variable in the
36 bfd structure which contains the number of sections. However, ELF
37 supports multiple "views" of a file. In particular, with current
38 implementations, executable files typically have two tables, a
39 program header table and a section header table, both of which
40 partition the executable.
41
42 In ELF-speak, the "linking view" of the file uses the section header
43 table to access "sections" within the file, and the "execution view"
44 uses the program header table to access "segments" within the file.
45 "Segments" typically may contain all the data from one or more
46 "sections".
47
48 Note that the section header table is optional in ELF executables,
49 but it is this information that is most useful to gdb. If the
50 section header table is missing, then gdb should probably try
51 to make do with the program header table. (FIXME)
52
6a3eb9b6
KR
53 (2) The code in this file is compiled twice, once in 32-bit mode and
54 once in 64-bit mode. More of it should be made size-independent
55 and moved into elf.c.
56
d24928c0
KR
57 (3) ELF section symbols are handled rather sloppily now. This should
58 be cleaned up, and ELF section symbols reconciled with BFD section
59 symbols.
60 */
244ffee7 61
32090b8e 62#include <assert.h>
244ffee7
JK
63#include <string.h> /* For strrchr and friends */
64#include "bfd.h"
65#include "sysdep.h"
66#include "libbfd.h"
67#include "libelf.h"
68
300adb31
KR
69#ifndef alloca
70PTR alloca ();
71#endif
72
32090b8e 73/* Renaming structures, typedefs, macros and functions to be size-specific. */
244ffee7 74#define Elf_External_Ehdr NAME(Elf,External_Ehdr)
244ffee7 75#define Elf_External_Sym NAME(Elf,External_Sym)
244ffee7 76#define Elf_External_Shdr NAME(Elf,External_Shdr)
244ffee7 77#define Elf_External_Phdr NAME(Elf,External_Phdr)
244ffee7
JK
78#define Elf_External_Rel NAME(Elf,External_Rel)
79#define Elf_External_Rela NAME(Elf,External_Rela)
244ffee7 80
244ffee7
JK
81#define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
82#define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
83#define elf_core_file_matches_executable_p NAME(bfd_elf,core_file_matches_executable_p)
84#define elf_object_p NAME(bfd_elf,object_p)
85#define elf_core_file_p NAME(bfd_elf,core_file_p)
244ffee7
JK
86#define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
87#define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
88#define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
89#define elf_get_symtab NAME(bfd_elf,get_symtab)
90#define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
91#define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
92#define elf_print_symbol NAME(bfd_elf,print_symbol)
93#define elf_get_lineno NAME(bfd_elf,get_lineno)
94#define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
95#define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
96#define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
97#define elf_set_section_contents NAME(bfd_elf,set_section_contents)
98#define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
99#define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
fce36137 100#define elf_new_section_hook NAME(bfd_elf,new_section_hook)
32090b8e 101#define write_relocs NAME(bfd_elf,_write_relocs)
f035cc47 102#define elf_find_section NAME(bfd_elf,find_section)
244ffee7 103
6a3eb9b6
KR
104#if ARCH_SIZE == 64
105#define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
106#define ELF_R_SYM(X) ELF64_R_SYM(X)
32090b8e 107#define ELFCLASS ELFCLASS64
f035cc47 108#define FILE_ALIGN 8
6a3eb9b6
KR
109#endif
110#if ARCH_SIZE == 32
111#define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
112#define ELF_R_SYM(X) ELF32_R_SYM(X)
32090b8e 113#define ELFCLASS ELFCLASS32
f035cc47 114#define FILE_ALIGN 4
244ffee7
JK
115#endif
116
32090b8e
KR
117static int shstrtab_length_fixed;
118
119struct elf_sect_data {
120 int reloc_sec;
121 /* more? */
122};
123
244ffee7
JK
124/* Forward declarations of static functions */
125
244ffee7
JK
126static struct sec * section_from_elf_index PARAMS ((bfd *, int));
127
128static int elf_section_from_bfd_section PARAMS ((bfd *, struct sec *));
129
130static boolean elf_slurp_symbol_table PARAMS ((bfd *, asymbol **));
131
244ffee7
JK
132static int elf_symbol_from_bfd_symbol PARAMS ((bfd *,
133 struct symbol_cache_entry **));
134
9783e04a 135static boolean elf_map_symbols PARAMS ((bfd *));
b9d5cdf0 136static boolean swap_out_syms PARAMS ((bfd *));
244ffee7 137
6a3eb9b6
KR
138#ifdef DEBUG
139static void elf_debug_section PARAMS ((char *, int, Elf_Internal_Shdr *));
140static void elf_debug_file PARAMS ((Elf_Internal_Ehdr *));
141#endif
238ac6ec 142
32090b8e
KR
143#define elf_string_from_elf_strtab(abfd,strindex) \
144 elf_string_from_elf_section(abfd,elf_elfheader(abfd)->e_shstrndx,strindex)
145
146\f
147/* Structure swapping routines */
148
6a3eb9b6
KR
149/* Should perhaps use put_offset, put_word, etc. For now, the two versions
150 can be handled by explicitly specifying 32 bits or "the long type". */
238ac6ec
KR
151#if ARCH_SIZE == 64
152#define put_word bfd_h_put_64
153#define get_word bfd_h_get_64
154#endif
155#if ARCH_SIZE == 32
156#define put_word bfd_h_put_32
157#define get_word bfd_h_get_32
158#endif
159
244ffee7
JK
160/* Translate an ELF symbol in external format into an ELF symbol in internal
161 format. */
162
163static void
164DEFUN (elf_swap_symbol_in, (abfd, src, dst),
165 bfd * abfd AND
166 Elf_External_Sym * src AND
167 Elf_Internal_Sym * dst)
168{
169 dst->st_name = bfd_h_get_32 (abfd, (bfd_byte *) src->st_name);
238ac6ec
KR
170 dst->st_value = get_word (abfd, (bfd_byte *) src->st_value);
171 dst->st_size = get_word (abfd, (bfd_byte *) src->st_size);
244ffee7
JK
172 dst->st_info = bfd_h_get_8 (abfd, (bfd_byte *) src->st_info);
173 dst->st_other = bfd_h_get_8 (abfd, (bfd_byte *) src->st_other);
174 dst->st_shndx = bfd_h_get_16 (abfd, (bfd_byte *) src->st_shndx);
175}
176
177/* Translate an ELF symbol in internal format into an ELF symbol in external
178 format. */
179
180static void
181DEFUN (elf_swap_symbol_out, (abfd, src, dst),
182 bfd * abfd AND
183 Elf_Internal_Sym * src AND
184 Elf_External_Sym * dst)
185{
186 bfd_h_put_32 (abfd, src->st_name, dst->st_name);
238ac6ec
KR
187 put_word (abfd, src->st_value, dst->st_value);
188 put_word (abfd, src->st_size, dst->st_size);
244ffee7
JK
189 bfd_h_put_8 (abfd, src->st_info, dst->st_info);
190 bfd_h_put_8 (abfd, src->st_other, dst->st_other);
191 bfd_h_put_16 (abfd, src->st_shndx, dst->st_shndx);
192}
193
194
195/* Translate an ELF file header in external format into an ELF file header in
196 internal format. */
197
198static void
199DEFUN (elf_swap_ehdr_in, (abfd, src, dst),
200 bfd * abfd AND
201 Elf_External_Ehdr * src AND
202 Elf_Internal_Ehdr * dst)
203{
204 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
205 dst->e_type = bfd_h_get_16 (abfd, (bfd_byte *) src->e_type);
206 dst->e_machine = bfd_h_get_16 (abfd, (bfd_byte *) src->e_machine);
207 dst->e_version = bfd_h_get_32 (abfd, (bfd_byte *) src->e_version);
238ac6ec
KR
208 dst->e_entry = get_word (abfd, (bfd_byte *) src->e_entry);
209 dst->e_phoff = get_word (abfd, (bfd_byte *) src->e_phoff);
210 dst->e_shoff = get_word (abfd, (bfd_byte *) src->e_shoff);
244ffee7
JK
211 dst->e_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->e_flags);
212 dst->e_ehsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_ehsize);
213 dst->e_phentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phentsize);
214 dst->e_phnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phnum);
215 dst->e_shentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shentsize);
216 dst->e_shnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shnum);
217 dst->e_shstrndx = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shstrndx);
218}
219
220/* Translate an ELF file header in internal format into an ELF file header in
221 external format. */
222
223static void
224DEFUN (elf_swap_ehdr_out, (abfd, src, dst),
225 bfd * abfd AND
226 Elf_Internal_Ehdr * src AND
227 Elf_External_Ehdr * dst)
228{
229 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
230 /* note that all elements of dst are *arrays of unsigned char* already... */
231 bfd_h_put_16 (abfd, src->e_type, dst->e_type);
232 bfd_h_put_16 (abfd, src->e_machine, dst->e_machine);
233 bfd_h_put_32 (abfd, src->e_version, dst->e_version);
238ac6ec
KR
234 put_word (abfd, src->e_entry, dst->e_entry);
235 put_word (abfd, src->e_phoff, dst->e_phoff);
236 put_word (abfd, src->e_shoff, dst->e_shoff);
244ffee7
JK
237 bfd_h_put_32 (abfd, src->e_flags, dst->e_flags);
238 bfd_h_put_16 (abfd, src->e_ehsize, dst->e_ehsize);
239 bfd_h_put_16 (abfd, src->e_phentsize, dst->e_phentsize);
240 bfd_h_put_16 (abfd, src->e_phnum, dst->e_phnum);
241 bfd_h_put_16 (abfd, src->e_shentsize, dst->e_shentsize);
242 bfd_h_put_16 (abfd, src->e_shnum, dst->e_shnum);
243 bfd_h_put_16 (abfd, src->e_shstrndx, dst->e_shstrndx);
244}
245
246
247/* Translate an ELF section header table entry in external format into an
248 ELF section header table entry in internal format. */
249
250static void
251DEFUN (elf_swap_shdr_in, (abfd, src, dst),
252 bfd * abfd AND
253 Elf_External_Shdr * src AND
254 Elf_Internal_Shdr * dst)
255{
256 dst->sh_name = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_name);
257 dst->sh_type = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_type);
238ac6ec
KR
258 dst->sh_flags = get_word (abfd, (bfd_byte *) src->sh_flags);
259 dst->sh_addr = get_word (abfd, (bfd_byte *) src->sh_addr);
260 dst->sh_offset = get_word (abfd, (bfd_byte *) src->sh_offset);
261 dst->sh_size = get_word (abfd, (bfd_byte *) src->sh_size);
244ffee7
JK
262 dst->sh_link = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_link);
263 dst->sh_info = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_info);
238ac6ec
KR
264 dst->sh_addralign = get_word (abfd, (bfd_byte *) src->sh_addralign);
265 dst->sh_entsize = get_word (abfd, (bfd_byte *) src->sh_entsize);
244ffee7
JK
266 /* we haven't done any processing on it yet, so... */
267 dst->rawdata = (void *) 0;
268}
269
270/* Translate an ELF section header table entry in internal format into an
271 ELF section header table entry in external format. */
272
273static void
274DEFUN (elf_swap_shdr_out, (abfd, src, dst),
275 bfd * abfd AND
276 Elf_Internal_Shdr * src AND
277 Elf_External_Shdr * dst)
278{
279 /* note that all elements of dst are *arrays of unsigned char* already... */
280 bfd_h_put_32 (abfd, src->sh_name, dst->sh_name);
281 bfd_h_put_32 (abfd, src->sh_type, dst->sh_type);
238ac6ec
KR
282 put_word (abfd, src->sh_flags, dst->sh_flags);
283 put_word (abfd, src->sh_addr, dst->sh_addr);
284 put_word (abfd, src->sh_offset, dst->sh_offset);
285 put_word (abfd, src->sh_size, dst->sh_size);
244ffee7
JK
286 bfd_h_put_32 (abfd, src->sh_link, dst->sh_link);
287 bfd_h_put_32 (abfd, src->sh_info, dst->sh_info);
238ac6ec
KR
288 put_word (abfd, src->sh_addralign, dst->sh_addralign);
289 put_word (abfd, src->sh_entsize, dst->sh_entsize);
244ffee7
JK
290}
291
292
293/* Translate an ELF program header table entry in external format into an
294 ELF program header table entry in internal format. */
295
296static void
297DEFUN (elf_swap_phdr_in, (abfd, src, dst),
298 bfd * abfd AND
299 Elf_External_Phdr * src AND
300 Elf_Internal_Phdr * dst)
301{
302 dst->p_type = bfd_h_get_32 (abfd, (bfd_byte *) src->p_type);
244ffee7 303 dst->p_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->p_flags);
238ac6ec
KR
304 dst->p_offset = get_word (abfd, (bfd_byte *) src->p_offset);
305 dst->p_vaddr = get_word (abfd, (bfd_byte *) src->p_vaddr);
306 dst->p_paddr = get_word (abfd, (bfd_byte *) src->p_paddr);
307 dst->p_filesz = get_word (abfd, (bfd_byte *) src->p_filesz);
308 dst->p_memsz = get_word (abfd, (bfd_byte *) src->p_memsz);
309 dst->p_align = get_word (abfd, (bfd_byte *) src->p_align);
244ffee7
JK
310}
311
244ffee7
JK
312static void
313DEFUN (elf_swap_phdr_out, (abfd, src, dst),
314 bfd * abfd AND
315 Elf_Internal_Phdr * src AND
316 Elf_External_Phdr * dst)
317{
318 /* note that all elements of dst are *arrays of unsigned char* already... */
319 bfd_h_put_32 (abfd, src->p_type, dst->p_type);
94dbb655
KR
320 put_word (abfd, src->p_offset, dst->p_offset);
321 put_word (abfd, src->p_vaddr, dst->p_vaddr);
322 put_word (abfd, src->p_paddr, dst->p_paddr);
323 put_word (abfd, src->p_filesz, dst->p_filesz);
324 put_word (abfd, src->p_memsz, dst->p_memsz);
244ffee7 325 bfd_h_put_32 (abfd, src->p_flags, dst->p_flags);
94dbb655 326 put_word (abfd, src->p_align, dst->p_align);
244ffee7
JK
327}
328
329/* Translate an ELF reloc from external format to internal format. */
32090b8e 330static INLINE void
244ffee7
JK
331DEFUN (elf_swap_reloc_in, (abfd, src, dst),
332 bfd * abfd AND
333 Elf_External_Rel * src AND
334 Elf_Internal_Rel * dst)
335{
94dbb655
KR
336 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
337 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
244ffee7
JK
338}
339
32090b8e 340static INLINE void
244ffee7
JK
341DEFUN (elf_swap_reloca_in, (abfd, src, dst),
342 bfd * abfd AND
343 Elf_External_Rela * src AND
344 Elf_Internal_Rela * dst)
345{
94dbb655
KR
346 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
347 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
348 dst->r_addend = get_word (abfd, (bfd_byte *) src->r_addend);
244ffee7
JK
349}
350
351/* Translate an ELF reloc from internal format to external format. */
32090b8e 352static INLINE void
244ffee7
JK
353DEFUN (elf_swap_reloc_out, (abfd, src, dst),
354 bfd * abfd AND
355 Elf_Internal_Rel * src AND
356 Elf_External_Rel * dst)
357{
94dbb655
KR
358 put_word (abfd, src->r_offset, dst->r_offset);
359 put_word (abfd, src->r_info, dst->r_info);
244ffee7
JK
360}
361
32090b8e 362static INLINE void
244ffee7
JK
363DEFUN (elf_swap_reloca_out, (abfd, src, dst),
364 bfd * abfd AND
365 Elf_Internal_Rela * src AND
366 Elf_External_Rela * dst)
367{
94dbb655
KR
368 put_word (abfd, src->r_offset, dst->r_offset);
369 put_word (abfd, src->r_info, dst->r_info);
370 put_word (abfd, src->r_addend, dst->r_addend);
244ffee7
JK
371}
372
32090b8e
KR
373\f
374
375/* String table creation/manipulation routines */
376
377static struct strtab *
378DEFUN (bfd_new_strtab, (abfd),
379 bfd * abfd)
380{
381 struct strtab *ss;
382
b9d5cdf0
DM
383 ss = (struct strtab *) malloc (sizeof (struct strtab));
384 if (!ss)
385 {
386 bfd_error = no_memory;
387 return NULL;
388 }
389 ss->tab = malloc (1);
390 if (!ss->tab)
391 {
392 bfd_error = no_memory;
393 return NULL;
394 }
32090b8e
KR
395 *ss->tab = 0;
396 ss->nentries = 0;
397 ss->length = 1;
244ffee7 398
32090b8e
KR
399 return ss;
400}
401
402static int
403DEFUN (bfd_add_to_strtab, (abfd, ss, str),
404 bfd * abfd AND
405 struct strtab *ss AND
406 CONST char *str)
407{
408 /* should search first, but for now: */
409 /* include the trailing NUL */
410 int ln = strlen (str) + 1;
411
412 /* should this be using obstacks? */
413 ss->tab = realloc (ss->tab, ss->length + ln);
414
9783e04a 415 BFD_ASSERT (ss->tab != 0); /* FIXME */
32090b8e
KR
416 strcpy (ss->tab + ss->length, str);
417 ss->nentries++;
418 ss->length += ln;
419
420 return ss->length - ln;
421}
422
423static int
424DEFUN (bfd_add_2_to_strtab, (abfd, ss, str, str2),
425 bfd * abfd AND
426 struct strtab *ss AND
427 char *str AND
428 CONST char *str2)
244ffee7 429{
32090b8e
KR
430 /* should search first, but for now: */
431 /* include the trailing NUL */
432 int ln = strlen (str) + strlen (str2) + 1;
433
434 /* should this be using obstacks? */
435 if (ss->length)
436 ss->tab = realloc (ss->tab, ss->length + ln);
437 else
b9d5cdf0 438 ss->tab = malloc (ln);
32090b8e 439
9783e04a 440 BFD_ASSERT (ss->tab != 0); /* FIXME */
32090b8e
KR
441 strcpy (ss->tab + ss->length, str);
442 strcpy (ss->tab + ss->length + strlen (str), str2);
443 ss->nentries++;
444 ss->length += ln;
445
446 return ss->length - ln;
244ffee7
JK
447}
448
32090b8e
KR
449\f
450/* ELF .o/exec file reading */
451
452/* Create a new bfd section from an ELF section header. */
453
244ffee7
JK
454static boolean
455DEFUN (bfd_section_from_shdr, (abfd, shindex),
456 bfd * abfd AND
457 unsigned int shindex)
458{
32090b8e
KR
459 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
460 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
244ffee7
JK
461 asection *newsect;
462 char *name;
463
464 name = elf_string_from_elf_strtab (abfd, hdr->sh_name);
465
466 switch (hdr->sh_type)
467 {
468
469 case SHT_NULL:
470 /* inactive section. Throw it away. */
471 return true;
472
473 case SHT_PROGBITS:
474 /* Bits that get saved. This one is real. */
475 if (!hdr->rawdata)
476 {
477 newsect = bfd_make_section (abfd, name);
478 if (newsect != NULL)
479 {
32090b8e
KR
480 newsect->filepos = hdr->sh_offset; /* so we can read back the bits */
481 newsect->flags |= SEC_HAS_CONTENTS;
244ffee7
JK
482 newsect->vma = hdr->sh_addr;
483 newsect->_raw_size = hdr->sh_size;
6a3eb9b6 484 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
244ffee7
JK
485
486 if (hdr->sh_flags & SHF_ALLOC)
487 {
488 newsect->flags |= SEC_ALLOC;
489 newsect->flags |= SEC_LOAD;
490 }
491
492 if (!(hdr->sh_flags & SHF_WRITE))
493 newsect->flags |= SEC_READONLY;
494
495 if (hdr->sh_flags & SHF_EXECINSTR)
32090b8e 496 newsect->flags |= SEC_CODE; /* FIXME: may only contain SOME code */
36d541b1 497 else if (newsect->flags & SEC_ALLOC)
244ffee7
JK
498 newsect->flags |= SEC_DATA;
499
d6e5f950
ILT
500 /* The debugging sections appear to recognized only by
501 name. */
502 if (strncmp (name, ".debug", sizeof ".debug" - 1) == 0
503 || strncmp (name, ".line", sizeof ".line" - 1) == 0
504 || strncmp (name, ".stab", sizeof ".stab" - 1) == 0)
505 newsect->flags |= SEC_DEBUGGING;
506
244ffee7
JK
507 hdr->rawdata = (void *) newsect;
508 }
94dbb655
KR
509 else
510 hdr->rawdata = (void *) bfd_get_section_by_name (abfd, name);
244ffee7
JK
511 }
512 return true;
513
514 case SHT_NOBITS:
515 /* Bits that get saved. This one is real. */
516 if (!hdr->rawdata)
517 {
518 newsect = bfd_make_section (abfd, name);
519 if (newsect != NULL)
520 {
521 newsect->vma = hdr->sh_addr;
522 newsect->_raw_size = hdr->sh_size;
523 newsect->filepos = hdr->sh_offset; /* fake */
6a3eb9b6 524 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
244ffee7
JK
525 if (hdr->sh_flags & SHF_ALLOC)
526 newsect->flags |= SEC_ALLOC;
527
528 if (!(hdr->sh_flags & SHF_WRITE))
529 newsect->flags |= SEC_READONLY;
530
36d541b1
ILT
531 /* FIXME: This section is empty. Does it really make
532 sense to set SEC_CODE for it? */
244ffee7
JK
533 if (hdr->sh_flags & SHF_EXECINSTR)
534 newsect->flags |= SEC_CODE; /* FIXME: may only contain SOME code */
244ffee7
JK
535
536 hdr->rawdata = (void *) newsect;
537 }
538 }
539 return true;
540
541 case SHT_SYMTAB: /* A symbol table */
32090b8e
KR
542 if (elf_onesymtab (abfd) == shindex)
543 return true;
544
244ffee7 545 BFD_ASSERT (hdr->sh_entsize == sizeof (Elf_External_Sym));
32090b8e 546 BFD_ASSERT (elf_onesymtab (abfd) == 0);
244ffee7 547 elf_onesymtab (abfd) = shindex;
32090b8e
KR
548 elf_tdata(abfd)->symtab_hdr = *hdr;
549 elf_elfsections(abfd)[shindex] = &elf_tdata(abfd)->symtab_hdr;
244ffee7
JK
550 abfd->flags |= HAS_SYMS;
551 return true;
552
553 case SHT_STRTAB: /* A string table */
32090b8e 554 if (hdr->rawdata)
fce36137 555 return true;
32090b8e
KR
556 if (ehdr->e_shstrndx == shindex)
557 {
558 elf_tdata(abfd)->shstrtab_hdr = *hdr;
559 elf_elfsections(abfd)[shindex] = &elf_tdata(abfd)->shstrtab_hdr;
560 hdr->rawdata = (PTR) &elf_tdata(abfd)->shstrtab_hdr;
561 return true;
562 }
563 {
564 int i;
fce36137 565
32090b8e
KR
566 for (i = 1; i < ehdr->e_shnum; i++)
567 {
568 Elf_Internal_Shdr *hdr2 = elf_elfsections(abfd)[i];
569 if (hdr2->sh_link == shindex)
570 {
571 bfd_section_from_shdr (abfd, i);
572 if (elf_onesymtab (abfd) == i)
573 {
574 elf_tdata(abfd)->strtab_hdr = *hdr;
575 elf_elfsections(abfd)[shindex] = &elf_tdata(abfd)->strtab_hdr;
576 return true;
577 }
578#if 0 /* Not handling other string tables specially right now. */
579 hdr2 = elf_elfsections(abfd)[i]; /* in case it moved */
580 /* We have a strtab for some random other section. */
581 newsect = (asection *) hdr2->rawdata;
582 if (!newsect)
583 break;
584 hdr->rawdata = (PTR) newsect;
585 hdr2 = &elf_section_data (newsect)->str_hdr;
586 *hdr2 = *hdr;
587 elf_elfsections(abfd)[shindex] = hdr2;
588#endif
589 }
590 }
591 }
592
593 newsect = bfd_make_section (abfd, name);
594 if (newsect)
fce36137 595 {
32090b8e
KR
596 newsect->flags = SEC_HAS_CONTENTS;
597 hdr->rawdata = (PTR) newsect;
598 newsect->_raw_size = hdr->sh_size;
9783e04a
DM
599 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
600 newsect->vma = hdr->sh_addr;
f035cc47 601 newsect->filepos = hdr->sh_offset;
32090b8e
KR
602
603 if (hdr->sh_flags & SHF_ALLOC)
604 newsect->flags |= SEC_ALLOC|SEC_LOAD;
605 if (!(hdr->sh_flags & SHF_WRITE))
606 newsect->flags |= SEC_READONLY;
607 if (hdr->sh_flags & SHF_EXECINSTR)
608 newsect->flags |= SEC_CODE;
36d541b1 609 else if (newsect->flags & SEC_ALLOC)
32090b8e 610 newsect->flags |= SEC_DATA;
01383fb4
KR
611
612 /* Check for debugging string tables. */
613 if (strncmp (name, ".debug", sizeof ".debug" - 1) == 0
614 || strncmp (name, ".stab", sizeof ".stab" - 1) == 0)
615 newsect->flags |= SEC_DEBUGGING;
fce36137
KR
616 }
617
244ffee7
JK
618 return true;
619
620 case SHT_REL:
621 case SHT_RELA:
32090b8e
KR
622 /* *These* do a lot of work -- but build no sections!
623 The spec says there can be multiple strtabs, but only one symtab,
624 but there can be lots of REL* sections. */
244ffee7 625 /* FIXME: The above statement is wrong! There are typically at least
32090b8e
KR
626 two symbol tables in a dynamically linked executable, ".dynsym"
627 which is the dynamic linkage symbol table and ".symtab", which is
628 the "traditional" symbol table. -fnf */
244ffee7
JK
629
630 {
631 asection *target_sect;
32090b8e 632 Elf_Internal_Shdr *hdr2;
244ffee7
JK
633 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
634
635 /* Don't allow REL relocations on a machine that uses RELA and
636 vice versa. */
637 /* @@ Actually, the generic ABI does suggest that both might be
638 used in one file. But the four ABI Processor Supplements I
639 have access to right now all specify that only one is used on
640 each of those architectures. It's conceivable that, e.g., a
641 bunch of absolute 32-bit relocs might be more compact in REL
642 form even on a RELA machine... */
643 BFD_ASSERT (!(use_rela_p && (hdr->sh_type == SHT_REL)));
644 BFD_ASSERT (!(!use_rela_p && (hdr->sh_type == SHT_RELA)));
645 BFD_ASSERT (hdr->sh_entsize ==
646 (use_rela_p
6a3eb9b6
KR
647 ? sizeof (Elf_External_Rela)
648 : sizeof (Elf_External_Rel)));
244ffee7 649
244ffee7 650 bfd_section_from_shdr (abfd, hdr->sh_info); /* target */
32090b8e 651 bfd_section_from_shdr (abfd, hdr->sh_link); /* symbol table */
244ffee7 652 target_sect = section_from_elf_index (abfd, hdr->sh_info);
062189c6
ILT
653 if (target_sect == NULL
654 || elf_section_data (target_sect) == NULL)
244ffee7
JK
655 return false;
656
32090b8e
KR
657 hdr2 = &elf_section_data (target_sect)->rel_hdr;
658 *hdr2 = *hdr;
659 elf_elfsections(abfd)[shindex] = hdr2;
244ffee7
JK
660 target_sect->reloc_count = hdr->sh_size / hdr->sh_entsize;
661 target_sect->flags |= SEC_RELOC;
662 target_sect->relocation = 0;
663 target_sect->rel_filepos = hdr->sh_offset;
32090b8e 664 abfd->flags |= HAS_RELOC;
244ffee7
JK
665 return true;
666 }
667 break;
668
669 case SHT_HASH:
670 case SHT_DYNAMIC:
671 case SHT_DYNSYM: /* could treat this like symtab... */
672#if 0
673 fprintf (stderr, "Dynamic Linking sections not yet supported.\n");
674 BFD_FAIL ();
675#endif
676 break;
677
678 case SHT_NOTE:
679#if 0
680 fprintf (stderr, "Note Sections not yet supported.\n");
681 BFD_FAIL ();
682#endif
683 break;
684
685 case SHT_SHLIB:
686#if 0
687 fprintf (stderr, "SHLIB Sections not supported (and non conforming.)\n");
688#endif
689 return true;
690
691 default:
e621c5cc
ILT
692 /* Check for any processor-specific section types. */
693 {
694 struct elf_backend_data *bed = get_elf_backend_data (abfd);
695
696 if (bed->elf_backend_section_from_shdr)
697 (*bed->elf_backend_section_from_shdr) (abfd, hdr, name);
698 }
244ffee7
JK
699 break;
700 }
701
702 return true;
703}
704
fce36137
KR
705boolean
706DEFUN (elf_new_section_hook, (abfd, sec),
707 bfd *abfd
708 AND asection *sec)
709{
32090b8e 710 struct bfd_elf_section_data *sdata;
300adb31
KR
711
712 sdata = (struct bfd_elf_section_data *) bfd_alloc (abfd, sizeof (*sdata));
9783e04a
DM
713 if (!sdata)
714 {
715 bfd_error = no_memory;
716 return false;
717 }
300adb31 718 sec->used_by_bfd = (PTR) sdata;
32090b8e 719 memset (sdata, 0, sizeof (*sdata));
244ffee7
JK
720 return true;
721}
722
723/* Create a new bfd section from an ELF program header.
724
725 Since program segments have no names, we generate a synthetic name
726 of the form segment<NUM>, where NUM is generally the index in the
727 program header table. For segments that are split (see below) we
728 generate the names segment<NUM>a and segment<NUM>b.
729
730 Note that some program segments may have a file size that is different than
731 (less than) the memory size. All this means is that at execution the
732 system must allocate the amount of memory specified by the memory size,
733 but only initialize it with the first "file size" bytes read from the
734 file. This would occur for example, with program segments consisting
735 of combined data+bss.
736
737 To handle the above situation, this routine generates TWO bfd sections
738 for the single program segment. The first has the length specified by
739 the file size of the segment, and the second has the length specified
740 by the difference between the two sizes. In effect, the segment is split
741 into it's initialized and uninitialized parts.
742
743 */
744
745static boolean
746DEFUN (bfd_section_from_phdr, (abfd, hdr, index),
747 bfd * abfd AND
748 Elf_Internal_Phdr * hdr AND
749 int index)
750{
751 asection *newsect;
752 char *name;
753 char namebuf[64];
754 int split;
755
756 split = ((hdr->p_memsz > 0) &&
757 (hdr->p_filesz > 0) &&
758 (hdr->p_memsz > hdr->p_filesz));
759 sprintf (namebuf, split ? "segment%da" : "segment%d", index);
760 name = bfd_alloc (abfd, strlen (namebuf) + 1);
9783e04a
DM
761 if (!name)
762 {
763 bfd_error = no_memory;
764 return false;
765 }
244ffee7
JK
766 strcpy (name, namebuf);
767 newsect = bfd_make_section (abfd, name);
768 newsect->vma = hdr->p_vaddr;
769 newsect->_raw_size = hdr->p_filesz;
770 newsect->filepos = hdr->p_offset;
771 newsect->flags |= SEC_HAS_CONTENTS;
772 if (hdr->p_type == PT_LOAD)
773 {
774 newsect->flags |= SEC_ALLOC;
775 newsect->flags |= SEC_LOAD;
776 if (hdr->p_flags & PF_X)
777 {
778 /* FIXME: all we known is that it has execute PERMISSION,
779 may be data. */
780 newsect->flags |= SEC_CODE;
781 }
782 }
783 if (!(hdr->p_flags & PF_W))
784 {
785 newsect->flags |= SEC_READONLY;
786 }
787
788 if (split)
789 {
790 sprintf (namebuf, "segment%db", index);
791 name = bfd_alloc (abfd, strlen (namebuf) + 1);
9783e04a
DM
792 if (!name)
793 {
794 bfd_error = no_memory;
795 return false;
796 }
244ffee7
JK
797 strcpy (name, namebuf);
798 newsect = bfd_make_section (abfd, name);
799 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
800 newsect->_raw_size = hdr->p_memsz - hdr->p_filesz;
801 if (hdr->p_type == PT_LOAD)
802 {
803 newsect->flags |= SEC_ALLOC;
804 if (hdr->p_flags & PF_X)
805 newsect->flags |= SEC_CODE;
806 }
807 if (!(hdr->p_flags & PF_W))
808 newsect->flags |= SEC_READONLY;
809 }
810
811 return true;
812}
813
32090b8e 814/* Begin processing a given object.
244ffee7 815
32090b8e
KR
816 First we validate the file by reading in the ELF header and checking
817 the magic number. */
818
819static INLINE boolean
820DEFUN (elf_file_p, (x_ehdrp), Elf_External_Ehdr * x_ehdrp)
244ffee7 821{
32090b8e
KR
822 return ((x_ehdrp->e_ident[EI_MAG0] == ELFMAG0)
823 && (x_ehdrp->e_ident[EI_MAG1] == ELFMAG1)
824 && (x_ehdrp->e_ident[EI_MAG2] == ELFMAG2)
825 && (x_ehdrp->e_ident[EI_MAG3] == ELFMAG3));
826}
244ffee7 827
d24928c0
KR
828/* Check to see if the file associated with ABFD matches the target vector
829 that ABFD points to.
830
831 Note that we may be called several times with the same ABFD, but different
832 target vectors, most of which will not match. We have to avoid leaving
833 any side effects in ABFD, or any data it points to (like tdata), if the
834 file does not match the target vector.
835
836 FIXME: There is memory leak if we are called more than once with the same
837 ABFD, and that bfd already has tdata allocated, since we allocate more tdata
838 and the old tdata is orphaned. Since it's in the bfd obstack, there isn't
01383fb4 839 much we can do about this except possibly rewrite the code. There are
d24928c0
KR
840 also other bfd_allocs that may be the source of memory leaks as well. */
841
32090b8e
KR
842bfd_target *
843DEFUN (elf_object_p, (abfd), bfd * abfd)
244ffee7 844{
32090b8e
KR
845 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
846 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
847 Elf_External_Shdr x_shdr; /* Section header table entry, external form */
848 Elf_Internal_Shdr *i_shdrp; /* Section header table, internal form */
849 int shindex;
850 char *shstrtab; /* Internal copy of section header stringtab */
062189c6 851 struct elf_backend_data *ebd;
d24928c0 852 struct elf_obj_tdata *preserved_tdata = elf_tdata (abfd);
244ffee7 853
32090b8e
KR
854 /* Read in the ELF header in external format. */
855
856 if (bfd_read ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd) != sizeof (x_ehdr))
d24928c0 857 goto got_system_call_error;
244ffee7 858
32090b8e
KR
859 /* Now check to see if we have a valid ELF file, and one that BFD can
860 make use of. The magic number must match, the address size ('class')
861 and byte-swapping must match our XVEC entry, and it must have a
862 section header table (FIXME: See comments re sections at top of this
863 file). */
244ffee7 864
d24928c0
KR
865 if ((elf_file_p (&x_ehdr) == false) ||
866 (x_ehdr.e_ident[EI_VERSION] != EV_CURRENT) ||
867 (x_ehdr.e_ident[EI_CLASS] != ELFCLASS))
868 goto got_wrong_format_error;
244ffee7 869
d24928c0 870 /* Check that file's byte order matches xvec's */
32090b8e 871 switch (x_ehdr.e_ident[EI_DATA])
244ffee7 872 {
32090b8e
KR
873 case ELFDATA2MSB: /* Big-endian */
874 if (!abfd->xvec->header_byteorder_big_p)
d24928c0 875 goto got_wrong_format_error;
32090b8e
KR
876 break;
877 case ELFDATA2LSB: /* Little-endian */
878 if (abfd->xvec->header_byteorder_big_p)
d24928c0 879 goto got_wrong_format_error;
32090b8e
KR
880 break;
881 case ELFDATANONE: /* No data encoding specified */
882 default: /* Unknown data encoding specified */
d24928c0 883 goto got_wrong_format_error;
244ffee7 884 }
244ffee7 885
32090b8e 886 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
d24928c0 887 the tdata pointer in the bfd. FIXME: memory leak, see above. */
244ffee7 888
d24928c0
KR
889 elf_tdata (abfd) =
890 (struct elf_obj_tdata *) bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
891 if (elf_tdata (abfd) == NULL)
892 goto got_no_memory_error;
244ffee7 893
32090b8e
KR
894 /* Now that we know the byte order, swap in the rest of the header */
895 i_ehdrp = elf_elfheader (abfd);
896 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
897#if DEBUG & 1
898 elf_debug_file (i_ehdrp);
244ffee7
JK
899#endif
900
32090b8e
KR
901 /* If there is no section header table, we're hosed. */
902 if (i_ehdrp->e_shoff == 0)
d24928c0 903 goto got_wrong_format_error;
244ffee7 904
062189c6
ILT
905 /* As a simple sanity check, verify that the what BFD thinks is the
906 size of each section header table entry actually matches the size
907 recorded in the file. */
908 if (i_ehdrp->e_shentsize != sizeof (x_shdr))
909 goto got_wrong_format_error;
910
911 ebd = get_elf_backend_data (abfd);
912
913 /* Check that the ELF e_machine field matches what this particular
914 BFD format expects. */
915 if (ebd->elf_machine_code != i_ehdrp->e_machine)
916 {
917 bfd_target **target_ptr;
918
919 if (ebd->elf_machine_code != EM_NONE)
920 goto got_wrong_format_error;
921
922 /* This is the generic ELF target. Let it match any ELF target
923 for which we do not have a specific backend. */
f4bd7a8f 924 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
062189c6
ILT
925 {
926 struct elf_backend_data *back;
927
928 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
929 continue;
930 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
931 if (back->elf_machine_code == i_ehdrp->e_machine)
932 {
933 /* target_ptr is an ELF backend which matches this
934 object file, so reject the generic ELF target. */
935 goto got_wrong_format_error;
936 }
937 }
938 }
939
940
941 /* Set the flags and architecture before calling the backend so that
942 it can override them. */
7b8106b4 943 if (i_ehdrp->e_type == ET_EXEC)
32090b8e 944 abfd->flags |= EXEC_P;
7b8106b4
ILT
945 else if (i_ehdrp->e_type == ET_DYN)
946 abfd->flags |= DYNAMIC;
244ffee7 947
062189c6 948 bfd_default_set_arch_mach (abfd, ebd->arch, 0);
32090b8e 949
062189c6
ILT
950 /* Remember the entry point specified in the ELF file header. */
951 bfd_get_start_address (abfd) = i_ehdrp->e_entry;
32090b8e 952
062189c6
ILT
953 /* Let the backend double check the format and override global
954 information. */
955 if (ebd->elf_backend_object_p)
956 {
957 if ((*ebd->elf_backend_object_p) (abfd) == false)
958 goto got_wrong_format_error;
959 }
960
32090b8e
KR
961 /* Allocate space for a copy of the section header table in
962 internal form, seek to the section header table in the file,
062189c6 963 read it in, and convert it to internal form. */
32090b8e
KR
964 i_shdrp = (Elf_Internal_Shdr *)
965 bfd_alloc (abfd, sizeof (*i_shdrp) * i_ehdrp->e_shnum);
300adb31
KR
966 elf_elfsections (abfd) =
967 (Elf_Internal_Shdr **) bfd_alloc (abfd, sizeof (i_shdrp) * i_ehdrp->e_shnum);
32090b8e 968 if (!i_shdrp || !elf_elfsections(abfd))
d24928c0 969 goto got_no_memory_error;
32090b8e 970 if (bfd_seek (abfd, i_ehdrp->e_shoff, SEEK_SET) == -1)
d24928c0 971 goto got_system_call_error;
32090b8e 972 for (shindex = 0; shindex < i_ehdrp->e_shnum; shindex++)
244ffee7 973 {
d24928c0
KR
974 if (bfd_read ((PTR) & x_shdr, sizeof x_shdr, 1, abfd) != sizeof (x_shdr))
975 goto got_system_call_error;
32090b8e
KR
976 elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex);
977 elf_elfsections(abfd)[shindex] = i_shdrp + shindex;
38a5f510
ILT
978
979 /* If this is a .dynamic section, mark the object file as being
980 dynamically linked. */
981 if (i_shdrp[shindex].sh_type == SHT_DYNAMIC)
982 abfd->flags |= DYNAMIC;
244ffee7 983 }
32090b8e 984 if (i_ehdrp->e_shstrndx)
244ffee7 985 {
32090b8e 986 bfd_section_from_shdr (abfd, i_ehdrp->e_shstrndx);
244ffee7
JK
987 }
988
32090b8e
KR
989#if 0
990 for (shindex = i_ehdrp->e_shnum - 1; shindex >= 0; shindex--)
991 {
992 if (!strcmp (elf_string_from_elf_strtab (abfd,
993 i_shdrp[shindex].sh_name),
994 ".strtab"))
995 {
996 elf_tdata(abfd)->strtab_hdr = i_shdrp[shindex];
997 elf_elfsections(abfd)[shindex] = &elf_tdata(abfd)->strtab_hdr;
998 }
999 else if (!strcmp (elf_string_from_elf_strtab (abfd,
1000 i_shdrp[shindex].sh_name),
1001 ".symtab"))
1002 {
1003 elf_tdata(abfd)->symtab_hdr = i_shdrp[shindex];
1004 elf_elfsections(abfd)[shindex] = &elf_tdata(abfd)->symtab_hdr;
1005 elf_onesymtab (abfd) = shindex;
1006 }
1007 }
1008#endif
244ffee7 1009
32090b8e
KR
1010 /* Read in the string table containing the names of the sections. We
1011 will need the base pointer to this table later. */
1012 /* We read this inline now, so that we don't have to go through
1013 bfd_section_from_shdr with it (since this particular strtab is
1014 used to find all of the ELF section names.) */
244ffee7 1015
32090b8e
KR
1016 shstrtab = elf_get_str_section (abfd, i_ehdrp->e_shstrndx);
1017 if (!shstrtab)
d24928c0 1018 goto got_wrong_format_error;
244ffee7 1019
32090b8e
KR
1020 /* Once all of the section headers have been read and converted, we
1021 can start processing them. Note that the first section header is
1022 a dummy placeholder entry, so we ignore it.
244ffee7 1023
32090b8e
KR
1024 We also watch for the symbol table section and remember the file
1025 offset and section size for both the symbol table section and the
1026 associated string table section. */
244ffee7 1027
32090b8e
KR
1028 for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++)
1029 {
1030 bfd_section_from_shdr (abfd, shindex);
1031 }
244ffee7 1032
d24928c0
KR
1033 return (abfd->xvec);
1034
1035 /* If we are going to use goto's to avoid duplicating error setting
1036 and return(NULL) code, then this at least makes it more maintainable. */
1037
1038 got_system_call_error:
1039 bfd_error = system_call_error;
1040 goto got_no_match;
1041 got_wrong_format_error:
1042 bfd_error = wrong_format;
1043 goto got_no_match;
1044 got_no_memory_error:
1045 bfd_error = no_memory;
1046 goto got_no_match;
1047 got_no_match:
1048 elf_tdata (abfd) = preserved_tdata;
1049 return (NULL);
32090b8e 1050}
244ffee7 1051
32090b8e
KR
1052\f
1053/* ELF .o/exec file writing */
1054
d24928c0
KR
1055/* Takes a bfd and a symbol, returns a pointer to the elf specific area
1056 of the symbol if there is one. */
32090b8e
KR
1057static INLINE elf_symbol_type *
1058DEFUN (elf_symbol_from, (ignore_abfd, symbol),
1059 bfd * ignore_abfd AND
1060 asymbol * symbol)
244ffee7 1061{
32090b8e
KR
1062 if (symbol->the_bfd->xvec->flavour != bfd_target_elf_flavour)
1063 return 0;
1064
1065 if (symbol->the_bfd->tdata.elf_obj_data == (struct elf_obj_tdata *) NULL)
1066 return 0;
1067
1068 return (elf_symbol_type *) symbol;
244ffee7
JK
1069}
1070
d24928c0 1071/* Create ELF output from BFD sections.
244ffee7 1072
d24928c0
KR
1073 Essentially, just create the section header and forget about the program
1074 header for now. */
244ffee7 1075
32090b8e
KR
1076static void
1077DEFUN (elf_make_sections, (abfd, asect, obj),
1078 bfd * abfd AND
1079 asection * asect AND
1080 PTR obj)
1081{
1082 /* most of what is in bfd_shdr_from_section goes in here... */
1083 /* and all of these sections generate at *least* one ELF section. */
32090b8e
KR
1084 Elf_Internal_Shdr *this_hdr;
1085 this_hdr = &elf_section_data (asect)->this_hdr;
244ffee7 1086
32090b8e
KR
1087 this_hdr->sh_addr = asect->vma;
1088 this_hdr->sh_size = asect->_raw_size;
1089 /* contents already set by elf_set_section_contents */
244ffee7 1090
300adb31 1091 if (asect->flags & SEC_RELOC)
244ffee7 1092 {
32090b8e
KR
1093 /* emit a reloc section, and thus strtab and symtab... */
1094 Elf_Internal_Shdr *rela_hdr;
32090b8e 1095 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
244ffee7 1096
32090b8e 1097 rela_hdr = &elf_section_data (asect)->rel_hdr;
244ffee7 1098
32090b8e
KR
1099 /* orelocation has the data, reloc_count has the count... */
1100 if (use_rela_p)
1101 {
1102 rela_hdr->sh_type = SHT_RELA;
1103 rela_hdr->sh_entsize = sizeof (Elf_External_Rela);
1104 }
1105 else
1106 /* REL relocations */
1107 {
1108 rela_hdr->sh_type = SHT_REL;
1109 rela_hdr->sh_entsize = sizeof (Elf_External_Rel);
1110 }
1111 rela_hdr->sh_flags = 0;
1112 rela_hdr->sh_addr = 0;
1113 rela_hdr->sh_offset = 0;
062189c6
ILT
1114
1115 /* FIXME: Systems I've checked use an alignment of 4, but it is
1116 possible that some systems use a different alignment. */
1117 rela_hdr->sh_addralign = 4;
1118
32090b8e
KR
1119 rela_hdr->size = 0;
1120 }
1121 if (asect->flags & SEC_ALLOC)
244ffee7 1122 {
32090b8e
KR
1123 this_hdr->sh_flags |= SHF_ALLOC;
1124 if (asect->flags & SEC_LOAD)
1125 {
1126 /* @@ Do something with sh_type? */
1127 }
244ffee7 1128 }
f035cc47
ILT
1129 else
1130 {
1131 /* If this section is not part of the program image during
1132 execution, leave the address fields at 0. */
1133 this_hdr->sh_addr = 0;
1134 asect->vma = 0;
1135 }
32090b8e
KR
1136 if (!(asect->flags & SEC_READONLY))
1137 this_hdr->sh_flags |= SHF_WRITE;
244ffee7 1138
32090b8e
KR
1139 if (asect->flags & SEC_CODE)
1140 this_hdr->sh_flags |= SHF_EXECINSTR;
1141}
244ffee7 1142
32090b8e
KR
1143void
1144write_relocs (abfd, sec, xxx)
1145 bfd *abfd;
1146 asection *sec;
1147 PTR xxx;
1148{
1149 Elf_Internal_Shdr *rela_hdr;
1150 Elf_External_Rela *outbound_relocas;
1151 Elf_External_Rel *outbound_relocs;
1152 int idx;
1153 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
300adb31 1154 asymbol *last_sym = 0;
38a5f510 1155 int last_sym_idx = 9999999; /* should always be written before use */
244ffee7 1156
32090b8e
KR
1157 if ((sec->flags & SEC_RELOC) == 0)
1158 return;
1159 /* Flags are sometimes inconsistent. */
1160 if (sec->reloc_count == 0)
1161 return;
244ffee7 1162
32090b8e 1163 rela_hdr = &elf_section_data (sec)->rel_hdr;
244ffee7 1164
32090b8e
KR
1165 rela_hdr->sh_size = rela_hdr->sh_entsize * sec->reloc_count;
1166 rela_hdr->contents = (void *) bfd_alloc (abfd, rela_hdr->sh_size);
9783e04a
DM
1167 if (!rela_hdr->contents)
1168 {
1169 bfd_error = no_memory;
1170 abort(); /* FIXME */
1171 }
244ffee7 1172
32090b8e 1173 /* orelocation has the data, reloc_count has the count... */
300adb31
KR
1174 if (use_rela_p)
1175 {
1176 outbound_relocas = (Elf_External_Rela *) rela_hdr->contents;
1177
1178 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 1179 {
300adb31
KR
1180 Elf_Internal_Rela dst_rela;
1181 Elf_External_Rela *src_rela;
1182 arelent *ptr;
1183 asymbol *sym;
1184 int n;
1185
1186 ptr = sec->orelocation[idx];
1187 src_rela = outbound_relocas + idx;
1188 if (!(abfd->flags & EXEC_P))
1189 dst_rela.r_offset = ptr->address - sec->vma;
1190 else
1191 dst_rela.r_offset = ptr->address;
6a3eb9b6 1192
300adb31
KR
1193 sym = *ptr->sym_ptr_ptr;
1194 if (sym == last_sym)
1195 n = last_sym_idx;
1196 else
32090b8e 1197 {
300adb31
KR
1198 last_sym = sym;
1199 last_sym_idx = n = elf_symbol_from_bfd_symbol (abfd, &sym);
32090b8e 1200 }
300adb31
KR
1201 dst_rela.r_info = ELF_R_INFO (n, ptr->howto->type);
1202
1203 dst_rela.r_addend = ptr->addend;
1204 elf_swap_reloca_out (abfd, &dst_rela, src_rela);
244ffee7 1205 }
300adb31
KR
1206 }
1207 else
1208 /* REL relocations */
1209 {
1210 outbound_relocs = (Elf_External_Rel *) rela_hdr->contents;
1211
1212 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 1213 {
300adb31
KR
1214 Elf_Internal_Rel dst_rel;
1215 Elf_External_Rel *src_rel;
1216 arelent *ptr;
1217 int n;
1218 asymbol *sym;
1219
1220 ptr = sec->orelocation[idx];
1221 sym = *ptr->sym_ptr_ptr;
1222 src_rel = outbound_relocs + idx;
1223 if (!(abfd->flags & EXEC_P))
1224 dst_rel.r_offset = ptr->address - sec->vma;
1225 else
1226 dst_rel.r_offset = ptr->address;
244ffee7 1227
300adb31
KR
1228 if (sym == last_sym)
1229 n = last_sym_idx;
1230 else
32090b8e 1231 {
300adb31
KR
1232 last_sym = sym;
1233 last_sym_idx = n = elf_symbol_from_bfd_symbol (abfd, &sym);
32090b8e 1234 }
300adb31
KR
1235 dst_rel.r_info = ELF_R_INFO (n, ptr->howto->type);
1236
1237 elf_swap_reloc_out (abfd, &dst_rel, src_rel);
32090b8e 1238 }
300adb31 1239 }
32090b8e 1240}
244ffee7 1241
32090b8e
KR
1242static void
1243fix_up_strtabs (abfd, asect, obj)
1244 bfd *abfd;
1245 asection *asect;
1246 PTR obj;
1247{
1248 Elf_Internal_Shdr *this_hdr = &elf_section_data (asect)->this_hdr;
1249 int this_idx = elf_section_data(asect)->this_idx;
244ffee7 1250
32090b8e
KR
1251 /* @@ Check flags! */
1252 if (!strncmp (asect->name, ".stab", 5)
1253 && !strcmp ("str", asect->name + strlen (asect->name) - 3))
1254 {
1255 size_t len = strlen (asect->name) + 1;
e74034d8 1256 char *s = (char *) alloca (len);
32090b8e
KR
1257 strcpy (s, asect->name);
1258 s[len - 4] = 0;
1259 asect = bfd_get_section_by_name (abfd, s);
1260 if (!asect)
1261 abort ();
1262 elf_section_data(asect)->this_hdr.sh_link = this_idx;
32090b8e 1263 /* @@ Assuming 32 bits! */
01383fb4
KR
1264 elf_section_data(asect)->this_hdr.sh_entsize = 0xc;
1265
1266 this_hdr->sh_type = SHT_STRTAB;
244ffee7 1267 }
32090b8e 1268}
244ffee7 1269
32090b8e
KR
1270static void
1271DEFUN (elf_fake_sections, (abfd, asect, obj),
1272 bfd * abfd AND
1273 asection * asect AND
1274 PTR obj)
1275{
1276 /* most of what is in bfd_shdr_from_section goes in here... */
1277 /* and all of these sections generate at *least* one ELF section. */
244ffee7 1278
32090b8e
KR
1279 Elf_Internal_Shdr *this_hdr;
1280 this_hdr = &elf_section_data (asect)->this_hdr;
1281 this_hdr->sh_name =
1282 bfd_add_to_strtab (abfd, elf_shstrtab (abfd), asect->name);
1283 /* We need to log the type *now* so that elf_section_from_bfd_section
1284 can find us... have to set rawdata too. */
1285 this_hdr->rawdata = (void *) asect;
1286 this_hdr->sh_addralign = 1 << asect->alignment_power;
1287 if ((asect->flags & SEC_ALLOC) && (asect->flags & SEC_LOAD))
1288 this_hdr->sh_type = SHT_PROGBITS;
e621c5cc
ILT
1289 else if ((asect->flags & SEC_ALLOC) && ((asect->flags & SEC_LOAD) == 0))
1290 {
6c35a16d
ILT
1291 BFD_ASSERT (strcmp (asect->name, ".bss") == 0
1292 || strcmp (asect->name, ".sbss") == 0);
e621c5cc
ILT
1293 this_hdr->sh_type = SHT_NOBITS;
1294 }
1295 /* FIXME I am not sure how to detect a .note section from the flags
1296 word of an `asection'. */
1297 else if (!strcmp (asect->name, ".note"))
1298 this_hdr->sh_type = SHT_NOTE;
32090b8e 1299 else
32090b8e
KR
1300 this_hdr->sh_type = SHT_PROGBITS;
1301
1302 this_hdr->sh_flags = 0;
1303 this_hdr->sh_addr = 0;
1304 this_hdr->sh_size = 0;
1305 this_hdr->sh_entsize = 0;
1306 this_hdr->sh_info = 0;
1307 this_hdr->sh_link = 0;
1308 this_hdr->sh_offset = 0;
1309 this_hdr->size = 0;
244ffee7 1310
f035cc47
ILT
1311 /* Now, check for processor-specific section types. */
1312 {
1313 struct elf_backend_data *bed = get_elf_backend_data (abfd);
1314
1315 if (bed->elf_backend_fake_sections)
1316 (*bed->elf_backend_fake_sections) (abfd, this_hdr, asect);
1317 }
1318
32090b8e
KR
1319 {
1320 /* Emit a strtab and symtab, and possibly a reloc section. */
1321 Elf_Internal_Shdr *rela_hdr;
244ffee7 1322
32090b8e
KR
1323 /* Note that only one symtab is used, so just remember it
1324 for now. */
244ffee7 1325
300adb31 1326 if (asect->flags & SEC_RELOC)
32090b8e
KR
1327 {
1328 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
244ffee7 1329
32090b8e
KR
1330 rela_hdr = &elf_section_data (asect)->rel_hdr;
1331 rela_hdr->sh_name =
1332 bfd_add_2_to_strtab (abfd, elf_shstrtab (abfd),
1333 use_rela_p ? ".rela" : ".rel",
1334 asect->name);
1335 rela_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
1336 rela_hdr->sh_entsize = (use_rela_p
1337 ? sizeof (Elf_External_Rela)
1338 : sizeof (Elf_External_Rel));
1339
1340 rela_hdr->sh_flags = 0;
1341 rela_hdr->sh_addr = 0;
1342 rela_hdr->sh_size = 0;
1343 rela_hdr->sh_offset = 0;
062189c6
ILT
1344
1345 /* FIXME: Systems I've checked use an alignment of 4, but some
1346 systems may use a different alignment. */
1347 rela_hdr->sh_addralign = 4;
1348
32090b8e
KR
1349 rela_hdr->size = 0;
1350 }
1351 }
1352 if (asect->flags & SEC_ALLOC)
1353 {
1354 this_hdr->sh_flags |= SHF_ALLOC;
1355 if (asect->flags & SEC_LOAD)
1356 {
1357 /* @@ Do something with sh_type? */
1358 }
1359 }
1360 if (!(asect->flags & SEC_READONLY))
1361 this_hdr->sh_flags |= SHF_WRITE;
1362 if (asect->flags & SEC_CODE)
1363 this_hdr->sh_flags |= SHF_EXECINSTR;
244ffee7
JK
1364}
1365
32090b8e
KR
1366/* Map symbol from it's internal number to the external number, moving
1367 all local symbols to be at the head of the list. */
244ffee7 1368
32090b8e 1369static INLINE int
062189c6
ILT
1370sym_is_global (abfd, sym)
1371 bfd *abfd;
32090b8e
KR
1372 asymbol *sym;
1373{
062189c6
ILT
1374 /* If the backend has a special mapping, use it. */
1375 if (get_elf_backend_data (abfd)->elf_backend_sym_is_global)
1376 return ((*get_elf_backend_data (abfd)->elf_backend_sym_is_global)
1377 (abfd, sym));
1378
d24928c0 1379 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
244ffee7 1380 {
32090b8e
KR
1381 if (sym->flags & BSF_LOCAL)
1382 abort ();
1383 return 1;
244ffee7 1384 }
d24928c0
KR
1385 if (sym->section == 0)
1386 {
1387 /* Is this valid? */
1388 abort ();
1389
1390 return 1;
1391 }
32090b8e
KR
1392 if (sym->section == &bfd_und_section)
1393 return 1;
1394 if (bfd_is_com_section (sym->section))
1395 return 1;
1396 if (sym->flags & (BSF_LOCAL | BSF_SECTION_SYM | BSF_FILE))
1397 return 0;
1398 return 0;
1399}
244ffee7 1400
9783e04a 1401static boolean
32090b8e
KR
1402DEFUN (elf_map_symbols, (abfd), bfd * abfd)
1403{
1404 int symcount = bfd_get_symcount (abfd);
1405 asymbol **syms = bfd_get_outsymbols (abfd);
d24928c0 1406 asymbol **sect_syms;
32090b8e
KR
1407 int num_locals = 0;
1408 int num_globals = 0;
1409 int num_locals2 = 0;
1410 int num_globals2 = 0;
d24928c0 1411 int max_index = 0;
32090b8e 1412 int num_sections = 0;
d24928c0 1413 Elf_Sym_Extra *sym_extra;
32090b8e
KR
1414 int idx;
1415 asection *asect;
6a3eb9b6 1416
32090b8e
KR
1417#ifdef DEBUG
1418 fprintf (stderr, "elf_map_symbols\n");
1419 fflush (stderr);
1420#endif
244ffee7 1421
e621c5cc
ILT
1422 /* Add local symbols for each section for which there are relocs.
1423 FIXME: How can we tell which sections have relocs at this point?
1424 Will reloc_count always be accurate? Actually, I think most ELF
1425 targets create section symbols for all sections anyhow. */
32090b8e 1426 for (asect = abfd->sections; asect; asect = asect->next)
244ffee7 1427 {
d24928c0
KR
1428 if (max_index < asect->index)
1429 max_index = asect->index;
244ffee7
JK
1430 }
1431
d24928c0
KR
1432 max_index++;
1433 elf_num_section_syms (abfd) = max_index;
1434 sect_syms = (asymbol **) bfd_zalloc (abfd, max_index * sizeof (asymbol *));
1435 elf_section_syms (abfd) = sect_syms;
1436
9783e04a
DM
1437 if (sect_syms != 0)
1438 {
1439 bfd_error = no_memory;
1440 return false;
1441 }
d24928c0
KR
1442
1443 for (asect = abfd->sections; asect; asect = asect->next)
e621c5cc
ILT
1444 {
1445 asymbol *sym = bfd_make_empty_symbol (abfd);
9783e04a
DM
1446 if (!sym)
1447 {
1448 bfd_error = no_memory;
1449 return false;
1450 }
e621c5cc
ILT
1451 sym->the_bfd = abfd;
1452 sym->name = asect->name;
1453 sym->value = asect->vma;
1454 sym->flags = BSF_SECTION_SYM;
1455 sym->section = asect;
1456 sect_syms[asect->index] = sym;
1457 num_sections++;
d24928c0 1458#ifdef DEBUG
e621c5cc
ILT
1459 fprintf (stderr,
1460 "creating section symbol, name = %s, value = 0x%.8lx, index = %d, section = 0x%.8lx\n",
1461 asect->name, (long) asect->vma, asect->index, (long) asect);
d24928c0 1462#endif
e621c5cc 1463 }
d24928c0 1464
32090b8e 1465 if (num_sections)
244ffee7 1466 {
32090b8e
KR
1467 if (syms)
1468 syms = (asymbol **) bfd_realloc (abfd, syms,
1469 ((symcount + num_sections + 1)
1470 * sizeof (asymbol *)));
1471 else
1472 syms = (asymbol **) bfd_alloc (abfd,
1473 (num_sections + 1) * sizeof (asymbol *));
9783e04a
DM
1474 if (!syms)
1475 {
1476 bfd_error = no_memory;
1477 return false;
1478 }
244ffee7 1479
32090b8e
KR
1480 for (asect = abfd->sections; asect; asect = asect->next)
1481 {
d24928c0
KR
1482 if (sect_syms[asect->index])
1483 syms[symcount++] = sect_syms[asect->index];
32090b8e 1484 }
244ffee7 1485
32090b8e
KR
1486 syms[symcount] = (asymbol *) 0;
1487 bfd_set_symtab (abfd, syms, symcount);
1488 }
244ffee7 1489
d24928c0
KR
1490 elf_sym_extra (abfd) = sym_extra
1491 = (Elf_Sym_Extra *) bfd_alloc (abfd, symcount * sizeof (Elf_Sym_Extra));
9783e04a
DM
1492 if (!sym_extra)
1493 {
1494 bfd_error = no_memory;
1495 return false;
1496 }
244ffee7 1497
32090b8e
KR
1498 /* Identify and classify all of the symbols. */
1499 for (idx = 0; idx < symcount; idx++)
244ffee7 1500 {
062189c6 1501 if (!sym_is_global (abfd, syms[idx]))
32090b8e
KR
1502 num_locals++;
1503 else
1504 num_globals++;
244ffee7 1505 }
32090b8e
KR
1506
1507 /* Now provide mapping information. Add +1 for skipping over the
1508 dummy symbol. */
1509 for (idx = 0; idx < symcount; idx++)
244ffee7 1510 {
d24928c0 1511 syms[idx]->udata = (PTR) &sym_extra[idx];
062189c6 1512 if (!sym_is_global (abfd, syms[idx]))
d24928c0 1513 sym_extra[idx].elf_sym_num = 1 + num_locals2++;
32090b8e 1514 else
d24928c0 1515 sym_extra[idx].elf_sym_num = 1 + num_locals + num_globals2++;
244ffee7
JK
1516 }
1517
32090b8e
KR
1518 elf_num_locals (abfd) = num_locals;
1519 elf_num_globals (abfd) = num_globals;
9783e04a 1520 return true;
32090b8e 1521}
244ffee7 1522
9783e04a
DM
1523static boolean assign_section_numbers ();
1524static boolean assign_file_positions_except_relocs ();
244ffee7 1525
32090b8e
KR
1526static boolean
1527DEFUN (elf_compute_section_file_positions, (abfd), bfd * abfd)
1528{
32090b8e 1529 bfd_map_over_sections (abfd, elf_fake_sections, 0);
244ffee7 1530
9783e04a
DM
1531 if (!assign_section_numbers (abfd))
1532 return false;
244ffee7 1533
32090b8e 1534 bfd_map_over_sections (abfd, elf_make_sections, 0);
244ffee7 1535
32090b8e 1536 bfd_map_over_sections (abfd, fix_up_strtabs, 0); /* .stab/.stabstr &c */
244ffee7 1537
b9d5cdf0
DM
1538 if (swap_out_syms (abfd) == false)
1539 return false;
244ffee7 1540
9783e04a
DM
1541 if (!assign_file_positions_except_relocs (abfd))
1542 return false;
32090b8e
KR
1543
1544 return true;
1545}
1546
1547static boolean
1548DEFUN (elf_write_phdrs, (abfd, i_ehdrp, i_phdrp, phdr_cnt),
1549 bfd * abfd AND
1550 Elf_Internal_Ehdr * i_ehdrp AND
1551 Elf_Internal_Phdr * i_phdrp AND
1552 Elf32_Half phdr_cnt)
244ffee7 1553{
32090b8e 1554 /* first program header entry goes after the file header */
300adb31 1555 int outbase = i_ehdrp->e_phoff;
244ffee7 1556 int i;
32090b8e
KR
1557 Elf_External_Phdr x_phdr;
1558
1559 for (i = 0; i < phdr_cnt; i++)
244ffee7 1560 {
32090b8e
KR
1561 elf_swap_phdr_out (abfd, i_phdrp + i, &x_phdr);
1562 bfd_seek (abfd, outbase, SEEK_SET);
1563 bfd_write ((PTR) & x_phdr, sizeof (x_phdr), 1, abfd);
1564 outbase += sizeof (x_phdr);
244ffee7 1565 }
32090b8e
KR
1566
1567 return true;
244ffee7
JK
1568}
1569
32090b8e
KR
1570static const Elf_Internal_Shdr null_shdr;
1571
1572/* Assign all ELF section numbers. The dummy first section is handled here
1573 too. The link/info pointers for the standard section types are filled
1574 in here too, while we're at it. (Link pointers for .stab sections are
1575 not filled in here.) */
9783e04a 1576static boolean
32090b8e 1577assign_section_numbers (abfd)
fce36137 1578 bfd *abfd;
fce36137 1579{
32090b8e
KR
1580 struct elf_obj_tdata *t = elf_tdata (abfd);
1581 asection *sec;
1582 int section_number = 1;
1583 int i;
1584 Elf_Internal_Shdr **i_shdrp;
244ffee7 1585
32090b8e
KR
1586 t->shstrtab_hdr.sh_size = elf_shstrtab(abfd)->length;
1587 t->shstrtab_hdr.contents = (void *) elf_shstrtab(abfd)->tab;
1588 shstrtab_length_fixed = 1;
244ffee7 1589
32090b8e
KR
1590 t->shstrtab_section = section_number++;
1591 elf_elfheader(abfd)->e_shstrndx = t->shstrtab_section;
1592 if (abfd->symcount)
1593 {
1594 t->symtab_section = section_number++;
1595 t->strtab_section = section_number++;
1596 t->symtab_hdr.sh_link = t->strtab_section;
1597 }
1598 for (sec = abfd->sections; sec; sec = sec->next)
1599 {
1600 struct bfd_elf_section_data *d = elf_section_data (sec);
1601 d->this_idx = section_number++;
300adb31 1602 if (sec->flags & SEC_RELOC)
fce36137 1603 {
32090b8e
KR
1604 d->rel_idx = section_number++;
1605 d->rel_hdr.sh_link = t->symtab_section;
1606 d->rel_hdr.sh_info = d->this_idx;
244ffee7 1607 }
fce36137 1608 else
32090b8e
KR
1609 d->rel_idx = 0;
1610 /* No handling for per-section string tables currently. */
1611 }
1612 elf_elfheader(abfd)->e_shnum = section_number;
1613
1614 /* Set up the list of section header pointers, in agreement with the
1615 indices. */
300adb31
KR
1616 i_shdrp = (Elf_Internal_Shdr **)
1617 bfd_alloc (abfd, section_number * sizeof (Elf_Internal_Shdr *));
9783e04a
DM
1618 if (!i_shdrp)
1619 {
1620 bfd_error = no_memory;
1621 return false;
1622 }
32090b8e
KR
1623 elf_elfsections(abfd) = i_shdrp;
1624 for (i = 0; i < section_number; i++)
1625 i_shdrp[i] = 0;
1626
1627 i_shdrp[0] = (Elf_Internal_Shdr *) &null_shdr;
1628 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
1629 if (abfd->symcount)
1630 {
1631 i_shdrp[t->symtab_section] = &t->symtab_hdr;
1632 i_shdrp[t->strtab_section] = &t->strtab_hdr;
244ffee7 1633 }
32090b8e
KR
1634 for (sec = abfd->sections; sec; sec = sec->next)
1635 {
1636 struct bfd_elf_section_data *d = elf_section_data (sec);
1637 i_shdrp[d->this_idx] = &d->this_hdr;
1638 if (d->rel_idx)
1639 i_shdrp[d->rel_idx] = &d->rel_hdr;
1640 }
1641 /* Make sure we got everything.... */
1642 for (i = 0; i < section_number; i++)
1643 if (i_shdrp[i] == 0)
1644 abort ();
9783e04a 1645 return true;
32090b8e
KR
1646}
1647
1648static INLINE file_ptr
1649assign_file_position_for_section (i_shdrp, offset)
1650 Elf_Internal_Shdr *i_shdrp;
1651 file_ptr offset;
1652{
f035cc47
ILT
1653 int align;
1654
1655 if (i_shdrp->sh_addralign != 0)
1656 align = i_shdrp->sh_addralign;
1657 else
1658 align = 1;
1659 i_shdrp->sh_offset = offset = BFD_ALIGN (offset, align);
7b8106b4
ILT
1660 if (i_shdrp->rawdata != NULL)
1661 ((asection *) i_shdrp->rawdata)->filepos = offset;
300adb31
KR
1662 if (i_shdrp->sh_type != SHT_NOBITS)
1663 offset += i_shdrp->sh_size;
32090b8e 1664 return offset;
244ffee7
JK
1665}
1666
01383fb4
KR
1667static INLINE file_ptr
1668align_file_position (off)
1669 file_ptr off;
1670{
f035cc47 1671 return (off + FILE_ALIGN - 1) & ~(FILE_ALIGN - 1);
01383fb4
KR
1672}
1673
300adb31
KR
1674static INLINE file_ptr
1675assign_file_positions_for_symtab_and_strtabs (abfd, off)
1676 bfd *abfd;
1677 file_ptr off;
1678{
1679 struct elf_obj_tdata *t = elf_tdata (abfd);
1680
01383fb4 1681 off = align_file_position (off);
300adb31 1682 off = assign_file_position_for_section (&t->symtab_hdr, off);
01383fb4 1683 off = assign_file_position_for_section (&t->shstrtab_hdr, off);
300adb31
KR
1684 off = assign_file_position_for_section (&t->strtab_hdr, off);
1685 return off;
1686}
1687
1688struct seg_info {
1689 bfd_vma low, mem_size;
1690 file_ptr file_size;
1691 int start_pos;
1692 int sh_flags;
1693 struct seg_info *next;
1694};
1695
9783e04a 1696static boolean
300adb31
KR
1697map_program_segments (abfd)
1698 bfd *abfd;
1699{
1700 Elf_Internal_Shdr **i_shdrpp = elf_elfsections (abfd);
1701 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
1702 Elf_Internal_Shdr *i_shdrp;
1703 Elf_Internal_Phdr *phdr;
1704 char *done;
1705 int i, n_left = 0;
1706 file_ptr lowest_offset = 0;
1707 struct seg_info *seg = 0;
1708
e74034d8 1709 done = (char *) alloca (i_ehdrp->e_shnum);
300adb31 1710 memset (done, 0, i_ehdrp->e_shnum);
062189c6 1711 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1712 {
1713 i_shdrp = i_shdrpp[i];
1714 /* If it's going to be mapped in, it's been assigned a position. */
1715 if (i_shdrp->sh_offset + 1 == 0)
1716 {
1717 /* Well, not really, but we won't process it here. */
1718 done[i] = 1;
1719 continue;
1720 }
1721 if (i_shdrp->sh_offset < lowest_offset
1722 || lowest_offset == 0)
1723 lowest_offset = i_shdrp->sh_offset;
1724 /* Only interested in PROGBITS or NOBITS for generating segments. */
1725 switch (i_shdrp->sh_type)
1726 {
1727 case SHT_PROGBITS:
1728 case SHT_NOBITS:
1729 break;
1730 default:
1731 done[i] = 1;
1732 }
1733 if (!done[i])
1734 n_left++;
1735 }
1736 while (n_left)
1737 {
1738 bfd_vma lowest_vma = -1, high;
1739 int low_sec = 0;
1740 int mem_size;
1741 int file_size = 0;
1742
1743 for (i = 1; i < i_ehdrp->e_shnum; i++)
1744 {
1745 i_shdrp = i_shdrpp[i];
1746 if (!done[i] && i_shdrp->sh_addr < lowest_vma)
1747 {
1748 lowest_vma = i_shdrp->sh_addr;
1749 low_sec = i;
1750 }
1751 }
1752 if (low_sec == 0)
1753 abort ();
1754 /* So now we know the lowest vma of any unassigned sections; start
1755 a segment there. */
1756 {
1757 struct seg_info *s;
1758 s = (struct seg_info *) bfd_alloc (abfd, sizeof (struct seg_info));
9783e04a
DM
1759 if (!s)
1760 {
1761 bfd_error = no_memory;
1762 return false;
1763 }
300adb31
KR
1764 s->next = seg;
1765 seg = s;
1766 }
1767 seg->low = lowest_vma;
1768 i_shdrp = i_shdrpp[low_sec];
1769 seg->start_pos = i_shdrp->sh_offset;
1770 seg->sh_flags = i_shdrp->sh_flags;
1771 done[low_sec] = 1, n_left--;
1772 mem_size = i_shdrp->sh_size;
1773 high = lowest_vma + i_shdrp->sh_size;
1774
1775 if (i_shdrp->sh_type == SHT_PROGBITS)
1776 file_size = i_shdrp->sh_size;
1777
062189c6 1778 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1779 {
1780 file_ptr f1;
1781
300adb31
KR
1782 if (done[i])
1783 continue;
1784 i_shdrp = i_shdrpp[i];
1785 /* position of next byte on disk */
1786 f1 = seg->start_pos + file_size;
1787 if (i_shdrp->sh_type == SHT_PROGBITS)
1788 {
1789 if (i_shdrp->sh_offset - f1 != i_shdrp->sh_addr - high)
1790 continue;
6c35a16d
ILT
1791 if (file_size != mem_size)
1792 break;
300adb31
KR
1793 }
1794 else /* sh_type == NOBITS */
1795 {
1796 /* If the section in question has no contents in the disk
1797 file, we really don't care where it supposedly starts.
1798 But we don't want to bother merging it into this segment
1799 if it doesn't start on this memory page. */
1800 bfd_vma page1, page2;
1801 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
1802
1803 /* page number in address space of current end of seg */
1804 page1 = (high - 1 + maxpagesize - 1) / maxpagesize;
1805 /* page number in address space of start of this section */
1806 page2 = (i_shdrp->sh_addr + maxpagesize - 1) / maxpagesize;
1807
1808 if (page1 != page2)
1809 continue;
1810 }
1811 done[i] = 1, n_left--;
1812 if (i_shdrp->sh_type == SHT_PROGBITS)
1813 file_size = i_shdrp->sh_offset + i_shdrp->sh_size - seg->start_pos;
1814 mem_size = i_shdrp->sh_addr + i_shdrp->sh_size - seg->low;
1815 high = i_shdrp->sh_addr + i_shdrp->sh_size;
1816 i = 0;
1817 }
1818 seg->file_size = file_size;
1819 seg->mem_size = mem_size;
1820 }
1821 /* Now do something with the list of segments we've built up. */
1822 {
1823 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
1824 struct seg_info *s;
1825 int n_segs = 0;
1826 int sz;
1827
1828 for (s = seg; s; s = s->next)
1829 {
1830 n_segs++;
1831 }
1832 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr);
1833 sz = sizeof (Elf_External_Phdr) * n_segs;
01383fb4
KR
1834 if (align_file_position (i_ehdrp->e_ehsize) + sz <= lowest_offset)
1835 i_ehdrp->e_phoff = align_file_position (i_ehdrp->e_ehsize);
300adb31
KR
1836 else
1837 {
01383fb4
KR
1838 i_ehdrp->e_phoff = align_file_position (elf_tdata (abfd)->next_file_pos);
1839 elf_tdata (abfd)->next_file_pos = i_ehdrp->e_phoff + sz;
300adb31 1840 }
e74034d8
KR
1841 phdr = (Elf_Internal_Phdr*) bfd_alloc (abfd,
1842 n_segs * sizeof (Elf_Internal_Phdr));
9783e04a
DM
1843 if (!phdr)
1844 {
1845 bfd_error = no_memory;
1846 abort(); /* FIXME */
1847 }
300adb31
KR
1848 elf_tdata (abfd)->phdr = phdr;
1849 while (seg)
1850 {
1851 phdr->p_type = PT_LOAD; /* only type we really support so far */
1852 phdr->p_offset = seg->start_pos;
1853 phdr->p_vaddr = seg->low;
1854 phdr->p_paddr = 0;
1855 phdr->p_filesz = seg->file_size;
1856 phdr->p_memsz = seg->mem_size;
1857 phdr->p_flags = PF_R;
1858 phdr->p_align = maxpagesize; /* ? */
1859 if (seg->sh_flags & SHF_WRITE)
e621c5cc
ILT
1860 /* SysVr4 ELF docs say "data segments normally have read, write,
1861 and execute permissions." */
1862 phdr->p_flags |= (PF_W | PF_X);
300adb31
KR
1863 if (seg->sh_flags & SHF_EXECINSTR)
1864 phdr->p_flags |= PF_X;
1865 phdr++;
1866 seg = seg->next;
1867 }
1868 i_ehdrp->e_phnum = n_segs;
1869 }
1870 elf_write_phdrs (abfd, i_ehdrp, elf_tdata (abfd)->phdr, i_ehdrp->e_phnum);
9783e04a 1871 return true;
300adb31
KR
1872}
1873
9783e04a 1874static boolean
32090b8e
KR
1875assign_file_positions_except_relocs (abfd)
1876 bfd *abfd;
244ffee7 1877{
32090b8e
KR
1878 /* For now, we ignore the possibility of having program segments, which
1879 may require some alignment in the file. That'll require padding, and
1880 some interesting calculations to optimize file space usage.
244ffee7 1881
32090b8e
KR
1882 Also, since the application may change the list of relocations for
1883 a given section, we don't figure them in here. We'll put them at the
1884 end of the file, at positions computed during bfd_close.
244ffee7 1885
300adb31
KR
1886 The order, for now: <ehdr> <shdr> <sec1> <sec2> <sec3> ... <rel1> ...
1887 or: <ehdr> <phdr> <sec1> <sec2> ... <shdr> <rel1> ... */
32090b8e 1888
062189c6 1889 struct elf_obj_tdata *t = elf_tdata (abfd);
32090b8e
KR
1890 file_ptr off;
1891 int i;
1892 Elf_Internal_Shdr **i_shdrpp = elf_elfsections (abfd);
1893 Elf_Internal_Shdr *i_shdrp;
1894 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
300adb31 1895 int exec_p = (abfd->flags & EXEC_P) != 0;
6c35a16d 1896 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
32090b8e 1897
300adb31 1898 /* Everything starts after the ELF file header. */
32090b8e 1899 off = i_ehdrp->e_ehsize;
300adb31
KR
1900
1901 if (!exec_p)
1902 {
1903 /* Section headers. */
01383fb4 1904 off = align_file_position (off);
300adb31
KR
1905 i_ehdrp->e_shoff = off;
1906 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
300adb31
KR
1907 off = assign_file_positions_for_symtab_and_strtabs (abfd, off);
1908 }
062189c6 1909 for (i = 1; i < i_ehdrp->e_shnum; i++)
32090b8e 1910 {
062189c6
ILT
1911 /* The symtab and strtab sections are placed by
1912 assign_file_positions_for_symtab_and_strtabs. */
1913 if (i == t->symtab_section
1914 || i == t->strtab_section
1915 || i == t->shstrtab_section)
1916 continue;
1917
32090b8e
KR
1918 i_shdrp = i_shdrpp[i];
1919 if (i_shdrp->sh_type == SHT_REL || i_shdrp->sh_type == SHT_RELA)
244ffee7 1920 {
32090b8e
KR
1921 i_shdrp->sh_offset = -1;
1922 continue;
244ffee7 1923 }
300adb31
KR
1924 if (exec_p)
1925 {
300adb31
KR
1926 if (maxpagesize == 0)
1927 maxpagesize = 1; /* make the arithmetic work */
1928 /* This isn't necessarily going to give the best packing, if the
1929 segments require padding between them, but since that isn't
1930 usually the case, this'll do. */
1931 if ((i_shdrp->sh_flags & SHF_ALLOC) == 0)
1932 {
1933 i_shdrp->sh_offset = -1;
1934 continue;
1935 }
1936 /* Blindly assume that the segments are ordered optimally. With
1937 the default LD script, they will be. */
6c35a16d 1938 if (i_shdrp->sh_type != SHT_NOBITS)
300adb31 1939 {
6c35a16d
ILT
1940 /* need big unsigned type */
1941 bfd_vma addtl_off;
1942 addtl_off = i_shdrp->sh_addr - off;
1943 addtl_off = addtl_off % maxpagesize;
1944 if (addtl_off)
1945 {
1946 off += addtl_off;
1947 }
300adb31
KR
1948 }
1949 }
32090b8e 1950 off = assign_file_position_for_section (i_shdrp, off);
01383fb4 1951
6c35a16d
ILT
1952 if (exec_p
1953 && i_shdrp->sh_type == SHT_NOBITS
1954 && (i == i_ehdrp->e_shnum
1955 || i_shdrpp[i + 1]->sh_type != SHT_NOBITS))
1956 {
1957 /* Skip to the next page to ensure that when the file is
1958 loaded the bss section is loaded with zeroes. I don't
1959 know if this is required on all platforms, but it
1960 shouldn't really hurt. */
1961 off = BFD_ALIGN (off, maxpagesize);
1962 }
1963
300adb31
KR
1964 if (exec_p
1965 && get_elf_backend_data(abfd)->maxpagesize > 1
1966 && i_shdrp->sh_type == SHT_PROGBITS
1967 && (i_shdrp->sh_flags & SHF_ALLOC)
01383fb4 1968 && (i_shdrp->sh_offset - i_shdrp->sh_addr) % get_elf_backend_data (abfd)->maxpagesize != 0)
300adb31
KR
1969 abort ();
1970 }
1971 if (exec_p)
1972 {
1973 elf_tdata (abfd)->next_file_pos = off;
9783e04a
DM
1974 if (!map_program_segments (abfd))
1975 return false;
300adb31
KR
1976 off = elf_tdata (abfd)->next_file_pos;
1977
1978 /* Section headers. */
01383fb4 1979 off = align_file_position (off);
300adb31
KR
1980 i_ehdrp->e_shoff = off;
1981 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
1982
1983 off = assign_file_positions_for_symtab_and_strtabs (abfd, off);
1984
062189c6 1985 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1986 {
1987 i_shdrp = i_shdrpp[i];
1988 if (i_shdrp->sh_offset + 1 == 0
1989 && i_shdrp->sh_type != SHT_REL
1990 && i_shdrp->sh_type != SHT_RELA)
1991 off = assign_file_position_for_section (i_shdrp, off);
1992 }
244ffee7 1993 }
32090b8e 1994 elf_tdata (abfd)->next_file_pos = off;
9783e04a 1995 return true;
244ffee7
JK
1996}
1997
32090b8e
KR
1998static boolean
1999prep_headers (abfd)
2000 bfd *abfd;
2001{
32090b8e
KR
2002 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
2003 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
32090b8e 2004 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
32090b8e 2005 int count;
32090b8e 2006 struct strtab *shstrtab;
244ffee7 2007
32090b8e
KR
2008 i_ehdrp = elf_elfheader (abfd);
2009 i_shdrp = elf_elfsections (abfd);
244ffee7 2010
32090b8e 2011 shstrtab = bfd_new_strtab (abfd);
b9d5cdf0
DM
2012 if (!shstrtab)
2013 return false;
2014
32090b8e 2015 elf_shstrtab (abfd) = shstrtab;
244ffee7 2016
32090b8e
KR
2017 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
2018 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
2019 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
2020 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
244ffee7 2021
32090b8e
KR
2022 i_ehdrp->e_ident[EI_CLASS] = ELFCLASS;
2023 i_ehdrp->e_ident[EI_DATA] =
2024 abfd->xvec->byteorder_big_p ? ELFDATA2MSB : ELFDATA2LSB;
2025 i_ehdrp->e_ident[EI_VERSION] = EV_CURRENT;
244ffee7 2026
32090b8e
KR
2027 for (count = EI_PAD; count < EI_NIDENT; count++)
2028 i_ehdrp->e_ident[count] = 0;
244ffee7 2029
32090b8e
KR
2030 i_ehdrp->e_type = (abfd->flags & EXEC_P) ? ET_EXEC : ET_REL;
2031 switch (bfd_get_arch (abfd))
fce36137 2032 {
32090b8e
KR
2033 case bfd_arch_unknown:
2034 i_ehdrp->e_machine = EM_NONE;
2035 break;
2036 case bfd_arch_sparc:
2037 i_ehdrp->e_machine = EM_SPARC;
2038 /* start-sanitize-v9 */
2039#if ARCH_SIZE == 64
2040 i_ehdrp->e_machine = EM_SPARC64;
2041#endif
2042 /* end-sanitize-v9 */
2043 break;
2044 case bfd_arch_i386:
2045 i_ehdrp->e_machine = EM_386;
2046 break;
2047 case bfd_arch_m68k:
2048 i_ehdrp->e_machine = EM_68K;
2049 break;
2050 case bfd_arch_m88k:
2051 i_ehdrp->e_machine = EM_88K;
2052 break;
2053 case bfd_arch_i860:
2054 i_ehdrp->e_machine = EM_860;
2055 break;
2056 case bfd_arch_mips: /* MIPS Rxxxx */
2057 i_ehdrp->e_machine = EM_MIPS; /* only MIPS R3000 */
2058 break;
2059 case bfd_arch_hppa:
2060 i_ehdrp->e_machine = EM_HPPA;
2061 break;
2062 /* also note that EM_M32, AT&T WE32100 is unknown to bfd */
2063 default:
2064 i_ehdrp->e_machine = EM_NONE;
fce36137 2065 }
32090b8e
KR
2066 i_ehdrp->e_version = EV_CURRENT;
2067 i_ehdrp->e_ehsize = sizeof (Elf_External_Ehdr);
244ffee7 2068
32090b8e
KR
2069 /* no program header, for now. */
2070 i_ehdrp->e_phoff = 0;
2071 i_ehdrp->e_phentsize = 0;
2072 i_ehdrp->e_phnum = 0;
244ffee7 2073
32090b8e
KR
2074 /* each bfd section is section header entry */
2075 i_ehdrp->e_entry = bfd_get_start_address (abfd);
2076 i_ehdrp->e_shentsize = sizeof (Elf_External_Shdr);
244ffee7 2077
32090b8e
KR
2078 /* if we're building an executable, we'll need a program header table */
2079 if (abfd->flags & EXEC_P)
244ffee7 2080 {
300adb31 2081 /* it all happens later */
32090b8e
KR
2082#if 0
2083 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr);
244ffee7 2084
32090b8e
KR
2085 /* elf_build_phdrs() returns a (NULL-terminated) array of
2086 Elf_Internal_Phdrs */
2087 i_phdrp = elf_build_phdrs (abfd, i_ehdrp, i_shdrp, &i_ehdrp->e_phnum);
2088 i_ehdrp->e_phoff = outbase;
2089 outbase += i_ehdrp->e_phentsize * i_ehdrp->e_phnum;
2090#endif
244ffee7 2091 }
32090b8e 2092 else
244ffee7 2093 {
32090b8e
KR
2094 i_ehdrp->e_phentsize = 0;
2095 i_phdrp = 0;
2096 i_ehdrp->e_phoff = 0;
244ffee7
JK
2097 }
2098
32090b8e
KR
2099 elf_tdata (abfd)->symtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2100 ".symtab");
2101 elf_tdata (abfd)->strtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2102 ".strtab");
2103 elf_tdata (abfd)->shstrtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2104 ".shstrtab");
f035cc47 2105 return true;
244ffee7
JK
2106}
2107
b9d5cdf0 2108static boolean
32090b8e
KR
2109swap_out_syms (abfd)
2110 bfd *abfd;
244ffee7 2111{
9783e04a
DM
2112 if (!elf_map_symbols (abfd))
2113 return false;
244ffee7 2114
32090b8e
KR
2115 /* Dump out the symtabs. */
2116 {
2117 int symcount = bfd_get_symcount (abfd);
2118 asymbol **syms = bfd_get_outsymbols (abfd);
2119 struct strtab *stt = bfd_new_strtab (abfd);
2120 Elf_Internal_Shdr *symtab_hdr;
2121 Elf_Internal_Shdr *symstrtab_hdr;
2122 Elf_External_Sym *outbound_syms;
2123 int idx;
244ffee7 2124
b9d5cdf0
DM
2125 if (!stt)
2126 return false;
32090b8e
KR
2127 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2128 symtab_hdr->sh_type = SHT_SYMTAB;
2129 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
2130 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
2131 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
244ffee7 2132
062189c6
ILT
2133 /* FIXME: Systems I've checked use 4 byte alignment for .symtab,
2134 but it is possible that there are systems which use a different
2135 alignment. */
2136 symtab_hdr->sh_addralign = 4;
2137
32090b8e
KR
2138 /* see assert in elf_fake_sections that supports this: */
2139 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
2140 symstrtab_hdr->sh_type = SHT_STRTAB;
244ffee7 2141
32090b8e
KR
2142 outbound_syms = (Elf_External_Sym *)
2143 bfd_alloc (abfd, (1 + symcount) * sizeof (Elf_External_Sym));
9783e04a
DM
2144 if (!outbound_syms)
2145 {
2146 bfd_error = no_memory;
2147 return false;
2148 }
32090b8e
KR
2149 /* now generate the data (for "contents") */
2150 {
2151 /* Fill in zeroth symbol and swap it out. */
2152 Elf_Internal_Sym sym;
2153 sym.st_name = 0;
2154 sym.st_value = 0;
2155 sym.st_size = 0;
2156 sym.st_info = 0;
2157 sym.st_other = 0;
2158 sym.st_shndx = SHN_UNDEF;
2159 elf_swap_symbol_out (abfd, &sym, outbound_syms);
244ffee7 2160 }
32090b8e
KR
2161 for (idx = 0; idx < symcount; idx++)
2162 {
2163 Elf_Internal_Sym sym;
2164 bfd_vma value = syms[idx]->value;
244ffee7 2165
32090b8e
KR
2166 if (syms[idx]->flags & BSF_SECTION_SYM)
2167 /* Section symbols have no names. */
2168 sym.st_name = 0;
2169 else
2170 sym.st_name = bfd_add_to_strtab (abfd, stt, syms[idx]->name);
244ffee7 2171
32090b8e 2172 if (bfd_is_com_section (syms[idx]->section))
244ffee7 2173 {
32090b8e
KR
2174 /* ELF common symbols put the alignment into the `value' field,
2175 and the size into the `size' field. This is backwards from
2176 how BFD handles it, so reverse it here. */
2177 sym.st_size = value;
2178 /* Should retrieve this from somewhere... */
2179 sym.st_value = 16;
d4fb8fce
ILT
2180 sym.st_shndx = elf_section_from_bfd_section (abfd,
2181 syms[idx]->section);
244ffee7
JK
2182 }
2183 else
2184 {
32090b8e 2185 asection *sec = syms[idx]->section;
e74034d8 2186 elf_symbol_type *type_ptr;
32090b8e 2187 int shndx;
244ffee7 2188
32090b8e
KR
2189 if (sec->output_section)
2190 {
2191 value += sec->output_offset;
2192 sec = sec->output_section;
2193 }
2194 value += sec->vma;
2195 sym.st_value = value;
e74034d8
KR
2196 type_ptr = elf_symbol_from (abfd, syms[idx]);
2197 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
32090b8e
KR
2198 sym.st_shndx = shndx = elf_section_from_bfd_section (abfd, sec);
2199 if (shndx == -1)
2200 {
2201 asection *sec2;
2202 /* Writing this would be a hell of a lot easier if we had
2203 some decent documentation on bfd, and knew what to expect
2204 of the library, and what to demand of applications. For
2205 example, it appears that `objcopy' might not set the
2206 section of a symbol to be a section that is actually in
2207 the output file. */
2208 sec2 = bfd_get_section_by_name (abfd, sec->name);
2209 assert (sec2 != 0);
2210 sym.st_shndx = shndx = elf_section_from_bfd_section (abfd, sec2);
2211 assert (shndx != -1);
2212 }
2213 }
244ffee7 2214
32090b8e 2215 if (bfd_is_com_section (syms[idx]->section))
38a5f510 2216 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_OBJECT);
32090b8e
KR
2217 else if (syms[idx]->section == &bfd_und_section)
2218 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_NOTYPE);
32090b8e
KR
2219 else if (syms[idx]->flags & BSF_SECTION_SYM)
2220 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
2221 else if (syms[idx]->flags & BSF_FILE)
2222 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
d24928c0 2223 else
32090b8e 2224 {
d24928c0
KR
2225 int bind = STB_LOCAL;
2226 int type = STT_OBJECT;
2227 unsigned int flags = syms[idx]->flags;
2228
2229 if (flags & BSF_LOCAL)
2230 bind = STB_LOCAL;
2231 else if (flags & BSF_WEAK)
2232 bind = STB_WEAK;
2233 else if (flags & BSF_GLOBAL)
2234 bind = STB_GLOBAL;
2235
2236 if (flags & BSF_FUNCTION)
2237 type = STT_FUNC;
2238
2239 sym.st_info = ELF_ST_INFO (bind, type);
32090b8e 2240 }
244ffee7 2241
32090b8e
KR
2242 sym.st_other = 0;
2243 elf_swap_symbol_out (abfd, &sym,
d24928c0
KR
2244 (outbound_syms
2245 + elf_sym_extra (abfd)[idx].elf_sym_num));
32090b8e
KR
2246 }
2247
2248 symtab_hdr->contents = (PTR) outbound_syms;
2249 symstrtab_hdr->contents = (PTR) stt->tab;
2250 symstrtab_hdr->sh_size = stt->length;
2251 symstrtab_hdr->sh_type = SHT_STRTAB;
2252
2253 symstrtab_hdr->sh_flags = 0;
2254 symstrtab_hdr->sh_addr = 0;
2255 symstrtab_hdr->sh_entsize = 0;
2256 symstrtab_hdr->sh_link = 0;
2257 symstrtab_hdr->sh_info = 0;
062189c6 2258 symstrtab_hdr->sh_addralign = 1;
32090b8e
KR
2259 symstrtab_hdr->size = 0;
2260 }
2261
2262 /* put the strtab out too... */
2263 {
2264 Elf_Internal_Shdr *this_hdr;
2265
2266 this_hdr = &elf_tdata(abfd)->shstrtab_hdr;
2267 this_hdr->contents = (PTR) elf_shstrtab (abfd)->tab;
2268 this_hdr->sh_size = elf_shstrtab (abfd)->length;
2269 this_hdr->sh_type = SHT_STRTAB;
2270 this_hdr->sh_flags = 0;
2271 this_hdr->sh_addr = 0;
2272 this_hdr->sh_entsize = 0;
062189c6 2273 this_hdr->sh_addralign = 1;
32090b8e
KR
2274 this_hdr->size = 0;
2275 }
b9d5cdf0 2276 return true;
244ffee7
JK
2277}
2278
32090b8e
KR
2279static boolean
2280write_shdrs_and_ehdr (abfd)
2281 bfd *abfd;
244ffee7 2282{
32090b8e
KR
2283 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
2284 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
32090b8e
KR
2285 Elf_External_Shdr *x_shdrp; /* Section header table, external form */
2286 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
32090b8e 2287 int count;
32090b8e 2288 struct strtab *shstrtab;
244ffee7 2289
32090b8e
KR
2290 i_ehdrp = elf_elfheader (abfd);
2291 i_shdrp = elf_elfsections (abfd);
2292 shstrtab = elf_shstrtab (abfd);
2293
2294 /* swap the header before spitting it out... */
2295
2296#if DEBUG & 1
2297 elf_debug_file (i_ehdrp);
244ffee7 2298#endif
32090b8e
KR
2299 elf_swap_ehdr_out (abfd, i_ehdrp, &x_ehdr);
2300 bfd_seek (abfd, (file_ptr) 0, SEEK_SET);
2301 bfd_write ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd);
244ffee7 2302
32090b8e
KR
2303 /* at this point we've concocted all the ELF sections... */
2304 x_shdrp = (Elf_External_Shdr *)
2305 bfd_alloc (abfd, sizeof (*x_shdrp) * (i_ehdrp->e_shnum));
2306 if (!x_shdrp)
2307 {
2308 bfd_error = no_memory;
2309 return false;
2310 }
2311
2312 for (count = 0; count < i_ehdrp->e_shnum; count++)
2313 {
2314#if DEBUG & 2
2315 elf_debug_section (shstrtab->tab + i_shdrp[count]->sh_name, count,
2316 i_shdrp[count]);
244ffee7 2317#endif
32090b8e
KR
2318 elf_swap_shdr_out (abfd, i_shdrp[count], x_shdrp + count);
2319 }
2320 bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET);
2321 bfd_write ((PTR) x_shdrp, sizeof (*x_shdrp), i_ehdrp->e_shnum, abfd);
2322 /* need to dump the string table too... */
244ffee7 2323
32090b8e
KR
2324 return true;
2325}
244ffee7 2326
32090b8e
KR
2327static void
2328assign_file_positions_for_relocs (abfd)
2329 bfd *abfd;
2330{
2331 file_ptr off = elf_tdata(abfd)->next_file_pos;
2332 int i;
2333 Elf_Internal_Shdr **shdrpp = elf_elfsections (abfd);
2334 Elf_Internal_Shdr *shdrp;
062189c6 2335 for (i = 1; i < elf_elfheader(abfd)->e_shnum; i++)
32090b8e
KR
2336 {
2337 shdrp = shdrpp[i];
2338 if (shdrp->sh_type != SHT_REL && shdrp->sh_type != SHT_RELA)
2339 continue;
01383fb4 2340 off = align_file_position (off);
32090b8e
KR
2341 off = assign_file_position_for_section (shdrp, off);
2342 }
2343 elf_tdata(abfd)->next_file_pos = off;
2344}
244ffee7 2345
32090b8e
KR
2346boolean
2347DEFUN (NAME(bfd_elf,write_object_contents), (abfd), bfd * abfd)
2348{
062189c6 2349 struct elf_backend_data *bed = get_elf_backend_data (abfd);
32090b8e
KR
2350 Elf_Internal_Ehdr *i_ehdrp;
2351 Elf_Internal_Shdr **i_shdrp;
2352 int count;
244ffee7 2353
38a5f510
ILT
2354 /* We don't know how to write dynamic objects. Specifically, we
2355 don't know how to construct the program header. */
2356 if ((abfd->flags & DYNAMIC) != 0)
2357 {
2358 fprintf (stderr, "Writing ELF dynamic objects is not supported\n");
2359 bfd_error = wrong_format;
2360 return false;
2361 }
2362
32090b8e
KR
2363 if (abfd->output_has_begun == false)
2364 {
32090b8e 2365 prep_headers (abfd);
32090b8e 2366 elf_compute_section_file_positions (abfd);
32090b8e
KR
2367 abfd->output_has_begun = true;
2368 }
244ffee7 2369
32090b8e
KR
2370 i_shdrp = elf_elfsections (abfd);
2371 i_ehdrp = elf_elfheader (abfd);
244ffee7 2372
32090b8e 2373 bfd_map_over_sections (abfd, write_relocs, (PTR) 0);
32090b8e 2374 assign_file_positions_for_relocs (abfd);
244ffee7 2375
32090b8e 2376 /* After writing the headers, we need to write the sections too... */
062189c6 2377 for (count = 1; count < i_ehdrp->e_shnum; count++)
e621c5cc 2378 {
e621c5cc
ILT
2379 if (bed->elf_backend_section_processing)
2380 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
2381 if (i_shdrp[count]->contents)
2382 {
2383 bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET);
2384 bfd_write (i_shdrp[count]->contents, i_shdrp[count]->sh_size, 1,
2385 abfd);
2386 }
2387 }
062189c6
ILT
2388
2389 if (bed->elf_backend_final_write_processing)
2390 (*bed->elf_backend_final_write_processing) (abfd);
2391
32090b8e
KR
2392 return write_shdrs_and_ehdr (abfd);
2393}
244ffee7 2394
32090b8e
KR
2395/* Given an index of a section, retrieve a pointer to it. Note
2396 that for our purposes, sections are indexed by {1, 2, ...} with
2397 0 being an illegal index. */
244ffee7 2398
32090b8e
KR
2399/* In the original, each ELF section went into exactly one BFD
2400 section. This doesn't really make sense, so we need a real mapping.
2401 The mapping has to hide in the Elf_Internal_Shdr since asection
2402 doesn't have anything like a tdata field... */
244ffee7 2403
32090b8e
KR
2404static struct sec *
2405DEFUN (section_from_elf_index, (abfd, index),
2406 bfd * abfd AND
2407 int index)
2408{
2409 /* @@ Is bfd_com_section really correct in all the places it could
2410 be returned from this routine? */
244ffee7 2411
32090b8e
KR
2412 if (index == SHN_ABS)
2413 return &bfd_com_section; /* not abs? */
2414 if (index == SHN_COMMON)
2415 return &bfd_com_section;
244ffee7 2416
32090b8e
KR
2417 if (index > elf_elfheader (abfd)->e_shnum)
2418 return 0;
244ffee7
JK
2419
2420 {
32090b8e 2421 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[index];
244ffee7 2422
32090b8e 2423 switch (hdr->sh_type)
244ffee7 2424 {
32090b8e
KR
2425 /* ELF sections that map to BFD sections */
2426 case SHT_PROGBITS:
2427 case SHT_NOBITS:
2428 if (!hdr->rawdata)
2429 bfd_section_from_shdr (abfd, index);
2430 return (struct sec *) hdr->rawdata;
244ffee7 2431
32090b8e
KR
2432 default:
2433 return (struct sec *) &bfd_abs_section;
244ffee7 2434 }
244ffee7 2435 }
32090b8e 2436}
244ffee7 2437
32090b8e
KR
2438/* given a section, search the header to find them... */
2439static int
2440DEFUN (elf_section_from_bfd_section, (abfd, asect),
2441 bfd * abfd AND
2442 struct sec *asect)
2443{
2444 Elf_Internal_Shdr **i_shdrp = elf_elfsections (abfd);
2445 int index;
2446 Elf_Internal_Shdr *hdr;
2447 int maxindex = elf_elfheader (abfd)->e_shnum;
244ffee7 2448
32090b8e
KR
2449 if (asect == &bfd_abs_section)
2450 return SHN_ABS;
2451 if (asect == &bfd_com_section)
2452 return SHN_COMMON;
2453 if (asect == &bfd_und_section)
2454 return SHN_UNDEF;
244ffee7 2455
32090b8e
KR
2456 for (index = 0; index < maxindex; index++)
2457 {
2458 hdr = i_shdrp[index];
2459 switch (hdr->sh_type)
2460 {
2461 /* ELF sections that map to BFD sections */
2462 case SHT_PROGBITS:
2463 case SHT_NOBITS:
e621c5cc 2464 case SHT_NOTE:
32090b8e
KR
2465 if (hdr->rawdata)
2466 {
2467 if (((struct sec *) (hdr->rawdata)) == asect)
2468 return index;
2469 }
2470 break;
01383fb4
KR
2471
2472 case SHT_STRTAB:
2473 /* fix_up_strtabs will generate STRTAB sections with names
2474 of .stab*str. */
2475 if (!strncmp (asect->name, ".stab", 5)
2476 && !strcmp ("str", asect->name + strlen (asect->name) - 3))
2477 {
2478 if (hdr->rawdata)
2479 {
2480 if (((struct sec *) (hdr->rawdata)) == asect)
2481 return index;
2482 }
2483 break;
2484 }
2485 /* FALL THROUGH */
32090b8e 2486 default:
e621c5cc
ILT
2487 {
2488 struct elf_backend_data *bed = get_elf_backend_data (abfd);
2489
2490 if (bed->elf_backend_section_from_bfd_section)
f035cc47
ILT
2491 {
2492 int retval;
2493
2494 retval = index;
2495 if ((*bed->elf_backend_section_from_bfd_section)
2496 (abfd, hdr, asect, &retval))
2497 return retval;
2498 }
e621c5cc 2499 }
32090b8e
KR
2500 break;
2501 }
2502 }
2503 return -1;
2504}
244ffee7 2505
32090b8e
KR
2506/* given a symbol, return the bfd index for that symbol. */
2507static int
2508DEFUN (elf_symbol_from_bfd_symbol, (abfd, asym_ptr_ptr),
2509 bfd * abfd AND
2510 struct symbol_cache_entry **asym_ptr_ptr)
2511{
2512 struct symbol_cache_entry *asym_ptr = *asym_ptr_ptr;
32090b8e 2513 int idx;
d24928c0 2514 flagword flags = asym_ptr->flags;
32090b8e 2515
d24928c0
KR
2516 /* When gas creates relocations against local labels, it creates its
2517 own symbol for the section, but does put the symbol into the
e621c5cc
ILT
2518 symbol chain, so udata is 0. When the linker is generating
2519 relocatable output, this section symbol may be for one of the
2520 input sections rather than the output section. */
d24928c0
KR
2521 if (asym_ptr->udata == (PTR) 0
2522 && (flags & BSF_SECTION_SYM)
e621c5cc
ILT
2523 && asym_ptr->section)
2524 {
2525 int indx;
2526
2527 if (asym_ptr->section->output_section != NULL)
2528 indx = asym_ptr->section->output_section->index;
2529 else
2530 indx = asym_ptr->section->index;
2531 if (elf_section_syms (abfd)[indx])
2532 asym_ptr->udata = elf_section_syms (abfd)[indx]->udata;
01383fb4 2533 }
e621c5cc 2534
d24928c0
KR
2535 if (asym_ptr->udata)
2536 idx = ((Elf_Sym_Extra *)asym_ptr->udata)->elf_sym_num;
2537 else
32090b8e 2538 {
32090b8e
KR
2539 abort ();
2540 }
244ffee7 2541
32090b8e 2542#if DEBUG & 4
244ffee7 2543 {
244ffee7 2544
32090b8e 2545 fprintf (stderr,
d24928c0
KR
2546 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx %s\n",
2547 (long) asym_ptr, asym_ptr->name, idx, flags, elf_symbol_flags (flags));
32090b8e
KR
2548 fflush (stderr);
2549 }
2550#endif
2551
2552 return idx;
2553}
2554
2555static boolean
2556DEFUN (elf_slurp_symbol_table, (abfd, symptrs),
2557 bfd * abfd AND
2558 asymbol ** symptrs) /* Buffer for generated bfd symbols */
2559{
2560 Elf_Internal_Shdr *hdr = &elf_tdata(abfd)->symtab_hdr;
2561 int symcount; /* Number of external ELF symbols */
2562 int i;
2563 elf_symbol_type *sym; /* Pointer to current bfd symbol */
2564 elf_symbol_type *symbase; /* Buffer for generated bfd symbols */
2565 Elf_Internal_Sym i_sym;
2566 Elf_External_Sym *x_symp;
2567
2568 /* this is only valid because there is only one symtab... */
2569 /* FIXME: This is incorrect, there may also be a dynamic symbol
2570 table which is a subset of the full symbol table. We either need
2571 to be prepared to read both (and merge them) or ensure that we
2572 only read the full symbol table. Currently we only get called to
2573 read the full symbol table. -fnf */
244ffee7 2574
32090b8e
KR
2575 /* Read each raw ELF symbol, converting from external ELF form to
2576 internal ELF form, and then using the information to create a
2577 canonical bfd symbol table entry.
244ffee7 2578
32090b8e
KR
2579 Note that we allocate the initial bfd canonical symbol buffer
2580 based on a one-to-one mapping of the ELF symbols to canonical
2581 symbols. We actually use all the ELF symbols, so there will be no
2582 space left over at the end. When we have all the symbols, we
2583 build the caller's pointer vector. */
244ffee7 2584
32090b8e
KR
2585 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) == -1)
2586 {
2587 bfd_error = system_call_error;
2588 return false;
2589 }
244ffee7 2590
32090b8e
KR
2591 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
2592 symbase = (elf_symbol_type *) bfd_zalloc (abfd, symcount * sizeof (elf_symbol_type));
2593 sym = symbase;
244ffee7 2594
32090b8e 2595 /* Temporarily allocate room for the raw ELF symbols. */
b9d5cdf0 2596 x_symp = (Elf_External_Sym *) malloc (symcount * sizeof (Elf_External_Sym));
9783e04a 2597 if (!symbase || !x_symp)
b9d5cdf0
DM
2598 {
2599 bfd_error = no_memory;
2600 return false;
2601 }
244ffee7 2602
32090b8e
KR
2603 if (bfd_read ((PTR) x_symp, sizeof (Elf_External_Sym), symcount, abfd)
2604 != symcount * sizeof (Elf_External_Sym))
244ffee7 2605 {
32090b8e
KR
2606 free ((PTR) x_symp);
2607 bfd_error = system_call_error;
2608 return false;
244ffee7 2609 }
32090b8e
KR
2610 /* Skip first symbol, which is a null dummy. */
2611 for (i = 1; i < symcount; i++)
244ffee7 2612 {
32090b8e
KR
2613 elf_swap_symbol_in (abfd, x_symp + i, &i_sym);
2614 memcpy (&sym->internal_elf_sym, &i_sym, sizeof (Elf_Internal_Sym));
e621c5cc 2615#ifdef ELF_KEEP_EXTSYM
32090b8e 2616 memcpy (&sym->native_elf_sym, x_symp + i, sizeof (Elf_External_Sym));
e621c5cc 2617#endif
32090b8e 2618 sym->symbol.the_bfd = abfd;
244ffee7 2619
32090b8e
KR
2620 sym->symbol.name = elf_string_from_elf_section (abfd, hdr->sh_link,
2621 i_sym.st_name);
244ffee7 2622
32090b8e 2623 sym->symbol.value = i_sym.st_value;
244ffee7 2624
32090b8e
KR
2625 if (i_sym.st_shndx > 0 && i_sym.st_shndx < SHN_LORESERV)
2626 {
2627 sym->symbol.section = section_from_elf_index (abfd, i_sym.st_shndx);
2628 }
2629 else if (i_sym.st_shndx == SHN_ABS)
2630 {
2631 sym->symbol.section = &bfd_abs_section;
2632 }
2633 else if (i_sym.st_shndx == SHN_COMMON)
2634 {
2635 sym->symbol.section = &bfd_com_section;
2636 /* Elf puts the alignment into the `value' field, and the size
2637 into the `size' field. BFD wants to see the size in the
2638 value field, and doesn't care (at the moment) about the
2639 alignment. */
2640 sym->symbol.value = i_sym.st_size;
2641 }
2642 else if (i_sym.st_shndx == SHN_UNDEF)
2643 {
2644 sym->symbol.section = &bfd_und_section;
2645 }
2646 else
2647 sym->symbol.section = &bfd_abs_section;
244ffee7 2648
32090b8e 2649 sym->symbol.value -= sym->symbol.section->vma;
244ffee7 2650
32090b8e 2651 switch (ELF_ST_BIND (i_sym.st_info))
244ffee7 2652 {
32090b8e
KR
2653 case STB_LOCAL:
2654 sym->symbol.flags |= BSF_LOCAL;
2655 break;
2656 case STB_GLOBAL:
d24928c0 2657 sym->symbol.flags |= BSF_GLOBAL;
32090b8e
KR
2658 break;
2659 case STB_WEAK:
2660 sym->symbol.flags |= BSF_WEAK;
2661 break;
2662 }
244ffee7 2663
32090b8e
KR
2664 switch (ELF_ST_TYPE (i_sym.st_info))
2665 {
2666 case STT_SECTION:
2667 sym->symbol.flags |= BSF_SECTION_SYM | BSF_DEBUGGING;
2668 break;
2669 case STT_FILE:
2670 sym->symbol.flags |= BSF_FILE | BSF_DEBUGGING;
2671 break;
2672 case STT_FUNC:
2673 sym->symbol.flags |= BSF_FUNCTION;
2674 break;
244ffee7 2675 }
300adb31 2676
e621c5cc
ILT
2677 /* Do some backend-specific processing on this symbol. */
2678 {
2679 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2680 if (ebd->elf_backend_symbol_processing)
2681 (*ebd->elf_backend_symbol_processing) (abfd, &sym->symbol);
2682 }
244ffee7 2683
32090b8e 2684 sym++;
244ffee7
JK
2685 }
2686
e621c5cc
ILT
2687 /* Do some backend-specific processing on this symbol table. */
2688 {
2689 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2690 if (ebd->elf_backend_symbol_table_processing)
2691 (*ebd->elf_backend_symbol_table_processing) (abfd, symbase, symcount);
2692 }
244ffee7 2693
e621c5cc 2694 /* We rely on the zalloc to clear out the final symbol entry. */
244ffee7 2695
32090b8e
KR
2696 bfd_get_symcount (abfd) = symcount = sym - symbase;
2697
2698 /* Fill in the user's symbol pointer vector if needed. */
2699 if (symptrs)
244ffee7 2700 {
32090b8e
KR
2701 sym = symbase;
2702 while (symcount-- > 0)
244ffee7 2703 {
32090b8e
KR
2704 *symptrs++ = &sym->symbol;
2705 sym++;
244ffee7 2706 }
32090b8e 2707 *symptrs = 0; /* Final null pointer */
244ffee7
JK
2708 }
2709
38a5f510 2710 free ((PTR) x_symp);
244ffee7
JK
2711 return true;
2712}
2713
32090b8e 2714/* Return the number of bytes required to hold the symtab vector.
244ffee7 2715
32090b8e
KR
2716 Note that we base it on the count plus 1, since we will null terminate
2717 the vector allocated based on this size. However, the ELF symbol table
2718 always has a dummy entry as symbol #0, so it ends up even. */
244ffee7 2719
32090b8e
KR
2720unsigned int
2721DEFUN (elf_get_symtab_upper_bound, (abfd), bfd * abfd)
244ffee7 2722{
32090b8e
KR
2723 unsigned int symcount;
2724 unsigned int symtab_size = 0;
244ffee7 2725
32090b8e
KR
2726 Elf_Internal_Shdr *hdr = &elf_tdata(abfd)->symtab_hdr;
2727 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
2728 symtab_size = (symcount - 1 + 1) * (sizeof (asymbol));
244ffee7 2729
32090b8e
KR
2730 return symtab_size;
2731}
244ffee7 2732
32090b8e
KR
2733/*
2734 This function return the number of bytes required to store the
2735 relocation information associated with section <<sect>>
2736 attached to bfd <<abfd>>
244ffee7 2737
32090b8e
KR
2738*/
2739unsigned int
2740elf_get_reloc_upper_bound (abfd, asect)
2741 bfd *abfd;
2742 sec_ptr asect;
2743{
2744 if (asect->flags & SEC_RELOC)
2745 {
2746 /* either rel or rela */
2747 return elf_section_data(asect)->rel_hdr.sh_size;
2748 }
2749 else
2750 return 0;
244ffee7
JK
2751}
2752
32090b8e
KR
2753static boolean
2754DEFUN (elf_slurp_reloca_table, (abfd, asect, symbols),
244ffee7 2755 bfd * abfd AND
32090b8e
KR
2756 sec_ptr asect AND
2757 asymbol ** symbols)
244ffee7 2758{
32090b8e
KR
2759 Elf_External_Rela *native_relocs;
2760 arelent *reloc_cache;
2761 arelent *cache_ptr;
244ffee7 2762
32090b8e 2763 unsigned int idx;
244ffee7 2764
32090b8e
KR
2765 if (asect->relocation)
2766 return true;
2767 if (asect->reloc_count == 0)
2768 return true;
2769 if (asect->flags & SEC_CONSTRUCTOR)
2770 return true;
244ffee7 2771
32090b8e
KR
2772 bfd_seek (abfd, asect->rel_filepos, SEEK_SET);
2773 native_relocs = (Elf_External_Rela *)
2774 bfd_alloc (abfd, asect->reloc_count * sizeof (Elf_External_Rela));
9783e04a
DM
2775 if (!native_relocs)
2776 if (!reloc_cache)
2777 {
2778 bfd_error = no_memory;
2779 return false;
2780 }
32090b8e
KR
2781 bfd_read ((PTR) native_relocs,
2782 sizeof (Elf_External_Rela), asect->reloc_count, abfd);
244ffee7 2783
32090b8e
KR
2784 reloc_cache = (arelent *)
2785 bfd_alloc (abfd, (size_t) (asect->reloc_count * sizeof (arelent)));
2786
2787 if (!reloc_cache)
6a3eb9b6 2788 {
32090b8e
KR
2789 bfd_error = no_memory;
2790 return false;
6a3eb9b6 2791 }
244ffee7 2792
32090b8e
KR
2793 for (idx = 0; idx < asect->reloc_count; idx++)
2794 {
32090b8e
KR
2795 Elf_Internal_Rela dst;
2796 Elf_External_Rela *src;
244ffee7 2797
32090b8e
KR
2798 cache_ptr = reloc_cache + idx;
2799 src = native_relocs + idx;
2800 elf_swap_reloca_in (abfd, src, &dst);
244ffee7 2801
d24928c0 2802#ifdef RELOC_PROCESSING
32090b8e
KR
2803 RELOC_PROCESSING (cache_ptr, &dst, symbols, abfd, asect);
2804#else
32090b8e
KR
2805 if (asect->flags & SEC_RELOC)
2806 {
2807 /* relocatable, so the offset is off of the section */
2808 cache_ptr->address = dst.r_offset + asect->vma;
2809 }
2810 else
2811 {
2812 /* non-relocatable, so the offset a virtual address */
2813 cache_ptr->address = dst.r_offset;
2814 }
7b8106b4
ILT
2815
2816 /* ELF_R_SYM(dst.r_info) is the symbol table offset. An offset
2817 of zero points to the dummy symbol, which was not read into
2818 the symbol table SYMBOLS. */
2819 if (ELF_R_SYM (dst.r_info) == 0)
2820 cache_ptr->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
2821 else
2822 {
2823 asymbol *s;
2824
2825 cache_ptr->sym_ptr_ptr = symbols + ELF_R_SYM (dst.r_info) - 1;
2826
2827 /* Translate any ELF section symbol into a BFD section
2828 symbol. */
2829 s = *(cache_ptr->sym_ptr_ptr);
2830 if (s->flags & BSF_SECTION_SYM)
2831 {
2832 cache_ptr->sym_ptr_ptr = s->section->symbol_ptr_ptr;
2833 s = *cache_ptr->sym_ptr_ptr;
2834 if (s->name == 0 || s->name[0] == 0)
2835 abort ();
2836 }
2837 }
32090b8e 2838 cache_ptr->addend = dst.r_addend;
244ffee7 2839
32090b8e
KR
2840 /* Fill in the cache_ptr->howto field from dst.r_type */
2841 {
2842 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2843 (*ebd->elf_info_to_howto) (abfd, cache_ptr, &dst);
2844 }
2845#endif
2846 }
244ffee7 2847
32090b8e
KR
2848 asect->relocation = reloc_cache;
2849 return true;
2850}
238ac6ec 2851
32090b8e
KR
2852#ifdef DEBUG
2853static void
2854elf_debug_section (str, num, hdr)
2855 char *str;
2856 int num;
2857 Elf_Internal_Shdr *hdr;
2858{
2859 fprintf (stderr, "\nSection#%d '%s' 0x%.8lx\n", num, str, (long) hdr);
2860 fprintf (stderr,
2861 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
2862 (long) hdr->sh_name,
2863 (long) hdr->sh_type,
2864 (long) hdr->sh_flags);
2865 fprintf (stderr,
2866 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
2867 (long) hdr->sh_addr,
2868 (long) hdr->sh_offset,
2869 (long) hdr->sh_size);
2870 fprintf (stderr,
2871 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
2872 (long) hdr->sh_link,
2873 (long) hdr->sh_info,
2874 (long) hdr->sh_addralign);
2875 fprintf (stderr, "sh_entsize = %ld\n",
2876 (long) hdr->sh_entsize);
2877 fprintf (stderr, "rawdata = 0x%.8lx\n", (long) hdr->rawdata);
2878 fprintf (stderr, "contents = 0x%.8lx\n", (long) hdr->contents);
2879 fprintf (stderr, "size = %ld\n", (long) hdr->size);
2880 fflush (stderr);
2881}
244ffee7 2882
32090b8e
KR
2883static void
2884elf_debug_file (ehdrp)
2885 Elf_Internal_Ehdr *ehdrp;
2886{
2887 fprintf (stderr, "e_entry = 0x%.8lx\n", (long) ehdrp->e_entry);
2888 fprintf (stderr, "e_phoff = %ld\n", (long) ehdrp->e_phoff);
2889 fprintf (stderr, "e_phnum = %ld\n", (long) ehdrp->e_phnum);
2890 fprintf (stderr, "e_phentsize = %ld\n", (long) ehdrp->e_phentsize);
2891 fprintf (stderr, "e_shoff = %ld\n", (long) ehdrp->e_shoff);
2892 fprintf (stderr, "e_shnum = %ld\n", (long) ehdrp->e_shnum);
2893 fprintf (stderr, "e_shentsize = %ld\n", (long) ehdrp->e_shentsize);
244ffee7 2894}
32090b8e 2895#endif
244ffee7
JK
2896
2897static boolean
32090b8e 2898DEFUN (elf_slurp_reloc_table, (abfd, asect, symbols),
244ffee7 2899 bfd * abfd AND
32090b8e
KR
2900 sec_ptr asect AND
2901 asymbol ** symbols)
244ffee7 2902{
32090b8e
KR
2903 Elf_External_Rel *native_relocs;
2904 arelent *reloc_cache;
2905 arelent *cache_ptr;
2906 Elf_Internal_Shdr *data_hdr;
2907 ElfNAME (Off) data_off;
2908 ElfNAME (Word) data_max;
2909 char buf[4]; /* FIXME -- might be elf64 */
244ffee7 2910
32090b8e 2911 unsigned int idx;
244ffee7 2912
32090b8e
KR
2913 if (asect->relocation)
2914 return true;
2915 if (asect->reloc_count == 0)
2916 return true;
2917 if (asect->flags & SEC_CONSTRUCTOR)
2918 return true;
244ffee7 2919
32090b8e
KR
2920 bfd_seek (abfd, asect->rel_filepos, SEEK_SET);
2921 native_relocs = (Elf_External_Rel *)
2922 bfd_alloc (abfd, asect->reloc_count * sizeof (Elf_External_Rel));
9783e04a
DM
2923 if (!native_relocs)
2924 {
2925 bfd_error = no_memory;
2926 return false;
2927 }
32090b8e
KR
2928 bfd_read ((PTR) native_relocs,
2929 sizeof (Elf_External_Rel), asect->reloc_count, abfd);
244ffee7 2930
32090b8e
KR
2931 reloc_cache = (arelent *)
2932 bfd_alloc (abfd, (size_t) (asect->reloc_count * sizeof (arelent)));
2933
2934 if (!reloc_cache)
244ffee7 2935 {
32090b8e 2936 bfd_error = no_memory;
244ffee7
JK
2937 return false;
2938 }
2939
32090b8e
KR
2940 /* Get the offset of the start of the segment we are relocating to read in
2941 the implicit addend. */
2942 data_hdr = &elf_section_data(asect)->this_hdr;
2943 data_off = data_hdr->sh_offset;
2944 data_max = data_hdr->sh_size - sizeof (buf) + 1;
244ffee7 2945
32090b8e
KR
2946#if DEBUG & 2
2947 elf_debug_section ("data section", -1, data_hdr);
2948#endif
244ffee7 2949
32090b8e 2950 for (idx = 0; idx < asect->reloc_count; idx++)
244ffee7 2951 {
32090b8e
KR
2952#ifdef RELOC_PROCESSING
2953 Elf_Internal_Rel dst;
2954 Elf_External_Rel *src;
244ffee7 2955
32090b8e
KR
2956 cache_ptr = reloc_cache + idx;
2957 src = native_relocs + idx;
2958 elf_swap_reloc_in (abfd, src, &dst);
244ffee7 2959
32090b8e
KR
2960 RELOC_PROCESSING (cache_ptr, &dst, symbols, abfd, asect);
2961#else
2962 Elf_Internal_Rel dst;
2963 Elf_External_Rel *src;
6a3eb9b6 2964
32090b8e
KR
2965 cache_ptr = reloc_cache + idx;
2966 src = native_relocs + idx;
2967
2968 elf_swap_reloc_in (abfd, src, &dst);
2969
2970 if (asect->flags & SEC_RELOC)
244ffee7 2971 {
32090b8e
KR
2972 /* relocatable, so the offset is off of the section */
2973 cache_ptr->address = dst.r_offset + asect->vma;
244ffee7 2974 }
32090b8e 2975 else
244ffee7 2976 {
32090b8e
KR
2977 /* non-relocatable, so the offset a virtual address */
2978 cache_ptr->address = dst.r_offset;
244ffee7 2979 }
7b8106b4
ILT
2980
2981 /* ELF_R_SYM(dst.r_info) is the symbol table offset. An offset
2982 of zero points to the dummy symbol, which was not read into
2983 the symbol table SYMBOLS. */
2984 if (ELF_R_SYM (dst.r_info) == 0)
2985 cache_ptr->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
2986 else
2987 {
2988 asymbol *s;
2989
2990 cache_ptr->sym_ptr_ptr = symbols + ELF_R_SYM (dst.r_info) - 1;
2991
2992 /* Translate any ELF section symbol into a BFD section
2993 symbol. */
2994 s = *(cache_ptr->sym_ptr_ptr);
2995 if (s->flags & BSF_SECTION_SYM)
2996 {
2997 cache_ptr->sym_ptr_ptr = s->section->symbol_ptr_ptr;
2998 s = *cache_ptr->sym_ptr_ptr;
2999 if (s->name == 0 || s->name[0] == 0)
3000 abort ();
3001 }
3002 }
32090b8e 3003 BFD_ASSERT (dst.r_offset <= data_max);
d24928c0 3004 cache_ptr->addend = 0;
244ffee7 3005
32090b8e
KR
3006 /* Fill in the cache_ptr->howto field from dst.r_type */
3007 {
3008 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
3009 (*ebd->elf_info_to_howto_rel) (abfd, cache_ptr, &dst);
3010 }
3011#endif
3012 }
244ffee7 3013
32090b8e
KR
3014 asect->relocation = reloc_cache;
3015 return true;
3016}
244ffee7 3017
32090b8e
KR
3018unsigned int
3019elf_canonicalize_reloc (abfd, section, relptr, symbols)
3020 bfd *abfd;
3021 sec_ptr section;
3022 arelent **relptr;
3023 asymbol **symbols;
3024{
3025 arelent *tblptr = section->relocation;
3026 unsigned int count = 0;
3027 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
3028
3029 /* snarfed from coffcode.h */
3030 if (use_rela_p)
3031 elf_slurp_reloca_table (abfd, section, symbols);
3032 else
3033 elf_slurp_reloc_table (abfd, section, symbols);
3034
3035 tblptr = section->relocation;
3036 if (!tblptr)
3037 return 0;
3038
3039 for (; count++ < section->reloc_count;)
3040 *relptr++ = tblptr++;
3041
3042 *relptr = 0;
3043 return section->reloc_count;
3044}
3045
3046unsigned int
3047DEFUN (elf_get_symtab, (abfd, alocation),
3048 bfd * abfd AND
3049 asymbol ** alocation)
3050{
3051
3052 if (!elf_slurp_symbol_table (abfd, alocation))
3053 return 0;
3054 else
3055 return bfd_get_symcount (abfd);
3056}
3057
3058asymbol *
3059DEFUN (elf_make_empty_symbol, (abfd),
3060 bfd * abfd)
3061{
3062 elf_symbol_type *newsym;
3063
3064 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (elf_symbol_type));
3065 if (!newsym)
3066 {
3067 bfd_error = no_memory;
3068 return NULL;
3069 }
3070 else
3071 {
3072 newsym->symbol.the_bfd = abfd;
3073 return &newsym->symbol;
244ffee7 3074 }
32090b8e 3075}
244ffee7 3076
32090b8e
KR
3077void
3078DEFUN (elf_get_symbol_info, (ignore_abfd, symbol, ret),
3079 bfd * ignore_abfd AND
3080 asymbol * symbol AND
3081 symbol_info * ret)
3082{
3083 bfd_symbol_info (symbol, ret);
3084}
244ffee7 3085
32090b8e
KR
3086void
3087DEFUN (elf_print_symbol, (ignore_abfd, filep, symbol, how),
3088 bfd * ignore_abfd AND
3089 PTR filep AND
3090 asymbol * symbol AND
3091 bfd_print_symbol_type how)
3092{
3093 FILE *file = (FILE *) filep;
3094 switch (how)
3095 {
3096 case bfd_print_symbol_name:
3097 fprintf (file, "%s", symbol->name);
3098 break;
3099 case bfd_print_symbol_more:
3100 fprintf (file, "elf ");
3101 fprintf_vma (file, symbol->value);
3102 fprintf (file, " %lx", (long) symbol->flags);
3103 break;
3104 case bfd_print_symbol_all:
3105 {
3106 CONST char *section_name;
3107 section_name = symbol->section ? symbol->section->name : "(*none*)";
3108 bfd_print_symbol_vandf ((PTR) file, symbol);
3109 fprintf (file, " %s\t%s",
3110 section_name,
3111 symbol->name);
3112 }
3113 break;
3114 }
244ffee7 3115
32090b8e 3116}
244ffee7 3117
32090b8e
KR
3118alent *
3119DEFUN (elf_get_lineno, (ignore_abfd, symbol),
3120 bfd * ignore_abfd AND
3121 asymbol * symbol)
3122{
3123 fprintf (stderr, "elf_get_lineno unimplemented\n");
3124 fflush (stderr);
3125 BFD_FAIL ();
3126 return NULL;
3127}
3128
3129boolean
3130DEFUN (elf_set_arch_mach, (abfd, arch, machine),
3131 bfd * abfd AND
3132 enum bfd_architecture arch AND
3133 unsigned long machine)
3134{
3135 /* Allow any architecture to be supported by the elf backend */
3136 switch (arch)
244ffee7 3137 {
32090b8e
KR
3138 case bfd_arch_unknown: /* EM_NONE */
3139 case bfd_arch_sparc: /* EM_SPARC */
3140 case bfd_arch_i386: /* EM_386 */
3141 case bfd_arch_m68k: /* EM_68K */
3142 case bfd_arch_m88k: /* EM_88K */
3143 case bfd_arch_i860: /* EM_860 */
3144 case bfd_arch_mips: /* EM_MIPS (MIPS R3000) */
3145 case bfd_arch_hppa: /* EM_HPPA (HP PA_RISC) */
3146 return bfd_default_set_arch_mach (abfd, arch, machine);
3147 default:
3148 return false;
244ffee7 3149 }
32090b8e 3150}
244ffee7 3151
32090b8e
KR
3152boolean
3153DEFUN (elf_find_nearest_line, (abfd,
3154 section,
3155 symbols,
3156 offset,
3157 filename_ptr,
3158 functionname_ptr,
3159 line_ptr),
3160 bfd * abfd AND
3161 asection * section AND
3162 asymbol ** symbols AND
3163 bfd_vma offset AND
3164 CONST char **filename_ptr AND
3165 CONST char **functionname_ptr AND
3166 unsigned int *line_ptr)
3167{
3168 return false;
244ffee7
JK
3169}
3170
32090b8e
KR
3171int
3172DEFUN (elf_sizeof_headers, (abfd, reloc),
3173 bfd * abfd AND
3174 boolean reloc)
3175{
3176 fprintf (stderr, "elf_sizeof_headers unimplemented\n");
3177 fflush (stderr);
3178 BFD_FAIL ();
3179 return 0;
3180}
244ffee7 3181
32090b8e
KR
3182boolean
3183DEFUN (elf_set_section_contents, (abfd, section, location, offset, count),
3184 bfd * abfd AND
3185 sec_ptr section AND
3186 PTR location AND
3187 file_ptr offset AND
3188 bfd_size_type count)
244ffee7 3189{
244ffee7
JK
3190 Elf_Internal_Shdr *hdr;
3191
32090b8e 3192 if (abfd->output_has_begun == false) /* set by bfd.c handler? */
244ffee7 3193 {
32090b8e
KR
3194 /* do setup calculations (FIXME) */
3195 prep_headers (abfd);
3196 elf_compute_section_file_positions (abfd);
3197 abfd->output_has_begun = true;
244ffee7 3198 }
244ffee7 3199
32090b8e 3200 hdr = &elf_section_data(section)->this_hdr;
244ffee7 3201
32090b8e
KR
3202 if (bfd_seek (abfd, hdr->sh_offset + offset, SEEK_SET) == -1)
3203 return false;
3204 if (bfd_write (location, 1, count, abfd) != count)
3205 return false;
3206
3207 return true;
3208}
3209
3210void
3211DEFUN (elf_no_info_to_howto, (abfd, cache_ptr, dst),
3212 bfd * abfd AND
3213 arelent * cache_ptr AND
3214 Elf_Internal_Rela * dst)
244ffee7 3215{
32090b8e
KR
3216 fprintf (stderr, "elf RELA relocation support for target machine unimplemented\n");
3217 fflush (stderr);
3218 BFD_FAIL ();
244ffee7
JK
3219}
3220
32090b8e
KR
3221void
3222DEFUN (elf_no_info_to_howto_rel, (abfd, cache_ptr, dst),
244ffee7 3223 bfd * abfd AND
32090b8e
KR
3224 arelent * cache_ptr AND
3225 Elf_Internal_Rel * dst)
244ffee7 3226{
32090b8e
KR
3227 fprintf (stderr, "elf REL relocation support for target machine unimplemented\n");
3228 fflush (stderr);
3229 BFD_FAIL ();
3230}
244ffee7 3231
32090b8e
KR
3232\f
3233/* Core file support */
244ffee7 3234
32090b8e
KR
3235#ifdef HAVE_PROCFS /* Some core file support requires host /proc files */
3236#include <sys/procfs.h>
3237#else
3238#define bfd_prstatus(abfd, descdata, descsz, filepos) /* Define away */
3239#define bfd_fpregset(abfd, descdata, descsz, filepos) /* Define away */
3240#define bfd_prpsinfo(abfd, descdata, descsz, filepos) /* Define away */
3241#endif
244ffee7 3242
32090b8e 3243#ifdef HAVE_PROCFS
244ffee7 3244
32090b8e
KR
3245static void
3246DEFUN (bfd_prstatus, (abfd, descdata, descsz, filepos),
3247 bfd * abfd AND
3248 char *descdata AND
3249 int descsz AND
3250 long filepos)
3251{
3252 asection *newsect;
3253 prstatus_t *status = (prstatus_t *) 0;
244ffee7 3254
32090b8e 3255 if (descsz == sizeof (prstatus_t))
244ffee7 3256 {
32090b8e
KR
3257 newsect = bfd_make_section (abfd, ".reg");
3258 newsect->_raw_size = sizeof (status->pr_reg);
3259 newsect->filepos = filepos + (long) &status->pr_reg;
3260 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3261 newsect->alignment_power = 2;
3262 if ((core_prstatus (abfd) = bfd_alloc (abfd, descsz)) != NULL)
3263 {
3264 memcpy (core_prstatus (abfd), descdata, descsz);
3265 }
244ffee7 3266 }
32090b8e 3267}
244ffee7 3268
32090b8e 3269/* Stash a copy of the prpsinfo structure away for future use. */
244ffee7 3270
32090b8e
KR
3271static void
3272DEFUN (bfd_prpsinfo, (abfd, descdata, descsz, filepos),
3273 bfd * abfd AND
3274 char *descdata AND
3275 int descsz AND
3276 long filepos)
3277{
3278 asection *newsect;
244ffee7 3279
32090b8e
KR
3280 if (descsz == sizeof (prpsinfo_t))
3281 {
3282 if ((core_prpsinfo (abfd) = bfd_alloc (abfd, descsz)) != NULL)
244ffee7 3283 {
32090b8e 3284 memcpy (core_prpsinfo (abfd), descdata, descsz);
244ffee7 3285 }
244ffee7 3286 }
244ffee7
JK
3287}
3288
244ffee7 3289static void
32090b8e
KR
3290DEFUN (bfd_fpregset, (abfd, descdata, descsz, filepos),
3291 bfd * abfd AND
3292 char *descdata AND
3293 int descsz AND
3294 long filepos)
244ffee7 3295{
32090b8e 3296 asection *newsect;
244ffee7 3297
32090b8e
KR
3298 newsect = bfd_make_section (abfd, ".reg2");
3299 newsect->_raw_size = descsz;
3300 newsect->filepos = filepos;
3301 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3302 newsect->alignment_power = 2;
6a3eb9b6 3303}
244ffee7 3304
32090b8e
KR
3305#endif /* HAVE_PROCFS */
3306
3307/* Return a pointer to the args (including the command name) that were
3308 seen by the program that generated the core dump. Note that for
3309 some reason, a spurious space is tacked onto the end of the args
3310 in some (at least one anyway) implementations, so strip it off if
3311 it exists. */
3312
3313char *
3314DEFUN (elf_core_file_failing_command, (abfd),
3315 bfd * abfd)
244ffee7 3316{
32090b8e
KR
3317#ifdef HAVE_PROCFS
3318 if (core_prpsinfo (abfd))
3319 {
3320 prpsinfo_t *p = core_prpsinfo (abfd);
3321 char *scan = p->pr_psargs;
3322 while (*scan++)
3323 {;
3324 }
3325 scan -= 2;
3326 if ((scan > p->pr_psargs) && (*scan == ' '))
3327 {
3328 *scan = '\000';
3329 }
3330 return p->pr_psargs;
3331 }
3332#endif
3333 return NULL;
3334}
244ffee7 3335
32090b8e
KR
3336/* Return the number of the signal that caused the core dump. Presumably,
3337 since we have a core file, we got a signal of some kind, so don't bother
3338 checking the other process status fields, just return the signal number.
3339 */
244ffee7 3340
32090b8e
KR
3341int
3342DEFUN (elf_core_file_failing_signal, (abfd),
3343 bfd * abfd)
3344{
3345#ifdef HAVE_PROCFS
3346 if (core_prstatus (abfd))
3347 {
3348 return ((prstatus_t *) (core_prstatus (abfd)))->pr_cursig;
3349 }
3350#endif
3351 return -1;
3352}
244ffee7 3353
32090b8e
KR
3354/* Check to see if the core file could reasonably be expected to have
3355 come for the current executable file. Note that by default we return
3356 true unless we find something that indicates that there might be a
3357 problem.
3358 */
244ffee7 3359
32090b8e
KR
3360boolean
3361DEFUN (elf_core_file_matches_executable_p, (core_bfd, exec_bfd),
3362 bfd * core_bfd AND
3363 bfd * exec_bfd)
3364{
3365#ifdef HAVE_PROCFS
3366 char *corename;
3367 char *execname;
3368#endif
244ffee7 3369
32090b8e
KR
3370 /* First, xvecs must match since both are ELF files for the same target. */
3371
3372 if (core_bfd->xvec != exec_bfd->xvec)
244ffee7 3373 {
32090b8e 3374 bfd_error = system_call_error;
244ffee7
JK
3375 return false;
3376 }
3377
32090b8e 3378#ifdef HAVE_PROCFS
244ffee7 3379
32090b8e
KR
3380 /* If no prpsinfo, just return true. Otherwise, grab the last component
3381 of the exec'd pathname from the prpsinfo. */
244ffee7 3382
32090b8e 3383 if (core_prpsinfo (core_bfd))
244ffee7 3384 {
32090b8e
KR
3385 corename = (((struct prpsinfo *) core_prpsinfo (core_bfd))->pr_fname);
3386 }
3387 else
3388 {
3389 return true;
3390 }
244ffee7 3391
32090b8e 3392 /* Find the last component of the executable pathname. */
244ffee7 3393
32090b8e
KR
3394 if ((execname = strrchr (exec_bfd->filename, '/')) != NULL)
3395 {
3396 execname++;
3397 }
3398 else
3399 {
3400 execname = (char *) exec_bfd->filename;
3401 }
244ffee7 3402
32090b8e 3403 /* See if they match */
244ffee7 3404
32090b8e 3405 return strcmp (execname, corename) ? false : true;
244ffee7 3406
32090b8e 3407#else
244ffee7 3408
244ffee7 3409 return true;
244ffee7 3410
32090b8e
KR
3411#endif /* HAVE_PROCFS */
3412}
244ffee7 3413
32090b8e
KR
3414/* ELF core files contain a segment of type PT_NOTE, that holds much of
3415 the information that would normally be available from the /proc interface
3416 for the process, at the time the process dumped core. Currently this
3417 includes copies of the prstatus, prpsinfo, and fpregset structures.
244ffee7 3418
32090b8e
KR
3419 Since these structures are potentially machine dependent in size and
3420 ordering, bfd provides two levels of support for them. The first level,
3421 available on all machines since it does not require that the host
3422 have /proc support or the relevant include files, is to create a bfd
3423 section for each of the prstatus, prpsinfo, and fpregset structures,
3424 without any interpretation of their contents. With just this support,
3425 the bfd client will have to interpret the structures itself. Even with
3426 /proc support, it might want these full structures for it's own reasons.
244ffee7 3427
32090b8e
KR
3428 In the second level of support, where HAVE_PROCFS is defined, bfd will
3429 pick apart the structures to gather some additional information that
3430 clients may want, such as the general register set, the name of the
3431 exec'ed file and its arguments, the signal (if any) that caused the
3432 core dump, etc.
244ffee7 3433
32090b8e 3434 */
244ffee7 3435
32090b8e
KR
3436static boolean
3437DEFUN (elf_corefile_note, (abfd, hdr),
244ffee7 3438 bfd * abfd AND
32090b8e 3439 Elf_Internal_Phdr * hdr)
244ffee7 3440{
32090b8e
KR
3441 Elf_External_Note *x_note_p; /* Elf note, external form */
3442 Elf_Internal_Note i_note; /* Elf note, internal form */
3443 char *buf = NULL; /* Entire note segment contents */
3444 char *namedata; /* Name portion of the note */
3445 char *descdata; /* Descriptor portion of the note */
3446 char *sectname; /* Name to use for new section */
3447 long filepos; /* File offset to descriptor data */
3448 asection *newsect;
3449
3450 if (hdr->p_filesz > 0
b9d5cdf0 3451 && (buf = (char *) malloc (hdr->p_filesz)) != NULL
32090b8e
KR
3452 && bfd_seek (abfd, hdr->p_offset, SEEK_SET) != -1
3453 && bfd_read ((PTR) buf, hdr->p_filesz, 1, abfd) == hdr->p_filesz)
3454 {
3455 x_note_p = (Elf_External_Note *) buf;
3456 while ((char *) x_note_p < (buf + hdr->p_filesz))
3457 {
3458 i_note.namesz = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->namesz);
3459 i_note.descsz = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->descsz);
3460 i_note.type = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->type);
3461 namedata = x_note_p->name;
3462 descdata = namedata + BFD_ALIGN (i_note.namesz, 4);
3463 filepos = hdr->p_offset + (descdata - buf);
3464 switch (i_note.type)
3465 {
3466 case NT_PRSTATUS:
3467 /* process descdata as prstatus info */
3468 bfd_prstatus (abfd, descdata, i_note.descsz, filepos);
3469 sectname = ".prstatus";
3470 break;
3471 case NT_FPREGSET:
3472 /* process descdata as fpregset info */
3473 bfd_fpregset (abfd, descdata, i_note.descsz, filepos);
3474 sectname = ".fpregset";
3475 break;
3476 case NT_PRPSINFO:
3477 /* process descdata as prpsinfo */
3478 bfd_prpsinfo (abfd, descdata, i_note.descsz, filepos);
3479 sectname = ".prpsinfo";
3480 break;
3481 default:
3482 /* Unknown descriptor, just ignore it. */
3483 sectname = NULL;
3484 break;
3485 }
3486 if (sectname != NULL)
3487 {
3488 newsect = bfd_make_section (abfd, sectname);
3489 newsect->_raw_size = i_note.descsz;
3490 newsect->filepos = filepos;
3491 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3492 newsect->alignment_power = 2;
3493 }
3494 x_note_p = (Elf_External_Note *)
3495 (descdata + BFD_ALIGN (i_note.descsz, 4));
3496 }
3497 }
3498 if (buf != NULL)
3499 {
3500 free (buf);
3501 }
b9d5cdf0
DM
3502 else if (hdr->p_filesz > 0)
3503 {
3504 bfd_error = no_memory;
3505 return false;
3506 }
32090b8e 3507 return true;
244ffee7 3508
244ffee7
JK
3509}
3510
32090b8e
KR
3511/* Core files are simply standard ELF formatted files that partition
3512 the file using the execution view of the file (program header table)
3513 rather than the linking view. In fact, there is no section header
3514 table in a core file.
3515
3516 The process status information (including the contents of the general
3517 register set) and the floating point register set are stored in a
3518 segment of type PT_NOTE. We handcraft a couple of extra bfd sections
3519 that allow standard bfd access to the general registers (.reg) and the
3520 floating point registers (.reg2).
3521
3522 */
3523
3524bfd_target *
3525DEFUN (elf_core_file_p, (abfd), bfd * abfd)
244ffee7 3526{
32090b8e
KR
3527 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
3528 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
3529 Elf_External_Phdr x_phdr; /* Program header table entry, external form */
3530 Elf_Internal_Phdr *i_phdrp; /* Program header table, internal form */
3531 unsigned int phindex;
244ffee7 3532
32090b8e
KR
3533 /* Read in the ELF header in external format. */
3534
3535 if (bfd_read ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd) != sizeof (x_ehdr))
244ffee7 3536 {
32090b8e 3537 bfd_error = system_call_error;
244ffee7
JK
3538 return NULL;
3539 }
32090b8e
KR
3540
3541 /* Now check to see if we have a valid ELF file, and one that BFD can
3542 make use of. The magic number must match, the address size ('class')
3543 and byte-swapping must match our XVEC entry, and it must have a
3544 program header table (FIXME: See comments re segments at top of this
3545 file). */
3546
3547 if (elf_file_p (&x_ehdr) == false)
244ffee7 3548 {
32090b8e
KR
3549 wrong:
3550 bfd_error = wrong_format;
3551 return NULL;
244ffee7 3552 }
244ffee7 3553
32090b8e 3554 /* FIXME, Check EI_VERSION here ! */
244ffee7 3555
32090b8e
KR
3556 {
3557#if ARCH_SIZE == 32
3558 int desired_address_size = ELFCLASS32;
3559#endif
3560#if ARCH_SIZE == 64
3561 int desired_address_size = ELFCLASS64;
3562#endif
3563
3564 if (x_ehdr.e_ident[EI_CLASS] != desired_address_size)
3565 goto wrong;
3566 }
3567
3568 /* Switch xvec to match the specified byte order. */
3569 switch (x_ehdr.e_ident[EI_DATA])
244ffee7 3570 {
32090b8e
KR
3571 case ELFDATA2MSB: /* Big-endian */
3572 if (abfd->xvec->byteorder_big_p == false)
3573 goto wrong;
244ffee7 3574 break;
32090b8e
KR
3575 case ELFDATA2LSB: /* Little-endian */
3576 if (abfd->xvec->byteorder_big_p == true)
3577 goto wrong;
244ffee7 3578 break;
32090b8e
KR
3579 case ELFDATANONE: /* No data encoding specified */
3580 default: /* Unknown data encoding specified */
3581 goto wrong;
244ffee7
JK
3582 }
3583
32090b8e
KR
3584 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
3585 the tdata pointer in the bfd. */
244ffee7 3586
32090b8e
KR
3587 elf_tdata (abfd) =
3588 (struct elf_obj_tdata *) bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
3589 if (elf_tdata (abfd) == NULL)
244ffee7 3590 {
32090b8e
KR
3591 bfd_error = no_memory;
3592 return NULL;
244ffee7 3593 }
244ffee7 3594
32090b8e 3595 /* FIXME, `wrong' returns from this point onward, leak memory. */
244ffee7 3596
32090b8e
KR
3597 /* Now that we know the byte order, swap in the rest of the header */
3598 i_ehdrp = elf_elfheader (abfd);
3599 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
3600#if DEBUG & 1
3601 elf_debug_file (i_ehdrp);
3602#endif
244ffee7 3603
32090b8e
KR
3604 /* If there is no program header, or the type is not a core file, then
3605 we are hosed. */
3606 if (i_ehdrp->e_phoff == 0 || i_ehdrp->e_type != ET_CORE)
3607 goto wrong;
244ffee7 3608
32090b8e
KR
3609 /* Allocate space for a copy of the program header table in
3610 internal form, seek to the program header table in the file,
3611 read it in, and convert it to internal form. As a simple sanity
3612 check, verify that the what BFD thinks is the size of each program
3613 header table entry actually matches the size recorded in the file. */
3614
3615 if (i_ehdrp->e_phentsize != sizeof (x_phdr))
3616 goto wrong;
3617 i_phdrp = (Elf_Internal_Phdr *)
3618 bfd_alloc (abfd, sizeof (*i_phdrp) * i_ehdrp->e_phnum);
3619 if (!i_phdrp)
244ffee7 3620 {
32090b8e
KR
3621 bfd_error = no_memory;
3622 return NULL;
3623 }
3624 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) == -1)
3625 {
3626 bfd_error = system_call_error;
3627 return NULL;
3628 }
3629 for (phindex = 0; phindex < i_ehdrp->e_phnum; phindex++)
3630 {
3631 if (bfd_read ((PTR) & x_phdr, sizeof (x_phdr), 1, abfd)
3632 != sizeof (x_phdr))
3633 {
3634 bfd_error = system_call_error;
3635 return NULL;
3636 }
3637 elf_swap_phdr_in (abfd, &x_phdr, i_phdrp + phindex);
244ffee7
JK
3638 }
3639
32090b8e
KR
3640 /* Once all of the program headers have been read and converted, we
3641 can start processing them. */
244ffee7 3642
32090b8e
KR
3643 for (phindex = 0; phindex < i_ehdrp->e_phnum; phindex++)
3644 {
3645 bfd_section_from_phdr (abfd, i_phdrp + phindex, phindex);
3646 if ((i_phdrp + phindex)->p_type == PT_NOTE)
3647 {
3648 elf_corefile_note (abfd, i_phdrp + phindex);
3649 }
3650 }
244ffee7 3651
32090b8e 3652 /* Remember the entry point specified in the ELF file header. */
244ffee7 3653
32090b8e 3654 bfd_get_start_address (abfd) = i_ehdrp->e_entry;
244ffee7 3655
32090b8e 3656 return abfd->xvec;
244ffee7 3657}
This page took 0.230576 seconds and 4 git commands to generate.