]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elfcode.h
* config/sh/tm-sh.h (BELIEVE_PCC_PROMOTION): Define, so that
[thirdparty/binutils-gdb.git] / bfd / elfcode.h
CommitLineData
244ffee7 1/* ELF executable support for BFD.
53d3ce37 2 Copyright 1991, 92, 93, 94, 95, 96, 97, 1998 Free Software Foundation, Inc.
244ffee7
JK
3
4 Written by Fred Fish @ Cygnus Support, from information published
5 in "UNIX System V Release 4, Programmers Guide: ANSI C and
6 Programming Support Tools". Sufficient support for gdb.
7
8 Rewritten by Mark Eichin @ Cygnus Support, from information
9 published in "System V Application Binary Interface", chapters 4
10 and 5, as well as the various "Processor Supplement" documents
11 derived from it. Added support for assembler and other object file
12 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
13 Meissner (Open Software Foundation), and Peter Hoogenboom (University
14 of Utah) to finish and extend this.
15
16This file is part of BFD, the Binary File Descriptor library.
17
18This program is free software; you can redistribute it and/or modify
19it under the terms of the GNU General Public License as published by
20the Free Software Foundation; either version 2 of the License, or
21(at your option) any later version.
22
23This program is distributed in the hope that it will be useful,
24but WITHOUT ANY WARRANTY; without even the implied warranty of
25MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
26GNU General Public License for more details.
27
28You should have received a copy of the GNU General Public License
29along with this program; if not, write to the Free Software
b818a325 30Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
244ffee7 31
244ffee7
JK
32/* Problems and other issues to resolve.
33
34 (1) BFD expects there to be some fixed number of "sections" in
35 the object file. I.E. there is a "section_count" variable in the
36 bfd structure which contains the number of sections. However, ELF
37 supports multiple "views" of a file. In particular, with current
38 implementations, executable files typically have two tables, a
39 program header table and a section header table, both of which
40 partition the executable.
41
42 In ELF-speak, the "linking view" of the file uses the section header
43 table to access "sections" within the file, and the "execution view"
44 uses the program header table to access "segments" within the file.
45 "Segments" typically may contain all the data from one or more
46 "sections".
47
48 Note that the section header table is optional in ELF executables,
49 but it is this information that is most useful to gdb. If the
50 section header table is missing, then gdb should probably try
51 to make do with the program header table. (FIXME)
52
6a3eb9b6
KR
53 (2) The code in this file is compiled twice, once in 32-bit mode and
54 once in 64-bit mode. More of it should be made size-independent
55 and moved into elf.c.
56
d24928c0
KR
57 (3) ELF section symbols are handled rather sloppily now. This should
58 be cleaned up, and ELF section symbols reconciled with BFD section
59 symbols.
5546cc7e
KR
60
61 (4) We need a published spec for 64-bit ELF. We've got some stuff here
62 that we're using for SPARC V9 64-bit chips, but don't assume that
63 it's cast in stone.
d24928c0 64 */
244ffee7 65
244ffee7
JK
66#include "bfd.h"
67#include "sysdep.h"
6ec3bb6a 68#include "bfdlink.h"
244ffee7 69#include "libbfd.h"
6ab826bd 70#include "elf-bfd.h"
e549b1d2 71#include "fnmatch.h"
244ffee7 72
32090b8e 73/* Renaming structures, typedefs, macros and functions to be size-specific. */
244ffee7 74#define Elf_External_Ehdr NAME(Elf,External_Ehdr)
244ffee7 75#define Elf_External_Sym NAME(Elf,External_Sym)
244ffee7 76#define Elf_External_Shdr NAME(Elf,External_Shdr)
244ffee7 77#define Elf_External_Phdr NAME(Elf,External_Phdr)
244ffee7
JK
78#define Elf_External_Rel NAME(Elf,External_Rel)
79#define Elf_External_Rela NAME(Elf,External_Rela)
013dec1a 80#define Elf_External_Dyn NAME(Elf,External_Dyn)
244ffee7 81
244ffee7
JK
82#define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
83#define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
cb71adf1
PS
84#define elf_core_file_matches_executable_p \
85 NAME(bfd_elf,core_file_matches_executable_p)
244ffee7
JK
86#define elf_object_p NAME(bfd_elf,object_p)
87#define elf_core_file_p NAME(bfd_elf,core_file_p)
244ffee7 88#define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
cb71adf1
PS
89#define elf_get_dynamic_symtab_upper_bound \
90 NAME(bfd_elf,get_dynamic_symtab_upper_bound)
013dec1a
ILT
91#define elf_swap_reloc_in NAME(bfd_elf,swap_reloc_in)
92#define elf_swap_reloca_in NAME(bfd_elf,swap_reloca_in)
93#define elf_swap_reloc_out NAME(bfd_elf,swap_reloc_out)
94#define elf_swap_reloca_out NAME(bfd_elf,swap_reloca_out)
71edd06d
ILT
95#define elf_swap_symbol_in NAME(bfd_elf,swap_symbol_in)
96#define elf_swap_symbol_out NAME(bfd_elf,swap_symbol_out)
2b71e1e4
ILT
97#define elf_swap_phdr_in NAME(bfd_elf,swap_phdr_in)
98#define elf_swap_phdr_out NAME(bfd_elf,swap_phdr_out)
013dec1a
ILT
99#define elf_swap_dyn_in NAME(bfd_elf,swap_dyn_in)
100#define elf_swap_dyn_out NAME(bfd_elf,swap_dyn_out)
244ffee7
JK
101#define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
102#define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
d1bf45aa 103#define elf_slurp_symbol_table NAME(bfd_elf,slurp_symbol_table)
244ffee7 104#define elf_get_symtab NAME(bfd_elf,get_symtab)
cb71adf1
PS
105#define elf_canonicalize_dynamic_symtab \
106 NAME(bfd_elf,canonicalize_dynamic_symtab)
244ffee7
JK
107#define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
108#define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
244ffee7
JK
109#define elf_get_lineno NAME(bfd_elf,get_lineno)
110#define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
111#define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
112#define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
113#define elf_set_section_contents NAME(bfd_elf,set_section_contents)
114#define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
115#define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
f035cc47 116#define elf_find_section NAME(bfd_elf,find_section)
6ec3bb6a 117#define elf_bfd_link_add_symbols NAME(bfd_elf,bfd_link_add_symbols)
013dec1a 118#define elf_add_dynamic_entry NAME(bfd_elf,add_dynamic_entry)
d1bf45aa
ILT
119#define elf_write_shdrs_and_ehdr NAME(bfd_elf,write_shdrs_and_ehdr)
120#define elf_write_out_phdrs NAME(bfd_elf,write_out_phdrs)
374d2ef9
ILT
121#define elf_link_create_dynamic_sections \
122 NAME(bfd_elf,link_create_dynamic_sections)
ede4eed4 123#define elf_link_record_dynamic_symbol _bfd_elf_link_record_dynamic_symbol
6ec3bb6a 124#define elf_bfd_final_link NAME(bfd_elf,bfd_final_link)
c9e5279f
ILT
125#define elf_create_pointer_linker_section NAME(bfd_elf,create_pointer_linker_section)
126#define elf_finish_pointer_linker_section NAME(bfd_elf,finish_pointer_linker_section)
244ffee7 127
6a3eb9b6
KR
128#if ARCH_SIZE == 64
129#define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
130#define ELF_R_SYM(X) ELF64_R_SYM(X)
6ec3bb6a 131#define ELF_R_TYPE(X) ELF64_R_TYPE(X)
32090b8e 132#define ELFCLASS ELFCLASS64
f035cc47 133#define FILE_ALIGN 8
013dec1a 134#define LOG_FILE_ALIGN 3
6a3eb9b6
KR
135#endif
136#if ARCH_SIZE == 32
137#define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
138#define ELF_R_SYM(X) ELF32_R_SYM(X)
6ec3bb6a 139#define ELF_R_TYPE(X) ELF32_R_TYPE(X)
32090b8e 140#define ELFCLASS ELFCLASS32
f035cc47 141#define FILE_ALIGN 4
013dec1a 142#define LOG_FILE_ALIGN 2
244ffee7
JK
143#endif
144
53d3ce37 145/* Static functions */
244ffee7 146
d1bf45aa
ILT
147static void elf_swap_ehdr_in
148 PARAMS ((bfd *, const Elf_External_Ehdr *, Elf_Internal_Ehdr *));
149static void elf_swap_ehdr_out
150 PARAMS ((bfd *, const Elf_Internal_Ehdr *, Elf_External_Ehdr *));
151static void elf_swap_shdr_in
152 PARAMS ((bfd *, const Elf_External_Shdr *, Elf_Internal_Shdr *));
153static void elf_swap_shdr_out
154 PARAMS ((bfd *, const Elf_Internal_Shdr *, Elf_External_Shdr *));
155
ede4eed4 156#define elf_stringtab_init _bfd_elf_stringtab_init
244ffee7 157
ede4eed4 158#define section_from_elf_index bfd_section_from_elf_index
ede4eed4 159
e35765a9
ILT
160static boolean elf_slurp_reloc_table
161 PARAMS ((bfd *, asection *, asymbol **, boolean));
ea617174 162
0ef449df 163static void write_relocs PARAMS ((bfd *, asection *, PTR));
ede4eed4 164
53d3ce37
TT
165static boolean elf_file_p PARAMS ((Elf_External_Ehdr *));
166
6a3eb9b6 167#ifdef DEBUG
eb4267a3 168static void elf_debug_section PARAMS ((int, Elf_Internal_Shdr *));
6a3eb9b6 169static void elf_debug_file PARAMS ((Elf_Internal_Ehdr *));
0ef449df 170static char *elf_symbol_flags PARAMS ((flagword));
6a3eb9b6 171#endif
32090b8e
KR
172\f
173/* Structure swapping routines */
174
6a3eb9b6
KR
175/* Should perhaps use put_offset, put_word, etc. For now, the two versions
176 can be handled by explicitly specifying 32 bits or "the long type". */
238ac6ec
KR
177#if ARCH_SIZE == 64
178#define put_word bfd_h_put_64
53d3ce37 179#define put_signed_word bfd_h_put_signed_64
238ac6ec 180#define get_word bfd_h_get_64
53d3ce37 181#define get_signed_word bfd_h_get_signed_64
238ac6ec
KR
182#endif
183#if ARCH_SIZE == 32
184#define put_word bfd_h_put_32
53d3ce37 185#define put_signed_word bfd_h_put_signed_32
238ac6ec 186#define get_word bfd_h_get_32
53d3ce37 187#define get_signed_word bfd_h_get_signed_32
238ac6ec
KR
188#endif
189
244ffee7
JK
190/* Translate an ELF symbol in external format into an ELF symbol in internal
191 format. */
192
71edd06d 193void
1c6042ee
ILT
194elf_swap_symbol_in (abfd, src, dst)
195 bfd *abfd;
d1bf45aa 196 const Elf_External_Sym *src;
1c6042ee 197 Elf_Internal_Sym *dst;
244ffee7
JK
198{
199 dst->st_name = bfd_h_get_32 (abfd, (bfd_byte *) src->st_name);
238ac6ec
KR
200 dst->st_value = get_word (abfd, (bfd_byte *) src->st_value);
201 dst->st_size = get_word (abfd, (bfd_byte *) src->st_size);
244ffee7
JK
202 dst->st_info = bfd_h_get_8 (abfd, (bfd_byte *) src->st_info);
203 dst->st_other = bfd_h_get_8 (abfd, (bfd_byte *) src->st_other);
204 dst->st_shndx = bfd_h_get_16 (abfd, (bfd_byte *) src->st_shndx);
205}
206
207/* Translate an ELF symbol in internal format into an ELF symbol in external
208 format. */
209
71edd06d 210void
ede4eed4 211elf_swap_symbol_out (abfd, src, cdst)
1c6042ee 212 bfd *abfd;
d1bf45aa 213 const Elf_Internal_Sym *src;
b818a325 214 PTR cdst;
244ffee7 215{
ede4eed4 216 Elf_External_Sym *dst = (Elf_External_Sym *) cdst;
244ffee7 217 bfd_h_put_32 (abfd, src->st_name, dst->st_name);
238ac6ec
KR
218 put_word (abfd, src->st_value, dst->st_value);
219 put_word (abfd, src->st_size, dst->st_size);
244ffee7
JK
220 bfd_h_put_8 (abfd, src->st_info, dst->st_info);
221 bfd_h_put_8 (abfd, src->st_other, dst->st_other);
222 bfd_h_put_16 (abfd, src->st_shndx, dst->st_shndx);
223}
224
225
226/* Translate an ELF file header in external format into an ELF file header in
227 internal format. */
228
229static void
1c6042ee
ILT
230elf_swap_ehdr_in (abfd, src, dst)
231 bfd *abfd;
d1bf45aa 232 const Elf_External_Ehdr *src;
1c6042ee 233 Elf_Internal_Ehdr *dst;
244ffee7
JK
234{
235 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
236 dst->e_type = bfd_h_get_16 (abfd, (bfd_byte *) src->e_type);
237 dst->e_machine = bfd_h_get_16 (abfd, (bfd_byte *) src->e_machine);
238 dst->e_version = bfd_h_get_32 (abfd, (bfd_byte *) src->e_version);
238ac6ec
KR
239 dst->e_entry = get_word (abfd, (bfd_byte *) src->e_entry);
240 dst->e_phoff = get_word (abfd, (bfd_byte *) src->e_phoff);
241 dst->e_shoff = get_word (abfd, (bfd_byte *) src->e_shoff);
244ffee7
JK
242 dst->e_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->e_flags);
243 dst->e_ehsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_ehsize);
244 dst->e_phentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phentsize);
245 dst->e_phnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phnum);
246 dst->e_shentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shentsize);
247 dst->e_shnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shnum);
248 dst->e_shstrndx = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shstrndx);
249}
250
251/* Translate an ELF file header in internal format into an ELF file header in
252 external format. */
253
254static void
1c6042ee
ILT
255elf_swap_ehdr_out (abfd, src, dst)
256 bfd *abfd;
d1bf45aa 257 const Elf_Internal_Ehdr *src;
1c6042ee 258 Elf_External_Ehdr *dst;
244ffee7
JK
259{
260 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
261 /* note that all elements of dst are *arrays of unsigned char* already... */
262 bfd_h_put_16 (abfd, src->e_type, dst->e_type);
263 bfd_h_put_16 (abfd, src->e_machine, dst->e_machine);
264 bfd_h_put_32 (abfd, src->e_version, dst->e_version);
238ac6ec
KR
265 put_word (abfd, src->e_entry, dst->e_entry);
266 put_word (abfd, src->e_phoff, dst->e_phoff);
267 put_word (abfd, src->e_shoff, dst->e_shoff);
244ffee7
JK
268 bfd_h_put_32 (abfd, src->e_flags, dst->e_flags);
269 bfd_h_put_16 (abfd, src->e_ehsize, dst->e_ehsize);
270 bfd_h_put_16 (abfd, src->e_phentsize, dst->e_phentsize);
271 bfd_h_put_16 (abfd, src->e_phnum, dst->e_phnum);
272 bfd_h_put_16 (abfd, src->e_shentsize, dst->e_shentsize);
273 bfd_h_put_16 (abfd, src->e_shnum, dst->e_shnum);
274 bfd_h_put_16 (abfd, src->e_shstrndx, dst->e_shstrndx);
275}
276
277
278/* Translate an ELF section header table entry in external format into an
279 ELF section header table entry in internal format. */
280
281static void
1c6042ee
ILT
282elf_swap_shdr_in (abfd, src, dst)
283 bfd *abfd;
d1bf45aa 284 const Elf_External_Shdr *src;
1c6042ee 285 Elf_Internal_Shdr *dst;
244ffee7
JK
286{
287 dst->sh_name = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_name);
288 dst->sh_type = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_type);
238ac6ec
KR
289 dst->sh_flags = get_word (abfd, (bfd_byte *) src->sh_flags);
290 dst->sh_addr = get_word (abfd, (bfd_byte *) src->sh_addr);
291 dst->sh_offset = get_word (abfd, (bfd_byte *) src->sh_offset);
292 dst->sh_size = get_word (abfd, (bfd_byte *) src->sh_size);
244ffee7
JK
293 dst->sh_link = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_link);
294 dst->sh_info = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_info);
238ac6ec
KR
295 dst->sh_addralign = get_word (abfd, (bfd_byte *) src->sh_addralign);
296 dst->sh_entsize = get_word (abfd, (bfd_byte *) src->sh_entsize);
24f13b03
ILT
297 dst->bfd_section = NULL;
298 dst->contents = NULL;
244ffee7
JK
299}
300
301/* Translate an ELF section header table entry in internal format into an
302 ELF section header table entry in external format. */
303
304static void
1c6042ee
ILT
305elf_swap_shdr_out (abfd, src, dst)
306 bfd *abfd;
d1bf45aa 307 const Elf_Internal_Shdr *src;
1c6042ee 308 Elf_External_Shdr *dst;
244ffee7
JK
309{
310 /* note that all elements of dst are *arrays of unsigned char* already... */
311 bfd_h_put_32 (abfd, src->sh_name, dst->sh_name);
312 bfd_h_put_32 (abfd, src->sh_type, dst->sh_type);
238ac6ec
KR
313 put_word (abfd, src->sh_flags, dst->sh_flags);
314 put_word (abfd, src->sh_addr, dst->sh_addr);
315 put_word (abfd, src->sh_offset, dst->sh_offset);
316 put_word (abfd, src->sh_size, dst->sh_size);
244ffee7
JK
317 bfd_h_put_32 (abfd, src->sh_link, dst->sh_link);
318 bfd_h_put_32 (abfd, src->sh_info, dst->sh_info);
238ac6ec
KR
319 put_word (abfd, src->sh_addralign, dst->sh_addralign);
320 put_word (abfd, src->sh_entsize, dst->sh_entsize);
244ffee7
JK
321}
322
323
324/* Translate an ELF program header table entry in external format into an
325 ELF program header table entry in internal format. */
326
2b71e1e4 327void
1c6042ee
ILT
328elf_swap_phdr_in (abfd, src, dst)
329 bfd *abfd;
d1bf45aa 330 const Elf_External_Phdr *src;
1c6042ee 331 Elf_Internal_Phdr *dst;
244ffee7
JK
332{
333 dst->p_type = bfd_h_get_32 (abfd, (bfd_byte *) src->p_type);
244ffee7 334 dst->p_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->p_flags);
238ac6ec
KR
335 dst->p_offset = get_word (abfd, (bfd_byte *) src->p_offset);
336 dst->p_vaddr = get_word (abfd, (bfd_byte *) src->p_vaddr);
337 dst->p_paddr = get_word (abfd, (bfd_byte *) src->p_paddr);
338 dst->p_filesz = get_word (abfd, (bfd_byte *) src->p_filesz);
339 dst->p_memsz = get_word (abfd, (bfd_byte *) src->p_memsz);
340 dst->p_align = get_word (abfd, (bfd_byte *) src->p_align);
244ffee7
JK
341}
342
2b71e1e4 343void
1c6042ee
ILT
344elf_swap_phdr_out (abfd, src, dst)
345 bfd *abfd;
d1bf45aa 346 const Elf_Internal_Phdr *src;
1c6042ee 347 Elf_External_Phdr *dst;
244ffee7
JK
348{
349 /* note that all elements of dst are *arrays of unsigned char* already... */
350 bfd_h_put_32 (abfd, src->p_type, dst->p_type);
94dbb655
KR
351 put_word (abfd, src->p_offset, dst->p_offset);
352 put_word (abfd, src->p_vaddr, dst->p_vaddr);
353 put_word (abfd, src->p_paddr, dst->p_paddr);
354 put_word (abfd, src->p_filesz, dst->p_filesz);
355 put_word (abfd, src->p_memsz, dst->p_memsz);
244ffee7 356 bfd_h_put_32 (abfd, src->p_flags, dst->p_flags);
94dbb655 357 put_word (abfd, src->p_align, dst->p_align);
244ffee7
JK
358}
359
360/* Translate an ELF reloc from external format to internal format. */
013dec1a 361INLINE void
1c6042ee
ILT
362elf_swap_reloc_in (abfd, src, dst)
363 bfd *abfd;
d1bf45aa 364 const Elf_External_Rel *src;
1c6042ee 365 Elf_Internal_Rel *dst;
244ffee7 366{
94dbb655
KR
367 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
368 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
244ffee7
JK
369}
370
013dec1a 371INLINE void
1c6042ee
ILT
372elf_swap_reloca_in (abfd, src, dst)
373 bfd *abfd;
d1bf45aa 374 const Elf_External_Rela *src;
1c6042ee 375 Elf_Internal_Rela *dst;
244ffee7 376{
94dbb655
KR
377 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
378 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
53d3ce37 379 dst->r_addend = get_signed_word (abfd, (bfd_byte *) src->r_addend);
244ffee7
JK
380}
381
382/* Translate an ELF reloc from internal format to external format. */
013dec1a 383INLINE void
1c6042ee
ILT
384elf_swap_reloc_out (abfd, src, dst)
385 bfd *abfd;
d1bf45aa 386 const Elf_Internal_Rel *src;
1c6042ee 387 Elf_External_Rel *dst;
244ffee7 388{
94dbb655
KR
389 put_word (abfd, src->r_offset, dst->r_offset);
390 put_word (abfd, src->r_info, dst->r_info);
244ffee7
JK
391}
392
013dec1a 393INLINE void
1c6042ee
ILT
394elf_swap_reloca_out (abfd, src, dst)
395 bfd *abfd;
d1bf45aa 396 const Elf_Internal_Rela *src;
1c6042ee 397 Elf_External_Rela *dst;
244ffee7 398{
94dbb655
KR
399 put_word (abfd, src->r_offset, dst->r_offset);
400 put_word (abfd, src->r_info, dst->r_info);
53d3ce37 401 put_signed_word (abfd, src->r_addend, dst->r_addend);
244ffee7 402}
32090b8e 403
013dec1a 404INLINE void
02fcd126 405elf_swap_dyn_in (abfd, p, dst)
013dec1a 406 bfd *abfd;
02fcd126 407 const PTR p;
013dec1a
ILT
408 Elf_Internal_Dyn *dst;
409{
02fcd126
ILT
410 const Elf_External_Dyn *src = (const Elf_External_Dyn *) p;
411
013dec1a
ILT
412 dst->d_tag = get_word (abfd, src->d_tag);
413 dst->d_un.d_val = get_word (abfd, src->d_un.d_val);
414}
1c6042ee 415
013dec1a
ILT
416INLINE void
417elf_swap_dyn_out (abfd, src, dst)
418 bfd *abfd;
419 const Elf_Internal_Dyn *src;
420 Elf_External_Dyn *dst;
421{
422 put_word (abfd, src->d_tag, dst->d_tag);
423 put_word (abfd, src->d_un.d_val, dst->d_un.d_val);
424}
425\f
32090b8e
KR
426/* ELF .o/exec file reading */
427
244ffee7 428
32090b8e 429/* Begin processing a given object.
244ffee7 430
32090b8e
KR
431 First we validate the file by reading in the ELF header and checking
432 the magic number. */
433
434static INLINE boolean
1c6042ee
ILT
435elf_file_p (x_ehdrp)
436 Elf_External_Ehdr *x_ehdrp;
244ffee7 437{
32090b8e
KR
438 return ((x_ehdrp->e_ident[EI_MAG0] == ELFMAG0)
439 && (x_ehdrp->e_ident[EI_MAG1] == ELFMAG1)
440 && (x_ehdrp->e_ident[EI_MAG2] == ELFMAG2)
441 && (x_ehdrp->e_ident[EI_MAG3] == ELFMAG3));
442}
244ffee7 443
d24928c0
KR
444/* Check to see if the file associated with ABFD matches the target vector
445 that ABFD points to.
446
447 Note that we may be called several times with the same ABFD, but different
448 target vectors, most of which will not match. We have to avoid leaving
449 any side effects in ABFD, or any data it points to (like tdata), if the
6ec3bb6a 450 file does not match the target vector. */
d24928c0 451
2f3508ad 452const bfd_target *
1c6042ee
ILT
453elf_object_p (abfd)
454 bfd *abfd;
244ffee7 455{
32090b8e
KR
456 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
457 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
458 Elf_External_Shdr x_shdr; /* Section header table entry, external form */
6ec3bb6a 459 Elf_Internal_Shdr *i_shdrp = NULL; /* Section header table, internal form */
68241b2b 460 unsigned int shindex;
32090b8e 461 char *shstrtab; /* Internal copy of section header stringtab */
062189c6 462 struct elf_backend_data *ebd;
d24928c0 463 struct elf_obj_tdata *preserved_tdata = elf_tdata (abfd);
6ec3bb6a 464 struct elf_obj_tdata *new_tdata = NULL;
e549b1d2 465 asection *s;
244ffee7 466
32090b8e
KR
467 /* Read in the ELF header in external format. */
468
469 if (bfd_read ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd) != sizeof (x_ehdr))
25057836
JL
470 {
471 if (bfd_get_error () != bfd_error_system_call)
472 goto got_wrong_format_error;
473 else
474 goto got_no_match;
475 }
244ffee7 476
32090b8e
KR
477 /* Now check to see if we have a valid ELF file, and one that BFD can
478 make use of. The magic number must match, the address size ('class')
479 and byte-swapping must match our XVEC entry, and it must have a
480 section header table (FIXME: See comments re sections at top of this
481 file). */
244ffee7 482
d24928c0
KR
483 if ((elf_file_p (&x_ehdr) == false) ||
484 (x_ehdr.e_ident[EI_VERSION] != EV_CURRENT) ||
485 (x_ehdr.e_ident[EI_CLASS] != ELFCLASS))
486 goto got_wrong_format_error;
244ffee7 487
d24928c0 488 /* Check that file's byte order matches xvec's */
32090b8e 489 switch (x_ehdr.e_ident[EI_DATA])
244ffee7 490 {
32090b8e 491 case ELFDATA2MSB: /* Big-endian */
02fcd126 492 if (! bfd_header_big_endian (abfd))
d24928c0 493 goto got_wrong_format_error;
32090b8e
KR
494 break;
495 case ELFDATA2LSB: /* Little-endian */
02fcd126 496 if (! bfd_header_little_endian (abfd))
d24928c0 497 goto got_wrong_format_error;
32090b8e
KR
498 break;
499 case ELFDATANONE: /* No data encoding specified */
500 default: /* Unknown data encoding specified */
d24928c0 501 goto got_wrong_format_error;
244ffee7 502 }
244ffee7 503
32090b8e 504 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
6ec3bb6a 505 the tdata pointer in the bfd. */
244ffee7 506
6ec3bb6a
ILT
507 new_tdata = ((struct elf_obj_tdata *)
508 bfd_zalloc (abfd, sizeof (struct elf_obj_tdata)));
509 if (new_tdata == NULL)
a9713b91 510 goto got_no_match;
6ec3bb6a 511 elf_tdata (abfd) = new_tdata;
244ffee7 512
32090b8e
KR
513 /* Now that we know the byte order, swap in the rest of the header */
514 i_ehdrp = elf_elfheader (abfd);
515 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
516#if DEBUG & 1
517 elf_debug_file (i_ehdrp);
244ffee7
JK
518#endif
519
32090b8e
KR
520 /* If there is no section header table, we're hosed. */
521 if (i_ehdrp->e_shoff == 0)
d24928c0 522 goto got_wrong_format_error;
244ffee7 523
062189c6
ILT
524 /* As a simple sanity check, verify that the what BFD thinks is the
525 size of each section header table entry actually matches the size
526 recorded in the file. */
527 if (i_ehdrp->e_shentsize != sizeof (x_shdr))
528 goto got_wrong_format_error;
529
530 ebd = get_elf_backend_data (abfd);
531
532 /* Check that the ELF e_machine field matches what this particular
533 BFD format expects. */
df168c35
DE
534 if (ebd->elf_machine_code != i_ehdrp->e_machine
535 && (ebd->elf_machine_alt1 == 0 || i_ehdrp->e_machine != ebd->elf_machine_alt1)
536 && (ebd->elf_machine_alt2 == 0 || i_ehdrp->e_machine != ebd->elf_machine_alt2))
062189c6 537 {
2f3508ad 538 const bfd_target * const *target_ptr;
062189c6
ILT
539
540 if (ebd->elf_machine_code != EM_NONE)
541 goto got_wrong_format_error;
542
543 /* This is the generic ELF target. Let it match any ELF target
544 for which we do not have a specific backend. */
f4bd7a8f 545 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
062189c6
ILT
546 {
547 struct elf_backend_data *back;
548
549 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
550 continue;
551 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
d1bf45aa
ILT
552 if (back->elf_machine_code == i_ehdrp->e_machine
553 || (back->elf_machine_alt1 != 0
554 && back->elf_machine_alt1 == i_ehdrp->e_machine)
555 || (back->elf_machine_alt2 != 0
556 && back->elf_machine_alt2 == i_ehdrp->e_machine))
062189c6
ILT
557 {
558 /* target_ptr is an ELF backend which matches this
559 object file, so reject the generic ELF target. */
560 goto got_wrong_format_error;
561 }
562 }
563 }
564
7b8106b4 565 if (i_ehdrp->e_type == ET_EXEC)
32090b8e 566 abfd->flags |= EXEC_P;
7b8106b4
ILT
567 else if (i_ehdrp->e_type == ET_DYN)
568 abfd->flags |= DYNAMIC;
244ffee7 569
fa15568a
ILT
570 if (i_ehdrp->e_phnum > 0)
571 abfd->flags |= D_PAGED;
572
6ec3bb6a
ILT
573 if (! bfd_default_set_arch_mach (abfd, ebd->arch, 0))
574 goto got_no_match;
32090b8e 575
062189c6
ILT
576 /* Remember the entry point specified in the ELF file header. */
577 bfd_get_start_address (abfd) = i_ehdrp->e_entry;
32090b8e
KR
578
579 /* Allocate space for a copy of the section header table in
580 internal form, seek to the section header table in the file,
062189c6 581 read it in, and convert it to internal form. */
6ec3bb6a
ILT
582 i_shdrp = ((Elf_Internal_Shdr *)
583 bfd_alloc (abfd, sizeof (*i_shdrp) * i_ehdrp->e_shnum));
584 elf_elfsections (abfd) = ((Elf_Internal_Shdr **)
585 bfd_alloc (abfd,
586 sizeof (i_shdrp) * i_ehdrp->e_shnum));
1c6042ee 587 if (!i_shdrp || !elf_elfsections (abfd))
a9713b91 588 goto got_no_match;
6ec3bb6a 589 if (bfd_seek (abfd, i_ehdrp->e_shoff, SEEK_SET) != 0)
25057836 590 goto got_no_match;
32090b8e 591 for (shindex = 0; shindex < i_ehdrp->e_shnum; shindex++)
244ffee7 592 {
d24928c0 593 if (bfd_read ((PTR) & x_shdr, sizeof x_shdr, 1, abfd) != sizeof (x_shdr))
25057836 594 goto got_no_match;
32090b8e 595 elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex);
1c6042ee 596 elf_elfsections (abfd)[shindex] = i_shdrp + shindex;
e35765a9
ILT
597
598 /* If the section is loaded, but not page aligned, clear
599 D_PAGED. */
600 if ((i_shdrp[shindex].sh_flags & SHF_ALLOC) != 0
601 && i_shdrp[shindex].sh_type != SHT_NOBITS
602 && (((i_shdrp[shindex].sh_addr - i_shdrp[shindex].sh_offset)
603 % ebd->maxpagesize)
604 != 0))
605 abfd->flags &= ~D_PAGED;
244ffee7 606 }
32090b8e 607 if (i_ehdrp->e_shstrndx)
244ffee7 608 {
2e03ce18
ILT
609 if (! bfd_section_from_shdr (abfd, i_ehdrp->e_shstrndx))
610 goto got_no_match;
244ffee7
JK
611 }
612
a9713b91
ILT
613 /* Read in the program headers. */
614 if (i_ehdrp->e_phnum == 0)
615 elf_tdata (abfd)->phdr = NULL;
616 else
617 {
618 Elf_Internal_Phdr *i_phdr;
619 unsigned int i;
620
621 elf_tdata (abfd)->phdr = ((Elf_Internal_Phdr *)
622 bfd_alloc (abfd,
623 (i_ehdrp->e_phnum
624 * sizeof (Elf_Internal_Phdr))));
625 if (elf_tdata (abfd)->phdr == NULL)
626 goto got_no_match;
627 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) != 0)
628 goto got_no_match;
629 i_phdr = elf_tdata (abfd)->phdr;
630 for (i = 0; i < i_ehdrp->e_phnum; i++, i_phdr++)
631 {
632 Elf_External_Phdr x_phdr;
633
634 if (bfd_read ((PTR) &x_phdr, sizeof x_phdr, 1, abfd)
635 != sizeof x_phdr)
636 goto got_no_match;
637 elf_swap_phdr_in (abfd, &x_phdr, i_phdr);
638 }
639 }
640
32090b8e
KR
641 /* Read in the string table containing the names of the sections. We
642 will need the base pointer to this table later. */
643 /* We read this inline now, so that we don't have to go through
644 bfd_section_from_shdr with it (since this particular strtab is
645 used to find all of the ELF section names.) */
244ffee7 646
ede4eed4 647 shstrtab = bfd_elf_get_str_section (abfd, i_ehdrp->e_shstrndx);
32090b8e 648 if (!shstrtab)
6ec3bb6a 649 goto got_no_match;
244ffee7 650
32090b8e
KR
651 /* Once all of the section headers have been read and converted, we
652 can start processing them. Note that the first section header is
6ec3bb6a 653 a dummy placeholder entry, so we ignore it. */
244ffee7 654
32090b8e
KR
655 for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++)
656 {
2e03ce18
ILT
657 if (! bfd_section_from_shdr (abfd, shindex))
658 goto got_no_match;
32090b8e 659 }
244ffee7 660
5315c428
ILT
661 /* Let the backend double check the format and override global
662 information. */
663 if (ebd->elf_backend_object_p)
664 {
665 if ((*ebd->elf_backend_object_p) (abfd) == false)
666 goto got_wrong_format_error;
667 }
668
e549b1d2
ILT
669 /* If we have created any reloc sections that are associated with
670 debugging sections, mark the reloc sections as debugging as well. */
671 for (s = abfd->sections; s != NULL; s = s->next)
672 {
673 if ((elf_section_data (s)->this_hdr.sh_type == SHT_REL
674 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA)
675 && elf_section_data (s)->this_hdr.sh_info > 0)
676 {
677 unsigned long targ_index;
678 asection *targ_sec;
679
680 targ_index = elf_section_data (s)->this_hdr.sh_info;
681 targ_sec = bfd_section_from_elf_index (abfd, targ_index);
682 if (targ_sec != NULL
683 && (targ_sec->flags & SEC_DEBUGGING) != 0)
684 s->flags |= SEC_DEBUGGING;
685 }
686 }
687
d24928c0
KR
688 return (abfd->xvec);
689
1c6042ee 690got_wrong_format_error:
d1ad85a6 691 bfd_set_error (bfd_error_wrong_format);
d24928c0 692 goto got_no_match;
1c6042ee 693got_no_match:
6ec3bb6a
ILT
694 if (new_tdata != NULL
695 && new_tdata->elf_sect_ptr != NULL)
696 bfd_release (abfd, new_tdata->elf_sect_ptr);
697 if (i_shdrp != NULL)
698 bfd_release (abfd, i_shdrp);
699 if (new_tdata != NULL)
700 bfd_release (abfd, new_tdata);
d24928c0
KR
701 elf_tdata (abfd) = preserved_tdata;
702 return (NULL);
32090b8e 703}
32090b8e
KR
704\f
705/* ELF .o/exec file writing */
706
c9e5279f
ILT
707/* Write out the relocs. */
708
0ef449df
KR
709static void
710write_relocs (abfd, sec, data)
32090b8e
KR
711 bfd *abfd;
712 asection *sec;
0ef449df 713 PTR data;
32090b8e 714{
0ef449df 715 boolean *failedp = (boolean *) data;
32090b8e
KR
716 Elf_Internal_Shdr *rela_hdr;
717 Elf_External_Rela *outbound_relocas;
718 Elf_External_Rel *outbound_relocs;
6ab826bd 719 unsigned int idx;
32090b8e 720 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
300adb31 721 asymbol *last_sym = 0;
d1bf45aa 722 int last_sym_idx = 0;
244ffee7 723
0ef449df
KR
724 /* If we have already failed, don't do anything. */
725 if (*failedp)
726 return;
727
32090b8e
KR
728 if ((sec->flags & SEC_RELOC) == 0)
729 return;
6ec3bb6a
ILT
730
731 /* The linker backend writes the relocs out itself, and sets the
732 reloc_count field to zero to inhibit writing them here. Also,
733 sometimes the SEC_RELOC flag gets set even when there aren't any
734 relocs. */
32090b8e
KR
735 if (sec->reloc_count == 0)
736 return;
244ffee7 737
32090b8e 738 rela_hdr = &elf_section_data (sec)->rel_hdr;
244ffee7 739
32090b8e 740 rela_hdr->sh_size = rela_hdr->sh_entsize * sec->reloc_count;
0ef449df
KR
741 rela_hdr->contents = (PTR) bfd_alloc (abfd, rela_hdr->sh_size);
742 if (rela_hdr->contents == NULL)
9783e04a 743 {
0ef449df
KR
744 *failedp = true;
745 return;
9783e04a 746 }
244ffee7 747
32090b8e 748 /* orelocation has the data, reloc_count has the count... */
300adb31
KR
749 if (use_rela_p)
750 {
751 outbound_relocas = (Elf_External_Rela *) rela_hdr->contents;
752
753 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 754 {
300adb31
KR
755 Elf_Internal_Rela dst_rela;
756 Elf_External_Rela *src_rela;
757 arelent *ptr;
758 asymbol *sym;
759 int n;
760
761 ptr = sec->orelocation[idx];
762 src_rela = outbound_relocas + idx;
4c124191
ILT
763
764 /* The address of an ELF reloc is section relative for an object
765 file, and absolute for an executable file or shared library.
766 The address of a BFD reloc is always section relative. */
767 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
300adb31 768 dst_rela.r_offset = ptr->address;
4c124191
ILT
769 else
770 dst_rela.r_offset = ptr->address + sec->vma;
6a3eb9b6 771
300adb31
KR
772 sym = *ptr->sym_ptr_ptr;
773 if (sym == last_sym)
774 n = last_sym_idx;
e35765a9
ILT
775 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
776 n = STN_UNDEF;
300adb31 777 else
32090b8e 778 {
300adb31 779 last_sym = sym;
d1bf45aa
ILT
780 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
781 if (n < 0)
782 {
783 *failedp = true;
784 return;
785 }
786 last_sym_idx = n;
32090b8e 787 }
c9e5279f 788
e35765a9
ILT
789 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
790 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
791 && ! _bfd_elf_validate_reloc (abfd, ptr))
c9e5279f
ILT
792 {
793 *failedp = true;
794 return;
795 }
796
300adb31
KR
797 dst_rela.r_info = ELF_R_INFO (n, ptr->howto->type);
798
799 dst_rela.r_addend = ptr->addend;
800 elf_swap_reloca_out (abfd, &dst_rela, src_rela);
244ffee7 801 }
300adb31
KR
802 }
803 else
804 /* REL relocations */
805 {
806 outbound_relocs = (Elf_External_Rel *) rela_hdr->contents;
807
808 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 809 {
300adb31
KR
810 Elf_Internal_Rel dst_rel;
811 Elf_External_Rel *src_rel;
812 arelent *ptr;
813 int n;
814 asymbol *sym;
815
816 ptr = sec->orelocation[idx];
817 sym = *ptr->sym_ptr_ptr;
818 src_rel = outbound_relocs + idx;
4c124191
ILT
819
820 /* The address of an ELF reloc is section relative for an object
821 file, and absolute for an executable file or shared library.
822 The address of a BFD reloc is always section relative. */
823 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
300adb31 824 dst_rel.r_offset = ptr->address;
4c124191
ILT
825 else
826 dst_rel.r_offset = ptr->address + sec->vma;
244ffee7 827
300adb31
KR
828 if (sym == last_sym)
829 n = last_sym_idx;
830 else
32090b8e 831 {
300adb31 832 last_sym = sym;
d1bf45aa
ILT
833 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
834 if (n < 0)
835 {
836 *failedp = true;
837 return;
838 }
839 last_sym_idx = n;
32090b8e 840 }
c9e5279f 841
d1bf45aa 842 if ((*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
e35765a9 843 && ! _bfd_elf_validate_reloc (abfd, ptr))
c9e5279f
ILT
844 {
845 *failedp = true;
846 return;
847 }
848
300adb31
KR
849 dst_rel.r_info = ELF_R_INFO (n, ptr->howto->type);
850
851 elf_swap_reloc_out (abfd, &dst_rel, src_rel);
32090b8e 852 }
300adb31 853 }
32090b8e 854}
244ffee7 855
d1bf45aa
ILT
856/* Write out the program headers. */
857
858int
859elf_write_out_phdrs (abfd, phdr, count)
ede4eed4 860 bfd *abfd;
d1bf45aa 861 const Elf_Internal_Phdr *phdr;
ede4eed4
KR
862 int count;
863{
864 while (count--)
fa15568a 865 {
ede4eed4
KR
866 Elf_External_Phdr extphdr;
867 elf_swap_phdr_out (abfd, phdr, &extphdr);
868 if (bfd_write (&extphdr, sizeof (Elf_External_Phdr), 1, abfd)
869 != sizeof (Elf_External_Phdr))
870 return -1;
871 phdr++;
fa15568a 872 }
ede4eed4 873 return 0;
fa15568a 874}
244ffee7 875
d1bf45aa
ILT
876/* Write out the section headers and the ELF file header. */
877
878boolean
879elf_write_shdrs_and_ehdr (abfd)
fa15568a
ILT
880 bfd *abfd;
881{
ede4eed4
KR
882 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
883 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
884 Elf_External_Shdr *x_shdrp; /* Section header table, external form */
885 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
886 unsigned int count;
7c726b66 887
ede4eed4
KR
888 i_ehdrp = elf_elfheader (abfd);
889 i_shdrp = elf_elfsections (abfd);
7c726b66 890
ede4eed4 891 /* swap the header before spitting it out... */
fa15568a 892
ede4eed4
KR
893#if DEBUG & 1
894 elf_debug_file (i_ehdrp);
895#endif
896 elf_swap_ehdr_out (abfd, i_ehdrp, &x_ehdr);
897 if (bfd_seek (abfd, (file_ptr) 0, SEEK_SET) != 0
898 || (bfd_write ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd)
899 != sizeof (x_ehdr)))
900 return false;
fa15568a 901
ede4eed4
KR
902 /* at this point we've concocted all the ELF sections... */
903 x_shdrp = (Elf_External_Shdr *)
904 bfd_alloc (abfd, sizeof (*x_shdrp) * (i_ehdrp->e_shnum));
905 if (!x_shdrp)
a9713b91 906 return false;
fa15568a 907
ede4eed4 908 for (count = 0; count < i_ehdrp->e_shnum; count++)
fa15568a 909 {
ede4eed4
KR
910#if DEBUG & 2
911 elf_debug_section (count, i_shdrp[count]);
912#endif
913 elf_swap_shdr_out (abfd, i_shdrp[count], x_shdrp + count);
fa15568a 914 }
ede4eed4
KR
915 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET) != 0
916 || (bfd_write ((PTR) x_shdrp, sizeof (*x_shdrp), i_ehdrp->e_shnum, abfd)
917 != sizeof (*x_shdrp) * i_ehdrp->e_shnum))
918 return false;
fa15568a 919
ede4eed4 920 /* need to dump the string table too... */
fa15568a
ILT
921
922 return true;
244ffee7
JK
923}
924
d1bf45aa 925long
ede4eed4 926elf_slurp_symbol_table (abfd, symptrs, dynamic)
062189c6 927 bfd *abfd;
ede4eed4
KR
928 asymbol **symptrs; /* Buffer for generated bfd symbols */
929 boolean dynamic;
32090b8e 930{
ede4eed4 931 Elf_Internal_Shdr *hdr;
e549b1d2 932 Elf_Internal_Shdr *verhdr;
53d3ce37 933 unsigned long symcount; /* Number of external ELF symbols */
ede4eed4
KR
934 elf_symbol_type *sym; /* Pointer to current bfd symbol */
935 elf_symbol_type *symbase; /* Buffer for generated bfd symbols */
936 Elf_Internal_Sym i_sym;
937 Elf_External_Sym *x_symp = NULL;
e549b1d2 938 Elf_External_Versym *x_versymp = NULL;
244ffee7 939
ede4eed4
KR
940 /* Read each raw ELF symbol, converting from external ELF form to
941 internal ELF form, and then using the information to create a
942 canonical bfd symbol table entry.
6a3eb9b6 943
ede4eed4
KR
944 Note that we allocate the initial bfd canonical symbol buffer
945 based on a one-to-one mapping of the ELF symbols to canonical
946 symbols. We actually use all the ELF symbols, so there will be no
947 space left over at the end. When we have all the symbols, we
948 build the caller's pointer vector. */
244ffee7 949
e549b1d2
ILT
950 if (! dynamic)
951 {
952 hdr = &elf_tdata (abfd)->symtab_hdr;
953 verhdr = NULL;
954 }
ede4eed4 955 else
e549b1d2
ILT
956 {
957 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
f56d634e
ILT
958 if (elf_dynversym (abfd) == 0)
959 verhdr = NULL;
960 else
961 verhdr = &elf_tdata (abfd)->dynversym_hdr;
e549b1d2
ILT
962 if ((elf_tdata (abfd)->dynverdef_section != 0
963 && elf_tdata (abfd)->verdef == NULL)
964 || (elf_tdata (abfd)->dynverref_section != 0
965 && elf_tdata (abfd)->verref == NULL))
966 {
967 if (! _bfd_elf_slurp_version_tables (abfd))
968 return -1;
969 }
970 }
971
ede4eed4
KR
972 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) == -1)
973 return -1;
244ffee7 974
ede4eed4 975 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
d24928c0 976
ede4eed4
KR
977 if (symcount == 0)
978 sym = symbase = NULL;
979 else
e621c5cc 980 {
53d3ce37 981 unsigned long i;
24f13b03 982
ede4eed4
KR
983 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) == -1)
984 return -1;
6ec3bb6a 985
ede4eed4
KR
986 symbase = ((elf_symbol_type *)
987 bfd_zalloc (abfd, symcount * sizeof (elf_symbol_type)));
988 if (symbase == (elf_symbol_type *) NULL)
a9713b91 989 return -1;
ede4eed4 990 sym = symbase;
6ec3bb6a 991
ede4eed4
KR
992 /* Temporarily allocate room for the raw ELF symbols. */
993 x_symp = ((Elf_External_Sym *)
58142f10 994 bfd_malloc (symcount * sizeof (Elf_External_Sym)));
ede4eed4 995 if (x_symp == NULL && symcount != 0)
58142f10 996 goto error_return;
1c640609 997
ede4eed4
KR
998 if (bfd_read ((PTR) x_symp, sizeof (Elf_External_Sym), symcount, abfd)
999 != symcount * sizeof (Elf_External_Sym))
1000 goto error_return;
e549b1d2
ILT
1001
1002 /* Read the raw ELF version symbol information. */
1003
f56d634e 1004 if (verhdr != NULL
e549b1d2
ILT
1005 && verhdr->sh_size / sizeof (Elf_External_Versym) != symcount)
1006 {
1007 (*_bfd_error_handler)
53d3ce37 1008 (_("%s: version count (%ld) does not match symbol count (%ld)"),
e549b1d2
ILT
1009 abfd->filename,
1010 (long) (verhdr->sh_size / sizeof (Elf_External_Versym)),
1011 symcount);
1012
1013 /* Slurp in the symbols without the version information,
1014 since that is more helpful than just quitting. */
1015 verhdr = NULL;
1016 }
1017
1018 if (verhdr != NULL)
1019 {
1020 if (bfd_seek (abfd, verhdr->sh_offset, SEEK_SET) != 0)
1021 goto error_return;
1022
1023 x_versymp = (Elf_External_Versym *) bfd_malloc (verhdr->sh_size);
f56d634e 1024 if (x_versymp == NULL && verhdr->sh_size != 0)
e549b1d2
ILT
1025 goto error_return;
1026
1027 if (bfd_read ((PTR) x_versymp, 1, verhdr->sh_size, abfd)
1028 != verhdr->sh_size)
1029 goto error_return;
1030 }
1031
ede4eed4
KR
1032 /* Skip first symbol, which is a null dummy. */
1033 for (i = 1; i < symcount; i++)
6ec3bb6a 1034 {
ede4eed4
KR
1035 elf_swap_symbol_in (abfd, x_symp + i, &i_sym);
1036 memcpy (&sym->internal_elf_sym, &i_sym, sizeof (Elf_Internal_Sym));
1037#ifdef ELF_KEEP_EXTSYM
1038 memcpy (&sym->native_elf_sym, x_symp + i, sizeof (Elf_External_Sym));
6ec3bb6a 1039#endif
ede4eed4 1040 sym->symbol.the_bfd = abfd;
6ec3bb6a 1041
ede4eed4
KR
1042 sym->symbol.name = bfd_elf_string_from_elf_section (abfd,
1043 hdr->sh_link,
1044 i_sym.st_name);
6ec3bb6a 1045
ede4eed4 1046 sym->symbol.value = i_sym.st_value;
6ec3bb6a 1047
ede4eed4 1048 if (i_sym.st_shndx > 0 && i_sym.st_shndx < SHN_LORESERVE)
6ec3bb6a 1049 {
ede4eed4
KR
1050 sym->symbol.section = section_from_elf_index (abfd,
1051 i_sym.st_shndx);
1052 if (sym->symbol.section == NULL)
6ec3bb6a 1053 {
ede4eed4
KR
1054 /* This symbol is in a section for which we did not
1055 create a BFD section. Just use bfd_abs_section,
1056 although it is wrong. FIXME. */
1057 sym->symbol.section = bfd_abs_section_ptr;
6ec3bb6a
ILT
1058 }
1059 }
ede4eed4 1060 else if (i_sym.st_shndx == SHN_ABS)
6ec3bb6a 1061 {
ede4eed4 1062 sym->symbol.section = bfd_abs_section_ptr;
6ec3bb6a 1063 }
ede4eed4 1064 else if (i_sym.st_shndx == SHN_COMMON)
6ec3bb6a 1065 {
ede4eed4
KR
1066 sym->symbol.section = bfd_com_section_ptr;
1067 /* Elf puts the alignment into the `value' field, and
1068 the size into the `size' field. BFD wants to see the
1069 size in the value field, and doesn't care (at the
1070 moment) about the alignment. */
1071 sym->symbol.value = i_sym.st_size;
6ec3bb6a 1072 }
ede4eed4 1073 else if (i_sym.st_shndx == SHN_UNDEF)
6ec3bb6a 1074 {
ede4eed4 1075 sym->symbol.section = bfd_und_section_ptr;
6ec3bb6a
ILT
1076 }
1077 else
ede4eed4 1078 sym->symbol.section = bfd_abs_section_ptr;
013dec1a 1079
53d3ce37
TT
1080 /* If this is a relocateable file, then the symbol value is
1081 already section relative. */
1082 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1083 sym->symbol.value -= sym->symbol.section->vma;
013dec1a 1084
ede4eed4 1085 switch (ELF_ST_BIND (i_sym.st_info))
013dec1a 1086 {
ede4eed4
KR
1087 case STB_LOCAL:
1088 sym->symbol.flags |= BSF_LOCAL;
197e30e5 1089 break;
ede4eed4
KR
1090 case STB_GLOBAL:
1091 if (i_sym.st_shndx != SHN_UNDEF
1092 && i_sym.st_shndx != SHN_COMMON)
1093 sym->symbol.flags |= BSF_GLOBAL;
013dec1a 1094 break;
ede4eed4
KR
1095 case STB_WEAK:
1096 sym->symbol.flags |= BSF_WEAK;
013dec1a
ILT
1097 break;
1098 }
013dec1a 1099
ede4eed4 1100 switch (ELF_ST_TYPE (i_sym.st_info))
eb4267a3 1101 {
ede4eed4
KR
1102 case STT_SECTION:
1103 sym->symbol.flags |= BSF_SECTION_SYM | BSF_DEBUGGING;
1104 break;
1105 case STT_FILE:
1106 sym->symbol.flags |= BSF_FILE | BSF_DEBUGGING;
1107 break;
1108 case STT_FUNC:
1109 sym->symbol.flags |= BSF_FUNCTION;
1110 break;
c9e5279f
ILT
1111 case STT_OBJECT:
1112 sym->symbol.flags |= BSF_OBJECT;
1113 break;
eb4267a3 1114 }
6ec3bb6a 1115
ede4eed4
KR
1116 if (dynamic)
1117 sym->symbol.flags |= BSF_DYNAMIC;
3c9832f8 1118
e549b1d2
ILT
1119 if (x_versymp != NULL)
1120 {
1121 Elf_Internal_Versym iversym;
1122
1123 _bfd_elf_swap_versym_in (abfd, x_versymp + i, &iversym);
1124 sym->version = iversym.vs_vers;
1125 }
1126
ede4eed4
KR
1127 /* Do some backend-specific processing on this symbol. */
1128 {
1129 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
1130 if (ebd->elf_backend_symbol_processing)
1131 (*ebd->elf_backend_symbol_processing) (abfd, &sym->symbol);
1132 }
6ec3bb6a 1133
ede4eed4
KR
1134 sym++;
1135 }
6ec3bb6a
ILT
1136 }
1137
ede4eed4
KR
1138 /* Do some backend-specific processing on this symbol table. */
1139 {
1140 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
1141 if (ebd->elf_backend_symbol_table_processing)
1142 (*ebd->elf_backend_symbol_table_processing) (abfd, symbase, symcount);
1143 }
6ec3bb6a 1144
ede4eed4 1145 /* We rely on the zalloc to clear out the final symbol entry. */
6ec3bb6a 1146
ede4eed4 1147 symcount = sym - symbase;
71edd06d 1148
ede4eed4
KR
1149 /* Fill in the user's symbol pointer vector if needed. */
1150 if (symptrs)
6ec3bb6a 1151 {
ede4eed4 1152 long l = symcount;
6ec3bb6a 1153
ede4eed4
KR
1154 sym = symbase;
1155 while (l-- > 0)
1156 {
1157 *symptrs++ = &sym->symbol;
1158 sym++;
1159 }
1160 *symptrs = 0; /* Final null pointer */
6ec3bb6a
ILT
1161 }
1162
e549b1d2
ILT
1163 if (x_versymp != NULL)
1164 free (x_versymp);
ede4eed4
KR
1165 if (x_symp != NULL)
1166 free (x_symp);
1167 return symcount;
1168error_return:
e549b1d2
ILT
1169 if (x_versymp != NULL)
1170 free (x_versymp);
ede4eed4
KR
1171 if (x_symp != NULL)
1172 free (x_symp);
1173 return -1;
6ec3bb6a
ILT
1174}
1175
ede4eed4 1176/* Read in and swap the external relocs. */
6ec3bb6a
ILT
1177
1178static boolean
e35765a9 1179elf_slurp_reloc_table (abfd, asect, symbols, dynamic)
ede4eed4
KR
1180 bfd *abfd;
1181 asection *asect;
1182 asymbol **symbols;
e35765a9 1183 boolean dynamic;
6ec3bb6a 1184{
ede4eed4
KR
1185 struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
1186 struct bfd_elf_section_data * const d = elf_section_data (asect);
e35765a9
ILT
1187 Elf_Internal_Shdr *rel_hdr;
1188 bfd_size_type reloc_count;
ede4eed4
KR
1189 PTR allocated = NULL;
1190 bfd_byte *native_relocs;
1191 arelent *relents;
1192 arelent *relent;
1193 unsigned int i;
1194 int entsize;
013dec1a 1195
e35765a9 1196 if (asect->relocation != NULL)
6ec3bb6a
ILT
1197 return true;
1198
e35765a9
ILT
1199 if (! dynamic)
1200 {
1201 if ((asect->flags & SEC_RELOC) == 0
1202 || asect->reloc_count == 0)
1203 return true;
1204
1205 rel_hdr = &d->rel_hdr;
1206 reloc_count = asect->reloc_count;
1207
1208 BFD_ASSERT (asect->rel_filepos == rel_hdr->sh_offset
1209 && reloc_count == rel_hdr->sh_size / rel_hdr->sh_entsize);
1210 }
1211 else
1212 {
1213 if (asect->_raw_size == 0)
1214 return true;
1215
1216 rel_hdr = &d->this_hdr;
1217 reloc_count = rel_hdr->sh_size / rel_hdr->sh_entsize;
1218 }
6ec3bb6a 1219
e35765a9 1220 allocated = (PTR) bfd_malloc ((size_t) rel_hdr->sh_size);
ede4eed4 1221 if (allocated == NULL)
58142f10 1222 goto error_return;
6ec3bb6a 1223
e35765a9
ILT
1224 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0
1225 || (bfd_read (allocated, 1, rel_hdr->sh_size, abfd)
1226 != rel_hdr->sh_size))
ede4eed4 1227 goto error_return;
6ec3bb6a 1228
ede4eed4 1229 native_relocs = (bfd_byte *) allocated;
6ec3bb6a 1230
e35765a9 1231 relents = (arelent *) bfd_alloc (abfd, reloc_count * sizeof (arelent));
ede4eed4 1232 if (relents == NULL)
a9713b91 1233 goto error_return;
6ec3bb6a 1234
e35765a9 1235 entsize = rel_hdr->sh_entsize;
ede4eed4
KR
1236 BFD_ASSERT (entsize == sizeof (Elf_External_Rel)
1237 || entsize == sizeof (Elf_External_Rela));
1238
1239 for (i = 0, relent = relents;
e35765a9 1240 i < reloc_count;
ede4eed4 1241 i++, relent++, native_relocs += entsize)
013dec1a 1242 {
ede4eed4
KR
1243 Elf_Internal_Rela rela;
1244 Elf_Internal_Rel rel;
1245
1246 if (entsize == sizeof (Elf_External_Rela))
1247 elf_swap_reloca_in (abfd, (Elf_External_Rela *) native_relocs, &rela);
1248 else
013dec1a 1249 {
ede4eed4
KR
1250 elf_swap_reloc_in (abfd, (Elf_External_Rel *) native_relocs, &rel);
1251 rela.r_offset = rel.r_offset;
1252 rela.r_info = rel.r_info;
1253 rela.r_addend = 0;
013dec1a
ILT
1254 }
1255
ede4eed4
KR
1256 /* The address of an ELF reloc is section relative for an object
1257 file, and absolute for an executable file or shared library.
e35765a9
ILT
1258 The address of a normal BFD reloc is always section relative,
1259 and the address of a dynamic reloc is absolute.. */
1260 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
ede4eed4
KR
1261 relent->address = rela.r_offset;
1262 else
1263 relent->address = rela.r_offset - asect->vma;
6ec3bb6a 1264
ede4eed4
KR
1265 if (ELF_R_SYM (rela.r_info) == 0)
1266 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
1267 else
1268 {
1269 asymbol **ps, *s;
6ec3bb6a 1270
ede4eed4
KR
1271 ps = symbols + ELF_R_SYM (rela.r_info) - 1;
1272 s = *ps;
6ec3bb6a 1273
ede4eed4
KR
1274 /* Canonicalize ELF section symbols. FIXME: Why? */
1275 if ((s->flags & BSF_SECTION_SYM) == 0)
1276 relent->sym_ptr_ptr = ps;
1277 else
1278 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
1279 }
6ec3bb6a 1280
ede4eed4 1281 relent->addend = rela.r_addend;
013dec1a 1282
ede4eed4
KR
1283 if (entsize == sizeof (Elf_External_Rela))
1284 (*ebd->elf_info_to_howto) (abfd, relent, &rela);
1285 else
1286 (*ebd->elf_info_to_howto_rel) (abfd, relent, &rel);
5315c428
ILT
1287 }
1288
ede4eed4 1289 asect->relocation = relents;
6ec3bb6a 1290
ede4eed4
KR
1291 if (allocated != NULL)
1292 free (allocated);
6ec3bb6a 1293
ede4eed4 1294 return true;
6ec3bb6a 1295
ede4eed4
KR
1296 error_return:
1297 if (allocated != NULL)
1298 free (allocated);
1299 return false;
1300}
5315c428 1301
ede4eed4
KR
1302#ifdef DEBUG
1303static void
1304elf_debug_section (num, hdr)
1305 int num;
1306 Elf_Internal_Shdr *hdr;
1307{
1308 fprintf (stderr, "\nSection#%d '%s' 0x%.8lx\n", num,
1309 hdr->bfd_section != NULL ? hdr->bfd_section->name : "",
1310 (long) hdr);
1311 fprintf (stderr,
1312 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
1313 (long) hdr->sh_name,
1314 (long) hdr->sh_type,
1315 (long) hdr->sh_flags);
1316 fprintf (stderr,
1317 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
1318 (long) hdr->sh_addr,
1319 (long) hdr->sh_offset,
1320 (long) hdr->sh_size);
1321 fprintf (stderr,
1322 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
1323 (long) hdr->sh_link,
1324 (long) hdr->sh_info,
1325 (long) hdr->sh_addralign);
1326 fprintf (stderr, "sh_entsize = %ld\n",
1327 (long) hdr->sh_entsize);
1328 fflush (stderr);
1329}
6ec3bb6a 1330
ede4eed4
KR
1331static void
1332elf_debug_file (ehdrp)
1333 Elf_Internal_Ehdr *ehdrp;
1334{
1335 fprintf (stderr, "e_entry = 0x%.8lx\n", (long) ehdrp->e_entry);
1336 fprintf (stderr, "e_phoff = %ld\n", (long) ehdrp->e_phoff);
1337 fprintf (stderr, "e_phnum = %ld\n", (long) ehdrp->e_phnum);
1338 fprintf (stderr, "e_phentsize = %ld\n", (long) ehdrp->e_phentsize);
1339 fprintf (stderr, "e_shoff = %ld\n", (long) ehdrp->e_shoff);
1340 fprintf (stderr, "e_shnum = %ld\n", (long) ehdrp->e_shnum);
1341 fprintf (stderr, "e_shentsize = %ld\n", (long) ehdrp->e_shentsize);
1342}
6ec3bb6a 1343
ede4eed4
KR
1344static char *
1345elf_symbol_flags (flags)
1346 flagword flags;
1347{
1348 static char buffer[1024];
6ec3bb6a 1349
ede4eed4
KR
1350 buffer[0] = '\0';
1351 if (flags & BSF_LOCAL)
1352 strcat (buffer, " local");
8af74670 1353
ede4eed4
KR
1354 if (flags & BSF_GLOBAL)
1355 strcat (buffer, " global");
6ec3bb6a 1356
ede4eed4
KR
1357 if (flags & BSF_DEBUGGING)
1358 strcat (buffer, " debug");
6ec3bb6a 1359
ede4eed4
KR
1360 if (flags & BSF_FUNCTION)
1361 strcat (buffer, " function");
6ec3bb6a 1362
ede4eed4
KR
1363 if (flags & BSF_KEEP)
1364 strcat (buffer, " keep");
6ec3bb6a 1365
ede4eed4
KR
1366 if (flags & BSF_KEEP_G)
1367 strcat (buffer, " keep_g");
6ec3bb6a 1368
ede4eed4
KR
1369 if (flags & BSF_WEAK)
1370 strcat (buffer, " weak");
6ec3bb6a 1371
ede4eed4
KR
1372 if (flags & BSF_SECTION_SYM)
1373 strcat (buffer, " section-sym");
6ec3bb6a 1374
ede4eed4
KR
1375 if (flags & BSF_OLD_COMMON)
1376 strcat (buffer, " old-common");
6ec3bb6a 1377
ede4eed4
KR
1378 if (flags & BSF_NOT_AT_END)
1379 strcat (buffer, " not-at-end");
6ec3bb6a 1380
ede4eed4
KR
1381 if (flags & BSF_CONSTRUCTOR)
1382 strcat (buffer, " constructor");
6ec3bb6a 1383
ede4eed4
KR
1384 if (flags & BSF_WARNING)
1385 strcat (buffer, " warning");
6ec3bb6a 1386
ede4eed4
KR
1387 if (flags & BSF_INDIRECT)
1388 strcat (buffer, " indirect");
6ec3bb6a 1389
ede4eed4
KR
1390 if (flags & BSF_FILE)
1391 strcat (buffer, " file");
6ec3bb6a 1392
ede4eed4
KR
1393 if (flags & DYNAMIC)
1394 strcat (buffer, " dynamic");
6ec3bb6a 1395
ede4eed4
KR
1396 if (flags & ~(BSF_LOCAL
1397 | BSF_GLOBAL
1398 | BSF_DEBUGGING
1399 | BSF_FUNCTION
1400 | BSF_KEEP
1401 | BSF_KEEP_G
1402 | BSF_WEAK
1403 | BSF_SECTION_SYM
1404 | BSF_OLD_COMMON
1405 | BSF_NOT_AT_END
1406 | BSF_CONSTRUCTOR
1407 | BSF_WARNING
1408 | BSF_INDIRECT
1409 | BSF_FILE
1410 | BSF_DYNAMIC))
1411 strcat (buffer, " unknown-bits");
6ec3bb6a 1412
ede4eed4 1413 return buffer;
6ec3bb6a 1414}
ede4eed4
KR
1415#endif
1416\f
1417#include "elfcore.h"
1418#include "elflink.h"
1419\f
1420/* Size-dependent data and functions. */
1421const struct elf_size_info NAME(_bfd_elf,size_info) = {
1422 sizeof (Elf_External_Ehdr),
1423 sizeof (Elf_External_Phdr),
1424 sizeof (Elf_External_Shdr),
1425 sizeof (Elf_External_Rel),
1426 sizeof (Elf_External_Rela),
1427 sizeof (Elf_External_Sym),
1428 sizeof (Elf_External_Dyn),
1429 sizeof (Elf_External_Note),
1430
1431 ARCH_SIZE, FILE_ALIGN,
1432 ELFCLASS, EV_CURRENT,
d1bf45aa
ILT
1433 elf_write_out_phdrs,
1434 elf_write_shdrs_and_ehdr,
b818a325
KR
1435 write_relocs,
1436 elf_swap_symbol_out,
1437 elf_slurp_reloc_table,
1438 elf_slurp_symbol_table,
02fcd126 1439 elf_swap_dyn_in
ede4eed4 1440};