Remove spurious ChangeLog addition.
[deliverable/binutils-gdb.git] / bfd / elfcode.h
CommitLineData
252b5132 1/* ELF executable support for BFD.
7898deda 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
73ff0d56 3 2001, 2002 Free Software Foundation, Inc.
252b5132
RH
4
5 Written by Fred Fish @ Cygnus Support, from information published
6 in "UNIX System V Release 4, Programmers Guide: ANSI C and
7 Programming Support Tools". Sufficient support for gdb.
8
9 Rewritten by Mark Eichin @ Cygnus Support, from information
10 published in "System V Application Binary Interface", chapters 4
11 and 5, as well as the various "Processor Supplement" documents
12 derived from it. Added support for assembler and other object file
13 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
14 Meissner (Open Software Foundation), and Peter Hoogenboom (University
15 of Utah) to finish and extend this.
16
17This file is part of BFD, the Binary File Descriptor library.
18
19This program is free software; you can redistribute it and/or modify
20it under the terms of the GNU General Public License as published by
21the Free Software Foundation; either version 2 of the License, or
22(at your option) any later version.
23
24This program is distributed in the hope that it will be useful,
25but WITHOUT ANY WARRANTY; without even the implied warranty of
26MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
27GNU General Public License for more details.
28
29You should have received a copy of the GNU General Public License
30along with this program; if not, write to the Free Software
31Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
32
33/* Problems and other issues to resolve.
34
35 (1) BFD expects there to be some fixed number of "sections" in
36 the object file. I.E. there is a "section_count" variable in the
37 bfd structure which contains the number of sections. However, ELF
38 supports multiple "views" of a file. In particular, with current
39 implementations, executable files typically have two tables, a
40 program header table and a section header table, both of which
41 partition the executable.
42
43 In ELF-speak, the "linking view" of the file uses the section header
44 table to access "sections" within the file, and the "execution view"
45 uses the program header table to access "segments" within the file.
46 "Segments" typically may contain all the data from one or more
47 "sections".
48
49 Note that the section header table is optional in ELF executables,
50 but it is this information that is most useful to gdb. If the
51 section header table is missing, then gdb should probably try
52 to make do with the program header table. (FIXME)
53
54 (2) The code in this file is compiled twice, once in 32-bit mode and
55 once in 64-bit mode. More of it should be made size-independent
56 and moved into elf.c.
57
58 (3) ELF section symbols are handled rather sloppily now. This should
59 be cleaned up, and ELF section symbols reconciled with BFD section
60 symbols.
61
62 (4) We need a published spec for 64-bit ELF. We've got some stuff here
63 that we're using for SPARC V9 64-bit chips, but don't assume that
64 it's cast in stone.
65 */
66
67#include "bfd.h"
68#include "sysdep.h"
210ba1e8 69#include "libiberty.h"
252b5132
RH
70#include "bfdlink.h"
71#include "libbfd.h"
72#include "elf-bfd.h"
73
74/* Renaming structures, typedefs, macros and functions to be size-specific. */
75#define Elf_External_Ehdr NAME(Elf,External_Ehdr)
76#define Elf_External_Sym NAME(Elf,External_Sym)
77#define Elf_External_Shdr NAME(Elf,External_Shdr)
78#define Elf_External_Phdr NAME(Elf,External_Phdr)
79#define Elf_External_Rel NAME(Elf,External_Rel)
80#define Elf_External_Rela NAME(Elf,External_Rela)
81#define Elf_External_Dyn NAME(Elf,External_Dyn)
82
83#define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
84#define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
85#define elf_core_file_matches_executable_p \
86 NAME(bfd_elf,core_file_matches_executable_p)
87#define elf_object_p NAME(bfd_elf,object_p)
88#define elf_core_file_p NAME(bfd_elf,core_file_p)
89#define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
90#define elf_get_dynamic_symtab_upper_bound \
91 NAME(bfd_elf,get_dynamic_symtab_upper_bound)
92#define elf_swap_reloc_in NAME(bfd_elf,swap_reloc_in)
93#define elf_swap_reloca_in NAME(bfd_elf,swap_reloca_in)
94#define elf_swap_reloc_out NAME(bfd_elf,swap_reloc_out)
95#define elf_swap_reloca_out NAME(bfd_elf,swap_reloca_out)
96#define elf_swap_symbol_in NAME(bfd_elf,swap_symbol_in)
97#define elf_swap_symbol_out NAME(bfd_elf,swap_symbol_out)
98#define elf_swap_phdr_in NAME(bfd_elf,swap_phdr_in)
99#define elf_swap_phdr_out NAME(bfd_elf,swap_phdr_out)
100#define elf_swap_dyn_in NAME(bfd_elf,swap_dyn_in)
101#define elf_swap_dyn_out NAME(bfd_elf,swap_dyn_out)
102#define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
103#define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
104#define elf_slurp_symbol_table NAME(bfd_elf,slurp_symbol_table)
105#define elf_get_symtab NAME(bfd_elf,get_symtab)
106#define elf_canonicalize_dynamic_symtab \
107 NAME(bfd_elf,canonicalize_dynamic_symtab)
108#define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
109#define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
110#define elf_get_lineno NAME(bfd_elf,get_lineno)
111#define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
112#define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
113#define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
114#define elf_set_section_contents NAME(bfd_elf,set_section_contents)
115#define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
116#define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
117#define elf_find_section NAME(bfd_elf,find_section)
118#define elf_bfd_link_add_symbols NAME(bfd_elf,bfd_link_add_symbols)
119#define elf_add_dynamic_entry NAME(bfd_elf,add_dynamic_entry)
120#define elf_write_shdrs_and_ehdr NAME(bfd_elf,write_shdrs_and_ehdr)
121#define elf_write_out_phdrs NAME(bfd_elf,write_out_phdrs)
b9f66672
JL
122#define elf_write_relocs NAME(bfd_elf,write_relocs)
123#define elf_slurp_reloc_table NAME(bfd_elf,slurp_reloc_table)
252b5132
RH
124#define elf_link_create_dynamic_sections \
125 NAME(bfd_elf,link_create_dynamic_sections)
73d074b4
DJ
126#define elf_bfd_discard_info NAME(bfd_elf,discard_info)
127#define elf_reloc_symbol_deleted_p NAME(_bfd_elf,reloc_symbol_deleted_p)
252b5132
RH
128#define elf_link_record_dynamic_symbol _bfd_elf_link_record_dynamic_symbol
129#define elf_bfd_final_link NAME(bfd_elf,bfd_final_link)
130#define elf_create_pointer_linker_section NAME(bfd_elf,create_pointer_linker_section)
131#define elf_finish_pointer_linker_section NAME(bfd_elf,finish_pointer_linker_section)
132#define elf_gc_sections NAME(_bfd_elf,gc_sections)
133#define elf_gc_common_finalize_got_offsets \
134 NAME(_bfd_elf,gc_common_finalize_got_offsets)
135#define elf_gc_common_final_link NAME(_bfd_elf,gc_common_final_link)
136#define elf_gc_record_vtinherit NAME(_bfd_elf,gc_record_vtinherit)
137#define elf_gc_record_vtentry NAME(_bfd_elf,gc_record_vtentry)
30b30c21
RH
138#define elf_link_record_local_dynamic_symbol \
139 NAME(_bfd_elf,link_record_local_dynamic_symbol)
252b5132
RH
140
141#if ARCH_SIZE == 64
142#define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
143#define ELF_R_SYM(X) ELF64_R_SYM(X)
144#define ELF_R_TYPE(X) ELF64_R_TYPE(X)
145#define ELFCLASS ELFCLASS64
146#define FILE_ALIGN 8
147#define LOG_FILE_ALIGN 3
148#endif
149#if ARCH_SIZE == 32
150#define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
151#define ELF_R_SYM(X) ELF32_R_SYM(X)
152#define ELF_R_TYPE(X) ELF32_R_TYPE(X)
153#define ELFCLASS ELFCLASS32
154#define FILE_ALIGN 4
155#define LOG_FILE_ALIGN 2
156#endif
157
158/* Static functions */
159
160static void elf_swap_ehdr_in
161 PARAMS ((bfd *, const Elf_External_Ehdr *, Elf_Internal_Ehdr *));
162static void elf_swap_ehdr_out
163 PARAMS ((bfd *, const Elf_Internal_Ehdr *, Elf_External_Ehdr *));
164static void elf_swap_shdr_in
165 PARAMS ((bfd *, const Elf_External_Shdr *, Elf_Internal_Shdr *));
166static void elf_swap_shdr_out
167 PARAMS ((bfd *, const Elf_Internal_Shdr *, Elf_External_Shdr *));
168
169#define elf_stringtab_init _bfd_elf_stringtab_init
170
171#define section_from_elf_index bfd_section_from_elf_index
172
60bcf0fa 173static boolean elf_slurp_reloc_table_from_section
42fdc509
MM
174 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, bfd_size_type,
175 arelent *, asymbol **, boolean));
252b5132
RH
176
177static boolean elf_file_p PARAMS ((Elf_External_Ehdr *));
178
179#ifdef DEBUG
180static void elf_debug_section PARAMS ((int, Elf_Internal_Shdr *));
181static void elf_debug_file PARAMS ((Elf_Internal_Ehdr *));
182static char *elf_symbol_flags PARAMS ((flagword));
183#endif
184\f
185/* Structure swapping routines */
186
187/* Should perhaps use put_offset, put_word, etc. For now, the two versions
188 can be handled by explicitly specifying 32 bits or "the long type". */
189#if ARCH_SIZE == 64
dc810e39
AM
190#define H_PUT_WORD H_PUT_64
191#define H_PUT_SIGNED_WORD H_PUT_S64
192#define H_GET_WORD H_GET_64
193#define H_GET_SIGNED_WORD H_GET_S64
252b5132
RH
194#endif
195#if ARCH_SIZE == 32
dc810e39
AM
196#define H_PUT_WORD H_PUT_32
197#define H_PUT_SIGNED_WORD H_PUT_S32
198#define H_GET_WORD H_GET_32
199#define H_GET_SIGNED_WORD H_GET_S32
252b5132
RH
200#endif
201
202/* Translate an ELF symbol in external format into an ELF symbol in internal
3e932841 203 format. */
252b5132
RH
204
205void
73ff0d56 206elf_swap_symbol_in (abfd, psrc, pshn, dst)
252b5132 207 bfd *abfd;
f8ecb12b
AM
208 const PTR psrc;
209 const PTR pshn;
252b5132
RH
210 Elf_Internal_Sym *dst;
211{
73ff0d56
AM
212 const Elf_External_Sym *src = (const Elf_External_Sym *) psrc;
213 const Elf_External_Sym_Shndx *shndx = (const Elf_External_Sym_Shndx *) pshn;
86dc0f79
RH
214 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
215
dc810e39 216 dst->st_name = H_GET_32 (abfd, src->st_name);
86dc0f79 217 if (signed_vma)
dc810e39 218 dst->st_value = H_GET_SIGNED_WORD (abfd, src->st_value);
86dc0f79 219 else
dc810e39
AM
220 dst->st_value = H_GET_WORD (abfd, src->st_value);
221 dst->st_size = H_GET_WORD (abfd, src->st_size);
222 dst->st_info = H_GET_8 (abfd, src->st_info);
223 dst->st_other = H_GET_8 (abfd, src->st_other);
224 dst->st_shndx = H_GET_16 (abfd, src->st_shndx);
9ad5cbcf
AM
225 if (dst->st_shndx == SHN_XINDEX)
226 {
227 if (shndx == NULL)
228 abort ();
229 dst->st_shndx = H_GET_32 (abfd, shndx->est_shndx);
230 }
252b5132
RH
231}
232
233/* Translate an ELF symbol in internal format into an ELF symbol in external
3e932841 234 format. */
252b5132
RH
235
236void
9ad5cbcf 237elf_swap_symbol_out (abfd, src, cdst, shndx)
252b5132
RH
238 bfd *abfd;
239 const Elf_Internal_Sym *src;
240 PTR cdst;
9ad5cbcf 241 PTR shndx;
252b5132 242{
9ad5cbcf 243 unsigned int tmp;
252b5132 244 Elf_External_Sym *dst = (Elf_External_Sym *) cdst;
dc810e39
AM
245 H_PUT_32 (abfd, src->st_name, dst->st_name);
246 H_PUT_WORD (abfd, src->st_value, dst->st_value);
247 H_PUT_WORD (abfd, src->st_size, dst->st_size);
248 H_PUT_8 (abfd, src->st_info, dst->st_info);
249 H_PUT_8 (abfd, src->st_other, dst->st_other);
9ad5cbcf
AM
250 tmp = src->st_shndx;
251 if (tmp > SHN_HIRESERVE)
252 {
253 if (shndx == NULL)
254 abort ();
255 H_PUT_32 (abfd, tmp, shndx);
256 tmp = SHN_XINDEX;
257 }
258 H_PUT_16 (abfd, tmp, dst->st_shndx);
252b5132
RH
259}
260
252b5132 261/* Translate an ELF file header in external format into an ELF file header in
3e932841 262 internal format. */
252b5132
RH
263
264static void
265elf_swap_ehdr_in (abfd, src, dst)
266 bfd *abfd;
267 const Elf_External_Ehdr *src;
268 Elf_Internal_Ehdr *dst;
269{
448cafa4 270 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
252b5132 271 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
dc810e39
AM
272 dst->e_type = H_GET_16 (abfd, src->e_type);
273 dst->e_machine = H_GET_16 (abfd, src->e_machine);
274 dst->e_version = H_GET_32 (abfd, src->e_version);
448cafa4 275 if (signed_vma)
dc810e39 276 dst->e_entry = H_GET_SIGNED_WORD (abfd, src->e_entry);
448cafa4 277 else
dc810e39
AM
278 dst->e_entry = H_GET_WORD (abfd, src->e_entry);
279 dst->e_phoff = H_GET_WORD (abfd, src->e_phoff);
280 dst->e_shoff = H_GET_WORD (abfd, src->e_shoff);
281 dst->e_flags = H_GET_32 (abfd, src->e_flags);
282 dst->e_ehsize = H_GET_16 (abfd, src->e_ehsize);
283 dst->e_phentsize = H_GET_16 (abfd, src->e_phentsize);
284 dst->e_phnum = H_GET_16 (abfd, src->e_phnum);
285 dst->e_shentsize = H_GET_16 (abfd, src->e_shentsize);
286 dst->e_shnum = H_GET_16 (abfd, src->e_shnum);
287 dst->e_shstrndx = H_GET_16 (abfd, src->e_shstrndx);
252b5132
RH
288}
289
290/* Translate an ELF file header in internal format into an ELF file header in
3e932841 291 external format. */
252b5132
RH
292
293static void
294elf_swap_ehdr_out (abfd, src, dst)
295 bfd *abfd;
296 const Elf_Internal_Ehdr *src;
297 Elf_External_Ehdr *dst;
298{
5732c114 299 unsigned int tmp;
448cafa4 300 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
252b5132 301 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
3e932841 302 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
303 H_PUT_16 (abfd, src->e_type, dst->e_type);
304 H_PUT_16 (abfd, src->e_machine, dst->e_machine);
305 H_PUT_32 (abfd, src->e_version, dst->e_version);
448cafa4 306 if (signed_vma)
dc810e39 307 H_PUT_SIGNED_WORD (abfd, src->e_entry, dst->e_entry);
448cafa4 308 else
dc810e39
AM
309 H_PUT_WORD (abfd, src->e_entry, dst->e_entry);
310 H_PUT_WORD (abfd, src->e_phoff, dst->e_phoff);
311 H_PUT_WORD (abfd, src->e_shoff, dst->e_shoff);
312 H_PUT_32 (abfd, src->e_flags, dst->e_flags);
313 H_PUT_16 (abfd, src->e_ehsize, dst->e_ehsize);
314 H_PUT_16 (abfd, src->e_phentsize, dst->e_phentsize);
315 H_PUT_16 (abfd, src->e_phnum, dst->e_phnum);
316 H_PUT_16 (abfd, src->e_shentsize, dst->e_shentsize);
5732c114
AM
317 tmp = src->e_shnum;
318 if (tmp >= SHN_LORESERVE)
319 tmp = SHN_UNDEF;
320 H_PUT_16 (abfd, tmp, dst->e_shnum);
321 tmp = src->e_shstrndx;
322 if (tmp >= SHN_LORESERVE)
323 tmp = SHN_XINDEX;
324 H_PUT_16 (abfd, tmp, dst->e_shstrndx);
252b5132
RH
325}
326
252b5132 327/* Translate an ELF section header table entry in external format into an
3e932841 328 ELF section header table entry in internal format. */
252b5132
RH
329
330static void
331elf_swap_shdr_in (abfd, src, dst)
332 bfd *abfd;
333 const Elf_External_Shdr *src;
334 Elf_Internal_Shdr *dst;
335{
86dc0f79
RH
336 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
337
dc810e39
AM
338 dst->sh_name = H_GET_32 (abfd, src->sh_name);
339 dst->sh_type = H_GET_32 (abfd, src->sh_type);
340 dst->sh_flags = H_GET_WORD (abfd, src->sh_flags);
86dc0f79 341 if (signed_vma)
dc810e39 342 dst->sh_addr = H_GET_SIGNED_WORD (abfd, src->sh_addr);
86dc0f79 343 else
dc810e39
AM
344 dst->sh_addr = H_GET_WORD (abfd, src->sh_addr);
345 dst->sh_offset = H_GET_WORD (abfd, src->sh_offset);
346 dst->sh_size = H_GET_WORD (abfd, src->sh_size);
347 dst->sh_link = H_GET_32 (abfd, src->sh_link);
348 dst->sh_info = H_GET_32 (abfd, src->sh_info);
349 dst->sh_addralign = H_GET_WORD (abfd, src->sh_addralign);
350 dst->sh_entsize = H_GET_WORD (abfd, src->sh_entsize);
252b5132
RH
351 dst->bfd_section = NULL;
352 dst->contents = NULL;
353}
354
355/* Translate an ELF section header table entry in internal format into an
3e932841 356 ELF section header table entry in external format. */
252b5132
RH
357
358static void
359elf_swap_shdr_out (abfd, src, dst)
360 bfd *abfd;
361 const Elf_Internal_Shdr *src;
362 Elf_External_Shdr *dst;
363{
3e932841 364 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
365 H_PUT_32 (abfd, src->sh_name, dst->sh_name);
366 H_PUT_32 (abfd, src->sh_type, dst->sh_type);
367 H_PUT_WORD (abfd, src->sh_flags, dst->sh_flags);
368 H_PUT_WORD (abfd, src->sh_addr, dst->sh_addr);
369 H_PUT_WORD (abfd, src->sh_offset, dst->sh_offset);
370 H_PUT_WORD (abfd, src->sh_size, dst->sh_size);
371 H_PUT_32 (abfd, src->sh_link, dst->sh_link);
372 H_PUT_32 (abfd, src->sh_info, dst->sh_info);
373 H_PUT_WORD (abfd, src->sh_addralign, dst->sh_addralign);
374 H_PUT_WORD (abfd, src->sh_entsize, dst->sh_entsize);
252b5132
RH
375}
376
252b5132 377/* Translate an ELF program header table entry in external format into an
3e932841 378 ELF program header table entry in internal format. */
252b5132
RH
379
380void
381elf_swap_phdr_in (abfd, src, dst)
382 bfd *abfd;
383 const Elf_External_Phdr *src;
384 Elf_Internal_Phdr *dst;
385{
86dc0f79
RH
386 int signed_vma = get_elf_backend_data (abfd)->sign_extend_vma;
387
dc810e39
AM
388 dst->p_type = H_GET_32 (abfd, src->p_type);
389 dst->p_flags = H_GET_32 (abfd, src->p_flags);
390 dst->p_offset = H_GET_WORD (abfd, src->p_offset);
86dc0f79
RH
391 if (signed_vma)
392 {
dc810e39
AM
393 dst->p_vaddr = H_GET_SIGNED_WORD (abfd, src->p_vaddr);
394 dst->p_paddr = H_GET_SIGNED_WORD (abfd, src->p_paddr);
86dc0f79
RH
395 }
396 else
397 {
dc810e39
AM
398 dst->p_vaddr = H_GET_WORD (abfd, src->p_vaddr);
399 dst->p_paddr = H_GET_WORD (abfd, src->p_paddr);
86dc0f79 400 }
dc810e39
AM
401 dst->p_filesz = H_GET_WORD (abfd, src->p_filesz);
402 dst->p_memsz = H_GET_WORD (abfd, src->p_memsz);
403 dst->p_align = H_GET_WORD (abfd, src->p_align);
252b5132
RH
404}
405
406void
407elf_swap_phdr_out (abfd, src, dst)
408 bfd *abfd;
409 const Elf_Internal_Phdr *src;
410 Elf_External_Phdr *dst;
411{
3e932841 412 /* note that all elements of dst are *arrays of unsigned char* already... */
dc810e39
AM
413 H_PUT_32 (abfd, src->p_type, dst->p_type);
414 H_PUT_WORD (abfd, src->p_offset, dst->p_offset);
415 H_PUT_WORD (abfd, src->p_vaddr, dst->p_vaddr);
416 H_PUT_WORD (abfd, src->p_paddr, dst->p_paddr);
417 H_PUT_WORD (abfd, src->p_filesz, dst->p_filesz);
418 H_PUT_WORD (abfd, src->p_memsz, dst->p_memsz);
419 H_PUT_32 (abfd, src->p_flags, dst->p_flags);
420 H_PUT_WORD (abfd, src->p_align, dst->p_align);
252b5132
RH
421}
422
3e932841 423/* Translate an ELF reloc from external format to internal format. */
252b5132
RH
424INLINE void
425elf_swap_reloc_in (abfd, src, dst)
426 bfd *abfd;
427 const Elf_External_Rel *src;
428 Elf_Internal_Rel *dst;
429{
dc810e39
AM
430 dst->r_offset = H_GET_WORD (abfd, src->r_offset);
431 dst->r_info = H_GET_WORD (abfd, src->r_info);
252b5132
RH
432}
433
434INLINE void
435elf_swap_reloca_in (abfd, src, dst)
436 bfd *abfd;
437 const Elf_External_Rela *src;
438 Elf_Internal_Rela *dst;
439{
dc810e39
AM
440 dst->r_offset = H_GET_WORD (abfd, src->r_offset);
441 dst->r_info = H_GET_WORD (abfd, src->r_info);
442 dst->r_addend = H_GET_SIGNED_WORD (abfd, src->r_addend);
252b5132
RH
443}
444
3e932841 445/* Translate an ELF reloc from internal format to external format. */
252b5132
RH
446INLINE void
447elf_swap_reloc_out (abfd, src, dst)
448 bfd *abfd;
449 const Elf_Internal_Rel *src;
450 Elf_External_Rel *dst;
451{
dc810e39
AM
452 H_PUT_WORD (abfd, src->r_offset, dst->r_offset);
453 H_PUT_WORD (abfd, src->r_info, dst->r_info);
252b5132
RH
454}
455
456INLINE void
457elf_swap_reloca_out (abfd, src, dst)
458 bfd *abfd;
459 const Elf_Internal_Rela *src;
460 Elf_External_Rela *dst;
461{
dc810e39
AM
462 H_PUT_WORD (abfd, src->r_offset, dst->r_offset);
463 H_PUT_WORD (abfd, src->r_info, dst->r_info);
464 H_PUT_SIGNED_WORD (abfd, src->r_addend, dst->r_addend);
252b5132
RH
465}
466
467INLINE void
468elf_swap_dyn_in (abfd, p, dst)
469 bfd *abfd;
470 const PTR p;
471 Elf_Internal_Dyn *dst;
472{
473 const Elf_External_Dyn *src = (const Elf_External_Dyn *) p;
474
dc810e39
AM
475 dst->d_tag = H_GET_WORD (abfd, src->d_tag);
476 dst->d_un.d_val = H_GET_WORD (abfd, src->d_un.d_val);
252b5132
RH
477}
478
479INLINE void
c7ac6ff8 480elf_swap_dyn_out (abfd, src, p)
252b5132
RH
481 bfd *abfd;
482 const Elf_Internal_Dyn *src;
c7ac6ff8 483 PTR p;
252b5132 484{
c7ac6ff8
MM
485 Elf_External_Dyn *dst = (Elf_External_Dyn *) p;
486
dc810e39
AM
487 H_PUT_WORD (abfd, src->d_tag, dst->d_tag);
488 H_PUT_WORD (abfd, src->d_un.d_val, dst->d_un.d_val);
252b5132
RH
489}
490\f
491/* ELF .o/exec file reading */
492
252b5132
RH
493/* Begin processing a given object.
494
495 First we validate the file by reading in the ELF header and checking
496 the magic number. */
497
498static INLINE boolean
499elf_file_p (x_ehdrp)
500 Elf_External_Ehdr *x_ehdrp;
501{
502 return ((x_ehdrp->e_ident[EI_MAG0] == ELFMAG0)
503 && (x_ehdrp->e_ident[EI_MAG1] == ELFMAG1)
504 && (x_ehdrp->e_ident[EI_MAG2] == ELFMAG2)
505 && (x_ehdrp->e_ident[EI_MAG3] == ELFMAG3));
506}
507
508/* Check to see if the file associated with ABFD matches the target vector
509 that ABFD points to.
510
511 Note that we may be called several times with the same ABFD, but different
512 target vectors, most of which will not match. We have to avoid leaving
513 any side effects in ABFD, or any data it points to (like tdata), if the
514 file does not match the target vector. */
515
516const bfd_target *
517elf_object_p (abfd)
518 bfd *abfd;
519{
520 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
521 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
522 Elf_External_Shdr x_shdr; /* Section header table entry, external form */
5732c114 523 Elf_Internal_Shdr i_shdr;
ed591155 524 Elf_Internal_Shdr *i_shdrp; /* Section header table, internal form */
252b5132
RH
525 unsigned int shindex;
526 char *shstrtab; /* Internal copy of section header stringtab */
527 struct elf_backend_data *ebd;
ed591155 528 struct bfd_preserve preserve;
252b5132 529 asection *s;
dc810e39 530 bfd_size_type amt;
252b5132 531
e84d6fca 532 preserve.marker = NULL;
a17cc40f 533
252b5132
RH
534 /* Read in the ELF header in external format. */
535
dc810e39
AM
536 if (bfd_bread ((PTR) & x_ehdr, (bfd_size_type) sizeof (x_ehdr), abfd)
537 != sizeof (x_ehdr))
252b5132
RH
538 {
539 if (bfd_get_error () != bfd_error_system_call)
540 goto got_wrong_format_error;
541 else
542 goto got_no_match;
543 }
544
545 /* Now check to see if we have a valid ELF file, and one that BFD can
546 make use of. The magic number must match, the address size ('class')
547 and byte-swapping must match our XVEC entry, and it must have a
548 section header table (FIXME: See comments re sections at top of this
3e932841 549 file). */
252b5132 550
82e51918
AM
551 if (! elf_file_p (&x_ehdr)
552 || x_ehdr.e_ident[EI_VERSION] != EV_CURRENT
553 || x_ehdr.e_ident[EI_CLASS] != ELFCLASS)
252b5132
RH
554 goto got_wrong_format_error;
555
556 /* Check that file's byte order matches xvec's */
557 switch (x_ehdr.e_ident[EI_DATA])
558 {
559 case ELFDATA2MSB: /* Big-endian */
560 if (! bfd_header_big_endian (abfd))
561 goto got_wrong_format_error;
562 break;
563 case ELFDATA2LSB: /* Little-endian */
564 if (! bfd_header_little_endian (abfd))
565 goto got_wrong_format_error;
566 break;
567 case ELFDATANONE: /* No data encoding specified */
568 default: /* Unknown data encoding specified */
569 goto got_wrong_format_error;
570 }
571
572 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
573 the tdata pointer in the bfd. */
574
dc810e39 575 amt = sizeof (struct elf_obj_tdata);
e84d6fca
AM
576 preserve.marker = bfd_zalloc (abfd, amt);
577 if (preserve.marker == NULL)
252b5132 578 goto got_no_match;
e84d6fca 579 if (!bfd_preserve_save (abfd, &preserve))
ed591155
AM
580 goto got_no_match;
581
e84d6fca
AM
582 elf_tdata (abfd) = preserve.marker;
583
252b5132
RH
584 /* Now that we know the byte order, swap in the rest of the header */
585 i_ehdrp = elf_elfheader (abfd);
586 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
587#if DEBUG & 1
588 elf_debug_file (i_ehdrp);
589#endif
590
591 /* Reject ET_CORE (header indicates core file, not object file) */
592 if (i_ehdrp->e_type == ET_CORE)
593 goto got_wrong_format_error;
594
0c35f01a
AM
595 /* If this is a relocatable file and there is no section header
596 table, then we're hosed. */
597 if (i_ehdrp->e_shoff == 0 && i_ehdrp->e_type == ET_REL)
252b5132
RH
598 goto got_wrong_format_error;
599
600 /* As a simple sanity check, verify that the what BFD thinks is the
601 size of each section header table entry actually matches the size
0c35f01a
AM
602 recorded in the file, but only if there are any sections. */
603 if (i_ehdrp->e_shentsize != sizeof (x_shdr) && i_ehdrp->e_shnum != 0)
252b5132
RH
604 goto got_wrong_format_error;
605
7ece0d85
JJ
606 /* Further sanity check. */
607 if (i_ehdrp->e_shoff == 0 && i_ehdrp->e_shnum != 0)
608 goto got_wrong_format_error;
609
252b5132
RH
610 ebd = get_elf_backend_data (abfd);
611
612 /* Check that the ELF e_machine field matches what this particular
613 BFD format expects. */
614 if (ebd->elf_machine_code != i_ehdrp->e_machine
e84d6fca
AM
615 && (ebd->elf_machine_alt1 == 0
616 || i_ehdrp->e_machine != ebd->elf_machine_alt1)
617 && (ebd->elf_machine_alt2 == 0
618 || i_ehdrp->e_machine != ebd->elf_machine_alt2))
252b5132
RH
619 {
620 const bfd_target * const *target_ptr;
621
622 if (ebd->elf_machine_code != EM_NONE)
623 goto got_wrong_format_error;
624
625 /* This is the generic ELF target. Let it match any ELF target
626 for which we do not have a specific backend. */
627 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
628 {
629 struct elf_backend_data *back;
630
631 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
632 continue;
633 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
634 if (back->elf_machine_code == i_ehdrp->e_machine
635 || (back->elf_machine_alt1 != 0
636 && back->elf_machine_alt1 == i_ehdrp->e_machine)
637 || (back->elf_machine_alt2 != 0
638 && back->elf_machine_alt2 == i_ehdrp->e_machine))
639 {
640 /* target_ptr is an ELF backend which matches this
641 object file, so reject the generic ELF target. */
642 goto got_wrong_format_error;
643 }
644 }
645 }
646
647 if (i_ehdrp->e_type == ET_EXEC)
648 abfd->flags |= EXEC_P;
649 else if (i_ehdrp->e_type == ET_DYN)
650 abfd->flags |= DYNAMIC;
651
652 if (i_ehdrp->e_phnum > 0)
653 abfd->flags |= D_PAGED;
654
655 if (! bfd_default_set_arch_mach (abfd, ebd->arch, 0))
656 {
657 /* It's OK if this fails for the generic target. */
658 if (ebd->elf_machine_code != EM_NONE)
659 goto got_no_match;
660 }
661
3e932841 662 /* Remember the entry point specified in the ELF file header. */
448cafa4 663 bfd_set_start_address (abfd, i_ehdrp->e_entry);
252b5132 664
7ece0d85
JJ
665 if (i_ehdrp->e_shoff != 0)
666 {
667 /* Seek to the section header table in the file. */
668 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET) != 0)
669 goto got_no_match;
5732c114 670
7ece0d85
JJ
671 /* Read the first section header at index 0, and convert to internal
672 form. */
673 if (bfd_bread ((PTR) & x_shdr, (bfd_size_type) sizeof x_shdr, abfd)
674 != sizeof (x_shdr))
675 goto got_no_match;
676 elf_swap_shdr_in (abfd, &x_shdr, &i_shdr);
5732c114 677
7ece0d85
JJ
678 /* If the section count is zero, the actual count is in the first
679 section header. */
680 if (i_ehdrp->e_shnum == SHN_UNDEF)
681 i_ehdrp->e_shnum = i_shdr.sh_size;
5732c114 682
7ece0d85
JJ
683 /* And similarly for the string table index. */
684 if (i_ehdrp->e_shstrndx == SHN_XINDEX)
685 i_ehdrp->e_shstrndx = i_shdr.sh_link;
686 }
5732c114 687
252b5132 688 /* Allocate space for a copy of the section header table in
5732c114 689 internal form. */
0c35f01a
AM
690 if (i_ehdrp->e_shnum != 0)
691 {
5732c114 692 Elf_Internal_Shdr *shdrp;
9ad5cbcf 693 unsigned int num_sec;
5732c114 694
0c35f01a
AM
695 amt = sizeof (*i_shdrp) * i_ehdrp->e_shnum;
696 i_shdrp = (Elf_Internal_Shdr *) bfd_alloc (abfd, amt);
5732c114
AM
697 if (!i_shdrp)
698 goto got_no_match;
9ad5cbcf
AM
699 num_sec = i_ehdrp->e_shnum;
700 if (num_sec > SHN_LORESERVE)
701 num_sec += SHN_HIRESERVE + 1 - SHN_LORESERVE;
702 elf_numsections (abfd) = num_sec;
703 amt = sizeof (i_shdrp) * num_sec;
0c35f01a 704 elf_elfsections (abfd) = (Elf_Internal_Shdr **) bfd_alloc (abfd, amt);
5732c114 705 if (!elf_elfsections (abfd))
0c35f01a 706 goto got_no_match;
5732c114
AM
707
708 memcpy (i_shdrp, &i_shdr, sizeof (*i_shdrp));
709 shdrp = i_shdrp;
710 shindex = 0;
9ad5cbcf 711 if (num_sec > SHN_LORESERVE)
5732c114
AM
712 {
713 for ( ; shindex < SHN_LORESERVE; shindex++)
714 elf_elfsections (abfd)[shindex] = shdrp++;
715 for ( ; shindex < SHN_HIRESERVE + 1; shindex++)
9ad5cbcf 716 elf_elfsections (abfd)[shindex] = i_shdrp;
5732c114 717 }
9ad5cbcf 718 for ( ; shindex < num_sec; shindex++)
5732c114 719 elf_elfsections (abfd)[shindex] = shdrp++;
5732c114 720
ed591155
AM
721 /* Read in the rest of the section header table and convert it
722 to internal form. */
723 for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++)
724 {
725 if (bfd_bread ((PTR) & x_shdr, (bfd_size_type) sizeof x_shdr, abfd)
726 != sizeof (x_shdr))
727 goto got_no_match;
728 elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex);
729
730 /* If the section is loaded, but not page aligned, clear
731 D_PAGED. */
732 if (i_shdrp[shindex].sh_size != 0
733 && (i_shdrp[shindex].sh_flags & SHF_ALLOC) != 0
734 && i_shdrp[shindex].sh_type != SHT_NOBITS
735 && (((i_shdrp[shindex].sh_addr - i_shdrp[shindex].sh_offset)
736 % ebd->maxpagesize)
737 != 0))
738 abfd->flags &= ~D_PAGED;
739 }
252b5132 740 }
ed591155 741
7ece0d85 742 if (i_ehdrp->e_shstrndx && i_ehdrp->e_shoff)
252b5132
RH
743 {
744 if (! bfd_section_from_shdr (abfd, i_ehdrp->e_shstrndx))
745 goto got_no_match;
746 }
747
748 /* Read in the program headers. */
749 if (i_ehdrp->e_phnum == 0)
750 elf_tdata (abfd)->phdr = NULL;
751 else
752 {
753 Elf_Internal_Phdr *i_phdr;
754 unsigned int i;
755
dc810e39
AM
756 amt = i_ehdrp->e_phnum * sizeof (Elf_Internal_Phdr);
757 elf_tdata (abfd)->phdr = (Elf_Internal_Phdr *) bfd_alloc (abfd, amt);
252b5132
RH
758 if (elf_tdata (abfd)->phdr == NULL)
759 goto got_no_match;
dc810e39 760 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_phoff, SEEK_SET) != 0)
252b5132
RH
761 goto got_no_match;
762 i_phdr = elf_tdata (abfd)->phdr;
763 for (i = 0; i < i_ehdrp->e_phnum; i++, i_phdr++)
764 {
765 Elf_External_Phdr x_phdr;
766
dc810e39 767 if (bfd_bread ((PTR) &x_phdr, (bfd_size_type) sizeof x_phdr, abfd)
252b5132
RH
768 != sizeof x_phdr)
769 goto got_no_match;
770 elf_swap_phdr_in (abfd, &x_phdr, i_phdr);
771 }
772 }
773
774 /* Read in the string table containing the names of the sections. We
3e932841 775 will need the base pointer to this table later. */
252b5132
RH
776 /* We read this inline now, so that we don't have to go through
777 bfd_section_from_shdr with it (since this particular strtab is
778 used to find all of the ELF section names.) */
779
7ece0d85 780 if (i_ehdrp->e_shstrndx != 0 && i_ehdrp->e_shoff)
252b5132 781 {
9ad5cbcf
AM
782 unsigned int num_sec;
783
0c35f01a
AM
784 shstrtab = bfd_elf_get_str_section (abfd, i_ehdrp->e_shstrndx);
785 if (!shstrtab)
252b5132 786 goto got_no_match;
0c35f01a
AM
787
788 /* Once all of the section headers have been read and converted, we
789 can start processing them. Note that the first section header is
790 a dummy placeholder entry, so we ignore it. */
9ad5cbcf
AM
791 num_sec = elf_numsections (abfd);
792 for (shindex = 1; shindex < num_sec; shindex++)
0c35f01a
AM
793 {
794 if (! bfd_section_from_shdr (abfd, shindex))
795 goto got_no_match;
9ad5cbcf
AM
796 if (shindex == SHN_LORESERVE - 1)
797 shindex += SHN_HIRESERVE + 1 - SHN_LORESERVE;
0c35f01a 798 }
252b5132
RH
799 }
800
801 /* Let the backend double check the format and override global
802 information. */
803 if (ebd->elf_backend_object_p)
804 {
82e51918 805 if (! (*ebd->elf_backend_object_p) (abfd))
252b5132
RH
806 goto got_wrong_format_error;
807 }
808
809 /* If we have created any reloc sections that are associated with
810 debugging sections, mark the reloc sections as debugging as well. */
811 for (s = abfd->sections; s != NULL; s = s->next)
812 {
813 if ((elf_section_data (s)->this_hdr.sh_type == SHT_REL
814 || elf_section_data (s)->this_hdr.sh_type == SHT_RELA)
815 && elf_section_data (s)->this_hdr.sh_info > 0)
816 {
817 unsigned long targ_index;
818 asection *targ_sec;
819
820 targ_index = elf_section_data (s)->this_hdr.sh_info;
821 targ_sec = bfd_section_from_elf_index (abfd, targ_index);
822 if (targ_sec != NULL
823 && (targ_sec->flags & SEC_DEBUGGING) != 0)
824 s->flags |= SEC_DEBUGGING;
825 }
826 }
827
e84d6fca
AM
828 bfd_preserve_finish (abfd, &preserve);
829 return abfd->xvec;
252b5132
RH
830
831 got_wrong_format_error:
a77a9fef
HPN
832 /* There is way too much undoing of half-known state here. The caller,
833 bfd_check_format_matches, really shouldn't iterate on live bfd's to
834 check match/no-match like it does. We have to rely on that a call to
835 bfd_default_set_arch_mach with the previously known mach, undoes what
836 was done by the first bfd_default_set_arch_mach (with mach 0) here.
837 For this to work, only elf-data and the mach may be changed by the
838 target-specific elf_backend_object_p function. Note that saving the
839 whole bfd here and restoring it would be even worse; the first thing
840 you notice is that the cached bfd file position gets out of sync. */
252b5132 841 bfd_set_error (bfd_error_wrong_format);
ed591155 842
252b5132 843 got_no_match:
e84d6fca
AM
844 if (preserve.marker != NULL)
845 bfd_preserve_restore (abfd, &preserve);
ed591155 846 return NULL;
252b5132
RH
847}
848\f
849/* ELF .o/exec file writing */
850
851/* Write out the relocs. */
852
b9f66672
JL
853void
854elf_write_relocs (abfd, sec, data)
252b5132
RH
855 bfd *abfd;
856 asection *sec;
857 PTR data;
858{
859 boolean *failedp = (boolean *) data;
860 Elf_Internal_Shdr *rela_hdr;
861 Elf_External_Rela *outbound_relocas;
862 Elf_External_Rel *outbound_relocs;
863 unsigned int idx;
bf572ba0 864 int use_rela_p;
252b5132
RH
865 asymbol *last_sym = 0;
866 int last_sym_idx = 0;
867
868 /* If we have already failed, don't do anything. */
869 if (*failedp)
870 return;
871
872 if ((sec->flags & SEC_RELOC) == 0)
873 return;
874
875 /* The linker backend writes the relocs out itself, and sets the
876 reloc_count field to zero to inhibit writing them here. Also,
877 sometimes the SEC_RELOC flag gets set even when there aren't any
878 relocs. */
879 if (sec->reloc_count == 0)
880 return;
881
882 rela_hdr = &elf_section_data (sec)->rel_hdr;
883
884 rela_hdr->sh_size = rela_hdr->sh_entsize * sec->reloc_count;
885 rela_hdr->contents = (PTR) bfd_alloc (abfd, rela_hdr->sh_size);
886 if (rela_hdr->contents == NULL)
887 {
888 *failedp = true;
889 return;
890 }
891
bf572ba0
MM
892 /* Figure out whether the relocations are RELA or REL relocations. */
893 if (rela_hdr->sh_type == SHT_RELA)
894 use_rela_p = true;
895 else if (rela_hdr->sh_type == SHT_REL)
896 use_rela_p = false;
897 else
898 /* Every relocation section should be either an SHT_RELA or an
899 SHT_REL section. */
900 abort ();
901
3e932841 902 /* orelocation has the data, reloc_count has the count... */
252b5132
RH
903 if (use_rela_p)
904 {
905 outbound_relocas = (Elf_External_Rela *) rela_hdr->contents;
906
907 for (idx = 0; idx < sec->reloc_count; idx++)
908 {
909 Elf_Internal_Rela dst_rela;
910 Elf_External_Rela *src_rela;
911 arelent *ptr;
912 asymbol *sym;
913 int n;
914
915 ptr = sec->orelocation[idx];
916 src_rela = outbound_relocas + idx;
917
918 /* The address of an ELF reloc is section relative for an object
919 file, and absolute for an executable file or shared library.
920 The address of a BFD reloc is always section relative. */
921 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
922 dst_rela.r_offset = ptr->address;
923 else
924 dst_rela.r_offset = ptr->address + sec->vma;
925
926 sym = *ptr->sym_ptr_ptr;
927 if (sym == last_sym)
928 n = last_sym_idx;
929 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
930 n = STN_UNDEF;
931 else
932 {
933 last_sym = sym;
934 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
935 if (n < 0)
936 {
937 *failedp = true;
938 return;
939 }
940 last_sym_idx = n;
941 }
942
943 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
944 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
945 && ! _bfd_elf_validate_reloc (abfd, ptr))
946 {
947 *failedp = true;
948 return;
949 }
950
951 dst_rela.r_info = ELF_R_INFO (n, ptr->howto->type);
952
953 dst_rela.r_addend = ptr->addend;
954 elf_swap_reloca_out (abfd, &dst_rela, src_rela);
955 }
956 }
957 else
958 /* REL relocations */
959 {
960 outbound_relocs = (Elf_External_Rel *) rela_hdr->contents;
961
962 for (idx = 0; idx < sec->reloc_count; idx++)
963 {
964 Elf_Internal_Rel dst_rel;
965 Elf_External_Rel *src_rel;
966 arelent *ptr;
967 int n;
968 asymbol *sym;
969
970 ptr = sec->orelocation[idx];
971 sym = *ptr->sym_ptr_ptr;
972 src_rel = outbound_relocs + idx;
973
974 /* The address of an ELF reloc is section relative for an object
975 file, and absolute for an executable file or shared library.
976 The address of a BFD reloc is always section relative. */
977 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
978 dst_rel.r_offset = ptr->address;
979 else
980 dst_rel.r_offset = ptr->address + sec->vma;
981
982 if (sym == last_sym)
983 n = last_sym_idx;
eeaf533e
ILT
984 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
985 n = STN_UNDEF;
252b5132
RH
986 else
987 {
988 last_sym = sym;
989 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
990 if (n < 0)
991 {
992 *failedp = true;
993 return;
994 }
995 last_sym_idx = n;
996 }
997
2f66722d
AM
998 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
999 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
252b5132
RH
1000 && ! _bfd_elf_validate_reloc (abfd, ptr))
1001 {
1002 *failedp = true;
1003 return;
1004 }
1005
1006 dst_rel.r_info = ELF_R_INFO (n, ptr->howto->type);
1007
1008 elf_swap_reloc_out (abfd, &dst_rel, src_rel);
1009 }
1010 }
1011}
1012
1013/* Write out the program headers. */
1014
1015int
1016elf_write_out_phdrs (abfd, phdr, count)
1017 bfd *abfd;
1018 const Elf_Internal_Phdr *phdr;
dc810e39 1019 unsigned int count;
252b5132
RH
1020{
1021 while (count--)
1022 {
1023 Elf_External_Phdr extphdr;
1024 elf_swap_phdr_out (abfd, phdr, &extphdr);
dc810e39
AM
1025 if (bfd_bwrite (&extphdr, (bfd_size_type) sizeof (Elf_External_Phdr),
1026 abfd) != sizeof (Elf_External_Phdr))
252b5132
RH
1027 return -1;
1028 phdr++;
1029 }
1030 return 0;
1031}
1032
1033/* Write out the section headers and the ELF file header. */
1034
1035boolean
1036elf_write_shdrs_and_ehdr (abfd)
1037 bfd *abfd;
1038{
1039 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
1040 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
1041 Elf_External_Shdr *x_shdrp; /* Section header table, external form */
1042 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
1043 unsigned int count;
dc810e39 1044 bfd_size_type amt;
252b5132
RH
1045
1046 i_ehdrp = elf_elfheader (abfd);
1047 i_shdrp = elf_elfsections (abfd);
1048
3e932841 1049 /* swap the header before spitting it out... */
252b5132
RH
1050
1051#if DEBUG & 1
1052 elf_debug_file (i_ehdrp);
1053#endif
1054 elf_swap_ehdr_out (abfd, i_ehdrp, &x_ehdr);
dc810e39 1055 amt = sizeof (x_ehdr);
252b5132 1056 if (bfd_seek (abfd, (file_ptr) 0, SEEK_SET) != 0
dc810e39 1057 || bfd_bwrite ((PTR) & x_ehdr, amt, abfd) != amt)
252b5132
RH
1058 return false;
1059
5732c114
AM
1060 /* Some fields in the first section header handle overflow of ehdr
1061 fields. */
1062 if (i_ehdrp->e_shnum >= SHN_LORESERVE)
1063 i_shdrp[0]->sh_size = i_ehdrp->e_shnum;
1064 if (i_ehdrp->e_shstrndx >= SHN_LORESERVE)
1065 i_shdrp[0]->sh_link = i_ehdrp->e_shstrndx;
1066
3e932841 1067 /* at this point we've concocted all the ELF sections... */
5732c114
AM
1068 amt = i_ehdrp->e_shnum;
1069 amt *= sizeof (*x_shdrp);
dc810e39 1070 x_shdrp = (Elf_External_Shdr *) bfd_alloc (abfd, amt);
252b5132
RH
1071 if (!x_shdrp)
1072 return false;
1073
5732c114 1074 for (count = 0; count < i_ehdrp->e_shnum; i_shdrp++, count++)
252b5132
RH
1075 {
1076#if DEBUG & 2
5732c114 1077 elf_debug_section (count, *i_shdrp);
252b5132 1078#endif
5732c114
AM
1079 elf_swap_shdr_out (abfd, *i_shdrp, x_shdrp + count);
1080
1081 if (count == SHN_LORESERVE - 1)
1082 i_shdrp += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
1083 }
1084 if (bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET) != 0
dc810e39 1085 || bfd_bwrite ((PTR) x_shdrp, amt, abfd) != amt)
252b5132
RH
1086 return false;
1087
3e932841 1088 /* need to dump the string table too... */
252b5132
RH
1089
1090 return true;
1091}
1092
1093long
1094elf_slurp_symbol_table (abfd, symptrs, dynamic)
1095 bfd *abfd;
1096 asymbol **symptrs; /* Buffer for generated bfd symbols */
1097 boolean dynamic;
1098{
1099 Elf_Internal_Shdr *hdr;
1100 Elf_Internal_Shdr *verhdr;
1101 unsigned long symcount; /* Number of external ELF symbols */
1102 elf_symbol_type *sym; /* Pointer to current bfd symbol */
1103 elf_symbol_type *symbase; /* Buffer for generated bfd symbols */
6cdc0ccc
AM
1104 Elf_Internal_Sym *isym;
1105 Elf_Internal_Sym *isymend;
1106 Elf_Internal_Sym *isymbuf = NULL;
1107 Elf_External_Versym *xver;
1108 Elf_External_Versym *xverbuf = NULL;
1109 struct elf_backend_data *ebd;
dc810e39 1110 bfd_size_type amt;
252b5132
RH
1111
1112 /* Read each raw ELF symbol, converting from external ELF form to
1113 internal ELF form, and then using the information to create a
1114 canonical bfd symbol table entry.
1115
1116 Note that we allocate the initial bfd canonical symbol buffer
1117 based on a one-to-one mapping of the ELF symbols to canonical
1118 symbols. We actually use all the ELF symbols, so there will be no
1119 space left over at the end. When we have all the symbols, we
3e932841 1120 build the caller's pointer vector. */
252b5132
RH
1121
1122 if (! dynamic)
1123 {
1124 hdr = &elf_tdata (abfd)->symtab_hdr;
1125 verhdr = NULL;
1126 }
1127 else
1128 {
1129 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1130 if (elf_dynversym (abfd) == 0)
1131 verhdr = NULL;
1132 else
1133 verhdr = &elf_tdata (abfd)->dynversym_hdr;
1134 if ((elf_tdata (abfd)->dynverdef_section != 0
1135 && elf_tdata (abfd)->verdef == NULL)
1136 || (elf_tdata (abfd)->dynverref_section != 0
1137 && elf_tdata (abfd)->verref == NULL))
1138 {
1139 if (! _bfd_elf_slurp_version_tables (abfd))
1140 return -1;
1141 }
1142 }
1143
6cdc0ccc 1144 ebd = get_elf_backend_data (abfd);
252b5132 1145 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
252b5132
RH
1146 if (symcount == 0)
1147 sym = symbase = NULL;
1148 else
1149 {
6cdc0ccc
AM
1150 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, symcount, 0,
1151 NULL, NULL, NULL);
1152 if (isymbuf == NULL)
1153 return -1;
252b5132 1154
dc810e39
AM
1155 amt = symcount;
1156 amt *= sizeof (elf_symbol_type);
1157 symbase = (elf_symbol_type *) bfd_zalloc (abfd, amt);
252b5132 1158 if (symbase == (elf_symbol_type *) NULL)
9ad5cbcf 1159 goto error_return;
252b5132
RH
1160
1161 /* Read the raw ELF version symbol information. */
252b5132
RH
1162 if (verhdr != NULL
1163 && verhdr->sh_size / sizeof (Elf_External_Versym) != symcount)
1164 {
1165 (*_bfd_error_handler)
1166 (_("%s: version count (%ld) does not match symbol count (%ld)"),
1167 abfd->filename,
1168 (long) (verhdr->sh_size / sizeof (Elf_External_Versym)),
1169 symcount);
1170
1171 /* Slurp in the symbols without the version information,
1172 since that is more helpful than just quitting. */
1173 verhdr = NULL;
1174 }
1175
1176 if (verhdr != NULL)
1177 {
1178 if (bfd_seek (abfd, verhdr->sh_offset, SEEK_SET) != 0)
1179 goto error_return;
1180
6cdc0ccc
AM
1181 xverbuf = (Elf_External_Versym *) bfd_malloc (verhdr->sh_size);
1182 if (xverbuf == NULL && verhdr->sh_size != 0)
252b5132
RH
1183 goto error_return;
1184
6cdc0ccc 1185 if (bfd_bread ((PTR) xverbuf, verhdr->sh_size, abfd)
252b5132
RH
1186 != verhdr->sh_size)
1187 goto error_return;
1188 }
1189
1190 /* Skip first symbol, which is a null dummy. */
6cdc0ccc
AM
1191 xver = xverbuf;
1192 if (xver != NULL)
1193 ++xver;
1194 isymend = isymbuf + symcount;
1195 for (isym = isymbuf + 1, sym = symbase; isym < isymend; isym++, sym++)
252b5132 1196 {
6cdc0ccc 1197 memcpy (&sym->internal_elf_sym, isym, sizeof (Elf_Internal_Sym));
252b5132
RH
1198 sym->symbol.the_bfd = abfd;
1199
1200 sym->symbol.name = bfd_elf_string_from_elf_section (abfd,
1201 hdr->sh_link,
6cdc0ccc 1202 isym->st_name);
252b5132 1203
6cdc0ccc 1204 sym->symbol.value = isym->st_value;
252b5132 1205
6cdc0ccc 1206 if (isym->st_shndx == SHN_UNDEF)
9ad5cbcf
AM
1207 {
1208 sym->symbol.section = bfd_und_section_ptr;
1209 }
6cdc0ccc
AM
1210 else if (isym->st_shndx < SHN_LORESERVE
1211 || isym->st_shndx > SHN_HIRESERVE)
252b5132
RH
1212 {
1213 sym->symbol.section = section_from_elf_index (abfd,
6cdc0ccc 1214 isym->st_shndx);
252b5132
RH
1215 if (sym->symbol.section == NULL)
1216 {
1217 /* This symbol is in a section for which we did not
1218 create a BFD section. Just use bfd_abs_section,
1219 although it is wrong. FIXME. */
1220 sym->symbol.section = bfd_abs_section_ptr;
1221 }
1222 }
6cdc0ccc 1223 else if (isym->st_shndx == SHN_ABS)
252b5132
RH
1224 {
1225 sym->symbol.section = bfd_abs_section_ptr;
1226 }
6cdc0ccc 1227 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
1228 {
1229 sym->symbol.section = bfd_com_section_ptr;
1230 /* Elf puts the alignment into the `value' field, and
1231 the size into the `size' field. BFD wants to see the
1232 size in the value field, and doesn't care (at the
1233 moment) about the alignment. */
6cdc0ccc 1234 sym->symbol.value = isym->st_size;
252b5132 1235 }
252b5132
RH
1236 else
1237 sym->symbol.section = bfd_abs_section_ptr;
1238
1239 /* If this is a relocateable file, then the symbol value is
1240 already section relative. */
1241 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1242 sym->symbol.value -= sym->symbol.section->vma;
1243
6cdc0ccc 1244 switch (ELF_ST_BIND (isym->st_info))
252b5132
RH
1245 {
1246 case STB_LOCAL:
1247 sym->symbol.flags |= BSF_LOCAL;
1248 break;
1249 case STB_GLOBAL:
6cdc0ccc 1250 if (isym->st_shndx != SHN_UNDEF && isym->st_shndx != SHN_COMMON)
252b5132
RH
1251 sym->symbol.flags |= BSF_GLOBAL;
1252 break;
1253 case STB_WEAK:
1254 sym->symbol.flags |= BSF_WEAK;
1255 break;
1256 }
1257
6cdc0ccc 1258 switch (ELF_ST_TYPE (isym->st_info))
252b5132
RH
1259 {
1260 case STT_SECTION:
1261 sym->symbol.flags |= BSF_SECTION_SYM | BSF_DEBUGGING;
1262 break;
1263 case STT_FILE:
1264 sym->symbol.flags |= BSF_FILE | BSF_DEBUGGING;
1265 break;
1266 case STT_FUNC:
1267 sym->symbol.flags |= BSF_FUNCTION;
1268 break;
1269 case STT_OBJECT:
1270 sym->symbol.flags |= BSF_OBJECT;
1271 break;
1272 }
1273
1274 if (dynamic)
1275 sym->symbol.flags |= BSF_DYNAMIC;
1276
6cdc0ccc 1277 if (xver != NULL)
252b5132
RH
1278 {
1279 Elf_Internal_Versym iversym;
1280
6cdc0ccc 1281 _bfd_elf_swap_versym_in (abfd, xver, &iversym);
252b5132 1282 sym->version = iversym.vs_vers;
6cdc0ccc 1283 xver++;
252b5132
RH
1284 }
1285
1286 /* Do some backend-specific processing on this symbol. */
6cdc0ccc
AM
1287 if (ebd->elf_backend_symbol_processing)
1288 (*ebd->elf_backend_symbol_processing) (abfd, &sym->symbol);
252b5132
RH
1289 }
1290 }
1291
1292 /* Do some backend-specific processing on this symbol table. */
6cdc0ccc
AM
1293 if (ebd->elf_backend_symbol_table_processing)
1294 (*ebd->elf_backend_symbol_table_processing) (abfd, symbase, symcount);
252b5132
RH
1295
1296 /* We rely on the zalloc to clear out the final symbol entry. */
1297
1298 symcount = sym - symbase;
1299
1300 /* Fill in the user's symbol pointer vector if needed. */
1301 if (symptrs)
1302 {
1303 long l = symcount;
1304
1305 sym = symbase;
1306 while (l-- > 0)
1307 {
1308 *symptrs++ = &sym->symbol;
1309 sym++;
1310 }
1311 *symptrs = 0; /* Final null pointer */
1312 }
1313
6cdc0ccc
AM
1314 if (xverbuf != NULL)
1315 free (xverbuf);
1316 if (isymbuf != NULL && hdr->contents != (unsigned char *) isymbuf)
1317 free (isymbuf);
252b5132 1318 return symcount;
9ad5cbcf 1319
252b5132 1320error_return:
6cdc0ccc
AM
1321 if (xverbuf != NULL)
1322 free (xverbuf);
1323 if (isymbuf != NULL && hdr->contents != (unsigned char *) isymbuf)
1324 free (isymbuf);
252b5132
RH
1325 return -1;
1326}
1327
60bcf0fa 1328/* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
42fdc509 1329 them. */
252b5132
RH
1330
1331static boolean
42fdc509
MM
1332elf_slurp_reloc_table_from_section (abfd, asect, rel_hdr, reloc_count,
1333 relents, symbols, dynamic)
252b5132
RH
1334 bfd *abfd;
1335 asection *asect;
42fdc509
MM
1336 Elf_Internal_Shdr *rel_hdr;
1337 bfd_size_type reloc_count;
1338 arelent *relents;
252b5132
RH
1339 asymbol **symbols;
1340 boolean dynamic;
1341{
1342 struct elf_backend_data * const ebd = get_elf_backend_data (abfd);
252b5132
RH
1343 PTR allocated = NULL;
1344 bfd_byte *native_relocs;
252b5132
RH
1345 arelent *relent;
1346 unsigned int i;
1347 int entsize;
5ad8645c 1348 unsigned int symcount;
252b5132 1349
dc810e39 1350 allocated = (PTR) bfd_malloc (rel_hdr->sh_size);
252b5132
RH
1351 if (allocated == NULL)
1352 goto error_return;
1353
1354 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 1355 || (bfd_bread (allocated, rel_hdr->sh_size, abfd)
252b5132
RH
1356 != rel_hdr->sh_size))
1357 goto error_return;
1358
1359 native_relocs = (bfd_byte *) allocated;
1360
252b5132
RH
1361 entsize = rel_hdr->sh_entsize;
1362 BFD_ASSERT (entsize == sizeof (Elf_External_Rel)
1363 || entsize == sizeof (Elf_External_Rela));
1364
5ad8645c
AM
1365 if (dynamic)
1366 symcount = bfd_get_dynamic_symcount (abfd);
1367 else
1368 symcount = bfd_get_symcount (abfd);
1369
252b5132
RH
1370 for (i = 0, relent = relents;
1371 i < reloc_count;
1372 i++, relent++, native_relocs += entsize)
1373 {
1374 Elf_Internal_Rela rela;
1375 Elf_Internal_Rel rel;
1376
1377 if (entsize == sizeof (Elf_External_Rela))
1378 elf_swap_reloca_in (abfd, (Elf_External_Rela *) native_relocs, &rela);
1379 else
1380 {
1381 elf_swap_reloc_in (abfd, (Elf_External_Rel *) native_relocs, &rel);
1382 rela.r_offset = rel.r_offset;
1383 rela.r_info = rel.r_info;
1384 rela.r_addend = 0;
1385 }
1386
1387 /* The address of an ELF reloc is section relative for an object
1388 file, and absolute for an executable file or shared library.
1389 The address of a normal BFD reloc is always section relative,
1390 and the address of a dynamic reloc is absolute.. */
1391 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
1392 relent->address = rela.r_offset;
1393 else
1394 relent->address = rela.r_offset - asect->vma;
1395
1396 if (ELF_R_SYM (rela.r_info) == 0)
1397 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
05a487dc 1398 else if (ELF_R_SYM (rela.r_info) > symcount)
1f70368c
DJ
1399 {
1400 (*_bfd_error_handler)
1401 (_("%s(%s): relocation %d has invalid symbol index %ld"),
1402 abfd->filename, asect->name, i, ELF_R_SYM (rela.r_info));
1403 relent->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
1404 }
252b5132
RH
1405 else
1406 {
1407 asymbol **ps, *s;
1408
1409 ps = symbols + ELF_R_SYM (rela.r_info) - 1;
1410 s = *ps;
1411
1412 /* Canonicalize ELF section symbols. FIXME: Why? */
1413 if ((s->flags & BSF_SECTION_SYM) == 0)
1414 relent->sym_ptr_ptr = ps;
1415 else
1416 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
1417 }
1418
1419 relent->addend = rela.r_addend;
1420
1421 if (entsize == sizeof (Elf_External_Rela))
1422 (*ebd->elf_info_to_howto) (abfd, relent, &rela);
1423 else
1424 (*ebd->elf_info_to_howto_rel) (abfd, relent, &rel);
1425 }
1426
252b5132
RH
1427 if (allocated != NULL)
1428 free (allocated);
1429
1430 return true;
1431
1432 error_return:
1433 if (allocated != NULL)
1434 free (allocated);
1435 return false;
1436}
1437
42fdc509
MM
1438/* Read in and swap the external relocs. */
1439
b9f66672 1440boolean
42fdc509
MM
1441elf_slurp_reloc_table (abfd, asect, symbols, dynamic)
1442 bfd *abfd;
1443 asection *asect;
1444 asymbol **symbols;
1445 boolean dynamic;
1446{
1447 struct bfd_elf_section_data * const d = elf_section_data (asect);
1448 Elf_Internal_Shdr *rel_hdr;
1449 Elf_Internal_Shdr *rel_hdr2;
1450 bfd_size_type reloc_count;
1451 bfd_size_type reloc_count2;
1452 arelent *relents;
dc810e39 1453 bfd_size_type amt;
42fdc509
MM
1454
1455 if (asect->relocation != NULL)
1456 return true;
1457
1458 if (! dynamic)
1459 {
1460 if ((asect->flags & SEC_RELOC) == 0
1461 || asect->reloc_count == 0)
1462 return true;
1463
1464 rel_hdr = &d->rel_hdr;
d9bc7a44 1465 reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
42fdc509 1466 rel_hdr2 = d->rel_hdr2;
d9bc7a44 1467 reloc_count2 = (rel_hdr2 ? NUM_SHDR_ENTRIES (rel_hdr2) : 0);
42fdc509
MM
1468
1469 BFD_ASSERT (asect->reloc_count == reloc_count + reloc_count2);
1470 BFD_ASSERT (asect->rel_filepos == rel_hdr->sh_offset
1471 || (rel_hdr2 && asect->rel_filepos == rel_hdr2->sh_offset));
1472
1473 }
1474 else
1475 {
57e21bef
MM
1476 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
1477 case because relocations against this section may use the
1478 dynamic symbol table, and in that case bfd_section_from_shdr
1479 in elf.c does not update the RELOC_COUNT. */
42fdc509
MM
1480 if (asect->_raw_size == 0)
1481 return true;
1482
1483 rel_hdr = &d->this_hdr;
d9bc7a44 1484 reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
42fdc509 1485 rel_hdr2 = NULL;
57e21bef 1486 reloc_count2 = 0;
42fdc509
MM
1487 }
1488
dc810e39
AM
1489 amt = (reloc_count + reloc_count2) * sizeof (arelent);
1490 relents = (arelent *) bfd_alloc (abfd, amt);
42fdc509
MM
1491 if (relents == NULL)
1492 return false;
1493
1494 if (!elf_slurp_reloc_table_from_section (abfd, asect,
1495 rel_hdr, reloc_count,
1496 relents,
1497 symbols, dynamic))
1498 return false;
60bcf0fa
NC
1499
1500 if (rel_hdr2
42fdc509
MM
1501 && !elf_slurp_reloc_table_from_section (abfd, asect,
1502 rel_hdr2, reloc_count2,
1503 relents + reloc_count,
1504 symbols, dynamic))
1505 return false;
1506
42fdc509
MM
1507 asect->relocation = relents;
1508 return true;
1509}
1510
252b5132
RH
1511#ifdef DEBUG
1512static void
1513elf_debug_section (num, hdr)
1514 int num;
1515 Elf_Internal_Shdr *hdr;
1516{
1517 fprintf (stderr, "\nSection#%d '%s' 0x%.8lx\n", num,
1518 hdr->bfd_section != NULL ? hdr->bfd_section->name : "",
1519 (long) hdr);
1520 fprintf (stderr,
1521 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
1522 (long) hdr->sh_name,
1523 (long) hdr->sh_type,
1524 (long) hdr->sh_flags);
1525 fprintf (stderr,
1526 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
1527 (long) hdr->sh_addr,
1528 (long) hdr->sh_offset,
1529 (long) hdr->sh_size);
1530 fprintf (stderr,
1531 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
1532 (long) hdr->sh_link,
1533 (long) hdr->sh_info,
1534 (long) hdr->sh_addralign);
1535 fprintf (stderr, "sh_entsize = %ld\n",
1536 (long) hdr->sh_entsize);
1537 fflush (stderr);
1538}
1539
1540static void
1541elf_debug_file (ehdrp)
1542 Elf_Internal_Ehdr *ehdrp;
1543{
1544 fprintf (stderr, "e_entry = 0x%.8lx\n", (long) ehdrp->e_entry);
1545 fprintf (stderr, "e_phoff = %ld\n", (long) ehdrp->e_phoff);
1546 fprintf (stderr, "e_phnum = %ld\n", (long) ehdrp->e_phnum);
1547 fprintf (stderr, "e_phentsize = %ld\n", (long) ehdrp->e_phentsize);
1548 fprintf (stderr, "e_shoff = %ld\n", (long) ehdrp->e_shoff);
1549 fprintf (stderr, "e_shnum = %ld\n", (long) ehdrp->e_shnum);
1550 fprintf (stderr, "e_shentsize = %ld\n", (long) ehdrp->e_shentsize);
1551}
1552
1553static char *
1554elf_symbol_flags (flags)
1555 flagword flags;
1556{
1557 static char buffer[1024];
1558
1559 buffer[0] = '\0';
1560 if (flags & BSF_LOCAL)
1561 strcat (buffer, " local");
1562
1563 if (flags & BSF_GLOBAL)
1564 strcat (buffer, " global");
1565
1566 if (flags & BSF_DEBUGGING)
1567 strcat (buffer, " debug");
1568
1569 if (flags & BSF_FUNCTION)
1570 strcat (buffer, " function");
1571
1572 if (flags & BSF_KEEP)
1573 strcat (buffer, " keep");
1574
1575 if (flags & BSF_KEEP_G)
1576 strcat (buffer, " keep_g");
1577
1578 if (flags & BSF_WEAK)
1579 strcat (buffer, " weak");
1580
1581 if (flags & BSF_SECTION_SYM)
1582 strcat (buffer, " section-sym");
1583
1584 if (flags & BSF_OLD_COMMON)
1585 strcat (buffer, " old-common");
1586
1587 if (flags & BSF_NOT_AT_END)
1588 strcat (buffer, " not-at-end");
1589
1590 if (flags & BSF_CONSTRUCTOR)
1591 strcat (buffer, " constructor");
1592
1593 if (flags & BSF_WARNING)
1594 strcat (buffer, " warning");
1595
1596 if (flags & BSF_INDIRECT)
1597 strcat (buffer, " indirect");
1598
1599 if (flags & BSF_FILE)
1600 strcat (buffer, " file");
1601
1602 if (flags & DYNAMIC)
1603 strcat (buffer, " dynamic");
1604
1605 if (flags & ~(BSF_LOCAL
1606 | BSF_GLOBAL
1607 | BSF_DEBUGGING
1608 | BSF_FUNCTION
1609 | BSF_KEEP
1610 | BSF_KEEP_G
1611 | BSF_WEAK
1612 | BSF_SECTION_SYM
1613 | BSF_OLD_COMMON
1614 | BSF_NOT_AT_END
1615 | BSF_CONSTRUCTOR
1616 | BSF_WARNING
1617 | BSF_INDIRECT
1618 | BSF_FILE
1619 | BSF_DYNAMIC))
1620 strcat (buffer, " unknown-bits");
1621
1622 return buffer;
1623}
1624#endif
1625\f
1626#include "elfcore.h"
1627#include "elflink.h"
1628\f
1629/* Size-dependent data and functions. */
1630const struct elf_size_info NAME(_bfd_elf,size_info) = {
1631 sizeof (Elf_External_Ehdr),
1632 sizeof (Elf_External_Phdr),
1633 sizeof (Elf_External_Shdr),
1634 sizeof (Elf_External_Rel),
1635 sizeof (Elf_External_Rela),
1636 sizeof (Elf_External_Sym),
1637 sizeof (Elf_External_Dyn),
1638 sizeof (Elf_External_Note),
70bcb145 1639 4,
c7ac6ff8 1640 1,
252b5132
RH
1641 ARCH_SIZE, FILE_ALIGN,
1642 ELFCLASS, EV_CURRENT,
1643 elf_write_out_phdrs,
1644 elf_write_shdrs_and_ehdr,
b9f66672 1645 elf_write_relocs,
73ff0d56 1646 elf_swap_symbol_in,
252b5132
RH
1647 elf_swap_symbol_out,
1648 elf_slurp_reloc_table,
1649 elf_slurp_symbol_table,
c7ac6ff8
MM
1650 elf_swap_dyn_in,
1651 elf_swap_dyn_out,
1652 NULL,
1653 NULL,
1654 NULL,
1655 NULL
252b5132 1656};
This page took 0.228853 seconds and 4 git commands to generate.