Wed Mar 30 16:25:41 1994 Ian Lance Taylor (ian@tweedledumb.cygnus.com)
[deliverable/binutils-gdb.git] / bfd / elfcode.h
CommitLineData
244ffee7 1/* ELF executable support for BFD.
b9d5cdf0 2 Copyright 1991, 1992, 1993, 1994 Free Software Foundation, Inc.
244ffee7
JK
3
4 Written by Fred Fish @ Cygnus Support, from information published
5 in "UNIX System V Release 4, Programmers Guide: ANSI C and
6 Programming Support Tools". Sufficient support for gdb.
7
8 Rewritten by Mark Eichin @ Cygnus Support, from information
9 published in "System V Application Binary Interface", chapters 4
10 and 5, as well as the various "Processor Supplement" documents
11 derived from it. Added support for assembler and other object file
12 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
13 Meissner (Open Software Foundation), and Peter Hoogenboom (University
14 of Utah) to finish and extend this.
15
16This file is part of BFD, the Binary File Descriptor library.
17
18This program is free software; you can redistribute it and/or modify
19it under the terms of the GNU General Public License as published by
20the Free Software Foundation; either version 2 of the License, or
21(at your option) any later version.
22
23This program is distributed in the hope that it will be useful,
24but WITHOUT ANY WARRANTY; without even the implied warranty of
25MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
26GNU General Public License for more details.
27
28You should have received a copy of the GNU General Public License
29along with this program; if not, write to the Free Software
30Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
31
244ffee7
JK
32/* Problems and other issues to resolve.
33
34 (1) BFD expects there to be some fixed number of "sections" in
35 the object file. I.E. there is a "section_count" variable in the
36 bfd structure which contains the number of sections. However, ELF
37 supports multiple "views" of a file. In particular, with current
38 implementations, executable files typically have two tables, a
39 program header table and a section header table, both of which
40 partition the executable.
41
42 In ELF-speak, the "linking view" of the file uses the section header
43 table to access "sections" within the file, and the "execution view"
44 uses the program header table to access "segments" within the file.
45 "Segments" typically may contain all the data from one or more
46 "sections".
47
48 Note that the section header table is optional in ELF executables,
49 but it is this information that is most useful to gdb. If the
50 section header table is missing, then gdb should probably try
51 to make do with the program header table. (FIXME)
52
6a3eb9b6
KR
53 (2) The code in this file is compiled twice, once in 32-bit mode and
54 once in 64-bit mode. More of it should be made size-independent
55 and moved into elf.c.
56
d24928c0
KR
57 (3) ELF section symbols are handled rather sloppily now. This should
58 be cleaned up, and ELF section symbols reconciled with BFD section
59 symbols.
60 */
244ffee7
JK
61
62#include <string.h> /* For strrchr and friends */
63#include "bfd.h"
64#include "sysdep.h"
65#include "libbfd.h"
66#include "libelf.h"
67
32090b8e 68/* Renaming structures, typedefs, macros and functions to be size-specific. */
244ffee7 69#define Elf_External_Ehdr NAME(Elf,External_Ehdr)
244ffee7 70#define Elf_External_Sym NAME(Elf,External_Sym)
244ffee7 71#define Elf_External_Shdr NAME(Elf,External_Shdr)
244ffee7 72#define Elf_External_Phdr NAME(Elf,External_Phdr)
244ffee7
JK
73#define Elf_External_Rel NAME(Elf,External_Rel)
74#define Elf_External_Rela NAME(Elf,External_Rela)
244ffee7 75
244ffee7
JK
76#define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
77#define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
78#define elf_core_file_matches_executable_p NAME(bfd_elf,core_file_matches_executable_p)
79#define elf_object_p NAME(bfd_elf,object_p)
80#define elf_core_file_p NAME(bfd_elf,core_file_p)
244ffee7
JK
81#define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
82#define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
83#define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
84#define elf_get_symtab NAME(bfd_elf,get_symtab)
85#define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
86#define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
87#define elf_print_symbol NAME(bfd_elf,print_symbol)
88#define elf_get_lineno NAME(bfd_elf,get_lineno)
89#define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
90#define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
91#define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
92#define elf_set_section_contents NAME(bfd_elf,set_section_contents)
93#define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
94#define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
fce36137 95#define elf_new_section_hook NAME(bfd_elf,new_section_hook)
32090b8e 96#define write_relocs NAME(bfd_elf,_write_relocs)
f035cc47 97#define elf_find_section NAME(bfd_elf,find_section)
244ffee7 98
6a3eb9b6
KR
99#if ARCH_SIZE == 64
100#define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
101#define ELF_R_SYM(X) ELF64_R_SYM(X)
32090b8e 102#define ELFCLASS ELFCLASS64
f035cc47 103#define FILE_ALIGN 8
6a3eb9b6
KR
104#endif
105#if ARCH_SIZE == 32
106#define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
107#define ELF_R_SYM(X) ELF32_R_SYM(X)
32090b8e 108#define ELFCLASS ELFCLASS32
f035cc47 109#define FILE_ALIGN 4
244ffee7
JK
110#endif
111
32090b8e
KR
112static int shstrtab_length_fixed;
113
1c6042ee
ILT
114struct elf_sect_data
115 {
116 int reloc_sec;
117 /* more? */
118 };
32090b8e 119
244ffee7
JK
120/* Forward declarations of static functions */
121
1c6042ee 122static struct sec *section_from_elf_index PARAMS ((bfd *, unsigned int));
244ffee7
JK
123
124static int elf_section_from_bfd_section PARAMS ((bfd *, struct sec *));
125
126static boolean elf_slurp_symbol_table PARAMS ((bfd *, asymbol **));
127
244ffee7 128static int elf_symbol_from_bfd_symbol PARAMS ((bfd *,
1c6042ee 129 struct symbol_cache_entry **));
244ffee7 130
9783e04a 131static boolean elf_map_symbols PARAMS ((bfd *));
b9d5cdf0 132static boolean swap_out_syms PARAMS ((bfd *));
244ffee7 133
6a3eb9b6
KR
134#ifdef DEBUG
135static void elf_debug_section PARAMS ((char *, int, Elf_Internal_Shdr *));
136static void elf_debug_file PARAMS ((Elf_Internal_Ehdr *));
137#endif
238ac6ec 138
32090b8e
KR
139#define elf_string_from_elf_strtab(abfd,strindex) \
140 elf_string_from_elf_section(abfd,elf_elfheader(abfd)->e_shstrndx,strindex)
32090b8e 141\f
1c6042ee 142
32090b8e
KR
143/* Structure swapping routines */
144
6a3eb9b6
KR
145/* Should perhaps use put_offset, put_word, etc. For now, the two versions
146 can be handled by explicitly specifying 32 bits or "the long type". */
238ac6ec
KR
147#if ARCH_SIZE == 64
148#define put_word bfd_h_put_64
149#define get_word bfd_h_get_64
150#endif
151#if ARCH_SIZE == 32
152#define put_word bfd_h_put_32
153#define get_word bfd_h_get_32
154#endif
155
244ffee7
JK
156/* Translate an ELF symbol in external format into an ELF symbol in internal
157 format. */
158
159static void
1c6042ee
ILT
160elf_swap_symbol_in (abfd, src, dst)
161 bfd *abfd;
162 Elf_External_Sym *src;
163 Elf_Internal_Sym *dst;
244ffee7
JK
164{
165 dst->st_name = bfd_h_get_32 (abfd, (bfd_byte *) src->st_name);
238ac6ec
KR
166 dst->st_value = get_word (abfd, (bfd_byte *) src->st_value);
167 dst->st_size = get_word (abfd, (bfd_byte *) src->st_size);
244ffee7
JK
168 dst->st_info = bfd_h_get_8 (abfd, (bfd_byte *) src->st_info);
169 dst->st_other = bfd_h_get_8 (abfd, (bfd_byte *) src->st_other);
170 dst->st_shndx = bfd_h_get_16 (abfd, (bfd_byte *) src->st_shndx);
171}
172
173/* Translate an ELF symbol in internal format into an ELF symbol in external
174 format. */
175
176static void
1c6042ee
ILT
177elf_swap_symbol_out (abfd, src, dst)
178 bfd *abfd;
179 Elf_Internal_Sym *src;
180 Elf_External_Sym *dst;
244ffee7
JK
181{
182 bfd_h_put_32 (abfd, src->st_name, dst->st_name);
238ac6ec
KR
183 put_word (abfd, src->st_value, dst->st_value);
184 put_word (abfd, src->st_size, dst->st_size);
244ffee7
JK
185 bfd_h_put_8 (abfd, src->st_info, dst->st_info);
186 bfd_h_put_8 (abfd, src->st_other, dst->st_other);
187 bfd_h_put_16 (abfd, src->st_shndx, dst->st_shndx);
188}
189
190
191/* Translate an ELF file header in external format into an ELF file header in
192 internal format. */
193
194static void
1c6042ee
ILT
195elf_swap_ehdr_in (abfd, src, dst)
196 bfd *abfd;
197 Elf_External_Ehdr *src;
198 Elf_Internal_Ehdr *dst;
244ffee7
JK
199{
200 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
201 dst->e_type = bfd_h_get_16 (abfd, (bfd_byte *) src->e_type);
202 dst->e_machine = bfd_h_get_16 (abfd, (bfd_byte *) src->e_machine);
203 dst->e_version = bfd_h_get_32 (abfd, (bfd_byte *) src->e_version);
238ac6ec
KR
204 dst->e_entry = get_word (abfd, (bfd_byte *) src->e_entry);
205 dst->e_phoff = get_word (abfd, (bfd_byte *) src->e_phoff);
206 dst->e_shoff = get_word (abfd, (bfd_byte *) src->e_shoff);
244ffee7
JK
207 dst->e_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->e_flags);
208 dst->e_ehsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_ehsize);
209 dst->e_phentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phentsize);
210 dst->e_phnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_phnum);
211 dst->e_shentsize = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shentsize);
212 dst->e_shnum = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shnum);
213 dst->e_shstrndx = bfd_h_get_16 (abfd, (bfd_byte *) src->e_shstrndx);
214}
215
216/* Translate an ELF file header in internal format into an ELF file header in
217 external format. */
218
219static void
1c6042ee
ILT
220elf_swap_ehdr_out (abfd, src, dst)
221 bfd *abfd;
222 Elf_Internal_Ehdr *src;
223 Elf_External_Ehdr *dst;
244ffee7
JK
224{
225 memcpy (dst->e_ident, src->e_ident, EI_NIDENT);
226 /* note that all elements of dst are *arrays of unsigned char* already... */
227 bfd_h_put_16 (abfd, src->e_type, dst->e_type);
228 bfd_h_put_16 (abfd, src->e_machine, dst->e_machine);
229 bfd_h_put_32 (abfd, src->e_version, dst->e_version);
238ac6ec
KR
230 put_word (abfd, src->e_entry, dst->e_entry);
231 put_word (abfd, src->e_phoff, dst->e_phoff);
232 put_word (abfd, src->e_shoff, dst->e_shoff);
244ffee7
JK
233 bfd_h_put_32 (abfd, src->e_flags, dst->e_flags);
234 bfd_h_put_16 (abfd, src->e_ehsize, dst->e_ehsize);
235 bfd_h_put_16 (abfd, src->e_phentsize, dst->e_phentsize);
236 bfd_h_put_16 (abfd, src->e_phnum, dst->e_phnum);
237 bfd_h_put_16 (abfd, src->e_shentsize, dst->e_shentsize);
238 bfd_h_put_16 (abfd, src->e_shnum, dst->e_shnum);
239 bfd_h_put_16 (abfd, src->e_shstrndx, dst->e_shstrndx);
240}
241
242
243/* Translate an ELF section header table entry in external format into an
244 ELF section header table entry in internal format. */
245
246static void
1c6042ee
ILT
247elf_swap_shdr_in (abfd, src, dst)
248 bfd *abfd;
249 Elf_External_Shdr *src;
250 Elf_Internal_Shdr *dst;
244ffee7
JK
251{
252 dst->sh_name = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_name);
253 dst->sh_type = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_type);
238ac6ec
KR
254 dst->sh_flags = get_word (abfd, (bfd_byte *) src->sh_flags);
255 dst->sh_addr = get_word (abfd, (bfd_byte *) src->sh_addr);
256 dst->sh_offset = get_word (abfd, (bfd_byte *) src->sh_offset);
257 dst->sh_size = get_word (abfd, (bfd_byte *) src->sh_size);
244ffee7
JK
258 dst->sh_link = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_link);
259 dst->sh_info = bfd_h_get_32 (abfd, (bfd_byte *) src->sh_info);
238ac6ec
KR
260 dst->sh_addralign = get_word (abfd, (bfd_byte *) src->sh_addralign);
261 dst->sh_entsize = get_word (abfd, (bfd_byte *) src->sh_entsize);
244ffee7
JK
262 /* we haven't done any processing on it yet, so... */
263 dst->rawdata = (void *) 0;
264}
265
266/* Translate an ELF section header table entry in internal format into an
267 ELF section header table entry in external format. */
268
269static void
1c6042ee
ILT
270elf_swap_shdr_out (abfd, src, dst)
271 bfd *abfd;
272 Elf_Internal_Shdr *src;
273 Elf_External_Shdr *dst;
244ffee7
JK
274{
275 /* note that all elements of dst are *arrays of unsigned char* already... */
276 bfd_h_put_32 (abfd, src->sh_name, dst->sh_name);
277 bfd_h_put_32 (abfd, src->sh_type, dst->sh_type);
238ac6ec
KR
278 put_word (abfd, src->sh_flags, dst->sh_flags);
279 put_word (abfd, src->sh_addr, dst->sh_addr);
280 put_word (abfd, src->sh_offset, dst->sh_offset);
281 put_word (abfd, src->sh_size, dst->sh_size);
244ffee7
JK
282 bfd_h_put_32 (abfd, src->sh_link, dst->sh_link);
283 bfd_h_put_32 (abfd, src->sh_info, dst->sh_info);
238ac6ec
KR
284 put_word (abfd, src->sh_addralign, dst->sh_addralign);
285 put_word (abfd, src->sh_entsize, dst->sh_entsize);
244ffee7
JK
286}
287
288
289/* Translate an ELF program header table entry in external format into an
290 ELF program header table entry in internal format. */
291
292static void
1c6042ee
ILT
293elf_swap_phdr_in (abfd, src, dst)
294 bfd *abfd;
295 Elf_External_Phdr *src;
296 Elf_Internal_Phdr *dst;
244ffee7
JK
297{
298 dst->p_type = bfd_h_get_32 (abfd, (bfd_byte *) src->p_type);
244ffee7 299 dst->p_flags = bfd_h_get_32 (abfd, (bfd_byte *) src->p_flags);
238ac6ec
KR
300 dst->p_offset = get_word (abfd, (bfd_byte *) src->p_offset);
301 dst->p_vaddr = get_word (abfd, (bfd_byte *) src->p_vaddr);
302 dst->p_paddr = get_word (abfd, (bfd_byte *) src->p_paddr);
303 dst->p_filesz = get_word (abfd, (bfd_byte *) src->p_filesz);
304 dst->p_memsz = get_word (abfd, (bfd_byte *) src->p_memsz);
305 dst->p_align = get_word (abfd, (bfd_byte *) src->p_align);
244ffee7
JK
306}
307
244ffee7 308static void
1c6042ee
ILT
309elf_swap_phdr_out (abfd, src, dst)
310 bfd *abfd;
311 Elf_Internal_Phdr *src;
312 Elf_External_Phdr *dst;
244ffee7
JK
313{
314 /* note that all elements of dst are *arrays of unsigned char* already... */
315 bfd_h_put_32 (abfd, src->p_type, dst->p_type);
94dbb655
KR
316 put_word (abfd, src->p_offset, dst->p_offset);
317 put_word (abfd, src->p_vaddr, dst->p_vaddr);
318 put_word (abfd, src->p_paddr, dst->p_paddr);
319 put_word (abfd, src->p_filesz, dst->p_filesz);
320 put_word (abfd, src->p_memsz, dst->p_memsz);
244ffee7 321 bfd_h_put_32 (abfd, src->p_flags, dst->p_flags);
94dbb655 322 put_word (abfd, src->p_align, dst->p_align);
244ffee7
JK
323}
324
325/* Translate an ELF reloc from external format to internal format. */
32090b8e 326static INLINE void
1c6042ee
ILT
327elf_swap_reloc_in (abfd, src, dst)
328 bfd *abfd;
329 Elf_External_Rel *src;
330 Elf_Internal_Rel *dst;
244ffee7 331{
94dbb655
KR
332 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
333 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
244ffee7
JK
334}
335
32090b8e 336static INLINE void
1c6042ee
ILT
337elf_swap_reloca_in (abfd, src, dst)
338 bfd *abfd;
339 Elf_External_Rela *src;
340 Elf_Internal_Rela *dst;
244ffee7 341{
94dbb655
KR
342 dst->r_offset = get_word (abfd, (bfd_byte *) src->r_offset);
343 dst->r_info = get_word (abfd, (bfd_byte *) src->r_info);
344 dst->r_addend = get_word (abfd, (bfd_byte *) src->r_addend);
244ffee7
JK
345}
346
347/* Translate an ELF reloc from internal format to external format. */
32090b8e 348static INLINE void
1c6042ee
ILT
349elf_swap_reloc_out (abfd, src, dst)
350 bfd *abfd;
351 Elf_Internal_Rel *src;
352 Elf_External_Rel *dst;
244ffee7 353{
94dbb655
KR
354 put_word (abfd, src->r_offset, dst->r_offset);
355 put_word (abfd, src->r_info, dst->r_info);
244ffee7
JK
356}
357
32090b8e 358static INLINE void
1c6042ee
ILT
359elf_swap_reloca_out (abfd, src, dst)
360 bfd *abfd;
361 Elf_Internal_Rela *src;
362 Elf_External_Rela *dst;
244ffee7 363{
94dbb655
KR
364 put_word (abfd, src->r_offset, dst->r_offset);
365 put_word (abfd, src->r_info, dst->r_info);
366 put_word (abfd, src->r_addend, dst->r_addend);
244ffee7 367}
32090b8e
KR
368\f
369
1c6042ee 370
32090b8e
KR
371/* String table creation/manipulation routines */
372
373static struct strtab *
1c6042ee
ILT
374bfd_new_strtab (abfd)
375 bfd *abfd;
32090b8e
KR
376{
377 struct strtab *ss;
378
b9d5cdf0
DM
379 ss = (struct strtab *) malloc (sizeof (struct strtab));
380 if (!ss)
381 {
d1ad85a6 382 bfd_set_error (bfd_error_no_memory);
b9d5cdf0
DM
383 return NULL;
384 }
385 ss->tab = malloc (1);
386 if (!ss->tab)
387 {
d1ad85a6 388 bfd_set_error (bfd_error_no_memory);
b9d5cdf0
DM
389 return NULL;
390 }
32090b8e
KR
391 *ss->tab = 0;
392 ss->nentries = 0;
393 ss->length = 1;
244ffee7 394
32090b8e
KR
395 return ss;
396}
397
398static int
1c6042ee
ILT
399bfd_add_to_strtab (abfd, ss, str)
400 bfd *abfd;
401 struct strtab *ss;
402 CONST char *str;
32090b8e
KR
403{
404 /* should search first, but for now: */
405 /* include the trailing NUL */
406 int ln = strlen (str) + 1;
407
408 /* should this be using obstacks? */
409 ss->tab = realloc (ss->tab, ss->length + ln);
410
9783e04a 411 BFD_ASSERT (ss->tab != 0); /* FIXME */
32090b8e
KR
412 strcpy (ss->tab + ss->length, str);
413 ss->nentries++;
414 ss->length += ln;
415
416 return ss->length - ln;
417}
418
419static int
1c6042ee
ILT
420bfd_add_2_to_strtab (abfd, ss, str, str2)
421 bfd *abfd;
422 struct strtab *ss;
423 char *str;
424 CONST char *str2;
244ffee7 425{
32090b8e
KR
426 /* should search first, but for now: */
427 /* include the trailing NUL */
428 int ln = strlen (str) + strlen (str2) + 1;
429
430 /* should this be using obstacks? */
431 if (ss->length)
432 ss->tab = realloc (ss->tab, ss->length + ln);
433 else
b9d5cdf0 434 ss->tab = malloc (ln);
32090b8e 435
9783e04a 436 BFD_ASSERT (ss->tab != 0); /* FIXME */
32090b8e
KR
437 strcpy (ss->tab + ss->length, str);
438 strcpy (ss->tab + ss->length + strlen (str), str2);
439 ss->nentries++;
440 ss->length += ln;
441
442 return ss->length - ln;
244ffee7 443}
32090b8e 444\f
1c6042ee 445
32090b8e
KR
446/* ELF .o/exec file reading */
447
448/* Create a new bfd section from an ELF section header. */
449
244ffee7 450static boolean
1c6042ee
ILT
451bfd_section_from_shdr (abfd, shindex)
452 bfd *abfd;
453 unsigned int shindex;
244ffee7 454{
32090b8e
KR
455 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[shindex];
456 Elf_Internal_Ehdr *ehdr = elf_elfheader (abfd);
244ffee7
JK
457 asection *newsect;
458 char *name;
459
460 name = elf_string_from_elf_strtab (abfd, hdr->sh_name);
461
462 switch (hdr->sh_type)
463 {
464
465 case SHT_NULL:
466 /* inactive section. Throw it away. */
467 return true;
468
469 case SHT_PROGBITS:
25677b5b 470 case SHT_DYNAMIC:
244ffee7
JK
471 /* Bits that get saved. This one is real. */
472 if (!hdr->rawdata)
473 {
474 newsect = bfd_make_section (abfd, name);
475 if (newsect != NULL)
476 {
1c6042ee 477 newsect->filepos = hdr->sh_offset; /* so we can read back the bits */
32090b8e 478 newsect->flags |= SEC_HAS_CONTENTS;
244ffee7
JK
479 newsect->vma = hdr->sh_addr;
480 newsect->_raw_size = hdr->sh_size;
6a3eb9b6 481 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
244ffee7
JK
482
483 if (hdr->sh_flags & SHF_ALLOC)
484 {
485 newsect->flags |= SEC_ALLOC;
486 newsect->flags |= SEC_LOAD;
487 }
488
489 if (!(hdr->sh_flags & SHF_WRITE))
490 newsect->flags |= SEC_READONLY;
491
492 if (hdr->sh_flags & SHF_EXECINSTR)
1c6042ee 493 newsect->flags |= SEC_CODE; /* FIXME: may only contain SOME code */
36d541b1 494 else if (newsect->flags & SEC_ALLOC)
244ffee7
JK
495 newsect->flags |= SEC_DATA;
496
d6e5f950
ILT
497 /* The debugging sections appear to recognized only by
498 name. */
499 if (strncmp (name, ".debug", sizeof ".debug" - 1) == 0
500 || strncmp (name, ".line", sizeof ".line" - 1) == 0
501 || strncmp (name, ".stab", sizeof ".stab" - 1) == 0)
502 newsect->flags |= SEC_DEBUGGING;
503
244ffee7
JK
504 hdr->rawdata = (void *) newsect;
505 }
94dbb655
KR
506 else
507 hdr->rawdata = (void *) bfd_get_section_by_name (abfd, name);
244ffee7
JK
508 }
509 return true;
510
511 case SHT_NOBITS:
512 /* Bits that get saved. This one is real. */
513 if (!hdr->rawdata)
514 {
515 newsect = bfd_make_section (abfd, name);
516 if (newsect != NULL)
517 {
518 newsect->vma = hdr->sh_addr;
519 newsect->_raw_size = hdr->sh_size;
520 newsect->filepos = hdr->sh_offset; /* fake */
6a3eb9b6 521 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
244ffee7
JK
522 if (hdr->sh_flags & SHF_ALLOC)
523 newsect->flags |= SEC_ALLOC;
524
525 if (!(hdr->sh_flags & SHF_WRITE))
526 newsect->flags |= SEC_READONLY;
527
36d541b1
ILT
528 /* FIXME: This section is empty. Does it really make
529 sense to set SEC_CODE for it? */
244ffee7
JK
530 if (hdr->sh_flags & SHF_EXECINSTR)
531 newsect->flags |= SEC_CODE; /* FIXME: may only contain SOME code */
244ffee7
JK
532
533 hdr->rawdata = (void *) newsect;
534 }
535 }
536 return true;
537
538 case SHT_SYMTAB: /* A symbol table */
32090b8e
KR
539 if (elf_onesymtab (abfd) == shindex)
540 return true;
541
244ffee7 542 BFD_ASSERT (hdr->sh_entsize == sizeof (Elf_External_Sym));
32090b8e 543 BFD_ASSERT (elf_onesymtab (abfd) == 0);
244ffee7 544 elf_onesymtab (abfd) = shindex;
1c6042ee
ILT
545 elf_tdata (abfd)->symtab_hdr = *hdr;
546 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->symtab_hdr;
244ffee7
JK
547 abfd->flags |= HAS_SYMS;
548 return true;
549
550 case SHT_STRTAB: /* A string table */
32090b8e 551 if (hdr->rawdata)
fce36137 552 return true;
32090b8e
KR
553 if (ehdr->e_shstrndx == shindex)
554 {
1c6042ee
ILT
555 elf_tdata (abfd)->shstrtab_hdr = *hdr;
556 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->shstrtab_hdr;
557 hdr->rawdata = (PTR) & elf_tdata (abfd)->shstrtab_hdr;
32090b8e
KR
558 return true;
559 }
560 {
68241b2b 561 unsigned int i;
fce36137 562
32090b8e
KR
563 for (i = 1; i < ehdr->e_shnum; i++)
564 {
1c6042ee 565 Elf_Internal_Shdr *hdr2 = elf_elfsections (abfd)[i];
32090b8e
KR
566 if (hdr2->sh_link == shindex)
567 {
568 bfd_section_from_shdr (abfd, i);
569 if (elf_onesymtab (abfd) == i)
570 {
1c6042ee
ILT
571 elf_tdata (abfd)->strtab_hdr = *hdr;
572 elf_elfsections (abfd)[shindex] = &elf_tdata (abfd)->strtab_hdr;
32090b8e
KR
573 return true;
574 }
1c6042ee
ILT
575#if 0 /* Not handling other string tables specially right now. */
576 hdr2 = elf_elfsections (abfd)[i]; /* in case it moved */
32090b8e
KR
577 /* We have a strtab for some random other section. */
578 newsect = (asection *) hdr2->rawdata;
579 if (!newsect)
580 break;
581 hdr->rawdata = (PTR) newsect;
582 hdr2 = &elf_section_data (newsect)->str_hdr;
583 *hdr2 = *hdr;
1c6042ee 584 elf_elfsections (abfd)[shindex] = hdr2;
32090b8e
KR
585#endif
586 }
587 }
588 }
589
590 newsect = bfd_make_section (abfd, name);
591 if (newsect)
fce36137 592 {
32090b8e
KR
593 newsect->flags = SEC_HAS_CONTENTS;
594 hdr->rawdata = (PTR) newsect;
595 newsect->_raw_size = hdr->sh_size;
9783e04a
DM
596 newsect->alignment_power = bfd_log2 (hdr->sh_addralign);
597 newsect->vma = hdr->sh_addr;
f035cc47 598 newsect->filepos = hdr->sh_offset;
32090b8e
KR
599
600 if (hdr->sh_flags & SHF_ALLOC)
1c6042ee 601 newsect->flags |= SEC_ALLOC | SEC_LOAD;
32090b8e
KR
602 if (!(hdr->sh_flags & SHF_WRITE))
603 newsect->flags |= SEC_READONLY;
604 if (hdr->sh_flags & SHF_EXECINSTR)
605 newsect->flags |= SEC_CODE;
36d541b1 606 else if (newsect->flags & SEC_ALLOC)
32090b8e 607 newsect->flags |= SEC_DATA;
01383fb4
KR
608
609 /* Check for debugging string tables. */
610 if (strncmp (name, ".debug", sizeof ".debug" - 1) == 0
611 || strncmp (name, ".stab", sizeof ".stab" - 1) == 0)
612 newsect->flags |= SEC_DEBUGGING;
fce36137
KR
613 }
614
244ffee7
JK
615 return true;
616
617 case SHT_REL:
618 case SHT_RELA:
32090b8e
KR
619 /* *These* do a lot of work -- but build no sections!
620 The spec says there can be multiple strtabs, but only one symtab,
621 but there can be lots of REL* sections. */
244ffee7 622 /* FIXME: The above statement is wrong! There are typically at least
32090b8e
KR
623 two symbol tables in a dynamically linked executable, ".dynsym"
624 which is the dynamic linkage symbol table and ".symtab", which is
625 the "traditional" symbol table. -fnf */
244ffee7
JK
626
627 {
628 asection *target_sect;
32090b8e 629 Elf_Internal_Shdr *hdr2;
244ffee7
JK
630 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
631
632 /* Don't allow REL relocations on a machine that uses RELA and
633 vice versa. */
634 /* @@ Actually, the generic ABI does suggest that both might be
635 used in one file. But the four ABI Processor Supplements I
636 have access to right now all specify that only one is used on
637 each of those architectures. It's conceivable that, e.g., a
638 bunch of absolute 32-bit relocs might be more compact in REL
639 form even on a RELA machine... */
640 BFD_ASSERT (!(use_rela_p && (hdr->sh_type == SHT_REL)));
641 BFD_ASSERT (!(!use_rela_p && (hdr->sh_type == SHT_RELA)));
642 BFD_ASSERT (hdr->sh_entsize ==
643 (use_rela_p
6a3eb9b6
KR
644 ? sizeof (Elf_External_Rela)
645 : sizeof (Elf_External_Rel)));
244ffee7 646
244ffee7 647 bfd_section_from_shdr (abfd, hdr->sh_info); /* target */
32090b8e 648 bfd_section_from_shdr (abfd, hdr->sh_link); /* symbol table */
244ffee7 649 target_sect = section_from_elf_index (abfd, hdr->sh_info);
062189c6
ILT
650 if (target_sect == NULL
651 || elf_section_data (target_sect) == NULL)
244ffee7
JK
652 return false;
653
32090b8e
KR
654 hdr2 = &elf_section_data (target_sect)->rel_hdr;
655 *hdr2 = *hdr;
1c6042ee 656 elf_elfsections (abfd)[shindex] = hdr2;
244ffee7
JK
657 target_sect->reloc_count = hdr->sh_size / hdr->sh_entsize;
658 target_sect->flags |= SEC_RELOC;
659 target_sect->relocation = 0;
660 target_sect->rel_filepos = hdr->sh_offset;
32090b8e 661 abfd->flags |= HAS_RELOC;
244ffee7
JK
662 return true;
663 }
664 break;
665
666 case SHT_HASH:
244ffee7
JK
667 case SHT_DYNSYM: /* could treat this like symtab... */
668#if 0
669 fprintf (stderr, "Dynamic Linking sections not yet supported.\n");
670 BFD_FAIL ();
671#endif
672 break;
673
674 case SHT_NOTE:
675#if 0
676 fprintf (stderr, "Note Sections not yet supported.\n");
677 BFD_FAIL ();
678#endif
679 break;
680
681 case SHT_SHLIB:
682#if 0
683 fprintf (stderr, "SHLIB Sections not supported (and non conforming.)\n");
684#endif
685 return true;
686
687 default:
e621c5cc
ILT
688 /* Check for any processor-specific section types. */
689 {
690 struct elf_backend_data *bed = get_elf_backend_data (abfd);
691
692 if (bed->elf_backend_section_from_shdr)
693 (*bed->elf_backend_section_from_shdr) (abfd, hdr, name);
694 }
244ffee7
JK
695 break;
696 }
697
698 return true;
699}
700
fce36137 701boolean
1c6042ee
ILT
702elf_new_section_hook (abfd, sec)
703 bfd *abfd
704 ;
705 asection *sec;
fce36137 706{
32090b8e 707 struct bfd_elf_section_data *sdata;
300adb31
KR
708
709 sdata = (struct bfd_elf_section_data *) bfd_alloc (abfd, sizeof (*sdata));
9783e04a
DM
710 if (!sdata)
711 {
d1ad85a6 712 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
713 return false;
714 }
300adb31 715 sec->used_by_bfd = (PTR) sdata;
32090b8e 716 memset (sdata, 0, sizeof (*sdata));
244ffee7
JK
717 return true;
718}
719
720/* Create a new bfd section from an ELF program header.
721
722 Since program segments have no names, we generate a synthetic name
723 of the form segment<NUM>, where NUM is generally the index in the
724 program header table. For segments that are split (see below) we
725 generate the names segment<NUM>a and segment<NUM>b.
726
727 Note that some program segments may have a file size that is different than
728 (less than) the memory size. All this means is that at execution the
729 system must allocate the amount of memory specified by the memory size,
730 but only initialize it with the first "file size" bytes read from the
731 file. This would occur for example, with program segments consisting
732 of combined data+bss.
733
734 To handle the above situation, this routine generates TWO bfd sections
735 for the single program segment. The first has the length specified by
736 the file size of the segment, and the second has the length specified
737 by the difference between the two sizes. In effect, the segment is split
738 into it's initialized and uninitialized parts.
739
740 */
741
742static boolean
1c6042ee
ILT
743bfd_section_from_phdr (abfd, hdr, index)
744 bfd *abfd;
745 Elf_Internal_Phdr *hdr;
746 int index;
244ffee7
JK
747{
748 asection *newsect;
749 char *name;
750 char namebuf[64];
751 int split;
752
753 split = ((hdr->p_memsz > 0) &&
754 (hdr->p_filesz > 0) &&
755 (hdr->p_memsz > hdr->p_filesz));
756 sprintf (namebuf, split ? "segment%da" : "segment%d", index);
757 name = bfd_alloc (abfd, strlen (namebuf) + 1);
9783e04a
DM
758 if (!name)
759 {
d1ad85a6 760 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
761 return false;
762 }
244ffee7
JK
763 strcpy (name, namebuf);
764 newsect = bfd_make_section (abfd, name);
765 newsect->vma = hdr->p_vaddr;
766 newsect->_raw_size = hdr->p_filesz;
767 newsect->filepos = hdr->p_offset;
768 newsect->flags |= SEC_HAS_CONTENTS;
769 if (hdr->p_type == PT_LOAD)
770 {
771 newsect->flags |= SEC_ALLOC;
772 newsect->flags |= SEC_LOAD;
773 if (hdr->p_flags & PF_X)
774 {
775 /* FIXME: all we known is that it has execute PERMISSION,
776 may be data. */
777 newsect->flags |= SEC_CODE;
778 }
779 }
780 if (!(hdr->p_flags & PF_W))
781 {
782 newsect->flags |= SEC_READONLY;
783 }
784
785 if (split)
786 {
787 sprintf (namebuf, "segment%db", index);
788 name = bfd_alloc (abfd, strlen (namebuf) + 1);
9783e04a
DM
789 if (!name)
790 {
d1ad85a6 791 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
792 return false;
793 }
244ffee7
JK
794 strcpy (name, namebuf);
795 newsect = bfd_make_section (abfd, name);
796 newsect->vma = hdr->p_vaddr + hdr->p_filesz;
797 newsect->_raw_size = hdr->p_memsz - hdr->p_filesz;
798 if (hdr->p_type == PT_LOAD)
799 {
800 newsect->flags |= SEC_ALLOC;
801 if (hdr->p_flags & PF_X)
802 newsect->flags |= SEC_CODE;
803 }
804 if (!(hdr->p_flags & PF_W))
805 newsect->flags |= SEC_READONLY;
806 }
807
808 return true;
809}
810
32090b8e 811/* Begin processing a given object.
244ffee7 812
32090b8e
KR
813 First we validate the file by reading in the ELF header and checking
814 the magic number. */
815
816static INLINE boolean
1c6042ee
ILT
817elf_file_p (x_ehdrp)
818 Elf_External_Ehdr *x_ehdrp;
244ffee7 819{
32090b8e
KR
820 return ((x_ehdrp->e_ident[EI_MAG0] == ELFMAG0)
821 && (x_ehdrp->e_ident[EI_MAG1] == ELFMAG1)
822 && (x_ehdrp->e_ident[EI_MAG2] == ELFMAG2)
823 && (x_ehdrp->e_ident[EI_MAG3] == ELFMAG3));
824}
244ffee7 825
d24928c0
KR
826/* Check to see if the file associated with ABFD matches the target vector
827 that ABFD points to.
828
829 Note that we may be called several times with the same ABFD, but different
830 target vectors, most of which will not match. We have to avoid leaving
831 any side effects in ABFD, or any data it points to (like tdata), if the
832 file does not match the target vector.
833
834 FIXME: There is memory leak if we are called more than once with the same
835 ABFD, and that bfd already has tdata allocated, since we allocate more tdata
836 and the old tdata is orphaned. Since it's in the bfd obstack, there isn't
01383fb4 837 much we can do about this except possibly rewrite the code. There are
d24928c0
KR
838 also other bfd_allocs that may be the source of memory leaks as well. */
839
32090b8e 840bfd_target *
1c6042ee
ILT
841elf_object_p (abfd)
842 bfd *abfd;
244ffee7 843{
32090b8e
KR
844 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
845 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
846 Elf_External_Shdr x_shdr; /* Section header table entry, external form */
847 Elf_Internal_Shdr *i_shdrp; /* Section header table, internal form */
68241b2b 848 unsigned int shindex;
32090b8e 849 char *shstrtab; /* Internal copy of section header stringtab */
062189c6 850 struct elf_backend_data *ebd;
d24928c0 851 struct elf_obj_tdata *preserved_tdata = elf_tdata (abfd);
244ffee7 852
32090b8e
KR
853 /* Read in the ELF header in external format. */
854
855 if (bfd_read ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd) != sizeof (x_ehdr))
25057836
JL
856 {
857 if (bfd_get_error () != bfd_error_system_call)
858 goto got_wrong_format_error;
859 else
860 goto got_no_match;
861 }
244ffee7 862
32090b8e
KR
863 /* Now check to see if we have a valid ELF file, and one that BFD can
864 make use of. The magic number must match, the address size ('class')
865 and byte-swapping must match our XVEC entry, and it must have a
866 section header table (FIXME: See comments re sections at top of this
867 file). */
244ffee7 868
d24928c0
KR
869 if ((elf_file_p (&x_ehdr) == false) ||
870 (x_ehdr.e_ident[EI_VERSION] != EV_CURRENT) ||
871 (x_ehdr.e_ident[EI_CLASS] != ELFCLASS))
872 goto got_wrong_format_error;
244ffee7 873
d24928c0 874 /* Check that file's byte order matches xvec's */
32090b8e 875 switch (x_ehdr.e_ident[EI_DATA])
244ffee7 876 {
32090b8e
KR
877 case ELFDATA2MSB: /* Big-endian */
878 if (!abfd->xvec->header_byteorder_big_p)
d24928c0 879 goto got_wrong_format_error;
32090b8e
KR
880 break;
881 case ELFDATA2LSB: /* Little-endian */
882 if (abfd->xvec->header_byteorder_big_p)
d24928c0 883 goto got_wrong_format_error;
32090b8e
KR
884 break;
885 case ELFDATANONE: /* No data encoding specified */
886 default: /* Unknown data encoding specified */
d24928c0 887 goto got_wrong_format_error;
244ffee7 888 }
244ffee7 889
32090b8e 890 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
d24928c0 891 the tdata pointer in the bfd. FIXME: memory leak, see above. */
244ffee7 892
d24928c0
KR
893 elf_tdata (abfd) =
894 (struct elf_obj_tdata *) bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
895 if (elf_tdata (abfd) == NULL)
896 goto got_no_memory_error;
244ffee7 897
32090b8e
KR
898 /* Now that we know the byte order, swap in the rest of the header */
899 i_ehdrp = elf_elfheader (abfd);
900 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
901#if DEBUG & 1
902 elf_debug_file (i_ehdrp);
244ffee7
JK
903#endif
904
32090b8e
KR
905 /* If there is no section header table, we're hosed. */
906 if (i_ehdrp->e_shoff == 0)
d24928c0 907 goto got_wrong_format_error;
244ffee7 908
062189c6
ILT
909 /* As a simple sanity check, verify that the what BFD thinks is the
910 size of each section header table entry actually matches the size
911 recorded in the file. */
912 if (i_ehdrp->e_shentsize != sizeof (x_shdr))
913 goto got_wrong_format_error;
914
915 ebd = get_elf_backend_data (abfd);
916
917 /* Check that the ELF e_machine field matches what this particular
918 BFD format expects. */
919 if (ebd->elf_machine_code != i_ehdrp->e_machine)
920 {
921 bfd_target **target_ptr;
922
923 if (ebd->elf_machine_code != EM_NONE)
924 goto got_wrong_format_error;
925
926 /* This is the generic ELF target. Let it match any ELF target
927 for which we do not have a specific backend. */
f4bd7a8f 928 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
062189c6
ILT
929 {
930 struct elf_backend_data *back;
931
932 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
933 continue;
934 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
935 if (back->elf_machine_code == i_ehdrp->e_machine)
936 {
937 /* target_ptr is an ELF backend which matches this
938 object file, so reject the generic ELF target. */
939 goto got_wrong_format_error;
940 }
941 }
942 }
943
944
945 /* Set the flags and architecture before calling the backend so that
946 it can override them. */
7b8106b4 947 if (i_ehdrp->e_type == ET_EXEC)
32090b8e 948 abfd->flags |= EXEC_P;
7b8106b4
ILT
949 else if (i_ehdrp->e_type == ET_DYN)
950 abfd->flags |= DYNAMIC;
244ffee7 951
062189c6 952 bfd_default_set_arch_mach (abfd, ebd->arch, 0);
32090b8e 953
062189c6
ILT
954 /* Remember the entry point specified in the ELF file header. */
955 bfd_get_start_address (abfd) = i_ehdrp->e_entry;
32090b8e 956
062189c6
ILT
957 /* Let the backend double check the format and override global
958 information. */
959 if (ebd->elf_backend_object_p)
960 {
961 if ((*ebd->elf_backend_object_p) (abfd) == false)
962 goto got_wrong_format_error;
963 }
1c6042ee 964
32090b8e
KR
965 /* Allocate space for a copy of the section header table in
966 internal form, seek to the section header table in the file,
062189c6 967 read it in, and convert it to internal form. */
32090b8e
KR
968 i_shdrp = (Elf_Internal_Shdr *)
969 bfd_alloc (abfd, sizeof (*i_shdrp) * i_ehdrp->e_shnum);
300adb31
KR
970 elf_elfsections (abfd) =
971 (Elf_Internal_Shdr **) bfd_alloc (abfd, sizeof (i_shdrp) * i_ehdrp->e_shnum);
1c6042ee 972 if (!i_shdrp || !elf_elfsections (abfd))
d24928c0 973 goto got_no_memory_error;
32090b8e 974 if (bfd_seek (abfd, i_ehdrp->e_shoff, SEEK_SET) == -1)
25057836 975 goto got_no_match;
32090b8e 976 for (shindex = 0; shindex < i_ehdrp->e_shnum; shindex++)
244ffee7 977 {
d24928c0 978 if (bfd_read ((PTR) & x_shdr, sizeof x_shdr, 1, abfd) != sizeof (x_shdr))
25057836 979 goto got_no_match;
32090b8e 980 elf_swap_shdr_in (abfd, &x_shdr, i_shdrp + shindex);
1c6042ee 981 elf_elfsections (abfd)[shindex] = i_shdrp + shindex;
38a5f510
ILT
982
983 /* If this is a .dynamic section, mark the object file as being
984 dynamically linked. */
985 if (i_shdrp[shindex].sh_type == SHT_DYNAMIC)
986 abfd->flags |= DYNAMIC;
244ffee7 987 }
32090b8e 988 if (i_ehdrp->e_shstrndx)
244ffee7 989 {
32090b8e 990 bfd_section_from_shdr (abfd, i_ehdrp->e_shstrndx);
244ffee7
JK
991 }
992
32090b8e
KR
993 /* Read in the string table containing the names of the sections. We
994 will need the base pointer to this table later. */
995 /* We read this inline now, so that we don't have to go through
996 bfd_section_from_shdr with it (since this particular strtab is
997 used to find all of the ELF section names.) */
244ffee7 998
32090b8e
KR
999 shstrtab = elf_get_str_section (abfd, i_ehdrp->e_shstrndx);
1000 if (!shstrtab)
d24928c0 1001 goto got_wrong_format_error;
244ffee7 1002
32090b8e
KR
1003 /* Once all of the section headers have been read and converted, we
1004 can start processing them. Note that the first section header is
1005 a dummy placeholder entry, so we ignore it.
244ffee7 1006
32090b8e
KR
1007 We also watch for the symbol table section and remember the file
1008 offset and section size for both the symbol table section and the
1009 associated string table section. */
244ffee7 1010
32090b8e
KR
1011 for (shindex = 1; shindex < i_ehdrp->e_shnum; shindex++)
1012 {
1013 bfd_section_from_shdr (abfd, shindex);
1014 }
244ffee7 1015
d24928c0
KR
1016 return (abfd->xvec);
1017
1018 /* If we are going to use goto's to avoid duplicating error setting
1019 and return(NULL) code, then this at least makes it more maintainable. */
1020
1c6042ee 1021got_wrong_format_error:
d1ad85a6 1022 bfd_set_error (bfd_error_wrong_format);
d24928c0 1023 goto got_no_match;
1c6042ee 1024got_no_memory_error:
d1ad85a6 1025 bfd_set_error (bfd_error_no_memory);
d24928c0 1026 goto got_no_match;
1c6042ee 1027got_no_match:
d24928c0
KR
1028 elf_tdata (abfd) = preserved_tdata;
1029 return (NULL);
32090b8e 1030}
32090b8e 1031\f
1c6042ee 1032
32090b8e
KR
1033/* ELF .o/exec file writing */
1034
d24928c0
KR
1035/* Takes a bfd and a symbol, returns a pointer to the elf specific area
1036 of the symbol if there is one. */
32090b8e 1037static INLINE elf_symbol_type *
1c6042ee
ILT
1038elf_symbol_from (ignore_abfd, symbol)
1039 bfd *ignore_abfd;
1040 asymbol *symbol;
244ffee7 1041{
32090b8e
KR
1042 if (symbol->the_bfd->xvec->flavour != bfd_target_elf_flavour)
1043 return 0;
1044
1045 if (symbol->the_bfd->tdata.elf_obj_data == (struct elf_obj_tdata *) NULL)
1046 return 0;
1047
1048 return (elf_symbol_type *) symbol;
244ffee7
JK
1049}
1050
d24928c0 1051/* Create ELF output from BFD sections.
244ffee7 1052
d24928c0
KR
1053 Essentially, just create the section header and forget about the program
1054 header for now. */
244ffee7 1055
32090b8e 1056static void
1c6042ee
ILT
1057elf_make_sections (abfd, asect, obj)
1058 bfd *abfd;
1059 asection *asect;
1060 PTR obj;
32090b8e
KR
1061{
1062 /* most of what is in bfd_shdr_from_section goes in here... */
1063 /* and all of these sections generate at *least* one ELF section. */
32090b8e
KR
1064 Elf_Internal_Shdr *this_hdr;
1065 this_hdr = &elf_section_data (asect)->this_hdr;
244ffee7 1066
32090b8e
KR
1067 this_hdr->sh_addr = asect->vma;
1068 this_hdr->sh_size = asect->_raw_size;
1069 /* contents already set by elf_set_section_contents */
244ffee7 1070
300adb31 1071 if (asect->flags & SEC_RELOC)
244ffee7 1072 {
32090b8e
KR
1073 /* emit a reloc section, and thus strtab and symtab... */
1074 Elf_Internal_Shdr *rela_hdr;
32090b8e 1075 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
244ffee7 1076
32090b8e 1077 rela_hdr = &elf_section_data (asect)->rel_hdr;
244ffee7 1078
32090b8e
KR
1079 /* orelocation has the data, reloc_count has the count... */
1080 if (use_rela_p)
1081 {
1082 rela_hdr->sh_type = SHT_RELA;
1083 rela_hdr->sh_entsize = sizeof (Elf_External_Rela);
1084 }
1085 else
1086 /* REL relocations */
1087 {
1088 rela_hdr->sh_type = SHT_REL;
1089 rela_hdr->sh_entsize = sizeof (Elf_External_Rel);
1090 }
1091 rela_hdr->sh_flags = 0;
1092 rela_hdr->sh_addr = 0;
1093 rela_hdr->sh_offset = 0;
062189c6
ILT
1094
1095 /* FIXME: Systems I've checked use an alignment of 4, but it is
1096 possible that some systems use a different alignment. */
1097 rela_hdr->sh_addralign = 4;
1098
32090b8e
KR
1099 rela_hdr->size = 0;
1100 }
1101 if (asect->flags & SEC_ALLOC)
244ffee7 1102 {
32090b8e
KR
1103 this_hdr->sh_flags |= SHF_ALLOC;
1104 if (asect->flags & SEC_LOAD)
1105 {
1106 /* @@ Do something with sh_type? */
1107 }
244ffee7 1108 }
f035cc47
ILT
1109 else
1110 {
1111 /* If this section is not part of the program image during
1112 execution, leave the address fields at 0. */
1113 this_hdr->sh_addr = 0;
1114 asect->vma = 0;
1115 }
32090b8e
KR
1116 if (!(asect->flags & SEC_READONLY))
1117 this_hdr->sh_flags |= SHF_WRITE;
244ffee7 1118
32090b8e
KR
1119 if (asect->flags & SEC_CODE)
1120 this_hdr->sh_flags |= SHF_EXECINSTR;
1121}
244ffee7 1122
32090b8e
KR
1123void
1124write_relocs (abfd, sec, xxx)
1125 bfd *abfd;
1126 asection *sec;
1127 PTR xxx;
1128{
1129 Elf_Internal_Shdr *rela_hdr;
1130 Elf_External_Rela *outbound_relocas;
1131 Elf_External_Rel *outbound_relocs;
1132 int idx;
1133 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
300adb31 1134 asymbol *last_sym = 0;
38a5f510 1135 int last_sym_idx = 9999999; /* should always be written before use */
244ffee7 1136
32090b8e
KR
1137 if ((sec->flags & SEC_RELOC) == 0)
1138 return;
1139 /* Flags are sometimes inconsistent. */
1140 if (sec->reloc_count == 0)
1141 return;
244ffee7 1142
32090b8e 1143 rela_hdr = &elf_section_data (sec)->rel_hdr;
244ffee7 1144
32090b8e
KR
1145 rela_hdr->sh_size = rela_hdr->sh_entsize * sec->reloc_count;
1146 rela_hdr->contents = (void *) bfd_alloc (abfd, rela_hdr->sh_size);
9783e04a
DM
1147 if (!rela_hdr->contents)
1148 {
d1ad85a6 1149 bfd_set_error (bfd_error_no_memory);
1c6042ee 1150 abort (); /* FIXME */
9783e04a 1151 }
244ffee7 1152
32090b8e 1153 /* orelocation has the data, reloc_count has the count... */
300adb31
KR
1154 if (use_rela_p)
1155 {
1156 outbound_relocas = (Elf_External_Rela *) rela_hdr->contents;
1157
1158 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 1159 {
300adb31
KR
1160 Elf_Internal_Rela dst_rela;
1161 Elf_External_Rela *src_rela;
1162 arelent *ptr;
1163 asymbol *sym;
1164 int n;
1165
1166 ptr = sec->orelocation[idx];
1167 src_rela = outbound_relocas + idx;
1168 if (!(abfd->flags & EXEC_P))
1169 dst_rela.r_offset = ptr->address - sec->vma;
1170 else
1171 dst_rela.r_offset = ptr->address;
6a3eb9b6 1172
300adb31
KR
1173 sym = *ptr->sym_ptr_ptr;
1174 if (sym == last_sym)
1175 n = last_sym_idx;
1176 else
32090b8e 1177 {
300adb31
KR
1178 last_sym = sym;
1179 last_sym_idx = n = elf_symbol_from_bfd_symbol (abfd, &sym);
32090b8e 1180 }
300adb31
KR
1181 dst_rela.r_info = ELF_R_INFO (n, ptr->howto->type);
1182
1183 dst_rela.r_addend = ptr->addend;
1184 elf_swap_reloca_out (abfd, &dst_rela, src_rela);
244ffee7 1185 }
300adb31
KR
1186 }
1187 else
1188 /* REL relocations */
1189 {
1190 outbound_relocs = (Elf_External_Rel *) rela_hdr->contents;
1191
1192 for (idx = 0; idx < sec->reloc_count; idx++)
32090b8e 1193 {
300adb31
KR
1194 Elf_Internal_Rel dst_rel;
1195 Elf_External_Rel *src_rel;
1196 arelent *ptr;
1197 int n;
1198 asymbol *sym;
1199
1200 ptr = sec->orelocation[idx];
1201 sym = *ptr->sym_ptr_ptr;
1202 src_rel = outbound_relocs + idx;
1203 if (!(abfd->flags & EXEC_P))
1204 dst_rel.r_offset = ptr->address - sec->vma;
1205 else
1206 dst_rel.r_offset = ptr->address;
244ffee7 1207
300adb31
KR
1208 if (sym == last_sym)
1209 n = last_sym_idx;
1210 else
32090b8e 1211 {
300adb31
KR
1212 last_sym = sym;
1213 last_sym_idx = n = elf_symbol_from_bfd_symbol (abfd, &sym);
32090b8e 1214 }
300adb31
KR
1215 dst_rel.r_info = ELF_R_INFO (n, ptr->howto->type);
1216
1217 elf_swap_reloc_out (abfd, &dst_rel, src_rel);
32090b8e 1218 }
300adb31 1219 }
32090b8e 1220}
244ffee7 1221
32090b8e
KR
1222static void
1223fix_up_strtabs (abfd, asect, obj)
1224 bfd *abfd;
1225 asection *asect;
1226 PTR obj;
1227{
1228 Elf_Internal_Shdr *this_hdr = &elf_section_data (asect)->this_hdr;
1c6042ee 1229 int this_idx = elf_section_data (asect)->this_idx;
244ffee7 1230
32090b8e
KR
1231 /* @@ Check flags! */
1232 if (!strncmp (asect->name, ".stab", 5)
1233 && !strcmp ("str", asect->name + strlen (asect->name) - 3))
1234 {
1235 size_t len = strlen (asect->name) + 1;
80425e6c
JK
1236 char *s = (char *) malloc (len);
1237 if (s == NULL)
1238 /* FIXME: Should deal more gracefully with errors. */
1239 abort ();
32090b8e
KR
1240 strcpy (s, asect->name);
1241 s[len - 4] = 0;
1242 asect = bfd_get_section_by_name (abfd, s);
80425e6c 1243 free (s);
32090b8e
KR
1244 if (!asect)
1245 abort ();
1c6042ee 1246 elf_section_data (asect)->this_hdr.sh_link = this_idx;
32090b8e 1247 /* @@ Assuming 32 bits! */
1c6042ee 1248 elf_section_data (asect)->this_hdr.sh_entsize = 0xc;
01383fb4
KR
1249
1250 this_hdr->sh_type = SHT_STRTAB;
244ffee7 1251 }
32090b8e 1252}
244ffee7 1253
32090b8e 1254static void
1c6042ee
ILT
1255elf_fake_sections (abfd, asect, obj)
1256 bfd *abfd;
1257 asection *asect;
1258 PTR obj;
32090b8e
KR
1259{
1260 /* most of what is in bfd_shdr_from_section goes in here... */
1261 /* and all of these sections generate at *least* one ELF section. */
244ffee7 1262
32090b8e
KR
1263 Elf_Internal_Shdr *this_hdr;
1264 this_hdr = &elf_section_data (asect)->this_hdr;
1265 this_hdr->sh_name =
1266 bfd_add_to_strtab (abfd, elf_shstrtab (abfd), asect->name);
1267 /* We need to log the type *now* so that elf_section_from_bfd_section
1268 can find us... have to set rawdata too. */
1269 this_hdr->rawdata = (void *) asect;
1270 this_hdr->sh_addralign = 1 << asect->alignment_power;
1271 if ((asect->flags & SEC_ALLOC) && (asect->flags & SEC_LOAD))
1272 this_hdr->sh_type = SHT_PROGBITS;
e621c5cc
ILT
1273 else if ((asect->flags & SEC_ALLOC) && ((asect->flags & SEC_LOAD) == 0))
1274 {
6c35a16d
ILT
1275 BFD_ASSERT (strcmp (asect->name, ".bss") == 0
1276 || strcmp (asect->name, ".sbss") == 0);
e621c5cc
ILT
1277 this_hdr->sh_type = SHT_NOBITS;
1278 }
1279 /* FIXME I am not sure how to detect a .note section from the flags
1280 word of an `asection'. */
1281 else if (!strcmp (asect->name, ".note"))
1282 this_hdr->sh_type = SHT_NOTE;
32090b8e 1283 else
32090b8e
KR
1284 this_hdr->sh_type = SHT_PROGBITS;
1285
1286 this_hdr->sh_flags = 0;
1287 this_hdr->sh_addr = 0;
1288 this_hdr->sh_size = 0;
1289 this_hdr->sh_entsize = 0;
1290 this_hdr->sh_info = 0;
1291 this_hdr->sh_link = 0;
1292 this_hdr->sh_offset = 0;
1293 this_hdr->size = 0;
244ffee7 1294
f035cc47
ILT
1295 /* Now, check for processor-specific section types. */
1296 {
1297 struct elf_backend_data *bed = get_elf_backend_data (abfd);
1298
1299 if (bed->elf_backend_fake_sections)
1300 (*bed->elf_backend_fake_sections) (abfd, this_hdr, asect);
1301 }
1302
32090b8e
KR
1303 {
1304 /* Emit a strtab and symtab, and possibly a reloc section. */
1305 Elf_Internal_Shdr *rela_hdr;
244ffee7 1306
32090b8e
KR
1307 /* Note that only one symtab is used, so just remember it
1308 for now. */
244ffee7 1309
300adb31 1310 if (asect->flags & SEC_RELOC)
32090b8e
KR
1311 {
1312 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
244ffee7 1313
32090b8e
KR
1314 rela_hdr = &elf_section_data (asect)->rel_hdr;
1315 rela_hdr->sh_name =
1316 bfd_add_2_to_strtab (abfd, elf_shstrtab (abfd),
1317 use_rela_p ? ".rela" : ".rel",
1318 asect->name);
1319 rela_hdr->sh_type = use_rela_p ? SHT_RELA : SHT_REL;
1320 rela_hdr->sh_entsize = (use_rela_p
1321 ? sizeof (Elf_External_Rela)
1322 : sizeof (Elf_External_Rel));
1323
1324 rela_hdr->sh_flags = 0;
1325 rela_hdr->sh_addr = 0;
1326 rela_hdr->sh_size = 0;
1327 rela_hdr->sh_offset = 0;
062189c6
ILT
1328
1329 /* FIXME: Systems I've checked use an alignment of 4, but some
1330 systems may use a different alignment. */
1331 rela_hdr->sh_addralign = 4;
1332
32090b8e
KR
1333 rela_hdr->size = 0;
1334 }
1335 }
1336 if (asect->flags & SEC_ALLOC)
1337 {
1338 this_hdr->sh_flags |= SHF_ALLOC;
1339 if (asect->flags & SEC_LOAD)
1340 {
1341 /* @@ Do something with sh_type? */
1342 }
1343 }
1344 if (!(asect->flags & SEC_READONLY))
1345 this_hdr->sh_flags |= SHF_WRITE;
1346 if (asect->flags & SEC_CODE)
1347 this_hdr->sh_flags |= SHF_EXECINSTR;
244ffee7
JK
1348}
1349
32090b8e
KR
1350/* Map symbol from it's internal number to the external number, moving
1351 all local symbols to be at the head of the list. */
244ffee7 1352
32090b8e 1353static INLINE int
062189c6
ILT
1354sym_is_global (abfd, sym)
1355 bfd *abfd;
32090b8e
KR
1356 asymbol *sym;
1357{
062189c6
ILT
1358 /* If the backend has a special mapping, use it. */
1359 if (get_elf_backend_data (abfd)->elf_backend_sym_is_global)
1360 return ((*get_elf_backend_data (abfd)->elf_backend_sym_is_global)
1361 (abfd, sym));
1362
d24928c0 1363 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
244ffee7 1364 {
32090b8e
KR
1365 if (sym->flags & BSF_LOCAL)
1366 abort ();
1367 return 1;
244ffee7 1368 }
d24928c0
KR
1369 if (sym->section == 0)
1370 {
1371 /* Is this valid? */
1372 abort ();
1373
1374 return 1;
1375 }
32090b8e
KR
1376 if (sym->section == &bfd_und_section)
1377 return 1;
1378 if (bfd_is_com_section (sym->section))
1379 return 1;
1380 if (sym->flags & (BSF_LOCAL | BSF_SECTION_SYM | BSF_FILE))
1381 return 0;
1382 return 0;
1383}
244ffee7 1384
9783e04a 1385static boolean
1c6042ee
ILT
1386elf_map_symbols (abfd)
1387 bfd *abfd;
32090b8e
KR
1388{
1389 int symcount = bfd_get_symcount (abfd);
1390 asymbol **syms = bfd_get_outsymbols (abfd);
d24928c0 1391 asymbol **sect_syms;
32090b8e
KR
1392 int num_locals = 0;
1393 int num_globals = 0;
1394 int num_locals2 = 0;
1395 int num_globals2 = 0;
d24928c0 1396 int max_index = 0;
32090b8e 1397 int num_sections = 0;
d24928c0 1398 Elf_Sym_Extra *sym_extra;
32090b8e
KR
1399 int idx;
1400 asection *asect;
6a3eb9b6 1401
32090b8e
KR
1402#ifdef DEBUG
1403 fprintf (stderr, "elf_map_symbols\n");
1404 fflush (stderr);
1405#endif
244ffee7 1406
e621c5cc
ILT
1407 /* Add local symbols for each section for which there are relocs.
1408 FIXME: How can we tell which sections have relocs at this point?
1409 Will reloc_count always be accurate? Actually, I think most ELF
1410 targets create section symbols for all sections anyhow. */
32090b8e 1411 for (asect = abfd->sections; asect; asect = asect->next)
244ffee7 1412 {
d24928c0
KR
1413 if (max_index < asect->index)
1414 max_index = asect->index;
244ffee7
JK
1415 }
1416
d24928c0
KR
1417 max_index++;
1418 elf_num_section_syms (abfd) = max_index;
1419 sect_syms = (asymbol **) bfd_zalloc (abfd, max_index * sizeof (asymbol *));
1420 elf_section_syms (abfd) = sect_syms;
1421
5e829a34 1422 if (sect_syms == 0)
9783e04a 1423 {
d1ad85a6 1424 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
1425 return false;
1426 }
d24928c0
KR
1427
1428 for (asect = abfd->sections; asect; asect = asect->next)
e621c5cc
ILT
1429 {
1430 asymbol *sym = bfd_make_empty_symbol (abfd);
9783e04a
DM
1431 if (!sym)
1432 {
d1ad85a6 1433 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
1434 return false;
1435 }
e621c5cc
ILT
1436 sym->the_bfd = abfd;
1437 sym->name = asect->name;
1438 sym->value = asect->vma;
1439 sym->flags = BSF_SECTION_SYM;
1440 sym->section = asect;
1441 sect_syms[asect->index] = sym;
1442 num_sections++;
d24928c0 1443#ifdef DEBUG
e621c5cc
ILT
1444 fprintf (stderr,
1445 "creating section symbol, name = %s, value = 0x%.8lx, index = %d, section = 0x%.8lx\n",
1446 asect->name, (long) asect->vma, asect->index, (long) asect);
d24928c0 1447#endif
e621c5cc 1448 }
d24928c0 1449
32090b8e 1450 if (num_sections)
244ffee7 1451 {
32090b8e
KR
1452 if (syms)
1453 syms = (asymbol **) bfd_realloc (abfd, syms,
1454 ((symcount + num_sections + 1)
1455 * sizeof (asymbol *)));
1456 else
1457 syms = (asymbol **) bfd_alloc (abfd,
1c6042ee 1458 (num_sections + 1) * sizeof (asymbol *));
9783e04a
DM
1459 if (!syms)
1460 {
d1ad85a6 1461 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
1462 return false;
1463 }
244ffee7 1464
32090b8e
KR
1465 for (asect = abfd->sections; asect; asect = asect->next)
1466 {
d24928c0
KR
1467 if (sect_syms[asect->index])
1468 syms[symcount++] = sect_syms[asect->index];
32090b8e 1469 }
244ffee7 1470
32090b8e
KR
1471 syms[symcount] = (asymbol *) 0;
1472 bfd_set_symtab (abfd, syms, symcount);
1473 }
244ffee7 1474
d24928c0
KR
1475 elf_sym_extra (abfd) = sym_extra
1476 = (Elf_Sym_Extra *) bfd_alloc (abfd, symcount * sizeof (Elf_Sym_Extra));
9783e04a
DM
1477 if (!sym_extra)
1478 {
d1ad85a6 1479 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
1480 return false;
1481 }
244ffee7 1482
32090b8e
KR
1483 /* Identify and classify all of the symbols. */
1484 for (idx = 0; idx < symcount; idx++)
244ffee7 1485 {
062189c6 1486 if (!sym_is_global (abfd, syms[idx]))
32090b8e
KR
1487 num_locals++;
1488 else
1489 num_globals++;
244ffee7 1490 }
32090b8e
KR
1491
1492 /* Now provide mapping information. Add +1 for skipping over the
1493 dummy symbol. */
1494 for (idx = 0; idx < symcount; idx++)
244ffee7 1495 {
1c6042ee 1496 syms[idx]->udata = (PTR) & sym_extra[idx];
062189c6 1497 if (!sym_is_global (abfd, syms[idx]))
d24928c0 1498 sym_extra[idx].elf_sym_num = 1 + num_locals2++;
32090b8e 1499 else
d24928c0 1500 sym_extra[idx].elf_sym_num = 1 + num_locals + num_globals2++;
244ffee7
JK
1501 }
1502
32090b8e
KR
1503 elf_num_locals (abfd) = num_locals;
1504 elf_num_globals (abfd) = num_globals;
9783e04a 1505 return true;
32090b8e 1506}
244ffee7 1507
9783e04a
DM
1508static boolean assign_section_numbers ();
1509static boolean assign_file_positions_except_relocs ();
244ffee7 1510
32090b8e 1511static boolean
1c6042ee
ILT
1512elf_compute_section_file_positions (abfd)
1513 bfd *abfd;
32090b8e 1514{
32090b8e 1515 bfd_map_over_sections (abfd, elf_fake_sections, 0);
244ffee7 1516
9783e04a
DM
1517 if (!assign_section_numbers (abfd))
1518 return false;
244ffee7 1519
32090b8e 1520 bfd_map_over_sections (abfd, elf_make_sections, 0);
244ffee7 1521
1c6042ee 1522 bfd_map_over_sections (abfd, fix_up_strtabs, 0); /* .stab/.stabstr &c */
244ffee7 1523
b9d5cdf0
DM
1524 if (swap_out_syms (abfd) == false)
1525 return false;
244ffee7 1526
9783e04a
DM
1527 if (!assign_file_positions_except_relocs (abfd))
1528 return false;
32090b8e
KR
1529
1530 return true;
1531}
1532
1533static boolean
1c6042ee
ILT
1534elf_write_phdrs (abfd, i_ehdrp, i_phdrp, phdr_cnt)
1535 bfd *abfd;
1536 Elf_Internal_Ehdr *i_ehdrp;
1537 Elf_Internal_Phdr *i_phdrp;
1538 unsigned short phdr_cnt;
244ffee7 1539{
32090b8e 1540 /* first program header entry goes after the file header */
300adb31 1541 int outbase = i_ehdrp->e_phoff;
68241b2b 1542 unsigned int i;
32090b8e
KR
1543 Elf_External_Phdr x_phdr;
1544
1545 for (i = 0; i < phdr_cnt; i++)
244ffee7 1546 {
32090b8e
KR
1547 elf_swap_phdr_out (abfd, i_phdrp + i, &x_phdr);
1548 bfd_seek (abfd, outbase, SEEK_SET);
1549 bfd_write ((PTR) & x_phdr, sizeof (x_phdr), 1, abfd);
1550 outbase += sizeof (x_phdr);
244ffee7 1551 }
32090b8e
KR
1552
1553 return true;
244ffee7
JK
1554}
1555
32090b8e
KR
1556static const Elf_Internal_Shdr null_shdr;
1557
1558/* Assign all ELF section numbers. The dummy first section is handled here
1559 too. The link/info pointers for the standard section types are filled
1560 in here too, while we're at it. (Link pointers for .stab sections are
1561 not filled in here.) */
9783e04a 1562static boolean
32090b8e 1563assign_section_numbers (abfd)
fce36137 1564 bfd *abfd;
fce36137 1565{
32090b8e
KR
1566 struct elf_obj_tdata *t = elf_tdata (abfd);
1567 asection *sec;
1568 int section_number = 1;
1569 int i;
1570 Elf_Internal_Shdr **i_shdrp;
244ffee7 1571
1c6042ee
ILT
1572 t->shstrtab_hdr.sh_size = elf_shstrtab (abfd)->length;
1573 t->shstrtab_hdr.contents = (void *) elf_shstrtab (abfd)->tab;
32090b8e 1574 shstrtab_length_fixed = 1;
244ffee7 1575
32090b8e 1576 t->shstrtab_section = section_number++;
1c6042ee 1577 elf_elfheader (abfd)->e_shstrndx = t->shstrtab_section;
32090b8e
KR
1578 if (abfd->symcount)
1579 {
1580 t->symtab_section = section_number++;
1581 t->strtab_section = section_number++;
1582 t->symtab_hdr.sh_link = t->strtab_section;
1583 }
1584 for (sec = abfd->sections; sec; sec = sec->next)
1585 {
1586 struct bfd_elf_section_data *d = elf_section_data (sec);
1587 d->this_idx = section_number++;
300adb31 1588 if (sec->flags & SEC_RELOC)
fce36137 1589 {
32090b8e
KR
1590 d->rel_idx = section_number++;
1591 d->rel_hdr.sh_link = t->symtab_section;
1592 d->rel_hdr.sh_info = d->this_idx;
244ffee7 1593 }
fce36137 1594 else
32090b8e
KR
1595 d->rel_idx = 0;
1596 /* No handling for per-section string tables currently. */
1597 }
1c6042ee 1598 elf_elfheader (abfd)->e_shnum = section_number;
32090b8e
KR
1599
1600 /* Set up the list of section header pointers, in agreement with the
1601 indices. */
300adb31
KR
1602 i_shdrp = (Elf_Internal_Shdr **)
1603 bfd_alloc (abfd, section_number * sizeof (Elf_Internal_Shdr *));
9783e04a
DM
1604 if (!i_shdrp)
1605 {
d1ad85a6 1606 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
1607 return false;
1608 }
1c6042ee 1609 elf_elfsections (abfd) = i_shdrp;
32090b8e
KR
1610 for (i = 0; i < section_number; i++)
1611 i_shdrp[i] = 0;
1612
1c6042ee 1613 i_shdrp[0] = (Elf_Internal_Shdr *) & null_shdr;
32090b8e
KR
1614 i_shdrp[t->shstrtab_section] = &t->shstrtab_hdr;
1615 if (abfd->symcount)
1616 {
1617 i_shdrp[t->symtab_section] = &t->symtab_hdr;
1618 i_shdrp[t->strtab_section] = &t->strtab_hdr;
244ffee7 1619 }
32090b8e
KR
1620 for (sec = abfd->sections; sec; sec = sec->next)
1621 {
1622 struct bfd_elf_section_data *d = elf_section_data (sec);
1623 i_shdrp[d->this_idx] = &d->this_hdr;
1624 if (d->rel_idx)
1625 i_shdrp[d->rel_idx] = &d->rel_hdr;
1626 }
1627 /* Make sure we got everything.... */
1628 for (i = 0; i < section_number; i++)
1629 if (i_shdrp[i] == 0)
1630 abort ();
9783e04a 1631 return true;
32090b8e
KR
1632}
1633
1634static INLINE file_ptr
1635assign_file_position_for_section (i_shdrp, offset)
1636 Elf_Internal_Shdr *i_shdrp;
1637 file_ptr offset;
1638{
f035cc47
ILT
1639 int align;
1640
1641 if (i_shdrp->sh_addralign != 0)
1642 align = i_shdrp->sh_addralign;
1643 else
1644 align = 1;
1645 i_shdrp->sh_offset = offset = BFD_ALIGN (offset, align);
7b8106b4
ILT
1646 if (i_shdrp->rawdata != NULL)
1647 ((asection *) i_shdrp->rawdata)->filepos = offset;
300adb31
KR
1648 if (i_shdrp->sh_type != SHT_NOBITS)
1649 offset += i_shdrp->sh_size;
32090b8e 1650 return offset;
244ffee7
JK
1651}
1652
01383fb4
KR
1653static INLINE file_ptr
1654align_file_position (off)
1655 file_ptr off;
1656{
f035cc47 1657 return (off + FILE_ALIGN - 1) & ~(FILE_ALIGN - 1);
01383fb4
KR
1658}
1659
300adb31
KR
1660static INLINE file_ptr
1661assign_file_positions_for_symtab_and_strtabs (abfd, off)
1662 bfd *abfd;
1663 file_ptr off;
1664{
1665 struct elf_obj_tdata *t = elf_tdata (abfd);
1666
01383fb4 1667 off = align_file_position (off);
300adb31 1668 off = assign_file_position_for_section (&t->symtab_hdr, off);
01383fb4 1669 off = assign_file_position_for_section (&t->shstrtab_hdr, off);
300adb31
KR
1670 off = assign_file_position_for_section (&t->strtab_hdr, off);
1671 return off;
1672}
1673
1c6042ee
ILT
1674struct seg_info
1675{
300adb31
KR
1676 bfd_vma low, mem_size;
1677 file_ptr file_size;
1678 int start_pos;
1679 int sh_flags;
1680 struct seg_info *next;
1681};
1682
9783e04a 1683static boolean
300adb31
KR
1684map_program_segments (abfd)
1685 bfd *abfd;
1686{
1687 Elf_Internal_Shdr **i_shdrpp = elf_elfsections (abfd);
1688 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
1689 Elf_Internal_Shdr *i_shdrp;
1690 Elf_Internal_Phdr *phdr;
80425e6c 1691 char *done = NULL;
68241b2b 1692 unsigned int i, n_left = 0;
300adb31 1693 file_ptr lowest_offset = 0;
2f3189e7 1694 struct seg_info *seg = NULL;
300adb31 1695
80425e6c 1696 done = (char *) malloc (i_ehdrp->e_shnum);
25057836 1697 if (done == NULL && i_ehdrp->e_shnum != 0)
80425e6c
JK
1698 {
1699 bfd_set_error (bfd_error_no_memory);
1700 goto error_return;
1701 }
300adb31 1702 memset (done, 0, i_ehdrp->e_shnum);
062189c6 1703 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1704 {
1705 i_shdrp = i_shdrpp[i];
1706 /* If it's going to be mapped in, it's been assigned a position. */
1707 if (i_shdrp->sh_offset + 1 == 0)
1708 {
1709 /* Well, not really, but we won't process it here. */
1710 done[i] = 1;
1711 continue;
1712 }
1713 if (i_shdrp->sh_offset < lowest_offset
1714 || lowest_offset == 0)
1715 lowest_offset = i_shdrp->sh_offset;
1716 /* Only interested in PROGBITS or NOBITS for generating segments. */
1717 switch (i_shdrp->sh_type)
1718 {
1719 case SHT_PROGBITS:
1720 case SHT_NOBITS:
1721 break;
1722 default:
1723 done[i] = 1;
1724 }
1725 if (!done[i])
1726 n_left++;
1727 }
1728 while (n_left)
1729 {
1730 bfd_vma lowest_vma = -1, high;
1731 int low_sec = 0;
1732 int mem_size;
1733 int file_size = 0;
2f3189e7
ILT
1734 struct seg_info *snew;
1735 struct seg_info **s_ptr;
300adb31
KR
1736
1737 for (i = 1; i < i_ehdrp->e_shnum; i++)
1738 {
1739 i_shdrp = i_shdrpp[i];
1740 if (!done[i] && i_shdrp->sh_addr < lowest_vma)
1741 {
1742 lowest_vma = i_shdrp->sh_addr;
1743 low_sec = i;
1744 }
1745 }
1746 if (low_sec == 0)
1747 abort ();
1748 /* So now we know the lowest vma of any unassigned sections; start
1749 a segment there. */
2f3189e7
ILT
1750 snew = (struct seg_info *) bfd_alloc (abfd, sizeof (struct seg_info));
1751 if (!snew)
1752 {
1753 bfd_set_error (bfd_error_no_memory);
80425e6c 1754 goto error_return;
2f3189e7
ILT
1755 }
1756 s_ptr = &seg;
1757 while (*s_ptr != (struct seg_info *) NULL)
1758 s_ptr = &(*s_ptr)->next;
1759 *s_ptr = snew;
1760 snew->next = NULL;
1761 snew->low = lowest_vma;
300adb31 1762 i_shdrp = i_shdrpp[low_sec];
2f3189e7
ILT
1763 snew->start_pos = i_shdrp->sh_offset;
1764 snew->sh_flags = i_shdrp->sh_flags;
300adb31
KR
1765 done[low_sec] = 1, n_left--;
1766 mem_size = i_shdrp->sh_size;
1767 high = lowest_vma + i_shdrp->sh_size;
1768
1769 if (i_shdrp->sh_type == SHT_PROGBITS)
1770 file_size = i_shdrp->sh_size;
1771
062189c6 1772 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1773 {
1774 file_ptr f1;
1775
300adb31
KR
1776 if (done[i])
1777 continue;
1778 i_shdrp = i_shdrpp[i];
1779 /* position of next byte on disk */
2f3189e7 1780 f1 = snew->start_pos + file_size;
300adb31
KR
1781 if (i_shdrp->sh_type == SHT_PROGBITS)
1782 {
1783 if (i_shdrp->sh_offset - f1 != i_shdrp->sh_addr - high)
1784 continue;
6c35a16d
ILT
1785 if (file_size != mem_size)
1786 break;
300adb31 1787 }
1c6042ee
ILT
1788 else
1789 /* sh_type == NOBITS */
300adb31
KR
1790 {
1791 /* If the section in question has no contents in the disk
1792 file, we really don't care where it supposedly starts.
1793 But we don't want to bother merging it into this segment
1794 if it doesn't start on this memory page. */
1795 bfd_vma page1, page2;
1796 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
1797
2f3189e7 1798 /* page number in address space of current end of snew */
300adb31
KR
1799 page1 = (high - 1 + maxpagesize - 1) / maxpagesize;
1800 /* page number in address space of start of this section */
1801 page2 = (i_shdrp->sh_addr + maxpagesize - 1) / maxpagesize;
1802
1803 if (page1 != page2)
1804 continue;
1805 }
1806 done[i] = 1, n_left--;
1807 if (i_shdrp->sh_type == SHT_PROGBITS)
2f3189e7
ILT
1808 file_size = i_shdrp->sh_offset + i_shdrp->sh_size - snew->start_pos;
1809 mem_size = i_shdrp->sh_addr + i_shdrp->sh_size - snew->low;
300adb31
KR
1810 high = i_shdrp->sh_addr + i_shdrp->sh_size;
1811 i = 0;
1812 }
2f3189e7
ILT
1813 snew->file_size = file_size;
1814 snew->mem_size = mem_size;
300adb31
KR
1815 }
1816 /* Now do something with the list of segments we've built up. */
1817 {
1818 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
1819 struct seg_info *s;
1820 int n_segs = 0;
1821 int sz;
1822
1823 for (s = seg; s; s = s->next)
1824 {
1825 n_segs++;
1826 }
1827 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr);
1828 sz = sizeof (Elf_External_Phdr) * n_segs;
01383fb4
KR
1829 if (align_file_position (i_ehdrp->e_ehsize) + sz <= lowest_offset)
1830 i_ehdrp->e_phoff = align_file_position (i_ehdrp->e_ehsize);
300adb31
KR
1831 else
1832 {
01383fb4
KR
1833 i_ehdrp->e_phoff = align_file_position (elf_tdata (abfd)->next_file_pos);
1834 elf_tdata (abfd)->next_file_pos = i_ehdrp->e_phoff + sz;
300adb31 1835 }
1c6042ee
ILT
1836 phdr = (Elf_Internal_Phdr *) bfd_alloc (abfd,
1837 n_segs * sizeof (Elf_Internal_Phdr));
9783e04a
DM
1838 if (!phdr)
1839 {
d1ad85a6 1840 bfd_set_error (bfd_error_no_memory);
1c6042ee 1841 abort (); /* FIXME */
9783e04a 1842 }
300adb31
KR
1843 elf_tdata (abfd)->phdr = phdr;
1844 while (seg)
1845 {
1846 phdr->p_type = PT_LOAD; /* only type we really support so far */
1847 phdr->p_offset = seg->start_pos;
1848 phdr->p_vaddr = seg->low;
1849 phdr->p_paddr = 0;
1850 phdr->p_filesz = seg->file_size;
1851 phdr->p_memsz = seg->mem_size;
1852 phdr->p_flags = PF_R;
1c6042ee 1853 phdr->p_align = maxpagesize; /* ? */
300adb31 1854 if (seg->sh_flags & SHF_WRITE)
e621c5cc
ILT
1855 /* SysVr4 ELF docs say "data segments normally have read, write,
1856 and execute permissions." */
1857 phdr->p_flags |= (PF_W | PF_X);
300adb31
KR
1858 if (seg->sh_flags & SHF_EXECINSTR)
1859 phdr->p_flags |= PF_X;
1860 phdr++;
1861 seg = seg->next;
1862 }
1863 i_ehdrp->e_phnum = n_segs;
1864 }
1865 elf_write_phdrs (abfd, i_ehdrp, elf_tdata (abfd)->phdr, i_ehdrp->e_phnum);
80425e6c
JK
1866 if (done != NULL)
1867 free (done);
9783e04a 1868 return true;
1c6042ee 1869error_return:
80425e6c
JK
1870 if (done != NULL)
1871 free (done);
1872 return false;
300adb31
KR
1873}
1874
9783e04a 1875static boolean
32090b8e
KR
1876assign_file_positions_except_relocs (abfd)
1877 bfd *abfd;
244ffee7 1878{
32090b8e
KR
1879 /* For now, we ignore the possibility of having program segments, which
1880 may require some alignment in the file. That'll require padding, and
1881 some interesting calculations to optimize file space usage.
244ffee7 1882
32090b8e
KR
1883 Also, since the application may change the list of relocations for
1884 a given section, we don't figure them in here. We'll put them at the
1885 end of the file, at positions computed during bfd_close.
244ffee7 1886
300adb31
KR
1887 The order, for now: <ehdr> <shdr> <sec1> <sec2> <sec3> ... <rel1> ...
1888 or: <ehdr> <phdr> <sec1> <sec2> ... <shdr> <rel1> ... */
32090b8e 1889
062189c6 1890 struct elf_obj_tdata *t = elf_tdata (abfd);
32090b8e 1891 file_ptr off;
68241b2b 1892 unsigned int i;
32090b8e
KR
1893 Elf_Internal_Shdr **i_shdrpp = elf_elfsections (abfd);
1894 Elf_Internal_Shdr *i_shdrp;
1895 Elf_Internal_Ehdr *i_ehdrp = elf_elfheader (abfd);
300adb31 1896 int exec_p = (abfd->flags & EXEC_P) != 0;
6c35a16d 1897 bfd_vma maxpagesize = get_elf_backend_data (abfd)->maxpagesize;
32090b8e 1898
300adb31 1899 /* Everything starts after the ELF file header. */
32090b8e 1900 off = i_ehdrp->e_ehsize;
300adb31
KR
1901
1902 if (!exec_p)
1903 {
1904 /* Section headers. */
01383fb4 1905 off = align_file_position (off);
300adb31
KR
1906 i_ehdrp->e_shoff = off;
1907 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
300adb31
KR
1908 off = assign_file_positions_for_symtab_and_strtabs (abfd, off);
1909 }
062189c6 1910 for (i = 1; i < i_ehdrp->e_shnum; i++)
32090b8e 1911 {
062189c6
ILT
1912 /* The symtab and strtab sections are placed by
1913 assign_file_positions_for_symtab_and_strtabs. */
1914 if (i == t->symtab_section
1915 || i == t->strtab_section
1916 || i == t->shstrtab_section)
1917 continue;
1918
32090b8e
KR
1919 i_shdrp = i_shdrpp[i];
1920 if (i_shdrp->sh_type == SHT_REL || i_shdrp->sh_type == SHT_RELA)
244ffee7 1921 {
32090b8e
KR
1922 i_shdrp->sh_offset = -1;
1923 continue;
244ffee7 1924 }
300adb31
KR
1925 if (exec_p)
1926 {
300adb31
KR
1927 if (maxpagesize == 0)
1928 maxpagesize = 1; /* make the arithmetic work */
1929 /* This isn't necessarily going to give the best packing, if the
1930 segments require padding between them, but since that isn't
1931 usually the case, this'll do. */
1932 if ((i_shdrp->sh_flags & SHF_ALLOC) == 0)
1933 {
1934 i_shdrp->sh_offset = -1;
1935 continue;
1936 }
1937 /* Blindly assume that the segments are ordered optimally. With
1938 the default LD script, they will be. */
6c35a16d 1939 if (i_shdrp->sh_type != SHT_NOBITS)
300adb31 1940 {
6c35a16d
ILT
1941 /* need big unsigned type */
1942 bfd_vma addtl_off;
1943 addtl_off = i_shdrp->sh_addr - off;
1944 addtl_off = addtl_off % maxpagesize;
1945 if (addtl_off)
1946 {
1947 off += addtl_off;
1948 }
300adb31
KR
1949 }
1950 }
32090b8e 1951 off = assign_file_position_for_section (i_shdrp, off);
01383fb4 1952
6c35a16d
ILT
1953 if (exec_p
1954 && i_shdrp->sh_type == SHT_NOBITS
1955 && (i == i_ehdrp->e_shnum
1956 || i_shdrpp[i + 1]->sh_type != SHT_NOBITS))
1957 {
1958 /* Skip to the next page to ensure that when the file is
1959 loaded the bss section is loaded with zeroes. I don't
1960 know if this is required on all platforms, but it
1961 shouldn't really hurt. */
1962 off = BFD_ALIGN (off, maxpagesize);
1963 }
1964
300adb31 1965 if (exec_p
1c6042ee 1966 && get_elf_backend_data (abfd)->maxpagesize > 1
300adb31
KR
1967 && i_shdrp->sh_type == SHT_PROGBITS
1968 && (i_shdrp->sh_flags & SHF_ALLOC)
01383fb4 1969 && (i_shdrp->sh_offset - i_shdrp->sh_addr) % get_elf_backend_data (abfd)->maxpagesize != 0)
300adb31
KR
1970 abort ();
1971 }
1972 if (exec_p)
1973 {
1974 elf_tdata (abfd)->next_file_pos = off;
9783e04a
DM
1975 if (!map_program_segments (abfd))
1976 return false;
300adb31
KR
1977 off = elf_tdata (abfd)->next_file_pos;
1978
1979 /* Section headers. */
01383fb4 1980 off = align_file_position (off);
300adb31
KR
1981 i_ehdrp->e_shoff = off;
1982 off += i_ehdrp->e_shnum * i_ehdrp->e_shentsize;
1983
1984 off = assign_file_positions_for_symtab_and_strtabs (abfd, off);
1985
062189c6 1986 for (i = 1; i < i_ehdrp->e_shnum; i++)
300adb31
KR
1987 {
1988 i_shdrp = i_shdrpp[i];
1989 if (i_shdrp->sh_offset + 1 == 0
1990 && i_shdrp->sh_type != SHT_REL
1991 && i_shdrp->sh_type != SHT_RELA)
1992 off = assign_file_position_for_section (i_shdrp, off);
1993 }
244ffee7 1994 }
32090b8e 1995 elf_tdata (abfd)->next_file_pos = off;
9783e04a 1996 return true;
244ffee7
JK
1997}
1998
32090b8e
KR
1999static boolean
2000prep_headers (abfd)
2001 bfd *abfd;
2002{
32090b8e 2003 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
1c6042ee 2004 Elf_Internal_Phdr *i_phdrp = 0; /* Program header table, internal form */
32090b8e 2005 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
32090b8e 2006 int count;
32090b8e 2007 struct strtab *shstrtab;
244ffee7 2008
32090b8e
KR
2009 i_ehdrp = elf_elfheader (abfd);
2010 i_shdrp = elf_elfsections (abfd);
244ffee7 2011
32090b8e 2012 shstrtab = bfd_new_strtab (abfd);
b9d5cdf0
DM
2013 if (!shstrtab)
2014 return false;
1c6042ee 2015
32090b8e 2016 elf_shstrtab (abfd) = shstrtab;
244ffee7 2017
32090b8e
KR
2018 i_ehdrp->e_ident[EI_MAG0] = ELFMAG0;
2019 i_ehdrp->e_ident[EI_MAG1] = ELFMAG1;
2020 i_ehdrp->e_ident[EI_MAG2] = ELFMAG2;
2021 i_ehdrp->e_ident[EI_MAG3] = ELFMAG3;
244ffee7 2022
32090b8e
KR
2023 i_ehdrp->e_ident[EI_CLASS] = ELFCLASS;
2024 i_ehdrp->e_ident[EI_DATA] =
2025 abfd->xvec->byteorder_big_p ? ELFDATA2MSB : ELFDATA2LSB;
2026 i_ehdrp->e_ident[EI_VERSION] = EV_CURRENT;
244ffee7 2027
32090b8e
KR
2028 for (count = EI_PAD; count < EI_NIDENT; count++)
2029 i_ehdrp->e_ident[count] = 0;
244ffee7 2030
32090b8e
KR
2031 i_ehdrp->e_type = (abfd->flags & EXEC_P) ? ET_EXEC : ET_REL;
2032 switch (bfd_get_arch (abfd))
fce36137 2033 {
32090b8e
KR
2034 case bfd_arch_unknown:
2035 i_ehdrp->e_machine = EM_NONE;
2036 break;
2037 case bfd_arch_sparc:
2038 i_ehdrp->e_machine = EM_SPARC;
2039 /* start-sanitize-v9 */
2040#if ARCH_SIZE == 64
2041 i_ehdrp->e_machine = EM_SPARC64;
2042#endif
2043 /* end-sanitize-v9 */
2044 break;
2045 case bfd_arch_i386:
2046 i_ehdrp->e_machine = EM_386;
2047 break;
2048 case bfd_arch_m68k:
2049 i_ehdrp->e_machine = EM_68K;
2050 break;
2051 case bfd_arch_m88k:
2052 i_ehdrp->e_machine = EM_88K;
2053 break;
2054 case bfd_arch_i860:
2055 i_ehdrp->e_machine = EM_860;
2056 break;
2057 case bfd_arch_mips: /* MIPS Rxxxx */
2058 i_ehdrp->e_machine = EM_MIPS; /* only MIPS R3000 */
2059 break;
2060 case bfd_arch_hppa:
2061 i_ehdrp->e_machine = EM_HPPA;
2062 break;
99ec1f66
ILT
2063 case bfd_arch_powerpc:
2064 i_ehdrp->e_machine = EM_CYGNUS_POWERPC;
2065 break;
32090b8e
KR
2066 /* also note that EM_M32, AT&T WE32100 is unknown to bfd */
2067 default:
2068 i_ehdrp->e_machine = EM_NONE;
fce36137 2069 }
32090b8e
KR
2070 i_ehdrp->e_version = EV_CURRENT;
2071 i_ehdrp->e_ehsize = sizeof (Elf_External_Ehdr);
244ffee7 2072
32090b8e
KR
2073 /* no program header, for now. */
2074 i_ehdrp->e_phoff = 0;
2075 i_ehdrp->e_phentsize = 0;
2076 i_ehdrp->e_phnum = 0;
244ffee7 2077
32090b8e
KR
2078 /* each bfd section is section header entry */
2079 i_ehdrp->e_entry = bfd_get_start_address (abfd);
2080 i_ehdrp->e_shentsize = sizeof (Elf_External_Shdr);
244ffee7 2081
32090b8e
KR
2082 /* if we're building an executable, we'll need a program header table */
2083 if (abfd->flags & EXEC_P)
244ffee7 2084 {
300adb31 2085 /* it all happens later */
32090b8e
KR
2086#if 0
2087 i_ehdrp->e_phentsize = sizeof (Elf_External_Phdr);
244ffee7 2088
32090b8e
KR
2089 /* elf_build_phdrs() returns a (NULL-terminated) array of
2090 Elf_Internal_Phdrs */
2091 i_phdrp = elf_build_phdrs (abfd, i_ehdrp, i_shdrp, &i_ehdrp->e_phnum);
2092 i_ehdrp->e_phoff = outbase;
2093 outbase += i_ehdrp->e_phentsize * i_ehdrp->e_phnum;
2094#endif
244ffee7 2095 }
32090b8e 2096 else
244ffee7 2097 {
32090b8e
KR
2098 i_ehdrp->e_phentsize = 0;
2099 i_phdrp = 0;
2100 i_ehdrp->e_phoff = 0;
244ffee7
JK
2101 }
2102
32090b8e
KR
2103 elf_tdata (abfd)->symtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2104 ".symtab");
2105 elf_tdata (abfd)->strtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2106 ".strtab");
2107 elf_tdata (abfd)->shstrtab_hdr.sh_name = bfd_add_to_strtab (abfd, shstrtab,
2108 ".shstrtab");
f035cc47 2109 return true;
244ffee7
JK
2110}
2111
b9d5cdf0 2112static boolean
32090b8e
KR
2113swap_out_syms (abfd)
2114 bfd *abfd;
244ffee7 2115{
9783e04a
DM
2116 if (!elf_map_symbols (abfd))
2117 return false;
244ffee7 2118
32090b8e
KR
2119 /* Dump out the symtabs. */
2120 {
2121 int symcount = bfd_get_symcount (abfd);
2122 asymbol **syms = bfd_get_outsymbols (abfd);
2123 struct strtab *stt = bfd_new_strtab (abfd);
2124 Elf_Internal_Shdr *symtab_hdr;
2125 Elf_Internal_Shdr *symstrtab_hdr;
2126 Elf_External_Sym *outbound_syms;
2127 int idx;
244ffee7 2128
b9d5cdf0
DM
2129 if (!stt)
2130 return false;
32090b8e
KR
2131 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2132 symtab_hdr->sh_type = SHT_SYMTAB;
2133 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
2134 symtab_hdr->sh_size = symtab_hdr->sh_entsize * (symcount + 1);
2135 symtab_hdr->sh_info = elf_num_locals (abfd) + 1;
244ffee7 2136
062189c6
ILT
2137 /* FIXME: Systems I've checked use 4 byte alignment for .symtab,
2138 but it is possible that there are systems which use a different
2139 alignment. */
2140 symtab_hdr->sh_addralign = 4;
2141
32090b8e
KR
2142 /* see assert in elf_fake_sections that supports this: */
2143 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
2144 symstrtab_hdr->sh_type = SHT_STRTAB;
244ffee7 2145
32090b8e
KR
2146 outbound_syms = (Elf_External_Sym *)
2147 bfd_alloc (abfd, (1 + symcount) * sizeof (Elf_External_Sym));
9783e04a
DM
2148 if (!outbound_syms)
2149 {
d1ad85a6 2150 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
2151 return false;
2152 }
32090b8e
KR
2153 /* now generate the data (for "contents") */
2154 {
2155 /* Fill in zeroth symbol and swap it out. */
2156 Elf_Internal_Sym sym;
2157 sym.st_name = 0;
2158 sym.st_value = 0;
2159 sym.st_size = 0;
2160 sym.st_info = 0;
2161 sym.st_other = 0;
2162 sym.st_shndx = SHN_UNDEF;
2163 elf_swap_symbol_out (abfd, &sym, outbound_syms);
244ffee7 2164 }
32090b8e
KR
2165 for (idx = 0; idx < symcount; idx++)
2166 {
2167 Elf_Internal_Sym sym;
2168 bfd_vma value = syms[idx]->value;
244ffee7 2169
32090b8e
KR
2170 if (syms[idx]->flags & BSF_SECTION_SYM)
2171 /* Section symbols have no names. */
2172 sym.st_name = 0;
2173 else
2174 sym.st_name = bfd_add_to_strtab (abfd, stt, syms[idx]->name);
244ffee7 2175
32090b8e 2176 if (bfd_is_com_section (syms[idx]->section))
244ffee7 2177 {
32090b8e
KR
2178 /* ELF common symbols put the alignment into the `value' field,
2179 and the size into the `size' field. This is backwards from
2180 how BFD handles it, so reverse it here. */
2181 sym.st_size = value;
2182 /* Should retrieve this from somewhere... */
2183 sym.st_value = 16;
d4fb8fce
ILT
2184 sym.st_shndx = elf_section_from_bfd_section (abfd,
2185 syms[idx]->section);
244ffee7
JK
2186 }
2187 else
2188 {
32090b8e 2189 asection *sec = syms[idx]->section;
e74034d8 2190 elf_symbol_type *type_ptr;
32090b8e 2191 int shndx;
244ffee7 2192
32090b8e
KR
2193 if (sec->output_section)
2194 {
2195 value += sec->output_offset;
2196 sec = sec->output_section;
2197 }
2198 value += sec->vma;
2199 sym.st_value = value;
e74034d8
KR
2200 type_ptr = elf_symbol_from (abfd, syms[idx]);
2201 sym.st_size = type_ptr ? type_ptr->internal_elf_sym.st_size : 0;
32090b8e
KR
2202 sym.st_shndx = shndx = elf_section_from_bfd_section (abfd, sec);
2203 if (shndx == -1)
2204 {
2205 asection *sec2;
2206 /* Writing this would be a hell of a lot easier if we had
2207 some decent documentation on bfd, and knew what to expect
2208 of the library, and what to demand of applications. For
2209 example, it appears that `objcopy' might not set the
2210 section of a symbol to be a section that is actually in
2211 the output file. */
2212 sec2 = bfd_get_section_by_name (abfd, sec->name);
850584ad 2213 BFD_ASSERT (sec2 != 0);
32090b8e 2214 sym.st_shndx = shndx = elf_section_from_bfd_section (abfd, sec2);
850584ad 2215 BFD_ASSERT (shndx != -1);
32090b8e
KR
2216 }
2217 }
244ffee7 2218
32090b8e 2219 if (bfd_is_com_section (syms[idx]->section))
38a5f510 2220 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_OBJECT);
32090b8e
KR
2221 else if (syms[idx]->section == &bfd_und_section)
2222 sym.st_info = ELF_ST_INFO (STB_GLOBAL, STT_NOTYPE);
32090b8e
KR
2223 else if (syms[idx]->flags & BSF_SECTION_SYM)
2224 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
2225 else if (syms[idx]->flags & BSF_FILE)
2226 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
d24928c0 2227 else
32090b8e 2228 {
d24928c0
KR
2229 int bind = STB_LOCAL;
2230 int type = STT_OBJECT;
2231 unsigned int flags = syms[idx]->flags;
2232
2233 if (flags & BSF_LOCAL)
2234 bind = STB_LOCAL;
2235 else if (flags & BSF_WEAK)
2236 bind = STB_WEAK;
2237 else if (flags & BSF_GLOBAL)
2238 bind = STB_GLOBAL;
2239
2240 if (flags & BSF_FUNCTION)
2241 type = STT_FUNC;
2242
2243 sym.st_info = ELF_ST_INFO (bind, type);
32090b8e 2244 }
244ffee7 2245
32090b8e
KR
2246 sym.st_other = 0;
2247 elf_swap_symbol_out (abfd, &sym,
d24928c0
KR
2248 (outbound_syms
2249 + elf_sym_extra (abfd)[idx].elf_sym_num));
32090b8e
KR
2250 }
2251
2252 symtab_hdr->contents = (PTR) outbound_syms;
2253 symstrtab_hdr->contents = (PTR) stt->tab;
2254 symstrtab_hdr->sh_size = stt->length;
2255 symstrtab_hdr->sh_type = SHT_STRTAB;
2256
2257 symstrtab_hdr->sh_flags = 0;
2258 symstrtab_hdr->sh_addr = 0;
2259 symstrtab_hdr->sh_entsize = 0;
2260 symstrtab_hdr->sh_link = 0;
2261 symstrtab_hdr->sh_info = 0;
062189c6 2262 symstrtab_hdr->sh_addralign = 1;
32090b8e
KR
2263 symstrtab_hdr->size = 0;
2264 }
2265
2266 /* put the strtab out too... */
2267 {
2268 Elf_Internal_Shdr *this_hdr;
2269
1c6042ee 2270 this_hdr = &elf_tdata (abfd)->shstrtab_hdr;
32090b8e
KR
2271 this_hdr->contents = (PTR) elf_shstrtab (abfd)->tab;
2272 this_hdr->sh_size = elf_shstrtab (abfd)->length;
2273 this_hdr->sh_type = SHT_STRTAB;
2274 this_hdr->sh_flags = 0;
2275 this_hdr->sh_addr = 0;
2276 this_hdr->sh_entsize = 0;
062189c6 2277 this_hdr->sh_addralign = 1;
32090b8e
KR
2278 this_hdr->size = 0;
2279 }
b9d5cdf0 2280 return true;
244ffee7
JK
2281}
2282
32090b8e
KR
2283static boolean
2284write_shdrs_and_ehdr (abfd)
2285 bfd *abfd;
244ffee7 2286{
32090b8e
KR
2287 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
2288 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
32090b8e
KR
2289 Elf_External_Shdr *x_shdrp; /* Section header table, external form */
2290 Elf_Internal_Shdr **i_shdrp; /* Section header table, internal form */
68241b2b 2291 unsigned int count;
32090b8e 2292 struct strtab *shstrtab;
244ffee7 2293
32090b8e
KR
2294 i_ehdrp = elf_elfheader (abfd);
2295 i_shdrp = elf_elfsections (abfd);
2296 shstrtab = elf_shstrtab (abfd);
2297
2298 /* swap the header before spitting it out... */
2299
2300#if DEBUG & 1
2301 elf_debug_file (i_ehdrp);
244ffee7 2302#endif
32090b8e
KR
2303 elf_swap_ehdr_out (abfd, i_ehdrp, &x_ehdr);
2304 bfd_seek (abfd, (file_ptr) 0, SEEK_SET);
2305 bfd_write ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd);
244ffee7 2306
32090b8e
KR
2307 /* at this point we've concocted all the ELF sections... */
2308 x_shdrp = (Elf_External_Shdr *)
2309 bfd_alloc (abfd, sizeof (*x_shdrp) * (i_ehdrp->e_shnum));
2310 if (!x_shdrp)
2311 {
d1ad85a6 2312 bfd_set_error (bfd_error_no_memory);
32090b8e
KR
2313 return false;
2314 }
2315
2316 for (count = 0; count < i_ehdrp->e_shnum; count++)
2317 {
2318#if DEBUG & 2
2319 elf_debug_section (shstrtab->tab + i_shdrp[count]->sh_name, count,
2320 i_shdrp[count]);
244ffee7 2321#endif
32090b8e
KR
2322 elf_swap_shdr_out (abfd, i_shdrp[count], x_shdrp + count);
2323 }
2324 bfd_seek (abfd, (file_ptr) i_ehdrp->e_shoff, SEEK_SET);
2325 bfd_write ((PTR) x_shdrp, sizeof (*x_shdrp), i_ehdrp->e_shnum, abfd);
2326 /* need to dump the string table too... */
244ffee7 2327
32090b8e
KR
2328 return true;
2329}
244ffee7 2330
32090b8e
KR
2331static void
2332assign_file_positions_for_relocs (abfd)
2333 bfd *abfd;
2334{
1c6042ee 2335 file_ptr off = elf_tdata (abfd)->next_file_pos;
68241b2b 2336 unsigned int i;
32090b8e
KR
2337 Elf_Internal_Shdr **shdrpp = elf_elfsections (abfd);
2338 Elf_Internal_Shdr *shdrp;
1c6042ee 2339 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
32090b8e
KR
2340 {
2341 shdrp = shdrpp[i];
2342 if (shdrp->sh_type != SHT_REL && shdrp->sh_type != SHT_RELA)
2343 continue;
01383fb4 2344 off = align_file_position (off);
32090b8e
KR
2345 off = assign_file_position_for_section (shdrp, off);
2346 }
1c6042ee 2347 elf_tdata (abfd)->next_file_pos = off;
32090b8e 2348}
244ffee7 2349
32090b8e 2350boolean
1c6042ee
ILT
2351NAME(bfd_elf,write_object_contents) (abfd)
2352 bfd *abfd;
32090b8e 2353{
062189c6 2354 struct elf_backend_data *bed = get_elf_backend_data (abfd);
32090b8e
KR
2355 Elf_Internal_Ehdr *i_ehdrp;
2356 Elf_Internal_Shdr **i_shdrp;
68241b2b 2357 unsigned int count;
244ffee7 2358
38a5f510
ILT
2359 /* We don't know how to write dynamic objects. Specifically, we
2360 don't know how to construct the program header. */
2361 if ((abfd->flags & DYNAMIC) != 0)
2362 {
2363 fprintf (stderr, "Writing ELF dynamic objects is not supported\n");
d1ad85a6 2364 bfd_set_error (bfd_error_wrong_format);
38a5f510
ILT
2365 return false;
2366 }
2367
32090b8e
KR
2368 if (abfd->output_has_begun == false)
2369 {
5e829a34
JL
2370 if (prep_headers (abfd) == false)
2371 return false;
2372 if (elf_compute_section_file_positions (abfd) == false)
2373 return false;
32090b8e
KR
2374 abfd->output_has_begun = true;
2375 }
244ffee7 2376
32090b8e
KR
2377 i_shdrp = elf_elfsections (abfd);
2378 i_ehdrp = elf_elfheader (abfd);
244ffee7 2379
32090b8e 2380 bfd_map_over_sections (abfd, write_relocs, (PTR) 0);
32090b8e 2381 assign_file_positions_for_relocs (abfd);
244ffee7 2382
32090b8e 2383 /* After writing the headers, we need to write the sections too... */
062189c6 2384 for (count = 1; count < i_ehdrp->e_shnum; count++)
e621c5cc 2385 {
e621c5cc
ILT
2386 if (bed->elf_backend_section_processing)
2387 (*bed->elf_backend_section_processing) (abfd, i_shdrp[count]);
2388 if (i_shdrp[count]->contents)
2389 {
2390 bfd_seek (abfd, i_shdrp[count]->sh_offset, SEEK_SET);
2391 bfd_write (i_shdrp[count]->contents, i_shdrp[count]->sh_size, 1,
2392 abfd);
2393 }
2394 }
062189c6
ILT
2395
2396 if (bed->elf_backend_final_write_processing)
2397 (*bed->elf_backend_final_write_processing) (abfd);
2398
32090b8e
KR
2399 return write_shdrs_and_ehdr (abfd);
2400}
244ffee7 2401
32090b8e
KR
2402/* Given an index of a section, retrieve a pointer to it. Note
2403 that for our purposes, sections are indexed by {1, 2, ...} with
2404 0 being an illegal index. */
244ffee7 2405
32090b8e
KR
2406/* In the original, each ELF section went into exactly one BFD
2407 section. This doesn't really make sense, so we need a real mapping.
2408 The mapping has to hide in the Elf_Internal_Shdr since asection
2409 doesn't have anything like a tdata field... */
244ffee7 2410
32090b8e 2411static struct sec *
1c6042ee
ILT
2412section_from_elf_index (abfd, index)
2413 bfd *abfd;
2414 unsigned int index;
32090b8e
KR
2415{
2416 /* @@ Is bfd_com_section really correct in all the places it could
2417 be returned from this routine? */
244ffee7 2418
32090b8e
KR
2419 if (index == SHN_ABS)
2420 return &bfd_com_section; /* not abs? */
2421 if (index == SHN_COMMON)
2422 return &bfd_com_section;
244ffee7 2423
32090b8e
KR
2424 if (index > elf_elfheader (abfd)->e_shnum)
2425 return 0;
244ffee7
JK
2426
2427 {
32090b8e 2428 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[index];
244ffee7 2429
32090b8e 2430 switch (hdr->sh_type)
244ffee7 2431 {
32090b8e
KR
2432 /* ELF sections that map to BFD sections */
2433 case SHT_PROGBITS:
2434 case SHT_NOBITS:
2435 if (!hdr->rawdata)
2436 bfd_section_from_shdr (abfd, index);
2437 return (struct sec *) hdr->rawdata;
244ffee7 2438
32090b8e
KR
2439 default:
2440 return (struct sec *) &bfd_abs_section;
244ffee7 2441 }
244ffee7 2442 }
32090b8e 2443}
244ffee7 2444
32090b8e
KR
2445/* given a section, search the header to find them... */
2446static int
1c6042ee
ILT
2447elf_section_from_bfd_section (abfd, asect)
2448 bfd *abfd;
2449 struct sec *asect;
32090b8e
KR
2450{
2451 Elf_Internal_Shdr **i_shdrp = elf_elfsections (abfd);
2452 int index;
2453 Elf_Internal_Shdr *hdr;
2454 int maxindex = elf_elfheader (abfd)->e_shnum;
244ffee7 2455
32090b8e
KR
2456 if (asect == &bfd_abs_section)
2457 return SHN_ABS;
2458 if (asect == &bfd_com_section)
2459 return SHN_COMMON;
2460 if (asect == &bfd_und_section)
2461 return SHN_UNDEF;
244ffee7 2462
32090b8e
KR
2463 for (index = 0; index < maxindex; index++)
2464 {
2465 hdr = i_shdrp[index];
2466 switch (hdr->sh_type)
2467 {
2468 /* ELF sections that map to BFD sections */
2469 case SHT_PROGBITS:
2470 case SHT_NOBITS:
e621c5cc 2471 case SHT_NOTE:
32090b8e
KR
2472 if (hdr->rawdata)
2473 {
2474 if (((struct sec *) (hdr->rawdata)) == asect)
2475 return index;
2476 }
2477 break;
01383fb4
KR
2478
2479 case SHT_STRTAB:
2480 /* fix_up_strtabs will generate STRTAB sections with names
2481 of .stab*str. */
2482 if (!strncmp (asect->name, ".stab", 5)
2483 && !strcmp ("str", asect->name + strlen (asect->name) - 3))
2484 {
2485 if (hdr->rawdata)
2486 {
2487 if (((struct sec *) (hdr->rawdata)) == asect)
2488 return index;
2489 }
2490 break;
2491 }
2492 /* FALL THROUGH */
32090b8e 2493 default:
e621c5cc
ILT
2494 {
2495 struct elf_backend_data *bed = get_elf_backend_data (abfd);
2496
2497 if (bed->elf_backend_section_from_bfd_section)
f035cc47
ILT
2498 {
2499 int retval;
2500
2501 retval = index;
2502 if ((*bed->elf_backend_section_from_bfd_section)
2503 (abfd, hdr, asect, &retval))
2504 return retval;
2505 }
e621c5cc 2506 }
32090b8e
KR
2507 break;
2508 }
2509 }
2510 return -1;
2511}
244ffee7 2512
32090b8e
KR
2513/* given a symbol, return the bfd index for that symbol. */
2514static int
1c6042ee
ILT
2515elf_symbol_from_bfd_symbol (abfd, asym_ptr_ptr)
2516 bfd *abfd;
2517 struct symbol_cache_entry **asym_ptr_ptr;
32090b8e
KR
2518{
2519 struct symbol_cache_entry *asym_ptr = *asym_ptr_ptr;
32090b8e 2520 int idx;
d24928c0 2521 flagword flags = asym_ptr->flags;
32090b8e 2522
d24928c0
KR
2523 /* When gas creates relocations against local labels, it creates its
2524 own symbol for the section, but does put the symbol into the
e621c5cc
ILT
2525 symbol chain, so udata is 0. When the linker is generating
2526 relocatable output, this section symbol may be for one of the
2527 input sections rather than the output section. */
d24928c0
KR
2528 if (asym_ptr->udata == (PTR) 0
2529 && (flags & BSF_SECTION_SYM)
e621c5cc
ILT
2530 && asym_ptr->section)
2531 {
2532 int indx;
2533
2534 if (asym_ptr->section->output_section != NULL)
2535 indx = asym_ptr->section->output_section->index;
2536 else
2537 indx = asym_ptr->section->index;
2538 if (elf_section_syms (abfd)[indx])
2539 asym_ptr->udata = elf_section_syms (abfd)[indx]->udata;
01383fb4 2540 }
e621c5cc 2541
d24928c0 2542 if (asym_ptr->udata)
1c6042ee 2543 idx = ((Elf_Sym_Extra *) asym_ptr->udata)->elf_sym_num;
d24928c0 2544 else
32090b8e 2545 {
32090b8e
KR
2546 abort ();
2547 }
244ffee7 2548
32090b8e 2549#if DEBUG & 4
244ffee7 2550 {
244ffee7 2551
32090b8e 2552 fprintf (stderr,
d24928c0 2553 "elf_symbol_from_bfd_symbol 0x%.8lx, name = %s, sym num = %d, flags = 0x%.8lx %s\n",
1c6042ee 2554 (long) asym_ptr, asym_ptr->name, idx, flags, elf_symbol_flags (flags));
32090b8e
KR
2555 fflush (stderr);
2556 }
2557#endif
2558
2559 return idx;
2560}
2561
2562static boolean
1c6042ee
ILT
2563elf_slurp_symbol_table (abfd, symptrs)
2564 bfd *abfd;
2565 asymbol **symptrs; /* Buffer for generated bfd symbols */
32090b8e 2566{
1c6042ee 2567 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
7d8aaf36 2568 long symcount; /* Number of external ELF symbols */
32090b8e
KR
2569 elf_symbol_type *sym; /* Pointer to current bfd symbol */
2570 elf_symbol_type *symbase; /* Buffer for generated bfd symbols */
2571 Elf_Internal_Sym i_sym;
80425e6c 2572 Elf_External_Sym *x_symp = NULL;
32090b8e
KR
2573
2574 /* this is only valid because there is only one symtab... */
2575 /* FIXME: This is incorrect, there may also be a dynamic symbol
2576 table which is a subset of the full symbol table. We either need
2577 to be prepared to read both (and merge them) or ensure that we
2578 only read the full symbol table. Currently we only get called to
2579 read the full symbol table. -fnf */
244ffee7 2580
32090b8e
KR
2581 /* Read each raw ELF symbol, converting from external ELF form to
2582 internal ELF form, and then using the information to create a
2583 canonical bfd symbol table entry.
244ffee7 2584
32090b8e
KR
2585 Note that we allocate the initial bfd canonical symbol buffer
2586 based on a one-to-one mapping of the ELF symbols to canonical
2587 symbols. We actually use all the ELF symbols, so there will be no
2588 space left over at the end. When we have all the symbols, we
2589 build the caller's pointer vector. */
244ffee7 2590
32090b8e 2591 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) == -1)
25057836 2592 return false;
244ffee7 2593
32090b8e 2594 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
244ffee7 2595
7d8aaf36
ILT
2596 if (symcount == 0)
2597 sym = symbase = NULL;
2598 else
244ffee7 2599 {
7d8aaf36 2600 long i;
244ffee7 2601
7d8aaf36 2602 if (bfd_seek (abfd, hdr->sh_offset, SEEK_SET) == -1)
25057836 2603 return false;
7d8aaf36
ILT
2604
2605 symbase = ((elf_symbol_type *)
2606 bfd_zalloc (abfd, symcount * sizeof (elf_symbol_type)));
2607 if (symbase == (elf_symbol_type *) NULL)
32090b8e 2608 {
7d8aaf36
ILT
2609 bfd_set_error (bfd_error_no_memory);
2610 return false;
32090b8e 2611 }
7d8aaf36
ILT
2612 sym = symbase;
2613
2614 /* Temporarily allocate room for the raw ELF symbols. */
2615 x_symp = ((Elf_External_Sym *)
80425e6c 2616 malloc (symcount * sizeof (Elf_External_Sym)));
25057836 2617 if (x_symp == NULL && symcount != 0)
80425e6c
JK
2618 {
2619 bfd_set_error (bfd_error_no_memory);
2620 goto error_return;
2621 }
7d8aaf36
ILT
2622
2623 if (bfd_read ((PTR) x_symp, sizeof (Elf_External_Sym), symcount, abfd)
2624 != symcount * sizeof (Elf_External_Sym))
25057836 2625 goto error_return;
7d8aaf36
ILT
2626 /* Skip first symbol, which is a null dummy. */
2627 for (i = 1; i < symcount; i++)
32090b8e 2628 {
7d8aaf36
ILT
2629 elf_swap_symbol_in (abfd, x_symp + i, &i_sym);
2630 memcpy (&sym->internal_elf_sym, &i_sym, sizeof (Elf_Internal_Sym));
2631#ifdef ELF_KEEP_EXTSYM
2632 memcpy (&sym->native_elf_sym, x_symp + i, sizeof (Elf_External_Sym));
2633#endif
2634 sym->symbol.the_bfd = abfd;
244ffee7 2635
7d8aaf36
ILT
2636 sym->symbol.name = elf_string_from_elf_section (abfd, hdr->sh_link,
2637 i_sym.st_name);
244ffee7 2638
7d8aaf36 2639 sym->symbol.value = i_sym.st_value;
244ffee7 2640
7d8aaf36
ILT
2641 if (i_sym.st_shndx > 0 && i_sym.st_shndx < SHN_LORESERV)
2642 {
2643 sym->symbol.section = section_from_elf_index (abfd,
2644 i_sym.st_shndx);
2645 }
2646 else if (i_sym.st_shndx == SHN_ABS)
2647 {
2648 sym->symbol.section = &bfd_abs_section;
2649 }
2650 else if (i_sym.st_shndx == SHN_COMMON)
2651 {
2652 sym->symbol.section = &bfd_com_section;
2653 /* Elf puts the alignment into the `value' field, and
2654 the size into the `size' field. BFD wants to see the
2655 size in the value field, and doesn't care (at the
2656 moment) about the alignment. */
2657 sym->symbol.value = i_sym.st_size;
2658 }
2659 else if (i_sym.st_shndx == SHN_UNDEF)
2660 {
2661 sym->symbol.section = &bfd_und_section;
2662 }
2663 else
2664 sym->symbol.section = &bfd_abs_section;
300adb31 2665
7d8aaf36 2666 sym->symbol.value -= sym->symbol.section->vma;
244ffee7 2667
7d8aaf36
ILT
2668 switch (ELF_ST_BIND (i_sym.st_info))
2669 {
2670 case STB_LOCAL:
2671 sym->symbol.flags |= BSF_LOCAL;
2672 break;
2673 case STB_GLOBAL:
2674 sym->symbol.flags |= BSF_GLOBAL;
2675 break;
2676 case STB_WEAK:
2677 sym->symbol.flags |= BSF_WEAK;
2678 break;
2679 }
2680
2681 switch (ELF_ST_TYPE (i_sym.st_info))
2682 {
2683 case STT_SECTION:
2684 sym->symbol.flags |= BSF_SECTION_SYM | BSF_DEBUGGING;
2685 break;
2686 case STT_FILE:
2687 sym->symbol.flags |= BSF_FILE | BSF_DEBUGGING;
2688 break;
2689 case STT_FUNC:
2690 sym->symbol.flags |= BSF_FUNCTION;
2691 break;
2692 }
2693
2694 /* Do some backend-specific processing on this symbol. */
2695 {
2696 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2697 if (ebd->elf_backend_symbol_processing)
2698 (*ebd->elf_backend_symbol_processing) (abfd, &sym->symbol);
2699 }
2700
2701 sym++;
2702 }
244ffee7
JK
2703 }
2704
e621c5cc
ILT
2705 /* Do some backend-specific processing on this symbol table. */
2706 {
2707 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2708 if (ebd->elf_backend_symbol_table_processing)
2709 (*ebd->elf_backend_symbol_table_processing) (abfd, symbase, symcount);
2710 }
244ffee7 2711
e621c5cc 2712 /* We rely on the zalloc to clear out the final symbol entry. */
244ffee7 2713
32090b8e
KR
2714 bfd_get_symcount (abfd) = symcount = sym - symbase;
2715
2716 /* Fill in the user's symbol pointer vector if needed. */
2717 if (symptrs)
244ffee7 2718 {
32090b8e
KR
2719 sym = symbase;
2720 while (symcount-- > 0)
244ffee7 2721 {
32090b8e
KR
2722 *symptrs++ = &sym->symbol;
2723 sym++;
244ffee7 2724 }
32090b8e 2725 *symptrs = 0; /* Final null pointer */
244ffee7
JK
2726 }
2727
80425e6c
JK
2728 if (x_symp != NULL)
2729 free (x_symp);
244ffee7 2730 return true;
1c6042ee 2731error_return:
80425e6c
JK
2732 if (x_symp != NULL)
2733 free (x_symp);
2734 return false;
244ffee7
JK
2735}
2736
32090b8e 2737/* Return the number of bytes required to hold the symtab vector.
244ffee7 2738
32090b8e
KR
2739 Note that we base it on the count plus 1, since we will null terminate
2740 the vector allocated based on this size. However, the ELF symbol table
2741 always has a dummy entry as symbol #0, so it ends up even. */
244ffee7 2742
326e32d7 2743long
1c6042ee
ILT
2744elf_get_symtab_upper_bound (abfd)
2745 bfd *abfd;
244ffee7 2746{
326e32d7
ILT
2747 long symcount;
2748 long symtab_size;
1c6042ee 2749 Elf_Internal_Shdr *hdr = &elf_tdata (abfd)->symtab_hdr;
326e32d7 2750
32090b8e 2751 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
d6439785 2752 symtab_size = (symcount - 1 + 1) * (sizeof (asymbol *));
244ffee7 2753
32090b8e
KR
2754 return symtab_size;
2755}
244ffee7 2756
32090b8e
KR
2757/*
2758 This function return the number of bytes required to store the
2759 relocation information associated with section <<sect>>
2760 attached to bfd <<abfd>>
244ffee7 2761
32090b8e 2762*/
326e32d7 2763long
32090b8e
KR
2764elf_get_reloc_upper_bound (abfd, asect)
2765 bfd *abfd;
2766 sec_ptr asect;
2767{
2768 if (asect->flags & SEC_RELOC)
2769 {
2770 /* either rel or rela */
1c6042ee 2771 return elf_section_data (asect)->rel_hdr.sh_size;
32090b8e
KR
2772 }
2773 else
2774 return 0;
244ffee7
JK
2775}
2776
32090b8e 2777static boolean
1c6042ee
ILT
2778elf_slurp_reloca_table (abfd, asect, symbols)
2779 bfd *abfd;
2780 sec_ptr asect;
2781 asymbol **symbols;
244ffee7 2782{
32090b8e
KR
2783 Elf_External_Rela *native_relocs;
2784 arelent *reloc_cache;
2785 arelent *cache_ptr;
244ffee7 2786
32090b8e 2787 unsigned int idx;
244ffee7 2788
32090b8e
KR
2789 if (asect->relocation)
2790 return true;
2791 if (asect->reloc_count == 0)
2792 return true;
2793 if (asect->flags & SEC_CONSTRUCTOR)
2794 return true;
244ffee7 2795
32090b8e
KR
2796 bfd_seek (abfd, asect->rel_filepos, SEEK_SET);
2797 native_relocs = (Elf_External_Rela *)
2798 bfd_alloc (abfd, asect->reloc_count * sizeof (Elf_External_Rela));
9783e04a 2799 if (!native_relocs)
9783e04a 2800 {
d1ad85a6 2801 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
2802 return false;
2803 }
32090b8e
KR
2804 bfd_read ((PTR) native_relocs,
2805 sizeof (Elf_External_Rela), asect->reloc_count, abfd);
244ffee7 2806
32090b8e
KR
2807 reloc_cache = (arelent *)
2808 bfd_alloc (abfd, (size_t) (asect->reloc_count * sizeof (arelent)));
2809
2810 if (!reloc_cache)
6a3eb9b6 2811 {
d1ad85a6 2812 bfd_set_error (bfd_error_no_memory);
32090b8e 2813 return false;
6a3eb9b6 2814 }
244ffee7 2815
32090b8e
KR
2816 for (idx = 0; idx < asect->reloc_count; idx++)
2817 {
32090b8e
KR
2818 Elf_Internal_Rela dst;
2819 Elf_External_Rela *src;
244ffee7 2820
32090b8e
KR
2821 cache_ptr = reloc_cache + idx;
2822 src = native_relocs + idx;
2823 elf_swap_reloca_in (abfd, src, &dst);
244ffee7 2824
d24928c0 2825#ifdef RELOC_PROCESSING
32090b8e
KR
2826 RELOC_PROCESSING (cache_ptr, &dst, symbols, abfd, asect);
2827#else
32090b8e
KR
2828 if (asect->flags & SEC_RELOC)
2829 {
2830 /* relocatable, so the offset is off of the section */
2831 cache_ptr->address = dst.r_offset + asect->vma;
2832 }
2833 else
2834 {
2835 /* non-relocatable, so the offset a virtual address */
2836 cache_ptr->address = dst.r_offset;
2837 }
7b8106b4
ILT
2838
2839 /* ELF_R_SYM(dst.r_info) is the symbol table offset. An offset
2840 of zero points to the dummy symbol, which was not read into
2841 the symbol table SYMBOLS. */
2842 if (ELF_R_SYM (dst.r_info) == 0)
2843 cache_ptr->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
2844 else
2845 {
2846 asymbol *s;
2847
2848 cache_ptr->sym_ptr_ptr = symbols + ELF_R_SYM (dst.r_info) - 1;
2849
2850 /* Translate any ELF section symbol into a BFD section
2851 symbol. */
2852 s = *(cache_ptr->sym_ptr_ptr);
2853 if (s->flags & BSF_SECTION_SYM)
2854 {
2855 cache_ptr->sym_ptr_ptr = s->section->symbol_ptr_ptr;
2856 s = *cache_ptr->sym_ptr_ptr;
2857 if (s->name == 0 || s->name[0] == 0)
2858 abort ();
2859 }
2860 }
32090b8e 2861 cache_ptr->addend = dst.r_addend;
244ffee7 2862
32090b8e
KR
2863 /* Fill in the cache_ptr->howto field from dst.r_type */
2864 {
2865 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
2866 (*ebd->elf_info_to_howto) (abfd, cache_ptr, &dst);
2867 }
2868#endif
2869 }
244ffee7 2870
32090b8e
KR
2871 asect->relocation = reloc_cache;
2872 return true;
2873}
238ac6ec 2874
32090b8e
KR
2875#ifdef DEBUG
2876static void
2877elf_debug_section (str, num, hdr)
2878 char *str;
2879 int num;
2880 Elf_Internal_Shdr *hdr;
2881{
2882 fprintf (stderr, "\nSection#%d '%s' 0x%.8lx\n", num, str, (long) hdr);
2883 fprintf (stderr,
2884 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
2885 (long) hdr->sh_name,
2886 (long) hdr->sh_type,
2887 (long) hdr->sh_flags);
2888 fprintf (stderr,
2889 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
2890 (long) hdr->sh_addr,
2891 (long) hdr->sh_offset,
2892 (long) hdr->sh_size);
2893 fprintf (stderr,
2894 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
2895 (long) hdr->sh_link,
2896 (long) hdr->sh_info,
2897 (long) hdr->sh_addralign);
2898 fprintf (stderr, "sh_entsize = %ld\n",
2899 (long) hdr->sh_entsize);
2900 fprintf (stderr, "rawdata = 0x%.8lx\n", (long) hdr->rawdata);
2901 fprintf (stderr, "contents = 0x%.8lx\n", (long) hdr->contents);
2902 fprintf (stderr, "size = %ld\n", (long) hdr->size);
2903 fflush (stderr);
2904}
244ffee7 2905
32090b8e
KR
2906static void
2907elf_debug_file (ehdrp)
2908 Elf_Internal_Ehdr *ehdrp;
2909{
2910 fprintf (stderr, "e_entry = 0x%.8lx\n", (long) ehdrp->e_entry);
2911 fprintf (stderr, "e_phoff = %ld\n", (long) ehdrp->e_phoff);
2912 fprintf (stderr, "e_phnum = %ld\n", (long) ehdrp->e_phnum);
2913 fprintf (stderr, "e_phentsize = %ld\n", (long) ehdrp->e_phentsize);
2914 fprintf (stderr, "e_shoff = %ld\n", (long) ehdrp->e_shoff);
2915 fprintf (stderr, "e_shnum = %ld\n", (long) ehdrp->e_shnum);
2916 fprintf (stderr, "e_shentsize = %ld\n", (long) ehdrp->e_shentsize);
244ffee7 2917}
32090b8e 2918#endif
244ffee7
JK
2919
2920static boolean
1c6042ee
ILT
2921elf_slurp_reloc_table (abfd, asect, symbols)
2922 bfd *abfd;
2923 sec_ptr asect;
2924 asymbol **symbols;
244ffee7 2925{
32090b8e
KR
2926 Elf_External_Rel *native_relocs;
2927 arelent *reloc_cache;
2928 arelent *cache_ptr;
2929 Elf_Internal_Shdr *data_hdr;
25677b5b
PS
2930 bfd_vma data_off;
2931 unsigned long data_max;
32090b8e 2932 char buf[4]; /* FIXME -- might be elf64 */
244ffee7 2933
32090b8e 2934 unsigned int idx;
244ffee7 2935
32090b8e
KR
2936 if (asect->relocation)
2937 return true;
2938 if (asect->reloc_count == 0)
2939 return true;
2940 if (asect->flags & SEC_CONSTRUCTOR)
2941 return true;
244ffee7 2942
32090b8e
KR
2943 bfd_seek (abfd, asect->rel_filepos, SEEK_SET);
2944 native_relocs = (Elf_External_Rel *)
2945 bfd_alloc (abfd, asect->reloc_count * sizeof (Elf_External_Rel));
9783e04a
DM
2946 if (!native_relocs)
2947 {
d1ad85a6 2948 bfd_set_error (bfd_error_no_memory);
9783e04a
DM
2949 return false;
2950 }
32090b8e
KR
2951 bfd_read ((PTR) native_relocs,
2952 sizeof (Elf_External_Rel), asect->reloc_count, abfd);
244ffee7 2953
32090b8e
KR
2954 reloc_cache = (arelent *)
2955 bfd_alloc (abfd, (size_t) (asect->reloc_count * sizeof (arelent)));
2956
2957 if (!reloc_cache)
244ffee7 2958 {
d1ad85a6 2959 bfd_set_error (bfd_error_no_memory);
244ffee7
JK
2960 return false;
2961 }
2962
32090b8e
KR
2963 /* Get the offset of the start of the segment we are relocating to read in
2964 the implicit addend. */
1c6042ee 2965 data_hdr = &elf_section_data (asect)->this_hdr;
32090b8e
KR
2966 data_off = data_hdr->sh_offset;
2967 data_max = data_hdr->sh_size - sizeof (buf) + 1;
244ffee7 2968
32090b8e
KR
2969#if DEBUG & 2
2970 elf_debug_section ("data section", -1, data_hdr);
2971#endif
244ffee7 2972
32090b8e 2973 for (idx = 0; idx < asect->reloc_count; idx++)
244ffee7 2974 {
32090b8e
KR
2975#ifdef RELOC_PROCESSING
2976 Elf_Internal_Rel dst;
2977 Elf_External_Rel *src;
244ffee7 2978
32090b8e
KR
2979 cache_ptr = reloc_cache + idx;
2980 src = native_relocs + idx;
2981 elf_swap_reloc_in (abfd, src, &dst);
244ffee7 2982
32090b8e
KR
2983 RELOC_PROCESSING (cache_ptr, &dst, symbols, abfd, asect);
2984#else
2985 Elf_Internal_Rel dst;
2986 Elf_External_Rel *src;
6a3eb9b6 2987
32090b8e
KR
2988 cache_ptr = reloc_cache + idx;
2989 src = native_relocs + idx;
2990
2991 elf_swap_reloc_in (abfd, src, &dst);
2992
2993 if (asect->flags & SEC_RELOC)
244ffee7 2994 {
32090b8e
KR
2995 /* relocatable, so the offset is off of the section */
2996 cache_ptr->address = dst.r_offset + asect->vma;
244ffee7 2997 }
32090b8e 2998 else
244ffee7 2999 {
32090b8e
KR
3000 /* non-relocatable, so the offset a virtual address */
3001 cache_ptr->address = dst.r_offset;
244ffee7 3002 }
7b8106b4
ILT
3003
3004 /* ELF_R_SYM(dst.r_info) is the symbol table offset. An offset
3005 of zero points to the dummy symbol, which was not read into
3006 the symbol table SYMBOLS. */
3007 if (ELF_R_SYM (dst.r_info) == 0)
3008 cache_ptr->sym_ptr_ptr = bfd_abs_section.symbol_ptr_ptr;
3009 else
3010 {
3011 asymbol *s;
3012
3013 cache_ptr->sym_ptr_ptr = symbols + ELF_R_SYM (dst.r_info) - 1;
3014
3015 /* Translate any ELF section symbol into a BFD section
3016 symbol. */
3017 s = *(cache_ptr->sym_ptr_ptr);
3018 if (s->flags & BSF_SECTION_SYM)
3019 {
3020 cache_ptr->sym_ptr_ptr = s->section->symbol_ptr_ptr;
3021 s = *cache_ptr->sym_ptr_ptr;
3022 if (s->name == 0 || s->name[0] == 0)
3023 abort ();
3024 }
3025 }
32090b8e 3026 BFD_ASSERT (dst.r_offset <= data_max);
d24928c0 3027 cache_ptr->addend = 0;
244ffee7 3028
32090b8e
KR
3029 /* Fill in the cache_ptr->howto field from dst.r_type */
3030 {
3031 struct elf_backend_data *ebd = get_elf_backend_data (abfd);
3032 (*ebd->elf_info_to_howto_rel) (abfd, cache_ptr, &dst);
3033 }
3034#endif
3035 }
244ffee7 3036
32090b8e
KR
3037 asect->relocation = reloc_cache;
3038 return true;
3039}
244ffee7 3040
326e32d7 3041long
32090b8e
KR
3042elf_canonicalize_reloc (abfd, section, relptr, symbols)
3043 bfd *abfd;
3044 sec_ptr section;
3045 arelent **relptr;
3046 asymbol **symbols;
3047{
3048 arelent *tblptr = section->relocation;
3049 unsigned int count = 0;
3050 int use_rela_p = get_elf_backend_data (abfd)->use_rela_p;
3051
3052 /* snarfed from coffcode.h */
3053 if (use_rela_p)
326e32d7
ILT
3054 {
3055 if (! elf_slurp_reloca_table (abfd, section, symbols))
3056 return -1;
3057 }
32090b8e 3058 else
326e32d7
ILT
3059 {
3060 if (! elf_slurp_reloc_table (abfd, section, symbols))
3061 return -1;
3062 }
32090b8e
KR
3063
3064 tblptr = section->relocation;
3065 if (!tblptr)
326e32d7 3066 return -1;
32090b8e
KR
3067
3068 for (; count++ < section->reloc_count;)
3069 *relptr++ = tblptr++;
3070
3071 *relptr = 0;
3072 return section->reloc_count;
3073}
3074
326e32d7 3075long
1c6042ee
ILT
3076elf_get_symtab (abfd, alocation)
3077 bfd *abfd;
3078 asymbol **alocation;
32090b8e 3079{
32090b8e 3080 if (!elf_slurp_symbol_table (abfd, alocation))
326e32d7
ILT
3081 return -1;
3082
3083 return bfd_get_symcount (abfd);
32090b8e
KR
3084}
3085
3086asymbol *
1c6042ee
ILT
3087elf_make_empty_symbol (abfd)
3088 bfd *abfd;
32090b8e
KR
3089{
3090 elf_symbol_type *newsym;
3091
3092 newsym = (elf_symbol_type *) bfd_zalloc (abfd, sizeof (elf_symbol_type));
3093 if (!newsym)
3094 {
d1ad85a6 3095 bfd_set_error (bfd_error_no_memory);
32090b8e
KR
3096 return NULL;
3097 }
3098 else
3099 {
3100 newsym->symbol.the_bfd = abfd;
3101 return &newsym->symbol;
244ffee7 3102 }
32090b8e 3103}
244ffee7 3104
32090b8e 3105void
1c6042ee
ILT
3106elf_get_symbol_info (ignore_abfd, symbol, ret)
3107 bfd *ignore_abfd;
3108 asymbol *symbol;
3109 symbol_info *ret;
32090b8e
KR
3110{
3111 bfd_symbol_info (symbol, ret);
3112}
244ffee7 3113
32090b8e 3114void
1c6042ee
ILT
3115elf_print_symbol (ignore_abfd, filep, symbol, how)
3116 bfd *ignore_abfd;
3117 PTR filep;
3118 asymbol *symbol;
3119 bfd_print_symbol_type how;
32090b8e
KR
3120{
3121 FILE *file = (FILE *) filep;
3122 switch (how)
3123 {
3124 case bfd_print_symbol_name:
3125 fprintf (file, "%s", symbol->name);
3126 break;
3127 case bfd_print_symbol_more:
3128 fprintf (file, "elf ");
3129 fprintf_vma (file, symbol->value);
3130 fprintf (file, " %lx", (long) symbol->flags);
3131 break;
3132 case bfd_print_symbol_all:
3133 {
3134 CONST char *section_name;
3135 section_name = symbol->section ? symbol->section->name : "(*none*)";
3136 bfd_print_symbol_vandf ((PTR) file, symbol);
3137 fprintf (file, " %s\t%s",
3138 section_name,
3139 symbol->name);
3140 }
3141 break;
3142 }
244ffee7 3143
32090b8e 3144}
244ffee7 3145
32090b8e 3146alent *
1c6042ee
ILT
3147elf_get_lineno (ignore_abfd, symbol)
3148 bfd *ignore_abfd;
3149 asymbol *symbol;
32090b8e
KR
3150{
3151 fprintf (stderr, "elf_get_lineno unimplemented\n");
3152 fflush (stderr);
3153 BFD_FAIL ();
3154 return NULL;
3155}
3156
3157boolean
1c6042ee
ILT
3158elf_set_arch_mach (abfd, arch, machine)
3159 bfd *abfd;
3160 enum bfd_architecture arch;
3161 unsigned long machine;
32090b8e
KR
3162{
3163 /* Allow any architecture to be supported by the elf backend */
3164 switch (arch)
244ffee7 3165 {
32090b8e
KR
3166 case bfd_arch_unknown: /* EM_NONE */
3167 case bfd_arch_sparc: /* EM_SPARC */
1c6042ee
ILT
3168 case bfd_arch_i386: /* EM_386 */
3169 case bfd_arch_m68k: /* EM_68K */
3170 case bfd_arch_m88k: /* EM_88K */
3171 case bfd_arch_i860: /* EM_860 */
3172 case bfd_arch_mips: /* EM_MIPS (MIPS R3000) */
3173 case bfd_arch_hppa: /* EM_HPPA (HP PA_RISC) */
99ec1f66 3174 case bfd_arch_powerpc: /* EM_CYGNUS_POWERPC */
32090b8e
KR
3175 return bfd_default_set_arch_mach (abfd, arch, machine);
3176 default:
3177 return false;
244ffee7 3178 }
32090b8e 3179}
244ffee7 3180
32090b8e 3181boolean
1c6042ee
ILT
3182elf_find_nearest_line (abfd,
3183 section,
3184 symbols,
3185 offset,
3186 filename_ptr,
3187 functionname_ptr,
3188 line_ptr)
3189 bfd *abfd;
3190 asection *section;
3191 asymbol **symbols;
3192 bfd_vma offset;
3193 CONST char **filename_ptr;
3194 CONST char **functionname_ptr;
3195 unsigned int *line_ptr;
32090b8e
KR
3196{
3197 return false;
244ffee7
JK
3198}
3199
32090b8e 3200int
1c6042ee
ILT
3201elf_sizeof_headers (abfd, reloc)
3202 bfd *abfd;
3203 boolean reloc;
32090b8e
KR
3204{
3205 fprintf (stderr, "elf_sizeof_headers unimplemented\n");
3206 fflush (stderr);
3207 BFD_FAIL ();
3208 return 0;
3209}
244ffee7 3210
32090b8e 3211boolean
1c6042ee
ILT
3212elf_set_section_contents (abfd, section, location, offset, count)
3213 bfd *abfd;
3214 sec_ptr section;
3215 PTR location;
3216 file_ptr offset;
3217 bfd_size_type count;
244ffee7 3218{
244ffee7
JK
3219 Elf_Internal_Shdr *hdr;
3220
32090b8e 3221 if (abfd->output_has_begun == false) /* set by bfd.c handler? */
244ffee7 3222 {
32090b8e 3223 /* do setup calculations (FIXME) */
5e829a34
JL
3224 if (prep_headers (abfd) == false)
3225 return false;
3226 if (elf_compute_section_file_positions (abfd) == false)
3227 return false;
32090b8e 3228 abfd->output_has_begun = true;
244ffee7 3229 }
244ffee7 3230
1c6042ee 3231 hdr = &elf_section_data (section)->this_hdr;
244ffee7 3232
32090b8e
KR
3233 if (bfd_seek (abfd, hdr->sh_offset + offset, SEEK_SET) == -1)
3234 return false;
3235 if (bfd_write (location, 1, count, abfd) != count)
3236 return false;
3237
3238 return true;
3239}
3240
3241void
1c6042ee
ILT
3242elf_no_info_to_howto (abfd, cache_ptr, dst)
3243 bfd *abfd;
3244 arelent *cache_ptr;
3245 Elf_Internal_Rela *dst;
244ffee7 3246{
32090b8e
KR
3247 fprintf (stderr, "elf RELA relocation support for target machine unimplemented\n");
3248 fflush (stderr);
3249 BFD_FAIL ();
244ffee7
JK
3250}
3251
32090b8e 3252void
1c6042ee
ILT
3253elf_no_info_to_howto_rel (abfd, cache_ptr, dst)
3254 bfd *abfd;
3255 arelent *cache_ptr;
3256 Elf_Internal_Rel *dst;
244ffee7 3257{
32090b8e
KR
3258 fprintf (stderr, "elf REL relocation support for target machine unimplemented\n");
3259 fflush (stderr);
3260 BFD_FAIL ();
3261}
32090b8e 3262\f
1c6042ee 3263
32090b8e 3264/* Core file support */
244ffee7 3265
32090b8e
KR
3266#ifdef HAVE_PROCFS /* Some core file support requires host /proc files */
3267#include <sys/procfs.h>
3268#else
3269#define bfd_prstatus(abfd, descdata, descsz, filepos) /* Define away */
3270#define bfd_fpregset(abfd, descdata, descsz, filepos) /* Define away */
3271#define bfd_prpsinfo(abfd, descdata, descsz, filepos) /* Define away */
3272#endif
244ffee7 3273
32090b8e 3274#ifdef HAVE_PROCFS
244ffee7 3275
32090b8e 3276static void
1c6042ee
ILT
3277bfd_prstatus (abfd, descdata, descsz, filepos)
3278 bfd *abfd;
3279 char *descdata;
3280 int descsz;
3281 long filepos;
32090b8e
KR
3282{
3283 asection *newsect;
3284 prstatus_t *status = (prstatus_t *) 0;
244ffee7 3285
32090b8e 3286 if (descsz == sizeof (prstatus_t))
244ffee7 3287 {
32090b8e
KR
3288 newsect = bfd_make_section (abfd, ".reg");
3289 newsect->_raw_size = sizeof (status->pr_reg);
3290 newsect->filepos = filepos + (long) &status->pr_reg;
3291 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3292 newsect->alignment_power = 2;
3293 if ((core_prstatus (abfd) = bfd_alloc (abfd, descsz)) != NULL)
3294 {
3295 memcpy (core_prstatus (abfd), descdata, descsz);
3296 }
244ffee7 3297 }
32090b8e 3298}
244ffee7 3299
32090b8e 3300/* Stash a copy of the prpsinfo structure away for future use. */
244ffee7 3301
32090b8e 3302static void
1c6042ee
ILT
3303bfd_prpsinfo (abfd, descdata, descsz, filepos)
3304 bfd *abfd;
3305 char *descdata;
3306 int descsz;
3307 long filepos;
32090b8e
KR
3308{
3309 asection *newsect;
244ffee7 3310
32090b8e
KR
3311 if (descsz == sizeof (prpsinfo_t))
3312 {
3313 if ((core_prpsinfo (abfd) = bfd_alloc (abfd, descsz)) != NULL)
244ffee7 3314 {
32090b8e 3315 memcpy (core_prpsinfo (abfd), descdata, descsz);
244ffee7 3316 }
244ffee7 3317 }
244ffee7
JK
3318}
3319
244ffee7 3320static void
1c6042ee
ILT
3321bfd_fpregset (abfd, descdata, descsz, filepos)
3322 bfd *abfd;
3323 char *descdata;
3324 int descsz;
3325 long filepos;
244ffee7 3326{
32090b8e 3327 asection *newsect;
244ffee7 3328
32090b8e
KR
3329 newsect = bfd_make_section (abfd, ".reg2");
3330 newsect->_raw_size = descsz;
3331 newsect->filepos = filepos;
3332 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3333 newsect->alignment_power = 2;
6a3eb9b6 3334}
244ffee7 3335
32090b8e
KR
3336#endif /* HAVE_PROCFS */
3337
3338/* Return a pointer to the args (including the command name) that were
3339 seen by the program that generated the core dump. Note that for
3340 some reason, a spurious space is tacked onto the end of the args
3341 in some (at least one anyway) implementations, so strip it off if
3342 it exists. */
3343
3344char *
1c6042ee
ILT
3345elf_core_file_failing_command (abfd)
3346 bfd *abfd;
244ffee7 3347{
32090b8e
KR
3348#ifdef HAVE_PROCFS
3349 if (core_prpsinfo (abfd))
3350 {
3351 prpsinfo_t *p = core_prpsinfo (abfd);
3352 char *scan = p->pr_psargs;
3353 while (*scan++)
3354 {;
3355 }
3356 scan -= 2;
3357 if ((scan > p->pr_psargs) && (*scan == ' '))
3358 {
3359 *scan = '\000';
3360 }
3361 return p->pr_psargs;
3362 }
3363#endif
3364 return NULL;
3365}
244ffee7 3366
32090b8e
KR
3367/* Return the number of the signal that caused the core dump. Presumably,
3368 since we have a core file, we got a signal of some kind, so don't bother
3369 checking the other process status fields, just return the signal number.
3370 */
244ffee7 3371
32090b8e 3372int
1c6042ee
ILT
3373elf_core_file_failing_signal (abfd)
3374 bfd *abfd;
32090b8e
KR
3375{
3376#ifdef HAVE_PROCFS
3377 if (core_prstatus (abfd))
3378 {
3379 return ((prstatus_t *) (core_prstatus (abfd)))->pr_cursig;
3380 }
3381#endif
3382 return -1;
3383}
244ffee7 3384
32090b8e
KR
3385/* Check to see if the core file could reasonably be expected to have
3386 come for the current executable file. Note that by default we return
3387 true unless we find something that indicates that there might be a
3388 problem.
3389 */
244ffee7 3390
32090b8e 3391boolean
1c6042ee
ILT
3392elf_core_file_matches_executable_p (core_bfd, exec_bfd)
3393 bfd *core_bfd;
3394 bfd *exec_bfd;
32090b8e
KR
3395{
3396#ifdef HAVE_PROCFS
3397 char *corename;
3398 char *execname;
3399#endif
244ffee7 3400
32090b8e
KR
3401 /* First, xvecs must match since both are ELF files for the same target. */
3402
3403 if (core_bfd->xvec != exec_bfd->xvec)
244ffee7 3404 {
d1ad85a6 3405 bfd_set_error (bfd_error_system_call);
244ffee7
JK
3406 return false;
3407 }
3408
32090b8e 3409#ifdef HAVE_PROCFS
244ffee7 3410
32090b8e
KR
3411 /* If no prpsinfo, just return true. Otherwise, grab the last component
3412 of the exec'd pathname from the prpsinfo. */
244ffee7 3413
32090b8e 3414 if (core_prpsinfo (core_bfd))
244ffee7 3415 {
32090b8e
KR
3416 corename = (((struct prpsinfo *) core_prpsinfo (core_bfd))->pr_fname);
3417 }
3418 else
3419 {
3420 return true;
3421 }
244ffee7 3422
32090b8e 3423 /* Find the last component of the executable pathname. */
244ffee7 3424
32090b8e
KR
3425 if ((execname = strrchr (exec_bfd->filename, '/')) != NULL)
3426 {
3427 execname++;
3428 }
3429 else
3430 {
3431 execname = (char *) exec_bfd->filename;
3432 }
244ffee7 3433
32090b8e 3434 /* See if they match */
244ffee7 3435
32090b8e 3436 return strcmp (execname, corename) ? false : true;
244ffee7 3437
32090b8e 3438#else
244ffee7 3439
244ffee7 3440 return true;
244ffee7 3441
32090b8e
KR
3442#endif /* HAVE_PROCFS */
3443}
244ffee7 3444
32090b8e
KR
3445/* ELF core files contain a segment of type PT_NOTE, that holds much of
3446 the information that would normally be available from the /proc interface
3447 for the process, at the time the process dumped core. Currently this
3448 includes copies of the prstatus, prpsinfo, and fpregset structures.
244ffee7 3449
32090b8e
KR
3450 Since these structures are potentially machine dependent in size and
3451 ordering, bfd provides two levels of support for them. The first level,
3452 available on all machines since it does not require that the host
3453 have /proc support or the relevant include files, is to create a bfd
3454 section for each of the prstatus, prpsinfo, and fpregset structures,
3455 without any interpretation of their contents. With just this support,
3456 the bfd client will have to interpret the structures itself. Even with
3457 /proc support, it might want these full structures for it's own reasons.
244ffee7 3458
32090b8e
KR
3459 In the second level of support, where HAVE_PROCFS is defined, bfd will
3460 pick apart the structures to gather some additional information that
3461 clients may want, such as the general register set, the name of the
3462 exec'ed file and its arguments, the signal (if any) that caused the
3463 core dump, etc.
244ffee7 3464
32090b8e 3465 */
244ffee7 3466
32090b8e 3467static boolean
1c6042ee
ILT
3468elf_corefile_note (abfd, hdr)
3469 bfd *abfd;
3470 Elf_Internal_Phdr *hdr;
244ffee7 3471{
32090b8e
KR
3472 Elf_External_Note *x_note_p; /* Elf note, external form */
3473 Elf_Internal_Note i_note; /* Elf note, internal form */
3474 char *buf = NULL; /* Entire note segment contents */
3475 char *namedata; /* Name portion of the note */
3476 char *descdata; /* Descriptor portion of the note */
3477 char *sectname; /* Name to use for new section */
3478 long filepos; /* File offset to descriptor data */
3479 asection *newsect;
3480
3481 if (hdr->p_filesz > 0
b9d5cdf0 3482 && (buf = (char *) malloc (hdr->p_filesz)) != NULL
32090b8e
KR
3483 && bfd_seek (abfd, hdr->p_offset, SEEK_SET) != -1
3484 && bfd_read ((PTR) buf, hdr->p_filesz, 1, abfd) == hdr->p_filesz)
3485 {
3486 x_note_p = (Elf_External_Note *) buf;
3487 while ((char *) x_note_p < (buf + hdr->p_filesz))
3488 {
3489 i_note.namesz = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->namesz);
3490 i_note.descsz = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->descsz);
3491 i_note.type = bfd_h_get_32 (abfd, (bfd_byte *) x_note_p->type);
3492 namedata = x_note_p->name;
3493 descdata = namedata + BFD_ALIGN (i_note.namesz, 4);
3494 filepos = hdr->p_offset + (descdata - buf);
3495 switch (i_note.type)
3496 {
3497 case NT_PRSTATUS:
3498 /* process descdata as prstatus info */
3499 bfd_prstatus (abfd, descdata, i_note.descsz, filepos);
3500 sectname = ".prstatus";
3501 break;
3502 case NT_FPREGSET:
3503 /* process descdata as fpregset info */
3504 bfd_fpregset (abfd, descdata, i_note.descsz, filepos);
3505 sectname = ".fpregset";
3506 break;
3507 case NT_PRPSINFO:
3508 /* process descdata as prpsinfo */
3509 bfd_prpsinfo (abfd, descdata, i_note.descsz, filepos);
3510 sectname = ".prpsinfo";
3511 break;
3512 default:
3513 /* Unknown descriptor, just ignore it. */
3514 sectname = NULL;
3515 break;
3516 }
3517 if (sectname != NULL)
3518 {
3519 newsect = bfd_make_section (abfd, sectname);
3520 newsect->_raw_size = i_note.descsz;
3521 newsect->filepos = filepos;
3522 newsect->flags = SEC_ALLOC | SEC_HAS_CONTENTS;
3523 newsect->alignment_power = 2;
3524 }
3525 x_note_p = (Elf_External_Note *)
3526 (descdata + BFD_ALIGN (i_note.descsz, 4));
3527 }
3528 }
3529 if (buf != NULL)
3530 {
3531 free (buf);
3532 }
b9d5cdf0
DM
3533 else if (hdr->p_filesz > 0)
3534 {
d1ad85a6 3535 bfd_set_error (bfd_error_no_memory);
b9d5cdf0
DM
3536 return false;
3537 }
32090b8e 3538 return true;
244ffee7 3539
244ffee7
JK
3540}
3541
32090b8e
KR
3542/* Core files are simply standard ELF formatted files that partition
3543 the file using the execution view of the file (program header table)
3544 rather than the linking view. In fact, there is no section header
3545 table in a core file.
3546
3547 The process status information (including the contents of the general
3548 register set) and the floating point register set are stored in a
3549 segment of type PT_NOTE. We handcraft a couple of extra bfd sections
3550 that allow standard bfd access to the general registers (.reg) and the
3551 floating point registers (.reg2).
3552
3553 */
3554
3555bfd_target *
1c6042ee
ILT
3556elf_core_file_p (abfd)
3557 bfd *abfd;
244ffee7 3558{
32090b8e
KR
3559 Elf_External_Ehdr x_ehdr; /* Elf file header, external form */
3560 Elf_Internal_Ehdr *i_ehdrp; /* Elf file header, internal form */
3561 Elf_External_Phdr x_phdr; /* Program header table entry, external form */
3562 Elf_Internal_Phdr *i_phdrp; /* Program header table, internal form */
3563 unsigned int phindex;
d6439785 3564 struct elf_backend_data *ebd;
244ffee7 3565
32090b8e
KR
3566 /* Read in the ELF header in external format. */
3567
3568 if (bfd_read ((PTR) & x_ehdr, sizeof (x_ehdr), 1, abfd) != sizeof (x_ehdr))
244ffee7 3569 {
25057836
JL
3570 if (bfd_get_error () != bfd_error_system_call)
3571 bfd_set_error (bfd_error_wrong_format);
244ffee7
JK
3572 return NULL;
3573 }
32090b8e
KR
3574
3575 /* Now check to see if we have a valid ELF file, and one that BFD can
3576 make use of. The magic number must match, the address size ('class')
3577 and byte-swapping must match our XVEC entry, and it must have a
3578 program header table (FIXME: See comments re segments at top of this
3579 file). */
3580
3581 if (elf_file_p (&x_ehdr) == false)
244ffee7 3582 {
32090b8e 3583 wrong:
d1ad85a6 3584 bfd_set_error (bfd_error_wrong_format);
32090b8e 3585 return NULL;
244ffee7 3586 }
244ffee7 3587
32090b8e 3588 /* FIXME, Check EI_VERSION here ! */
244ffee7 3589
32090b8e
KR
3590 {
3591#if ARCH_SIZE == 32
3592 int desired_address_size = ELFCLASS32;
3593#endif
3594#if ARCH_SIZE == 64
3595 int desired_address_size = ELFCLASS64;
3596#endif
3597
3598 if (x_ehdr.e_ident[EI_CLASS] != desired_address_size)
3599 goto wrong;
3600 }
3601
3602 /* Switch xvec to match the specified byte order. */
3603 switch (x_ehdr.e_ident[EI_DATA])
244ffee7 3604 {
32090b8e
KR
3605 case ELFDATA2MSB: /* Big-endian */
3606 if (abfd->xvec->byteorder_big_p == false)
3607 goto wrong;
244ffee7 3608 break;
32090b8e
KR
3609 case ELFDATA2LSB: /* Little-endian */
3610 if (abfd->xvec->byteorder_big_p == true)
3611 goto wrong;
244ffee7 3612 break;
32090b8e
KR
3613 case ELFDATANONE: /* No data encoding specified */
3614 default: /* Unknown data encoding specified */
3615 goto wrong;
244ffee7
JK
3616 }
3617
32090b8e
KR
3618 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
3619 the tdata pointer in the bfd. */
244ffee7 3620
32090b8e
KR
3621 elf_tdata (abfd) =
3622 (struct elf_obj_tdata *) bfd_zalloc (abfd, sizeof (struct elf_obj_tdata));
3623 if (elf_tdata (abfd) == NULL)
244ffee7 3624 {
d1ad85a6 3625 bfd_set_error (bfd_error_no_memory);
32090b8e 3626 return NULL;
244ffee7 3627 }
244ffee7 3628
32090b8e 3629 /* FIXME, `wrong' returns from this point onward, leak memory. */
244ffee7 3630
32090b8e
KR
3631 /* Now that we know the byte order, swap in the rest of the header */
3632 i_ehdrp = elf_elfheader (abfd);
3633 elf_swap_ehdr_in (abfd, &x_ehdr, i_ehdrp);
3634#if DEBUG & 1
3635 elf_debug_file (i_ehdrp);
3636#endif
244ffee7 3637
d6439785
JL
3638 ebd = get_elf_backend_data (abfd);
3639
3640 /* Check that the ELF e_machine field matches what this particular
3641 BFD format expects. */
3642 if (ebd->elf_machine_code != i_ehdrp->e_machine)
3643 {
3644 bfd_target **target_ptr;
3645
3646 if (ebd->elf_machine_code != EM_NONE)
3647 goto wrong;
3648
3649 /* This is the generic ELF target. Let it match any ELF target
3650 for which we do not have a specific backend. */
3651 for (target_ptr = bfd_target_vector; *target_ptr != NULL; target_ptr++)
3652 {
3653 struct elf_backend_data *back;
3654
3655 if ((*target_ptr)->flavour != bfd_target_elf_flavour)
3656 continue;
3657 back = (struct elf_backend_data *) (*target_ptr)->backend_data;
3658 if (back->elf_machine_code == i_ehdrp->e_machine)
3659 {
3660 /* target_ptr is an ELF backend which matches this
3661 object file, so reject the generic ELF target. */
3662 goto wrong;
3663 }
3664 }
3665 }
3666
32090b8e
KR
3667 /* If there is no program header, or the type is not a core file, then
3668 we are hosed. */
3669 if (i_ehdrp->e_phoff == 0 || i_ehdrp->e_type != ET_CORE)
3670 goto wrong;
244ffee7 3671
32090b8e
KR
3672 /* Allocate space for a copy of the program header table in
3673 internal form, seek to the program header table in the file,
3674 read it in, and convert it to internal form. As a simple sanity
3675 check, verify that the what BFD thinks is the size of each program
3676 header table entry actually matches the size recorded in the file. */
3677
3678 if (i_ehdrp->e_phentsize != sizeof (x_phdr))
3679 goto wrong;
3680 i_phdrp = (Elf_Internal_Phdr *)
3681 bfd_alloc (abfd, sizeof (*i_phdrp) * i_ehdrp->e_phnum);
3682 if (!i_phdrp)
244ffee7 3683 {
d1ad85a6 3684 bfd_set_error (bfd_error_no_memory);
32090b8e
KR
3685 return NULL;
3686 }
3687 if (bfd_seek (abfd, i_ehdrp->e_phoff, SEEK_SET) == -1)
25057836 3688 return NULL;
32090b8e
KR
3689 for (phindex = 0; phindex < i_ehdrp->e_phnum; phindex++)
3690 {
3691 if (bfd_read ((PTR) & x_phdr, sizeof (x_phdr), 1, abfd)
3692 != sizeof (x_phdr))
25057836 3693 return NULL;
32090b8e 3694 elf_swap_phdr_in (abfd, &x_phdr, i_phdrp + phindex);
244ffee7
JK
3695 }
3696
32090b8e
KR
3697 /* Once all of the program headers have been read and converted, we
3698 can start processing them. */
244ffee7 3699
32090b8e
KR
3700 for (phindex = 0; phindex < i_ehdrp->e_phnum; phindex++)
3701 {
3702 bfd_section_from_phdr (abfd, i_phdrp + phindex, phindex);
3703 if ((i_phdrp + phindex)->p_type == PT_NOTE)
3704 {
3705 elf_corefile_note (abfd, i_phdrp + phindex);
3706 }
3707 }
244ffee7 3708
32090b8e 3709 /* Remember the entry point specified in the ELF file header. */
244ffee7 3710
32090b8e 3711 bfd_get_start_address (abfd) = i_ehdrp->e_entry;
244ffee7 3712
32090b8e 3713 return abfd->xvec;
244ffee7 3714}
This page took 0.246031 seconds and 4 git commands to generate.