1 /* ELF executable support for BFD.
2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
3 2001, 2002, 2003 Free Software Foundation, Inc.
5 Written by Fred Fish @ Cygnus Support, from information published
6 in "UNIX System V Release 4, Programmers Guide: ANSI C and
7 Programming Support Tools". Sufficient support for gdb.
9 Rewritten by Mark Eichin @ Cygnus Support, from information
10 published in "System V Application Binary Interface", chapters 4
11 and 5, as well as the various "Processor Supplement" documents
12 derived from it. Added support for assembler and other object file
13 utilities. Further work done by Ken Raeburn (Cygnus Support), Michael
14 Meissner (Open Software Foundation), and Peter Hoogenboom (University
15 of Utah) to finish and extend this.
17 This file is part of BFD, the Binary File Descriptor library.
19 This program is free software; you can redistribute it and/or modify
20 it under the terms of the GNU General Public License as published by
21 the Free Software Foundation; either version 2 of the License, or
22 (at your option) any later version.
24 This program is distributed in the hope that it will be useful,
25 but WITHOUT ANY WARRANTY; without even the implied warranty of
26 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
27 GNU General Public License for more details.
29 You should have received a copy of the GNU General Public License
30 along with this program; if not, write to the Free Software
31 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
33 /* Problems and other issues to resolve.
35 (1) BFD expects there to be some fixed number of "sections" in
36 the object file. I.E. there is a "section_count" variable in the
37 bfd structure which contains the number of sections. However, ELF
38 supports multiple "views" of a file. In particular, with current
39 implementations, executable files typically have two tables, a
40 program header table and a section header table, both of which
41 partition the executable.
43 In ELF-speak, the "linking view" of the file uses the section header
44 table to access "sections" within the file, and the "execution view"
45 uses the program header table to access "segments" within the file.
46 "Segments" typically may contain all the data from one or more
49 Note that the section header table is optional in ELF executables,
50 but it is this information that is most useful to gdb. If the
51 section header table is missing, then gdb should probably try
52 to make do with the program header table. (FIXME)
54 (2) The code in this file is compiled twice, once in 32-bit mode and
55 once in 64-bit mode. More of it should be made size-independent
58 (3) ELF section symbols are handled rather sloppily now. This should
59 be cleaned up, and ELF section symbols reconciled with BFD section
62 (4) We need a published spec for 64-bit ELF. We've got some stuff here
63 that we're using for SPARC V9 64-bit chips, but don't assume that
69 #include "libiberty.h"
74 /* Renaming structures, typedefs, macros and functions to be size-specific. */
75 #define Elf_External_Ehdr NAME(Elf,External_Ehdr)
76 #define Elf_External_Sym NAME(Elf,External_Sym)
77 #define Elf_External_Shdr NAME(Elf,External_Shdr)
78 #define Elf_External_Phdr NAME(Elf,External_Phdr)
79 #define Elf_External_Rel NAME(Elf,External_Rel)
80 #define Elf_External_Rela NAME(Elf,External_Rela)
81 #define Elf_External_Dyn NAME(Elf,External_Dyn)
83 #define elf_core_file_failing_command NAME(bfd_elf,core_file_failing_command)
84 #define elf_core_file_failing_signal NAME(bfd_elf,core_file_failing_signal)
85 #define elf_core_file_matches_executable_p \
86 NAME(bfd_elf,core_file_matches_executable_p)
87 #define elf_object_p NAME(bfd_elf,object_p)
88 #define elf_core_file_p NAME(bfd_elf,core_file_p)
89 #define elf_get_symtab_upper_bound NAME(bfd_elf,get_symtab_upper_bound)
90 #define elf_get_dynamic_symtab_upper_bound \
91 NAME(bfd_elf,get_dynamic_symtab_upper_bound)
92 #define elf_swap_reloc_in NAME(bfd_elf,swap_reloc_in)
93 #define elf_swap_reloca_in NAME(bfd_elf,swap_reloca_in)
94 #define elf_swap_reloc_out NAME(bfd_elf,swap_reloc_out)
95 #define elf_swap_reloca_out NAME(bfd_elf,swap_reloca_out)
96 #define elf_swap_symbol_in NAME(bfd_elf,swap_symbol_in)
97 #define elf_swap_symbol_out NAME(bfd_elf,swap_symbol_out)
98 #define elf_swap_phdr_in NAME(bfd_elf,swap_phdr_in)
99 #define elf_swap_phdr_out NAME(bfd_elf,swap_phdr_out)
100 #define elf_swap_dyn_in NAME(bfd_elf,swap_dyn_in)
101 #define elf_swap_dyn_out NAME(bfd_elf,swap_dyn_out)
102 #define elf_get_reloc_upper_bound NAME(bfd_elf,get_reloc_upper_bound)
103 #define elf_canonicalize_reloc NAME(bfd_elf,canonicalize_reloc)
104 #define elf_slurp_symbol_table NAME(bfd_elf,slurp_symbol_table)
105 #define elf_get_symtab NAME(bfd_elf,get_symtab)
106 #define elf_canonicalize_dynamic_symtab \
107 NAME(bfd_elf,canonicalize_dynamic_symtab)
108 #define elf_make_empty_symbol NAME(bfd_elf,make_empty_symbol)
109 #define elf_get_symbol_info NAME(bfd_elf,get_symbol_info)
110 #define elf_get_lineno NAME(bfd_elf,get_lineno)
111 #define elf_set_arch_mach NAME(bfd_elf,set_arch_mach)
112 #define elf_find_nearest_line NAME(bfd_elf,find_nearest_line)
113 #define elf_sizeof_headers NAME(bfd_elf,sizeof_headers)
114 #define elf_set_section_contents NAME(bfd_elf,set_section_contents)
115 #define elf_no_info_to_howto NAME(bfd_elf,no_info_to_howto)
116 #define elf_no_info_to_howto_rel NAME(bfd_elf,no_info_to_howto_rel)
117 #define elf_find_section NAME(bfd_elf,find_section)
118 #define elf_bfd_link_add_symbols NAME(bfd_elf,bfd_link_add_symbols)
119 #define elf_add_dynamic_entry NAME(bfd_elf,add_dynamic_entry)
120 #define elf_write_shdrs_and_ehdr NAME(bfd_elf,write_shdrs_and_ehdr)
121 #define elf_write_out_phdrs NAME(bfd_elf,write_out_phdrs)
122 #define elf_write_relocs NAME(bfd_elf,write_relocs)
123 #define elf_slurp_reloc_table NAME(bfd_elf,slurp_reloc_table)
124 #define elf_bfd_discard_info NAME(bfd_elf,discard_info)
125 #define elf_reloc_symbol_deleted_p NAME(_bfd_elf,reloc_symbol_deleted_p)
126 #define elf_link_record_dynamic_symbol _bfd_elf_link_record_dynamic_symbol
127 #define elf_bfd_final_link NAME(bfd_elf,bfd_final_link)
128 #define elf_gc_sections NAME(_bfd_elf,gc_sections)
129 #define elf_gc_common_finalize_got_offsets \
130 NAME(_bfd_elf,gc_common_finalize_got_offsets)
131 #define elf_gc_common_final_link NAME(_bfd_elf,gc_common_final_link)
132 #define elf_gc_record_vtinherit NAME(_bfd_elf,gc_record_vtinherit)
133 #define elf_gc_record_vtentry NAME(_bfd_elf,gc_record_vtentry)
134 #define elf_link_record_local_dynamic_symbol \
135 NAME(_bfd_elf,link_record_local_dynamic_symbol)
138 #define ELF_R_INFO(X,Y) ELF64_R_INFO(X,Y)
139 #define ELF_R_SYM(X) ELF64_R_SYM(X)
140 #define ELF_R_TYPE(X) ELF64_R_TYPE(X)
141 #define ELFCLASS ELFCLASS64
143 #define LOG_FILE_ALIGN 3
146 #define ELF_R_INFO(X,Y) ELF32_R_INFO(X,Y)
147 #define ELF_R_SYM(X) ELF32_R_SYM(X)
148 #define ELF_R_TYPE(X) ELF32_R_TYPE(X)
149 #define ELFCLASS ELFCLASS32
151 #define LOG_FILE_ALIGN 2
154 #define elf_stringtab_init _bfd_elf_stringtab_init
156 #define section_from_elf_index bfd_section_from_elf_index
159 static void elf_debug_section (int, Elf_Internal_Shdr
*);
160 static void elf_debug_file (Elf_Internal_Ehdr
*);
161 static char *elf_symbol_flags (flagword
);
164 /* Structure swapping routines */
166 /* Should perhaps use put_offset, put_word, etc. For now, the two versions
167 can be handled by explicitly specifying 32 bits or "the long type". */
169 #define H_PUT_WORD H_PUT_64
170 #define H_PUT_SIGNED_WORD H_PUT_S64
171 #define H_GET_WORD H_GET_64
172 #define H_GET_SIGNED_WORD H_GET_S64
175 #define H_PUT_WORD H_PUT_32
176 #define H_PUT_SIGNED_WORD H_PUT_S32
177 #define H_GET_WORD H_GET_32
178 #define H_GET_SIGNED_WORD H_GET_S32
181 /* Translate an ELF symbol in external format into an ELF symbol in internal
185 elf_swap_symbol_in (bfd
*abfd
,
188 Elf_Internal_Sym
*dst
)
190 const Elf_External_Sym
*src
= psrc
;
191 const Elf_External_Sym_Shndx
*shndx
= pshn
;
192 int signed_vma
= get_elf_backend_data (abfd
)->sign_extend_vma
;
194 dst
->st_name
= H_GET_32 (abfd
, src
->st_name
);
196 dst
->st_value
= H_GET_SIGNED_WORD (abfd
, src
->st_value
);
198 dst
->st_value
= H_GET_WORD (abfd
, src
->st_value
);
199 dst
->st_size
= H_GET_WORD (abfd
, src
->st_size
);
200 dst
->st_info
= H_GET_8 (abfd
, src
->st_info
);
201 dst
->st_other
= H_GET_8 (abfd
, src
->st_other
);
202 dst
->st_shndx
= H_GET_16 (abfd
, src
->st_shndx
);
203 if (dst
->st_shndx
== SHN_XINDEX
)
207 dst
->st_shndx
= H_GET_32 (abfd
, shndx
->est_shndx
);
211 /* Translate an ELF symbol in internal format into an ELF symbol in external
215 elf_swap_symbol_out (bfd
*abfd
,
216 const Elf_Internal_Sym
*src
,
221 Elf_External_Sym
*dst
= cdst
;
222 H_PUT_32 (abfd
, src
->st_name
, dst
->st_name
);
223 H_PUT_WORD (abfd
, src
->st_value
, dst
->st_value
);
224 H_PUT_WORD (abfd
, src
->st_size
, dst
->st_size
);
225 H_PUT_8 (abfd
, src
->st_info
, dst
->st_info
);
226 H_PUT_8 (abfd
, src
->st_other
, dst
->st_other
);
228 if (tmp
> SHN_HIRESERVE
)
232 H_PUT_32 (abfd
, tmp
, shndx
);
235 H_PUT_16 (abfd
, tmp
, dst
->st_shndx
);
238 /* Translate an ELF file header in external format into an ELF file header in
242 elf_swap_ehdr_in (bfd
*abfd
,
243 const Elf_External_Ehdr
*src
,
244 Elf_Internal_Ehdr
*dst
)
246 int signed_vma
= get_elf_backend_data (abfd
)->sign_extend_vma
;
247 memcpy (dst
->e_ident
, src
->e_ident
, EI_NIDENT
);
248 dst
->e_type
= H_GET_16 (abfd
, src
->e_type
);
249 dst
->e_machine
= H_GET_16 (abfd
, src
->e_machine
);
250 dst
->e_version
= H_GET_32 (abfd
, src
->e_version
);
252 dst
->e_entry
= H_GET_SIGNED_WORD (abfd
, src
->e_entry
);
254 dst
->e_entry
= H_GET_WORD (abfd
, src
->e_entry
);
255 dst
->e_phoff
= H_GET_WORD (abfd
, src
->e_phoff
);
256 dst
->e_shoff
= H_GET_WORD (abfd
, src
->e_shoff
);
257 dst
->e_flags
= H_GET_32 (abfd
, src
->e_flags
);
258 dst
->e_ehsize
= H_GET_16 (abfd
, src
->e_ehsize
);
259 dst
->e_phentsize
= H_GET_16 (abfd
, src
->e_phentsize
);
260 dst
->e_phnum
= H_GET_16 (abfd
, src
->e_phnum
);
261 dst
->e_shentsize
= H_GET_16 (abfd
, src
->e_shentsize
);
262 dst
->e_shnum
= H_GET_16 (abfd
, src
->e_shnum
);
263 dst
->e_shstrndx
= H_GET_16 (abfd
, src
->e_shstrndx
);
266 /* Translate an ELF file header in internal format into an ELF file header in
270 elf_swap_ehdr_out (bfd
*abfd
,
271 const Elf_Internal_Ehdr
*src
,
272 Elf_External_Ehdr
*dst
)
275 int signed_vma
= get_elf_backend_data (abfd
)->sign_extend_vma
;
276 memcpy (dst
->e_ident
, src
->e_ident
, EI_NIDENT
);
277 /* note that all elements of dst are *arrays of unsigned char* already... */
278 H_PUT_16 (abfd
, src
->e_type
, dst
->e_type
);
279 H_PUT_16 (abfd
, src
->e_machine
, dst
->e_machine
);
280 H_PUT_32 (abfd
, src
->e_version
, dst
->e_version
);
282 H_PUT_SIGNED_WORD (abfd
, src
->e_entry
, dst
->e_entry
);
284 H_PUT_WORD (abfd
, src
->e_entry
, dst
->e_entry
);
285 H_PUT_WORD (abfd
, src
->e_phoff
, dst
->e_phoff
);
286 H_PUT_WORD (abfd
, src
->e_shoff
, dst
->e_shoff
);
287 H_PUT_32 (abfd
, src
->e_flags
, dst
->e_flags
);
288 H_PUT_16 (abfd
, src
->e_ehsize
, dst
->e_ehsize
);
289 H_PUT_16 (abfd
, src
->e_phentsize
, dst
->e_phentsize
);
290 H_PUT_16 (abfd
, src
->e_phnum
, dst
->e_phnum
);
291 H_PUT_16 (abfd
, src
->e_shentsize
, dst
->e_shentsize
);
293 if (tmp
>= SHN_LORESERVE
)
295 H_PUT_16 (abfd
, tmp
, dst
->e_shnum
);
296 tmp
= src
->e_shstrndx
;
297 if (tmp
>= SHN_LORESERVE
)
299 H_PUT_16 (abfd
, tmp
, dst
->e_shstrndx
);
302 /* Translate an ELF section header table entry in external format into an
303 ELF section header table entry in internal format. */
306 elf_swap_shdr_in (bfd
*abfd
,
307 const Elf_External_Shdr
*src
,
308 Elf_Internal_Shdr
*dst
)
310 int signed_vma
= get_elf_backend_data (abfd
)->sign_extend_vma
;
312 dst
->sh_name
= H_GET_32 (abfd
, src
->sh_name
);
313 dst
->sh_type
= H_GET_32 (abfd
, src
->sh_type
);
314 dst
->sh_flags
= H_GET_WORD (abfd
, src
->sh_flags
);
316 dst
->sh_addr
= H_GET_SIGNED_WORD (abfd
, src
->sh_addr
);
318 dst
->sh_addr
= H_GET_WORD (abfd
, src
->sh_addr
);
319 dst
->sh_offset
= H_GET_WORD (abfd
, src
->sh_offset
);
320 dst
->sh_size
= H_GET_WORD (abfd
, src
->sh_size
);
321 dst
->sh_link
= H_GET_32 (abfd
, src
->sh_link
);
322 dst
->sh_info
= H_GET_32 (abfd
, src
->sh_info
);
323 dst
->sh_addralign
= H_GET_WORD (abfd
, src
->sh_addralign
);
324 dst
->sh_entsize
= H_GET_WORD (abfd
, src
->sh_entsize
);
325 dst
->bfd_section
= NULL
;
326 dst
->contents
= NULL
;
329 /* Translate an ELF section header table entry in internal format into an
330 ELF section header table entry in external format. */
333 elf_swap_shdr_out (bfd
*abfd
,
334 const Elf_Internal_Shdr
*src
,
335 Elf_External_Shdr
*dst
)
337 /* note that all elements of dst are *arrays of unsigned char* already... */
338 H_PUT_32 (abfd
, src
->sh_name
, dst
->sh_name
);
339 H_PUT_32 (abfd
, src
->sh_type
, dst
->sh_type
);
340 H_PUT_WORD (abfd
, src
->sh_flags
, dst
->sh_flags
);
341 H_PUT_WORD (abfd
, src
->sh_addr
, dst
->sh_addr
);
342 H_PUT_WORD (abfd
, src
->sh_offset
, dst
->sh_offset
);
343 H_PUT_WORD (abfd
, src
->sh_size
, dst
->sh_size
);
344 H_PUT_32 (abfd
, src
->sh_link
, dst
->sh_link
);
345 H_PUT_32 (abfd
, src
->sh_info
, dst
->sh_info
);
346 H_PUT_WORD (abfd
, src
->sh_addralign
, dst
->sh_addralign
);
347 H_PUT_WORD (abfd
, src
->sh_entsize
, dst
->sh_entsize
);
350 /* Translate an ELF program header table entry in external format into an
351 ELF program header table entry in internal format. */
354 elf_swap_phdr_in (bfd
*abfd
,
355 const Elf_External_Phdr
*src
,
356 Elf_Internal_Phdr
*dst
)
358 int signed_vma
= get_elf_backend_data (abfd
)->sign_extend_vma
;
360 dst
->p_type
= H_GET_32 (abfd
, src
->p_type
);
361 dst
->p_flags
= H_GET_32 (abfd
, src
->p_flags
);
362 dst
->p_offset
= H_GET_WORD (abfd
, src
->p_offset
);
365 dst
->p_vaddr
= H_GET_SIGNED_WORD (abfd
, src
->p_vaddr
);
366 dst
->p_paddr
= H_GET_SIGNED_WORD (abfd
, src
->p_paddr
);
370 dst
->p_vaddr
= H_GET_WORD (abfd
, src
->p_vaddr
);
371 dst
->p_paddr
= H_GET_WORD (abfd
, src
->p_paddr
);
373 dst
->p_filesz
= H_GET_WORD (abfd
, src
->p_filesz
);
374 dst
->p_memsz
= H_GET_WORD (abfd
, src
->p_memsz
);
375 dst
->p_align
= H_GET_WORD (abfd
, src
->p_align
);
379 elf_swap_phdr_out (bfd
*abfd
,
380 const Elf_Internal_Phdr
*src
,
381 Elf_External_Phdr
*dst
)
383 /* note that all elements of dst are *arrays of unsigned char* already... */
384 H_PUT_32 (abfd
, src
->p_type
, dst
->p_type
);
385 H_PUT_WORD (abfd
, src
->p_offset
, dst
->p_offset
);
386 H_PUT_WORD (abfd
, src
->p_vaddr
, dst
->p_vaddr
);
387 H_PUT_WORD (abfd
, src
->p_paddr
, dst
->p_paddr
);
388 H_PUT_WORD (abfd
, src
->p_filesz
, dst
->p_filesz
);
389 H_PUT_WORD (abfd
, src
->p_memsz
, dst
->p_memsz
);
390 H_PUT_32 (abfd
, src
->p_flags
, dst
->p_flags
);
391 H_PUT_WORD (abfd
, src
->p_align
, dst
->p_align
);
394 /* Translate an ELF reloc from external format to internal format. */
396 elf_swap_reloc_in (bfd
*abfd
,
398 Elf_Internal_Rela
*dst
)
400 const Elf_External_Rel
*src
= (const Elf_External_Rel
*) s
;
401 dst
->r_offset
= H_GET_WORD (abfd
, src
->r_offset
);
402 dst
->r_info
= H_GET_WORD (abfd
, src
->r_info
);
407 elf_swap_reloca_in (bfd
*abfd
,
409 Elf_Internal_Rela
*dst
)
411 const Elf_External_Rela
*src
= (const Elf_External_Rela
*) s
;
412 dst
->r_offset
= H_GET_WORD (abfd
, src
->r_offset
);
413 dst
->r_info
= H_GET_WORD (abfd
, src
->r_info
);
414 dst
->r_addend
= H_GET_SIGNED_WORD (abfd
, src
->r_addend
);
417 /* Translate an ELF reloc from internal format to external format. */
419 elf_swap_reloc_out (bfd
*abfd
,
420 const Elf_Internal_Rela
*src
,
423 Elf_External_Rel
*dst
= (Elf_External_Rel
*) d
;
424 H_PUT_WORD (abfd
, src
->r_offset
, dst
->r_offset
);
425 H_PUT_WORD (abfd
, src
->r_info
, dst
->r_info
);
429 elf_swap_reloca_out (bfd
*abfd
,
430 const Elf_Internal_Rela
*src
,
433 Elf_External_Rela
*dst
= (Elf_External_Rela
*) d
;
434 H_PUT_WORD (abfd
, src
->r_offset
, dst
->r_offset
);
435 H_PUT_WORD (abfd
, src
->r_info
, dst
->r_info
);
436 H_PUT_SIGNED_WORD (abfd
, src
->r_addend
, dst
->r_addend
);
440 elf_swap_dyn_in (bfd
*abfd
,
442 Elf_Internal_Dyn
*dst
)
444 const Elf_External_Dyn
*src
= p
;
446 dst
->d_tag
= H_GET_WORD (abfd
, src
->d_tag
);
447 dst
->d_un
.d_val
= H_GET_WORD (abfd
, src
->d_un
.d_val
);
451 elf_swap_dyn_out (bfd
*abfd
,
452 const Elf_Internal_Dyn
*src
,
455 Elf_External_Dyn
*dst
= p
;
457 H_PUT_WORD (abfd
, src
->d_tag
, dst
->d_tag
);
458 H_PUT_WORD (abfd
, src
->d_un
.d_val
, dst
->d_un
.d_val
);
461 /* ELF .o/exec file reading */
463 /* Begin processing a given object.
465 First we validate the file by reading in the ELF header and checking
468 static inline bfd_boolean
469 elf_file_p (Elf_External_Ehdr
*x_ehdrp
)
471 return ((x_ehdrp
->e_ident
[EI_MAG0
] == ELFMAG0
)
472 && (x_ehdrp
->e_ident
[EI_MAG1
] == ELFMAG1
)
473 && (x_ehdrp
->e_ident
[EI_MAG2
] == ELFMAG2
)
474 && (x_ehdrp
->e_ident
[EI_MAG3
] == ELFMAG3
));
477 /* Check to see if the file associated with ABFD matches the target vector
480 Note that we may be called several times with the same ABFD, but different
481 target vectors, most of which will not match. We have to avoid leaving
482 any side effects in ABFD, or any data it points to (like tdata), if the
483 file does not match the target vector. */
486 elf_object_p (bfd
*abfd
)
488 Elf_External_Ehdr x_ehdr
; /* Elf file header, external form */
489 Elf_Internal_Ehdr
*i_ehdrp
; /* Elf file header, internal form */
490 Elf_External_Shdr x_shdr
; /* Section header table entry, external form */
491 Elf_Internal_Shdr i_shdr
;
492 Elf_Internal_Shdr
*i_shdrp
; /* Section header table, internal form */
493 unsigned int shindex
;
494 char *shstrtab
; /* Internal copy of section header stringtab */
495 struct elf_backend_data
*ebd
;
496 struct bfd_preserve preserve
;
500 preserve
.marker
= NULL
;
502 /* Read in the ELF header in external format. */
504 if (bfd_bread (&x_ehdr
, sizeof (x_ehdr
), abfd
) != sizeof (x_ehdr
))
506 if (bfd_get_error () != bfd_error_system_call
)
507 goto got_wrong_format_error
;
512 /* Now check to see if we have a valid ELF file, and one that BFD can
513 make use of. The magic number must match, the address size ('class')
514 and byte-swapping must match our XVEC entry, and it must have a
515 section header table (FIXME: See comments re sections at top of this
518 if (! elf_file_p (&x_ehdr
)
519 || x_ehdr
.e_ident
[EI_VERSION
] != EV_CURRENT
520 || x_ehdr
.e_ident
[EI_CLASS
] != ELFCLASS
)
521 goto got_wrong_format_error
;
523 /* Check that file's byte order matches xvec's */
524 switch (x_ehdr
.e_ident
[EI_DATA
])
526 case ELFDATA2MSB
: /* Big-endian */
527 if (! bfd_header_big_endian (abfd
))
528 goto got_wrong_format_error
;
530 case ELFDATA2LSB
: /* Little-endian */
531 if (! bfd_header_little_endian (abfd
))
532 goto got_wrong_format_error
;
534 case ELFDATANONE
: /* No data encoding specified */
535 default: /* Unknown data encoding specified */
536 goto got_wrong_format_error
;
539 if (!bfd_preserve_save (abfd
, &preserve
))
542 /* Allocate an instance of the elf_obj_tdata structure and hook it up to
543 the tdata pointer in the bfd. */
545 if (! (*abfd
->xvec
->_bfd_set_format
[bfd_object
]) (abfd
))
547 preserve
.marker
= elf_tdata (abfd
);
549 /* Now that we know the byte order, swap in the rest of the header */
550 i_ehdrp
= elf_elfheader (abfd
);
551 elf_swap_ehdr_in (abfd
, &x_ehdr
, i_ehdrp
);
553 elf_debug_file (i_ehdrp
);
556 /* Reject ET_CORE (header indicates core file, not object file) */
557 if (i_ehdrp
->e_type
== ET_CORE
)
558 goto got_wrong_format_error
;
560 /* If this is a relocatable file and there is no section header
561 table, then we're hosed. */
562 if (i_ehdrp
->e_shoff
== 0 && i_ehdrp
->e_type
== ET_REL
)
563 goto got_wrong_format_error
;
565 /* As a simple sanity check, verify that the what BFD thinks is the
566 size of each section header table entry actually matches the size
567 recorded in the file, but only if there are any sections. */
568 if (i_ehdrp
->e_shentsize
!= sizeof (x_shdr
) && i_ehdrp
->e_shnum
!= 0)
569 goto got_wrong_format_error
;
571 /* Further sanity check. */
572 if (i_ehdrp
->e_shoff
== 0 && i_ehdrp
->e_shnum
!= 0)
573 goto got_wrong_format_error
;
575 ebd
= get_elf_backend_data (abfd
);
577 /* Check that the ELF e_machine field matches what this particular
578 BFD format expects. */
579 if (ebd
->elf_machine_code
!= i_ehdrp
->e_machine
580 && (ebd
->elf_machine_alt1
== 0
581 || i_ehdrp
->e_machine
!= ebd
->elf_machine_alt1
)
582 && (ebd
->elf_machine_alt2
== 0
583 || i_ehdrp
->e_machine
!= ebd
->elf_machine_alt2
))
585 const bfd_target
* const *target_ptr
;
587 if (ebd
->elf_machine_code
!= EM_NONE
)
588 goto got_wrong_format_error
;
590 /* This is the generic ELF target. Let it match any ELF target
591 for which we do not have a specific backend. */
592 for (target_ptr
= bfd_target_vector
; *target_ptr
!= NULL
; target_ptr
++)
594 struct elf_backend_data
*back
;
596 if ((*target_ptr
)->flavour
!= bfd_target_elf_flavour
)
598 back
= (struct elf_backend_data
*) (*target_ptr
)->backend_data
;
599 if (back
->elf_machine_code
== i_ehdrp
->e_machine
600 || (back
->elf_machine_alt1
!= 0
601 && back
->elf_machine_alt1
== i_ehdrp
->e_machine
)
602 || (back
->elf_machine_alt2
!= 0
603 && back
->elf_machine_alt2
== i_ehdrp
->e_machine
))
605 /* target_ptr is an ELF backend which matches this
606 object file, so reject the generic ELF target. */
607 goto got_wrong_format_error
;
612 if (i_ehdrp
->e_type
== ET_EXEC
)
613 abfd
->flags
|= EXEC_P
;
614 else if (i_ehdrp
->e_type
== ET_DYN
)
615 abfd
->flags
|= DYNAMIC
;
617 if (i_ehdrp
->e_phnum
> 0)
618 abfd
->flags
|= D_PAGED
;
620 if (! bfd_default_set_arch_mach (abfd
, ebd
->arch
, 0))
622 /* It's OK if this fails for the generic target. */
623 if (ebd
->elf_machine_code
!= EM_NONE
)
627 /* Remember the entry point specified in the ELF file header. */
628 bfd_set_start_address (abfd
, i_ehdrp
->e_entry
);
630 if (i_ehdrp
->e_shoff
!= 0)
632 /* Seek to the section header table in the file. */
633 if (bfd_seek (abfd
, (file_ptr
) i_ehdrp
->e_shoff
, SEEK_SET
) != 0)
636 /* Read the first section header at index 0, and convert to internal
638 if (bfd_bread (&x_shdr
, sizeof x_shdr
, abfd
) != sizeof (x_shdr
))
640 elf_swap_shdr_in (abfd
, &x_shdr
, &i_shdr
);
642 /* If the section count is zero, the actual count is in the first
644 if (i_ehdrp
->e_shnum
== SHN_UNDEF
)
645 i_ehdrp
->e_shnum
= i_shdr
.sh_size
;
647 /* And similarly for the string table index. */
648 if (i_ehdrp
->e_shstrndx
== SHN_XINDEX
)
649 i_ehdrp
->e_shstrndx
= i_shdr
.sh_link
;
652 /* Allocate space for a copy of the section header table in
654 if (i_ehdrp
->e_shnum
!= 0)
656 Elf_Internal_Shdr
*shdrp
;
657 unsigned int num_sec
;
659 amt
= sizeof (*i_shdrp
) * i_ehdrp
->e_shnum
;
660 i_shdrp
= bfd_alloc (abfd
, amt
);
663 num_sec
= i_ehdrp
->e_shnum
;
664 if (num_sec
> SHN_LORESERVE
)
665 num_sec
+= SHN_HIRESERVE
+ 1 - SHN_LORESERVE
;
666 elf_numsections (abfd
) = num_sec
;
667 amt
= sizeof (i_shdrp
) * num_sec
;
668 elf_elfsections (abfd
) = bfd_alloc (abfd
, amt
);
669 if (!elf_elfsections (abfd
))
672 memcpy (i_shdrp
, &i_shdr
, sizeof (*i_shdrp
));
675 if (num_sec
> SHN_LORESERVE
)
677 for ( ; shindex
< SHN_LORESERVE
; shindex
++)
678 elf_elfsections (abfd
)[shindex
] = shdrp
++;
679 for ( ; shindex
< SHN_HIRESERVE
+ 1; shindex
++)
680 elf_elfsections (abfd
)[shindex
] = i_shdrp
;
682 for ( ; shindex
< num_sec
; shindex
++)
683 elf_elfsections (abfd
)[shindex
] = shdrp
++;
685 /* Read in the rest of the section header table and convert it
687 for (shindex
= 1; shindex
< i_ehdrp
->e_shnum
; shindex
++)
689 if (bfd_bread (&x_shdr
, sizeof x_shdr
, abfd
) != sizeof (x_shdr
))
691 elf_swap_shdr_in (abfd
, &x_shdr
, i_shdrp
+ shindex
);
693 /* If the section is loaded, but not page aligned, clear
695 if (i_shdrp
[shindex
].sh_size
!= 0
696 && (i_shdrp
[shindex
].sh_flags
& SHF_ALLOC
) != 0
697 && i_shdrp
[shindex
].sh_type
!= SHT_NOBITS
698 && (((i_shdrp
[shindex
].sh_addr
- i_shdrp
[shindex
].sh_offset
)
701 abfd
->flags
&= ~D_PAGED
;
705 if (i_ehdrp
->e_shstrndx
&& i_ehdrp
->e_shoff
)
707 if (! bfd_section_from_shdr (abfd
, i_ehdrp
->e_shstrndx
))
711 /* Read in the program headers. */
712 if (i_ehdrp
->e_phnum
== 0)
713 elf_tdata (abfd
)->phdr
= NULL
;
716 Elf_Internal_Phdr
*i_phdr
;
719 amt
= i_ehdrp
->e_phnum
* sizeof (Elf_Internal_Phdr
);
720 elf_tdata (abfd
)->phdr
= bfd_alloc (abfd
, amt
);
721 if (elf_tdata (abfd
)->phdr
== NULL
)
723 if (bfd_seek (abfd
, (file_ptr
) i_ehdrp
->e_phoff
, SEEK_SET
) != 0)
725 i_phdr
= elf_tdata (abfd
)->phdr
;
726 for (i
= 0; i
< i_ehdrp
->e_phnum
; i
++, i_phdr
++)
728 Elf_External_Phdr x_phdr
;
730 if (bfd_bread (&x_phdr
, sizeof x_phdr
, abfd
) != sizeof x_phdr
)
732 elf_swap_phdr_in (abfd
, &x_phdr
, i_phdr
);
736 /* Read in the string table containing the names of the sections. We
737 will need the base pointer to this table later. */
738 /* We read this inline now, so that we don't have to go through
739 bfd_section_from_shdr with it (since this particular strtab is
740 used to find all of the ELF section names.) */
742 if (i_ehdrp
->e_shstrndx
!= 0 && i_ehdrp
->e_shoff
)
744 unsigned int num_sec
;
746 shstrtab
= bfd_elf_get_str_section (abfd
, i_ehdrp
->e_shstrndx
);
750 /* Once all of the section headers have been read and converted, we
751 can start processing them. Note that the first section header is
752 a dummy placeholder entry, so we ignore it. */
753 num_sec
= elf_numsections (abfd
);
754 for (shindex
= 1; shindex
< num_sec
; shindex
++)
756 if (! bfd_section_from_shdr (abfd
, shindex
))
758 if (shindex
== SHN_LORESERVE
- 1)
759 shindex
+= SHN_HIRESERVE
+ 1 - SHN_LORESERVE
;
763 /* Let the backend double check the format and override global
765 if (ebd
->elf_backend_object_p
)
767 if (! (*ebd
->elf_backend_object_p
) (abfd
))
768 goto got_wrong_format_error
;
771 /* If we have created any reloc sections that are associated with
772 debugging sections, mark the reloc sections as debugging as well. */
773 for (s
= abfd
->sections
; s
!= NULL
; s
= s
->next
)
775 if ((elf_section_data (s
)->this_hdr
.sh_type
== SHT_REL
776 || elf_section_data (s
)->this_hdr
.sh_type
== SHT_RELA
)
777 && elf_section_data (s
)->this_hdr
.sh_info
> 0)
779 unsigned long targ_index
;
782 targ_index
= elf_section_data (s
)->this_hdr
.sh_info
;
783 targ_sec
= bfd_section_from_elf_index (abfd
, targ_index
);
785 && (targ_sec
->flags
& SEC_DEBUGGING
) != 0)
786 s
->flags
|= SEC_DEBUGGING
;
790 bfd_preserve_finish (abfd
, &preserve
);
793 got_wrong_format_error
:
794 /* There is way too much undoing of half-known state here. The caller,
795 bfd_check_format_matches, really shouldn't iterate on live bfd's to
796 check match/no-match like it does. We have to rely on that a call to
797 bfd_default_set_arch_mach with the previously known mach, undoes what
798 was done by the first bfd_default_set_arch_mach (with mach 0) here.
799 For this to work, only elf-data and the mach may be changed by the
800 target-specific elf_backend_object_p function. Note that saving the
801 whole bfd here and restoring it would be even worse; the first thing
802 you notice is that the cached bfd file position gets out of sync. */
803 bfd_set_error (bfd_error_wrong_format
);
806 if (preserve
.marker
!= NULL
)
807 bfd_preserve_restore (abfd
, &preserve
);
811 /* ELF .o/exec file writing */
813 /* Write out the relocs. */
816 elf_write_relocs (bfd
*abfd
, asection
*sec
, void *data
)
818 bfd_boolean
*failedp
= data
;
819 Elf_Internal_Shdr
*rela_hdr
;
821 void (*swap_out
) PARAMS ((bfd
*, const Elf_Internal_Rela
*, bfd_byte
*));
828 /* If we have already failed, don't do anything. */
832 if ((sec
->flags
& SEC_RELOC
) == 0)
835 /* The linker backend writes the relocs out itself, and sets the
836 reloc_count field to zero to inhibit writing them here. Also,
837 sometimes the SEC_RELOC flag gets set even when there aren't any
839 if (sec
->reloc_count
== 0)
842 rela_hdr
= &elf_section_data (sec
)->rel_hdr
;
844 rela_hdr
->sh_size
= rela_hdr
->sh_entsize
* sec
->reloc_count
;
845 rela_hdr
->contents
= bfd_alloc (abfd
, rela_hdr
->sh_size
);
846 if (rela_hdr
->contents
== NULL
)
852 /* Figure out whether the relocations are RELA or REL relocations. */
853 if (rela_hdr
->sh_type
== SHT_RELA
)
855 swap_out
= elf_swap_reloca_out
;
856 extsize
= sizeof (Elf_External_Rela
);
858 else if (rela_hdr
->sh_type
== SHT_REL
)
860 swap_out
= elf_swap_reloc_out
;
861 extsize
= sizeof (Elf_External_Rel
);
864 /* Every relocation section should be either an SHT_RELA or an
868 /* The address of an ELF reloc is section relative for an object
869 file, and absolute for an executable file or shared library.
870 The address of a BFD reloc is always section relative. */
872 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) != 0)
873 addr_offset
= sec
->vma
;
875 /* orelocation has the data, reloc_count has the count... */
878 dst_rela
= rela_hdr
->contents
;
880 for (idx
= 0; idx
< sec
->reloc_count
; idx
++, dst_rela
+= extsize
)
882 Elf_Internal_Rela src_rela
;
887 ptr
= sec
->orelocation
[idx
];
888 sym
= *ptr
->sym_ptr_ptr
;
891 else if (bfd_is_abs_section (sym
->section
) && sym
->value
== 0)
896 n
= _bfd_elf_symbol_from_bfd_symbol (abfd
, &sym
);
905 if ((*ptr
->sym_ptr_ptr
)->the_bfd
!= NULL
906 && (*ptr
->sym_ptr_ptr
)->the_bfd
->xvec
!= abfd
->xvec
907 && ! _bfd_elf_validate_reloc (abfd
, ptr
))
913 src_rela
.r_offset
= ptr
->address
+ addr_offset
;
914 src_rela
.r_info
= ELF_R_INFO (n
, ptr
->howto
->type
);
915 src_rela
.r_addend
= ptr
->addend
;
916 (*swap_out
) (abfd
, &src_rela
, dst_rela
);
920 /* Write out the program headers. */
923 elf_write_out_phdrs (bfd
*abfd
,
924 const Elf_Internal_Phdr
*phdr
,
929 Elf_External_Phdr extphdr
;
930 elf_swap_phdr_out (abfd
, phdr
, &extphdr
);
931 if (bfd_bwrite (&extphdr
, sizeof (Elf_External_Phdr
), abfd
)
932 != sizeof (Elf_External_Phdr
))
939 /* Write out the section headers and the ELF file header. */
942 elf_write_shdrs_and_ehdr (bfd
*abfd
)
944 Elf_External_Ehdr x_ehdr
; /* Elf file header, external form */
945 Elf_Internal_Ehdr
*i_ehdrp
; /* Elf file header, internal form */
946 Elf_External_Shdr
*x_shdrp
; /* Section header table, external form */
947 Elf_Internal_Shdr
**i_shdrp
; /* Section header table, internal form */
951 i_ehdrp
= elf_elfheader (abfd
);
952 i_shdrp
= elf_elfsections (abfd
);
954 /* swap the header before spitting it out... */
957 elf_debug_file (i_ehdrp
);
959 elf_swap_ehdr_out (abfd
, i_ehdrp
, &x_ehdr
);
960 amt
= sizeof (x_ehdr
);
961 if (bfd_seek (abfd
, (file_ptr
) 0, SEEK_SET
) != 0
962 || bfd_bwrite (&x_ehdr
, amt
, abfd
) != amt
)
965 /* Some fields in the first section header handle overflow of ehdr
967 if (i_ehdrp
->e_shnum
>= SHN_LORESERVE
)
968 i_shdrp
[0]->sh_size
= i_ehdrp
->e_shnum
;
969 if (i_ehdrp
->e_shstrndx
>= SHN_LORESERVE
)
970 i_shdrp
[0]->sh_link
= i_ehdrp
->e_shstrndx
;
972 /* at this point we've concocted all the ELF sections... */
973 amt
= i_ehdrp
->e_shnum
;
974 amt
*= sizeof (*x_shdrp
);
975 x_shdrp
= bfd_alloc (abfd
, amt
);
979 for (count
= 0; count
< i_ehdrp
->e_shnum
; i_shdrp
++, count
++)
982 elf_debug_section (count
, *i_shdrp
);
984 elf_swap_shdr_out (abfd
, *i_shdrp
, x_shdrp
+ count
);
986 if (count
== SHN_LORESERVE
- 1)
987 i_shdrp
+= SHN_HIRESERVE
+ 1 - SHN_LORESERVE
;
989 if (bfd_seek (abfd
, (file_ptr
) i_ehdrp
->e_shoff
, SEEK_SET
) != 0
990 || bfd_bwrite (x_shdrp
, amt
, abfd
) != amt
)
993 /* need to dump the string table too... */
999 elf_slurp_symbol_table (bfd
*abfd
, asymbol
**symptrs
, bfd_boolean dynamic
)
1001 Elf_Internal_Shdr
*hdr
;
1002 Elf_Internal_Shdr
*verhdr
;
1003 unsigned long symcount
; /* Number of external ELF symbols */
1004 elf_symbol_type
*sym
; /* Pointer to current bfd symbol */
1005 elf_symbol_type
*symbase
; /* Buffer for generated bfd symbols */
1006 Elf_Internal_Sym
*isym
;
1007 Elf_Internal_Sym
*isymend
;
1008 Elf_Internal_Sym
*isymbuf
= NULL
;
1009 Elf_External_Versym
*xver
;
1010 Elf_External_Versym
*xverbuf
= NULL
;
1011 struct elf_backend_data
*ebd
;
1014 /* Read each raw ELF symbol, converting from external ELF form to
1015 internal ELF form, and then using the information to create a
1016 canonical bfd symbol table entry.
1018 Note that we allocate the initial bfd canonical symbol buffer
1019 based on a one-to-one mapping of the ELF symbols to canonical
1020 symbols. We actually use all the ELF symbols, so there will be no
1021 space left over at the end. When we have all the symbols, we
1022 build the caller's pointer vector. */
1026 hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1031 hdr
= &elf_tdata (abfd
)->dynsymtab_hdr
;
1032 if (elf_dynversym (abfd
) == 0)
1035 verhdr
= &elf_tdata (abfd
)->dynversym_hdr
;
1036 if ((elf_tdata (abfd
)->dynverdef_section
!= 0
1037 && elf_tdata (abfd
)->verdef
== NULL
)
1038 || (elf_tdata (abfd
)->dynverref_section
!= 0
1039 && elf_tdata (abfd
)->verref
== NULL
))
1041 if (! _bfd_elf_slurp_version_tables (abfd
))
1046 ebd
= get_elf_backend_data (abfd
);
1047 symcount
= hdr
->sh_size
/ sizeof (Elf_External_Sym
);
1049 sym
= symbase
= NULL
;
1052 isymbuf
= bfd_elf_get_elf_syms (abfd
, hdr
, symcount
, 0,
1054 if (isymbuf
== NULL
)
1058 amt
*= sizeof (elf_symbol_type
);
1059 symbase
= bfd_zalloc (abfd
, amt
);
1060 if (symbase
== (elf_symbol_type
*) NULL
)
1063 /* Read the raw ELF version symbol information. */
1065 && verhdr
->sh_size
/ sizeof (Elf_External_Versym
) != symcount
)
1067 (*_bfd_error_handler
)
1068 (_("%s: version count (%ld) does not match symbol count (%ld)"),
1070 (long) (verhdr
->sh_size
/ sizeof (Elf_External_Versym
)),
1073 /* Slurp in the symbols without the version information,
1074 since that is more helpful than just quitting. */
1080 if (bfd_seek (abfd
, verhdr
->sh_offset
, SEEK_SET
) != 0)
1083 xverbuf
= bfd_malloc (verhdr
->sh_size
);
1084 if (xverbuf
== NULL
&& verhdr
->sh_size
!= 0)
1087 if (bfd_bread (xverbuf
, verhdr
->sh_size
, abfd
) != verhdr
->sh_size
)
1091 /* Skip first symbol, which is a null dummy. */
1095 isymend
= isymbuf
+ symcount
;
1096 for (isym
= isymbuf
+ 1, sym
= symbase
; isym
< isymend
; isym
++, sym
++)
1098 memcpy (&sym
->internal_elf_sym
, isym
, sizeof (Elf_Internal_Sym
));
1099 sym
->symbol
.the_bfd
= abfd
;
1101 sym
->symbol
.name
= bfd_elf_string_from_elf_section (abfd
,
1105 sym
->symbol
.value
= isym
->st_value
;
1107 if (isym
->st_shndx
== SHN_UNDEF
)
1109 sym
->symbol
.section
= bfd_und_section_ptr
;
1111 else if (isym
->st_shndx
< SHN_LORESERVE
1112 || isym
->st_shndx
> SHN_HIRESERVE
)
1114 sym
->symbol
.section
= section_from_elf_index (abfd
,
1116 if (sym
->symbol
.section
== NULL
)
1118 /* This symbol is in a section for which we did not
1119 create a BFD section. Just use bfd_abs_section,
1120 although it is wrong. FIXME. */
1121 sym
->symbol
.section
= bfd_abs_section_ptr
;
1124 else if (isym
->st_shndx
== SHN_ABS
)
1126 sym
->symbol
.section
= bfd_abs_section_ptr
;
1128 else if (isym
->st_shndx
== SHN_COMMON
)
1130 sym
->symbol
.section
= bfd_com_section_ptr
;
1131 /* Elf puts the alignment into the `value' field, and
1132 the size into the `size' field. BFD wants to see the
1133 size in the value field, and doesn't care (at the
1134 moment) about the alignment. */
1135 sym
->symbol
.value
= isym
->st_size
;
1138 sym
->symbol
.section
= bfd_abs_section_ptr
;
1140 /* If this is a relocatable file, then the symbol value is
1141 already section relative. */
1142 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) != 0)
1143 sym
->symbol
.value
-= sym
->symbol
.section
->vma
;
1145 switch (ELF_ST_BIND (isym
->st_info
))
1148 sym
->symbol
.flags
|= BSF_LOCAL
;
1151 if (isym
->st_shndx
!= SHN_UNDEF
&& isym
->st_shndx
!= SHN_COMMON
)
1152 sym
->symbol
.flags
|= BSF_GLOBAL
;
1155 sym
->symbol
.flags
|= BSF_WEAK
;
1159 switch (ELF_ST_TYPE (isym
->st_info
))
1162 sym
->symbol
.flags
|= BSF_SECTION_SYM
| BSF_DEBUGGING
;
1165 sym
->symbol
.flags
|= BSF_FILE
| BSF_DEBUGGING
;
1168 sym
->symbol
.flags
|= BSF_FUNCTION
;
1171 sym
->symbol
.flags
|= BSF_OBJECT
;
1176 sym
->symbol
.flags
|= BSF_DYNAMIC
;
1180 Elf_Internal_Versym iversym
;
1182 _bfd_elf_swap_versym_in (abfd
, xver
, &iversym
);
1183 sym
->version
= iversym
.vs_vers
;
1187 /* Do some backend-specific processing on this symbol. */
1188 if (ebd
->elf_backend_symbol_processing
)
1189 (*ebd
->elf_backend_symbol_processing
) (abfd
, &sym
->symbol
);
1193 /* Do some backend-specific processing on this symbol table. */
1194 if (ebd
->elf_backend_symbol_table_processing
)
1195 (*ebd
->elf_backend_symbol_table_processing
) (abfd
, symbase
, symcount
);
1197 /* We rely on the zalloc to clear out the final symbol entry. */
1199 symcount
= sym
- symbase
;
1201 /* Fill in the user's symbol pointer vector if needed. */
1209 *symptrs
++ = &sym
->symbol
;
1212 *symptrs
= 0; /* Final null pointer */
1215 if (xverbuf
!= NULL
)
1217 if (isymbuf
!= NULL
&& hdr
->contents
!= (unsigned char *) isymbuf
)
1222 if (xverbuf
!= NULL
)
1224 if (isymbuf
!= NULL
&& hdr
->contents
!= (unsigned char *) isymbuf
)
1229 /* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
1233 elf_slurp_reloc_table_from_section (bfd
*abfd
,
1235 Elf_Internal_Shdr
*rel_hdr
,
1236 bfd_size_type reloc_count
,
1239 bfd_boolean dynamic
)
1241 struct elf_backend_data
* const ebd
= get_elf_backend_data (abfd
);
1242 void *allocated
= NULL
;
1243 bfd_byte
*native_relocs
;
1247 unsigned int symcount
;
1249 allocated
= bfd_malloc (rel_hdr
->sh_size
);
1250 if (allocated
== NULL
)
1253 if (bfd_seek (abfd
, rel_hdr
->sh_offset
, SEEK_SET
) != 0
1254 || (bfd_bread (allocated
, rel_hdr
->sh_size
, abfd
)
1255 != rel_hdr
->sh_size
))
1258 native_relocs
= allocated
;
1260 entsize
= rel_hdr
->sh_entsize
;
1261 BFD_ASSERT (entsize
== sizeof (Elf_External_Rel
)
1262 || entsize
== sizeof (Elf_External_Rela
));
1265 symcount
= bfd_get_dynamic_symcount (abfd
);
1267 symcount
= bfd_get_symcount (abfd
);
1269 for (i
= 0, relent
= relents
;
1271 i
++, relent
++, native_relocs
+= entsize
)
1273 Elf_Internal_Rela rela
;
1275 if (entsize
== sizeof (Elf_External_Rela
))
1276 elf_swap_reloca_in (abfd
, native_relocs
, &rela
);
1278 elf_swap_reloc_in (abfd
, native_relocs
, &rela
);
1280 /* The address of an ELF reloc is section relative for an object
1281 file, and absolute for an executable file or shared library.
1282 The address of a normal BFD reloc is always section relative,
1283 and the address of a dynamic reloc is absolute.. */
1284 if ((abfd
->flags
& (EXEC_P
| DYNAMIC
)) == 0 || dynamic
)
1285 relent
->address
= rela
.r_offset
;
1287 relent
->address
= rela
.r_offset
- asect
->vma
;
1289 if (ELF_R_SYM (rela
.r_info
) == 0)
1290 relent
->sym_ptr_ptr
= bfd_abs_section_ptr
->symbol_ptr_ptr
;
1291 else if (ELF_R_SYM (rela
.r_info
) > symcount
)
1293 (*_bfd_error_handler
)
1294 (_("%s(%s): relocation %d has invalid symbol index %ld"),
1295 abfd
->filename
, asect
->name
, i
, ELF_R_SYM (rela
.r_info
));
1296 relent
->sym_ptr_ptr
= bfd_abs_section
.symbol_ptr_ptr
;
1302 ps
= symbols
+ ELF_R_SYM (rela
.r_info
) - 1;
1305 /* Canonicalize ELF section symbols. FIXME: Why? */
1306 if ((s
->flags
& BSF_SECTION_SYM
) == 0)
1307 relent
->sym_ptr_ptr
= ps
;
1309 relent
->sym_ptr_ptr
= s
->section
->symbol_ptr_ptr
;
1312 relent
->addend
= rela
.r_addend
;
1314 if ((entsize
== sizeof (Elf_External_Rela
)
1315 && ebd
->elf_info_to_howto
!= NULL
)
1316 || ebd
->elf_info_to_howto_rel
== NULL
)
1317 (*ebd
->elf_info_to_howto
) (abfd
, relent
, &rela
);
1319 (*ebd
->elf_info_to_howto_rel
) (abfd
, relent
, &rela
);
1322 if (allocated
!= NULL
)
1328 if (allocated
!= NULL
)
1333 /* Read in and swap the external relocs. */
1336 elf_slurp_reloc_table (bfd
*abfd
,
1339 bfd_boolean dynamic
)
1341 struct bfd_elf_section_data
* const d
= elf_section_data (asect
);
1342 Elf_Internal_Shdr
*rel_hdr
;
1343 Elf_Internal_Shdr
*rel_hdr2
;
1344 bfd_size_type reloc_count
;
1345 bfd_size_type reloc_count2
;
1349 if (asect
->relocation
!= NULL
)
1354 if ((asect
->flags
& SEC_RELOC
) == 0
1355 || asect
->reloc_count
== 0)
1358 rel_hdr
= &d
->rel_hdr
;
1359 reloc_count
= NUM_SHDR_ENTRIES (rel_hdr
);
1360 rel_hdr2
= d
->rel_hdr2
;
1361 reloc_count2
= (rel_hdr2
? NUM_SHDR_ENTRIES (rel_hdr2
) : 0);
1363 BFD_ASSERT (asect
->reloc_count
== reloc_count
+ reloc_count2
);
1364 BFD_ASSERT (asect
->rel_filepos
== rel_hdr
->sh_offset
1365 || (rel_hdr2
&& asect
->rel_filepos
== rel_hdr2
->sh_offset
));
1370 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
1371 case because relocations against this section may use the
1372 dynamic symbol table, and in that case bfd_section_from_shdr
1373 in elf.c does not update the RELOC_COUNT. */
1374 if (asect
->_raw_size
== 0)
1377 rel_hdr
= &d
->this_hdr
;
1378 reloc_count
= NUM_SHDR_ENTRIES (rel_hdr
);
1383 amt
= (reloc_count
+ reloc_count2
) * sizeof (arelent
);
1384 relents
= bfd_alloc (abfd
, amt
);
1385 if (relents
== NULL
)
1388 if (!elf_slurp_reloc_table_from_section (abfd
, asect
,
1389 rel_hdr
, reloc_count
,
1395 && !elf_slurp_reloc_table_from_section (abfd
, asect
,
1396 rel_hdr2
, reloc_count2
,
1397 relents
+ reloc_count
,
1401 asect
->relocation
= relents
;
1407 elf_debug_section (int num
, Elf_Internal_Shdr
*hdr
)
1409 fprintf (stderr
, "\nSection#%d '%s' 0x%.8lx\n", num
,
1410 hdr
->bfd_section
!= NULL
? hdr
->bfd_section
->name
: "",
1413 "sh_name = %ld\tsh_type = %ld\tsh_flags = %ld\n",
1414 (long) hdr
->sh_name
,
1415 (long) hdr
->sh_type
,
1416 (long) hdr
->sh_flags
);
1418 "sh_addr = %ld\tsh_offset = %ld\tsh_size = %ld\n",
1419 (long) hdr
->sh_addr
,
1420 (long) hdr
->sh_offset
,
1421 (long) hdr
->sh_size
);
1423 "sh_link = %ld\tsh_info = %ld\tsh_addralign = %ld\n",
1424 (long) hdr
->sh_link
,
1425 (long) hdr
->sh_info
,
1426 (long) hdr
->sh_addralign
);
1427 fprintf (stderr
, "sh_entsize = %ld\n",
1428 (long) hdr
->sh_entsize
);
1433 elf_debug_file (Elf_Internal_Ehdr
*ehdrp
)
1435 fprintf (stderr
, "e_entry = 0x%.8lx\n", (long) ehdrp
->e_entry
);
1436 fprintf (stderr
, "e_phoff = %ld\n", (long) ehdrp
->e_phoff
);
1437 fprintf (stderr
, "e_phnum = %ld\n", (long) ehdrp
->e_phnum
);
1438 fprintf (stderr
, "e_phentsize = %ld\n", (long) ehdrp
->e_phentsize
);
1439 fprintf (stderr
, "e_shoff = %ld\n", (long) ehdrp
->e_shoff
);
1440 fprintf (stderr
, "e_shnum = %ld\n", (long) ehdrp
->e_shnum
);
1441 fprintf (stderr
, "e_shentsize = %ld\n", (long) ehdrp
->e_shentsize
);
1445 elf_symbol_flags (flagword flags
)
1447 static char buffer
[1024];
1450 if (flags
& BSF_LOCAL
)
1451 strcat (buffer
, " local");
1453 if (flags
& BSF_GLOBAL
)
1454 strcat (buffer
, " global");
1456 if (flags
& BSF_DEBUGGING
)
1457 strcat (buffer
, " debug");
1459 if (flags
& BSF_FUNCTION
)
1460 strcat (buffer
, " function");
1462 if (flags
& BSF_KEEP
)
1463 strcat (buffer
, " keep");
1465 if (flags
& BSF_KEEP_G
)
1466 strcat (buffer
, " keep_g");
1468 if (flags
& BSF_WEAK
)
1469 strcat (buffer
, " weak");
1471 if (flags
& BSF_SECTION_SYM
)
1472 strcat (buffer
, " section-sym");
1474 if (flags
& BSF_OLD_COMMON
)
1475 strcat (buffer
, " old-common");
1477 if (flags
& BSF_NOT_AT_END
)
1478 strcat (buffer
, " not-at-end");
1480 if (flags
& BSF_CONSTRUCTOR
)
1481 strcat (buffer
, " constructor");
1483 if (flags
& BSF_WARNING
)
1484 strcat (buffer
, " warning");
1486 if (flags
& BSF_INDIRECT
)
1487 strcat (buffer
, " indirect");
1489 if (flags
& BSF_FILE
)
1490 strcat (buffer
, " file");
1492 if (flags
& DYNAMIC
)
1493 strcat (buffer
, " dynamic");
1495 if (flags
& ~(BSF_LOCAL
1510 strcat (buffer
, " unknown-bits");
1516 /* Create a new BFD as if by bfd_openr. Rather than opening a file,
1517 reconstruct an ELF file by reading the segments out of remote memory
1518 based on the ELF file header at EHDR_VMA and the ELF program headers it
1519 points to. If not null, *LOADBASEP is filled in with the difference
1520 between the VMAs from which the segments were read, and the VMAs the
1521 file headers (and hence BFD's idea of each section's VMA) put them at.
1523 The function TARGET_READ_MEMORY is called to copy LEN bytes from the
1524 remote memory at target address VMA into the local buffer at MYADDR; it
1525 should return zero on success or an `errno' code on failure. TEMPL must
1526 be a BFD for a target with the word size and byte order found in the
1530 NAME(_bfd_elf
,bfd_from_remote_memory
)
1534 int (*target_read_memory
) (bfd_vma
, char *, int))
1536 Elf_External_Ehdr x_ehdr
; /* Elf file header, external form */
1537 Elf_Internal_Ehdr i_ehdr
; /* Elf file header, internal form */
1538 Elf_External_Phdr
*x_phdrs
;
1539 Elf_Internal_Phdr
*i_phdrs
, *last_phdr
;
1541 struct bfd_in_memory
*bim
;
1548 /* Read in the ELF header in external format. */
1549 err
= target_read_memory (ehdr_vma
, (char *) &x_ehdr
, sizeof x_ehdr
);
1552 bfd_set_error (bfd_error_system_call
);
1557 /* Now check to see if we have a valid ELF file, and one that BFD can
1558 make use of. The magic number must match, the address size ('class')
1559 and byte-swapping must match our XVEC entry. */
1561 if (! elf_file_p (&x_ehdr
)
1562 || x_ehdr
.e_ident
[EI_VERSION
] != EV_CURRENT
1563 || x_ehdr
.e_ident
[EI_CLASS
] != ELFCLASS
)
1565 bfd_set_error (bfd_error_wrong_format
);
1569 /* Check that file's byte order matches xvec's */
1570 switch (x_ehdr
.e_ident
[EI_DATA
])
1572 case ELFDATA2MSB
: /* Big-endian */
1573 if (! bfd_header_big_endian (templ
))
1575 bfd_set_error (bfd_error_wrong_format
);
1579 case ELFDATA2LSB
: /* Little-endian */
1580 if (! bfd_header_little_endian (templ
))
1582 bfd_set_error (bfd_error_wrong_format
);
1586 case ELFDATANONE
: /* No data encoding specified */
1587 default: /* Unknown data encoding specified */
1588 bfd_set_error (bfd_error_wrong_format
);
1592 elf_swap_ehdr_in (templ
, &x_ehdr
, &i_ehdr
);
1594 /* The file header tells where to find the program headers.
1595 These are what we use to actually choose what to read. */
1597 if (i_ehdr
.e_phentsize
!= sizeof (Elf_External_Phdr
) || i_ehdr
.e_phnum
== 0)
1599 bfd_set_error (bfd_error_wrong_format
);
1603 x_phdrs
= bfd_malloc (i_ehdr
.e_phnum
* (sizeof *x_phdrs
+ sizeof *i_phdrs
));
1604 if (x_phdrs
== NULL
)
1606 bfd_set_error (bfd_error_no_memory
);
1609 err
= target_read_memory (ehdr_vma
+ i_ehdr
.e_phoff
, (char *) x_phdrs
,
1610 i_ehdr
.e_phnum
* sizeof x_phdrs
[0]);
1614 bfd_set_error (bfd_error_system_call
);
1618 i_phdrs
= (Elf_Internal_Phdr
*) &x_phdrs
[i_ehdr
.e_phnum
];
1622 loadbase
= ehdr_vma
;
1623 for (i
= 0; i
< i_ehdr
.e_phnum
; ++i
)
1625 elf_swap_phdr_in (templ
, &x_phdrs
[i
], &i_phdrs
[i
]);
1626 if (i_phdrs
[i
].p_type
== PT_LOAD
)
1628 bfd_vma segment_end
;
1629 segment_end
= (i_phdrs
[i
].p_offset
+ i_phdrs
[i
].p_filesz
1630 + i_phdrs
[i
].p_align
- 1) & -i_phdrs
[i
].p_align
;
1631 if (segment_end
> (bfd_vma
) contents_size
)
1632 contents_size
= segment_end
;
1634 if ((i_phdrs
[i
].p_offset
& -i_phdrs
[i
].p_align
) == 0)
1635 loadbase
= ehdr_vma
- (i_phdrs
[i
].p_vaddr
& -i_phdrs
[i
].p_align
);
1637 last_phdr
= &i_phdrs
[i
];
1640 if (last_phdr
== NULL
)
1642 /* There were no PT_LOAD segments, so we don't have anything to read. */
1644 bfd_set_error (bfd_error_wrong_format
);
1648 /* Trim the last segment so we don't bother with zeros in the last page
1649 that are off the end of the file. However, if the extra bit in that
1650 page includes the section headers, keep them. */
1651 if ((bfd_vma
) contents_size
> last_phdr
->p_offset
+ last_phdr
->p_filesz
1652 && (bfd_vma
) contents_size
>= (i_ehdr
.e_shoff
1653 + i_ehdr
.e_shnum
* i_ehdr
.e_shentsize
))
1655 contents_size
= last_phdr
->p_offset
+ last_phdr
->p_filesz
;
1656 if ((bfd_vma
) contents_size
< (i_ehdr
.e_shoff
1657 + i_ehdr
.e_shnum
* i_ehdr
.e_shentsize
))
1658 contents_size
= i_ehdr
.e_shoff
+ i_ehdr
.e_shnum
* i_ehdr
.e_shentsize
;
1661 contents_size
= last_phdr
->p_offset
+ last_phdr
->p_filesz
;
1663 /* Now we know the size of the whole image we want read in. */
1664 contents
= bfd_zmalloc (contents_size
);
1665 if (contents
== NULL
)
1668 bfd_set_error (bfd_error_no_memory
);
1672 for (i
= 0; i
< i_ehdr
.e_phnum
; ++i
)
1673 if (i_phdrs
[i
].p_type
== PT_LOAD
)
1675 bfd_vma start
= i_phdrs
[i
].p_offset
& -i_phdrs
[i
].p_align
;
1676 bfd_vma end
= (i_phdrs
[i
].p_offset
+ i_phdrs
[i
].p_filesz
1677 + i_phdrs
[i
].p_align
- 1) & -i_phdrs
[i
].p_align
;
1678 if (end
> (bfd_vma
) contents_size
)
1679 end
= contents_size
;
1680 err
= target_read_memory ((loadbase
+ i_phdrs
[i
].p_vaddr
)
1681 & -i_phdrs
[i
].p_align
,
1682 contents
+ start
, end
- start
);
1687 bfd_set_error (bfd_error_system_call
);
1694 /* If the segments visible in memory didn't include the section headers,
1695 then clear them from the file header. */
1696 if ((bfd_vma
) contents_size
< (i_ehdr
.e_shoff
1697 + i_ehdr
.e_shnum
* i_ehdr
.e_shentsize
))
1699 memset (&x_ehdr
.e_shoff
, 0, sizeof x_ehdr
.e_shoff
);
1700 memset (&x_ehdr
.e_shnum
, 0, sizeof x_ehdr
.e_shnum
);
1701 memset (&x_ehdr
.e_shstrndx
, 0, sizeof x_ehdr
.e_shstrndx
);
1704 /* This will normally have been in the first PT_LOAD segment. But it
1705 conceivably could be missing, and we might have just changed it. */
1706 memcpy (contents
, &x_ehdr
, sizeof x_ehdr
);
1708 /* Now we have a memory image of the ELF file contents. Make a BFD. */
1709 bim
= bfd_malloc (sizeof (struct bfd_in_memory
));
1713 bfd_set_error (bfd_error_no_memory
);
1716 nbfd
= _bfd_new_bfd ();
1721 bfd_set_error (bfd_error_no_memory
);
1724 nbfd
->filename
= "<in-memory>";
1725 nbfd
->xvec
= templ
->xvec
;
1726 bim
->size
= contents_size
;
1727 bim
->buffer
= contents
;
1728 nbfd
->iostream
= bim
;
1729 nbfd
->flags
= BFD_IN_MEMORY
;
1730 nbfd
->direction
= read_direction
;
1731 nbfd
->mtime
= time (NULL
);
1732 nbfd
->mtime_set
= TRUE
;
1735 *loadbasep
= loadbase
;
1739 #include "elfcore.h"
1740 #include "elflink.h"
1742 /* Size-dependent data and functions. */
1743 const struct elf_size_info
NAME(_bfd_elf
,size_info
) = {
1744 sizeof (Elf_External_Ehdr
),
1745 sizeof (Elf_External_Phdr
),
1746 sizeof (Elf_External_Shdr
),
1747 sizeof (Elf_External_Rel
),
1748 sizeof (Elf_External_Rela
),
1749 sizeof (Elf_External_Sym
),
1750 sizeof (Elf_External_Dyn
),
1751 sizeof (Elf_External_Note
),
1754 ARCH_SIZE
, LOG_FILE_ALIGN
,
1755 ELFCLASS
, EV_CURRENT
,
1756 elf_write_out_phdrs
,
1757 elf_write_shdrs_and_ehdr
,
1760 elf_swap_symbol_out
,
1761 elf_slurp_reloc_table
,
1762 elf_slurp_symbol_table
,