Commit | Line | Data |
---|---|---|
eac338cf | 1 | /* VxWorks support for ELF |
4b95cf5c | 2 | Copyright (C) 2005-2014 Free Software Foundation, Inc. |
eac338cf PB |
3 | |
4 | This file is part of BFD, the Binary File Descriptor library. | |
5 | ||
6 | This program is free software; you can redistribute it and/or modify | |
7 | it under the terms of the GNU General Public License as published by | |
cd123cb7 | 8 | the Free Software Foundation; either version 3 of the License, or |
eac338cf PB |
9 | (at your option) any later version. |
10 | ||
11 | This program is distributed in the hope that it will be useful, | |
12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | GNU General Public License for more details. | |
15 | ||
16 | You should have received a copy of the GNU General Public License | |
17 | along with this program; if not, write to the Free Software | |
cd123cb7 NC |
18 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, |
19 | MA 02111-1307, USA. */ | |
eac338cf PB |
20 | |
21 | /* This file provides routines used by all VxWorks targets. */ | |
22 | ||
eac338cf | 23 | #include "sysdep.h" |
3db64b00 | 24 | #include "bfd.h" |
eac338cf PB |
25 | #include "libbfd.h" |
26 | #include "elf-bfd.h" | |
27 | #include "elf-vxworks.h" | |
4d2c0abd | 28 | #include "elf/vxworks.h" |
eac338cf | 29 | |
55e6e397 RS |
30 | /* Return true if symbol NAME, as defined by ABFD, is one of the special |
31 | __GOTT_BASE__ or __GOTT_INDEX__ symbols. */ | |
32 | ||
33 | static bfd_boolean | |
34 | elf_vxworks_gott_symbol_p (bfd *abfd, const char *name) | |
35 | { | |
36 | char leading; | |
37 | ||
38 | leading = bfd_get_symbol_leading_char (abfd); | |
39 | if (leading) | |
40 | { | |
41 | if (*name != leading) | |
42 | return FALSE; | |
43 | name++; | |
44 | } | |
45 | return (strcmp (name, "__GOTT_BASE__") == 0 | |
46 | || strcmp (name, "__GOTT_INDEX__") == 0); | |
47 | } | |
48 | ||
eac338cf PB |
49 | /* Tweak magic VxWorks symbols as they are loaded. */ |
50 | bfd_boolean | |
55e6e397 | 51 | elf_vxworks_add_symbol_hook (bfd *abfd, |
eac338cf PB |
52 | struct bfd_link_info *info, |
53 | Elf_Internal_Sym *sym, | |
54 | const char **namep, | |
55 | flagword *flagsp, | |
56 | asection **secp ATTRIBUTE_UNUSED, | |
57 | bfd_vma *valp ATTRIBUTE_UNUSED) | |
58 | { | |
59 | /* Ideally these "magic" symbols would be exported by libc.so.1 | |
60 | which would be found via a DT_NEEDED tag, and then handled | |
61 | specially by the linker at runtime. Except shared libraries | |
62 | don't even link to libc.so.1 by default... | |
63 | If the symbol is imported from, or will be put in a shared library, | |
64 | give the symbol weak binding to get the desired samantics. | |
65 | This transformation will be undone in | |
66 | elf_i386_vxworks_link_output_symbol_hook. */ | |
67 | if ((info->shared || abfd->flags & DYNAMIC) | |
55e6e397 | 68 | && elf_vxworks_gott_symbol_p (abfd, *namep)) |
eac338cf PB |
69 | { |
70 | sym->st_info = ELF_ST_INFO (STB_WEAK, ELF_ST_TYPE (sym->st_info)); | |
71 | *flagsp |= BSF_WEAK; | |
72 | } | |
73 | ||
74 | return TRUE; | |
75 | } | |
76 | ||
711de32c RS |
77 | /* Perform VxWorks-specific handling of the create_dynamic_sections hook. |
78 | When creating an executable, set *SRELPLT2_OUT to the .rel(a).plt.unloaded | |
79 | section. */ | |
80 | ||
81 | bfd_boolean | |
82 | elf_vxworks_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info, | |
83 | asection **srelplt2_out) | |
84 | { | |
85 | struct elf_link_hash_table *htab; | |
86 | const struct elf_backend_data *bed; | |
87 | asection *s; | |
88 | ||
89 | htab = elf_hash_table (info); | |
90 | bed = get_elf_backend_data (dynobj); | |
91 | ||
92 | if (!info->shared) | |
93 | { | |
3d4d4302 AM |
94 | s = bfd_make_section_anyway_with_flags (dynobj, |
95 | bed->default_use_rela_p | |
96 | ? ".rela.plt.unloaded" | |
97 | : ".rel.plt.unloaded", | |
98 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | |
99 | | SEC_READONLY | |
100 | | SEC_LINKER_CREATED); | |
711de32c RS |
101 | if (s == NULL |
102 | || !bfd_set_section_alignment (dynobj, s, bed->s->log_file_align)) | |
103 | return FALSE; | |
104 | ||
105 | *srelplt2_out = s; | |
106 | } | |
107 | ||
108 | /* Mark the GOT and PLT symbols as having relocations; they might | |
109 | not, but we won't know for sure until we build the GOT in | |
110 | finish_dynamic_symbol. Also make sure that the GOT symbol | |
111 | is entered into the dynamic symbol table; the loader uses it | |
112 | to initialize __GOTT_BASE__[__GOTT_INDEX__]. */ | |
113 | if (htab->hgot) | |
114 | { | |
115 | htab->hgot->indx = -2; | |
116 | htab->hgot->other &= ~ELF_ST_VISIBILITY (-1); | |
117 | htab->hgot->forced_local = 0; | |
118 | if (!bfd_elf_link_record_dynamic_symbol (info, htab->hgot)) | |
119 | return FALSE; | |
120 | } | |
121 | if (htab->hplt) | |
122 | { | |
123 | htab->hplt->indx = -2; | |
124 | htab->hplt->type = STT_FUNC; | |
125 | } | |
126 | ||
127 | return TRUE; | |
128 | } | |
eac338cf PB |
129 | |
130 | /* Tweak magic VxWorks symbols as they are written to the output file. */ | |
6e0b88f1 | 131 | int |
9c72ff84 RS |
132 | elf_vxworks_link_output_symbol_hook (struct bfd_link_info *info |
133 | ATTRIBUTE_UNUSED, | |
134 | const char *name, | |
135 | Elf_Internal_Sym *sym, | |
136 | asection *input_sec ATTRIBUTE_UNUSED, | |
55e6e397 | 137 | struct elf_link_hash_entry *h) |
eac338cf PB |
138 | { |
139 | /* Reverse the effects of the hack in elf_vxworks_add_symbol_hook. */ | |
55e6e397 RS |
140 | if (h |
141 | && h->root.type == bfd_link_hash_undefweak | |
142 | && elf_vxworks_gott_symbol_p (h->root.u.undef.abfd, name)) | |
eac338cf PB |
143 | sym->st_info = ELF_ST_INFO (STB_GLOBAL, ELF_ST_TYPE (sym->st_info)); |
144 | ||
6e0b88f1 | 145 | return 1; |
eac338cf PB |
146 | } |
147 | ||
6b60be10 | 148 | /* Copy relocations into the output file. Fixes up relocations against PLT |
eac338cf PB |
149 | entries, then calls the generic routine. */ |
150 | ||
151 | bfd_boolean | |
152 | elf_vxworks_emit_relocs (bfd *output_bfd, | |
153 | asection *input_section, | |
154 | Elf_Internal_Shdr *input_rel_hdr, | |
155 | Elf_Internal_Rela *internal_relocs, | |
156 | struct elf_link_hash_entry **rel_hash) | |
157 | { | |
158 | const struct elf_backend_data *bed; | |
eac338cf PB |
159 | int j; |
160 | ||
161 | bed = get_elf_backend_data (output_bfd); | |
162 | ||
6b60be10 | 163 | if (output_bfd->flags & (DYNAMIC|EXEC_P)) |
eac338cf | 164 | { |
6b60be10 NS |
165 | Elf_Internal_Rela *irela; |
166 | Elf_Internal_Rela *irelaend; | |
167 | struct elf_link_hash_entry **hash_ptr; | |
168 | ||
169 | for (irela = internal_relocs, | |
170 | irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr) | |
171 | * bed->s->int_rels_per_ext_rel), | |
172 | hash_ptr = rel_hash; | |
173 | irela < irelaend; | |
174 | irela += bed->s->int_rels_per_ext_rel, | |
175 | hash_ptr++) | |
eac338cf | 176 | { |
6b60be10 NS |
177 | if (*hash_ptr |
178 | && (*hash_ptr)->def_dynamic | |
179 | && !(*hash_ptr)->def_regular | |
180 | && ((*hash_ptr)->root.type == bfd_link_hash_defined | |
181 | || (*hash_ptr)->root.type == bfd_link_hash_defweak) | |
182 | && (*hash_ptr)->root.u.def.section->output_section != NULL) | |
eac338cf | 183 | { |
6b60be10 NS |
184 | /* This is a relocation from an executable or shared |
185 | library against a symbol in a different shared | |
186 | library. We are creating a definition in the output | |
187 | file but it does not come from any of our normal (.o) | |
188 | files. ie. a PLT stub. Normally this would be a | |
189 | relocation against against SHN_UNDEF with the VMA of | |
190 | the PLT stub. This upsets the VxWorks loader. | |
191 | Convert it to a section-relative relocation. This | |
192 | gets some other symbols (for instance .dynbss), but | |
193 | is conservatively correct. */ | |
194 | for (j = 0; j < bed->s->int_rels_per_ext_rel; j++) | |
195 | { | |
196 | asection *sec = (*hash_ptr)->root.u.def.section; | |
197 | int this_idx = sec->output_section->target_index; | |
68ffbac6 | 198 | |
6b60be10 NS |
199 | irela[j].r_info |
200 | = ELF32_R_INFO (this_idx, ELF32_R_TYPE (irela[j].r_info)); | |
201 | irela[j].r_addend += (*hash_ptr)->root.u.def.value; | |
202 | irela[j].r_addend += sec->output_offset; | |
203 | } | |
204 | /* Stop the generic routine adjusting this entry. */ | |
205 | *hash_ptr = NULL; | |
eac338cf | 206 | } |
eac338cf | 207 | } |
eac338cf PB |
208 | } |
209 | return _bfd_elf_link_output_relocs (output_bfd, input_section, | |
210 | input_rel_hdr, internal_relocs, | |
211 | rel_hash); | |
212 | } | |
213 | ||
214 | ||
215 | /* Set the sh_link and sh_info fields on the static plt relocation secton. */ | |
216 | ||
217 | void | |
218 | elf_vxworks_final_write_processing (bfd *abfd, | |
219 | bfd_boolean linker ATTRIBUTE_UNUSED) | |
220 | { | |
221 | asection * sec; | |
222 | struct bfd_elf_section_data *d; | |
223 | ||
224 | sec = bfd_get_section_by_name (abfd, ".rel.plt.unloaded"); | |
9d8504b1 PB |
225 | if (!sec) |
226 | sec = bfd_get_section_by_name (abfd, ".rela.plt.unloaded"); | |
eac338cf PB |
227 | if (!sec) |
228 | return; | |
229 | d = elf_section_data (sec); | |
12bd6957 | 230 | d->this_hdr.sh_link = elf_onesymtab (abfd); |
eac338cf PB |
231 | sec = bfd_get_section_by_name (abfd, ".plt"); |
232 | if (sec) | |
233 | d->this_hdr.sh_info = elf_section_data (sec)->this_idx; | |
234 | } | |
4d2c0abd NS |
235 | |
236 | /* Add the dynamic entries required by VxWorks. These point to the | |
237 | tls sections. */ | |
238 | ||
239 | bfd_boolean | |
240 | elf_vxworks_add_dynamic_entries (bfd *output_bfd, struct bfd_link_info *info) | |
241 | { | |
242 | if (bfd_get_section_by_name (output_bfd, ".tls_data")) | |
243 | { | |
244 | if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_START, 0) | |
245 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_SIZE, 0) | |
246 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_ALIGN, 0)) | |
247 | return FALSE; | |
248 | } | |
249 | if (bfd_get_section_by_name (output_bfd, ".tls_vars")) | |
250 | { | |
251 | if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_START, 0) | |
252 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_SIZE, 0)) | |
253 | return FALSE; | |
254 | } | |
255 | return TRUE; | |
256 | } | |
257 | ||
258 | /* If *DYN is one of the VxWorks-specific dynamic entries, then fill | |
259 | in the value now and return TRUE. Otherwise return FALSE. */ | |
260 | ||
261 | bfd_boolean | |
262 | elf_vxworks_finish_dynamic_entry (bfd *output_bfd, Elf_Internal_Dyn *dyn) | |
263 | { | |
264 | asection *sec; | |
68ffbac6 | 265 | |
4d2c0abd NS |
266 | switch (dyn->d_tag) |
267 | { | |
268 | default: | |
269 | return FALSE; | |
68ffbac6 | 270 | |
4d2c0abd NS |
271 | case DT_VX_WRS_TLS_DATA_START: |
272 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
273 | dyn->d_un.d_ptr = sec->vma; | |
274 | break; | |
68ffbac6 | 275 | |
4d2c0abd NS |
276 | case DT_VX_WRS_TLS_DATA_SIZE: |
277 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
278 | dyn->d_un.d_val = sec->size; | |
279 | break; | |
68ffbac6 | 280 | |
4d2c0abd NS |
281 | case DT_VX_WRS_TLS_DATA_ALIGN: |
282 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
283 | dyn->d_un.d_val | |
a0f49396 NC |
284 | = (bfd_size_type)1 << bfd_get_section_alignment (output_bfd, |
285 | sec); | |
4d2c0abd | 286 | break; |
68ffbac6 | 287 | |
4d2c0abd NS |
288 | case DT_VX_WRS_TLS_VARS_START: |
289 | sec = bfd_get_section_by_name (output_bfd, ".tls_vars"); | |
290 | dyn->d_un.d_ptr = sec->vma; | |
291 | break; | |
68ffbac6 | 292 | |
4d2c0abd NS |
293 | case DT_VX_WRS_TLS_VARS_SIZE: |
294 | sec = bfd_get_section_by_name (output_bfd, ".tls_vars"); | |
295 | dyn->d_un.d_val = sec->size; | |
296 | break; | |
297 | } | |
298 | return TRUE; | |
299 | } | |
300 | ||
301 |