Define bfd_elf32_get_synthetic_symtab for x32
[deliverable/binutils-gdb.git] / bfd / elf-vxworks.c
CommitLineData
eac338cf 1/* VxWorks support for ELF
4b95cf5c 2 Copyright (C) 2005-2014 Free Software Foundation, Inc.
eac338cf
PB
3
4 This file is part of BFD, the Binary File Descriptor library.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
cd123cb7 8 the Free Software Foundation; either version 3 of the License, or
eac338cf
PB
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
cd123cb7
NC
18 Foundation, Inc., 59 Temple Place - Suite 330, Boston,
19 MA 02111-1307, USA. */
eac338cf
PB
20
21/* This file provides routines used by all VxWorks targets. */
22
eac338cf 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
eac338cf
PB
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf-vxworks.h"
4d2c0abd 28#include "elf/vxworks.h"
eac338cf 29
55e6e397
RS
30/* Return true if symbol NAME, as defined by ABFD, is one of the special
31 __GOTT_BASE__ or __GOTT_INDEX__ symbols. */
32
33static bfd_boolean
34elf_vxworks_gott_symbol_p (bfd *abfd, const char *name)
35{
36 char leading;
37
38 leading = bfd_get_symbol_leading_char (abfd);
39 if (leading)
40 {
41 if (*name != leading)
42 return FALSE;
43 name++;
44 }
45 return (strcmp (name, "__GOTT_BASE__") == 0
46 || strcmp (name, "__GOTT_INDEX__") == 0);
47}
48
eac338cf
PB
49/* Tweak magic VxWorks symbols as they are loaded. */
50bfd_boolean
55e6e397 51elf_vxworks_add_symbol_hook (bfd *abfd,
eac338cf
PB
52 struct bfd_link_info *info,
53 Elf_Internal_Sym *sym,
54 const char **namep,
55 flagword *flagsp,
56 asection **secp ATTRIBUTE_UNUSED,
57 bfd_vma *valp ATTRIBUTE_UNUSED)
58{
59 /* Ideally these "magic" symbols would be exported by libc.so.1
60 which would be found via a DT_NEEDED tag, and then handled
61 specially by the linker at runtime. Except shared libraries
62 don't even link to libc.so.1 by default...
63 If the symbol is imported from, or will be put in a shared library,
64 give the symbol weak binding to get the desired samantics.
65 This transformation will be undone in
66 elf_i386_vxworks_link_output_symbol_hook. */
67 if ((info->shared || abfd->flags & DYNAMIC)
55e6e397 68 && elf_vxworks_gott_symbol_p (abfd, *namep))
eac338cf
PB
69 {
70 sym->st_info = ELF_ST_INFO (STB_WEAK, ELF_ST_TYPE (sym->st_info));
71 *flagsp |= BSF_WEAK;
72 }
73
74 return TRUE;
75}
76
711de32c
RS
77/* Perform VxWorks-specific handling of the create_dynamic_sections hook.
78 When creating an executable, set *SRELPLT2_OUT to the .rel(a).plt.unloaded
79 section. */
80
81bfd_boolean
82elf_vxworks_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info,
83 asection **srelplt2_out)
84{
85 struct elf_link_hash_table *htab;
86 const struct elf_backend_data *bed;
87 asection *s;
88
89 htab = elf_hash_table (info);
90 bed = get_elf_backend_data (dynobj);
91
92 if (!info->shared)
93 {
3d4d4302
AM
94 s = bfd_make_section_anyway_with_flags (dynobj,
95 bed->default_use_rela_p
96 ? ".rela.plt.unloaded"
97 : ".rel.plt.unloaded",
98 SEC_HAS_CONTENTS | SEC_IN_MEMORY
99 | SEC_READONLY
100 | SEC_LINKER_CREATED);
711de32c
RS
101 if (s == NULL
102 || !bfd_set_section_alignment (dynobj, s, bed->s->log_file_align))
103 return FALSE;
104
105 *srelplt2_out = s;
106 }
107
108 /* Mark the GOT and PLT symbols as having relocations; they might
109 not, but we won't know for sure until we build the GOT in
110 finish_dynamic_symbol. Also make sure that the GOT symbol
111 is entered into the dynamic symbol table; the loader uses it
112 to initialize __GOTT_BASE__[__GOTT_INDEX__]. */
113 if (htab->hgot)
114 {
115 htab->hgot->indx = -2;
116 htab->hgot->other &= ~ELF_ST_VISIBILITY (-1);
117 htab->hgot->forced_local = 0;
118 if (!bfd_elf_link_record_dynamic_symbol (info, htab->hgot))
119 return FALSE;
120 }
121 if (htab->hplt)
122 {
123 htab->hplt->indx = -2;
124 htab->hplt->type = STT_FUNC;
125 }
126
127 return TRUE;
128}
eac338cf
PB
129
130/* Tweak magic VxWorks symbols as they are written to the output file. */
6e0b88f1 131int
9c72ff84
RS
132elf_vxworks_link_output_symbol_hook (struct bfd_link_info *info
133 ATTRIBUTE_UNUSED,
134 const char *name,
135 Elf_Internal_Sym *sym,
136 asection *input_sec ATTRIBUTE_UNUSED,
55e6e397 137 struct elf_link_hash_entry *h)
eac338cf
PB
138{
139 /* Reverse the effects of the hack in elf_vxworks_add_symbol_hook. */
55e6e397
RS
140 if (h
141 && h->root.type == bfd_link_hash_undefweak
142 && elf_vxworks_gott_symbol_p (h->root.u.undef.abfd, name))
eac338cf
PB
143 sym->st_info = ELF_ST_INFO (STB_GLOBAL, ELF_ST_TYPE (sym->st_info));
144
6e0b88f1 145 return 1;
eac338cf
PB
146}
147
6b60be10 148/* Copy relocations into the output file. Fixes up relocations against PLT
eac338cf
PB
149 entries, then calls the generic routine. */
150
151bfd_boolean
152elf_vxworks_emit_relocs (bfd *output_bfd,
153 asection *input_section,
154 Elf_Internal_Shdr *input_rel_hdr,
155 Elf_Internal_Rela *internal_relocs,
156 struct elf_link_hash_entry **rel_hash)
157{
158 const struct elf_backend_data *bed;
eac338cf
PB
159 int j;
160
161 bed = get_elf_backend_data (output_bfd);
162
6b60be10 163 if (output_bfd->flags & (DYNAMIC|EXEC_P))
eac338cf 164 {
6b60be10
NS
165 Elf_Internal_Rela *irela;
166 Elf_Internal_Rela *irelaend;
167 struct elf_link_hash_entry **hash_ptr;
168
169 for (irela = internal_relocs,
170 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
171 * bed->s->int_rels_per_ext_rel),
172 hash_ptr = rel_hash;
173 irela < irelaend;
174 irela += bed->s->int_rels_per_ext_rel,
175 hash_ptr++)
eac338cf 176 {
6b60be10
NS
177 if (*hash_ptr
178 && (*hash_ptr)->def_dynamic
179 && !(*hash_ptr)->def_regular
180 && ((*hash_ptr)->root.type == bfd_link_hash_defined
181 || (*hash_ptr)->root.type == bfd_link_hash_defweak)
182 && (*hash_ptr)->root.u.def.section->output_section != NULL)
eac338cf 183 {
6b60be10
NS
184 /* This is a relocation from an executable or shared
185 library against a symbol in a different shared
186 library. We are creating a definition in the output
187 file but it does not come from any of our normal (.o)
188 files. ie. a PLT stub. Normally this would be a
189 relocation against against SHN_UNDEF with the VMA of
190 the PLT stub. This upsets the VxWorks loader.
191 Convert it to a section-relative relocation. This
192 gets some other symbols (for instance .dynbss), but
193 is conservatively correct. */
194 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
195 {
196 asection *sec = (*hash_ptr)->root.u.def.section;
197 int this_idx = sec->output_section->target_index;
68ffbac6 198
6b60be10
NS
199 irela[j].r_info
200 = ELF32_R_INFO (this_idx, ELF32_R_TYPE (irela[j].r_info));
201 irela[j].r_addend += (*hash_ptr)->root.u.def.value;
202 irela[j].r_addend += sec->output_offset;
203 }
204 /* Stop the generic routine adjusting this entry. */
205 *hash_ptr = NULL;
eac338cf 206 }
eac338cf 207 }
eac338cf
PB
208 }
209 return _bfd_elf_link_output_relocs (output_bfd, input_section,
210 input_rel_hdr, internal_relocs,
211 rel_hash);
212}
213
214
215/* Set the sh_link and sh_info fields on the static plt relocation secton. */
216
217void
218elf_vxworks_final_write_processing (bfd *abfd,
219 bfd_boolean linker ATTRIBUTE_UNUSED)
220{
221 asection * sec;
222 struct bfd_elf_section_data *d;
223
224 sec = bfd_get_section_by_name (abfd, ".rel.plt.unloaded");
9d8504b1
PB
225 if (!sec)
226 sec = bfd_get_section_by_name (abfd, ".rela.plt.unloaded");
eac338cf
PB
227 if (!sec)
228 return;
229 d = elf_section_data (sec);
12bd6957 230 d->this_hdr.sh_link = elf_onesymtab (abfd);
eac338cf
PB
231 sec = bfd_get_section_by_name (abfd, ".plt");
232 if (sec)
233 d->this_hdr.sh_info = elf_section_data (sec)->this_idx;
234}
4d2c0abd
NS
235
236/* Add the dynamic entries required by VxWorks. These point to the
237 tls sections. */
238
239bfd_boolean
240elf_vxworks_add_dynamic_entries (bfd *output_bfd, struct bfd_link_info *info)
241{
242 if (bfd_get_section_by_name (output_bfd, ".tls_data"))
243 {
244 if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_START, 0)
245 || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_SIZE, 0)
246 || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_ALIGN, 0))
247 return FALSE;
248 }
249 if (bfd_get_section_by_name (output_bfd, ".tls_vars"))
250 {
251 if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_START, 0)
252 || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_SIZE, 0))
253 return FALSE;
254 }
255 return TRUE;
256}
257
258/* If *DYN is one of the VxWorks-specific dynamic entries, then fill
259 in the value now and return TRUE. Otherwise return FALSE. */
260
261bfd_boolean
262elf_vxworks_finish_dynamic_entry (bfd *output_bfd, Elf_Internal_Dyn *dyn)
263{
264 asection *sec;
68ffbac6 265
4d2c0abd
NS
266 switch (dyn->d_tag)
267 {
268 default:
269 return FALSE;
68ffbac6 270
4d2c0abd
NS
271 case DT_VX_WRS_TLS_DATA_START:
272 sec = bfd_get_section_by_name (output_bfd, ".tls_data");
273 dyn->d_un.d_ptr = sec->vma;
274 break;
68ffbac6 275
4d2c0abd
NS
276 case DT_VX_WRS_TLS_DATA_SIZE:
277 sec = bfd_get_section_by_name (output_bfd, ".tls_data");
278 dyn->d_un.d_val = sec->size;
279 break;
68ffbac6 280
4d2c0abd
NS
281 case DT_VX_WRS_TLS_DATA_ALIGN:
282 sec = bfd_get_section_by_name (output_bfd, ".tls_data");
283 dyn->d_un.d_val
a0f49396
NC
284 = (bfd_size_type)1 << bfd_get_section_alignment (output_bfd,
285 sec);
4d2c0abd 286 break;
68ffbac6 287
4d2c0abd
NS
288 case DT_VX_WRS_TLS_VARS_START:
289 sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
290 dyn->d_un.d_ptr = sec->vma;
291 break;
68ffbac6 292
4d2c0abd
NS
293 case DT_VX_WRS_TLS_VARS_SIZE:
294 sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
295 dyn->d_un.d_val = sec->size;
296 break;
297 }
298 return TRUE;
299}
300
301
This page took 0.466703 seconds and 4 git commands to generate.