Commit | Line | Data |
---|---|---|
eac338cf | 1 | /* VxWorks support for ELF |
3db64b00 | 2 | Copyright 2005, 2007 Free Software Foundation, Inc. |
eac338cf PB |
3 | |
4 | This file is part of BFD, the Binary File Descriptor library. | |
5 | ||
6 | This program is free software; you can redistribute it and/or modify | |
7 | it under the terms of the GNU General Public License as published by | |
cd123cb7 | 8 | the Free Software Foundation; either version 3 of the License, or |
eac338cf PB |
9 | (at your option) any later version. |
10 | ||
11 | This program is distributed in the hope that it will be useful, | |
12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | GNU General Public License for more details. | |
15 | ||
16 | You should have received a copy of the GNU General Public License | |
17 | along with this program; if not, write to the Free Software | |
cd123cb7 NC |
18 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, |
19 | MA 02111-1307, USA. */ | |
eac338cf PB |
20 | |
21 | /* This file provides routines used by all VxWorks targets. */ | |
22 | ||
eac338cf | 23 | #include "sysdep.h" |
3db64b00 | 24 | #include "bfd.h" |
eac338cf PB |
25 | #include "libbfd.h" |
26 | #include "elf-bfd.h" | |
27 | #include "elf-vxworks.h" | |
4d2c0abd | 28 | #include "elf/vxworks.h" |
eac338cf | 29 | |
55e6e397 RS |
30 | /* Return true if symbol NAME, as defined by ABFD, is one of the special |
31 | __GOTT_BASE__ or __GOTT_INDEX__ symbols. */ | |
32 | ||
33 | static bfd_boolean | |
34 | elf_vxworks_gott_symbol_p (bfd *abfd, const char *name) | |
35 | { | |
36 | char leading; | |
37 | ||
38 | leading = bfd_get_symbol_leading_char (abfd); | |
39 | if (leading) | |
40 | { | |
41 | if (*name != leading) | |
42 | return FALSE; | |
43 | name++; | |
44 | } | |
45 | return (strcmp (name, "__GOTT_BASE__") == 0 | |
46 | || strcmp (name, "__GOTT_INDEX__") == 0); | |
47 | } | |
48 | ||
eac338cf PB |
49 | /* Tweak magic VxWorks symbols as they are loaded. */ |
50 | bfd_boolean | |
55e6e397 | 51 | elf_vxworks_add_symbol_hook (bfd *abfd, |
eac338cf PB |
52 | struct bfd_link_info *info, |
53 | Elf_Internal_Sym *sym, | |
54 | const char **namep, | |
55 | flagword *flagsp, | |
56 | asection **secp ATTRIBUTE_UNUSED, | |
57 | bfd_vma *valp ATTRIBUTE_UNUSED) | |
58 | { | |
59 | /* Ideally these "magic" symbols would be exported by libc.so.1 | |
60 | which would be found via a DT_NEEDED tag, and then handled | |
61 | specially by the linker at runtime. Except shared libraries | |
62 | don't even link to libc.so.1 by default... | |
63 | If the symbol is imported from, or will be put in a shared library, | |
64 | give the symbol weak binding to get the desired samantics. | |
65 | This transformation will be undone in | |
66 | elf_i386_vxworks_link_output_symbol_hook. */ | |
67 | if ((info->shared || abfd->flags & DYNAMIC) | |
55e6e397 | 68 | && elf_vxworks_gott_symbol_p (abfd, *namep)) |
eac338cf PB |
69 | { |
70 | sym->st_info = ELF_ST_INFO (STB_WEAK, ELF_ST_TYPE (sym->st_info)); | |
71 | *flagsp |= BSF_WEAK; | |
72 | } | |
73 | ||
74 | return TRUE; | |
75 | } | |
76 | ||
711de32c RS |
77 | /* Perform VxWorks-specific handling of the create_dynamic_sections hook. |
78 | When creating an executable, set *SRELPLT2_OUT to the .rel(a).plt.unloaded | |
79 | section. */ | |
80 | ||
81 | bfd_boolean | |
82 | elf_vxworks_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info, | |
83 | asection **srelplt2_out) | |
84 | { | |
85 | struct elf_link_hash_table *htab; | |
86 | const struct elf_backend_data *bed; | |
87 | asection *s; | |
88 | ||
89 | htab = elf_hash_table (info); | |
90 | bed = get_elf_backend_data (dynobj); | |
91 | ||
92 | if (!info->shared) | |
93 | { | |
94 | s = bfd_make_section_with_flags (dynobj, | |
95 | bed->default_use_rela_p | |
96 | ? ".rela.plt.unloaded" | |
97 | : ".rel.plt.unloaded", | |
98 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | |
99 | | SEC_READONLY | SEC_LINKER_CREATED); | |
100 | if (s == NULL | |
101 | || !bfd_set_section_alignment (dynobj, s, bed->s->log_file_align)) | |
102 | return FALSE; | |
103 | ||
104 | *srelplt2_out = s; | |
105 | } | |
106 | ||
107 | /* Mark the GOT and PLT symbols as having relocations; they might | |
108 | not, but we won't know for sure until we build the GOT in | |
109 | finish_dynamic_symbol. Also make sure that the GOT symbol | |
110 | is entered into the dynamic symbol table; the loader uses it | |
111 | to initialize __GOTT_BASE__[__GOTT_INDEX__]. */ | |
112 | if (htab->hgot) | |
113 | { | |
114 | htab->hgot->indx = -2; | |
115 | htab->hgot->other &= ~ELF_ST_VISIBILITY (-1); | |
116 | htab->hgot->forced_local = 0; | |
117 | if (!bfd_elf_link_record_dynamic_symbol (info, htab->hgot)) | |
118 | return FALSE; | |
119 | } | |
120 | if (htab->hplt) | |
121 | { | |
122 | htab->hplt->indx = -2; | |
123 | htab->hplt->type = STT_FUNC; | |
124 | } | |
125 | ||
126 | return TRUE; | |
127 | } | |
eac338cf PB |
128 | |
129 | /* Tweak magic VxWorks symbols as they are written to the output file. */ | |
6e0b88f1 | 130 | int |
9c72ff84 RS |
131 | elf_vxworks_link_output_symbol_hook (struct bfd_link_info *info |
132 | ATTRIBUTE_UNUSED, | |
133 | const char *name, | |
134 | Elf_Internal_Sym *sym, | |
135 | asection *input_sec ATTRIBUTE_UNUSED, | |
55e6e397 | 136 | struct elf_link_hash_entry *h) |
eac338cf PB |
137 | { |
138 | /* Reverse the effects of the hack in elf_vxworks_add_symbol_hook. */ | |
55e6e397 RS |
139 | if (h |
140 | && h->root.type == bfd_link_hash_undefweak | |
141 | && elf_vxworks_gott_symbol_p (h->root.u.undef.abfd, name)) | |
eac338cf PB |
142 | sym->st_info = ELF_ST_INFO (STB_GLOBAL, ELF_ST_TYPE (sym->st_info)); |
143 | ||
6e0b88f1 | 144 | return 1; |
eac338cf PB |
145 | } |
146 | ||
6b60be10 | 147 | /* Copy relocations into the output file. Fixes up relocations against PLT |
eac338cf PB |
148 | entries, then calls the generic routine. */ |
149 | ||
150 | bfd_boolean | |
151 | elf_vxworks_emit_relocs (bfd *output_bfd, | |
152 | asection *input_section, | |
153 | Elf_Internal_Shdr *input_rel_hdr, | |
154 | Elf_Internal_Rela *internal_relocs, | |
155 | struct elf_link_hash_entry **rel_hash) | |
156 | { | |
157 | const struct elf_backend_data *bed; | |
eac338cf PB |
158 | int j; |
159 | ||
160 | bed = get_elf_backend_data (output_bfd); | |
161 | ||
6b60be10 | 162 | if (output_bfd->flags & (DYNAMIC|EXEC_P)) |
eac338cf | 163 | { |
6b60be10 NS |
164 | Elf_Internal_Rela *irela; |
165 | Elf_Internal_Rela *irelaend; | |
166 | struct elf_link_hash_entry **hash_ptr; | |
167 | ||
168 | for (irela = internal_relocs, | |
169 | irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr) | |
170 | * bed->s->int_rels_per_ext_rel), | |
171 | hash_ptr = rel_hash; | |
172 | irela < irelaend; | |
173 | irela += bed->s->int_rels_per_ext_rel, | |
174 | hash_ptr++) | |
eac338cf | 175 | { |
6b60be10 NS |
176 | if (*hash_ptr |
177 | && (*hash_ptr)->def_dynamic | |
178 | && !(*hash_ptr)->def_regular | |
179 | && ((*hash_ptr)->root.type == bfd_link_hash_defined | |
180 | || (*hash_ptr)->root.type == bfd_link_hash_defweak) | |
181 | && (*hash_ptr)->root.u.def.section->output_section != NULL) | |
eac338cf | 182 | { |
6b60be10 NS |
183 | /* This is a relocation from an executable or shared |
184 | library against a symbol in a different shared | |
185 | library. We are creating a definition in the output | |
186 | file but it does not come from any of our normal (.o) | |
187 | files. ie. a PLT stub. Normally this would be a | |
188 | relocation against against SHN_UNDEF with the VMA of | |
189 | the PLT stub. This upsets the VxWorks loader. | |
190 | Convert it to a section-relative relocation. This | |
191 | gets some other symbols (for instance .dynbss), but | |
192 | is conservatively correct. */ | |
193 | for (j = 0; j < bed->s->int_rels_per_ext_rel; j++) | |
194 | { | |
195 | asection *sec = (*hash_ptr)->root.u.def.section; | |
196 | int this_idx = sec->output_section->target_index; | |
197 | ||
198 | irela[j].r_info | |
199 | = ELF32_R_INFO (this_idx, ELF32_R_TYPE (irela[j].r_info)); | |
200 | irela[j].r_addend += (*hash_ptr)->root.u.def.value; | |
201 | irela[j].r_addend += sec->output_offset; | |
202 | } | |
203 | /* Stop the generic routine adjusting this entry. */ | |
204 | *hash_ptr = NULL; | |
eac338cf | 205 | } |
eac338cf | 206 | } |
eac338cf PB |
207 | } |
208 | return _bfd_elf_link_output_relocs (output_bfd, input_section, | |
209 | input_rel_hdr, internal_relocs, | |
210 | rel_hash); | |
211 | } | |
212 | ||
213 | ||
214 | /* Set the sh_link and sh_info fields on the static plt relocation secton. */ | |
215 | ||
216 | void | |
217 | elf_vxworks_final_write_processing (bfd *abfd, | |
218 | bfd_boolean linker ATTRIBUTE_UNUSED) | |
219 | { | |
220 | asection * sec; | |
221 | struct bfd_elf_section_data *d; | |
222 | ||
223 | sec = bfd_get_section_by_name (abfd, ".rel.plt.unloaded"); | |
9d8504b1 PB |
224 | if (!sec) |
225 | sec = bfd_get_section_by_name (abfd, ".rela.plt.unloaded"); | |
eac338cf PB |
226 | if (!sec) |
227 | return; | |
228 | d = elf_section_data (sec); | |
229 | d->this_hdr.sh_link = elf_tdata (abfd)->symtab_section; | |
230 | sec = bfd_get_section_by_name (abfd, ".plt"); | |
231 | if (sec) | |
232 | d->this_hdr.sh_info = elf_section_data (sec)->this_idx; | |
233 | } | |
4d2c0abd NS |
234 | |
235 | /* Add the dynamic entries required by VxWorks. These point to the | |
236 | tls sections. */ | |
237 | ||
238 | bfd_boolean | |
239 | elf_vxworks_add_dynamic_entries (bfd *output_bfd, struct bfd_link_info *info) | |
240 | { | |
241 | if (bfd_get_section_by_name (output_bfd, ".tls_data")) | |
242 | { | |
243 | if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_START, 0) | |
244 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_SIZE, 0) | |
245 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_ALIGN, 0)) | |
246 | return FALSE; | |
247 | } | |
248 | if (bfd_get_section_by_name (output_bfd, ".tls_vars")) | |
249 | { | |
250 | if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_START, 0) | |
251 | || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_SIZE, 0)) | |
252 | return FALSE; | |
253 | } | |
254 | return TRUE; | |
255 | } | |
256 | ||
257 | /* If *DYN is one of the VxWorks-specific dynamic entries, then fill | |
258 | in the value now and return TRUE. Otherwise return FALSE. */ | |
259 | ||
260 | bfd_boolean | |
261 | elf_vxworks_finish_dynamic_entry (bfd *output_bfd, Elf_Internal_Dyn *dyn) | |
262 | { | |
263 | asection *sec; | |
264 | ||
265 | switch (dyn->d_tag) | |
266 | { | |
267 | default: | |
268 | return FALSE; | |
269 | ||
270 | case DT_VX_WRS_TLS_DATA_START: | |
271 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
272 | dyn->d_un.d_ptr = sec->vma; | |
273 | break; | |
274 | ||
275 | case DT_VX_WRS_TLS_DATA_SIZE: | |
276 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
277 | dyn->d_un.d_val = sec->size; | |
278 | break; | |
279 | ||
280 | case DT_VX_WRS_TLS_DATA_ALIGN: | |
281 | sec = bfd_get_section_by_name (output_bfd, ".tls_data"); | |
282 | dyn->d_un.d_val | |
283 | = (bfd_size_type)1 << bfd_get_section_alignment (abfd, sec); | |
284 | break; | |
285 | ||
286 | case DT_VX_WRS_TLS_VARS_START: | |
287 | sec = bfd_get_section_by_name (output_bfd, ".tls_vars"); | |
288 | dyn->d_un.d_ptr = sec->vma; | |
289 | break; | |
290 | ||
291 | case DT_VX_WRS_TLS_VARS_SIZE: | |
292 | sec = bfd_get_section_by_name (output_bfd, ".tls_vars"); | |
293 | dyn->d_un.d_val = sec->size; | |
294 | break; | |
295 | } | |
296 | return TRUE; | |
297 | } | |
298 | ||
299 |