Coverage Report

Created: 2025-06-24 06:45

/src/binutils-gdb/bfd/elf-vxworks.c
Line
Count
Source (jump to first uncovered line)
1
/* VxWorks support for ELF
2
   Copyright (C) 2005-2025 Free Software Foundation, Inc.
3
4
   This file is part of BFD, the Binary File Descriptor library.
5
6
   This program is free software; you can redistribute it and/or modify
7
   it under the terms of the GNU General Public License as published by
8
   the Free Software Foundation; either version 3 of the License, or
9
   (at your option) any later version.
10
11
   This program is distributed in the hope that it will be useful,
12
   but WITHOUT ANY WARRANTY; without even the implied warranty of
13
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14
   GNU General Public License for more details.
15
16
   You should have received a copy of the GNU General Public License
17
   along with this program.  If not, see <http://www.gnu.org/licenses/>.  */
18
19
/* This file provides routines used by all VxWorks targets.  */
20
21
#include "sysdep.h"
22
#include "bfd.h"
23
#include "libbfd.h"
24
#include "elf-bfd.h"
25
#include "elf-vxworks.h"
26
#include "elf/vxworks.h"
27
28
/* Return true if symbol NAME, as defined by ABFD, is one of the special
29
   __GOTT_BASE__ or __GOTT_INDEX__ symbols.  */
30
31
static bool
32
elf_vxworks_gott_symbol_p (bfd *abfd, const char *name)
33
0
{
34
0
  char leading;
35
36
0
  leading = bfd_get_symbol_leading_char (abfd);
37
0
  if (leading)
38
0
    {
39
0
      if (*name != leading)
40
0
  return false;
41
0
      name++;
42
0
    }
43
0
  return (strcmp (name, "__GOTT_BASE__") == 0
44
0
    || strcmp (name, "__GOTT_INDEX__") == 0);
45
0
}
46
47
/* Tweak magic VxWorks symbols as they are loaded.  */
48
bool
49
elf_vxworks_add_symbol_hook (bfd *abfd,
50
           struct bfd_link_info *info,
51
           Elf_Internal_Sym *sym,
52
           const char **namep,
53
           flagword *flagsp,
54
           asection **secp ATTRIBUTE_UNUSED,
55
           bfd_vma *valp ATTRIBUTE_UNUSED)
56
0
{
57
  /* Ideally these "magic" symbols would be exported by libc.so.1
58
     which would be found via a DT_NEEDED tag, and then handled
59
     specially by the linker at runtime.  Except shared libraries
60
     don't even link to libc.so.1 by default...
61
     If the symbol is imported from, or will be put in a shared library,
62
     give the symbol weak binding to get the desired samantics.
63
     This transformation will be undone in
64
     elf_i386_vxworks_link_output_symbol_hook. */
65
0
  if ((bfd_link_pic (info) || abfd->flags & DYNAMIC)
66
0
      && elf_vxworks_gott_symbol_p (abfd, *namep))
67
0
    {
68
0
      sym->st_info = ELF_ST_INFO (STB_WEAK, ELF_ST_TYPE (sym->st_info));
69
0
      *flagsp |= BSF_WEAK;
70
0
    }
71
72
0
  return true;
73
0
}
74
75
/* Perform VxWorks-specific handling of the create_dynamic_sections hook.
76
   When creating an executable, set *SRELPLT2_OUT to the .rel(a).plt.unloaded
77
   section.  */
78
79
bool
80
elf_vxworks_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info,
81
             asection **srelplt2_out)
82
0
{
83
0
  struct elf_link_hash_table *htab;
84
0
  const struct elf_backend_data *bed;
85
0
  asection *s;
86
87
0
  htab = elf_hash_table (info);
88
0
  bed = get_elf_backend_data (dynobj);
89
90
0
  if (!bfd_link_pic (info))
91
0
    {
92
0
      s = bfd_make_section_anyway_with_flags (dynobj,
93
0
                bed->default_use_rela_p
94
0
                ? ".rela.plt.unloaded"
95
0
                : ".rel.plt.unloaded",
96
0
                SEC_HAS_CONTENTS | SEC_IN_MEMORY
97
0
                | SEC_READONLY
98
0
                | SEC_LINKER_CREATED);
99
0
      if (s == NULL
100
0
    || !bfd_set_section_alignment (s, bed->s->log_file_align))
101
0
  return false;
102
103
0
      *srelplt2_out = s;
104
0
    }
105
106
  /* Mark the GOT and PLT symbols as having relocations; they might
107
     not, but we won't know for sure until we build the GOT in
108
     finish_dynamic_symbol.  Also make sure that the GOT symbol
109
     is entered into the dynamic symbol table; the loader uses it
110
     to initialize __GOTT_BASE__[__GOTT_INDEX__].  */
111
0
  if (htab->hgot)
112
0
    {
113
0
      htab->hgot->indx = -2;
114
0
      htab->hgot->other &= ~ELF_ST_VISIBILITY (-1);
115
0
      htab->hgot->forced_local = 0;
116
0
      if (!bfd_elf_link_record_dynamic_symbol (info, htab->hgot))
117
0
  return false;
118
0
    }
119
0
  if (htab->hplt)
120
0
    {
121
0
      htab->hplt->indx = -2;
122
0
      htab->hplt->type = STT_FUNC;
123
0
    }
124
125
0
  return true;
126
0
}
127
128
/* Tweak magic VxWorks symbols as they are written to the output file.  */
129
int
130
elf_vxworks_link_output_symbol_hook (struct bfd_link_info *info
131
               ATTRIBUTE_UNUSED,
132
             const char *name,
133
             Elf_Internal_Sym *sym,
134
             asection *input_sec ATTRIBUTE_UNUSED,
135
             struct elf_link_hash_entry *h)
136
0
{
137
  /* Reverse the effects of the hack in elf_vxworks_add_symbol_hook.  */
138
0
  if (h
139
0
      && h->root.type == bfd_link_hash_undefweak
140
0
      && elf_vxworks_gott_symbol_p (h->root.u.undef.abfd, name))
141
0
    sym->st_info = ELF_ST_INFO (STB_GLOBAL, ELF_ST_TYPE (sym->st_info));
142
143
0
  return 1;
144
0
}
145
146
/* Copy relocations into the output file.  Fixes up relocations against PLT
147
   entries, then calls the generic routine.  */
148
149
bool
150
elf_vxworks_emit_relocs (bfd *output_bfd,
151
       asection *input_section,
152
       Elf_Internal_Shdr *input_rel_hdr,
153
       Elf_Internal_Rela *internal_relocs,
154
       struct elf_link_hash_entry **rel_hash)
155
0
{
156
0
  const struct elf_backend_data *bed;
157
0
  int j;
158
159
0
  bed = get_elf_backend_data (output_bfd);
160
161
0
  if (output_bfd->flags & (DYNAMIC|EXEC_P))
162
0
    {
163
0
      Elf_Internal_Rela *irela;
164
0
      Elf_Internal_Rela *irelaend;
165
0
      struct elf_link_hash_entry **hash_ptr;
166
167
0
      for (irela = internal_relocs,
168
0
       irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
169
0
         * bed->s->int_rels_per_ext_rel),
170
0
       hash_ptr = rel_hash;
171
0
     irela < irelaend;
172
0
     irela += bed->s->int_rels_per_ext_rel,
173
0
       hash_ptr++)
174
0
  {
175
0
    if (*hash_ptr)
176
0
      {
177
0
        (*hash_ptr)->has_reloc = 1;
178
0
        if ((*hash_ptr)->def_dynamic
179
0
      && !(*hash_ptr)->def_regular
180
0
      && ((*hash_ptr)->root.type == bfd_link_hash_defined
181
0
          || (*hash_ptr)->root.type == bfd_link_hash_defweak)
182
0
      && (*hash_ptr)->root.u.def.section->output_section != NULL)
183
0
    {
184
      /* This is a relocation from an executable or shared
185
         library against a symbol in a different shared
186
         library.  We are creating a definition in the output
187
         file but it does not come from any of our normal (.o)
188
         files. ie. a PLT stub.  Normally this would be a
189
         relocation against SHN_UNDEF with the VMA of
190
         the PLT stub.  This upsets the VxWorks loader.
191
         Convert it to a section-relative relocation.  This
192
         gets some other symbols (for instance .dynbss), but
193
         is conservatively correct.  */
194
0
      for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
195
0
        {
196
0
          asection *sec = (*hash_ptr)->root.u.def.section;
197
0
          int this_idx = sec->output_section->target_index;
198
199
0
          irela[j].r_info
200
0
      = ELF32_R_INFO (this_idx,
201
0
          ELF32_R_TYPE (irela[j].r_info));
202
0
          irela[j].r_addend += (*hash_ptr)->root.u.def.value;
203
0
          irela[j].r_addend += sec->output_offset;
204
0
        }
205
      /* Stop the generic routine adjusting this entry.  */
206
0
      *hash_ptr = NULL;
207
0
    }
208
0
      }
209
0
  }
210
0
    }
211
0
  return _bfd_elf_link_output_relocs (output_bfd, input_section,
212
0
              input_rel_hdr, internal_relocs,
213
0
              rel_hash);
214
0
}
215
216
217
/* Set the sh_link and sh_info fields on the static plt relocation secton.  */
218
219
bool
220
elf_vxworks_final_write_processing (bfd *abfd)
221
0
{
222
0
  asection * sec;
223
0
  struct bfd_elf_section_data *d;
224
225
0
  sec = bfd_get_section_by_name (abfd, ".rel.plt.unloaded");
226
0
  if (!sec)
227
0
    sec = bfd_get_section_by_name (abfd, ".rela.plt.unloaded");
228
0
  if (sec)
229
0
    {
230
0
      d = elf_section_data (sec);
231
0
      d->this_hdr.sh_link = elf_onesymtab (abfd);
232
0
      sec = bfd_get_section_by_name (abfd, ".plt");
233
0
      if (sec)
234
0
  d->this_hdr.sh_info = elf_section_data (sec)->this_idx;
235
0
    }
236
0
  return _bfd_elf_final_write_processing (abfd);
237
0
}
238
239
/* Add the dynamic entries required by VxWorks.  These point to the
240
   tls sections.  */
241
242
bool
243
elf_vxworks_add_dynamic_entries (bfd *output_bfd, struct bfd_link_info *info)
244
0
{
245
0
  if (bfd_get_section_by_name (output_bfd, ".tls_data"))
246
0
    {
247
0
      if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_START, 0)
248
0
    || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_SIZE, 0)
249
0
    || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_DATA_ALIGN, 0))
250
0
  return false;
251
0
    }
252
0
  if (bfd_get_section_by_name (output_bfd, ".tls_vars"))
253
0
    {
254
0
      if (!_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_START, 0)
255
0
    || !_bfd_elf_add_dynamic_entry (info, DT_VX_WRS_TLS_VARS_SIZE, 0))
256
0
  return false;
257
0
    }
258
0
  return true;
259
0
}
260
261
/* If *DYN is one of the VxWorks-specific dynamic entries, then fill
262
   in the value now  and return TRUE.  Otherwise return FALSE.  */
263
264
bool
265
elf_vxworks_finish_dynamic_entry (bfd *output_bfd, Elf_Internal_Dyn *dyn)
266
0
{
267
0
  asection *sec;
268
269
0
  switch (dyn->d_tag)
270
0
    {
271
0
    default:
272
0
      return false;
273
274
0
    case DT_VX_WRS_TLS_DATA_START:
275
0
      sec = bfd_get_section_by_name (output_bfd, ".tls_data");
276
0
      dyn->d_un.d_ptr = sec->vma;
277
0
      break;
278
279
0
    case DT_VX_WRS_TLS_DATA_SIZE:
280
0
      sec = bfd_get_section_by_name (output_bfd, ".tls_data");
281
0
      dyn->d_un.d_val = sec->size;
282
0
      break;
283
284
0
    case DT_VX_WRS_TLS_DATA_ALIGN:
285
0
      sec = bfd_get_section_by_name (output_bfd, ".tls_data");
286
0
      dyn->d_un.d_val = (bfd_size_type) 1 << bfd_section_alignment (sec);
287
0
      break;
288
289
0
    case DT_VX_WRS_TLS_VARS_START:
290
0
      sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
291
0
      dyn->d_un.d_ptr = sec->vma;
292
0
      break;
293
294
0
    case DT_VX_WRS_TLS_VARS_SIZE:
295
0
      sec = bfd_get_section_by_name (output_bfd, ".tls_vars");
296
0
      dyn->d_un.d_val = sec->size;
297
0
      break;
298
0
    }
299
0
  return true;
300
0
}
301
302
/* Add dynamic tags.  */
303
304
bool
305
_bfd_elf_maybe_vxworks_add_dynamic_tags (bfd *output_bfd,
306
           struct bfd_link_info *info,
307
           bool need_dynamic_reloc)
308
0
{
309
0
  struct elf_link_hash_table *htab = elf_hash_table (info);
310
0
  return (_bfd_elf_add_dynamic_tags (output_bfd, info,
311
0
             need_dynamic_reloc)
312
0
    && (!htab->dynamic_sections_created
313
0
        || htab->target_os != is_vxworks
314
0
        || elf_vxworks_add_dynamic_entries (output_bfd, info)));
315
0
}