Blame sysdeps/i386/dl-machine.h

Packit 6c4009
/* Machine-dependent ELF dynamic relocation inline functions.  i386 version.
Packit 6c4009
   Copyright (C) 1995-2018 Free Software Foundation, Inc.
Packit 6c4009
   This file is part of the GNU C Library.
Packit 6c4009
Packit 6c4009
   The GNU C Library is free software; you can redistribute it and/or
Packit 6c4009
   modify it under the terms of the GNU Lesser General Public
Packit 6c4009
   License as published by the Free Software Foundation; either
Packit 6c4009
   version 2.1 of the License, or (at your option) any later version.
Packit 6c4009
Packit 6c4009
   The GNU C Library is distributed in the hope that it will be useful,
Packit 6c4009
   but WITHOUT ANY WARRANTY; without even the implied warranty of
Packit 6c4009
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit 6c4009
   Lesser General Public License for more details.
Packit 6c4009
Packit 6c4009
   You should have received a copy of the GNU Lesser General Public
Packit 6c4009
   License along with the GNU C Library; if not, see
Packit 6c4009
   <http://www.gnu.org/licenses/>.  */
Packit 6c4009
Packit 6c4009
#ifndef dl_machine_h
Packit 6c4009
#define dl_machine_h
Packit 6c4009
Packit 6c4009
#define ELF_MACHINE_NAME "i386"
Packit 6c4009
Packit 6c4009
#include <sys/param.h>
Packit 6c4009
#include <sysdep.h>
Packit 6c4009
#include <tls.h>
Packit 6c4009
#include <dl-tlsdesc.h>
Packit 6c4009
Packit 6c4009
/* Return nonzero iff ELF header is compatible with the running host.  */
Packit 6c4009
static inline int __attribute__ ((unused))
Packit 6c4009
elf_machine_matches_host (const Elf32_Ehdr *ehdr)
Packit 6c4009
{
Packit 6c4009
  return ehdr->e_machine == EM_386;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
Packit 6c4009
/* Return the link-time address of _DYNAMIC.  Conveniently, this is the
Packit 6c4009
   first element of the GOT, a special entry that is never relocated.  */
Packit 6c4009
static inline Elf32_Addr __attribute__ ((unused, const))
Packit 6c4009
elf_machine_dynamic (void)
Packit 6c4009
{
Packit 6c4009
  /* This produces a GOTOFF reloc that resolves to zero at link time, so in
Packit 6c4009
     fact just loads from the GOT register directly.  By doing it without
Packit 6c4009
     an asm we can let the compiler choose any register.  */
Packit 6c4009
  extern const Elf32_Addr _GLOBAL_OFFSET_TABLE_[] attribute_hidden;
Packit 6c4009
  return _GLOBAL_OFFSET_TABLE_[0];
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
/* Return the run-time load address of the shared object.  */
Packit 6c4009
static inline Elf32_Addr __attribute__ ((unused))
Packit 6c4009
elf_machine_load_address (void)
Packit 6c4009
{
Packit 6c4009
  /* Compute the difference between the runtime address of _DYNAMIC as seen
Packit 6c4009
     by a GOTOFF reference, and the link-time address found in the special
Packit 6c4009
     unrelocated first GOT entry.  */
Packit 6c4009
  extern Elf32_Dyn bygotoff[] asm ("_DYNAMIC") attribute_hidden;
Packit 6c4009
  return (Elf32_Addr) &bygotoff - elf_machine_dynamic ();
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
/* Set up the loaded object described by L so its unrelocated PLT
Packit 6c4009
   entries will jump to the on-demand fixup code in dl-runtime.c.  */
Packit 6c4009
Packit 6c4009
static inline int __attribute__ ((unused, always_inline))
Packit 6c4009
elf_machine_runtime_setup (struct link_map *l, int lazy, int profile)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *got;
Packit 6c4009
  extern void _dl_runtime_resolve (Elf32_Word) attribute_hidden;
Packit 6c4009
  extern void _dl_runtime_profile (Elf32_Word) attribute_hidden;
Packit Service a755fd
  extern void _dl_runtime_resolve_shstk (Elf32_Word) attribute_hidden;
Packit Service a755fd
  extern void _dl_runtime_profile_shstk (Elf32_Word) attribute_hidden;
Packit Service a755fd
  /* Check if SHSTK is enabled by kernel.  */
Packit Service a755fd
  bool shstk_enabled
Packit Service 78f55d
    = (GL(dl_x86_feature_1) & GNU_PROPERTY_X86_FEATURE_1_SHSTK) != 0;
Packit 6c4009
Packit 6c4009
  if (l->l_info[DT_JMPREL] && lazy)
Packit 6c4009
    {
Packit 6c4009
      /* The GOT entries for functions in the PLT have not yet been filled
Packit 6c4009
	 in.  Their initial contents will arrange when called to push an
Packit 6c4009
	 offset into the .rel.plt section, push _GLOBAL_OFFSET_TABLE_[1],
Packit 6c4009
	 and then jump to _GLOBAL_OFFSET_TABLE[2].  */
Packit 6c4009
      got = (Elf32_Addr *) D_PTR (l, l_info[DT_PLTGOT]);
Packit 6c4009
      /* If a library is prelinked but we have to relocate anyway,
Packit 6c4009
	 we have to be able to undo the prelinking of .got.plt.
Packit 6c4009
	 The prelinker saved us here address of .plt + 0x16.  */
Packit 6c4009
      if (got[1])
Packit 6c4009
	{
Packit 6c4009
	  l->l_mach.plt = got[1] + l->l_addr;
Packit 6c4009
	  l->l_mach.gotplt = (Elf32_Addr) &got[3];
Packit 6c4009
	}
Packit 6c4009
      got[1] = (Elf32_Addr) l;	/* Identify this shared object.  */
Packit 6c4009
Packit 6c4009
      /* The got[2] entry contains the address of a function which gets
Packit 6c4009
	 called to get the address of a so far unresolved function and
Packit 6c4009
	 jump to it.  The profiling extension of the dynamic linker allows
Packit 6c4009
	 to intercept the calls to collect information.  In this case we
Packit 6c4009
	 don't store the address in the GOT so that all future calls also
Packit 6c4009
	 end in this function.  */
Packit 6c4009
      if (__glibc_unlikely (profile))
Packit 6c4009
	{
Packit Service a755fd
	  got[2] = (shstk_enabled
Packit Service a755fd
		    ? (Elf32_Addr) &_dl_runtime_profile_shstk
Packit Service a755fd
		    : (Elf32_Addr) &_dl_runtime_profile);
Packit 6c4009
Packit 6c4009
	  if (GLRO(dl_profile) != NULL
Packit 6c4009
	      && _dl_name_match_p (GLRO(dl_profile), l))
Packit 6c4009
	    /* This is the object we are looking for.  Say that we really
Packit 6c4009
	       want profiling and the timers are started.  */
Packit 6c4009
	    GL(dl_profile_map) = l;
Packit 6c4009
	}
Packit 6c4009
      else
Packit 6c4009
	/* This function will get called to fix up the GOT entry indicated by
Packit 6c4009
	   the offset on the stack, and then jump to the resolved address.  */
Packit Service a755fd
	got[2] = (shstk_enabled
Packit Service a755fd
		  ? (Elf32_Addr) &_dl_runtime_resolve_shstk
Packit Service a755fd
		  : (Elf32_Addr) &_dl_runtime_resolve);
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  return lazy;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
#ifdef IN_DL_RUNTIME
Packit 6c4009
Packit 6c4009
# ifndef PROF
Packit 6c4009
/* We add a declaration of this function here so that in dl-runtime.c
Packit 6c4009
   the ELF_MACHINE_RUNTIME_TRAMPOLINE macro really can pass the parameters
Packit 6c4009
   in registers.
Packit 6c4009
Packit 6c4009
   We cannot use this scheme for profiling because the _mcount call
Packit 6c4009
   destroys the passed register information.  */
Packit 6c4009
#define ARCH_FIXUP_ATTRIBUTE __attribute__ ((regparm (3), stdcall, unused))
Packit 6c4009
Packit 6c4009
extern ElfW(Addr) _dl_fixup (struct link_map *l,
Packit 6c4009
			     ElfW(Word) reloc_offset)
Packit 6c4009
     ARCH_FIXUP_ATTRIBUTE;
Packit 6c4009
extern ElfW(Addr) _dl_profile_fixup (struct link_map *l,
Packit 6c4009
				     ElfW(Word) reloc_offset,
Packit 6c4009
				     ElfW(Addr) retaddr, void *regs,
Packit 6c4009
				     long int *framesizep)
Packit 6c4009
     ARCH_FIXUP_ATTRIBUTE;
Packit 6c4009
# endif
Packit 6c4009
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
/* Mask identifying addresses reserved for the user program,
Packit 6c4009
   where the dynamic linker should not map anything.  */
Packit 6c4009
#define ELF_MACHINE_USER_ADDRESS_MASK	0xf8000000UL
Packit 6c4009
Packit 6c4009
/* Initial entry point code for the dynamic linker.
Packit 6c4009
   The C function `_dl_start' is the real entry point;
Packit 6c4009
   its return value is the user program's entry point.  */
Packit 6c4009
Packit 6c4009
#define RTLD_START asm ("\n\
Packit 6c4009
	.text\n\
Packit 6c4009
	.align 16\n\
Packit 6c4009
0:	movl (%esp), %ebx\n\
Packit 6c4009
	ret\n\
Packit 6c4009
	.align 16\n\
Packit 6c4009
.globl _start\n\
Packit 6c4009
.globl _dl_start_user\n\
Packit 6c4009
_start:\n\
Packit 6c4009
	movl %esp, %eax\n\
Packit 6c4009
        subl $12, %esp\n\
Packit 6c4009
        pushl %eax\n\
Packit 6c4009
	call _dl_start\n\
Packit 6c4009
        addl $16, %esp\n\
Packit 6c4009
_dl_start_user:\n\
Packit 6c4009
	# Save the user entry point address in %edi.\n\
Packit 6c4009
	movl %eax, %edi\n\
Packit 6c4009
	# Point %ebx at the GOT.\n\
Packit 6c4009
	call 0b\n\
Packit 6c4009
	addl $_GLOBAL_OFFSET_TABLE_, %ebx\n\
Packit 6c4009
	# See if we were run as a command with the executable file\n\
Packit 6c4009
	# name as an extra leading argument.\n\
Packit 6c4009
	movl _dl_skip_args@GOTOFF(%ebx), %eax\n\
Packit 6c4009
	# Pop the original argument count.\n\
Packit 6c4009
	popl %edx\n\
Packit 6c4009
	# Adjust the stack pointer to skip _dl_skip_args words.\n\
Packit 6c4009
	leal (%esp,%eax,4), %esp\n\
Packit 6c4009
	# Subtract _dl_skip_args from argc.\n\
Packit 6c4009
	subl %eax, %edx\n\
Packit 6c4009
	# Push argc back on the stack.\n\
Packit 6c4009
	push %edx\n\
Packit 6c4009
	# The special initializer gets called with the stack just\n\
Packit 6c4009
	# as the application's entry point will see it; it can\n\
Packit 6c4009
	# switch stacks if it moves these contents over.\n\
Packit 6c4009
" RTLD_START_SPECIAL_INIT "\n\
Packit 6c4009
	# Load the parameters again.\n\
Packit 6c4009
	# (eax, edx, ecx, esi) = (_dl_loaded, argc, argv, envp)\n\
Packit 6c4009
	movl _rtld_local@GOTOFF(%ebx), %eax\n\
Packit 6c4009
	leal 8(%esp,%edx,4), %esi\n\
Packit 6c4009
	leal 4(%esp), %ecx\n\
Packit 6c4009
	movl %esp, %ebp\n\
Packit 6c4009
	# Make sure _dl_init is run with 16 byte aligned stack.\n\
Packit 6c4009
	andl $-16, %esp\n\
Packit 6c4009
        subl $12, %esp\n\
Packit 6c4009
	pushl %ebp\n\
Packit 6c4009
        # Arguments for _dl_init.\n\
Packit 6c4009
	pushl %esi\n\
Packit 6c4009
	pushl %ecx\n\
Packit 6c4009
	pushl %edx\n\
Packit 6c4009
	pushl %eax\n\
Packit 6c4009
	# Clear %ebp, so that even constructors have terminated backchain.\n\
Packit 6c4009
	xorl %ebp, %ebp\n\
Packit 6c4009
	# Call the function to run the initializers.\n\
Packit 6c4009
	call _dl_init\n\
Packit 6c4009
	# Pass our finalizer function to the user in %edx, as per ELF ABI.\n\
Packit 6c4009
	leal _dl_fini@GOTOFF(%ebx), %edx\n\
Packit 6c4009
	# Restore %esp _start expects.\n\
Packit 6c4009
	movl 16(%esp), %esp\n\
Packit 6c4009
	# Jump to the user's entry point.\n\
Packit 6c4009
	jmp *%edi\n\
Packit 6c4009
	.previous\n\
Packit 6c4009
");
Packit 6c4009
Packit 6c4009
#ifndef RTLD_START_SPECIAL_INIT
Packit 6c4009
# define RTLD_START_SPECIAL_INIT /* nothing */
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
/* ELF_RTYPE_CLASS_PLT iff TYPE describes relocation of a PLT entry or
Packit 6c4009
   TLS variable, so undefined references should not be allowed to
Packit 6c4009
   define the value.
Packit 6c4009
   ELF_RTYPE_CLASS_COPY iff TYPE should not be allowed to resolve to one
Packit 6c4009
   of the main executable's symbols, as for a COPY reloc.
Packit 6c4009
   ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA iff TYPE describes relocation may
Packit 6c4009
   against protected data whose address be external due to copy relocation.
Packit 6c4009
 */
Packit 6c4009
# define elf_machine_type_class(type) \
Packit 6c4009
  ((((type) == R_386_JMP_SLOT || (type) == R_386_TLS_DTPMOD32		      \
Packit 6c4009
     || (type) == R_386_TLS_DTPOFF32 || (type) == R_386_TLS_TPOFF32	      \
Packit 6c4009
     || (type) == R_386_TLS_TPOFF || (type) == R_386_TLS_DESC)		      \
Packit 6c4009
    * ELF_RTYPE_CLASS_PLT)						      \
Packit 6c4009
   | (((type) == R_386_COPY) * ELF_RTYPE_CLASS_COPY)			      \
Packit 6c4009
   | (((type) == R_386_GLOB_DAT) * ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA))
Packit 6c4009
Packit 6c4009
/* A reloc type used for ld.so cmdline arg lookups to reject PLT entries.  */
Packit 6c4009
#define ELF_MACHINE_JMP_SLOT	R_386_JMP_SLOT
Packit 6c4009
Packit 6c4009
/* The i386 never uses Elf32_Rela relocations for the dynamic linker.
Packit 6c4009
   Prelinked libraries may use Elf32_Rela though.  */
Packit 6c4009
#define ELF_MACHINE_PLT_REL 1
Packit 6c4009
Packit 6c4009
/* We define an initialization functions.  This is called very early in
Packit 6c4009
   _dl_sysdep_start.  */
Packit 6c4009
#define DL_PLATFORM_INIT dl_platform_init ()
Packit 6c4009
Packit 6c4009
static inline void __attribute__ ((unused))
Packit 6c4009
dl_platform_init (void)
Packit 6c4009
{
Packit 6c4009
#if IS_IN (rtld)
Packit Service 4f62bc
  /* _dl_x86_init_cpu_features is a wrapper for init_cpu_features which
Packit Service 4f62bc
     has been called early from __libc_start_main in static executable.  */
Packit Service 4f62bc
  _dl_x86_init_cpu_features ();
Packit 6c4009
#else
Packit 6c4009
  if (GLRO(dl_platform) != NULL && *GLRO(dl_platform) == '\0')
Packit 6c4009
    /* Avoid an empty string which would disturb us.  */
Packit 6c4009
    GLRO(dl_platform) = NULL;
Packit 6c4009
#endif
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
static inline Elf32_Addr
Packit 6c4009
elf_machine_fixup_plt (struct link_map *map, lookup_t t,
Packit 6c4009
		       const ElfW(Sym) *refsym, const ElfW(Sym) *sym,
Packit 6c4009
		       const Elf32_Rel *reloc,
Packit 6c4009
		       Elf32_Addr *reloc_addr, Elf32_Addr value)
Packit 6c4009
{
Packit 6c4009
  return *reloc_addr = value;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
/* Return the final value of a plt relocation.  */
Packit 6c4009
static inline Elf32_Addr
Packit 6c4009
elf_machine_plt_value (struct link_map *map, const Elf32_Rel *reloc,
Packit 6c4009
		       Elf32_Addr value)
Packit 6c4009
{
Packit 6c4009
  return value;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
Packit 6c4009
/* Names of the architecture-specific auditing callback functions.  */
Packit 6c4009
#define ARCH_LA_PLTENTER i86_gnu_pltenter
Packit 6c4009
#define ARCH_LA_PLTEXIT i86_gnu_pltexit
Packit 6c4009
Packit 6c4009
#endif /* !dl_machine_h */
Packit 6c4009
Packit 6c4009
/* The i386 never uses Elf32_Rela relocations for the dynamic linker.
Packit 6c4009
   Prelinked libraries may use Elf32_Rela though.  */
Packit 6c4009
#define ELF_MACHINE_NO_RELA defined RTLD_BOOTSTRAP
Packit 6c4009
#define ELF_MACHINE_NO_REL 0
Packit 6c4009
Packit 6c4009
#ifdef RESOLVE_MAP
Packit 6c4009
Packit 6c4009
/* Perform the relocation specified by RELOC and SYM (which is fully resolved).
Packit 6c4009
   MAP is the object containing the reloc.  */
Packit 6c4009
Packit 6c4009
auto inline void
Packit 6c4009
__attribute ((always_inline))
Packit 6c4009
elf_machine_rel (struct link_map *map, const Elf32_Rel *reloc,
Packit 6c4009
		 const Elf32_Sym *sym, const struct r_found_version *version,
Packit 6c4009
		 void *const reloc_addr_arg, int skip_ifunc)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = reloc_addr_arg;
Packit 6c4009
  const unsigned int r_type = ELF32_R_TYPE (reloc->r_info);
Packit 6c4009
Packit 6c4009
# if !defined RTLD_BOOTSTRAP || !defined HAVE_Z_COMBRELOC
Packit 6c4009
  if (__glibc_unlikely (r_type == R_386_RELATIVE))
Packit 6c4009
    {
Packit 6c4009
#  if !defined RTLD_BOOTSTRAP && !defined HAVE_Z_COMBRELOC
Packit 6c4009
      /* This is defined in rtld.c, but nowhere in the static libc.a;
Packit 6c4009
	 make the reference weak so static programs can still link.
Packit 6c4009
	 This declaration cannot be done when compiling rtld.c
Packit 6c4009
	 (i.e. #ifdef RTLD_BOOTSTRAP) because rtld.c contains the
Packit 6c4009
	 common defn for _dl_rtld_map, which is incompatible with a
Packit 6c4009
	 weak decl in the same file.  */
Packit 6c4009
#   ifndef SHARED
Packit 6c4009
      weak_extern (_dl_rtld_map);
Packit 6c4009
#   endif
Packit 6c4009
      if (map != &GL(dl_rtld_map)) /* Already done in rtld itself.  */
Packit 6c4009
#  endif
Packit 6c4009
	*reloc_addr += map->l_addr;
Packit 6c4009
    }
Packit 6c4009
#  ifndef RTLD_BOOTSTRAP
Packit 6c4009
  else if (__glibc_unlikely (r_type == R_386_NONE))
Packit 6c4009
    return;
Packit 6c4009
#  endif
Packit 6c4009
  else
Packit 6c4009
# endif	/* !RTLD_BOOTSTRAP and have no -z combreloc */
Packit 6c4009
    {
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
      const Elf32_Sym *const refsym = sym;
Packit 6c4009
# endif
Packit 6c4009
      struct link_map *sym_map = RESOLVE_MAP (&sym, version, r_type);
Packit 6c4009
      Elf32_Addr value = SYMBOL_ADDRESS (sym_map, sym, true);
Packit 6c4009
Packit 6c4009
      if (sym != NULL
Packit 6c4009
	  && __glibc_unlikely (ELFW(ST_TYPE) (sym->st_info) == STT_GNU_IFUNC)
Packit 6c4009
	  && __glibc_likely (sym->st_shndx != SHN_UNDEF)
Packit 6c4009
	  && __glibc_likely (!skip_ifunc))
Packit 6c4009
	{
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	  if (sym_map != map
Packit 6c4009
	      && sym_map->l_type != lt_executable
Packit 6c4009
	      && !sym_map->l_relocated)
Packit 6c4009
	    {
Packit 6c4009
	      const char *strtab
Packit 6c4009
		= (const char *) D_PTR (map, l_info[DT_STRTAB]);
Packit 6c4009
	      _dl_error_printf ("\
Packit 6c4009
%s: Relink `%s' with `%s' for IFUNC symbol `%s'\n",
Packit 6c4009
				RTLD_PROGNAME, map->l_name,
Packit 6c4009
				sym_map->l_name,
Packit 6c4009
				strtab + refsym->st_name);
Packit 6c4009
	    }
Packit 6c4009
# endif
Packit 6c4009
	  value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
	}
Packit 6c4009
Packit 6c4009
      switch (r_type)
Packit 6c4009
	{
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	case R_386_SIZE32:
Packit 6c4009
	  /* Set to symbol size plus addend.  */
Packit 6c4009
	  *reloc_addr += sym->st_size;
Packit 6c4009
	  break;
Packit 6c4009
# endif
Packit 6c4009
	case R_386_GLOB_DAT:
Packit 6c4009
	case R_386_JMP_SLOT:
Packit 6c4009
	  *reloc_addr = value;
Packit 6c4009
	  break;
Packit 6c4009
Packit 6c4009
	case R_386_TLS_DTPMOD32:
Packit 6c4009
# ifdef RTLD_BOOTSTRAP
Packit 6c4009
	  /* During startup the dynamic linker is always the module
Packit 6c4009
	     with index 1.
Packit 6c4009
	     XXX If this relocation is necessary move before RESOLVE
Packit 6c4009
	     call.  */
Packit 6c4009
	  *reloc_addr = 1;
Packit 6c4009
# else
Packit 6c4009
	  /* Get the information from the link map returned by the
Packit 6c4009
	     resolv function.  */
Packit 6c4009
	  if (sym_map != NULL)
Packit 6c4009
	    *reloc_addr = sym_map->l_tls_modid;
Packit 6c4009
# endif
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_DTPOFF32:
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	  /* During relocation all TLS symbols are defined and used.
Packit 6c4009
	     Therefore the offset is already correct.  */
Packit 6c4009
	  if (sym != NULL)
Packit 6c4009
	    *reloc_addr = sym->st_value;
Packit 6c4009
# endif
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_DESC:
Packit 6c4009
	  {
Packit 6c4009
	    struct tlsdesc volatile *td =
Packit 6c4009
	      (struct tlsdesc volatile *)reloc_addr;
Packit 6c4009
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	    if (! sym)
Packit 6c4009
	      td->entry = _dl_tlsdesc_undefweak;
Packit 6c4009
	    else
Packit 6c4009
# endif
Packit 6c4009
	      {
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
#  ifndef SHARED
Packit 6c4009
		CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
#  else
Packit 6c4009
		if (!TRY_STATIC_TLS (map, sym_map))
Packit 6c4009
		  {
Packit 6c4009
		    td->arg = _dl_make_tlsdesc_dynamic
Packit 6c4009
		      (sym_map, sym->st_value + (ElfW(Word))td->arg);
Packit 6c4009
		    td->entry = _dl_tlsdesc_dynamic;
Packit 6c4009
		  }
Packit 6c4009
		else
Packit 6c4009
#  endif
Packit 6c4009
# endif
Packit 6c4009
		  {
Packit 6c4009
		    td->arg = (void*)(sym->st_value - sym_map->l_tls_offset
Packit 6c4009
				      + (ElfW(Word))td->arg);
Packit 6c4009
		    td->entry = _dl_tlsdesc_return;
Packit 6c4009
		  }
Packit 6c4009
	      }
Packit 6c4009
	    break;
Packit 6c4009
	  }
Packit 6c4009
	case R_386_TLS_TPOFF32:
Packit 6c4009
	  /* The offset is positive, backward from the thread pointer.  */
Packit 6c4009
#  ifdef RTLD_BOOTSTRAP
Packit 6c4009
	  *reloc_addr += map->l_tls_offset - sym->st_value;
Packit 6c4009
#  else
Packit 6c4009
	  /* We know the offset of object the symbol is contained in.
Packit 6c4009
	     It is a positive value which will be subtracted from the
Packit 6c4009
	     thread pointer.  To get the variable position in the TLS
Packit 6c4009
	     block we subtract the offset from that of the TLS block.  */
Packit 6c4009
	  if (sym != NULL)
Packit 6c4009
	    {
Packit 6c4009
	      CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
	      *reloc_addr += sym_map->l_tls_offset - sym->st_value;
Packit 6c4009
	    }
Packit 6c4009
# endif
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_TPOFF:
Packit 6c4009
	  /* The offset is negative, forward from the thread pointer.  */
Packit 6c4009
# ifdef RTLD_BOOTSTRAP
Packit 6c4009
	  *reloc_addr += sym->st_value - map->l_tls_offset;
Packit 6c4009
# else
Packit 6c4009
	  /* We know the offset of object the symbol is contained in.
Packit 6c4009
	     It is a negative value which will be added to the
Packit 6c4009
	     thread pointer.  */
Packit 6c4009
	  if (sym != NULL)
Packit 6c4009
	    {
Packit 6c4009
	      CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
	      *reloc_addr += sym->st_value - sym_map->l_tls_offset;
Packit 6c4009
	    }
Packit 6c4009
# endif
Packit 6c4009
	  break;
Packit 6c4009
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	case R_386_32:
Packit 6c4009
	  *reloc_addr += value;
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_PC32:
Packit 6c4009
	  *reloc_addr += (value - (Elf32_Addr) reloc_addr);
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_COPY:
Packit 6c4009
	  if (sym == NULL)
Packit 6c4009
	    /* This can happen in trace mode if an object could not be
Packit 6c4009
	       found.  */
Packit 6c4009
	    break;
Packit 6c4009
	  if (__glibc_unlikely (sym->st_size > refsym->st_size)
Packit 6c4009
	      || (__glibc_unlikely(sym->st_size < refsym->st_size)
Packit 6c4009
		  && GLRO(dl_verbose)))
Packit 6c4009
	    {
Packit 6c4009
	      const char *strtab;
Packit 6c4009
Packit 6c4009
	      strtab = (const char *) D_PTR (map, l_info[DT_STRTAB]);
Packit 6c4009
	      _dl_error_printf ("\
Packit 6c4009
%s: Symbol `%s' has different size in shared object, consider re-linking\n",
Packit 6c4009
				RTLD_PROGNAME, strtab + refsym->st_name);
Packit 6c4009
	    }
Packit 6c4009
	  memcpy (reloc_addr_arg, (void *) value,
Packit 6c4009
		  MIN (sym->st_size, refsym->st_size));
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_IRELATIVE:
Packit 6c4009
	  value = map->l_addr + *reloc_addr;
Packit 6c4009
	  value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
	  *reloc_addr = value;
Packit 6c4009
	  break;
Packit 6c4009
	default:
Packit 6c4009
	  _dl_reloc_bad_type (map, r_type, 0);
Packit 6c4009
	  break;
Packit 6c4009
# endif	/* !RTLD_BOOTSTRAP */
Packit 6c4009
	}
Packit 6c4009
    }
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
auto inline void
Packit 6c4009
__attribute__ ((always_inline))
Packit 6c4009
elf_machine_rela (struct link_map *map, const Elf32_Rela *reloc,
Packit 6c4009
		  const Elf32_Sym *sym, const struct r_found_version *version,
Packit 6c4009
		  void *const reloc_addr_arg, int skip_ifunc)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = reloc_addr_arg;
Packit 6c4009
  const unsigned int r_type = ELF32_R_TYPE (reloc->r_info);
Packit 6c4009
Packit 6c4009
  if (ELF32_R_TYPE (reloc->r_info) == R_386_RELATIVE)
Packit 6c4009
    *reloc_addr = map->l_addr + reloc->r_addend;
Packit 6c4009
  else if (r_type != R_386_NONE)
Packit 6c4009
    {
Packit 6c4009
#  ifndef RESOLVE_CONFLICT_FIND_MAP
Packit 6c4009
      const Elf32_Sym *const refsym = sym;
Packit 6c4009
#  endif
Packit 6c4009
      struct link_map *sym_map = RESOLVE_MAP (&sym, version, r_type);
Packit 6c4009
      Elf32_Addr value = SYMBOL_ADDRESS (sym_map, sym, true);
Packit 6c4009
Packit 6c4009
      if (sym != NULL
Packit 6c4009
	  && __glibc_likely (sym->st_shndx != SHN_UNDEF)
Packit 6c4009
	  && __glibc_unlikely (ELFW(ST_TYPE) (sym->st_info) == STT_GNU_IFUNC)
Packit 6c4009
	  && __glibc_likely (!skip_ifunc))
Packit 6c4009
	value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
Packit 6c4009
      switch (ELF32_R_TYPE (reloc->r_info))
Packit 6c4009
	{
Packit 6c4009
	case R_386_SIZE32:
Packit 6c4009
	  /* Set to symbol size plus addend.  */
Packit 6c4009
	  value = sym->st_size;
Packit 6c4009
	case R_386_GLOB_DAT:
Packit 6c4009
	case R_386_JMP_SLOT:
Packit 6c4009
	case R_386_32:
Packit 6c4009
	  *reloc_addr = value + reloc->r_addend;
Packit 6c4009
	  break;
Packit 6c4009
#  ifndef RESOLVE_CONFLICT_FIND_MAP
Packit 6c4009
	  /* Not needed for dl-conflict.c.  */
Packit 6c4009
	case R_386_PC32:
Packit 6c4009
	  *reloc_addr = (value + reloc->r_addend - (Elf32_Addr) reloc_addr);
Packit 6c4009
	  break;
Packit 6c4009
Packit 6c4009
	case R_386_TLS_DTPMOD32:
Packit 6c4009
	  /* Get the information from the link map returned by the
Packit 6c4009
	     resolv function.  */
Packit 6c4009
	  if (sym_map != NULL)
Packit 6c4009
	    *reloc_addr = sym_map->l_tls_modid;
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_DTPOFF32:
Packit 6c4009
	  /* During relocation all TLS symbols are defined and used.
Packit 6c4009
	     Therefore the offset is already correct.  */
Packit 6c4009
	  *reloc_addr = (sym == NULL ? 0 : sym->st_value) + reloc->r_addend;
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_DESC:
Packit 6c4009
	  {
Packit 6c4009
	    struct tlsdesc volatile *td =
Packit 6c4009
	      (struct tlsdesc volatile *)reloc_addr;
Packit 6c4009
Packit 6c4009
#   ifndef RTLD_BOOTSTRAP
Packit 6c4009
	    if (!sym)
Packit 6c4009
	      {
Packit 6c4009
		td->arg = (void*)reloc->r_addend;
Packit 6c4009
		td->entry = _dl_tlsdesc_undefweak;
Packit 6c4009
	      }
Packit 6c4009
	    else
Packit 6c4009
#   endif
Packit 6c4009
	      {
Packit 6c4009
#   ifndef RTLD_BOOTSTRAP
Packit 6c4009
#    ifndef SHARED
Packit 6c4009
		CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
#    else
Packit 6c4009
		if (!TRY_STATIC_TLS (map, sym_map))
Packit 6c4009
		  {
Packit 6c4009
		    td->arg = _dl_make_tlsdesc_dynamic
Packit 6c4009
		      (sym_map, sym->st_value + reloc->r_addend);
Packit 6c4009
		    td->entry = _dl_tlsdesc_dynamic;
Packit 6c4009
		  }
Packit 6c4009
		else
Packit 6c4009
#    endif
Packit 6c4009
#   endif
Packit 6c4009
		  {
Packit 6c4009
		    td->arg = (void*)(sym->st_value - sym_map->l_tls_offset
Packit 6c4009
				      + reloc->r_addend);
Packit 6c4009
		    td->entry = _dl_tlsdesc_return;
Packit 6c4009
		  }
Packit 6c4009
	      }
Packit 6c4009
	  }
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_TPOFF32:
Packit 6c4009
	  /* The offset is positive, backward from the thread pointer.  */
Packit 6c4009
	  /* We know the offset of object the symbol is contained in.
Packit 6c4009
	     It is a positive value which will be subtracted from the
Packit 6c4009
	     thread pointer.  To get the variable position in the TLS
Packit 6c4009
	     block we subtract the offset from that of the TLS block.  */
Packit 6c4009
	  if (sym != NULL)
Packit 6c4009
	    {
Packit 6c4009
	      CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
	      *reloc_addr = sym_map->l_tls_offset - sym->st_value
Packit 6c4009
			    + reloc->r_addend;
Packit 6c4009
	    }
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_TLS_TPOFF:
Packit 6c4009
	  /* The offset is negative, forward from the thread pointer.  */
Packit 6c4009
	  /* We know the offset of object the symbol is contained in.
Packit 6c4009
	     It is a negative value which will be added to the
Packit 6c4009
	     thread pointer.  */
Packit 6c4009
	  if (sym != NULL)
Packit 6c4009
	    {
Packit 6c4009
	      CHECK_STATIC_TLS (map, sym_map);
Packit 6c4009
	      *reloc_addr = sym->st_value - sym_map->l_tls_offset
Packit 6c4009
			    + reloc->r_addend;
Packit 6c4009
	    }
Packit 6c4009
	  break;
Packit 6c4009
	case R_386_COPY:
Packit 6c4009
	  if (sym == NULL)
Packit 6c4009
	    /* This can happen in trace mode if an object could not be
Packit 6c4009
	       found.  */
Packit 6c4009
	    break;
Packit 6c4009
	  if (__glibc_unlikely (sym->st_size > refsym->st_size)
Packit 6c4009
	      || (__glibc_unlikely (sym->st_size < refsym->st_size)
Packit 6c4009
		  && GLRO(dl_verbose)))
Packit 6c4009
	    {
Packit 6c4009
	      const char *strtab;
Packit 6c4009
Packit 6c4009
	      strtab = (const char *) D_PTR (map, l_info[DT_STRTAB]);
Packit 6c4009
	      _dl_error_printf ("\
Packit 6c4009
%s: Symbol `%s' has different size in shared object, consider re-linking\n",
Packit 6c4009
				RTLD_PROGNAME, strtab + refsym->st_name);
Packit 6c4009
	    }
Packit 6c4009
	  memcpy (reloc_addr_arg, (void *) value,
Packit 6c4009
		  MIN (sym->st_size, refsym->st_size));
Packit 6c4009
	  break;
Packit 6c4009
#  endif /* !RESOLVE_CONFLICT_FIND_MAP */
Packit 6c4009
	case R_386_IRELATIVE:
Packit 6c4009
	  value = map->l_addr + reloc->r_addend;
Packit 6c4009
	  value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
	  *reloc_addr = value;
Packit 6c4009
	  break;
Packit 6c4009
	default:
Packit 6c4009
	  /* We add these checks in the version to relocate ld.so only
Packit 6c4009
	     if we are still debugging.  */
Packit 6c4009
	  _dl_reloc_bad_type (map, r_type, 0);
Packit 6c4009
	  break;
Packit 6c4009
	}
Packit 6c4009
    }
Packit 6c4009
}
Packit 6c4009
# endif	/* !RTLD_BOOTSTRAP */
Packit 6c4009
Packit 6c4009
auto inline void
Packit 6c4009
__attribute ((always_inline))
Packit 6c4009
elf_machine_rel_relative (Elf32_Addr l_addr, const Elf32_Rel *reloc,
Packit 6c4009
			  void *const reloc_addr_arg)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = reloc_addr_arg;
Packit 6c4009
  assert (ELF32_R_TYPE (reloc->r_info) == R_386_RELATIVE);
Packit 6c4009
  *reloc_addr += l_addr;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
auto inline void
Packit 6c4009
__attribute__ ((always_inline))
Packit 6c4009
elf_machine_rela_relative (Elf32_Addr l_addr, const Elf32_Rela *reloc,
Packit 6c4009
			   void *const reloc_addr_arg)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = reloc_addr_arg;
Packit 6c4009
  *reloc_addr = l_addr + reloc->r_addend;
Packit 6c4009
}
Packit 6c4009
# endif	/* !RTLD_BOOTSTRAP */
Packit 6c4009
Packit 6c4009
auto inline void
Packit 6c4009
__attribute__ ((always_inline))
Packit 6c4009
elf_machine_lazy_rel (struct link_map *map,
Packit 6c4009
		      Elf32_Addr l_addr, const Elf32_Rel *reloc,
Packit 6c4009
		      int skip_ifunc)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = (void *) (l_addr + reloc->r_offset);
Packit 6c4009
  const unsigned int r_type = ELF32_R_TYPE (reloc->r_info);
Packit 6c4009
  /* Check for unexpected PLT reloc type.  */
Packit 6c4009
  if (__glibc_likely (r_type == R_386_JMP_SLOT))
Packit 6c4009
    {
Packit 6c4009
      /* Prelink has been deprecated.  */
Packit 6c4009
      if (__glibc_likely (map->l_mach.plt == 0))
Packit 6c4009
	*reloc_addr += l_addr;
Packit 6c4009
      else
Packit 6c4009
	*reloc_addr = (map->l_mach.plt
Packit 6c4009
		       + (((Elf32_Addr) reloc_addr) - map->l_mach.gotplt) * 4);
Packit 6c4009
    }
Packit 6c4009
  else if (__glibc_likely (r_type == R_386_TLS_DESC))
Packit 6c4009
    {
Packit 6c4009
      struct tlsdesc volatile * __attribute__((__unused__)) td =
Packit 6c4009
	(struct tlsdesc volatile *)reloc_addr;
Packit 6c4009
Packit 6c4009
      /* Handle relocations that reference the local *ABS* in a simple
Packit 6c4009
	 way, so as to preserve a potential addend.  */
Packit 6c4009
      if (ELF32_R_SYM (reloc->r_info) == 0)
Packit 6c4009
	td->entry = _dl_tlsdesc_resolve_abs_plus_addend;
Packit 6c4009
      /* Given a known-zero addend, we can store a pointer to the
Packit 6c4009
	 reloc in the arg position.  */
Packit 6c4009
      else if (td->arg == 0)
Packit 6c4009
	{
Packit 6c4009
	  td->arg = (void*)reloc;
Packit 6c4009
	  td->entry = _dl_tlsdesc_resolve_rel;
Packit 6c4009
	}
Packit 6c4009
      else
Packit 6c4009
	{
Packit 6c4009
	  /* We could handle non-*ABS* relocations with non-zero addends
Packit 6c4009
	     by allocating dynamically an arg to hold a pointer to the
Packit 6c4009
	     reloc, but that sounds pointless.  */
Packit 6c4009
	  const Elf32_Rel *const r = reloc;
Packit 6c4009
	  /* The code below was borrowed from elf_dynamic_do_rel().  */
Packit 6c4009
	  const ElfW(Sym) *const symtab =
Packit 6c4009
	    (const void *) D_PTR (map, l_info[DT_SYMTAB]);
Packit 6c4009
Packit 6c4009
# ifdef RTLD_BOOTSTRAP
Packit 6c4009
	  /* The dynamic linker always uses versioning.  */
Packit 6c4009
	  assert (map->l_info[VERSYMIDX (DT_VERSYM)] != NULL);
Packit 6c4009
# else
Packit 6c4009
	  if (map->l_info[VERSYMIDX (DT_VERSYM)])
Packit 6c4009
# endif
Packit 6c4009
	    {
Packit 6c4009
	      const ElfW(Half) *const version =
Packit 6c4009
		(const void *) D_PTR (map, l_info[VERSYMIDX (DT_VERSYM)]);
Packit 6c4009
	      ElfW(Half) ndx = version[ELFW(R_SYM) (r->r_info)] & 0x7fff;
Packit 6c4009
	      elf_machine_rel (map, r, &symtab[ELFW(R_SYM) (r->r_info)],
Packit 6c4009
			       &map->l_versions[ndx],
Packit 6c4009
			       (void *) (l_addr + r->r_offset), skip_ifunc);
Packit 6c4009
	    }
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
	  else
Packit 6c4009
	    elf_machine_rel (map, r, &symtab[ELFW(R_SYM) (r->r_info)], NULL,
Packit 6c4009
			     (void *) (l_addr + r->r_offset), skip_ifunc);
Packit 6c4009
# endif
Packit 6c4009
	}
Packit 6c4009
    }
Packit 6c4009
  else if (__glibc_unlikely (r_type == R_386_IRELATIVE))
Packit 6c4009
    {
Packit 6c4009
      Elf32_Addr value = map->l_addr + *reloc_addr;
Packit 6c4009
      if (__glibc_likely (!skip_ifunc))
Packit 6c4009
	value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
      *reloc_addr = value;
Packit 6c4009
    }
Packit 6c4009
  else
Packit 6c4009
    _dl_reloc_bad_type (map, r_type, 1);
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
# ifndef RTLD_BOOTSTRAP
Packit 6c4009
Packit 6c4009
auto inline void
Packit 6c4009
__attribute__ ((always_inline))
Packit 6c4009
elf_machine_lazy_rela (struct link_map *map,
Packit 6c4009
		       Elf32_Addr l_addr, const Elf32_Rela *reloc,
Packit 6c4009
		       int skip_ifunc)
Packit 6c4009
{
Packit 6c4009
  Elf32_Addr *const reloc_addr = (void *) (l_addr + reloc->r_offset);
Packit 6c4009
  const unsigned int r_type = ELF32_R_TYPE (reloc->r_info);
Packit 6c4009
  if (__glibc_likely (r_type == R_386_JMP_SLOT))
Packit 6c4009
    ;
Packit 6c4009
  else if (__glibc_likely (r_type == R_386_TLS_DESC))
Packit 6c4009
    {
Packit 6c4009
      struct tlsdesc volatile * __attribute__((__unused__)) td =
Packit 6c4009
	(struct tlsdesc volatile *)reloc_addr;
Packit 6c4009
Packit 6c4009
      td->arg = (void*)reloc;
Packit 6c4009
      td->entry = _dl_tlsdesc_resolve_rela;
Packit 6c4009
    }
Packit 6c4009
  else if (__glibc_unlikely (r_type == R_386_IRELATIVE))
Packit 6c4009
    {
Packit 6c4009
      Elf32_Addr value = map->l_addr + reloc->r_addend;
Packit 6c4009
      if (__glibc_likely (!skip_ifunc))
Packit 6c4009
	value = ((Elf32_Addr (*) (void)) value) ();
Packit 6c4009
      *reloc_addr = value;
Packit 6c4009
    }
Packit 6c4009
  else
Packit 6c4009
    _dl_reloc_bad_type (map, r_type, 1);
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
# endif	/* !RTLD_BOOTSTRAP */
Packit 6c4009
Packit 6c4009
#endif /* RESOLVE_MAP */