]> sourceware.org Git - glibc.git/blame - sysdeps/i386/dl-machine.h
Update.
[glibc.git] / sysdeps / i386 / dl-machine.h
CommitLineData
d66e34cd 1/* Machine-dependent ELF dynamic relocation inline functions. i386 version.
7dea968e 2 Copyright (C) 1995, 1996, 1997, 1998 Free Software Foundation, Inc.
47707456 3 This file is part of the GNU C Library.
d66e34cd 4
47707456
UD
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Library General Public License as
7 published by the Free Software Foundation; either version 2 of the
8 License, or (at your option) any later version.
d66e34cd 9
47707456
UD
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Library General Public License for more details.
d66e34cd 14
47707456 15 You should have received a copy of the GNU Library General Public
01c901a5
UD
16 License along with the GNU C Library; see the file COPYING.LIB. If not,
17 write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA. */
d66e34cd 19
f51d1dfd
RM
20#ifndef dl_machine_h
21#define dl_machine_h
22
d66e34cd
RM
23#define ELF_MACHINE_NAME "i386"
24
1f07e617
UD
25#include <sys/param.h>
26
d66e34cd 27#include <assert.h>
d66e34cd
RM
28
29/* Return nonzero iff E_MACHINE is compatible with the running host. */
e75154a6 30static inline int __attribute__ ((unused))
d66e34cd
RM
31elf_machine_matches_host (Elf32_Half e_machine)
32{
33 switch (e_machine)
34 {
35 case EM_386:
36 case EM_486:
37 return 1;
38 default:
39 return 0;
40 }
41}
42
43
47707456
UD
44/* Return the link-time address of _DYNAMIC. Conveniently, this is the
45 first element of the GOT. This must be inlined in a function which
46 uses global data. */
0a54e401 47static inline Elf32_Addr __attribute__ ((unused))
47707456 48elf_machine_dynamic (void)
d66e34cd
RM
49{
50 register Elf32_Addr *got asm ("%ebx");
47707456 51 return *got;
d66e34cd
RM
52}
53
54
55/* Return the run-time load address of the shared object. */
e75154a6 56static inline Elf32_Addr __attribute__ ((unused))
d66e34cd
RM
57elf_machine_load_address (void)
58{
59 Elf32_Addr addr;
92f1da4d
UD
60 asm ("leal _dl_start@GOTOFF(%%ebx), %0\n"
61 "subl _dl_start@GOT(%%ebx), %0"
62 : "=r" (addr) : : "cc");
d66e34cd
RM
63 return addr;
64}
d66e34cd 65
5ae9d168 66#ifndef PROF
831372e7
UD
67/* We add a declaration of this function here so that in dl-runtime.c
68 the ELF_MACHINE_RUNTIME_TRAMPOLINE macro really can pass the parameters
5ae9d168
UD
69 in registers.
70
71 We cannot use this scheme for profiling because the _mcount call
72 destroys the passed register information. */
831372e7
UD
73static ElfW(Addr) fixup (struct link_map *l, ElfW(Word) reloc_offset)
74 __attribute__ ((regparm (2), unused));
3996f34b
UD
75static ElfW(Addr) profile_fixup (struct link_map *l, ElfW(Word) reloc_offset,
76 ElfW(Addr) retaddr)
77 __attribute__ ((regparm (3), unused));
5ae9d168 78#endif
831372e7 79
d66e34cd
RM
80/* Set up the loaded object described by L so its unrelocated PLT
81 entries will jump to the on-demand fixup code in dl-runtime.c. */
82
0a54e401 83static inline int __attribute__ ((unused))
3996f34b 84elf_machine_runtime_setup (struct link_map *l, int lazy, int profile)
d66e34cd 85{
a1a9d215 86 Elf32_Addr *got;
d66e34cd 87 extern void _dl_runtime_resolve (Elf32_Word);
3996f34b 88 extern void _dl_runtime_profile (Elf32_Word);
a1a9d215 89
a2e1b046
RM
90 if (l->l_info[DT_JMPREL] && lazy)
91 {
92 /* The GOT entries for functions in the PLT have not yet been filled
93 in. Their initial contents will arrange when called to push an
94 offset into the .rel.plt section, push _GLOBAL_OFFSET_TABLE_[1],
95 and then jump to _GLOBAL_OFFSET_TABLE[2]. */
96 got = (Elf32_Addr *) (l->l_addr + l->l_info[DT_PLTGOT]->d_un.d_ptr);
97 got[1] = (Elf32_Addr) l; /* Identify this shared object. */
3996f34b
UD
98
99 /* The got[2] entry contains the address of a function which gets
100 called to get the address of a so far unresolved function and
101 jump to it. The profiling extension of the dynamic linker allows
102 to intercept the calls to collect information. In this case we
103 don't store the address in the GOT so that all future calls also
104 end in this function. */
105 if (profile)
106 {
107 got[2] = (Elf32_Addr) &_dl_runtime_profile;
108 /* Say that we really want profiling and the timers are started. */
109 _dl_profile_map = l;
110 }
111 else
112 /* This function will get called to fix up the GOT entry indicated by
113 the offset on the stack, and then jump to the resolved address. */
114 got[2] = (Elf32_Addr) &_dl_runtime_resolve;
a2e1b046 115 }
d66e34cd 116
0501d603
UD
117 return lazy;
118}
831372e7 119
0501d603
UD
120/* This code is used in dl-runtime.c to call the `fixup' function
121 and then redirect to the address it returns. */
5ae9d168
UD
122#ifndef PROF
123# define ELF_MACHINE_RUNTIME_TRAMPOLINE asm ("\
650425ce 124 .text
38334018
RM
125 .globl _dl_runtime_resolve
126 .type _dl_runtime_resolve, @function
f41c8091 127 .align 16
38334018 128_dl_runtime_resolve:
831372e7
UD
129 pushl %eax # Preserve registers otherwise clobbered.
130 pushl %ecx
131 pushl %edx
132 movl 16(%esp), %edx # Copy args pushed by PLT in register. Note
133 movl 12(%esp), %eax # that `fixup' takes its parameters in regs.
134 call fixup # Call resolver.
135 popl %edx # Get register content back.
136 popl %ecx
137 xchgl %eax, (%esp) # Get %eax contents end store function address.
138 ret $8 # Jump to function address.
139 .size _dl_runtime_resolve, .-_dl_runtime_resolve
3996f34b
UD
140
141 .globl _dl_runtime_profile
142 .type _dl_runtime_profile, @function
f41c8091 143 .align 16
3996f34b
UD
144_dl_runtime_profile:
145 pushl %eax # Preserve registers otherwise clobbered.
146 pushl %ecx
147 pushl %edx
148 movl 20(%esp), %ecx # Load return address
149 movl 16(%esp), %edx # Copy args pushed by PLT in register. Note
150 movl 12(%esp), %eax # that `fixup' takes its parameters in regs.
151 call profile_fixup # Call resolver.
152 popl %edx # Get register content back.
153 popl %ecx
154 xchgl %eax, (%esp) # Get %eax contents end store function address.
155 ret $8 # Jump to function address.
156 .size _dl_runtime_profile, .-_dl_runtime_profile
650425ce 157 .previous
38334018 158");
5ae9d168
UD
159#else
160# define ELF_MACHINE_RUNTIME_TRAMPOLINE asm ("\
650425ce 161 .text
5ae9d168 162 .globl _dl_runtime_resolve
3996f34b 163 .globl _dl_runtime_profile
5ae9d168 164 .type _dl_runtime_resolve, @function
3996f34b 165 .type _dl_runtime_profile, @function
f41c8091 166 .align 16
5ae9d168 167_dl_runtime_resolve:
3996f34b 168_dl_runtime_profile:
5ae9d168
UD
169 pushl %eax # Preserve registers otherwise clobbered.
170 pushl %ecx
171 pushl %edx
172 movl 16(%esp), %edx # Push the arguments for `fixup'
173 movl 12(%esp), %eax
174 pushl %edx
175 pushl %eax
176 call fixup # Call resolver.
177 popl %edx # Pop the parameters
178 popl %ecx
179 popl %edx # Get register content back.
180 popl %ecx
181 xchgl %eax, (%esp) # Get %eax contents end store function address.
182 ret $8 # Jump to function address.
183 .size _dl_runtime_resolve, .-_dl_runtime_resolve
3996f34b 184 .size _dl_runtime_profile, .-_dl_runtime_profile
650425ce 185 .previous
5ae9d168
UD
186");
187#endif
d66e34cd 188
5bf62f2d
RM
189/* Mask identifying addresses reserved for the user program,
190 where the dynamic linker should not map anything. */
191#define ELF_MACHINE_USER_ADDRESS_MASK 0xf8000000UL
192
d66e34cd
RM
193/* Initial entry point code for the dynamic linker.
194 The C function `_dl_start' is the real entry point;
195 its return value is the user program's entry point. */
196
197#define RTLD_START asm ("\
198.text\n\
199.globl _start\n\
421f82e5
RM
200.globl _dl_start_user\n\
201_start:\n\
8d6468d0 202 pushl %esp\n\
421f82e5 203 call _dl_start\n\
8d6468d0 204 popl %ebx\n\
421f82e5
RM
205_dl_start_user:\n\
206 # Save the user entry point address in %edi.\n\
207 movl %eax, %edi\n\
208 # Point %ebx at the GOT.
a1a9d215
RM
209 call 0f\n\
2100: popl %ebx\n\
211 addl $_GLOBAL_OFFSET_TABLE_+[.-0b], %ebx\n\
212 # See if we were run as a command with the executable file\n\
213 # name as an extra leading argument.\n\
24906b43 214 movl _dl_skip_args@GOT(%ebx), %eax\n\
edf5b2d7 215 movl (%eax), %eax\n\
24906b43
RM
216 # Pop the original argument count.\n\
217 popl %ecx\n\
218 # Subtract _dl_skip_args from it.\n\
219 subl %eax, %ecx\n\
220 # Adjust the stack pointer to skip _dl_skip_args words.\n\
221 leal (%esp,%eax,4), %esp\n\
222 # Push back the modified argument count.\n\
223 pushl %ecx\n\
ba79d61b
RM
224 # Push _dl_default_scope[2] as argument in _dl_init_next call below.\n\
225 movl _dl_default_scope@GOT(%ebx), %eax\n\
226 movl 8(%eax), %esi\n\
d0fc4041 2270: movl %esi,%eax\n\
d66e34cd
RM
228 # Call _dl_init_next to return the address of an initializer\n\
229 # function to run.\n\
f68b86cc 230 call _dl_init_next@PLT\n\
d66e34cd 231 # Check for zero return, when out of initializers.\n\
edf5b2d7 232 testl %eax, %eax\n\
d66e34cd
RM
233 jz 1f\n\
234 # Call the shared object initializer function.\n\
f68b86cc 235 # NOTE: We depend only on the registers (%ebx, %esi and %edi)\n\
d66e34cd
RM
236 # and the return address pushed by this call;\n\
237 # the initializer is called with the stack just\n\
238 # as it appears on entry, and it is free to move\n\
239 # the stack around, as long as it winds up jumping to\n\
240 # the return address on the top of the stack.\n\
241 call *%eax\n\
242 # Loop to call _dl_init_next for the next initializer.\n\
243 jmp 0b\n\
39778c6c 2441: # Clear the startup flag.\n\
edf5b2d7
UD
245 movl _dl_starting_up@GOT(%ebx), %eax\n\
246 movl $0, (%eax)\n\
39778c6c 247 # Pass our finalizer function to the user in %edx, as per ELF ABI.\n\
a1a9d215 248 movl _dl_fini@GOT(%ebx), %edx\n\
421f82e5
RM
249 # Jump to the user's entry point.\n\
250 jmp *%edi\n\
92f1da4d 251.previous\n\
d66e34cd 252");
f51d1dfd 253
34b402e5
UD
254/* Nonzero iff TYPE should not be allowed to resolve to one of
255 the main executable's symbols, as for a COPY reloc. */
bc9f6000
UD
256#define elf_machine_lookup_noexec_p(type) ((type) == R_386_COPY)
257
258/* Nonzero iff TYPE describes relocation of a PLT entry, so
259 PLT entries should not be allowed to define the value. */
260#define elf_machine_lookup_noplt_p(type) ((type) == R_386_JMP_SLOT)
261
262/* A reloc type used for ld.so cmdline arg lookups to reject PLT entries. */
a2b08ee5 263#define ELF_MACHINE_JMP_SLOT R_386_JMP_SLOT
f51d1dfd
RM
264
265/* The i386 never uses Elf32_Rela relocations. */
266#define ELF_MACHINE_NO_RELA 1
267
0a54e401
UD
268/* We define an initialization functions. This is called very early in
269 _dl_sysdep_start. */
270#define DL_PLATFORM_INIT dl_platform_init ()
271
272extern const char *_dl_platform;
273
274static inline void __attribute__ ((unused))
275dl_platform_init (void)
276{
27a5bb33
UD
277 if (_dl_platform != NULL && *_dl_platform == '\0')
278 /* Avoid an empty string which would disturb us. */
0a54e401
UD
279 _dl_platform = NULL;
280}
281
a2b08ee5
UD
282static inline void
283elf_machine_fixup_plt (struct link_map *map, const Elf32_Rel *reloc,
284 Elf32_Addr *reloc_addr, Elf32_Addr value)
285{
286 *reloc_addr = value;
287}
288
dfd2257a
UD
289/* Return the final value of a plt relocation. */
290static inline Elf32_Addr
291elf_machine_plt_value (struct link_map *map, const Elf32_Rel *reloc,
292 Elf32_Addr value)
293{
294 return value;
295}
296
f51d1dfd
RM
297#endif /* !dl_machine_h */
298
299#ifdef RESOLVE
300
301/* Perform the relocation specified by RELOC and SYM (which is fully resolved).
302 MAP is the object containing the reloc. */
303
304static inline void
c84142e8 305elf_machine_rel (struct link_map *map, const Elf32_Rel *reloc,
3996f34b
UD
306 const Elf32_Sym *sym, const struct r_found_version *version,
307 Elf32_Addr *const reloc_addr)
f51d1dfd 308{
bc9f6000 309 if (ELF32_R_TYPE (reloc->r_info) == R_386_RELATIVE)
f51d1dfd 310 {
f51d1dfd
RM
311#ifndef RTLD_BOOTSTRAP
312 if (map != &_dl_rtld_map) /* Already done in rtld itself. */
313#endif
314 *reloc_addr += map->l_addr;
f51d1dfd 315 }
714a562f 316 else if (ELF32_R_TYPE (reloc->r_info) != R_386_NONE)
bc9f6000 317 {
bc9f6000 318 const Elf32_Sym *const refsym = sym;
bc9f6000
UD
319 Elf32_Addr value = RESOLVE (&sym, version, ELF32_R_TYPE (reloc->r_info));
320 if (sym)
321 value += sym->st_value;
322
323 switch (ELF32_R_TYPE (reloc->r_info))
324 {
325 case R_386_COPY:
5107cf1d
UD
326 if (sym == NULL)
327 /* This can happen in trace mode if an object could not be
328 found. */
329 break;
cf29ffbe
UD
330 if (sym->st_size > refsym->st_size
331 || (_dl_verbose && sym->st_size < refsym->st_size))
1f07e617
UD
332 {
333 const char *strtab;
334
bd355af0 335 strtab = ((const char *) map->l_addr
1f07e617 336 + map->l_info[DT_STRTAB]->d_un.d_ptr);
60c96635
UD
337 _dl_sysdep_error (_dl_argv[0] ?: "<program name unknown>",
338 ": Symbol `", strtab + refsym->st_name,
1f07e617
UD
339 "' has different size in shared object, "
340 "consider re-linking\n", NULL);
341 }
342 memcpy (reloc_addr, (void *) value, MIN (sym->st_size,
343 refsym->st_size));
bc9f6000
UD
344 break;
345 case R_386_GLOB_DAT:
346 case R_386_JMP_SLOT:
347 *reloc_addr = value;
348 break;
349 case R_386_32:
350 {
351#ifndef RTLD_BOOTSTRAP
352 /* This is defined in rtld.c, but nowhere in the static
353 libc.a; make the reference weak so static programs can
354 still link. This declaration cannot be done when
355 compiling rtld.c (i.e. #ifdef RTLD_BOOTSTRAP) because
356 rtld.c contains the common defn for _dl_rtld_map, which
357 is incompatible with a weak decl in the same file. */
358 weak_extern (_dl_rtld_map);
359 if (map == &_dl_rtld_map)
360 /* Undo the relocation done here during bootstrapping.
361 Now we will relocate it anew, possibly using a
362 binding found in the user program or a loaded library
363 rather than the dynamic linker's built-in definitions
364 used while loading those libraries. */
365 value -= map->l_addr + refsym->st_value;
366#endif
367 *reloc_addr += value;
368 break;
369 }
370 case R_386_PC32:
371 *reloc_addr += (value - (Elf32_Addr) reloc_addr);
372 break;
bc9f6000
UD
373 default:
374 assert (! "unexpected dynamic reloc type");
375 break;
376 }
377 }
f51d1dfd
RM
378}
379
380static inline void
381elf_machine_lazy_rel (struct link_map *map, const Elf32_Rel *reloc)
382{
383 Elf32_Addr *const reloc_addr = (void *) (map->l_addr + reloc->r_offset);
384 switch (ELF32_R_TYPE (reloc->r_info))
385 {
386 case R_386_JMP_SLOT:
387 *reloc_addr += map->l_addr;
388 break;
389 default:
390 assert (! "unexpected PLT reloc type");
391 break;
392 }
393}
394
395#endif /* RESOLVE */
This page took 0.119288 seconds and 5 git commands to generate.