4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
23 * Copyright (c) 1990, 1991 UNIX System Laboratories, Inc.
24 * Copyright (c) 1988 AT&T
27 * Copyright (c) 1992, 2010, Oracle and/or its affiliates. All rights reserved.
30 /* Get the x86 version of the relocation engine */
31 #define DO_RELOC_LIBLD_X86
35 #include <sys/elf_386.h>
37 #include <krtld/reloc.h>
38 #include <i386/machdep_x86.h>
43 * Search the GOT index list for a GOT entry with a matching reference.
47 ld_find_got_ndx(Alist
*alp
, Gotref gref
, Ofl_desc
*ofl
, Rel_desc
*rdesc
)
52 if ((gref
== GOT_REF_TLSLD
) && ofl
->ofl_tlsldgotndx
)
53 return (ofl
->ofl_tlsldgotndx
);
55 for (ALIST_TRAVERSE(alp
, idx
, gnp
)) {
56 if (gnp
->gn_gotref
== gref
)
63 ld_calc_got_offset(Rel_desc
*rdesc
, Ofl_desc
*ofl
)
65 Os_desc
*osp
= ofl
->ofl_osgot
;
66 Sym_desc
*sdp
= rdesc
->rel_sym
;
71 if (rdesc
->rel_flags
& FLG_REL_DTLS
)
73 else if (rdesc
->rel_flags
& FLG_REL_MTLS
)
75 else if (rdesc
->rel_flags
& FLG_REL_STLS
)
78 gref
= GOT_REF_GENERIC
;
80 gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
, gref
, ofl
, NULL
);
83 gotndx
= (Xword
)gnp
->gn_gotndx
;
85 if ((rdesc
->rel_flags
& FLG_REL_DTLS
) &&
86 (rdesc
->rel_rtype
== R_386_TLS_DTPOFF32
))
89 return ((Xword
)(osp
->os_shdr
->sh_addr
+ (gotndx
* M_GOT_ENTSIZE
)));
93 ld_init_rel(Rel_desc
*reld
, Word
*typedata
, void *reloc
)
95 Rel
*rel
= (Rel
*)reloc
;
98 reld
->rel_rtype
= (Word
)ELF_R_TYPE(rel
->r_info
, M_MACH
);
99 reld
->rel_roffset
= rel
->r_offset
;
100 reld
->rel_raddend
= 0;
103 return ((Word
)ELF_R_SYM(rel
->r_info
));
107 ld_mach_eflags(Ehdr
*ehdr
, Ofl_desc
*ofl
)
109 ofl
->ofl_dehdr
->e_flags
|= ehdr
->e_flags
;
113 ld_mach_make_dynamic(Ofl_desc
*ofl
, size_t *cnt
)
115 if (!(ofl
->ofl_flags
& FLG_OF_RELOBJ
)) {
117 * Create this entry if we are going to create a PLT table.
120 (*cnt
)++; /* DT_PLTGOT */
125 ld_mach_update_odynamic(Ofl_desc
*ofl
, Dyn
**dyn
)
127 if (((ofl
->ofl_flags
& FLG_OF_RELOBJ
) == 0) && ofl
->ofl_pltcnt
) {
128 (*dyn
)->d_tag
= DT_PLTGOT
;
130 (*dyn
)->d_un
.d_ptr
= ofl
->ofl_osgot
->os_shdr
->sh_addr
;
132 (*dyn
)->d_un
.d_ptr
= 0;
138 ld_calc_plt_addr(Sym_desc
*sdp
, Ofl_desc
*ofl
)
142 value
= (Xword
)(ofl
->ofl_osplt
->os_shdr
->sh_addr
) +
143 M_PLT_RESERVSZ
+ ((sdp
->sd_aux
->sa_PLTndx
- 1) * M_PLT_ENTSIZE
);
148 * Build a single plt entry - code is:
149 * if (building a.out)
152 * JMP *got_off@GOT(%ebx)
154 * JMP -n(%pc) # -n is pcrel offset to first plt entry
156 * The got_off@GOT entry gets filled with the address of the PUSHL,
157 * so the first pass through the plt jumps back here, jumping
158 * in turn to the first plt entry, which jumps to the dynamic
159 * linker. The dynamic linker then patches the GOT, rerouting
160 * future plt calls to the proper destination.
163 plt_entry(Ofl_desc
* ofl
, Word rel_off
, Sym_desc
* sdp
)
165 uchar_t
*pltent
, *gotent
;
168 int bswap
= (ofl
->ofl_flags1
& FLG_OF1_ENCDIFF
) != 0;
170 got_off
= sdp
->sd_aux
->sa_PLTGOTndx
* M_GOT_ENTSIZE
;
171 plt_off
= M_PLT_RESERVSZ
+ ((sdp
->sd_aux
->sa_PLTndx
- 1) *
173 pltent
= (uchar_t
*)(ofl
->ofl_osplt
->os_outdata
->d_buf
) + plt_off
;
174 gotent
= (uchar_t
*)(ofl
->ofl_osgot
->os_outdata
->d_buf
) + got_off
;
177 * Fill in the got entry with the address of the next instruction.
180 *(Word
*)gotent
= ofl
->ofl_osplt
->os_shdr
->sh_addr
+ plt_off
+
184 *(Word
*)gotent
= ld_bswap_Word(*(Word
*)gotent
);
186 if (!(ofl
->ofl_flags
& (FLG_OF_SHAROBJ
| FLG_OF_PIE
))) {
187 pltent
[0] = M_SPECIAL_INST
;
188 pltent
[1] = M_JMP_DISP_IND
;
191 *(Word
*)pltent
= (Word
)(ofl
->ofl_osgot
->os_shdr
->sh_addr
+
194 pltent
[0] = M_SPECIAL_INST
;
195 pltent
[1] = M_JMP_REG_DISP_IND
;
198 *(Word
*)pltent
= (Word
)got_off
;
202 *(Word
*)pltent
= ld_bswap_Word(*(Word
*)pltent
);
205 pltent
[0] = M_INST_PUSHL
;
208 *(Word
*)pltent
= (Word
)rel_off
;
211 *(Word
*)pltent
= ld_bswap_Word(*(Word
*)pltent
);
214 plt_off
= -(plt_off
+ 16); /* JMP, PUSHL, JMP take 16 bytes */
215 pltent
[0] = M_INST_JMP
;
218 *(Word
*)pltent
= (Word
)plt_off
;
221 *(Word
*)pltent
= ld_bswap_Word(*(Word
*)pltent
);
225 ld_perform_outreloc(Rel_desc
* orsp
, Ofl_desc
* ofl
, Boolean
*remain_seen
)
227 Os_desc
* relosp
, * osp
= 0;
228 Word ndx
, roffset
, value
;
231 Sym_desc
* sdp
, * psym
= (Sym_desc
*)0;
237 * If the section this relocation is against has been discarded
238 * (-zignore), then also discard (skip) the relocation itself.
240 if (orsp
->rel_isdesc
&& ((orsp
->rel_flags
&
241 (FLG_REL_GOT
| FLG_REL_BSS
| FLG_REL_PLT
| FLG_REL_NOINFO
)) == 0) &&
242 (orsp
->rel_isdesc
->is_flags
& FLG_IS_DISCARD
)) {
243 DBG_CALL(Dbg_reloc_discard(ofl
->ofl_lml
, M_MACH
, orsp
));
248 * If this is a relocation against a move table, or expanded move
249 * table, adjust the relocation entries.
251 if (RELAUX_GET_MOVE(orsp
))
252 ld_adj_movereloc(ofl
, orsp
);
255 * If this is a relocation against a section using a partial initialized
256 * symbol, adjust the embedded symbol info.
258 * The second argument of the am_I_partial() is the value stored at the
259 * target address relocation is going to be applied.
261 if (ELF_ST_TYPE(sdp
->sd_sym
->st_info
) == STT_SECTION
) {
262 if (ofl
->ofl_parsyms
&&
263 (sdp
->sd_isc
->is_flags
& FLG_IS_RELUPD
) &&
265 (psym
= ld_am_I_partial(orsp
, *(Xword
*)
266 ((uchar_t
*)(orsp
->rel_isdesc
->is_indata
->d_buf
) +
267 orsp
->rel_roffset
)))) {
268 DBG_CALL(Dbg_move_outsctadj(ofl
->ofl_lml
, psym
));
273 value
= sdp
->sd_sym
->st_value
;
275 if (orsp
->rel_flags
& FLG_REL_GOT
) {
276 osp
= ofl
->ofl_osgot
;
277 roffset
= (Word
)ld_calc_got_offset(orsp
, ofl
);
279 } else if (orsp
->rel_flags
& FLG_REL_PLT
) {
281 * Note that relocations for PLT's actually
282 * cause a relocation againt the GOT.
284 osp
= ofl
->ofl_osplt
;
285 roffset
= (Word
) (ofl
->ofl_osgot
->os_shdr
->sh_addr
) +
286 sdp
->sd_aux
->sa_PLTGOTndx
* M_GOT_ENTSIZE
;
288 plt_entry(ofl
, osp
->os_relosdesc
->os_szoutrels
, sdp
);
290 } else if (orsp
->rel_flags
& FLG_REL_BSS
) {
292 * This must be a R_386_COPY. For these set the roffset to
293 * point to the new symbols location.
295 osp
= ofl
->ofl_isbss
->is_osdesc
;
296 roffset
= (Word
)value
;
298 osp
= RELAUX_GET_OSDESC(orsp
);
301 * Calculate virtual offset of reference point; equals offset
302 * into section + vaddr of section for loadable sections, or
303 * offset plus section displacement for nonloadable sections.
305 roffset
= orsp
->rel_roffset
+
306 (Off
)_elf_getxoff(orsp
->rel_isdesc
->is_indata
);
307 if (!(ofl
->ofl_flags
& FLG_OF_RELOBJ
))
308 roffset
+= orsp
->rel_isdesc
->is_osdesc
->
312 if ((osp
== 0) || ((relosp
= osp
->os_relosdesc
) == 0))
313 relosp
= ofl
->ofl_osrel
;
316 * Assign the symbols index for the output relocation. If the
317 * relocation refers to a SECTION symbol then it's index is based upon
318 * the output sections symbols index. Otherwise the index can be
319 * derived from the symbols index itself.
321 if (orsp
->rel_rtype
== R_386_RELATIVE
)
323 else if ((orsp
->rel_flags
& FLG_REL_SCNNDX
) ||
324 (ELF_ST_TYPE(sdp
->sd_sym
->st_info
) == STT_SECTION
)) {
325 if (sectmoved
== 0) {
327 * Check for a null input section. This can
328 * occur if this relocation references a symbol
329 * generated by sym_add_sym().
331 if (sdp
->sd_isc
&& sdp
->sd_isc
->is_osdesc
)
332 ndx
= sdp
->sd_isc
->is_osdesc
->os_identndx
;
336 ndx
= ofl
->ofl_parexpnndx
;
338 ndx
= sdp
->sd_symndx
;
341 * If we have a replacement value for the relocation
342 * target, put it in place now.
344 if (orsp
->rel_flags
& FLG_REL_NADDEND
) {
345 Xword addend
= orsp
->rel_raddend
;
349 * Get the address of the data item we need to modify.
351 addr
= (uchar_t
*)((uintptr_t)orsp
->rel_roffset
+
352 (uintptr_t)_elf_getxoff(orsp
->rel_isdesc
->is_indata
));
353 addr
+= (uintptr_t)RELAUX_GET_OSDESC(orsp
)->os_outdata
->d_buf
;
354 if (ld_reloc_targval_set(ofl
, orsp
, addr
, addend
) == 0)
358 relbits
= (char *)relosp
->os_outdata
->d_buf
;
360 rea
.r_info
= ELF_R_INFO(ndx
, orsp
->rel_rtype
);
361 rea
.r_offset
= roffset
;
362 DBG_CALL(Dbg_reloc_out(ofl
, ELF_DBG_LD
, SHT_REL
, &rea
, relosp
->os_name
,
363 ld_reloc_sym_name(orsp
)));
366 * Assert we haven't walked off the end of our relocation table.
368 assert(relosp
->os_szoutrels
<= relosp
->os_shdr
->sh_size
);
370 (void) memcpy((relbits
+ relosp
->os_szoutrels
),
371 (char *)&rea
, sizeof (Rel
));
372 relosp
->os_szoutrels
+= sizeof (Rel
);
375 * Determine if this relocation is against a non-writable, allocatable
376 * section. If so we may need to provide a text relocation diagnostic.
377 * Note that relocations against the .plt (R_386_JMP_SLOT) actually
378 * result in modifications to the .got.
380 if (orsp
->rel_rtype
== R_386_JMP_SLOT
)
381 osp
= ofl
->ofl_osgot
;
383 ld_reloc_remain_entry(orsp
, osp
, ofl
, remain_seen
);
388 * i386 Instructions for TLS processing
390 static uchar_t tlsinstr_gd_ie
[] = {
392 * 0x00 movl %gs:0x0, %eax
394 0x65, 0xa1, 0x00, 0x00, 0x00, 0x00,
396 * 0x06 addl x(%eax), %eax
399 0x03, 0x80, 0x00, 0x00, 0x00, 0x00
402 static uchar_t tlsinstr_gd_le
[] = {
404 * 0x00 movl %gs:0x0, %eax
406 0x65, 0xa1, 0x00, 0x00, 0x00, 0x00,
408 * 0x06 addl $0x0, %eax
410 0x05, 0x00, 0x00, 0x00, 0x00,
418 static uchar_t tlsinstr_gd_ie_movgs
[] = {
422 0x65, 0xa1, 0x00, 0x00, 0x00, 00
425 #define TLS_GD_IE_MOV 0x8b /* movl opcode */
426 #define TLS_GD_IE_POP 0x58 /* popl + reg */
428 #define TLS_GD_LE_MOVL 0xb8 /* movl + reg */
430 #define TLS_NOP 0x90 /* NOP instruction */
432 #define MODRM_MSK_MOD 0xc0
433 #define MODRM_MSK_RO 0x38
434 #define MODRM_MSK_RM 0x07
436 #define SIB_MSK_SS 0xc0
437 #define SIB_MSK_IND 0x38
438 #define SIB_MSK_BS 0x07
441 tls_fixups(Ofl_desc
*ofl
, Rel_desc
*arsp
)
443 Sym_desc
*sdp
= arsp
->rel_sym
;
444 Word rtype
= arsp
->rel_rtype
;
445 uchar_t
*offset
, r1
, r2
;
447 offset
= (uchar_t
*)((uintptr_t)arsp
->rel_roffset
+
448 (uintptr_t)_elf_getxoff(arsp
->rel_isdesc
->is_indata
) +
449 (uintptr_t)RELAUX_GET_OSDESC(arsp
)->os_outdata
->d_buf
);
451 if (sdp
->sd_ref
== REF_DYN_NEED
) {
459 * 0x0 leal x@tlsgd(,r1,1), %eax
460 * 0x7 call ___tls_get_addr
463 * 0x0 movl %gs:0, %eax
464 * 0x6 addl x@gotntpoff(r1), %eax
466 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
467 R_386_TLS_GOTIE
, arsp
, ld_reloc_sym_name
));
468 arsp
->rel_rtype
= R_386_TLS_GOTIE
;
469 arsp
->rel_roffset
+= 5;
472 * Adjust 'offset' to beginning of instruction
476 r1
= (offset
[2] & SIB_MSK_IND
) >> 3;
477 (void) memcpy(offset
, tlsinstr_gd_ie
,
478 sizeof (tlsinstr_gd_ie
));
481 * set register %r1 into the addl
487 case R_386_TLS_GD_PLT
:
489 * Fixup done via the TLS_GD relocation
491 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
492 R_386_NONE
, arsp
, ld_reloc_sym_name
));
504 * 0x0 leal x@tlsgd(,r1,1), %eax
505 * 0x7 call ___tls_get_addr
508 * 0x0 movl %gs:0, %eax
509 * 0x6 addl $x@ntpoff, %eax
513 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
514 R_386_TLS_LE
, arsp
, ld_reloc_sym_name
));
516 arsp
->rel_rtype
= R_386_TLS_LE
;
517 arsp
->rel_roffset
+= 4;
520 * Adjust 'offset' to beginning of instruction
524 (void) memcpy(offset
, tlsinstr_gd_le
,
525 sizeof (tlsinstr_gd_le
));
528 case R_386_TLS_GD_PLT
:
531 * Fixup done via the TLS_GD relocation
533 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
534 R_386_NONE
, arsp
, ld_reloc_sym_name
));
537 case R_386_TLS_LDM_PLT
:
538 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
539 R_386_NONE
, arsp
, ld_reloc_sym_name
));
543 * call __tls_get_addr()
551 *(offset
- 1) = TLS_NOP
;
553 *(offset
+ 1) = TLS_NOP
;
554 *(offset
+ 2) = TLS_NOP
;
555 *(offset
+ 3) = TLS_NOP
;
559 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
560 R_386_NONE
, arsp
, ld_reloc_sym_name
));
565 * 0x00 leal x1@tlsldm(%ebx), %eax
566 * 0x06 call ___tls_get_addr
570 * 0x00 movl %gs:0, %eax
572 (void) memcpy(offset
- 2, tlsinstr_gd_ie_movgs
,
573 sizeof (tlsinstr_gd_ie_movgs
));
576 case R_386_TLS_LDO_32
:
580 * 0x10 leal x1@dtpoff(%eax), %edx R_386_TLS_LDO_32
582 * 0x10 leal x1@ntpoff(%eax), %edx R_386_TLS_LE
587 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
588 R_386_TLS_LE
, arsp
, ld_reloc_sym_name
));
589 arsp
->rel_rtype
= R_386_TLS_LE
;
592 case R_386_TLS_GOTIE
:
594 * These transitions are a little different than the
595 * others, in that we could have multiple instructions
596 * pointed to by a single relocation. Depending upon the
597 * instruction, we perform a different code transition.
599 * Here's the known transitions:
601 * 1) movl foo@gotntpoff(%reg1), %reg2
602 * 0x8b, 0x80 | (reg2 << 3) | reg1, foo@gotntpoff
604 * 2) addl foo@gotntpoff(%reg1), %reg2
605 * 0x03, 0x80 | (reg2 << 3) | reg1, foo@gotntpoff
607 * Transitions IE -> LE
609 * 1) movl $foo@ntpoff, %reg2
610 * 0xc7, 0xc0 | reg2, foo@ntpoff
612 * 2) addl $foo@ntpoff, %reg2
613 * 0x81, 0xc0 | reg2, foo@ntpoff
615 * Note: reg1 != 4 (%esp)
617 DBG_CALL(Dbg_reloc_transition(ofl
->ofl_lml
, M_MACH
,
618 R_386_TLS_LE
, arsp
, ld_reloc_sym_name
));
619 arsp
->rel_rtype
= R_386_TLS_LE
;
622 r2
= (offset
[1] & MODRM_MSK_RO
) >> 3;
623 if (offset
[0] == 0x8b) {
625 offset
[0] = 0xc7; /* movl */
626 offset
[1] = 0xc0 | r2
;
630 if (offset
[0] == 0x03) {
632 assert(offset
[0] == 0x03);
633 offset
[0] = 0x81; /* addl */
634 offset
[1] = 0xc0 | r2
;
639 * Unexpected instruction sequence - fatal error.
642 Conv_inv_buf_t inv_buf
;
644 ld_eprintf(ofl
, ERR_FATAL
, MSG_INTL(MSG_REL_BADTLSINS
),
645 conv_reloc_386_type(arsp
->rel_rtype
, 0, &inv_buf
),
646 arsp
->rel_isdesc
->is_file
->ifl_name
,
647 ld_reloc_sym_name(arsp
),
648 arsp
->rel_isdesc
->is_name
,
649 EC_OFF(arsp
->rel_roffset
));
655 * These transitions are a little different than the
656 * others, in that we could have multiple instructions
657 * pointed to by a single relocation. Depending upon the
658 * instruction, we perform a different code transition.
660 * Here's the known transitions:
661 * 1) movl foo@indntpoff, %eax
662 * 0xa1, foo@indntpoff
664 * 2) movl foo@indntpoff, %eax
665 * 0x8b, 0x05 | (reg << 3), foo@gotntpoff
667 * 3) addl foo@indntpoff, %eax
668 * 0x03, 0x05 | (reg << 3), foo@gotntpoff
670 * Transitions IE -> LE
672 * 1) movl $foo@ntpoff, %eax
675 * 2) movl $foo@ntpoff, %reg
676 * 0xc7, 0xc0 | reg, foo@ntpoff
678 * 3) addl $foo@ntpoff, %reg
679 * 0x81, 0xc0 | reg, foo@ntpoff
681 arsp
->rel_rtype
= R_386_TLS_LE
;
683 if (offset
[0] == 0xa1) {
685 offset
[0] = 0xb8; /* movl */
690 if (offset
[0] == 0x8b) {
692 r2
= (offset
[1] & MODRM_MSK_RO
) >> 3;
693 offset
[0] = 0xc7; /* movl */
694 offset
[1] = 0xc0 | r2
;
697 if (offset
[0] == 0x03) {
699 r2
= (offset
[1] & MODRM_MSK_RO
) >> 3;
700 offset
[0] = 0x81; /* addl */
701 offset
[1] = 0xc0 | r2
;
705 * Unexpected instruction sequence - fatal error.
708 Conv_inv_buf_t inv_buf
;
710 ld_eprintf(ofl
, ERR_FATAL
, MSG_INTL(MSG_REL_BADTLSINS
),
711 conv_reloc_386_type(arsp
->rel_rtype
, 0, &inv_buf
),
712 arsp
->rel_isdesc
->is_file
->ifl_name
,
713 ld_reloc_sym_name(arsp
),
714 arsp
->rel_isdesc
->is_name
,
715 EC_OFF(arsp
->rel_roffset
));
723 ld_do_activerelocs(Ofl_desc
*ofl
)
728 uintptr_t return_code
= 1;
729 ofl_flag_t flags
= ofl
->ofl_flags
;
731 if (aplist_nitems(ofl
->ofl_actrels
.rc_list
) != 0)
732 DBG_CALL(Dbg_reloc_doact_title(ofl
->ofl_lml
));
735 * Process active relocations.
737 REL_CACHE_TRAVERSE(&ofl
->ofl_actrels
, idx
, rcbp
, arsp
) {
741 const char *ifl_name
;
748 * If the section this relocation is against has been discarded
749 * (-zignore), then discard (skip) the relocation itself.
751 if ((arsp
->rel_isdesc
->is_flags
& FLG_IS_DISCARD
) &&
752 ((arsp
->rel_flags
& (FLG_REL_GOT
| FLG_REL_BSS
|
753 FLG_REL_PLT
| FLG_REL_NOINFO
)) == 0)) {
754 DBG_CALL(Dbg_reloc_discard(ofl
->ofl_lml
, M_MACH
, arsp
));
759 * We determine what the 'got reference' model (if required)
760 * is at this point. This needs to be done before tls_fixup()
761 * since it may 'transition' our instructions.
763 * The got table entries have already been assigned,
764 * and we bind to those initial entries.
766 if (arsp
->rel_flags
& FLG_REL_DTLS
)
767 gref
= GOT_REF_TLSGD
;
768 else if (arsp
->rel_flags
& FLG_REL_MTLS
)
769 gref
= GOT_REF_TLSLD
;
770 else if (arsp
->rel_flags
& FLG_REL_STLS
)
771 gref
= GOT_REF_TLSIE
;
773 gref
= GOT_REF_GENERIC
;
776 * Perform any required TLS fixups.
778 if (arsp
->rel_flags
& FLG_REL_TLSFIX
) {
781 if ((ret
= tls_fixups(ofl
, arsp
)) == FIX_ERROR
)
788 * If this is a relocation against a move table, or
789 * expanded move table, adjust the relocation entries.
791 if (RELAUX_GET_MOVE(arsp
))
792 ld_adj_movereloc(ofl
, arsp
);
795 refaddr
= arsp
->rel_roffset
+
796 (Off
)_elf_getxoff(arsp
->rel_isdesc
->is_indata
);
798 if (arsp
->rel_flags
& FLG_REL_CLVAL
)
800 else if (ELF_ST_TYPE(sdp
->sd_sym
->st_info
) == STT_SECTION
) {
802 * The value for a symbol pointing to a SECTION
803 * is based off of that sections position.
805 if (sdp
->sd_isc
->is_flags
& FLG_IS_RELUPD
) {
808 uchar_t
*raddr
= (uchar_t
*)
809 arsp
->rel_isdesc
->is_indata
->d_buf
+
813 * This is a REL platform. Hence, the second
814 * argument of ld_am_I_partial() is the value
815 * stored at the target address where the
816 * relocation is going to be applied.
818 if (ld_reloc_targval_get(ofl
, arsp
, raddr
,
821 sym
= ld_am_I_partial(arsp
, radd
);
823 Sym
*osym
= sym
->sd_osym
;
826 * The symbol was moved, so adjust the
827 * value relative to the new section.
829 value
= sym
->sd_sym
->st_value
;
833 * The original raddend covers the
834 * displacement from the section start
835 * to the desired address. The value
836 * computed above gets us from the
837 * section start to the start of the
838 * symbol range. Adjust the old raddend
839 * to remove the offset from section
840 * start to symbol start, leaving the
841 * displacement within the range of
844 if (osym
->st_value
!= 0) {
845 radd
-= osym
->st_value
;
846 if (ld_reloc_targval_set(ofl
,
847 arsp
, raddr
, radd
) == 0)
853 value
= _elf_getxoff(sdp
->sd_isc
->is_indata
);
854 if (sdp
->sd_isc
->is_shdr
->sh_flags
& SHF_ALLOC
)
855 value
+= sdp
->sd_isc
->
856 is_osdesc
->os_shdr
->sh_addr
;
858 if (sdp
->sd_isc
->is_shdr
->sh_flags
& SHF_TLS
)
859 value
-= ofl
->ofl_tlsphdr
->p_vaddr
;
861 } else if (IS_SIZE(arsp
->rel_rtype
)) {
863 * Size relocations require the symbols size.
865 value
= sdp
->sd_sym
->st_size
;
867 } else if ((sdp
->sd_flags
& FLG_SY_CAP
) &&
868 sdp
->sd_aux
&& sdp
->sd_aux
->sa_PLTndx
) {
870 * If relocation is against a capabilities symbol, we
871 * need to jump to an associated PLT, so that at runtime
872 * ld.so.1 is involved to determine the best binding
873 * choice. Otherwise, the value is the symbols value.
875 value
= ld_calc_plt_addr(sdp
, ofl
);
878 value
= sdp
->sd_sym
->st_value
;
881 * Relocation against the GLOBAL_OFFSET_TABLE.
883 if ((arsp
->rel_flags
& FLG_REL_GOT
) &&
884 !ld_reloc_set_aux_osdesc(ofl
, arsp
, ofl
->ofl_osgot
))
886 osp
= RELAUX_GET_OSDESC(arsp
);
889 * If loadable and not producing a relocatable object add the
890 * sections virtual address to the reference address.
892 if ((arsp
->rel_flags
& FLG_REL_LOAD
) &&
893 ((flags
& FLG_OF_RELOBJ
) == 0))
895 arsp
->rel_isdesc
->is_osdesc
->os_shdr
->sh_addr
;
898 * If this entry has a PLT assigned to it, its value is actually
899 * the address of the PLT (and not the address of the function).
901 if (IS_PLT(arsp
->rel_rtype
)) {
902 if (sdp
->sd_aux
&& sdp
->sd_aux
->sa_PLTndx
)
903 value
= ld_calc_plt_addr(sdp
, ofl
);
907 * Determine whether the value needs further adjustment. Filter
908 * through the attributes of the relocation to determine what
909 * adjustment is required. Note, many of the following cases
910 * are only applicable when a .got is present. As a .got is
911 * not generated when a relocatable object is being built,
912 * any adjustments that require a .got need to be skipped.
914 if ((arsp
->rel_flags
& FLG_REL_GOT
) &&
915 ((flags
& FLG_OF_RELOBJ
) == 0)) {
922 * Perform relocation against GOT table. Since this
923 * doesn't fit exactly into a relocation we place the
924 * appropriate byte in the GOT directly
926 * Calculate offset into GOT at which to apply
929 gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
, gref
, ofl
, NULL
);
932 if (arsp
->rel_rtype
== R_386_TLS_DTPOFF32
)
933 gotndx
= gnp
->gn_gotndx
+ 1;
935 gotndx
= gnp
->gn_gotndx
;
937 R1addr
= (Xword
)(gotndx
* M_GOT_ENTSIZE
);
940 * Add the GOTs data's offset.
942 R2addr
= R1addr
+ (uintptr_t)osp
->os_outdata
->d_buf
;
944 DBG_CALL(Dbg_reloc_doact(ofl
->ofl_lml
, ELF_DBG_LD_ACT
,
945 M_MACH
, SHT_REL
, arsp
, R1addr
, value
,
951 if (ofl
->ofl_flags1
& FLG_OF1_ENCDIFF
)
952 *(Xword
*)R2addr
= ld_bswap_Xword(value
);
954 *(Xword
*)R2addr
= value
;
957 } else if (IS_GOT_BASED(arsp
->rel_rtype
) &&
958 ((flags
& FLG_OF_RELOBJ
) == 0)) {
959 value
-= ofl
->ofl_osgot
->os_shdr
->sh_addr
;
961 } else if (IS_GOT_PC(arsp
->rel_rtype
) &&
962 ((flags
& FLG_OF_RELOBJ
) == 0)) {
963 value
= (Xword
)(ofl
->ofl_osgot
->os_shdr
->sh_addr
) -
966 } else if ((IS_PC_RELATIVE(arsp
->rel_rtype
)) &&
967 (((flags
& FLG_OF_RELOBJ
) == 0) ||
968 (osp
== sdp
->sd_isc
->is_osdesc
))) {
971 } else if (IS_TLS_INS(arsp
->rel_rtype
) &&
972 IS_GOT_RELATIVE(arsp
->rel_rtype
) &&
973 ((flags
& FLG_OF_RELOBJ
) == 0)) {
976 gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
, gref
, ofl
, NULL
);
978 value
= (Xword
)gnp
->gn_gotndx
* M_GOT_ENTSIZE
;
979 if (arsp
->rel_rtype
== R_386_TLS_IE
) {
980 value
+= ofl
->ofl_osgot
->os_shdr
->sh_addr
;
983 } else if (IS_GOT_RELATIVE(arsp
->rel_rtype
) &&
984 ((flags
& FLG_OF_RELOBJ
) == 0)) {
987 gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
,
988 GOT_REF_GENERIC
, ofl
, NULL
);
990 value
= (Xword
)gnp
->gn_gotndx
* M_GOT_ENTSIZE
;
992 } else if ((arsp
->rel_flags
& FLG_REL_STLS
) &&
993 ((flags
& FLG_OF_RELOBJ
) == 0)) {
997 * This is the LE TLS reference model. Static
998 * offset is hard-coded.
1000 tlsstatsize
= S_ROUND(ofl
->ofl_tlsphdr
->p_memsz
,
1002 value
= tlsstatsize
- value
;
1005 * Since this code is fixed up, it assumes a
1006 * negative offset that can be added to the
1009 if ((arsp
->rel_rtype
== R_386_TLS_LDO_32
) ||
1010 (arsp
->rel_rtype
== R_386_TLS_LE
))
1014 if (arsp
->rel_isdesc
->is_file
)
1015 ifl_name
= arsp
->rel_isdesc
->is_file
->ifl_name
;
1017 ifl_name
= MSG_INTL(MSG_STR_NULL
);
1020 * Make sure we have data to relocate. Compiler and assembler
1021 * developers have been known to generate relocations against
1022 * invalid sections (normally .bss), so for their benefit give
1023 * them sufficient information to help analyze the problem.
1024 * End users should never see this.
1026 if (arsp
->rel_isdesc
->is_indata
->d_buf
== 0) {
1027 Conv_inv_buf_t inv_buf
;
1029 ld_eprintf(ofl
, ERR_FATAL
, MSG_INTL(MSG_REL_EMPTYSEC
),
1030 conv_reloc_386_type(arsp
->rel_rtype
, 0, &inv_buf
),
1031 ifl_name
, ld_reloc_sym_name(arsp
),
1032 EC_WORD(arsp
->rel_isdesc
->is_scnndx
),
1033 arsp
->rel_isdesc
->is_name
);
1038 * Get the address of the data item we need to modify.
1040 addr
= (uchar_t
*)((uintptr_t)arsp
->rel_roffset
+
1041 (uintptr_t)_elf_getxoff(arsp
->rel_isdesc
->is_indata
));
1043 DBG_CALL(Dbg_reloc_doact(ofl
->ofl_lml
, ELF_DBG_LD_ACT
,
1044 M_MACH
, SHT_REL
, arsp
, EC_NATPTR(addr
), value
,
1045 ld_reloc_sym_name
));
1046 addr
+= (uintptr_t)osp
->os_outdata
->d_buf
;
1048 if ((((uintptr_t)addr
- (uintptr_t)ofl
->ofl_nehdr
) >
1049 ofl
->ofl_size
) || (arsp
->rel_roffset
>
1050 osp
->os_shdr
->sh_size
)) {
1051 Conv_inv_buf_t inv_buf
;
1054 if (((uintptr_t)addr
- (uintptr_t)ofl
->ofl_nehdr
) >
1058 class = ERR_WARNING
;
1060 ld_eprintf(ofl
, class, MSG_INTL(MSG_REL_INVALOFFSET
),
1061 conv_reloc_386_type(arsp
->rel_rtype
, 0, &inv_buf
),
1062 ifl_name
, EC_WORD(arsp
->rel_isdesc
->is_scnndx
),
1063 arsp
->rel_isdesc
->is_name
, ld_reloc_sym_name(arsp
),
1064 EC_ADDR((uintptr_t)addr
-
1065 (uintptr_t)ofl
->ofl_nehdr
));
1067 if (class == ERR_FATAL
) {
1068 return_code
= S_ERROR
;
1074 * The relocation is additive. Ignore the previous symbol
1075 * value if this local partial symbol is expanded.
1081 * If we have a replacement value for the relocation
1082 * target, put it in place now.
1084 if (arsp
->rel_flags
& FLG_REL_NADDEND
) {
1085 Xword addend
= arsp
->rel_raddend
;
1087 if (ld_reloc_targval_set(ofl
, arsp
, addr
, addend
) == 0)
1092 * If '-z noreloc' is specified - skip the do_reloc_ld stage.
1094 if (OFL_DO_RELOC(ofl
)) {
1095 if (do_reloc_ld(arsp
, addr
, &value
, ld_reloc_sym_name
,
1096 ifl_name
, OFL_SWAP_RELOC_DATA(ofl
, arsp
),
1097 ofl
->ofl_lml
) == 0) {
1098 ofl
->ofl_flags
|= FLG_OF_FATAL
;
1099 return_code
= S_ERROR
;
1103 return (return_code
);
1107 * Add an output relocation record.
1110 ld_add_outrel(Word flags
, Rel_desc
*rsp
, Ofl_desc
*ofl
)
1113 Sym_desc
*sdp
= rsp
->rel_sym
;
1116 * Static executables *do not* want any relocations against them.
1117 * Since our engine still creates relocations against a WEAK UNDEFINED
1118 * symbol in a static executable, it's best to disable them here
1119 * instead of through out the relocation code.
1121 if (OFL_IS_STATIC_EXEC(ofl
))
1125 * If we are adding a output relocation against a section
1126 * symbol (non-RELATIVE) then mark that section. These sections
1127 * will be added to the .dynsym symbol table.
1129 if (sdp
&& (rsp
->rel_rtype
!= M_R_RELATIVE
) &&
1130 ((flags
& FLG_REL_SCNNDX
) ||
1131 (ELF_ST_TYPE(sdp
->sd_sym
->st_info
) == STT_SECTION
))) {
1134 * If this is a COMMON symbol - no output section
1135 * exists yet - (it's created as part of sym_validate()).
1136 * So - we mark here that when it's created it should
1137 * be tagged with the FLG_OS_OUTREL flag.
1139 if ((sdp
->sd_flags
& FLG_SY_SPECSEC
) &&
1140 (sdp
->sd_sym
->st_shndx
== SHN_COMMON
)) {
1141 if (ELF_ST_TYPE(sdp
->sd_sym
->st_info
) != STT_TLS
)
1142 ofl
->ofl_flags1
|= FLG_OF1_BSSOREL
;
1144 ofl
->ofl_flags1
|= FLG_OF1_TLSOREL
;
1147 Is_desc
*isp
= sdp
->sd_isc
;
1149 if (isp
&& ((osp
= isp
->is_osdesc
) != NULL
) &&
1150 ((osp
->os_flags
& FLG_OS_OUTREL
) == 0)) {
1151 ofl
->ofl_dynshdrcnt
++;
1152 osp
->os_flags
|= FLG_OS_OUTREL
;
1157 /* Enter it into the output relocation cache */
1158 if ((orsp
= ld_reloc_enter(ofl
, &ofl
->ofl_outrels
, rsp
, flags
)) == NULL
)
1161 if (flags
& FLG_REL_GOT
)
1162 ofl
->ofl_relocgotsz
+= (Xword
)sizeof (Rel
);
1163 else if (flags
& FLG_REL_PLT
)
1164 ofl
->ofl_relocpltsz
+= (Xword
)sizeof (Rel
);
1165 else if (flags
& FLG_REL_BSS
)
1166 ofl
->ofl_relocbsssz
+= (Xword
)sizeof (Rel
);
1167 else if (flags
& FLG_REL_NOINFO
)
1168 ofl
->ofl_relocrelsz
+= (Xword
)sizeof (Rel
);
1170 RELAUX_GET_OSDESC(orsp
)->os_szoutrels
+= (Xword
)sizeof (Rel
);
1172 if (orsp
->rel_rtype
== M_R_RELATIVE
)
1173 ofl
->ofl_relocrelcnt
++;
1176 * We don't perform sorting on PLT relocations because
1177 * they have already been assigned a PLT index and if we
1178 * were to sort them we would have to re-assign the plt indexes.
1180 if (!(flags
& FLG_REL_PLT
))
1181 ofl
->ofl_reloccnt
++;
1184 * Insure a GLOBAL_OFFSET_TABLE is generated if required.
1186 if (IS_GOT_REQUIRED(orsp
->rel_rtype
))
1187 ofl
->ofl_flags
|= FLG_OF_BLDGOT
;
1190 * Identify and possibly warn of a displacement relocation.
1192 if (orsp
->rel_flags
& FLG_REL_DISP
) {
1193 ofl
->ofl_dtflags_1
|= DF_1_DISPRELPND
;
1195 if (ofl
->ofl_flags
& FLG_OF_VERBOSE
)
1196 ld_disp_errmsg(MSG_INTL(MSG_REL_DISPREL4
), orsp
, ofl
);
1198 DBG_CALL(Dbg_reloc_ors_entry(ofl
->ofl_lml
, ELF_DBG_LD
, SHT_REL
,
1204 * process relocation for a LOCAL symbol
1207 ld_reloc_local(Rel_desc
* rsp
, Ofl_desc
* ofl
)
1209 ofl_flag_t flags
= ofl
->ofl_flags
;
1210 Sym_desc
*sdp
= rsp
->rel_sym
;
1211 Word shndx
= sdp
->sd_sym
->st_shndx
;
1214 * if ((shared object) and (not pc relative relocation) and
1215 * (not against ABS symbol))
1217 * build R_386_RELATIVE
1220 if ((flags
& (FLG_OF_SHAROBJ
| FLG_OF_PIE
)) &&
1221 (rsp
->rel_flags
& FLG_REL_LOAD
) &&
1222 !(IS_PC_RELATIVE(rsp
->rel_rtype
)) && !(IS_SIZE(rsp
->rel_rtype
)) &&
1223 !(IS_GOT_BASED(rsp
->rel_rtype
)) &&
1224 !(rsp
->rel_isdesc
!= NULL
&&
1225 (rsp
->rel_isdesc
->is_shdr
->sh_type
== SHT_SUNW_dof
)) &&
1226 (((sdp
->sd_flags
& FLG_SY_SPECSEC
) == 0) ||
1227 (shndx
!= SHN_ABS
) || (sdp
->sd_aux
&& sdp
->sd_aux
->sa_symspec
))) {
1228 Word ortype
= rsp
->rel_rtype
;
1230 rsp
->rel_rtype
= R_386_RELATIVE
;
1231 if (ld_add_outrel(0, rsp
, ofl
) == S_ERROR
)
1233 rsp
->rel_rtype
= ortype
;
1237 * If the relocation is against a 'non-allocatable' section
1238 * and we can not resolve it now - then give a warning
1241 * We can not resolve the symbol if either:
1243 * b) it's defined in a shared library and a
1244 * COPY relocation hasn't moved it to the executable
1246 * Note: because we process all of the relocations against the
1247 * text segment before any others - we know whether
1248 * or not a copy relocation will be generated before
1249 * we get here (see reloc_init()->reloc_segments()).
1251 if (!(rsp
->rel_flags
& FLG_REL_LOAD
) &&
1252 ((shndx
== SHN_UNDEF
) ||
1253 ((sdp
->sd_ref
== REF_DYN_NEED
) &&
1254 ((sdp
->sd_flags
& FLG_SY_MVTOCOMM
) == 0)))) {
1255 Conv_inv_buf_t inv_buf
;
1256 Os_desc
*osp
= RELAUX_GET_OSDESC(rsp
);
1259 * If the relocation is against a SHT_SUNW_ANNOTATE
1260 * section - then silently ignore that the relocation
1261 * can not be resolved.
1263 if (osp
&& (osp
->os_shdr
->sh_type
== SHT_SUNW_ANNOTATE
))
1265 ld_eprintf(ofl
, ERR_WARNING
, MSG_INTL(MSG_REL_EXTERNSYM
),
1266 conv_reloc_386_type(rsp
->rel_rtype
, 0, &inv_buf
),
1267 rsp
->rel_isdesc
->is_file
->ifl_name
,
1268 ld_reloc_sym_name(rsp
), osp
->os_name
);
1273 * Perform relocation.
1275 return (ld_add_actrel(0, rsp
, ofl
));
1279 ld_reloc_TLS(Boolean local
, Rel_desc
* rsp
, Ofl_desc
* ofl
)
1281 Word rtype
= rsp
->rel_rtype
;
1282 Sym_desc
*sdp
= rsp
->rel_sym
;
1283 ofl_flag_t flags
= ofl
->ofl_flags
;
1287 * If we're building an executable - use either the IE or LE access
1288 * model. If we're building a shared object process any IE model.
1290 if ((flags
& FLG_OF_EXEC
) || (IS_TLS_IE(rtype
))) {
1292 * Set the DF_STATIC_TLS flag.
1294 ofl
->ofl_dtflags
|= DF_STATIC_TLS
;
1296 if (!local
|| ((flags
& FLG_OF_EXEC
) == 0)) {
1298 * Assign a GOT entry for static TLS references.
1300 if ((gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
,
1301 GOT_REF_TLSIE
, ofl
, NULL
)) == NULL
) {
1303 if (ld_assign_got_TLS(local
, rsp
, ofl
, sdp
,
1304 gnp
, GOT_REF_TLSIE
, FLG_REL_STLS
,
1305 rtype
, R_386_TLS_TPOFF
, 0) == S_ERROR
)
1312 if (IS_TLS_IE(rtype
)) {
1313 if (ld_add_actrel(FLG_REL_STLS
,
1314 rsp
, ofl
) == S_ERROR
)
1318 * A non-pic shared object needs to adjust the
1319 * active relocation (indntpoff).
1321 if (((flags
& FLG_OF_EXEC
) == 0) &&
1322 (rtype
== R_386_TLS_IE
)) {
1323 rsp
->rel_rtype
= R_386_RELATIVE
;
1324 return (ld_add_outrel(0, rsp
, ofl
));
1330 * Fixups are required for other executable models.
1332 return (ld_add_actrel((FLG_REL_TLSFIX
| FLG_REL_STLS
),
1339 if (IS_TLS_LE(rtype
) || (rtype
== R_386_TLS_LDO_32
))
1340 return (ld_add_actrel(FLG_REL_STLS
, rsp
, ofl
));
1342 return (ld_add_actrel((FLG_REL_TLSFIX
| FLG_REL_STLS
),
1347 * Building a shared object.
1349 * Assign a GOT entry for a dynamic TLS reference.
1351 if (IS_TLS_LD(rtype
) && ((gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
,
1352 GOT_REF_TLSLD
, ofl
, NULL
)) == NULL
)) {
1354 if (ld_assign_got_TLS(local
, rsp
, ofl
, sdp
, gnp
, GOT_REF_TLSLD
,
1355 FLG_REL_MTLS
, rtype
, R_386_TLS_DTPMOD32
, 0) == S_ERROR
)
1358 } else if (IS_TLS_GD(rtype
) && ((gnp
= ld_find_got_ndx(sdp
->sd_GOTndxs
,
1359 GOT_REF_TLSGD
, ofl
, NULL
)) == NULL
)) {
1361 if (ld_assign_got_TLS(local
, rsp
, ofl
, sdp
, gnp
, GOT_REF_TLSGD
,
1362 FLG_REL_DTLS
, rtype
, R_386_TLS_DTPMOD32
,
1363 R_386_TLS_DTPOFF32
) == S_ERROR
)
1368 * For GD/LD TLS reference - TLS_{GD,LD}_CALL, this will eventually
1369 * cause a call to __tls_get_addr(). Convert this relocation to that
1370 * symbol now, and prepare for the PLT magic.
1372 if ((rtype
== R_386_TLS_GD_PLT
) || (rtype
== R_386_TLS_LDM_PLT
)) {
1373 Sym_desc
*tlsgetsym
;
1375 if ((tlsgetsym
= ld_sym_add_u(MSG_ORIG(MSG_SYM_TLSGETADDR_UU
),
1376 ofl
, MSG_STR_TLSREL
)) == (Sym_desc
*)S_ERROR
)
1379 rsp
->rel_sym
= tlsgetsym
;
1380 rsp
->rel_rtype
= R_386_PLT32
;
1382 if (ld_reloc_plt(rsp
, ofl
) == S_ERROR
)
1386 rsp
->rel_rtype
= rtype
;
1390 if (IS_TLS_LD(rtype
))
1391 return (ld_add_actrel(FLG_REL_MTLS
, rsp
, ofl
));
1393 return (ld_add_actrel(FLG_REL_DTLS
, rsp
, ofl
));
1398 ld_assign_got_ndx(Alist
**alpp
, Gotndx
*pgnp
, Gotref gref
, Ofl_desc
*ofl
,
1399 Rel_desc
*rsp
, Sym_desc
*sdp
)
1407 if ((gref
== GOT_REF_TLSGD
) || (gref
== GOT_REF_TLSLD
))
1413 gn
.gn_gotndx
= ofl
->ofl_gotcnt
;
1414 gn
.gn_gotref
= gref
;
1416 ofl
->ofl_gotcnt
+= gotents
;
1418 if (gref
== GOT_REF_TLSLD
) {
1419 if (ofl
->ofl_tlsldgotndx
== NULL
) {
1420 if ((gnp
= libld_malloc(sizeof (Gotndx
))) == NULL
)
1422 (void) memcpy(gnp
, &gn
, sizeof (Gotndx
));
1423 ofl
->ofl_tlsldgotndx
= gnp
;
1429 * GOT indexes are maintained on an Alist, where there is typically
1430 * only one index. The usage of this list is to scan the list to find
1431 * an index, and then apply that index immediately to a relocation.
1432 * Thus there are no external references to these GOT index structures
1433 * that can be compromised by the Alist being reallocated.
1435 if (alist_append(alpp
, &gn
, sizeof (Gotndx
), AL_CNT_SDP_GOT
) == NULL
)
1442 ld_assign_plt_ndx(Sym_desc
* sdp
, Ofl_desc
*ofl
)
1444 sdp
->sd_aux
->sa_PLTndx
= 1 + ofl
->ofl_pltcnt
++;
1445 sdp
->sd_aux
->sa_PLTGOTndx
= ofl
->ofl_gotcnt
++;
1446 ofl
->ofl_flags
|= FLG_OF_BLDGOT
;
1450 * Initializes .got[0] with the _DYNAMIC symbol value.
1453 ld_fillin_gotplt(Ofl_desc
*ofl
)
1455 ofl_flag_t flags
= ofl
->ofl_flags
;
1456 int bswap
= (ofl
->ofl_flags1
& FLG_OF1_ENCDIFF
) != 0;
1458 if (ofl
->ofl_osgot
) {
1461 if ((sdp
= ld_sym_find(MSG_ORIG(MSG_SYM_DYNAMIC_U
),
1462 SYM_NOHASH
, NULL
, ofl
)) != NULL
) {
1465 genptr
= ((uchar_t
*)ofl
->ofl_osgot
->os_outdata
->d_buf
+
1466 (M_GOT_XDYNAMIC
* M_GOT_ENTSIZE
));
1468 *(Word
*)genptr
= (Word
)sdp
->sd_sym
->st_value
;
1473 ld_bswap_Word(*(Word
*)genptr
);
1478 * Fill in the reserved slot in the procedure linkage table the first
1480 * if (building a.out) {
1481 * PUSHL got[1] # the address of the link map entry
1482 * JMP * got[2] # the address of rtbinder
1484 * PUSHL got[1]@GOT(%ebx) # the address of the link map entry
1485 * JMP * got[2]@GOT(%ebx) # the address of rtbinder
1488 if ((flags
& FLG_OF_DYNAMIC
) && ofl
->ofl_osplt
) {
1491 pltent
= (uchar_t
*)ofl
->ofl_osplt
->os_outdata
->d_buf
;
1492 if (!(flags
& (FLG_OF_SHAROBJ
| FLG_OF_PIE
))) {
1493 pltent
[0] = M_SPECIAL_INST
;
1494 pltent
[1] = M_PUSHL_DISP
;
1497 *(Word
*)pltent
= (Word
)(ofl
->ofl_osgot
->os_shdr
->
1498 sh_addr
+ M_GOT_XLINKMAP
* M_GOT_ENTSIZE
);
1503 ld_bswap_Word(*(Word
*)pltent
);
1505 pltent
[0] = M_SPECIAL_INST
;
1506 pltent
[1] = M_JMP_DISP_IND
;
1509 *(Word
*)pltent
= (Word
)(ofl
->ofl_osgot
->os_shdr
->
1510 sh_addr
+ M_GOT_XRTLD
* M_GOT_ENTSIZE
);
1515 ld_bswap_Word(*(Word
*)pltent
);
1517 pltent
[0] = M_SPECIAL_INST
;
1518 pltent
[1] = M_PUSHL_REG_DISP
;
1521 *(Word
*)pltent
= (Word
)(M_GOT_XLINKMAP
*
1527 ld_bswap_Word(*(Word
*)pltent
);
1529 pltent
[0] = M_SPECIAL_INST
;
1530 pltent
[1] = M_JMP_REG_DISP_IND
;
1533 *(Word
*)pltent
= (Word
)(M_GOT_XRTLD
*
1539 ld_bswap_Word(*(Word
*)pltent
);
1548 * Template for generating "void (*)(void)" function
1550 static const uchar_t nullfunc_tmpl
[] = { /* IA32 */
1551 /* 0x00 */ 0xc3 /* ret */
1557 * Function used to provide fill padding in SHF_EXECINSTR sections
1561 * base - base address of section being filled
1562 * offset - starting offset for fill within memory referenced by base
1563 * cnt - # bytes to be filled
1566 * The fill has been completed.
1569 execfill(void *base
, off_t off
, size_t cnt
)
1572 * 0x90 is an X86 NOP instruction in both 32 and 64-bit worlds.
1573 * There are no alignment constraints.
1575 (void) memset(off
+ (char *)base
, 0x90, cnt
);
1580 * Return the ld_targ definition for this target.
1583 ld_targ_init_x86(void)
1585 static const Target _ld_targ
= {
1587 M_MACH
, /* m_mach */
1588 M_MACHPLUS
, /* m_machplus */
1589 M_FLAGSPLUS
, /* m_flagsplus */
1590 M_CLASS
, /* m_class */
1591 M_DATA
, /* m_data */
1593 M_SEGM_ALIGN
, /* m_segm_align */
1594 M_SEGM_ORIGIN
, /* m_segm_origin */
1595 M_SEGM_AORIGIN
, /* m_segm_aorigin */
1596 M_DATASEG_PERM
, /* m_dataseg_perm */
1597 M_STACK_PERM
, /* m_stack_perm */
1598 M_WORD_ALIGN
, /* m_word_align */
1599 MSG_ORIG(MSG_PTH_RTLD
), /* m_def_interp */
1601 /* Relocation type codes */
1602 M_R_ARRAYADDR
, /* m_r_arrayaddr */
1603 M_R_COPY
, /* m_r_copy */
1604 M_R_GLOB_DAT
, /* m_r_glob_dat */
1605 M_R_JMP_SLOT
, /* m_r_jmp_slot */
1606 M_R_NUM
, /* m_r_num */
1607 M_R_NONE
, /* m_r_none */
1608 M_R_RELATIVE
, /* m_r_relative */
1609 M_R_REGISTER
, /* m_r_register */
1611 /* Relocation related constants */
1612 M_REL_DT_COUNT
, /* m_rel_dt_count */
1613 M_REL_DT_ENT
, /* m_rel_dt_ent */
1614 M_REL_DT_SIZE
, /* m_rel_dt_size */
1615 M_REL_DT_TYPE
, /* m_rel_dt_type */
1616 M_REL_SHT_TYPE
, /* m_rel_sht_type */
1618 /* GOT related constants */
1619 M_GOT_ENTSIZE
, /* m_got_entsize */
1620 M_GOT_XNumber
, /* m_got_xnumber */
1622 /* PLT related constants */
1623 M_PLT_ALIGN
, /* m_plt_align */
1624 M_PLT_ENTSIZE
, /* m_plt_entsize */
1625 M_PLT_RESERVSZ
, /* m_plt_reservsz */
1626 M_PLT_SHF_FLAGS
, /* m_plt_shf_flags */
1628 /* Section type of .eh_frame/.eh_frame_hdr sections */
1629 SHT_PROGBITS
, /* m_sht_unwind */
1631 M_DT_REGISTER
, /* m_dt_register */
1633 { /* Target_machid */
1634 M_ID_ARRAY
, /* id_array */
1635 M_ID_BSS
, /* id_bss */
1636 M_ID_CAP
, /* id_cap */
1637 M_ID_CAPINFO
, /* id_capinfo */
1638 M_ID_CAPCHAIN
, /* id_capchain */
1639 M_ID_DATA
, /* id_data */
1640 M_ID_DYNAMIC
, /* id_dynamic */
1641 M_ID_DYNSORT
, /* id_dynsort */
1642 M_ID_DYNSTR
, /* id_dynstr */
1643 M_ID_DYNSYM
, /* id_dynsym */
1644 M_ID_DYNSYM_NDX
, /* id_dynsym_ndx */
1645 M_ID_GOT
, /* id_got */
1646 M_ID_UNKNOWN
, /* id_gotdata (unused) */
1647 M_ID_HASH
, /* id_hash */
1648 M_ID_INTERP
, /* id_interp */
1649 M_ID_LBSS
, /* id_lbss */
1650 M_ID_LDYNSYM
, /* id_ldynsym */
1651 M_ID_NOTE
, /* id_note */
1652 M_ID_NULL
, /* id_null */
1653 M_ID_PLT
, /* id_plt */
1654 M_ID_REL
, /* id_rel */
1655 M_ID_STRTAB
, /* id_strtab */
1656 M_ID_SYMINFO
, /* id_syminfo */
1657 M_ID_SYMTAB
, /* id_symtab */
1658 M_ID_SYMTAB_NDX
, /* id_symtab_ndx */
1659 M_ID_TEXT
, /* id_text */
1660 M_ID_TLS
, /* id_tls */
1661 M_ID_TLSBSS
, /* id_tlsbss */
1662 M_ID_UNKNOWN
, /* id_unknown */
1663 M_ID_UNWIND
, /* id_unwind */
1664 M_ID_UNWINDHDR
, /* id_unwindhdr */
1665 M_ID_USER
, /* id_user */
1666 M_ID_VERSION
, /* id_version */
1668 { /* Target_nullfunc */
1669 nullfunc_tmpl
, /* nf_template */
1670 sizeof (nullfunc_tmpl
), /* nf_size */
1672 { /* Target_fillfunc */
1673 execfill
/* ff_execfill */
1675 { /* Target_machrel */
1678 ld_init_rel
, /* mr_init_rel */
1679 ld_mach_eflags
, /* mr_mach_eflags */
1680 ld_mach_make_dynamic
, /* mr_mach_make_dynamic */
1681 ld_mach_update_odynamic
, /* mr_mach_update_odynamic */
1682 ld_calc_plt_addr
, /* mr_calc_plt_addr */
1683 ld_perform_outreloc
, /* mr_perform_outreloc */
1684 ld_do_activerelocs
, /* mr_do_activerelocs */
1685 ld_add_outrel
, /* mr_add_outrel */
1686 NULL
, /* mr_reloc_register */
1687 ld_reloc_local
, /* mr_reloc_local */
1688 NULL
, /* mr_reloc_GOTOP */
1689 ld_reloc_TLS
, /* mr_reloc_TLS */
1690 NULL
, /* mr_assign_got */
1691 ld_find_got_ndx
, /* mr_find_got_ndx */
1692 ld_calc_got_offset
, /* mr_calc_got_offset */
1693 ld_assign_got_ndx
, /* mr_assign_got_ndx */
1694 ld_assign_plt_ndx
, /* mr_assign_plt_ndx */
1695 NULL
, /* mr_allocate_got */
1696 ld_fillin_gotplt
, /* mr_fillin_gotplt */
1698 { /* Target_machsym */
1699 NULL
, /* ms_reg_check */
1700 NULL
, /* ms_mach_sym_typecheck */
1701 NULL
, /* ms_is_regsym */
1702 NULL
, /* ms_reg_find */
1703 NULL
/* ms_reg_enter */