2 * Copyright 1996, 1997, 1998, 1999 John D. Polstra.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 * Dynamic linker for ELF.
31 * John Polstra <jdp@polstra.com>.
34 #include <sys/param.h>
36 #include <machine/segments.h>
37 #include <machine/sysarch.h>
53 * Process the special R_386_COPY relocations in the main program. These
54 * copy data from a shared object into a region in the main program's BSS
57 * Returns 0 on success, -1 on failure.
60 do_copy_relocations(Obj_Entry *dstobj)
62 const Elf_Rel *rellim;
65 assert(dstobj->mainprog); /* COPY relocations are invalid elsewhere */
67 rellim = (const Elf_Rel *) ((caddr_t) dstobj->rel + dstobj->relsize);
68 for (rel = dstobj->rel; rel < rellim; rel++) {
69 if (ELF_R_TYPE(rel->r_info) == R_386_COPY) {
71 const Elf_Sym *dstsym;
75 const Elf_Sym *srcsym;
76 const Obj_Entry *srcobj, *defobj;
80 dstaddr = (void *) (dstobj->relocbase + rel->r_offset);
81 dstsym = dstobj->symtab + ELF_R_SYM(rel->r_info);
82 name = dstobj->strtab + dstsym->st_name;
83 size = dstsym->st_size;
84 symlook_init(&req, name);
85 req.ventry = fetch_ventry(dstobj, ELF_R_SYM(rel->r_info));
87 for (srcobj = dstobj->next; srcobj != NULL; srcobj = srcobj->next) {
88 res = symlook_obj(&req, srcobj);
91 defobj = req.defobj_out;
97 _rtld_error("Undefined symbol \"%s\" referenced from COPY"
98 " relocation in %s", name, dstobj->path);
102 srcaddr = (const void *) (defobj->relocbase + srcsym->st_value);
103 memcpy(dstaddr, srcaddr, size);
110 /* Initialize the special GOT entries. */
112 init_pltgot(Obj_Entry *obj)
114 if (obj->pltgot != NULL) {
115 obj->pltgot[1] = (Elf_Addr) obj;
116 obj->pltgot[2] = (Elf_Addr) &_rtld_bind_start;
120 /* Process the non-PLT relocations. */
122 reloc_non_plt(Obj_Entry *obj, Obj_Entry *obj_rtld, RtldLockState *lockstate)
124 const Elf_Rel *rellim;
130 * The dynamic loader may be called from a thread, we have
131 * limited amounts of stack available so we cannot use alloca().
133 if (obj != obj_rtld) {
134 cache = calloc(obj->nchains, sizeof(SymCache));
135 /* No need to check for NULL here */
139 rellim = (const Elf_Rel *) ((caddr_t) obj->rel + obj->relsize);
140 for (rel = obj->rel; rel < rellim; rel++) {
141 Elf_Addr *where = (Elf_Addr *) (obj->relocbase + rel->r_offset);
143 switch (ELF_R_TYPE(rel->r_info)) {
151 const Obj_Entry *defobj;
153 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
154 false, cache, lockstate);
158 *where += (Elf_Addr) (defobj->relocbase + def->st_value);
164 * I don't think the dynamic linker should ever see this
165 * type of relocation. But the binutils-2.6 tools sometimes
170 const Obj_Entry *defobj;
172 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
173 false, cache, lockstate);
178 (Elf_Addr) (defobj->relocbase + def->st_value) -
185 * These are deferred until all other relocations have
186 * been done. All we do here is make sure that the COPY
187 * relocation is not in a shared library. They are allowed
188 * only in executable files.
190 if (!obj->mainprog) {
191 _rtld_error("%s: Unexpected R_386_COPY relocation"
192 " in shared library", obj->path);
200 const Obj_Entry *defobj;
202 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
203 false, cache, lockstate);
207 *where = (Elf_Addr) (defobj->relocbase + def->st_value);
212 *where += (Elf_Addr) obj->relocbase;
215 case R_386_TLS_TPOFF:
216 case R_386_TLS_TPOFF32:
219 const Obj_Entry *defobj;
222 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
223 false, cache, lockstate);
228 * We lazily allocate offsets for static TLS as we
229 * see the first relocation that references the
230 * TLS block. This allows us to support (small
231 * amounts of) static TLS in dynamically loaded
232 * modules. If we run out of space, we generate an
235 if (!defobj->tls_done) {
236 if (!allocate_tls_offset((Obj_Entry*) defobj)) {
237 _rtld_error("%s: No space available for static "
238 "Thread Local Storage", obj->path);
242 add = (Elf_Addr) (def->st_value - defobj->tlsoffset);
243 if (ELF_R_TYPE(rel->r_info) == R_386_TLS_TPOFF)
250 case R_386_TLS_DTPMOD32:
253 const Obj_Entry *defobj;
255 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
256 false, cache, lockstate);
260 *where += (Elf_Addr) defobj->tlsindex;
264 case R_386_TLS_DTPOFF32:
267 const Obj_Entry *defobj;
269 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj,
270 false, cache, lockstate);
274 *where += (Elf_Addr) def->st_value;
279 _rtld_error("%s: Unsupported relocation type %d"
280 " in non-PLT relocations\n", obj->path,
281 ELF_R_TYPE(rel->r_info));
292 /* Process the PLT relocations. */
294 reloc_plt(Obj_Entry *obj)
296 const Elf_Rel *rellim;
299 rellim = (const Elf_Rel *)((char *)obj->pltrel + obj->pltrelsize);
300 for (rel = obj->pltrel; rel < rellim; rel++) {
303 assert(ELF_R_TYPE(rel->r_info) == R_386_JMP_SLOT);
305 /* Relocate the GOT slot pointing into the PLT. */
306 where = (Elf_Addr *)(obj->relocbase + rel->r_offset);
307 *where += (Elf_Addr)obj->relocbase;
312 /* Relocate the jump slots in an object. */
314 reloc_jmpslots(Obj_Entry *obj, RtldLockState *lockstate)
316 const Elf_Rel *rellim;
319 if (obj->jmpslots_done)
321 rellim = (const Elf_Rel *)((char *)obj->pltrel + obj->pltrelsize);
322 for (rel = obj->pltrel; rel < rellim; rel++) {
323 Elf_Addr *where, target;
325 const Obj_Entry *defobj;
327 assert(ELF_R_TYPE(rel->r_info) == R_386_JMP_SLOT);
328 where = (Elf_Addr *)(obj->relocbase + rel->r_offset);
329 def = find_symdef(ELF_R_SYM(rel->r_info), obj, &defobj, true, NULL,
333 target = (Elf_Addr)(defobj->relocbase + def->st_value);
334 reloc_jmpslot(where, target, defobj, obj, rel);
336 obj->jmpslots_done = true;
341 allocate_initial_tls(Obj_Entry *objs)
346 * Fix the size of the static TLS block by using the maximum
347 * offset allocated so far and adding a bit for dynamic modules to
350 tls_static_space = tls_last_offset + RTLD_STATIC_TLS_EXTRA;
351 tls = allocate_tls(objs, NULL, 3*sizeof(Elf_Addr), sizeof(Elf_Addr));
352 i386_set_gsbase(tls);
356 __attribute__((__regparm__(1)))
357 void *___tls_get_addr(tls_index *ti)
362 __asm __volatile("movl %%gs:0, %0" : "=r" (segbase));
365 return tls_get_addr_common(&segbase[1], ti->ti_module, ti->ti_offset);
369 void *__tls_get_addr(tls_index *ti)
374 __asm __volatile("movl %%gs:0, %0" : "=r" (segbase));
377 return tls_get_addr_common(&segbase[1], ti->ti_module, ti->ti_offset);