OSDN Git Service

Merge remote branch 'origin/master' into prelink
[uclinux-h8/uClibc.git] / ldso / ldso / sparc / elfinterp.c
index 98435cb..3c92807 100644 (file)
  * SUCH DAMAGE.
  */
 
-#if defined (__SUPPORT_LD_DEBUG__)
-static const char * _dl_reltypes[] = { "R_SPARC_NONE", "R_SPARC_8",
-  "R_SPARC_16", "R_SPARC_32", "R_SPARC_DISP8", "R_SPARC_DISP16",
-  "R_SPARC_DISP32", "R_SPARC_WDISP30", "R_SPARC_WDISP22",
-  "R_SPARC_HI22", "R_SPARC_22", "R_SPARC_13", "R_SPARC_LO10",
-  "R_SPARC_GOT10", "R_SPARC_GOT13", "R_SPARC_GOT22", "R_SPARC_PC10",
-  "R_SPARC_PC22", "R_SPARC_WPLT30", "R_SPARC_COPY",
-  "R_SPARC_GLOB_DAT", "R_SPARC_JMP_SLOT", "R_SPARC_RELATIVE",
-  "R_SPARC_UA32"};
-#endif
-
 /* Program to load an ELF binary on a linux system, and run it.
 References to symbols in sharable libraries can be resolved by either
 an ELF sharable library or a linux style of shared library. */
 
 /* Disclaimer:  I have never seen any AT&T source code for SVr4, nor have
-   I ever taken any courses on internals.  This program was developed using
-   information available through the book "UNIX SYSTEM V RELEASE 4,
-   Programmers guide: Ansi C and Programming Support Tools", which did
-   a more than adequate job of explaining everything required to get this
-   working. */
+        I ever taken any courses on internals.  This program was developed using
+        information available through the book "UNIX SYSTEM V RELEASE 4,
+        Programmers guide: Ansi C and Programming Support Tools", which did
+        a more than adequate job of explaining everything required to get this
+        working. */
+
+/* Some SPARC opcodes we need to use for self-modifying code.  */
+#define OPCODE_NOP     0x01000000 /* nop */
+#define OPCODE_CALL    0x40000000 /* call ?; add PC-rel word address */
+#define OPCODE_SETHI_G1        0x03000000 /* sethi ?, %g1; add value>>10 */
+#define OPCODE_JMP_G1  0x81c06000 /* jmp %g1+?; add lo 10 bits of value */
+#define OPCODE_SAVE_SP 0x9de3bfa8 /* save %sp, -(16+6)*4, %sp */
+#define OPCODE_BA      0x30800000 /* b,a ?; add PC-rel word address */
+
+extern int _dl_linux_resolve(void);
+
+unsigned long
+_dl_linux_resolver(struct elf_resolve *tpnt, int reloc_entry)
+{
+       ELF_RELOC *this_reloc;
+       char *strtab;
+       ElfW(Sym) *symtab;
+       int symtab_index;
+       char *rel_addr;
+       char *new_addr;
+       char **got_addr;
+       ElfW(Addr) instr_addr;
+       char *symname;
+
+       rel_addr = (char *)tpnt->dynamic_info[DT_JMPREL];
+       /*
+        * Generate the correct relocation index into the .rela.plt section.
+        */
+       reloc_entry = (reloc_entry >> 10) - 0xc;
+
+       this_reloc = (ELF_RELOC *)(rel_addr + reloc_entry);
+       symtab_index = ELF_R_SYM(this_reloc->r_info);
+
+       symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
+       strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
+       symname = strtab + symtab[symtab_index].st_name;
+
+       /* Address of the jump instruction to fix up. */
+       instr_addr = (this_reloc->r_offset + tpnt->loadaddr);
+       got_addr = (char **)instr_addr;
+
+       /* Get the address of the GOT entry */
+       new_addr = _dl_find_hash(symname, &_dl_loaded_modules->symbol_scope, tpnt, ELF_RTYPE_CLASS_PLT, NULL);
+       if (unlikely(!new_addr)) {
+               _dl_dprintf(2, "%s: Can't resolve symbol '%s'\n", _dl_progname, symname);
+               _dl_exit(1);
+       }
 
-extern _dl_linux_resolve(void);
+#if defined (__SUPPORT_LD_DEBUG__)
+       if ((unsigned long)got_addr < 0x40000000) {
+               if (_dl_debug_bindings) {
+                       _dl_dprintf(_dl_debug_file, "\nresolve function: %s", symname);
+                       if (_dl_debug_detail)
+                               _dl_dprintf(_dl_debug_file,
+                                           "\tpatched: %x ==> %x @ %x\n",
+                                           *got_addr, new_addr, got_addr);
+               }
+       }
+       if (!_dl_debug_nofixups)
+#endif
+       {
+               got_addr[1] = (char *) (OPCODE_SETHI_G1 | (((unsigned int) new_addr >> 10) & 0x3fffff));
+               got_addr[2] = (char *) (OPCODE_JMP_G1 | ((unsigned int) new_addr & 0x3ff));
+       }
 
-unsigned int _dl_linux_resolver(unsigned int reloc_entry, unsigned int * plt)
+       return (unsigned long)new_addr;
+}
+
+static int
+_dl_parse(struct elf_resolve *tpnt, struct r_scope_elem *scope,
+               unsigned long rel_addr, unsigned long rel_size,
+               int (*reloc_fnc)(struct elf_resolve *tpnt, struct r_scope_elem *scope,
+                          ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab))
 {
-  int reloc_type;
-  Elf32_Rela * this_reloc;
-  char * strtab;
-  Elf32_Sym * symtab;
-  Elf32_Rela * rel_addr;
-  struct elf_resolve * tpnt;
-  int symtab_index;
-  char * new_addr;
-  char ** got_addr;
-  unsigned int instr_addr;
-  tpnt = (struct elf_resolve *) plt[2];
-
-  rel_addr = (Elf32_Rela *) (tpnt->dynamic_info[DT_JMPREL] +
-                                  tpnt->loadaddr);
-
-  /*
-   * Generate the correct relocation index into the .rela.plt section.
-   */
-  reloc_entry = (reloc_entry >> 10) - 0xc;
-
-  this_reloc = (Elf32_Rela *) ((char *) rel_addr + reloc_entry);
-
-  reloc_type = ELF32_R_TYPE(this_reloc->r_info);
-  symtab_index = ELF32_R_SYM(this_reloc->r_info);
-
-  symtab =  (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
-  strtab = (char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
-
-#ifdef __SUPPORT_LD_DEBUG__
-  if (_dl_debug_symbols) {
-  _dl_dprintf(2, "tpnt = %x\n", tpnt);
-  _dl_dprintf(2, "reloc = %x\n", this_reloc);
-  _dl_dprintf(2, "symtab = %x\n", symtab);
-  _dl_dprintf(2, "strtab = %x\n", strtab);
-  }
-#endif
+       unsigned int i;
+       char *strtab;
+       ElfW(Sym) *symtab;
+       ELF_RELOC *rpnt;
+       int symtab_index;
 
+       /* Parse the relocation information. */
+       rpnt = (ELF_RELOC *)rel_addr;
+       rel_size /= sizeof(ELF_RELOC);
 
-  if (unlikely(reloc_type != R_SPARC_JMP_SLOT)) {
-    _dl_dprintf(2, "%s: incorrect relocation type in jump relocations (%d)\n",
-                 _dl_progname, reloc_type);
-    _dl_exit(30);
-  };
+       symtab = (ElfW(Sym) *)tpnt->dynamic_info[DT_SYMTAB];
+       strtab = (char *)tpnt->dynamic_info[DT_STRTAB];
 
-  /* Address of jump instruction to fix up */
-  instr_addr  = ((int)this_reloc->r_offset  + (int)tpnt->loadaddr);
-  got_addr = (char **) instr_addr;
+       for (i = 0; i < rel_size; i++, rpnt++) {
+               int res;
 
-#ifdef __SUPPORT_LD_DEBUG__
-  if (_dl_debug_symbols) {
-  _dl_dprintf(2, "symtab_index %x\n", symtab_index);
+               symtab_index = ELF_R_SYM(rpnt->r_info);
 
-         _dl_dprintf(2, "Resolving symbol %s\n",
-                         strtab + symtab[symtab_index].st_name);
-  }
-#endif
+               debug_sym(symtab, strtab, symtab_index);
+               debug_reloc(symtab, strtab, rpnt);
 
-  /* Get the address of the GOT entry */
-  new_addr = _dl_find_hash(strtab + symtab[symtab_index].st_name,
-                       tpnt->symbol_scope, ELF_RTYPE_CLASS_PLT);
-  if(unlikely(!new_addr)) {
-    _dl_dprintf(2, "%s: can't resolve symbol '%s'\n",
-              _dl_progname, strtab + symtab[symtab_index].st_name);
-    _dl_exit(31);
-  };
+               res = reloc_fnc(tpnt, scope, rpnt, symtab, strtab);
 
+               if (res == 0)
+                       continue;
+
+               _dl_dprintf(2, "\n%s: ", _dl_progname);
+
+               if (symtab_index)
+                       _dl_dprintf(2, "symbol '%s': ",
+                                   strtab + symtab[symtab_index].st_name);
+
+               if (unlikely(res < 0)) {
+                       int reloc_type = ELF_R_TYPE(rpnt->r_info);
+
+                       _dl_dprintf(2, "can't handle reloc type "
 #if defined (__SUPPORT_LD_DEBUG__)
-       if ((unsigned long) got_addr < 0x40000000)
-       {
-               if (_dl_debug_bindings)
-               {
-                       _dl_dprintf(_dl_debug_file, "\nresolve function: %s",
-                                       strtab + symtab[symtab_index].st_name);
-                       if(_dl_debug_detail) _dl_dprintf(_dl_debug_file,
-                                       "\tpatch %x ==> %x @ %x", *got_addr, new_addr, got_addr);
+                                   "%s\n", _dl_reltypes(reloc_type));
+#else
+                                   "%x\n", reloc_type);
+#endif
+                       _dl_exit(-res);
+               } else if (unlikely(res > 0)) {
+                       _dl_dprintf(2, "can't resolve symbol\n");
+                       return res;
                }
        }
-       if (!_dl_debug_nofixups) {
-               got_addr[1] = (char *) (0x03000000 | (((unsigned int) new_addr >> 10) & 0x3fffff));
-               got_addr[2] = (char *) (0x81c06000 | ((unsigned int) new_addr & 0x3ff));
+
+       return 0;
+}
+
+static int
+_dl_do_reloc(struct elf_resolve *tpnt, struct r_scope_elem *scope,
+                        ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
+{
+       int reloc_type;
+       int symtab_index;
+       char *symname;
+       struct elf_resolve *tls_tpnt = 0;
+       struct symbol_ref sym_ref;
+       ElfW(Addr) *reloc_addr;
+       ElfW(Addr) symbol_addr;
+#if defined (__SUPPORT_LD_DEBUG__)
+       ElfW(Addr) old_val;
+#endif
+
+       reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + (unsigned long)rpnt->r_offset);
+       reloc_type = ELF_R_TYPE(rpnt->r_info);
+       symtab_index = ELF_R_SYM(rpnt->r_info);
+       sym_ref.sym = &symtab[symtab_index];
+       sym_ref.tpnt = NULL;
+       symbol_addr = 0;
+       symname = strtab + sym_ref.sym->st_name;
+
+       if (symtab_index) {
+               symbol_addr = (ElfW(Addr))_dl_find_hash(symname, scope, tpnt,
+                                                           elf_machine_type_class(reloc_type), &sym_ref);
+               /*
+                * We want to allow undefined references to weak symbols - this
+                * might have been intentional.  We should not be linking local
+                * symbols here, so all bases should be covered.
+                */
+               if (unlikely(!symbol_addr && (ELF_ST_TYPE(sym_ref.sym->st_info) != STT_TLS)
+                   && (ELF_ST_BIND(sym_ref.sym->st_info) != STB_WEAK))) {
+                       /* This may be non-fatal if called from dlopen. */
+                       return 1;
+
+               }
+               if (_dl_trace_prelink)
+                       _dl_debug_lookup (symname, tpnt, &symtab[symtab_index],
+                                               &sym_ref, elf_machine_type_class(reloc_type));
+               tls_tpnt = sym_ref.tpnt;
+       } else {
+               /* Relocs against STN_UNDEF are usually treated as using a
+                * symbol value of zero, and using the module containing the
+                * reloc itself. */
+               symbol_addr = sym_ref.sym->st_value;
+               tls_tpnt = tpnt;
        }
-#else
-       got_addr[1] = (char *) (0x03000000 | (((unsigned int) new_addr >> 10) & 0x3fffff));
-       got_addr[2] = (char *) (0x81c06000 | ((unsigned int) new_addr & 0x3ff));
+
+#if defined (__SUPPORT_LD_DEBUG__)
+       old_val = *reloc_addr;
 #endif
 
-       _dl_dprintf(2, "Address = %x\n",new_addr);
-       _dl_exit(32);
+       symbol_addr += rpnt->r_addend;  /* Assume copy relocs have zero addend.  */
+
+       switch (reloc_type) {
+               case R_SPARC_NONE:
+                       break;
+
+               case R_SPARC_DISP32:
+                       *reloc_addr = symbol_addr - (unsigned int) reloc_addr;
+                       break;
+
+               case R_SPARC_LO10:
+                       if (!symbol_addr)
+                               symbol_addr = tpnt->loadaddr + rpnt->r_addend;
+                       else
+                               symbol_addr += rpnt->r_addend;
+                       *reloc_addr = (*reloc_addr & ~0x3ff) | (symbol_addr & 0x3ff);
+                       break;
+
+               case R_SPARC_GLOB_DAT:
+               case R_SPARC_32:
+                       *reloc_addr = symbol_addr;
+                       break;
+
+               case R_SPARC_JMP_SLOT:
+                       reloc_addr[1] = OPCODE_SETHI_G1 | (( symbol_addr >> 10 ) & 0x3fffff);
+                       reloc_addr[2] = OPCODE_JMP_G1 | ( symbol_addr & 0x3ff );
+                       break;
+
+               case R_SPARC_RELATIVE:
+                       *reloc_addr += tpnt->loadaddr + rpnt->r_addend;
+                       break;
+
+               case R_SPARC_WDISP30:
+                       *reloc_addr = (*reloc_addr & 0xc0000000)|
+                                ((symbol_addr - (unsigned int) reloc_addr) >> 2);
+                       break;
+
+               case R_SPARC_HI22:
+                       if (!symbol_addr)
+                               symbol_addr = tpnt->loadaddr + rpnt->r_addend;
+                       else
+                               symbol_addr += rpnt->r_addend;
+                       *reloc_addr = (*reloc_addr & 0xffc00000) | (symbol_addr >> 10);
+                       break;
+
+               case R_SPARC_COPY:
+                       if (symbol_addr) {
+#if defined (__SUPPORT_LD_DEBUG__)
+                               if (_dl_debug_move)
+                                       _dl_dprintf(_dl_debug_file,
+                                                   "\t%s move %d bytes from %x to %x\n",
+                                                   symname, sym_ref.sym->st_size,
+                                                   symbol_addr, reloc_addr);
+#endif
 
-  return (unsigned int) new_addr;
-}
+                               _dl_memcpy((char *)reloc_addr,
+                                          (char *)symbol_addr,
+                                          sym_ref.sym->st_size);
+                       } else
+                               _dl_dprintf(_dl_debug_file, "no symbol_addr to copy !?\n");
+                       break;
+#if defined USE_TLS && USE_TLS
+               case R_SPARC_TLS_DTPMOD32:
+                       *reloc_addr = tls_tpnt->l_tls_modid;
+                       break;
+
+               case R_SPARC_TLS_DTPOFF32:
+                       /* During relocation all TLS symbols are defined and used.
+                        * Therefore the offset is already correct.  */
+                       *reloc_addr = sym_ref.sym->st_value + rpnt->r_addend;
+                       break;
+
+               case R_SPARC_TLS_TPOFF32:
+                       /* The offset is negative, forward from the thread pointer.
+                        * We know the offset of the object the symbol is contained in.
+                        * It is a negative value which will be added to the
+                        * thread pointer.  */
+                       CHECK_STATIC_TLS ((struct link_map *) tls_tpnt);
+                       *reloc_addr = sym_ref.sym->st_value - tls_tpnt->l_tls_offset + rpnt->r_addend;
+                       break;
+#endif
+               default:
+                       return -1;      /* Calls _dl_exit(1). */
+       }
 
-void _dl_parse_lazy_relocation_information(struct dyn_elf *rpnt,
-       unsigned long rel_addr, unsigned long rel_size, int type)
-{
-  int i;
-  char * strtab;
-  int reloc_type;
-  int symtab_index;
-  Elf32_Sym * symtab;
-  Elf32_Rela * rpnt;
-  unsigned int * reloc_addr;
-  struct elf_resolve * tpnt = rpnt->dyn;
-
-  /* Now parse the relocation information */
-  rpnt = (Elf32_Rela *) (rel_addr + tpnt->loadaddr);
-
-  symtab =  (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
-  strtab = ( char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
-
-  for(i=0; i< rel_size; i += sizeof(Elf32_Rela), rpnt++){
-    reloc_addr = (int *) (tpnt->loadaddr + (int)rpnt->r_offset);
-    reloc_type = ELF32_R_TYPE(rpnt->r_info);
-    symtab_index = ELF32_R_SYM(rpnt->r_info);
-
-    /* When the dynamic linker bootstrapped itself, it resolved some symbols.
-       Make sure we do not do them again */
-    if(!symtab_index && tpnt->libtype == program_interpreter) continue;
-    if(symtab_index && tpnt->libtype == program_interpreter &&
-       _dl_symbol(strtab + symtab[symtab_index].st_name))
-      continue;
-
-    switch(reloc_type){
-    case R_SPARC_NONE:
-      break;
-    case R_SPARC_JMP_SLOT:
-      break;
-    default:
-      _dl_dprintf(2, "%s: (LAZY) can't handle reloc type ", _dl_progname);
 #if defined (__SUPPORT_LD_DEBUG__)
-      _dl_dprintf(2, "%s ", _dl_reltypes[reloc_type]);
+       if (_dl_debug_reloc && _dl_debug_detail)
+               _dl_dprintf(_dl_debug_file, "\tpatched: %x ==> %x @ %x\n",
+                           old_val, *reloc_addr, reloc_addr);
 #endif
-      if(symtab_index) _dl_dprintf(2, "'%s'\n",
-                                 strtab + symtab[symtab_index].st_name);
-      _dl_exit(33);
-    };
-  };
+
+       return 0;
 }
 
-int _dl_parse_relocation_information(struct dyn_elf *rpnt,
-       unsigned long rel_addr, unsigned long rel_size, int type)
+#undef __SPARC_LAZY_RELOC_WORKS
+#ifdef __SPARC_LAZY_RELOC_WORKS
+static int
+_dl_do_lazy_reloc(struct elf_resolve *tpnt, struct r_scope_elem *scope,
+                 ELF_RELOC *rpnt, ElfW(Sym) *symtab, char *strtab)
 {
-  int i;
-  char * strtab;
-  int reloc_type;
-  int goof = 0;
-  Elf32_Sym * symtab;
-  Elf32_Rela * rpnt;
-  unsigned int * reloc_addr;
-  unsigned int symbol_addr;
-  int symtab_index;
-  struct elf_resolve * tpnt = rpnt->dyn;
-  /* Now parse the relocation information */
-
-  rpnt = (Elf32_Rela *) (rel_addr + tpnt->loadaddr);
-
-  symtab =  (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
-  strtab = ( char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
-
-  for(i=0; i< rel_size; i+= sizeof(Elf32_Rela), rpnt++){
-    reloc_addr = (int *) (tpnt->loadaddr + (int)rpnt->r_offset);
-    reloc_type = ELF32_R_TYPE(rpnt->r_info);
-    symtab_index = ELF32_R_SYM(rpnt->r_info);
-    symbol_addr = 0;
-
-    if(!symtab_index && tpnt->libtype == program_interpreter) continue;
-
-    if(symtab_index) {
-
-      if(tpnt->libtype == program_interpreter &&
-        _dl_symbol(strtab + symtab[symtab_index].st_name))
-       continue;
-
-      symbol_addr = (unsigned int)
-       _dl_find_hash(strtab + symtab[symtab_index].st_name,
-                     tpnt->symbol_scope, elf_machine_type_class(reloc_type));
-
-      if(!symbol_addr &&
-        ELF32_ST_BIND(symtab [symtab_index].st_info) == STB_GLOBAL) {
-       _dl_dprintf(2, "%s: can't resolve symbol '%s'\n",
-                    _dl_progname, strtab + symtab[symtab_index].st_name);
-       goof++;
-      };
-    };
-    switch(reloc_type){
-    case R_SPARC_NONE:
-       break;
-    case R_SPARC_32:
-      *reloc_addr = symbol_addr + rpnt->r_addend;
-      break;
-    case R_SPARC_DISP32:
-      *reloc_addr = symbol_addr + rpnt->r_addend - (unsigned int) reloc_addr;
-      break;
-    case R_SPARC_GLOB_DAT:
-      *reloc_addr = symbol_addr + rpnt->r_addend;
-      break;
-    case R_SPARC_JMP_SLOT:
-      reloc_addr[1] = 0x03000000 | ((symbol_addr >> 10) & 0x3fffff);
-      reloc_addr[2] = 0x81c06000 | (symbol_addr & 0x3ff);
-      break;
-    case R_SPARC_RELATIVE:
-      *reloc_addr += (unsigned int) tpnt->loadaddr + rpnt->r_addend;
-      break;
-    case R_SPARC_HI22:
-      if (!symbol_addr)
-        symbol_addr = tpnt->loadaddr + rpnt->r_addend;
-      else
-       symbol_addr += rpnt->r_addend;
-      *reloc_addr = (*reloc_addr & 0xffc00000)|(symbol_addr >> 10);
-      break;
-    case R_SPARC_LO10:
-      if (!symbol_addr)
-        symbol_addr = tpnt->loadaddr + rpnt->r_addend;
-      else
-       symbol_addr += rpnt->r_addend;
-      *reloc_addr = (*reloc_addr & ~0x3ff)|(symbol_addr & 0x3ff);
-      break;
-    case R_SPARC_WDISP30:
-      *reloc_addr = (*reloc_addr & 0xc0000000)|
-       ((symbol_addr - (unsigned int) reloc_addr) >> 2);
-      break;
-    case R_SPARC_COPY:
-#if 0 /* This one is done later */
-      _dl_dprintf(2, "Doing copy for symbol ");
-      if(symtab_index) _dl_dprintf(2, strtab + symtab[symtab_index].st_name);
-      _dl_dprintf(2, "\n");
-      _dl_memcpy((void *) symtab[symtab_index].st_value,
-                (void *) symbol_addr,
-                symtab[symtab_index].st_size);
-#endif
-      break;
-    default:
-      _dl_dprintf(2, "%s: can't handle reloc type ", _dl_progname);
+       int reloc_type;
+       int symtab_index;
+       ElfW(Addr) *reloc_addr;
 #if defined (__SUPPORT_LD_DEBUG__)
-      _dl_dprintf(2, "%s ", _dl_reltypes[reloc_type]);
+       ElfW(Addr) old_val;
 #endif
-      if (symtab_index)
-       _dl_dprintf(2, "'%s'\n", strtab + symtab[symtab_index].st_name);
-      _dl_exit(34);
-    };
 
-  };
-  return goof;
-}
+       (void)scope;
+       symtab_index = ELF_R_SYM(rpnt->r_info);
+       (void)strtab;
 
+       reloc_addr = (ElfW(Addr)*)(tpnt->loadaddr + rpnt->r_offset);
+       reloc_type = ELF_R_TYPE(rpnt->r_info);
 
-/* This is done as a separate step, because there are cases where
-   information is first copied and later initialized.  This results in
-   the wrong information being copied.  Someone at Sun was complaining about
-   a bug in the handling of _COPY by SVr4, and this may in fact be what he
-   was talking about.  Sigh. */
+#if defined (__SUPPORT_LD_DEBUG__)
+       old_val = *reloc_addr;
+#endif
 
-/* No, there are cases where the SVr4 linker fails to emit COPY relocs
-   at all */
+       switch (reloc_type) {
+               case R_SPARC_NONE:
+                       break;
+               case R_SPARC_JMP_SLOT:
+                       break;
+               default:
+                       _dl_exit(1);
+       }
 
-int _dl_parse_copy_information(struct dyn_elf *xpnt,
-       unsigned long rel_addr, unsigned long rel_size, int type)
-{
-  int i;
-  char * strtab;
-  int reloc_type;
-  int goof = 0;
-  Elf32_Sym * symtab;
-  Elf32_Rela * rpnt;
-  unsigned int * reloc_addr;
-  unsigned int symbol_addr;
-  struct elf_resolve *tpnt;
-  int symtab_index;
-  /* Now parse the relocation information */
-
-  tpnt = xpnt->dyn;
-
-  rpnt = (Elf32_Rela *) (rel_addr + tpnt->loadaddr);
-
-  symtab =  (Elf32_Sym *) (tpnt->dynamic_info[DT_SYMTAB] + tpnt->loadaddr);
-  strtab = ( char *) (tpnt->dynamic_info[DT_STRTAB] + tpnt->loadaddr);
-
-  for(i=0; i< rel_size; i+= sizeof(Elf32_Rela), rpnt++){
-    reloc_addr = (int *) (tpnt->loadaddr + (int)rpnt->r_offset);
-    reloc_type = ELF32_R_TYPE(rpnt->r_info);
-    if(reloc_type != R_SPARC_COPY) continue;
-    symtab_index = ELF32_R_SYM(rpnt->r_info);
-    symbol_addr = 0;
-    if(!symtab_index && tpnt->libtype == program_interpreter) continue;
-    if(symtab_index) {
-
-      if(tpnt->libtype == program_interpreter &&
-        _dl_symbol(strtab + symtab[symtab_index].st_name))
-       continue;
-
-      symbol_addr = (unsigned int)
-       _dl_find_hash(strtab + symtab[symtab_index].st_name,
-                     xpnt->next,  ELF_RTYPE_CLASS_COPY);
-      if(!symbol_addr) {
-       _dl_dprintf(2, "%s: can't resolve symbol '%s'\n",
-                  _dl_progname, strtab + symtab[symtab_index].st_name);
-       goof++;
-      };
-    };
-    if (!goof)
-      _dl_memcpy((char *) symtab[symtab_index].st_value,
-                 (char *) symbol_addr,
-                 symtab[symtab_index].st_size);
-  };
-  return goof;
+#if defined (__SUPPORT_LD_DEBUG__)
+       if (_dl_debug_reloc && _dl_debug_detail)
+               _dl_dprintf(_dl_debug_file, "\tpatched_lazy: %x ==> %x @ %x\n",
+                           old_val, *reloc_addr, reloc_addr);
+#endif
+
+       return 0;
 }
+#endif
 
+void
+_dl_parse_lazy_relocation_information(struct dyn_elf *rpnt,
+                                     unsigned long rel_addr,
+                                     unsigned long rel_size)
+{
+#ifdef __SPARC_LAZY_RELOC_WORKS
+       (void)_dl_parse(rpnt->dyn, NULL, rel_addr, rel_size, _dl_do_lazy_reloc);
+#else
+       _dl_parse_relocation_information(rpnt, &_dl_loaded_modules->symbol_scope,
+                                                                       rel_addr, rel_size);
+#endif
+}
 
+int
+_dl_parse_relocation_information(struct dyn_elf *rpnt,
+                                struct r_scope_elem *scope,
+                                unsigned long rel_addr,
+                                unsigned long rel_size)
+{
+       return _dl_parse(rpnt->dyn, scope, rel_addr, rel_size, _dl_do_reloc);
+}