亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? dl-machine.h

?? glibc 庫, 不僅可以學習使用庫函數(shù),還可以學習函數(shù)的具體實現(xiàn),是提高功力的好資料
?? H
字號:
/* Machine-dependent ELF dynamic relocation inline functions.   64 bit S/390 Version.   Copyright (C) 2001-2005, 2006 Free Software Foundation, Inc.   Contributed by Martin Schwidefsky (schwidefsky@de.ibm.com).   This file is part of the GNU C Library.   The GNU C Library is free software; you can redistribute it and/or   modify it under the terms of the GNU Lesser General Public   License as published by the Free Software Foundation; either   version 2.1 of the License, or (at your option) any later version.   The GNU C Library is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU   Lesser General Public License for more details.   You should have received a copy of the GNU Lesser General Public   License along with the GNU C Library; if not, write to the Free   Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA   02111-1307 USA.  */#ifndef dl_machine_h#define dl_machine_h#define ELF_MACHINE_NAME "s390x"#include <sys/param.h>#include <string.h>#include <link.h>/* This is an older, now obsolete value.  */#define EM_S390_OLD	0xA390/* Return nonzero iff E_MACHINE is compatible with the running host.  */static inline intelf_machine_matches_host (const Elf64_Ehdr *ehdr){  return (ehdr->e_machine == EM_S390 || ehdr->e_machine == EM_S390_OLD)	 && ehdr->e_ident[EI_CLASS] == ELFCLASS64;}/* Return the link-time address of _DYNAMIC.  Conveniently, this is the   first element of the GOT.  This must be inlined in a function which   uses global data.  */static inline Elf64_Addrelf_machine_dynamic (void){  register Elf64_Addr *got;  asm( "	larl   %0,_GLOBAL_OFFSET_TABLE_\n"       : "=&a" (got) : : "0" );  return *got;}/* Return the run-time load address of the shared object.  */static inline Elf64_Addrelf_machine_load_address (void){  Elf64_Addr addr;  asm( "   larl	 %0,_dl_start\n"       "   larl	 1,_GLOBAL_OFFSET_TABLE_\n"       "   lghi	 2,_dl_start@GOT\n"       "   slg	 %0,0(2,1)"       : "=&d" (addr) : : "1", "2" );  return addr;}/* Set up the loaded object described by L so its unrelocated PLT   entries will jump to the on-demand fixup code in dl-runtime.c.  */static inline int __attribute__ ((unused))elf_machine_runtime_setup (struct link_map *l, int lazy, int profile){  extern void _dl_runtime_resolve (Elf64_Word);  extern void _dl_runtime_profile (Elf64_Word);  if (l->l_info[DT_JMPREL] && lazy)    {      /* The GOT entries for functions in the PLT have not yet been filled	 in.  Their initial contents will arrange when called to push an	 offset into the .rela.plt section, push _GLOBAL_OFFSET_TABLE_[1],	 and then jump to _GLOBAL_OFFSET_TABLE[2].  */      Elf64_Addr *got;      got = (Elf64_Addr *) D_PTR (l, l_info[DT_PLTGOT]);      /* If a library is prelinked but we have to relocate anyway,	 we have to be able to undo the prelinking of .got.plt.	 The prelinker saved us here address of .plt + 0x2e.  */      if (got[1])	{	  l->l_mach.plt = got[1] + l->l_addr;	  l->l_mach.gotplt = (Elf64_Addr) &got[3];	}      got[1] = (Elf64_Addr) l;	/* Identify this shared object.	 */      /* The got[2] entry contains the address of a function which gets	 called to get the address of a so far unresolved function and	 jump to it.  The profiling extension of the dynamic linker allows	 to intercept the calls to collect information.	 In this case we	 don't store the address in the GOT so that all future calls also	 end in this function.	*/      if (__builtin_expect (profile, 0))	{	  got[2] = (Elf64_Addr) &_dl_runtime_profile;	  if (GLRO(dl_profile) != NULL	      && _dl_name_match_p (GLRO(dl_profile), l))	    /* This is the object we are looking for.  Say that we really	       want profiling and the timers are started.  */	    GL(dl_profile_map) = l;	}      else	/* This function will get called to fix up the GOT entry indicated by	   the offset on the stack, and then jump to the resolved address.  */	got[2] = (Elf64_Addr) &_dl_runtime_resolve;    }  return lazy;}/* Initial entry point code for the dynamic linker.   The C function `_dl_start' is the real entry point;   its return value is the user program's entry point.	*/#define RTLD_START asm ("\n\.text\n\.align 4\n\.globl _start\n\.globl _dl_start_user\n\_start:\n\	lgr   %r2,%r15\n\	# Alloc stack frame\n\	aghi  %r15,-160\n\	# Set the back chain to zero\n\	xc    0(8,%r15),0(%r15)\n\	# Call _dl_start with %r2 pointing to arg on stack\n\	brasl %r14,_dl_start	     # call _dl_start\n\_dl_start_user:\n\	# Save the user entry point address in %r8.\n\	lgr   %r8,%r2\n\	# Point %r12 at the GOT.\n\	larl  %r12,_GLOBAL_OFFSET_TABLE_\n\	# See if we were run as a command with the executable file\n\	# name as an extra leading argument.\n\	lghi  %r1,_dl_skip_args@GOT\n\	lg    %r1,0(%r1,%r12)\n\	lgf   %r1,0(%r1)	  # load _dl_skip_args\n\	# Get the original argument count.\n\	lg    %r0,160(%r15)\n\	# Subtract _dl_skip_args from it.\n\	sgr   %r0,%r1\n\	# Adjust the stack pointer to skip _dl_skip_args words.\n\	sllg  %r1,%r1,3\n\	agr   %r15,%r1\n\	# Set the back chain to zero again\n\	xc    0(8,%r15),0(%r15)\n\	# Store back the modified argument count.\n\	stg   %r0,160(%r15)\n\	# The special initializer gets called with the stack just\n\	# as the application's entry point will see it; it can\n\	# switch stacks if it moves these contents over.\n\" RTLD_START_SPECIAL_INIT "\n\	# Call the function to run the initializers.\n\	# Load the parameters:\n\	# (%r2, %r3, %r4, %r5) = (_dl_loaded, argc, argv, envp)\n\	lghi  %r2,_rtld_local@GOT\n\	lg    %r2,0(%r2,%r12)\n\	lg    %r2,0(%r2)\n\	lg    %r3,160(%r15)\n\	la    %r4,168(%r15)\n\	lgr   %r5,%r3\n\	sllg  %r5,%r5,3\n\	la    %r5,176(%r5,%r15)\n\	brasl %r14,_dl_init_internal@PLT\n\	# Pass our finalizer function to the user in %r14, as per ELF ABI.\n\	lghi  %r14,_dl_fini@GOT\n\	lg    %r14,0(%r14,%r12)\n\	# Free stack frame\n\	aghi  %r15,160\n\	# Jump to the user's entry point (saved in %r8).\n\	br    %r8\n\");#ifndef RTLD_START_SPECIAL_INIT#define RTLD_START_SPECIAL_INIT /* nothing */#endif/* ELF_RTYPE_CLASS_PLT iff TYPE describes relocation of a PLT entry or   TLS variable, so undefined references should not be allowed to   define the value.   ELF_RTYPE_CLASS_NOCOPY iff TYPE should not be allowed to resolve to one   of the main executable's symbols, as for a COPY reloc.  */#define elf_machine_type_class(type) \  ((((type) == R_390_JMP_SLOT || (type) == R_390_TLS_DTPMOD		      \     || (type) == R_390_TLS_DTPOFF || (type) == R_390_TLS_TPOFF)	      \    * ELF_RTYPE_CLASS_PLT)						      \   | (((type) == R_390_COPY) * ELF_RTYPE_CLASS_COPY))/* A reloc type used for ld.so cmdline arg lookups to reject PLT entries.  */#define ELF_MACHINE_JMP_SLOT	R_390_JMP_SLOT/* The 64 bit S/390 never uses Elf64_Rel relocations.  */#define ELF_MACHINE_NO_REL 1/* We define an initialization functions.  This is called very early in   _dl_sysdep_start.  */#define DL_PLATFORM_INIT dl_platform_init ()static inline void __attribute__ ((unused))dl_platform_init (void){  if (GLRO(dl_platform) != NULL && *GLRO(dl_platform) == '\0')    /* Avoid an empty string which would disturb us.  */    GLRO(dl_platform) = NULL;}static inline Elf64_Addrelf_machine_fixup_plt (struct link_map *map, lookup_t t,		       const Elf64_Rela *reloc,		       Elf64_Addr *reloc_addr, Elf64_Addr value){  return *reloc_addr = value;}/* Return the final value of a plt relocation.	*/static inline Elf64_Addrelf_machine_plt_value (struct link_map *map, const Elf64_Rela *reloc,		       Elf64_Addr value){  return value;}/* Names of the architecture-specific auditing callback functions.  */#define ARCH_LA_PLTENTER s390_64_gnu_pltenter#define ARCH_LA_PLTEXIT s390_64_gnu_pltexit#endif /* !dl_machine_h */#ifdef RESOLVE_MAP/* Perform the relocation specified by RELOC and SYM (which is fully resolved).   MAP is the object containing the reloc.  */auto inline void__attribute__ ((always_inline))elf_machine_rela (struct link_map *map, const Elf64_Rela *reloc,		  const Elf64_Sym *sym, const struct r_found_version *version,		  void *const reloc_addr_arg){  Elf64_Addr *const reloc_addr = reloc_addr_arg;  const unsigned int r_type = ELF64_R_TYPE (reloc->r_info);#if !defined RTLD_BOOTSTRAP || !defined HAVE_Z_COMBRELOC  if (__builtin_expect (r_type == R_390_RELATIVE, 0))    {# if !defined RTLD_BOOTSTRAP && !defined HAVE_Z_COMBRELOC      /* This is defined in rtld.c, but nowhere in the static libc.a;	 make the reference weak so static programs can still link.	 This declaration cannot be done when compiling rtld.c	 (i.e. #ifdef RTLD_BOOTSTRAP) because rtld.c contains the	 common defn for _dl_rtld_map, which is incompatible with a	 weak decl in the same file.  */#  ifndef SHARED      weak_extern (GL(dl_rtld_map));#  endif      if (map != &GL(dl_rtld_map)) /* Already done in rtld itself.  */# endif	*reloc_addr = map->l_addr + reloc->r_addend;    }  else#endif  if (__builtin_expect (r_type == R_390_NONE, 0))    return;  else    {#ifndef RESOLVE_CONFLICT_FIND_MAP      const Elf64_Sym *const refsym = sym;#endif      struct link_map *sym_map = RESOLVE_MAP (&sym, version, r_type);      Elf64_Addr value = sym == NULL ? 0 : sym_map->l_addr + sym->st_value;      switch (r_type)	{	case R_390_GLOB_DAT:	case R_390_JMP_SLOT:	  *reloc_addr = value + reloc->r_addend;	  break;#if (!defined RTLD_BOOTSTRAP || USE___THREAD) \    && !defined RESOLVE_CONFLICT_FIND_MAP	case R_390_TLS_DTPMOD:# ifdef RTLD_BOOTSTRAP	  /* During startup the dynamic linker is always the module	     with index 1.	     XXX If this relocation is necessary move before RESOLVE	     call.  */	  *reloc_addr = 1;# else	  /* Get the information from the link map returned by the	     resolv function.  */	  if (sym_map != NULL)	    *reloc_addr = sym_map->l_tls_modid;# endif	  break;	case R_390_TLS_DTPOFF:# ifndef RTLD_BOOTSTRAP	  /* During relocation all TLS symbols are defined and used.	     Therefore the offset is already correct.  */	  if (sym != NULL)	    *reloc_addr = sym->st_value + reloc->r_addend;# endif	  break;	case R_390_TLS_TPOFF:	  /* The offset is negative, forward from the thread pointer.  */# ifdef RTLD_BOOTSTRAP	  *reloc_addr = sym->st_value + reloc->r_addend - map->l_tls_offset;# else	  /* We know the offset of the object the symbol is contained in.	     It is a negative value which will be added to the	     thread pointer.  */	  if (sym != NULL)	    {	      CHECK_STATIC_TLS (map, sym_map);	      *reloc_addr = (sym->st_value + reloc->r_addend			     - sym_map->l_tls_offset);	    }#endif	  break;#endif  /* use TLS */#ifndef RTLD_BOOTSTRAP# ifndef RESOLVE_CONFLICT_FIND_MAP	/* Not needed for dl-conflict.c.  */	case R_390_COPY:	  if (sym == NULL)	    /* This can happen in trace mode if an object could not be	       found.  */	    break;	  if (__builtin_expect (sym->st_size > refsym->st_size, 0)	      || (__builtin_expect (sym->st_size < refsym->st_size, 0)		  && __builtin_expect (GLRO(dl_verbose), 0)))	    {	      const char *strtab;	      strtab = (const char *) D_PTR (map,l_info[DT_STRTAB]);	      _dl_error_printf ("\%s: Symbol `%s' has different size in shared object, consider re-linking\n",				rtld_progname ?: "<program name unknown>",				strtab + refsym->st_name);	    }	  memcpy (reloc_addr_arg, (void *) value,		  MIN (sym->st_size, refsym->st_size));	  break;# endif	case R_390_64:	  *reloc_addr = value + reloc->r_addend;	  break;	case R_390_32:	  *(unsigned int *) reloc_addr = value + reloc->r_addend;	  break;	case R_390_16:	  *(unsigned short *) reloc_addr = value + reloc->r_addend;	  break;	case R_390_8:	  *(char *) reloc_addr = value + reloc->r_addend;	  break;# ifndef RESOLVE_CONFLICT_FIND_MAP	case R_390_PC64:	  *reloc_addr = value +reloc->r_addend - (Elf64_Addr) reloc_addr;	  break;	case R_390_PC32DBL:	case R_390_PLT32DBL:	  *(unsigned int *) reloc_addr = (unsigned int)	    ((int) (value + reloc->r_addend - (Elf64_Addr) reloc_addr) >> 1);	  break;	case R_390_PC32:	  *(unsigned int *) reloc_addr =	    value + reloc->r_addend - (Elf64_Addr) reloc_addr;	  break;	case R_390_PC16DBL:	case R_390_PLT16DBL:	  *(unsigned short *) reloc_addr = (unsigned short)	    ((short) (value + reloc->r_addend - (Elf64_Addr) reloc_addr) >> 1);	  break;	case R_390_PC16:	  *(unsigned short *) reloc_addr =	    value + reloc->r_addend - (Elf64_Addr) reloc_addr;	  break;	case R_390_NONE:	  break;# endif#endif#if !defined(RTLD_BOOTSTRAP) || defined(_NDEBUG)	default:	  /* We add these checks in the version to relocate ld.so only	     if we are still debugging.	 */	  _dl_reloc_bad_type (map, r_type, 0);	  break;#endif	}    }}auto inline void__attribute__ ((always_inline))elf_machine_rela_relative (Elf64_Addr l_addr, const Elf64_Rela *reloc,			   void *const reloc_addr_arg){  Elf64_Addr *const reloc_addr = reloc_addr_arg;  *reloc_addr = l_addr + reloc->r_addend;}auto inline void__attribute__ ((always_inline))elf_machine_lazy_rel (struct link_map *map,		      Elf64_Addr l_addr, const Elf64_Rela *reloc){  Elf64_Addr *const reloc_addr = (void *) (l_addr + reloc->r_offset);  const unsigned int r_type = ELF64_R_TYPE (reloc->r_info);  /* Check for unexpected PLT reloc type.  */  if (__builtin_expect (r_type == R_390_JMP_SLOT, 1))    {      if (__builtin_expect (map->l_mach.plt, 0) == 0)	*reloc_addr += l_addr;      else	*reloc_addr =	  map->l_mach.plt	  + (((Elf64_Addr) reloc_addr) - map->l_mach.gotplt) * 4;    }  else    _dl_reloc_bad_type (map, r_type, 1);}#endif /* RESOLVE_MAP */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色8久久精品久久久久久蜜| 国产精品全国免费观看高清| 激情综合色综合久久综合| 久久蜜臀中文字幕| 成人av在线资源网站| 亚洲激情在线播放| 制服丝袜成人动漫| 国产一区二区三区av电影 | 九九国产精品视频| 国产午夜精品美女毛片视频| 99视频在线精品| 五月综合激情婷婷六月色窝| 日韩精品一区二区三区在线播放| 国产精品一区二区在线看| 中文字幕一区av| 制服丝袜中文字幕一区| 国产精品一区二区三区99| 国产精品久久看| 在线成人高清不卡| 国产精品亚洲а∨天堂免在线| 国产精品国产三级国产有无不卡 | 性做久久久久久| 精品精品国产高清a毛片牛牛 | 国产精品一区二区三区乱码| 亚洲欧洲av在线| 欧美另类变人与禽xxxxx| 国产寡妇亲子伦一区二区| 亚洲一级电影视频| 26uuu色噜噜精品一区| av网站免费线看精品| 日韩福利视频导航| 中文字幕一区二区三区四区不卡| 91.com在线观看| 成人午夜视频福利| 天天综合色天天综合| 欧美国产日韩亚洲一区| 欧美日韩黄视频| 成人aa视频在线观看| 日本va欧美va欧美va精品| 国产精品第五页| 精品人在线二区三区| 91久久精品网| 激情欧美日韩一区二区| 亚洲自拍偷拍综合| 中文字幕欧美区| 欧美一级精品大片| 在线免费不卡电影| 国产v日产∨综合v精品视频| 午夜欧美大尺度福利影院在线看| 久久精品人人做人人爽97| 欧美日韩国产成人在线免费| 国产成人高清视频| 蜜臀av一区二区三区| 亚洲一区精品在线| 国产蜜臀av在线一区二区三区| 欧美老肥妇做.爰bbww| 色综合中文字幕国产| 韩国毛片一区二区三区| 午夜伊人狠狠久久| 亚洲色图清纯唯美| 国产午夜精品福利| 日韩精品一区二区三区在线观看 | 高清不卡一二三区| 美女视频黄久久| 亚洲午夜视频在线观看| 中日韩免费视频中文字幕| 精品国产精品网麻豆系列| 欧美久久久久久久久中文字幕| 91在线精品一区二区三区| 国产成人午夜精品5599| 美腿丝袜亚洲色图| 午夜视频一区在线观看| 亚洲另类色综合网站| 国产精品天干天干在线综合| 日韩精品一区国产麻豆| 欧美精三区欧美精三区| 欧美色视频一区| 色播五月激情综合网| 99久久婷婷国产综合精品| 成人性生交大片免费看视频在线 | 亚洲欧洲成人自拍| 欧美激情一区二区三区全黄| 久久亚洲精精品中文字幕早川悠里 | 亚洲欧美国产高清| 国产精品久久久久久久久免费相片| 久久色在线观看| 欧美α欧美αv大片| 日韩欧美国产精品一区| 欧美二区三区的天堂| 欧美精品日韩综合在线| 欧美三级视频在线播放| 在线观看日韩av先锋影音电影院| 91免费观看视频在线| 91免费看`日韩一区二区| 91在线一区二区三区| 91色.com| 色综合久久久久综合| 色欧美88888久久久久久影院| av亚洲精华国产精华| 91丨国产丨九色丨pron| 26uuu国产一区二区三区| 欧美一区二区视频在线观看2020| 欧美高清视频在线高清观看mv色露露十八| 欧美日韩中文一区| 欧美日韩精品一区二区三区蜜桃| 欧美图区在线视频| 欧美精品一二三区| 69av一区二区三区| 91精品国产一区二区三区蜜臀 | 麻豆91在线观看| 另类调教123区| 久久99精品国产.久久久久久| 老鸭窝一区二区久久精品| 精品一区二区三区香蕉蜜桃| 国产在线精品免费| 成人理论电影网| 97久久超碰精品国产| 色婷婷久久综合| 精品视频一区二区不卡| 91精品国产美女浴室洗澡无遮挡| 欧美一级专区免费大片| 欧美成人艳星乳罩| 国产亚洲欧美日韩在线一区| 国产精品久久久久久久久久免费看| 亚洲人亚洲人成电影网站色| 一区二区三区资源| 日韩精品乱码av一区二区| 久久精品国产澳门| 欧美在线视频不卡| 在线视频观看一区| 欧美电影一区二区三区| 欧美成人精品1314www| 国产三级精品三级| 亚洲欧洲精品天堂一级| 亚洲午夜精品在线| 久久se精品一区精品二区| 国产成人精品1024| 日本精品视频一区二区三区| 91精品国产综合久久精品麻豆| 精品av综合导航| 亚洲天堂2014| 日韩精品久久理论片| 国产一区二区三区四区五区入口 | 日韩欧美电影一二三| 久久久久国产精品麻豆| 亚洲精品中文在线影院| 亚洲www啪成人一区二区麻豆| 欧美日韩久久一区| 欧美一卡二卡三卡| 国产精品久久久久四虎| 亚洲国产日韩a在线播放性色| 六月丁香婷婷久久| 91视频免费播放| 欧美酷刑日本凌虐凌虐| 精品久久久久久最新网址| 综合av第一页| 日韩影院在线观看| 成人综合婷婷国产精品久久| 欧美日韩日日摸| 中文字幕不卡一区| 午夜精品久久久久| 国产激情偷乱视频一区二区三区| 色久综合一二码| 久久夜色精品一区| 亚洲黄色性网站| 国产乱淫av一区二区三区| 色狠狠色狠狠综合| 久久男人中文字幕资源站| 一区二区三区不卡在线观看 | 久久天堂av综合合色蜜桃网| 亚洲免费在线视频| 国产在线视频一区二区| 欧美视频一区二区在线观看| 久久影院午夜论| 亚洲一区二区三区国产| 国产suv精品一区二区三区| 欧美精品国产精品| 亚洲三级在线免费| 国产精品夜夜嗨| 欧美日韩综合一区| 中文字幕免费不卡在线| 日韩成人午夜电影| 一本色道久久综合精品竹菊| 久久久精品国产99久久精品芒果| 亚洲高清在线精品| 99国产精品久久久| 久久久久久亚洲综合| 日韩精彩视频在线观看| 91偷拍与自偷拍精品| 国产亚洲成年网址在线观看| 日本中文字幕不卡| 欧美视频一区二区三区四区| 国产精品灌醉下药二区| 国产九九视频一区二区三区| 欧美高清性hdvideosex| 亚洲精品免费在线播放| 国产**成人网毛片九色 | 日韩精品一区二区三区在线| 亚洲亚洲精品在线观看| 92精品国产成人观看免费|