1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright (c) 1988 AT&T 24 * All Rights Reserved 25 * 26 * Copyright (c) 1989, 2010, Oracle and/or its affiliates. All rights reserved. 27 * Copyright (c) 2012, Joyent, Inc. All rights reserved. 28 */ 29 30 /* 31 * Processing of relocatable objects and shared objects. 32 */ 33 34 #define ELF_TARGET_AMD64 35 #define ELF_TARGET_SPARC 36 37 #include <stdio.h> 38 #include <string.h> 39 #include <fcntl.h> 40 #include <unistd.h> 41 #include <link.h> 42 #include <limits.h> 43 #include <sys/stat.h> 44 #include <sys/systeminfo.h> 45 #include <debug.h> 46 #include <msg.h> 47 #include <_libld.h> 48 49 /* 50 * Decide if we can link against this input file. 51 */ 52 static int 53 ifl_verify(Ehdr *ehdr, Ofl_desc *ofl, Rej_desc *rej) 54 { 55 /* 56 * Check the validity of the elf header information for compatibility 57 * with this machine and our own internal elf library. 58 */ 59 if ((ehdr->e_machine != ld_targ.t_m.m_mach) && 60 ((ehdr->e_machine != ld_targ.t_m.m_machplus) && 61 ((ehdr->e_flags & ld_targ.t_m.m_flagsplus) == 0))) { 62 rej->rej_type = SGS_REJ_MACH; 63 rej->rej_info = (uint_t)ehdr->e_machine; 64 return (0); 65 } 66 if (ehdr->e_ident[EI_DATA] != ld_targ.t_m.m_data) { 67 rej->rej_type = SGS_REJ_DATA; 68 rej->rej_info = (uint_t)ehdr->e_ident[EI_DATA]; 69 return (0); 70 } 71 if (ehdr->e_version > ofl->ofl_dehdr->e_version) { 72 rej->rej_type = SGS_REJ_VERSION; 73 rej->rej_info = (uint_t)ehdr->e_version; 74 return (0); 75 } 76 return (1); 77 } 78 79 /* 80 * Check sanity of file header and allocate an infile descriptor 81 * for the file being processed. 82 */ 83 static Ifl_desc * 84 ifl_setup(const char *name, Ehdr *ehdr, Elf *elf, Word flags, Ofl_desc *ofl, 85 Rej_desc *rej) 86 { 87 Ifl_desc *ifl; 88 Rej_desc _rej = { 0 }; 89 90 if (ifl_verify(ehdr, ofl, &_rej) == 0) { 91 _rej.rej_name = name; 92 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 93 ld_targ.t_m.m_mach)); 94 if (rej->rej_type == 0) { 95 *rej = _rej; 96 rej->rej_name = strdup(_rej.rej_name); 97 } 98 return (0); 99 } 100 101 if ((ifl = libld_calloc(1, sizeof (Ifl_desc))) == NULL) 102 return ((Ifl_desc *)S_ERROR); 103 ifl->ifl_name = name; 104 ifl->ifl_ehdr = ehdr; 105 ifl->ifl_elf = elf; 106 ifl->ifl_flags = flags; 107 108 /* 109 * Is this file using 'extended Section Indexes'. If so, use the 110 * e_shnum & e_shstrndx which can be found at: 111 * 112 * e_shnum == Shdr[0].sh_size 113 * e_shstrndx == Shdr[0].sh_link 114 */ 115 if ((ehdr->e_shnum == 0) && (ehdr->e_shoff != 0)) { 116 Elf_Scn *scn; 117 Shdr *shdr0; 118 119 if ((scn = elf_getscn(elf, 0)) == NULL) { 120 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSCN), 121 name); 122 return ((Ifl_desc *)S_ERROR); 123 } 124 if ((shdr0 = elf_getshdr(scn)) == NULL) { 125 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSHDR), 126 name); 127 return ((Ifl_desc *)S_ERROR); 128 } 129 ifl->ifl_shnum = (Word)shdr0->sh_size; 130 if (ehdr->e_shstrndx == SHN_XINDEX) 131 ifl->ifl_shstrndx = shdr0->sh_link; 132 else 133 ifl->ifl_shstrndx = ehdr->e_shstrndx; 134 } else { 135 ifl->ifl_shnum = ehdr->e_shnum; 136 ifl->ifl_shstrndx = ehdr->e_shstrndx; 137 } 138 139 if ((ifl->ifl_isdesc = libld_calloc(ifl->ifl_shnum, 140 sizeof (Is_desc *))) == NULL) 141 return ((Ifl_desc *)S_ERROR); 142 143 /* 144 * Record this new input file on the shared object or relocatable 145 * object input file list. 146 */ 147 if (ifl->ifl_ehdr->e_type == ET_DYN) { 148 if (aplist_append(&ofl->ofl_sos, ifl, AL_CNT_OFL_LIBS) == NULL) 149 return ((Ifl_desc *)S_ERROR); 150 } else { 151 if (aplist_append(&ofl->ofl_objs, ifl, AL_CNT_OFL_OBJS) == NULL) 152 return ((Ifl_desc *)S_ERROR); 153 } 154 155 return (ifl); 156 } 157 158 /* 159 * Return TRUE if shdr is to be excluded via SHF_EXCLUDE. 160 * 161 * If SHF_EXCLUDE is set, a section should be excluded from dynamic output. 162 * Additionally, it will be excluded from kernel modules (-ztype=kmod). 163 */ 164 static inline Boolean 165 section_is_exclude(Ofl_desc *ofl, Shdr *shdr) 166 { 167 if (shdr->sh_flags & SHF_EXCLUDE) { 168 if ((ofl->ofl_flags & FLG_OF_RELOBJ) == 0) 169 return (TRUE); 170 if (ofl->ofl_flags & FLG_OF_KMOD) 171 return (TRUE); 172 } 173 return (FALSE); 174 } 175 176 /* 177 * Process a generic section. The appropriate section information is added 178 * to the files input descriptor list. 179 */ 180 static uintptr_t 181 process_section(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 182 Word ndx, int ident, Ofl_desc *ofl) 183 { 184 Is_desc *isp; 185 186 /* 187 * Create a new input section descriptor. If this is a NOBITS 188 * section elf_getdata() will still create a data buffer (the buffer 189 * will be null and the size will reflect the actual memory size). 190 */ 191 if ((isp = libld_calloc(sizeof (Is_desc), 1)) == NULL) 192 return (S_ERROR); 193 isp->is_shdr = shdr; 194 isp->is_file = ifl; 195 isp->is_name = name; 196 isp->is_scnndx = ndx; 197 isp->is_flags = FLG_IS_EXTERNAL; 198 isp->is_keyident = ident; 199 200 if ((isp->is_indata = elf_getdata(scn, NULL)) == NULL) { 201 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETDATA), 202 ifl->ifl_name); 203 return (0); 204 } 205 206 if (section_is_exclude(ofl, shdr)) 207 isp->is_flags |= FLG_IS_DISCARD; 208 209 /* 210 * Add the new input section to the files input section list and 211 * flag whether the section needs placing in an output section. This 212 * placement is deferred until all input section processing has been 213 * completed, as SHT_GROUP sections can provide information that will 214 * affect how other sections within the file should be placed. 215 */ 216 ifl->ifl_isdesc[ndx] = isp; 217 218 if (ident) { 219 if (shdr->sh_flags & ALL_SHF_ORDER) { 220 isp->is_flags |= FLG_IS_ORDERED; 221 ifl->ifl_flags |= FLG_IF_ORDERED; 222 } 223 isp->is_flags |= FLG_IS_PLACE; 224 } 225 return (1); 226 } 227 228 /* 229 * Determine the software capabilities of the object being built from the 230 * capabilities of the input relocatable objects. One software capability 231 * is presently recognized, and represented with the following (sys/elf.h): 232 * 233 * SF1_SUNW_FPKNWN use/non-use of frame pointer is known, and 234 * SF1_SUNW_FPUSED the frame pointer is in use. 235 * 236 * The resolution of the present fame pointer state, and the capabilities 237 * provided by a new input relocatable object are: 238 * 239 * new input relocatable object 240 * 241 * present | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | <unknown> 242 * state | SF1_SUNW_FPUSED | | 243 * --------------------------------------------------------------------------- 244 * SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN 245 * SF1_SUNW_FPUSED | SF1_SUNW_FPUSED | | SF1_SUNW_FPUSED 246 * --------------------------------------------------------------------------- 247 * SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN 248 * | | | 249 * --------------------------------------------------------------------------- 250 * <unknown> | SF1_SUNW_FPKNWN | SF1_SUNW_FPKNWN | <unknown> 251 * | SF1_SUNW_FPUSED | | 252 */ 253 static void 254 sf1_cap(Ofl_desc *ofl, Xword val, Ifl_desc *ifl, Is_desc *cisp) 255 { 256 #define FP_FLAGS (SF1_SUNW_FPKNWN | SF1_SUNW_FPUSED) 257 258 Xword badval; 259 260 /* 261 * If a mapfile has established definitions to override any object 262 * capabilities, ignore any new object capabilities. 263 */ 264 if (ofl->ofl_flags1 & FLG_OF1_OVSFCAP1) { 265 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_IGNORED, 266 CA_SUNW_SF_1, val, ld_targ.t_m.m_mach)); 267 return; 268 } 269 270 #if !defined(_ELF64) 271 if (ifl && (ifl->ifl_ehdr->e_type == ET_REL)) { 272 /* 273 * The SF1_SUNW_ADDR32 is only meaningful when building a 64-bit 274 * object. Warn the user, and remove the setting, if we're 275 * building a 32-bit object. 276 */ 277 if (val & SF1_SUNW_ADDR32) { 278 ld_eprintf(ofl, ERR_WARNING, 279 MSG_INTL(MSG_FIL_INADDR32SF1), ifl->ifl_name, 280 EC_WORD(cisp->is_scnndx), cisp->is_name); 281 val &= ~SF1_SUNW_ADDR32; 282 } 283 } 284 #endif 285 /* 286 * If this object doesn't specify any capabilities, ignore it, and 287 * leave the state as is. 288 */ 289 if (val == 0) 290 return; 291 292 /* 293 * Make sure we only accept known software capabilities. Note, that 294 * an F1_SUNW_FPUSED by itself is viewed as bad practice. 295 */ 296 if ((badval = (val & ~SF1_SUNW_MASK)) != 0) { 297 ld_eprintf(ofl, ERR_WARNING, MSG_INTL(MSG_FIL_BADSF1), 298 ifl->ifl_name, EC_WORD(cisp->is_scnndx), cisp->is_name, 299 EC_XWORD(badval)); 300 val &= SF1_SUNW_MASK; 301 } 302 if ((val & FP_FLAGS) == SF1_SUNW_FPUSED) { 303 ld_eprintf(ofl, ERR_WARNING, MSG_INTL(MSG_FIL_BADSF1), 304 ifl->ifl_name, EC_WORD(cisp->is_scnndx), cisp->is_name, 305 EC_XWORD(val)); 306 return; 307 } 308 309 /* 310 * If the input file is not a relocatable object, then we're only here 311 * to warn the user of any questionable capabilities. 312 */ 313 if (ifl->ifl_ehdr->e_type != ET_REL) { 314 #if defined(_ELF64) 315 /* 316 * If we're building a 64-bit executable, and we come across a 317 * dependency that requires a restricted address space, then 318 * that dependencies requirement can only be satisfied if the 319 * executable triggers the restricted address space. This is a 320 * warning rather than a fatal error, as the possibility exists 321 * that an appropriate dependency will be provided at runtime. 322 * The runtime linker will refuse to use this dependency. 323 */ 324 if ((val & SF1_SUNW_ADDR32) && (ofl->ofl_flags & FLG_OF_EXEC) && 325 ((ofl->ofl_ocapset.oc_sf_1.cm_val & 326 SF1_SUNW_ADDR32) == 0)) { 327 ld_eprintf(ofl, ERR_WARNING, 328 MSG_INTL(MSG_FIL_EXADDR32SF1), ifl->ifl_name, 329 EC_WORD(cisp->is_scnndx), cisp->is_name); 330 } 331 #endif 332 return; 333 } 334 335 if (DBG_ENABLED) { 336 Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_CURRENT, CA_SUNW_SF_1, 337 ofl->ofl_ocapset.oc_sf_1.cm_val, ld_targ.t_m.m_mach); 338 Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_NEW, CA_SUNW_SF_1, 339 val, ld_targ.t_m.m_mach); 340 } 341 342 /* 343 * Determine the resolution of the present frame pointer and the 344 * new input relocatable objects frame pointer. 345 */ 346 if ((ofl->ofl_ocapset.oc_sf_1.cm_val & FP_FLAGS) == FP_FLAGS) { 347 /* 348 * If the new relocatable object isn't using a frame pointer, 349 * reduce the present state to unused. 350 */ 351 if ((val & FP_FLAGS) != FP_FLAGS) 352 ofl->ofl_ocapset.oc_sf_1.cm_val &= ~SF1_SUNW_FPUSED; 353 354 /* 355 * Having processed the frame pointer bits, remove them from 356 * the value so they don't get OR'd in below. 357 */ 358 val &= ~FP_FLAGS; 359 360 } else if ((ofl->ofl_ocapset.oc_sf_1.cm_val & SF1_SUNW_FPKNWN) == 0) { 361 /* 362 * If the present frame pointer state is unknown, mask it out 363 * and allow the values from the new relocatable object 364 * to overwrite them. 365 */ 366 ofl->ofl_ocapset.oc_sf_1.cm_val &= ~FP_FLAGS; 367 } else { 368 /* Do not take the frame pointer flags from the object */ 369 val &= ~FP_FLAGS; 370 } 371 372 ofl->ofl_ocapset.oc_sf_1.cm_val |= val; 373 374 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_RESOLVED, 375 CA_SUNW_SF_1, ofl->ofl_ocapset.oc_sf_1.cm_val, ld_targ.t_m.m_mach)); 376 377 #undef FP_FLAGS 378 } 379 380 /* 381 * Determine the hardware capabilities of the object being built from the 382 * capabilities of the input relocatable objects. There's really little to 383 * do here, other than to offer diagnostics, hardware capabilities are simply 384 * additive. 385 */ 386 static void 387 hw_cap(Ofl_desc *ofl, Xword tag, Xword val) 388 { 389 elfcap_mask_t *hwcap; 390 ofl_flag_t flags1; 391 392 if (tag == CA_SUNW_HW_1) { 393 hwcap = &ofl->ofl_ocapset.oc_hw_1.cm_val; 394 flags1 = FLG_OF1_OVHWCAP1; 395 } else { 396 hwcap = &ofl->ofl_ocapset.oc_hw_2.cm_val; 397 flags1 = FLG_OF1_OVHWCAP2; 398 } 399 400 /* 401 * If a mapfile has established definitions to override any object 402 * capabilities, ignore any new object capabilities. 403 */ 404 if (ofl->ofl_flags1 & flags1) { 405 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_IGNORED, 406 tag, val, ld_targ.t_m.m_mach)); 407 return; 408 } 409 410 /* 411 * If this object doesn't specify any capabilities, ignore it, and 412 * leave the state as is. 413 */ 414 if (val == 0) 415 return; 416 417 if (DBG_ENABLED) { 418 Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_CURRENT, CA_SUNW_HW_1, 419 ofl->ofl_ocapset.oc_hw_1.cm_val, ld_targ.t_m.m_mach); 420 Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_NEW, CA_SUNW_HW_1, 421 val, ld_targ.t_m.m_mach); 422 } 423 424 *hwcap |= val; 425 426 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, DBG_STATE_RESOLVED, tag, 427 *hwcap, ld_targ.t_m.m_mach)); 428 } 429 430 /* 431 * Promote a machine capability or platform capability to the output file. 432 * Multiple instances of these names can be defined. 433 */ 434 static void 435 str_cap(Ofl_desc *ofl, char *pstr, ofl_flag_t flags, Xword tag, Caplist *list) 436 { 437 Capstr *capstr; 438 Aliste idx; 439 Boolean found = FALSE; 440 441 /* 442 * If a mapfile has established definitions to override this capability, 443 * ignore any new capability. 444 */ 445 if (ofl->ofl_flags1 & flags) { 446 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, DBG_STATE_IGNORED, 447 tag, pstr)); 448 return; 449 } 450 451 for (ALIST_TRAVERSE(list->cl_val, idx, capstr)) { 452 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 453 DBG_STATE_CURRENT, tag, capstr->cs_str)); 454 if (strcmp(capstr->cs_str, pstr) == 0) 455 found = TRUE; 456 } 457 458 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, DBG_STATE_NEW, tag, pstr)); 459 460 if (found == FALSE) { 461 if ((capstr = alist_append(&list->cl_val, NULL, 462 sizeof (Capstr), AL_CNT_CAP_NAMES)) == NULL) { 463 ofl->ofl_flags |= FLG_OF_FATAL; 464 return; 465 } 466 capstr->cs_str = pstr; 467 } 468 469 if (DBG_ENABLED) { 470 for (ALIST_TRAVERSE(list->cl_val, idx, capstr)) { 471 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 472 DBG_STATE_RESOLVED, tag, capstr->cs_str)); 473 } 474 } 475 } 476 477 /* 478 * Promote a capability identifier to the output file. A capability group can 479 * only have one identifier, and thus only the first identifier seen from any 480 * input relocatable objects is retained. An explicit user defined identifier, 481 * rather than an an identifier fabricated by ld(1) with -z symbcap processing, 482 * takes precedence. Note, a user may have defined an identifier via a mapfile, 483 * in which case the mapfile identifier is retained. 484 */ 485 static void 486 id_cap(Ofl_desc *ofl, char *pstr, oc_flag_t flags) 487 { 488 Objcapset *ocapset = &ofl->ofl_ocapset; 489 490 if (ocapset->oc_id.cs_str) { 491 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, DBG_STATE_CURRENT, 492 CA_SUNW_ID, ocapset->oc_id.cs_str)); 493 494 if ((ocapset->oc_flags & FLG_OCS_USRDEFID) || 495 ((flags & FLG_OCS_USRDEFID) == 0)) { 496 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 497 DBG_STATE_IGNORED, CA_SUNW_ID, pstr)); 498 return; 499 } 500 } 501 502 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, DBG_STATE_NEW, 503 CA_SUNW_ID, pstr)); 504 505 ocapset->oc_id.cs_str = pstr; 506 ocapset->oc_flags |= flags; 507 508 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, DBG_STATE_RESOLVED, 509 CA_SUNW_ID, pstr)); 510 } 511 512 /* 513 * Promote a capabilities group to the object capabilities. This catches a 514 * corner case. An object capabilities file can be converted to symbol 515 * capabilities with -z symbolcap. However, if the user has indicated that all 516 * the symbols should be demoted, we'd be left with a symbol capabilities file, 517 * with no associated symbols. Catch this case by promoting the symbol 518 * capabilities back to object capabilities. 519 */ 520 void 521 ld_cap_move_symtoobj(Ofl_desc *ofl) 522 { 523 Cap_group *cgp; 524 Aliste idx1; 525 526 for (APLIST_TRAVERSE(ofl->ofl_capgroups, idx1, cgp)) { 527 Objcapset *scapset = &cgp->cg_set; 528 Capstr *capstr; 529 Aliste idx2; 530 531 if (scapset->oc_id.cs_str) { 532 if (scapset->oc_flags & FLG_OCS_USRDEFID) 533 id_cap(ofl, scapset->oc_id.cs_str, 534 scapset->oc_flags); 535 } 536 if (scapset->oc_plat.cl_val) { 537 for (ALIST_TRAVERSE(scapset->oc_plat.cl_val, idx2, 538 capstr)) { 539 str_cap(ofl, capstr->cs_str, FLG_OF1_OVPLATCAP, 540 CA_SUNW_PLAT, &ofl->ofl_ocapset.oc_plat); 541 } 542 } 543 if (scapset->oc_mach.cl_val) { 544 for (ALIST_TRAVERSE(scapset->oc_mach.cl_val, idx2, 545 capstr)) { 546 str_cap(ofl, capstr->cs_str, FLG_OF1_OVMACHCAP, 547 CA_SUNW_MACH, &ofl->ofl_ocapset.oc_mach); 548 } 549 } 550 if (scapset->oc_hw_2.cm_val) 551 hw_cap(ofl, CA_SUNW_HW_2, scapset->oc_hw_2.cm_val); 552 553 if (scapset->oc_hw_1.cm_val) 554 hw_cap(ofl, CA_SUNW_HW_1, scapset->oc_hw_1.cm_val); 555 556 if (scapset->oc_sf_1.cm_val) 557 sf1_cap(ofl, scapset->oc_sf_1.cm_val, NULL, NULL); 558 } 559 } 560 561 /* 562 * Determine whether a capabilities group already exists that describes this 563 * new capabilities group. 564 * 565 * Note, a capability group identifier, CA_SUNW_ID, isn't used as part of the 566 * comparison. This attribute simply assigns a diagnostic name to the group, 567 * and in the case of multiple identifiers, the first will be taken. 568 */ 569 static Cap_group * 570 get_cap_group(Objcapset *ocapset, Word cnum, Ofl_desc *ofl, Is_desc *isp) 571 { 572 Aliste idx; 573 Cap_group *cgp; 574 Word ccnum = cnum; 575 576 /* 577 * If the new capabilities contains a CA_SUNW_ID, drop the count of the 578 * number of comparable items. 579 */ 580 if (ocapset->oc_id.cs_str) 581 ccnum--; 582 583 /* 584 * Traverse the existing symbols capabilities groups. 585 */ 586 for (APLIST_TRAVERSE(ofl->ofl_capgroups, idx, cgp)) { 587 Word onum = cgp->cg_num; 588 Alist *calp, *oalp; 589 590 if (cgp->cg_set.oc_id.cs_str) 591 onum--; 592 593 if (onum != ccnum) 594 continue; 595 596 if (cgp->cg_set.oc_hw_1.cm_val != ocapset->oc_hw_1.cm_val) 597 continue; 598 if (cgp->cg_set.oc_sf_1.cm_val != ocapset->oc_sf_1.cm_val) 599 continue; 600 if (cgp->cg_set.oc_hw_2.cm_val != ocapset->oc_hw_2.cm_val) 601 continue; 602 603 calp = cgp->cg_set.oc_plat.cl_val; 604 oalp = ocapset->oc_plat.cl_val; 605 if ((calp == NULL) && oalp) 606 continue; 607 if (calp && ((oalp == NULL) || cap_names_match(calp, oalp))) 608 continue; 609 610 calp = cgp->cg_set.oc_mach.cl_val; 611 oalp = ocapset->oc_mach.cl_val; 612 if ((calp == NULL) && oalp) 613 continue; 614 if (calp && ((oalp == NULL) || cap_names_match(calp, oalp))) 615 continue; 616 617 /* 618 * If a matching group is found, then this new group has 619 * already been supplied by a previous file, and hence the 620 * existing group can be used. Record this new input section, 621 * from which we can also derive the input file name, on the 622 * existing groups input sections. 623 */ 624 if (aplist_append(&(cgp->cg_secs), isp, 625 AL_CNT_CAP_SECS) == NULL) 626 return (NULL); 627 return (cgp); 628 } 629 630 /* 631 * If a capabilities group is not found, create a new one. 632 */ 633 if (((cgp = libld_calloc(sizeof (Cap_group), 1)) == NULL) || 634 (aplist_append(&(ofl->ofl_capgroups), cgp, 635 AL_CNT_CAP_DESCS) == NULL)) 636 return (NULL); 637 638 /* 639 * If we're converting object capabilities to symbol capabilities and 640 * no CA_SUNW_ID is defined, fabricate one. This identifier is appended 641 * to all symbol names that are converted into capabilities symbols, 642 * see ld_sym_process(). 643 */ 644 if ((isp->is_file->ifl_flags & FLG_IF_OTOSCAP) && 645 (ocapset->oc_id.cs_str == NULL)) { 646 size_t len; 647 648 /* 649 * Create an identifier using the group number together with a 650 * default template. We allocate a buffer large enough for any 651 * possible number of items (way more than we need). 652 */ 653 len = MSG_STR_CAPGROUPID_SIZE + CONV_INV_BUFSIZE; 654 if ((ocapset->oc_id.cs_str = libld_malloc(len)) == NULL) 655 return (NULL); 656 657 (void) snprintf(ocapset->oc_id.cs_str, len, 658 MSG_ORIG(MSG_STR_CAPGROUPID), 659 aplist_nitems(ofl->ofl_capgroups)); 660 cnum++; 661 } 662 663 cgp->cg_set = *ocapset; 664 cgp->cg_num = cnum; 665 666 /* 667 * Null the callers alist's as they've effectively been transferred 668 * to this new Cap_group. 669 */ 670 ocapset->oc_plat.cl_val = ocapset->oc_mach.cl_val = NULL; 671 672 /* 673 * Keep track of which input section, and hence input file, established 674 * this group. 675 */ 676 if (aplist_append(&(cgp->cg_secs), isp, AL_CNT_CAP_SECS) == NULL) 677 return (NULL); 678 679 /* 680 * Keep track of the number of symbol capabilities entries that will be 681 * required in the output file. Each group requires a terminating 682 * CA_SUNW_NULL. 683 */ 684 ofl->ofl_capsymcnt += (cnum + 1); 685 return (cgp); 686 } 687 688 /* 689 * Capture symbol capability family information. This data structure is focal 690 * in maintaining all symbol capability relationships, and provides for the 691 * eventual creation of a capabilities information section, and possibly a 692 * capabilities chain section. 693 * 694 * Capabilities families are lead by a CAPINFO_SUNW_GLOB symbol. This symbol 695 * provides the visible global symbol that is referenced by all external 696 * callers. This symbol may have aliases. For example, a weak/global symbol 697 * pair, such as memcpy()/_memcpy() may lead the same capabilities family. 698 * Each family contains one or more local symbol members. These members provide 699 * the capabilities specific functions, and are associated to a capabilities 700 * group. For example, the capability members memcpy%sun4u and memcpy%sun4v 701 * might be associated with the memcpy() capability family. 702 * 703 * This routine is called when a relocatable object that provides object 704 * capabilities is transformed into a symbol capabilities object, using the 705 * -z symbolcap option. 706 * 707 * This routine is also called to collect the SUNW_capinfo section information 708 * of a relocatable object that contains symbol capability definitions. 709 */ 710 uintptr_t 711 ld_cap_add_family(Ofl_desc *ofl, Sym_desc *lsdp, Sym_desc *csdp, Cap_group *cgp, 712 APlist **csyms) 713 { 714 Cap_avlnode qcav, *cav; 715 avl_tree_t *avlt; 716 avl_index_t where = 0; 717 Cap_sym *mcsp; 718 Aliste idx; 719 720 /* 721 * Make sure the capability families have an initialized AVL tree. 722 */ 723 if ((avlt = ofl->ofl_capfamilies) == NULL) { 724 if ((avlt = libld_calloc(sizeof (avl_tree_t), 1)) == NULL) 725 return (S_ERROR); 726 avl_create(avlt, &ld_sym_avl_comp, sizeof (Cap_avlnode), 727 SGSOFFSETOF(Cap_avlnode, cn_symavlnode.sav_node)); 728 ofl->ofl_capfamilies = avlt; 729 730 /* 731 * When creating a dynamic object, capability family members 732 * are maintained in a .SUNW_capchain, the first entry of 733 * which is the version number of the chain. 734 */ 735 ofl->ofl_capchaincnt = 1; 736 } 737 738 /* 739 * Determine whether a family already exists, and if not, create one 740 * using the lead family symbol. 741 */ 742 qcav.cn_symavlnode.sav_hash = (Word)elf_hash(lsdp->sd_name); 743 qcav.cn_symavlnode.sav_name = lsdp->sd_name; 744 745 if ((cav = avl_find(avlt, &qcav, &where)) == NULL) { 746 if ((cav = libld_calloc(sizeof (Cap_avlnode), 1)) == NULL) 747 return (S_ERROR); 748 cav->cn_symavlnode.sav_hash = qcav.cn_symavlnode.sav_hash; 749 cav->cn_symavlnode.sav_name = qcav.cn_symavlnode.sav_name; 750 cav->cn_symavlnode.sav_sdp = lsdp; 751 752 avl_insert(avlt, cav, where); 753 754 /* 755 * When creating a dynamic object, capability family members 756 * are maintained in a .SUNW_capchain, each family starts with 757 * this lead symbol, and is terminated with a 0 element. 758 */ 759 ofl->ofl_capchaincnt += 2; 760 } 761 762 /* 763 * If no group information is provided then this request is to add a 764 * lead capability symbol, or lead symbol alias. If this is the lead 765 * symbol there's nothing more to do. Otherwise save the alias. 766 */ 767 if (cgp == NULL) { 768 if ((lsdp != csdp) && (aplist_append(&cav->cn_aliases, csdp, 769 AL_CNT_CAP_ALIASES) == NULL)) 770 return (S_ERROR); 771 772 return (0); 773 } 774 775 /* 776 * Determine whether a member of the same group as this new member is 777 * already defined within this family. If so, we have a multiply 778 * defined symbol. 779 */ 780 for (APLIST_TRAVERSE(cav->cn_members, idx, mcsp)) { 781 Sym_desc *msdp; 782 783 if (cgp != mcsp->cs_group) 784 continue; 785 786 /* 787 * Diagnose that a multiple symbol definition exists. 788 */ 789 msdp = mcsp->cs_sdp; 790 791 ld_eprintf(ofl, ERR_FATAL, MSG_INTL(MSG_CAP_MULDEF), 792 demangle(lsdp->sd_name)); 793 ld_eprintf(ofl, ERR_NONE, MSG_INTL(MSG_CAP_MULDEFSYMS), 794 msdp->sd_file->ifl_name, msdp->sd_name, 795 csdp->sd_file->ifl_name, csdp->sd_name); 796 } 797 798 /* 799 * Add this capabilities symbol member to the family. 800 */ 801 if (((mcsp = libld_malloc(sizeof (Cap_sym))) == NULL) || 802 (aplist_append(&cav->cn_members, mcsp, AL_CNT_CAP_MEMS) == NULL)) 803 return (S_ERROR); 804 805 mcsp->cs_sdp = csdp; 806 mcsp->cs_group = cgp; 807 808 /* 809 * When creating a dynamic object, capability family members are 810 * maintained in a .SUNW_capchain. Account for this family member. 811 */ 812 ofl->ofl_capchaincnt++; 813 814 /* 815 * If this input file is undergoing object capabilities to symbol 816 * capabilities conversion, then this member is a new local symbol 817 * that has been generated from an original global symbol. Keep track 818 * of this symbol so that the output file symbol table can be populated 819 * with these new symbol entries. 820 */ 821 if (csyms && (aplist_append(csyms, mcsp, AL_CNT_CAP_SYMS) == NULL)) 822 return (S_ERROR); 823 824 return (0); 825 } 826 827 /* 828 * Process a SHT_SUNW_cap capabilities section. 829 */ 830 static uintptr_t 831 process_cap(Ofl_desc *ofl, Ifl_desc *ifl, Is_desc *cisp) 832 { 833 Objcapset ocapset = { 0 }; 834 Cap_desc *cdp; 835 Cap *data, *cdata; 836 char *strs; 837 Word ndx, cnum; 838 int objcapndx, descapndx, symcapndx; 839 int nulls, capstrs = 0; 840 841 /* 842 * Determine the capabilities data and size. 843 */ 844 cdata = (Cap *)cisp->is_indata->d_buf; 845 cnum = (Word)(cisp->is_shdr->sh_size / cisp->is_shdr->sh_entsize); 846 847 if ((cdata == NULL) || (cnum == 0)) 848 return (0); 849 850 DBG_CALL(Dbg_cap_sec_title(ofl->ofl_lml, ifl->ifl_name)); 851 852 /* 853 * Traverse the section to determine what capabilities groups are 854 * available. 855 * 856 * A capabilities section can contain one or more, CA_SUNW_NULL 857 * terminated groups. 858 * 859 * - The first group defines the object capabilities. 860 * - Additional groups define symbol capabilities. 861 * - Since the initial group is always reserved for object 862 * capabilities, any object with symbol capabilities must also 863 * have an object capabilities group. If the object has no object 864 * capabilities, an empty object group is defined, consisting of a 865 * CA_SUNW_NULL element in index [0]. 866 * - If any capabilities require references to a named string, then 867 * the section header sh_info points to the associated string 868 * table. 869 * - If an object contains symbol capability groups, then the 870 * section header sh_link points to the associated capinfo table. 871 */ 872 objcapndx = 0; 873 descapndx = symcapndx = -1; 874 nulls = 0; 875 876 for (ndx = 0, data = cdata; ndx < cnum; ndx++, data++) { 877 switch (data->c_tag) { 878 case CA_SUNW_NULL: 879 /* 880 * If this is the first CA_SUNW_NULL entry, and no 881 * capabilities group has been found, then this object 882 * does not define any object capabilities. 883 */ 884 if (nulls++ == 0) { 885 if (ndx == 0) 886 objcapndx = -1; 887 } else if ((symcapndx == -1) && (descapndx != -1)) 888 symcapndx = descapndx; 889 890 break; 891 892 case CA_SUNW_PLAT: 893 case CA_SUNW_MACH: 894 case CA_SUNW_ID: 895 capstrs++; 896 /* FALLTHROUGH */ 897 898 case CA_SUNW_HW_1: 899 case CA_SUNW_SF_1: 900 case CA_SUNW_HW_2: 901 /* 902 * If this is the start of a new group, save it. 903 */ 904 if (descapndx == -1) 905 descapndx = ndx; 906 break; 907 908 default: 909 ld_eprintf(ofl, ERR_WARNING, MSG_INTL(MSG_FIL_UNKCAP), 910 ifl->ifl_name, EC_WORD(cisp->is_scnndx), 911 cisp->is_name, data->c_tag); 912 } 913 } 914 915 /* 916 * If a string capabilities entry has been found, the capabilities 917 * section must reference the associated string table. 918 */ 919 if (capstrs) { 920 Word info = cisp->is_shdr->sh_info; 921 922 if ((info == 0) || (info > ifl->ifl_shnum)) { 923 ld_eprintf(ofl, ERR_FATAL, MSG_INTL(MSG_FIL_INVSHINFO), 924 ifl->ifl_name, EC_WORD(cisp->is_scnndx), 925 cisp->is_name, EC_XWORD(info)); 926 return (S_ERROR); 927 } 928 strs = (char *)ifl->ifl_isdesc[info]->is_indata->d_buf; 929 } 930 931 /* 932 * The processing of capabilities groups is as follows: 933 * 934 * - if a relocatable object provides only object capabilities, and 935 * the -z symbolcap option is in effect, then the object 936 * capabilities are transformed into symbol capabilities and the 937 * symbol capabilities are carried over to the output file. 938 * - in all other cases, any capabilities present in an input 939 * relocatable object are carried from the input object to the 940 * output without any transformation or conversion. 941 * 942 * Capture any object capabilities that are to be carried over to the 943 * output file. 944 */ 945 if ((objcapndx == 0) && 946 ((symcapndx != -1) || ((ofl->ofl_flags & FLG_OF_OTOSCAP) == 0))) { 947 for (ndx = 0, data = cdata; ndx < cnum; ndx++, data++) { 948 /* 949 * Object capabilities end at the first null. 950 */ 951 if (data->c_tag == CA_SUNW_NULL) 952 break; 953 954 /* 955 * Only the object software capabilities that are 956 * defined in a relocatable object become part of the 957 * object software capabilities in the output file. 958 * However, check the validity of any object software 959 * capabilities of any dependencies. 960 */ 961 if (data->c_tag == CA_SUNW_SF_1) { 962 sf1_cap(ofl, data->c_un.c_val, ifl, cisp); 963 continue; 964 } 965 966 /* 967 * The remaining capability types must come from a 968 * relocatable object in order to contribute to the 969 * output. 970 */ 971 if (ifl->ifl_ehdr->e_type != ET_REL) 972 continue; 973 974 switch (data->c_tag) { 975 case CA_SUNW_HW_1: 976 case CA_SUNW_HW_2: 977 hw_cap(ofl, data->c_tag, data->c_un.c_val); 978 break; 979 980 case CA_SUNW_PLAT: 981 str_cap(ofl, strs + data->c_un.c_ptr, 982 FLG_OF1_OVPLATCAP, CA_SUNW_PLAT, 983 &ofl->ofl_ocapset.oc_plat); 984 break; 985 986 case CA_SUNW_MACH: 987 str_cap(ofl, strs + data->c_un.c_ptr, 988 FLG_OF1_OVMACHCAP, CA_SUNW_MACH, 989 &ofl->ofl_ocapset.oc_mach); 990 break; 991 992 case CA_SUNW_ID: 993 id_cap(ofl, strs + data->c_un.c_ptr, 994 FLG_OCS_USRDEFID); 995 break; 996 997 default: 998 assert(0); /* Unknown capability type */ 999 } 1000 } 1001 1002 /* 1003 * If there are no symbol capabilities, or this objects 1004 * capabilities aren't being transformed into a symbol 1005 * capabilities, then we're done. 1006 */ 1007 if ((symcapndx == -1) && 1008 ((ofl->ofl_flags & FLG_OF_OTOSCAP) == 0)) 1009 return (1); 1010 } 1011 1012 /* 1013 * If these capabilities don't originate from a relocatable object 1014 * there's no further processing required. 1015 */ 1016 if (ifl->ifl_ehdr->e_type != ET_REL) 1017 return (1); 1018 1019 /* 1020 * If this object only defines an object capabilities group, and the 1021 * -z symbolcap option is in effect, then all global function symbols 1022 * and initialized global data symbols are renamed and assigned to the 1023 * transformed symbol capabilities group. 1024 */ 1025 if ((objcapndx == 0) && 1026 (symcapndx == -1) && (ofl->ofl_flags & FLG_OF_OTOSCAP)) 1027 ifl->ifl_flags |= FLG_IF_OTOSCAP; 1028 1029 /* 1030 * Allocate a capabilities descriptor to collect the capabilities data 1031 * for this input file. Allocate a mirror of the raw capabilities data 1032 * that points to the individual symbol capabilities groups. An APlist 1033 * is used, although it will be sparsely populated, as the list provides 1034 * a convenient mechanism for traversal later. 1035 */ 1036 if (((cdp = libld_calloc(sizeof (Cap_desc), 1)) == NULL) || 1037 (aplist_append(&(cdp->ca_groups), NULL, cnum) == NULL)) 1038 return (S_ERROR); 1039 1040 /* 1041 * Clear the allocated APlist data array, and assign the number of 1042 * items as the total number of array items. 1043 */ 1044 (void) memset(&cdp->ca_groups->apl_data[0], 0, 1045 (cnum * sizeof (void *))); 1046 cdp->ca_groups->apl_nitems = cnum; 1047 1048 ifl->ifl_caps = cdp; 1049 1050 /* 1051 * Traverse the capabilities data, unpacking the data into a 1052 * capabilities set. Process each capabilities set as a unique group. 1053 */ 1054 descapndx = -1; 1055 nulls = 0; 1056 1057 for (ndx = 0, data = cdata; ndx < cnum; ndx++, data++) { 1058 Capstr *capstr; 1059 1060 switch (data->c_tag) { 1061 case CA_SUNW_NULL: 1062 nulls++; 1063 1064 /* 1065 * Process the capabilities group that this null entry 1066 * terminates. The capabilities group that is returned 1067 * will either point to this file's data, or to a 1068 * matching capabilities group that has already been 1069 * processed. 1070 * 1071 * Note, if this object defines object capabilities, 1072 * the first group descriptor points to these object 1073 * capabilities. It is only necessary to save this 1074 * descriptor when object capabilities are being 1075 * transformed into symbol capabilities (-z symbolcap). 1076 */ 1077 if (descapndx != -1) { 1078 if ((nulls > 1) || 1079 (ifl->ifl_flags & FLG_IF_OTOSCAP)) { 1080 APlist *alp = cdp->ca_groups; 1081 1082 if ((alp->apl_data[descapndx] = 1083 get_cap_group(&ocapset, 1084 (ndx - descapndx), ofl, 1085 cisp)) == NULL) 1086 return (S_ERROR); 1087 } 1088 1089 /* 1090 * Clean up the capabilities data in preparation 1091 * for processing additional groups. If the 1092 * collected capabilities strings were used to 1093 * establish a new output group, they will have 1094 * been saved in get_cap_group(). If these 1095 * descriptors still exist, then an existing 1096 * descriptor has been used to associate with 1097 * this file, and these string descriptors can 1098 * be freed. 1099 */ 1100 ocapset.oc_hw_1.cm_val = 1101 ocapset.oc_sf_1.cm_val = 1102 ocapset.oc_hw_2.cm_val = 0; 1103 if (ocapset.oc_plat.cl_val) { 1104 free((void *)ocapset.oc_plat.cl_val); 1105 ocapset.oc_plat.cl_val = NULL; 1106 } 1107 if (ocapset.oc_mach.cl_val) { 1108 free((void *)ocapset.oc_mach.cl_val); 1109 ocapset.oc_mach.cl_val = NULL; 1110 } 1111 descapndx = -1; 1112 } 1113 continue; 1114 1115 case CA_SUNW_HW_1: 1116 ocapset.oc_hw_1.cm_val = data->c_un.c_val; 1117 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, 1118 DBG_STATE_ORIGINAL, CA_SUNW_HW_1, 1119 ocapset.oc_hw_1.cm_val, ld_targ.t_m.m_mach)); 1120 break; 1121 1122 case CA_SUNW_SF_1: 1123 ocapset.oc_sf_1.cm_val = data->c_un.c_val; 1124 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, 1125 DBG_STATE_ORIGINAL, CA_SUNW_SF_1, 1126 ocapset.oc_sf_1.cm_val, ld_targ.t_m.m_mach)); 1127 break; 1128 1129 case CA_SUNW_HW_2: 1130 ocapset.oc_hw_2.cm_val = data->c_un.c_val; 1131 DBG_CALL(Dbg_cap_val_entry(ofl->ofl_lml, 1132 DBG_STATE_ORIGINAL, CA_SUNW_HW_2, 1133 ocapset.oc_hw_2.cm_val, ld_targ.t_m.m_mach)); 1134 break; 1135 1136 case CA_SUNW_PLAT: 1137 if ((capstr = alist_append(&ocapset.oc_plat.cl_val, 1138 NULL, sizeof (Capstr), AL_CNT_CAP_NAMES)) == NULL) 1139 return (S_ERROR); 1140 capstr->cs_str = strs + data->c_un.c_ptr; 1141 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 1142 DBG_STATE_ORIGINAL, CA_SUNW_PLAT, capstr->cs_str)); 1143 break; 1144 1145 case CA_SUNW_MACH: 1146 if ((capstr = alist_append(&ocapset.oc_mach.cl_val, 1147 NULL, sizeof (Capstr), AL_CNT_CAP_NAMES)) == NULL) 1148 return (S_ERROR); 1149 capstr->cs_str = strs + data->c_un.c_ptr; 1150 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 1151 DBG_STATE_ORIGINAL, CA_SUNW_MACH, capstr->cs_str)); 1152 break; 1153 1154 case CA_SUNW_ID: 1155 ocapset.oc_id.cs_str = strs + data->c_un.c_ptr; 1156 DBG_CALL(Dbg_cap_ptr_entry(ofl->ofl_lml, 1157 DBG_STATE_ORIGINAL, CA_SUNW_ID, 1158 ocapset.oc_id.cs_str)); 1159 break; 1160 } 1161 1162 /* 1163 * Save the start of this new group. 1164 */ 1165 if (descapndx == -1) 1166 descapndx = ndx; 1167 } 1168 return (1); 1169 } 1170 1171 /* 1172 * Capture any symbol capabilities symbols. An object file that contains symbol 1173 * capabilities has an associated .SUNW_capinfo section. This section 1174 * identifies which symbols are associated to which capabilities, together with 1175 * their associated lead symbol. Each of these symbol pairs are recorded for 1176 * processing later. 1177 */ 1178 static uintptr_t 1179 process_capinfo(Ofl_desc *ofl, Ifl_desc *ifl, Is_desc *isp) 1180 { 1181 Cap_desc *cdp = ifl->ifl_caps; 1182 Capinfo *capinfo = isp->is_indata->d_buf; 1183 Shdr *shdr = isp->is_shdr; 1184 Word cndx, capinfonum; 1185 1186 capinfonum = (Word)(shdr->sh_size / shdr->sh_entsize); 1187 1188 if ((cdp == NULL) || (capinfo == NULL) || (capinfonum == 0)) 1189 return (0); 1190 1191 for (cndx = 1, capinfo++; cndx < capinfonum; cndx++, capinfo++) { 1192 Sym_desc *sdp, *lsdp; 1193 Word lndx; 1194 uchar_t gndx; 1195 1196 if ((gndx = (uchar_t)ELF_C_GROUP(*capinfo)) == 0) 1197 continue; 1198 lndx = (Word)ELF_C_SYM(*capinfo); 1199 1200 /* 1201 * Catch any anomalies. A capabilities symbol should be valid, 1202 * and the capabilities lead symbol should also be global. 1203 * Note, ld(1) -z symbolcap would create local capabilities 1204 * symbols, but we don't enforce this so as to give the 1205 * compilation environment a little more freedom. 1206 */ 1207 if ((sdp = ifl->ifl_oldndx[cndx]) == NULL) { 1208 ld_eprintf(ofl, ERR_WARNING, 1209 MSG_INTL(MSG_CAPINFO_INVALSYM), ifl->ifl_name, 1210 EC_WORD(isp->is_scnndx), isp->is_name, cndx, 1211 MSG_INTL(MSG_STR_UNKNOWN)); 1212 continue; 1213 } 1214 if ((lndx == 0) || (lndx >= ifl->ifl_symscnt) || 1215 ((lsdp = ifl->ifl_oldndx[lndx]) == NULL) || 1216 (ELF_ST_BIND(lsdp->sd_sym->st_info) != STB_GLOBAL)) { 1217 ld_eprintf(ofl, ERR_WARNING, 1218 MSG_INTL(MSG_CAPINFO_INVALLEAD), ifl->ifl_name, 1219 EC_WORD(isp->is_scnndx), isp->is_name, cndx, lsdp ? 1220 demangle(lsdp->sd_name) : MSG_INTL(MSG_STR_UNKNOWN), 1221 lndx); 1222 continue; 1223 } 1224 1225 /* 1226 * Indicate that this is a capabilities symbol. 1227 */ 1228 sdp->sd_flags |= FLG_SY_CAP; 1229 1230 /* 1231 * Save any global capability symbols. Global capability 1232 * symbols are identified with a CAPINFO_SUNW_GLOB group id. 1233 * The lead symbol for this global capability symbol is either 1234 * the symbol itself, or an alias. 1235 */ 1236 if (gndx == CAPINFO_SUNW_GLOB) { 1237 if (ld_cap_add_family(ofl, lsdp, sdp, 1238 NULL, NULL) == S_ERROR) 1239 return (S_ERROR); 1240 continue; 1241 } 1242 1243 /* 1244 * Track the number of non-global capabilities symbols, as these 1245 * are used to size any symbol tables. If we're generating a 1246 * dynamic object, this symbol will be added to the dynamic 1247 * symbol table, therefore ensure there is space in the dynamic 1248 * string table. 1249 */ 1250 ofl->ofl_caploclcnt++; 1251 if (((ofl->ofl_flags & FLG_OF_RELOBJ) == 0) && 1252 (st_insert(ofl->ofl_dynstrtab, sdp->sd_name) == -1)) 1253 return (S_ERROR); 1254 1255 /* 1256 * As we're tracking this local symbol as a capabilities symbol, 1257 * reduce the local symbol count to compensate. 1258 */ 1259 ofl->ofl_locscnt--; 1260 1261 /* 1262 * Determine whether the associated lead symbol indicates 1263 * NODYNSORT. If so, remove this local entry from the 1264 * SUNW_dynsort section too. NODYNSORT tagging can only be 1265 * obtained from a mapfile symbol definition, and thus any 1266 * global definition that has this tagging has already been 1267 * instantiated and this instance resolved to it. 1268 */ 1269 if (lsdp->sd_flags & FLG_SY_NODYNSORT) { 1270 Sym *lsym = lsdp->sd_sym; 1271 uchar_t ltype = ELF_ST_TYPE(lsym->st_info); 1272 1273 DYNSORT_COUNT(lsdp, lsym, ltype, --); 1274 lsdp->sd_flags |= FLG_SY_NODYNSORT; 1275 } 1276 1277 /* 1278 * Track this family member, together with its associated group. 1279 */ 1280 if (ld_cap_add_family(ofl, lsdp, sdp, 1281 cdp->ca_groups->apl_data[gndx], NULL) == S_ERROR) 1282 return (S_ERROR); 1283 } 1284 1285 return (0); 1286 } 1287 1288 /* 1289 * Simply process the section so that we have pointers to the data for use 1290 * in later routines, however don't add the section to the output section 1291 * list as we will be creating our own replacement sections later (ie. 1292 * symtab and relocation). 1293 */ 1294 static uintptr_t 1295 /* ARGSUSED5 */ 1296 process_input(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1297 Word ndx, int ident, Ofl_desc *ofl) 1298 { 1299 return (process_section(name, ifl, shdr, scn, ndx, 1300 ld_targ.t_id.id_null, ofl)); 1301 } 1302 1303 /* 1304 * Keep a running count of relocation entries from input relocatable objects for 1305 * sizing relocation buckets later. If we're building an executable, save any 1306 * relocations from shared objects to determine if any copy relocation symbol 1307 * has a displacement relocation against it. 1308 */ 1309 static uintptr_t 1310 /* ARGSUSED5 */ 1311 process_reloc(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1312 Word ndx, int ident, Ofl_desc *ofl) 1313 { 1314 if (process_section(name, ifl, 1315 shdr, scn, ndx, ld_targ.t_id.id_null, ofl) == S_ERROR) 1316 return (S_ERROR); 1317 1318 if (ifl->ifl_ehdr->e_type == ET_REL) { 1319 if (shdr->sh_entsize && (shdr->sh_entsize <= shdr->sh_size)) 1320 /* LINTED */ 1321 ofl->ofl_relocincnt += 1322 (Word)(shdr->sh_size / shdr->sh_entsize); 1323 } else if (ofl->ofl_flags & FLG_OF_EXEC) { 1324 if (aplist_append(&ifl->ifl_relsect, ifl->ifl_isdesc[ndx], 1325 AL_CNT_IFL_RELSECS) == NULL) 1326 return (S_ERROR); 1327 } 1328 return (1); 1329 } 1330 1331 /* 1332 * Process a string table section. A valid section contains an initial and 1333 * final null byte. 1334 */ 1335 static uintptr_t 1336 process_strtab(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1337 Word ndx, int ident, Ofl_desc *ofl) 1338 { 1339 char *data; 1340 size_t size; 1341 Is_desc *isp; 1342 uintptr_t error; 1343 1344 /* 1345 * Never include .stab.excl sections in any output file. 1346 * If the -s flag has been specified strip any .stab sections. 1347 */ 1348 if (((ofl->ofl_flags & FLG_OF_STRIP) && ident && 1349 (strncmp(name, MSG_ORIG(MSG_SCN_STAB), MSG_SCN_STAB_SIZE) == 0)) || 1350 (strcmp(name, MSG_ORIG(MSG_SCN_STABEXCL)) == 0) && ident) 1351 return (1); 1352 1353 /* 1354 * If we got here to process a .shstrtab or .dynstr table, `ident' will 1355 * be null. Otherwise make sure we don't have a .strtab section as this 1356 * should not be added to the output section list either. 1357 */ 1358 if ((ident != ld_targ.t_id.id_null) && 1359 (strcmp(name, MSG_ORIG(MSG_SCN_STRTAB)) == 0)) 1360 ident = ld_targ.t_id.id_null; 1361 1362 error = process_section(name, ifl, shdr, scn, ndx, ident, ofl); 1363 if ((error == 0) || (error == S_ERROR)) 1364 return (error); 1365 1366 /* 1367 * String tables should start and end with a NULL byte. Note, it has 1368 * been known for the assembler to create empty string tables, so check 1369 * the size before attempting to verify the data itself. 1370 */ 1371 isp = ifl->ifl_isdesc[ndx]; 1372 size = isp->is_indata->d_size; 1373 if (size) { 1374 data = isp->is_indata->d_buf; 1375 if (data[0] != '\0' || data[size - 1] != '\0') 1376 ld_eprintf(ofl, ERR_WARNING, 1377 MSG_INTL(MSG_FIL_MALSTR), ifl->ifl_name, 1378 EC_WORD(isp->is_scnndx), name); 1379 } else 1380 isp->is_indata->d_buf = (void *)MSG_ORIG(MSG_STR_EMPTY); 1381 1382 ifl->ifl_flags |= FLG_IF_HSTRTAB; 1383 return (1); 1384 } 1385 1386 /* 1387 * Invalid sections produce a warning and are skipped. 1388 */ 1389 static uintptr_t 1390 /* ARGSUSED3 */ 1391 invalid_section(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1392 Word ndx, int ident, Ofl_desc *ofl) 1393 { 1394 Conv_inv_buf_t inv_buf; 1395 1396 ld_eprintf(ofl, ERR_WARNING, MSG_INTL(MSG_FIL_INVALSEC), 1397 ifl->ifl_name, EC_WORD(ndx), name, 1398 conv_sec_type(ifl->ifl_ehdr->e_ident[EI_OSABI], 1399 ifl->ifl_ehdr->e_machine, shdr->sh_type, CONV_FMT_ALT_CF, 1400 &inv_buf)); 1401 return (1); 1402 } 1403 1404 /* 1405 * Compare an input section name to a given string, taking the ELF '%' 1406 * section naming convention into account. If an input section name 1407 * contains a '%' character, the '%' and all following characters are 1408 * ignored in the comparison. 1409 * 1410 * entry: 1411 * is_name - Name of input section 1412 * match_name - Name to compare to 1413 * match_len - strlen(match_name) 1414 * 1415 * exit: 1416 * Returns True (1) if the names match, and False (0) otherwise. 1417 */ 1418 static int 1419 is_name_cmp(const char *is_name, const char *match_name, size_t match_len) 1420 { 1421 /* 1422 * If the start of is_name is not a match for name, 1423 * the match fails. 1424 */ 1425 if (strncmp(is_name, match_name, match_len) != 0) 1426 return (0); 1427 1428 /* 1429 * The prefix matched. The next character must be either '%', or 1430 * NULL, in order for a match to be true. 1431 */ 1432 is_name += match_len; 1433 return ((*is_name == '\0') || (*is_name == '%')); 1434 } 1435 1436 /* 1437 * Helper routine for process_progbits() to process allocable sections. 1438 * 1439 * entry: 1440 * name, ifl, shdr, ndx, ident, ofl - As passed to process_progbits(). 1441 * is_stab_index - TRUE if section is .index. 1442 * is_flags - Additional flags to be added to the input section. 1443 * 1444 * exit: 1445 * The allocable section has been processed. *ident and *is_flags 1446 * are updated as necessary to reflect the changes. Returns TRUE 1447 * for success, FALSE for failure. 1448 */ 1449 /*ARGSUSED*/ 1450 inline static Boolean 1451 process_progbits_alloc(const char *name, Ifl_desc *ifl, Shdr *shdr, 1452 Word ndx, int *ident, Ofl_desc *ofl, Boolean is_stab_index, 1453 Word *is_flags) 1454 { 1455 Boolean done = FALSE; 1456 1457 if (name[0] == '.') { 1458 switch (name[1]) { 1459 case 'e': 1460 if (!is_name_cmp(name, MSG_ORIG(MSG_SCN_EHFRAME), 1461 MSG_SCN_EHFRAME_SIZE)) 1462 break; 1463 1464 *ident = ld_targ.t_id.id_unwind; 1465 *is_flags |= FLG_IS_EHFRAME; 1466 done = TRUE; 1467 1468 /* 1469 * Historically, the section containing the logic to 1470 * unwind stack frames -- the .eh_frame section -- was 1471 * of type SHT_PROGBITS. Apparently the most 1472 * aesthetically galling aspect of this was not the 1473 * .eh_frame section's dubious purpose or its filthy 1474 * implementation, but rather its section type; with the 1475 * introduction of the AMD64 ABI, a new section header 1476 * type (SHT_AMD64_UNWIND) was introduced for (and 1477 * dedicated to) this section. When both the Sun 1478 * compilers and the GNU compilers had been modified to 1479 * generate this new section type, the linker became 1480 * much more pedantic about .eh_frame: it refused to 1481 * link an AMD64 object that contained a .eh_frame with 1482 * the legacy SHT_PROGBITS. That this was too fussy is 1483 * evidenced by searching the net for the error message 1484 * that it generated ("section type is SHT_PROGBITS: 1485 * expected SHT_AMD64_UNWIND"), which reveals a myriad 1486 * of problems, including legacy objects, hand-coded 1487 * assembly and otherwise cross-platform objects 1488 * created on other platforms (the GNU toolchain was 1489 * only modified to create the new section type on 1490 * Solaris and derivatives). We therefore always accept 1491 * a .eh_frame of SHT_PROGBITS -- regardless of 1492 * m_sht_unwind. 1493 */ 1494 break; 1495 case 'g': 1496 if (is_name_cmp(name, MSG_ORIG(MSG_SCN_GOT), 1497 MSG_SCN_GOT_SIZE)) { 1498 *ident = ld_targ.t_id.id_null; 1499 done = TRUE; 1500 break; 1501 } 1502 if ((ld_targ.t_m.m_sht_unwind == SHT_PROGBITS) && 1503 is_name_cmp(name, MSG_ORIG(MSG_SCN_GCC_X_TBL), 1504 MSG_SCN_GCC_X_TBL_SIZE)) { 1505 *ident = ld_targ.t_id.id_unwind; 1506 done = TRUE; 1507 break; 1508 } 1509 break; 1510 case 'p': 1511 if (is_name_cmp(name, MSG_ORIG(MSG_SCN_PLT), 1512 MSG_SCN_PLT_SIZE)) { 1513 *ident = ld_targ.t_id.id_null; 1514 done = TRUE; 1515 } 1516 break; 1517 } 1518 } 1519 if (!done) { 1520 if (is_stab_index) { 1521 /* 1522 * This is a work-around for x86 compilers that have 1523 * set SHF_ALLOC for the .stab.index section. 1524 * 1525 * Because of this, make sure that the .stab.index 1526 * does not end up as the last section in the text 1527 * segment. Older linkers can produce segmentation 1528 * violations when they strip (ld -s) against a 1529 * shared object whose last section in the text 1530 * segment is a .stab. 1531 */ 1532 *ident = ld_targ.t_id.id_interp; 1533 } else { 1534 *ident = ld_targ.t_id.id_data; 1535 } 1536 } 1537 1538 return (TRUE); 1539 } 1540 1541 /* 1542 * Process a progbits section. 1543 */ 1544 static uintptr_t 1545 process_progbits(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1546 Word ndx, int ident, Ofl_desc *ofl) 1547 { 1548 Boolean is_stab_index = FALSE; 1549 Word is_flags = 0; 1550 uintptr_t r; 1551 1552 /* 1553 * Never include .stab.excl sections in any output file. 1554 * If the -s flag has been specified strip any .stab sections. 1555 */ 1556 if (ident && (strncmp(name, MSG_ORIG(MSG_SCN_STAB), 1557 MSG_SCN_STAB_SIZE) == 0)) { 1558 if ((ofl->ofl_flags & FLG_OF_STRIP) || 1559 (strcmp((name + MSG_SCN_STAB_SIZE), 1560 MSG_ORIG(MSG_SCN_EXCL)) == 0)) 1561 return (1); 1562 1563 if (strcmp((name + MSG_SCN_STAB_SIZE), 1564 MSG_ORIG(MSG_SCN_INDEX)) == 0) 1565 is_stab_index = TRUE; 1566 } 1567 1568 if ((ofl->ofl_flags & FLG_OF_STRIP) && ident) { 1569 if ((strncmp(name, MSG_ORIG(MSG_SCN_DEBUG), 1570 MSG_SCN_DEBUG_SIZE) == 0) || 1571 (strcmp(name, MSG_ORIG(MSG_SCN_LINE)) == 0)) 1572 return (1); 1573 } 1574 1575 /* 1576 * Update the ident to reflect the type of section we've got. 1577 * 1578 * If there is any .plt or .got section to generate we'll be creating 1579 * our own version, so don't allow any input sections of these types to 1580 * be added to the output section list (why a relocatable object would 1581 * have a .plt or .got is a mystery, but stranger things have occurred). 1582 * 1583 * If there are any unwind sections, and this is a platform that uses 1584 * SHT_PROGBITS for unwind sections, then set their ident to reflect 1585 * that. 1586 */ 1587 if (ident) { 1588 if (shdr->sh_flags & SHF_TLS) { 1589 ident = ld_targ.t_id.id_tls; 1590 } else if ((shdr->sh_flags & ~ALL_SHF_IGNORE) == 1591 (SHF_ALLOC | SHF_EXECINSTR)) { 1592 ident = ld_targ.t_id.id_text; 1593 } else if (shdr->sh_flags & SHF_ALLOC) { 1594 if (process_progbits_alloc(name, ifl, shdr, ndx, 1595 &ident, ofl, is_stab_index, &is_flags) == FALSE) 1596 return (S_ERROR); 1597 } else { 1598 ident = ld_targ.t_id.id_note; 1599 } 1600 } 1601 1602 r = process_section(name, ifl, shdr, scn, ndx, ident, ofl); 1603 1604 /* 1605 * On success, process_section() creates an input section descriptor. 1606 * Now that it exists, we can add any pending input section flags. 1607 */ 1608 if ((is_flags != 0) && (r == 1)) 1609 ifl->ifl_isdesc[ndx]->is_flags |= is_flags; 1610 1611 return (r); 1612 } 1613 1614 /* 1615 * Handles the SHT_SUNW_{DEBUG,DEBUGSTR) sections. 1616 */ 1617 static uintptr_t 1618 process_debug(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1619 Word ndx, int ident, Ofl_desc *ofl) 1620 { 1621 /* 1622 * Debug information is discarded when the 'ld -s' flag is invoked. 1623 */ 1624 if (ofl->ofl_flags & FLG_OF_STRIP) { 1625 return (1); 1626 } 1627 return (process_progbits(name, ifl, shdr, scn, ndx, ident, ofl)); 1628 } 1629 1630 /* 1631 * Process a nobits section. 1632 */ 1633 static uintptr_t 1634 process_nobits(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1635 Word ndx, int ident, Ofl_desc *ofl) 1636 { 1637 if (ident) { 1638 if (shdr->sh_flags & SHF_TLS) 1639 ident = ld_targ.t_id.id_tlsbss; 1640 #if defined(_ELF64) 1641 else if ((shdr->sh_flags & SHF_AMD64_LARGE) && 1642 (ld_targ.t_m.m_mach == EM_AMD64)) 1643 ident = ld_targ.t_id.id_lbss; 1644 #endif 1645 else 1646 ident = ld_targ.t_id.id_bss; 1647 } 1648 return (process_section(name, ifl, shdr, scn, ndx, ident, ofl)); 1649 } 1650 1651 /* 1652 * Process a SHT_*_ARRAY section. 1653 */ 1654 static uintptr_t 1655 process_array(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1656 Word ndx, int ident, Ofl_desc *ofl) 1657 { 1658 uintptr_t error; 1659 1660 if (ident) 1661 ident = ld_targ.t_id.id_array; 1662 1663 error = process_section(name, ifl, shdr, scn, ndx, ident, ofl); 1664 if ((error == 0) || (error == S_ERROR)) 1665 return (error); 1666 1667 return (1); 1668 } 1669 1670 static uintptr_t 1671 /* ARGSUSED1 */ 1672 array_process(Is_desc *isc, Ifl_desc *ifl, Ofl_desc *ofl) 1673 { 1674 Os_desc *osp; 1675 Shdr *shdr; 1676 1677 if ((isc == NULL) || ((osp = isc->is_osdesc) == NULL)) 1678 return (0); 1679 1680 shdr = isc->is_shdr; 1681 1682 if ((shdr->sh_type == SHT_FINI_ARRAY) && 1683 (ofl->ofl_osfiniarray == NULL)) 1684 ofl->ofl_osfiniarray = osp; 1685 else if ((shdr->sh_type == SHT_INIT_ARRAY) && 1686 (ofl->ofl_osinitarray == NULL)) 1687 ofl->ofl_osinitarray = osp; 1688 else if ((shdr->sh_type == SHT_PREINIT_ARRAY) && 1689 (ofl->ofl_ospreinitarray == NULL)) 1690 ofl->ofl_ospreinitarray = osp; 1691 1692 return (1); 1693 } 1694 1695 /* 1696 * Process a SHT_SYMTAB_SHNDX section. 1697 */ 1698 static uintptr_t 1699 process_sym_shndx(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1700 Word ndx, int ident, Ofl_desc *ofl) 1701 { 1702 if (process_input(name, ifl, shdr, scn, ndx, ident, ofl) == S_ERROR) 1703 return (S_ERROR); 1704 1705 /* 1706 * Have we already seen the related SYMTAB - if so verify it now. 1707 */ 1708 if (shdr->sh_link < ndx) { 1709 Is_desc *isp = ifl->ifl_isdesc[shdr->sh_link]; 1710 1711 if ((isp == NULL) || ((isp->is_shdr->sh_type != SHT_SYMTAB) && 1712 (isp->is_shdr->sh_type != SHT_DYNSYM))) { 1713 ld_eprintf(ofl, ERR_FATAL, 1714 MSG_INTL(MSG_FIL_INVSHLINK), ifl->ifl_name, 1715 EC_WORD(ndx), name, EC_XWORD(shdr->sh_link)); 1716 return (S_ERROR); 1717 } 1718 isp->is_symshndx = ifl->ifl_isdesc[ndx]; 1719 } 1720 return (1); 1721 } 1722 1723 /* 1724 * Final processing for SHT_SYMTAB_SHNDX section. 1725 */ 1726 static uintptr_t 1727 /* ARGSUSED2 */ 1728 sym_shndx_process(Is_desc *isc, Ifl_desc *ifl, Ofl_desc *ofl) 1729 { 1730 if (isc->is_shdr->sh_link > isc->is_scnndx) { 1731 Is_desc *isp = ifl->ifl_isdesc[isc->is_shdr->sh_link]; 1732 1733 if ((isp == NULL) || ((isp->is_shdr->sh_type != SHT_SYMTAB) && 1734 (isp->is_shdr->sh_type != SHT_DYNSYM))) { 1735 ld_eprintf(ofl, ERR_FATAL, 1736 MSG_INTL(MSG_FIL_INVSHLINK), isc->is_file->ifl_name, 1737 EC_WORD(isc->is_scnndx), isc->is_name, 1738 EC_XWORD(isc->is_shdr->sh_link)); 1739 return (S_ERROR); 1740 } 1741 isp->is_symshndx = isc; 1742 } 1743 return (1); 1744 } 1745 1746 /* 1747 * Process .dynamic section from a relocatable object. 1748 * 1749 * Note: That the .dynamic section is only considered interesting when 1750 * dlopen()ing a relocatable object (thus FLG_OF1_RELDYN can only get 1751 * set when libld is called from ld.so.1). 1752 */ 1753 /*ARGSUSED*/ 1754 static uintptr_t 1755 process_rel_dynamic(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 1756 Word ndx, int ident, Ofl_desc *ofl) 1757 { 1758 Dyn *dyn; 1759 Elf_Scn *strscn; 1760 Elf_Data *dp; 1761 char *str; 1762 1763 /* 1764 * Process .dynamic sections from relocatable objects ? 1765 */ 1766 if ((ofl->ofl_flags1 & FLG_OF1_RELDYN) == 0) 1767 return (1); 1768 1769 /* 1770 * Find the string section associated with the .dynamic section. 1771 */ 1772 if ((strscn = elf_getscn(ifl->ifl_elf, shdr->sh_link)) == NULL) { 1773 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSCN), 1774 ifl->ifl_name); 1775 return (0); 1776 } 1777 dp = elf_getdata(strscn, NULL); 1778 str = (char *)dp->d_buf; 1779 1780 /* 1781 * And get the .dynamic data 1782 */ 1783 dp = elf_getdata(scn, NULL); 1784 1785 for (dyn = (Dyn *)dp->d_buf; dyn->d_tag != DT_NULL; dyn++) { 1786 Ifl_desc *difl; 1787 1788 switch (dyn->d_tag) { 1789 case DT_NEEDED: 1790 case DT_USED: 1791 if (((difl = libld_calloc(1, 1792 sizeof (Ifl_desc))) == NULL) || 1793 (aplist_append(&ofl->ofl_sos, difl, 1794 AL_CNT_OFL_LIBS) == NULL)) 1795 return (S_ERROR); 1796 1797 difl->ifl_name = MSG_ORIG(MSG_STR_DYNAMIC); 1798 difl->ifl_soname = str + (size_t)dyn->d_un.d_val; 1799 difl->ifl_flags = FLG_IF_NEEDSTR; 1800 break; 1801 case DT_RPATH: 1802 case DT_RUNPATH: 1803 if ((ofl->ofl_rpath = add_string(ofl->ofl_rpath, 1804 (str + (size_t)dyn->d_un.d_val))) == 1805 (const char *)S_ERROR) 1806 return (S_ERROR); 1807 break; 1808 case DT_VERSYM: 1809 /* 1810 * The Solaris ld does not put DT_VERSYM in the 1811 * dynamic section. If the object has DT_VERSYM, 1812 * then it must have been produced by the GNU ld, 1813 * and is using the GNU style of versioning. 1814 */ 1815 ifl->ifl_flags |= FLG_IF_GNUVER; 1816 break; 1817 } 1818 } 1819 return (1); 1820 } 1821 1822 /* 1823 * Expand implicit references. Dependencies can be specified in terms of the 1824 * $ORIGIN, $MACHINE, $PLATFORM, $OSREL and $OSNAME tokens, either from their 1825 * needed name, or via a runpath. In addition runpaths may also specify the 1826 * $ISALIST token. 1827 * 1828 * Probably the most common reference to explicit dependencies (via -L) will be 1829 * sufficient to find any associated implicit dependencies, but just in case we 1830 * expand any occurrence of these known tokens here. 1831 * 1832 * Note, if any errors occur we simply return the original name. 1833 * 1834 * This code is remarkably similar to expand() in rtld/common/paths.c. 1835 */ 1836 static char *machine = NULL; 1837 static size_t machine_sz = 0; 1838 static char *platform = NULL; 1839 static size_t platform_sz = 0; 1840 static Isa_desc *isa = NULL; 1841 static Uts_desc *uts = NULL; 1842 1843 static char * 1844 expand(const char *parent, const char *name, char **next) 1845 { 1846 char _name[PATH_MAX], *nptr, *_next; 1847 const char *optr; 1848 size_t nrem = PATH_MAX - 1; 1849 int expanded = 0, _expanded, isaflag = 0; 1850 1851 optr = name; 1852 nptr = _name; 1853 1854 while (*optr) { 1855 if (nrem == 0) 1856 return ((char *)name); 1857 1858 if (*optr != '$') { 1859 *nptr++ = *optr++, nrem--; 1860 continue; 1861 } 1862 1863 _expanded = 0; 1864 1865 if (strncmp(optr, MSG_ORIG(MSG_STR_ORIGIN), 1866 MSG_STR_ORIGIN_SIZE) == 0) { 1867 char *eptr; 1868 1869 /* 1870 * For $ORIGIN, expansion is really just a concatenation 1871 * of the parents directory name. For example, an 1872 * explicit dependency foo/bar/lib1.so with a dependency 1873 * on $ORIGIN/lib2.so would be expanded to 1874 * foo/bar/lib2.so. 1875 */ 1876 if ((eptr = strrchr(parent, '/')) == NULL) { 1877 *nptr++ = '.'; 1878 nrem--; 1879 } else { 1880 size_t len = eptr - parent; 1881 1882 if (len >= nrem) 1883 return ((char *)name); 1884 1885 (void) strncpy(nptr, parent, len); 1886 nptr = nptr + len; 1887 nrem -= len; 1888 } 1889 optr += MSG_STR_ORIGIN_SIZE; 1890 expanded = _expanded = 1; 1891 1892 } else if (strncmp(optr, MSG_ORIG(MSG_STR_MACHINE), 1893 MSG_STR_MACHINE_SIZE) == 0) { 1894 /* 1895 * Establish the machine from sysconf - like uname -i. 1896 */ 1897 if ((machine == NULL) && (machine_sz == 0)) { 1898 char info[SYS_NMLN]; 1899 long size; 1900 1901 size = sysinfo(SI_MACHINE, info, SYS_NMLN); 1902 if ((size != -1) && 1903 (machine = libld_malloc((size_t)size))) { 1904 (void) strcpy(machine, info); 1905 machine_sz = (size_t)size - 1; 1906 } else 1907 machine_sz = 1; 1908 } 1909 if (machine) { 1910 if (machine_sz >= nrem) 1911 return ((char *)name); 1912 1913 (void) strncpy(nptr, machine, machine_sz); 1914 nptr = nptr + machine_sz; 1915 nrem -= machine_sz; 1916 1917 optr += MSG_STR_MACHINE_SIZE; 1918 expanded = _expanded = 1; 1919 } 1920 1921 } else if (strncmp(optr, MSG_ORIG(MSG_STR_PLATFORM), 1922 MSG_STR_PLATFORM_SIZE) == 0) { 1923 /* 1924 * Establish the platform from sysconf - like uname -i. 1925 */ 1926 if ((platform == NULL) && (platform_sz == 0)) { 1927 char info[SYS_NMLN]; 1928 long size; 1929 1930 size = sysinfo(SI_PLATFORM, info, SYS_NMLN); 1931 if ((size != -1) && 1932 (platform = libld_malloc((size_t)size))) { 1933 (void) strcpy(platform, info); 1934 platform_sz = (size_t)size - 1; 1935 } else 1936 platform_sz = 1; 1937 } 1938 if (platform) { 1939 if (platform_sz >= nrem) 1940 return ((char *)name); 1941 1942 (void) strncpy(nptr, platform, platform_sz); 1943 nptr = nptr + platform_sz; 1944 nrem -= platform_sz; 1945 1946 optr += MSG_STR_PLATFORM_SIZE; 1947 expanded = _expanded = 1; 1948 } 1949 1950 } else if (strncmp(optr, MSG_ORIG(MSG_STR_OSNAME), 1951 MSG_STR_OSNAME_SIZE) == 0) { 1952 /* 1953 * Establish the os name - like uname -s. 1954 */ 1955 if (uts == NULL) 1956 uts = conv_uts(); 1957 1958 if (uts && uts->uts_osnamesz) { 1959 if (uts->uts_osnamesz >= nrem) 1960 return ((char *)name); 1961 1962 (void) strncpy(nptr, uts->uts_osname, 1963 uts->uts_osnamesz); 1964 nptr = nptr + uts->uts_osnamesz; 1965 nrem -= uts->uts_osnamesz; 1966 1967 optr += MSG_STR_OSNAME_SIZE; 1968 expanded = _expanded = 1; 1969 } 1970 1971 } else if (strncmp(optr, MSG_ORIG(MSG_STR_OSREL), 1972 MSG_STR_OSREL_SIZE) == 0) { 1973 /* 1974 * Establish the os release - like uname -r. 1975 */ 1976 if (uts == NULL) 1977 uts = conv_uts(); 1978 1979 if (uts && uts->uts_osrelsz) { 1980 if (uts->uts_osrelsz >= nrem) 1981 return ((char *)name); 1982 1983 (void) strncpy(nptr, uts->uts_osrel, 1984 uts->uts_osrelsz); 1985 nptr = nptr + uts->uts_osrelsz; 1986 nrem -= uts->uts_osrelsz; 1987 1988 optr += MSG_STR_OSREL_SIZE; 1989 expanded = _expanded = 1; 1990 } 1991 1992 } else if ((strncmp(optr, MSG_ORIG(MSG_STR_ISALIST), 1993 MSG_STR_ISALIST_SIZE) == 0) && next && (isaflag++ == 0)) { 1994 /* 1995 * Establish instruction sets from sysconf. Note that 1996 * this is only meaningful from runpaths. 1997 */ 1998 if (isa == NULL) 1999 isa = conv_isalist(); 2000 2001 if (isa && isa->isa_listsz && 2002 (nrem > isa->isa_opt->isa_namesz)) { 2003 size_t mlen, tlen, hlen = optr - name; 2004 size_t no; 2005 char *lptr; 2006 Isa_opt *opt = isa->isa_opt; 2007 2008 (void) strncpy(nptr, opt->isa_name, 2009 opt->isa_namesz); 2010 nptr = nptr + opt->isa_namesz; 2011 nrem -= opt->isa_namesz; 2012 2013 optr += MSG_STR_ISALIST_SIZE; 2014 expanded = _expanded = 1; 2015 2016 tlen = strlen(optr); 2017 2018 /* 2019 * As ISALIST expands to a number of elements, 2020 * establish a new list to return to the caller. 2021 * This will contain the present path being 2022 * processed redefined for each isalist option, 2023 * plus the original remaining list entries. 2024 */ 2025 mlen = ((hlen + tlen) * (isa->isa_optno - 1)) + 2026 isa->isa_listsz - opt->isa_namesz; 2027 if (*next) 2028 mlen += strlen(*next); 2029 if ((_next = lptr = libld_malloc(mlen)) == NULL) 2030 return (0); 2031 2032 for (no = 1, opt++; no < isa->isa_optno; 2033 no++, opt++) { 2034 (void) strncpy(lptr, name, hlen); 2035 lptr = lptr + hlen; 2036 (void) strncpy(lptr, opt->isa_name, 2037 opt->isa_namesz); 2038 lptr = lptr + opt->isa_namesz; 2039 (void) strncpy(lptr, optr, tlen); 2040 lptr = lptr + tlen; 2041 *lptr++ = ':'; 2042 } 2043 if (*next) 2044 (void) strcpy(lptr, *next); 2045 else 2046 *--lptr = '\0'; 2047 } 2048 } 2049 2050 /* 2051 * If no expansion occurred skip the $ and continue. 2052 */ 2053 if (_expanded == 0) 2054 *nptr++ = *optr++, nrem--; 2055 } 2056 2057 /* 2058 * If any ISALIST processing has occurred not only do we return the 2059 * expanded node we're presently working on, but we must also update the 2060 * remaining list so that it is effectively prepended with this node 2061 * expanded to all remaining isalist options. Note that we can only 2062 * handle one ISALIST per node. For more than one ISALIST to be 2063 * processed we'd need a better algorithm than above to replace the 2064 * newly generated list. Whether we want to encourage the number of 2065 * pathname permutations this would provide is another question. So, for 2066 * now if more than one ISALIST is encountered we return the original 2067 * node untouched. 2068 */ 2069 if (isaflag) { 2070 if (isaflag == 1) 2071 *next = _next; 2072 else 2073 return ((char *)name); 2074 } 2075 2076 *nptr = '\0'; 2077 2078 if (expanded) { 2079 if ((nptr = libld_malloc(strlen(_name) + 1)) == NULL) 2080 return ((char *)name); 2081 (void) strcpy(nptr, _name); 2082 return (nptr); 2083 } 2084 return ((char *)name); 2085 } 2086 2087 /* 2088 * The Solaris ld does not put DT_VERSYM in the dynamic section, but the 2089 * GNU ld does, and it is used by the runtime linker to implement their 2090 * versioning scheme. Use this fact to determine if the sharable object 2091 * was produced by the GNU ld rather than the Solaris one, and to set 2092 * FLG_IF_GNUVER if so. This needs to be done before the symbols are 2093 * processed, since the answer determines whether we interpret the 2094 * symbols versions according to Solaris or GNU rules. 2095 */ 2096 /*ARGSUSED*/ 2097 static uintptr_t 2098 process_dynamic_isgnu(const char *name, Ifl_desc *ifl, Shdr *shdr, 2099 Elf_Scn *scn, Word ndx, int ident, Ofl_desc *ofl) 2100 { 2101 Dyn *dyn; 2102 Elf_Data *dp; 2103 uintptr_t error; 2104 2105 error = process_section(name, ifl, shdr, scn, ndx, ident, ofl); 2106 if ((error == 0) || (error == S_ERROR)) 2107 return (error); 2108 2109 /* Get the .dynamic data */ 2110 dp = elf_getdata(scn, NULL); 2111 2112 for (dyn = (Dyn *)dp->d_buf; dyn->d_tag != DT_NULL; dyn++) { 2113 if (dyn->d_tag == DT_VERSYM) { 2114 ifl->ifl_flags |= FLG_IF_GNUVER; 2115 break; 2116 } 2117 } 2118 return (1); 2119 } 2120 2121 /* 2122 * Process a dynamic section. If we are processing an explicit shared object 2123 * then we need to determine if it has a recorded SONAME, if so, this name will 2124 * be recorded in the output file being generated as the NEEDED entry rather 2125 * than the shared objects filename itself. 2126 * If the mode of the link-edit indicates that no undefined symbols should 2127 * remain, then we also need to build up a list of any additional shared object 2128 * dependencies this object may have. In this case save any NEEDED entries 2129 * together with any associated run-path specifications. This information is 2130 * recorded on the `ofl_soneed' list and will be analyzed after all explicit 2131 * file processing has been completed (refer finish_libs()). 2132 */ 2133 static uintptr_t 2134 process_dynamic(Is_desc *isc, Ifl_desc *ifl, Ofl_desc *ofl) 2135 { 2136 Dyn *data, *dyn; 2137 char *str, *rpath = NULL; 2138 const char *soname, *needed; 2139 Boolean no_undef; 2140 2141 data = (Dyn *)isc->is_indata->d_buf; 2142 str = (char *)ifl->ifl_isdesc[isc->is_shdr->sh_link]->is_indata->d_buf; 2143 2144 /* Determine if we need to examine the runpaths and NEEDED entries */ 2145 no_undef = (ofl->ofl_flags & (FLG_OF_NOUNDEF | FLG_OF_SYMBOLIC)) || 2146 OFL_GUIDANCE(ofl, FLG_OFG_NO_DEFS); 2147 2148 /* 2149 * First loop through the dynamic section looking for a run path. 2150 */ 2151 if (no_undef) { 2152 for (dyn = data; dyn->d_tag != DT_NULL; dyn++) { 2153 if ((dyn->d_tag != DT_RPATH) && 2154 (dyn->d_tag != DT_RUNPATH)) 2155 continue; 2156 if ((rpath = str + (size_t)dyn->d_un.d_val) == NULL) 2157 continue; 2158 break; 2159 } 2160 } 2161 2162 /* 2163 * Now look for any needed dependencies (which may use the rpath) 2164 * or a new SONAME. 2165 */ 2166 for (dyn = data; dyn->d_tag != DT_NULL; dyn++) { 2167 if (dyn->d_tag == DT_SONAME) { 2168 if ((soname = str + (size_t)dyn->d_un.d_val) == NULL) 2169 continue; 2170 2171 /* 2172 * Update the input file structure with this new name. 2173 */ 2174 ifl->ifl_soname = soname; 2175 2176 } else if ((dyn->d_tag == DT_NEEDED) || 2177 (dyn->d_tag == DT_USED)) { 2178 Sdf_desc *sdf; 2179 2180 if (!no_undef) 2181 continue; 2182 if ((needed = str + (size_t)dyn->d_un.d_val) == NULL) 2183 continue; 2184 2185 /* 2186 * Determine if this needed entry is already recorded on 2187 * the shared object needed list, if not create a new 2188 * definition for later processing (see finish_libs()). 2189 */ 2190 needed = expand(ifl->ifl_name, needed, NULL); 2191 2192 if ((sdf = sdf_find(needed, ofl->ofl_soneed)) == NULL) { 2193 if ((sdf = sdf_add(needed, 2194 &ofl->ofl_soneed)) == (Sdf_desc *)S_ERROR) 2195 return (S_ERROR); 2196 sdf->sdf_rfile = ifl->ifl_name; 2197 } 2198 2199 /* 2200 * Record the runpath (Note that we take the first 2201 * runpath which is exactly what ld.so.1 would do during 2202 * its dependency processing). 2203 */ 2204 if (rpath && (sdf->sdf_rpath == NULL)) 2205 sdf->sdf_rpath = rpath; 2206 2207 } else if (dyn->d_tag == DT_FLAGS_1) { 2208 if (dyn->d_un.d_val & (DF_1_INITFIRST | DF_1_INTERPOSE)) 2209 ifl->ifl_flags &= ~FLG_IF_LAZYLD; 2210 if (dyn->d_un.d_val & DF_1_DISPRELPND) 2211 ifl->ifl_flags |= FLG_IF_DISPPEND; 2212 if (dyn->d_un.d_val & DF_1_DISPRELDNE) 2213 ifl->ifl_flags |= FLG_IF_DISPDONE; 2214 if (dyn->d_un.d_val & DF_1_NODIRECT) 2215 ifl->ifl_flags |= FLG_IF_NODIRECT; 2216 2217 /* 2218 * If we are building an executable, and this 2219 * dependency is tagged as an interposer, then 2220 * assume that it is required even if symbol 2221 * resolution uncovers no evident use. 2222 * 2223 * If we are building a shared object, then an 2224 * interposer dependency has no special meaning, and we 2225 * treat it as a regular dependency. By definition, all 2226 * interposers must be visible to the runtime linker 2227 * at initialization time, and cannot be added later. 2228 */ 2229 if ((dyn->d_un.d_val & DF_1_INTERPOSE) && 2230 (ofl->ofl_flags & FLG_OF_EXEC)) 2231 ifl->ifl_flags |= FLG_IF_DEPREQD; 2232 2233 } else if ((dyn->d_tag == DT_AUDIT) && 2234 (ifl->ifl_flags & FLG_IF_NEEDED)) { 2235 /* 2236 * Record audit string as DT_DEPAUDIT. 2237 */ 2238 if ((ofl->ofl_depaudit = add_string(ofl->ofl_depaudit, 2239 (str + (size_t)dyn->d_un.d_val))) == 2240 (const char *)S_ERROR) 2241 return (S_ERROR); 2242 2243 } else if (dyn->d_tag == DT_SUNW_RTLDINF) { 2244 /* 2245 * If this dependency has the DT_SUNW_RTLDINF .dynamic 2246 * entry, then ensure no specialized dependency 2247 * processing is in effect. This tag identifies libc, 2248 * which provides critical startup information (TLS 2249 * routines, threads initialization, etc.) that must 2250 * be exercised as part of process initialization. 2251 */ 2252 ifl->ifl_flags &= ~MSK_IF_POSFLAG1; 2253 2254 /* 2255 * libc is not subject to the usual guidance checks 2256 * for lazy loading. It cannot be lazy loaded, libld 2257 * ignores the request, and rtld would ignore the 2258 * setting if it were present. 2259 */ 2260 ifl->ifl_flags |= FLG_IF_RTLDINF; 2261 } 2262 } 2263 2264 /* 2265 * Perform some SONAME sanity checks. 2266 */ 2267 if (ifl->ifl_flags & FLG_IF_NEEDED) { 2268 Ifl_desc *sifl; 2269 Aliste idx; 2270 2271 /* 2272 * Determine if anyone else will cause the same SONAME to be 2273 * used (this is either caused by two different files having the 2274 * same SONAME, or by one file SONAME actually matching another 2275 * file basename (if no SONAME is specified within a shared 2276 * library its basename will be used)). Probably rare, but some 2277 * idiot will do it. 2278 */ 2279 for (APLIST_TRAVERSE(ofl->ofl_sos, idx, sifl)) { 2280 if ((strcmp(ifl->ifl_soname, sifl->ifl_soname) == 0) && 2281 (ifl != sifl)) { 2282 const char *hint, *iflb, *siflb; 2283 2284 /* 2285 * Determine the basename of each file. Perhaps 2286 * there are multiple copies of the same file 2287 * being brought in using different -L search 2288 * paths, and if so give an extra hint in the 2289 * error message. 2290 */ 2291 iflb = strrchr(ifl->ifl_name, '/'); 2292 if (iflb == NULL) 2293 iflb = ifl->ifl_name; 2294 else 2295 iflb++; 2296 2297 siflb = strrchr(sifl->ifl_name, '/'); 2298 if (siflb == NULL) 2299 siflb = sifl->ifl_name; 2300 else 2301 siflb++; 2302 2303 if (strcmp(iflb, siflb) == 0) 2304 hint = MSG_INTL(MSG_REC_CNFLTHINT); 2305 else 2306 hint = MSG_ORIG(MSG_STR_EMPTY); 2307 2308 ld_eprintf(ofl, ERR_FATAL, 2309 MSG_INTL(MSG_REC_OBJCNFLT), sifl->ifl_name, 2310 ifl->ifl_name, sifl->ifl_soname, hint); 2311 return (0); 2312 } 2313 } 2314 2315 /* 2316 * If the SONAME is the same as the name the user wishes to 2317 * record when building a dynamic library (refer -h option), 2318 * we also have a name clash. 2319 */ 2320 if (ofl->ofl_soname && 2321 (strcmp(ofl->ofl_soname, ifl->ifl_soname) == 0)) { 2322 ld_eprintf(ofl, ERR_FATAL, 2323 MSG_INTL(MSG_REC_OPTCNFLT), ifl->ifl_name, 2324 MSG_INTL(MSG_MARG_SONAME), ifl->ifl_soname); 2325 return (0); 2326 } 2327 } 2328 return (1); 2329 } 2330 2331 /* 2332 * Process a progbits section from a relocatable object (ET_REL). 2333 * This is used on non-amd64 objects to recognize .eh_frame sections. 2334 */ 2335 /*ARGSUSED1*/ 2336 static uintptr_t 2337 process_progbits_final(Is_desc *isc, Ifl_desc *ifl, Ofl_desc *ofl) 2338 { 2339 if (isc->is_osdesc && (isc->is_flags & FLG_IS_EHFRAME) && 2340 (ld_unwind_register(isc->is_osdesc, ofl) == S_ERROR)) 2341 return (S_ERROR); 2342 2343 return (1); 2344 } 2345 2346 /* 2347 * Process a group section. 2348 */ 2349 static uintptr_t 2350 process_group(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 2351 Word ndx, int ident, Ofl_desc *ofl) 2352 { 2353 uintptr_t error; 2354 2355 error = process_section(name, ifl, shdr, scn, ndx, ident, ofl); 2356 if ((error == 0) || (error == S_ERROR)) 2357 return (error); 2358 2359 /* 2360 * Indicate that this input file has groups to process. Groups are 2361 * processed after all input sections have been processed. 2362 */ 2363 ifl->ifl_flags |= FLG_IF_GROUPS; 2364 2365 return (1); 2366 } 2367 2368 /* 2369 * Process a relocation entry. At this point all input sections from this 2370 * input file have been assigned an input section descriptor which is saved 2371 * in the `ifl_isdesc' array. 2372 */ 2373 static uintptr_t 2374 rel_process(Is_desc *isc, Ifl_desc *ifl, Ofl_desc *ofl) 2375 { 2376 Word rndx; 2377 Is_desc *risc; 2378 Os_desc *osp; 2379 Shdr *shdr = isc->is_shdr; 2380 Conv_inv_buf_t inv_buf; 2381 2382 /* 2383 * Make sure this is a valid relocation we can handle. 2384 */ 2385 if (shdr->sh_type != ld_targ.t_m.m_rel_sht_type) { 2386 ld_eprintf(ofl, ERR_FATAL, MSG_INTL(MSG_FIL_INVALSEC), 2387 ifl->ifl_name, EC_WORD(isc->is_scnndx), isc->is_name, 2388 conv_sec_type(ifl->ifl_ehdr->e_ident[EI_OSABI], 2389 ifl->ifl_ehdr->e_machine, shdr->sh_type, CONV_FMT_ALT_CF, 2390 &inv_buf)); 2391 return (0); 2392 } 2393 2394 /* 2395 * From the relocation section header information determine which 2396 * section needs the actual relocation. Determine which output section 2397 * this input section has been assigned to and add to its relocation 2398 * list. Note that the relocation section may be null if it is not 2399 * required (ie. .debug, .stabs, etc). 2400 */ 2401 rndx = shdr->sh_info; 2402 if (rndx >= ifl->ifl_shnum) { 2403 /* 2404 * Broken input file. 2405 */ 2406 ld_eprintf(ofl, ERR_FATAL, MSG_INTL(MSG_FIL_INVSHINFO), 2407 ifl->ifl_name, EC_WORD(isc->is_scnndx), isc->is_name, 2408 EC_XWORD(rndx)); 2409 return (0); 2410 } 2411 if (rndx == 0) { 2412 if (aplist_append(&ofl->ofl_extrarels, isc, 2413 AL_CNT_OFL_RELS) == NULL) 2414 return (S_ERROR); 2415 2416 } else if ((risc = ifl->ifl_isdesc[rndx]) != NULL) { 2417 /* 2418 * Discard relocations if they are against a section 2419 * which has been discarded. 2420 */ 2421 if (risc->is_flags & FLG_IS_DISCARD) 2422 return (1); 2423 2424 if ((osp = risc->is_osdesc) == NULL) { 2425 if (risc->is_shdr->sh_type == SHT_SUNW_move) { 2426 /* 2427 * This section is processed later in 2428 * process_movereloc(). 2429 */ 2430 if (aplist_append(&ofl->ofl_ismoverel, 2431 isc, AL_CNT_OFL_MOVE) == NULL) 2432 return (S_ERROR); 2433 return (1); 2434 } 2435 ld_eprintf(ofl, ERR_FATAL, 2436 MSG_INTL(MSG_FIL_INVRELOC1), ifl->ifl_name, 2437 EC_WORD(isc->is_scnndx), isc->is_name, 2438 EC_WORD(risc->is_scnndx), risc->is_name); 2439 return (0); 2440 } 2441 if (aplist_append(&osp->os_relisdescs, isc, 2442 AL_CNT_OS_RELISDESCS) == NULL) 2443 return (S_ERROR); 2444 } 2445 return (1); 2446 } 2447 2448 /* 2449 * SHF_EXCLUDE flags is set for this section. 2450 */ 2451 static uintptr_t 2452 process_exclude(const char *name, Ifl_desc *ifl, Shdr *shdr, Elf_Scn *scn, 2453 Word ndx, Ofl_desc *ofl) 2454 { 2455 /* 2456 * Sections SHT_SYMTAB and SHT_DYNDYM, even if SHF_EXCLUDE is on, might 2457 * be needed for ld processing. These sections need to be in the 2458 * internal table. Later it will be determined whether they can be 2459 * eliminated or not. 2460 */ 2461 if (shdr->sh_type == SHT_SYMTAB || shdr->sh_type == SHT_DYNSYM) 2462 return (0); 2463 2464 /* 2465 * Other checks 2466 */ 2467 if (shdr->sh_flags & SHF_ALLOC) { 2468 /* 2469 * A conflict, issue an warning message, and ignore the section. 2470 */ 2471 ld_eprintf(ofl, ERR_WARNING, MSG_INTL(MSG_FIL_EXCLUDE), 2472 ifl->ifl_name, EC_WORD(ndx), name); 2473 return (0); 2474 } 2475 2476 /* 2477 * This sections is not going to the output file. 2478 */ 2479 return (process_section(name, ifl, shdr, scn, ndx, 0, ofl)); 2480 } 2481 2482 /* 2483 * Section processing state table. `Initial' describes the required initial 2484 * procedure to be called (if any), `Final' describes the final processing 2485 * procedure (ie. things that can only be done when all required sections 2486 * have been collected). 2487 */ 2488 typedef uintptr_t (* initial_func_t)(const char *, Ifl_desc *, Shdr *, 2489 Elf_Scn *, Word, int, Ofl_desc *); 2490 2491 static initial_func_t Initial[SHT_NUM][2] = { 2492 /* ET_REL ET_DYN */ 2493 2494 /* SHT_NULL */ invalid_section, invalid_section, 2495 /* SHT_PROGBITS */ process_progbits, process_progbits, 2496 /* SHT_SYMTAB */ process_input, process_input, 2497 /* SHT_STRTAB */ process_strtab, process_strtab, 2498 /* SHT_RELA */ process_reloc, process_reloc, 2499 /* SHT_HASH */ invalid_section, NULL, 2500 /* SHT_DYNAMIC */ process_rel_dynamic, process_dynamic_isgnu, 2501 /* SHT_NOTE */ process_section, NULL, 2502 /* SHT_NOBITS */ process_nobits, process_nobits, 2503 /* SHT_REL */ process_reloc, process_reloc, 2504 /* SHT_SHLIB */ process_section, invalid_section, 2505 /* SHT_DYNSYM */ invalid_section, process_input, 2506 /* SHT_UNKNOWN12 */ process_progbits, process_progbits, 2507 /* SHT_UNKNOWN13 */ process_progbits, process_progbits, 2508 /* SHT_INIT_ARRAY */ process_array, NULL, 2509 /* SHT_FINI_ARRAY */ process_array, NULL, 2510 /* SHT_PREINIT_ARRAY */ process_array, NULL, 2511 /* SHT_GROUP */ process_group, invalid_section, 2512 /* SHT_SYMTAB_SHNDX */ process_sym_shndx, NULL 2513 }; 2514 2515 typedef uintptr_t (* final_func_t)(Is_desc *, Ifl_desc *, Ofl_desc *); 2516 2517 static final_func_t Final[SHT_NUM][2] = { 2518 /* ET_REL ET_DYN */ 2519 2520 /* SHT_NULL */ NULL, NULL, 2521 /* SHT_PROGBITS */ process_progbits_final, NULL, 2522 /* SHT_SYMTAB */ ld_sym_process, ld_sym_process, 2523 /* SHT_STRTAB */ NULL, NULL, 2524 /* SHT_RELA */ rel_process, NULL, 2525 /* SHT_HASH */ NULL, NULL, 2526 /* SHT_DYNAMIC */ NULL, process_dynamic, 2527 /* SHT_NOTE */ NULL, NULL, 2528 /* SHT_NOBITS */ NULL, NULL, 2529 /* SHT_REL */ rel_process, NULL, 2530 /* SHT_SHLIB */ NULL, NULL, 2531 /* SHT_DYNSYM */ NULL, ld_sym_process, 2532 /* SHT_UNKNOWN12 */ NULL, NULL, 2533 /* SHT_UNKNOWN13 */ NULL, NULL, 2534 /* SHT_INIT_ARRAY */ array_process, NULL, 2535 /* SHT_FINI_ARRAY */ array_process, NULL, 2536 /* SHT_PREINIT_ARRAY */ array_process, NULL, 2537 /* SHT_GROUP */ NULL, NULL, 2538 /* SHT_SYMTAB_SHNDX */ sym_shndx_process, NULL 2539 }; 2540 2541 #define MAXNDXSIZE 10 2542 2543 /* 2544 * Process an elf file. Each section is compared against the section state 2545 * table to determine whether it should be processed (saved), ignored, or 2546 * is invalid for the type of input file being processed. 2547 */ 2548 static uintptr_t 2549 process_elf(Ifl_desc *ifl, Elf *elf, Ofl_desc *ofl) 2550 { 2551 Elf_Scn *scn; 2552 Shdr *shdr; 2553 Word ndx, sndx, ordndx = 0, ordcnt = 0; 2554 char *str, *name; 2555 Word row, column; 2556 int ident; 2557 uintptr_t error; 2558 Is_desc *vdfisp, *vndisp, *vsyisp, *sifisp; 2559 Is_desc *capinfoisp, *capisp; 2560 Sdf_desc *sdf; 2561 Place_path_info path_info_buf, *path_info; 2562 2563 /* 2564 * Path information buffer used by ld_place_section() and related 2565 * routines. This information is used to evaluate entrance criteria 2566 * with non-empty file matching lists (ec_files). 2567 */ 2568 path_info = ld_place_path_info_init(ofl, ifl, &path_info_buf); 2569 2570 /* 2571 * First process the .shstrtab section so that later sections can 2572 * reference their name. 2573 */ 2574 ld_sup_file(ofl, ifl->ifl_name, elf_kind(elf), ifl->ifl_flags, elf); 2575 2576 sndx = ifl->ifl_shstrndx; 2577 if ((scn = elf_getscn(elf, (size_t)sndx)) == NULL) { 2578 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSCN), 2579 ifl->ifl_name); 2580 return (0); 2581 } 2582 if ((shdr = elf_getshdr(scn)) == NULL) { 2583 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSHDR), 2584 ifl->ifl_name); 2585 return (0); 2586 } 2587 if ((name = elf_strptr(elf, (size_t)sndx, (size_t)shdr->sh_name)) == 2588 NULL) { 2589 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_STRPTR), 2590 ifl->ifl_name); 2591 return (0); 2592 } 2593 2594 if (ld_sup_input_section(ofl, ifl, name, &shdr, sndx, scn, 2595 elf) == S_ERROR) 2596 return (S_ERROR); 2597 2598 /* 2599 * Reset the name since the shdr->sh_name could have been changed as 2600 * part of ld_sup_input_section(). 2601 */ 2602 if ((name = elf_strptr(elf, (size_t)sndx, (size_t)shdr->sh_name)) == 2603 NULL) { 2604 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_STRPTR), 2605 ifl->ifl_name); 2606 return (0); 2607 } 2608 2609 error = process_strtab(name, ifl, shdr, scn, sndx, FALSE, ofl); 2610 if ((error == 0) || (error == S_ERROR)) 2611 return (error); 2612 str = ifl->ifl_isdesc[sndx]->is_indata->d_buf; 2613 2614 /* 2615 * Determine the state table column from the input file type. Note, 2616 * shared library sections are not added to the output section list. 2617 */ 2618 if (ifl->ifl_ehdr->e_type == ET_DYN) { 2619 column = 1; 2620 ofl->ofl_soscnt++; 2621 ident = ld_targ.t_id.id_null; 2622 } else { 2623 column = 0; 2624 ofl->ofl_objscnt++; 2625 ident = ld_targ.t_id.id_unknown; 2626 } 2627 2628 DBG_CALL(Dbg_file_generic(ofl->ofl_lml, ifl)); 2629 ndx = 0; 2630 vdfisp = vndisp = vsyisp = sifisp = capinfoisp = capisp = NULL; 2631 scn = NULL; 2632 while (scn = elf_nextscn(elf, scn)) { 2633 ndx++; 2634 2635 /* 2636 * As we've already processed the .shstrtab don't do it again. 2637 */ 2638 if (ndx == sndx) 2639 continue; 2640 2641 if ((shdr = elf_getshdr(scn)) == NULL) { 2642 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_GETSHDR), 2643 ifl->ifl_name); 2644 return (0); 2645 } 2646 name = str + (size_t)(shdr->sh_name); 2647 2648 if (ld_sup_input_section(ofl, ifl, name, &shdr, ndx, scn, 2649 elf) == S_ERROR) 2650 return (S_ERROR); 2651 2652 /* 2653 * Reset the name since the shdr->sh_name could have been 2654 * changed as part of ld_sup_input_section(). 2655 */ 2656 name = str + (size_t)(shdr->sh_name); 2657 2658 row = shdr->sh_type; 2659 2660 if (section_is_exclude(ofl, shdr)) { 2661 if ((error = process_exclude(name, ifl, shdr, scn, 2662 ndx, ofl)) == S_ERROR) 2663 return (S_ERROR); 2664 if (error == 1) 2665 continue; 2666 } 2667 2668 /* 2669 * If this is a standard section type process it via the 2670 * appropriate action routine. 2671 */ 2672 if (row < SHT_NUM) { 2673 if (Initial[row][column] != NULL) { 2674 if (Initial[row][column](name, ifl, shdr, scn, 2675 ndx, ident, ofl) == S_ERROR) 2676 return (S_ERROR); 2677 } 2678 } else { 2679 /* 2680 * If this section is below SHT_LOSUNW then we don't 2681 * really know what to do with it. 2682 * 2683 * If SHF_EXCLUDE is set we're being told we should 2684 * (or may) ignore the section. Otherwise issue a 2685 * warning message but do the basic section processing 2686 * anyway. 2687 */ 2688 if ((row < (Word)SHT_LOSUNW) && 2689 ((shdr->sh_flags & SHF_EXCLUDE) == 0)) { 2690 Conv_inv_buf_t inv_buf; 2691 2692 ld_eprintf(ofl, ERR_WARNING, 2693 MSG_INTL(MSG_FIL_INVALSEC), ifl->ifl_name, 2694 EC_WORD(ndx), name, conv_sec_type( 2695 ifl->ifl_ehdr->e_ident[EI_OSABI], 2696 ifl->ifl_ehdr->e_machine, 2697 shdr->sh_type, CONV_FMT_ALT_CF, &inv_buf)); 2698 } 2699 2700 /* 2701 * Handle sections greater than SHT_LOSUNW. 2702 */ 2703 switch (row) { 2704 case SHT_SUNW_dof: 2705 if (process_section(name, ifl, shdr, scn, 2706 ndx, ident, ofl) == S_ERROR) 2707 return (S_ERROR); 2708 break; 2709 case SHT_SUNW_cap: 2710 if (process_section(name, ifl, shdr, scn, ndx, 2711 ld_targ.t_id.id_null, ofl) == S_ERROR) 2712 return (S_ERROR); 2713 capisp = ifl->ifl_isdesc[ndx]; 2714 break; 2715 case SHT_SUNW_capinfo: 2716 if (process_section(name, ifl, shdr, scn, ndx, 2717 ld_targ.t_id.id_null, ofl) == S_ERROR) 2718 return (S_ERROR); 2719 capinfoisp = ifl->ifl_isdesc[ndx]; 2720 break; 2721 case SHT_SUNW_DEBUGSTR: 2722 case SHT_SUNW_DEBUG: 2723 if (process_debug(name, ifl, shdr, scn, 2724 ndx, ident, ofl) == S_ERROR) 2725 return (S_ERROR); 2726 break; 2727 case SHT_SUNW_move: 2728 if (process_section(name, ifl, shdr, scn, ndx, 2729 ld_targ.t_id.id_null, ofl) == S_ERROR) 2730 return (S_ERROR); 2731 break; 2732 case SHT_SUNW_syminfo: 2733 if (process_section(name, ifl, shdr, scn, ndx, 2734 ld_targ.t_id.id_null, ofl) == S_ERROR) 2735 return (S_ERROR); 2736 sifisp = ifl->ifl_isdesc[ndx]; 2737 break; 2738 case SHT_SUNW_ANNOTATE: 2739 if (process_progbits(name, ifl, shdr, scn, 2740 ndx, ident, ofl) == S_ERROR) 2741 return (S_ERROR); 2742 break; 2743 case SHT_SUNW_COMDAT: 2744 if (process_progbits(name, ifl, shdr, scn, 2745 ndx, ident, ofl) == S_ERROR) 2746 return (S_ERROR); 2747 ifl->ifl_isdesc[ndx]->is_flags |= FLG_IS_COMDAT; 2748 break; 2749 case SHT_SUNW_verdef: 2750 if (process_section(name, ifl, shdr, scn, ndx, 2751 ld_targ.t_id.id_null, ofl) == S_ERROR) 2752 return (S_ERROR); 2753 vdfisp = ifl->ifl_isdesc[ndx]; 2754 break; 2755 case SHT_SUNW_verneed: 2756 if (process_section(name, ifl, shdr, scn, ndx, 2757 ld_targ.t_id.id_null, ofl) == S_ERROR) 2758 return (S_ERROR); 2759 vndisp = ifl->ifl_isdesc[ndx]; 2760 break; 2761 case SHT_SUNW_versym: 2762 if (process_section(name, ifl, shdr, scn, ndx, 2763 ld_targ.t_id.id_null, ofl) == S_ERROR) 2764 return (S_ERROR); 2765 vsyisp = ifl->ifl_isdesc[ndx]; 2766 break; 2767 case SHT_SPARC_GOTDATA: 2768 /* 2769 * SHT_SPARC_GOTDATA (0x70000000) is in the 2770 * SHT_LOPROC - SHT_HIPROC range reserved 2771 * for processor-specific semantics. It is 2772 * only meaningful for sparc targets. 2773 */ 2774 if (ld_targ.t_m.m_mach != 2775 LD_TARG_BYCLASS(EM_SPARC, EM_SPARCV9)) 2776 goto do_default; 2777 if (process_section(name, ifl, shdr, scn, ndx, 2778 ld_targ.t_id.id_gotdata, ofl) == S_ERROR) 2779 return (S_ERROR); 2780 break; 2781 #if defined(_ELF64) 2782 case SHT_AMD64_UNWIND: 2783 /* 2784 * SHT_AMD64_UNWIND (0x70000001) is in the 2785 * SHT_LOPROC - SHT_HIPROC range reserved 2786 * for processor-specific semantics. It is 2787 * only meaningful for amd64 targets. 2788 */ 2789 if (ld_targ.t_m.m_mach != EM_AMD64) 2790 goto do_default; 2791 2792 /* 2793 * Target is x86, so this really is 2794 * SHT_AMD64_UNWIND 2795 */ 2796 if (column == 0) { 2797 /* 2798 * column == ET_REL 2799 */ 2800 if (process_section(name, ifl, shdr, 2801 scn, ndx, ld_targ.t_id.id_unwind, 2802 ofl) == S_ERROR) 2803 return (S_ERROR); 2804 ifl->ifl_isdesc[ndx]->is_flags |= 2805 FLG_IS_EHFRAME; 2806 } 2807 break; 2808 #endif 2809 default: 2810 do_default: 2811 if (process_section(name, ifl, shdr, scn, ndx, 2812 ((ident == ld_targ.t_id.id_null) ? 2813 ident : ld_targ.t_id.id_user), ofl) == 2814 S_ERROR) 2815 return (S_ERROR); 2816 break; 2817 } 2818 } 2819 } 2820 2821 /* 2822 * Now that all input sections have been analyzed, and prior to placing 2823 * any input sections to their output sections, process any groups. 2824 * Groups can contribute COMDAT items, which may get discarded as part 2825 * of placement. In addition, COMDAT names may require transformation 2826 * to indicate different output section placement. 2827 */ 2828 if (ifl->ifl_flags & FLG_IF_GROUPS) { 2829 for (ndx = 1; ndx < ifl->ifl_shnum; ndx++) { 2830 Is_desc *isp; 2831 2832 if (((isp = ifl->ifl_isdesc[ndx]) == NULL) || 2833 (isp->is_shdr->sh_type != SHT_GROUP)) 2834 continue; 2835 2836 if (ld_group_process(isp, ofl) == S_ERROR) 2837 return (S_ERROR); 2838 } 2839 } 2840 2841 /* 2842 * Now group information has been processed, we can safely validate 2843 * that nothing is fishy about the section COMDAT description. We 2844 * need to do this prior to placing the section (where any 2845 * SHT_SUNW_COMDAT sections will be restored to being PROGBITS) 2846 */ 2847 ld_comdat_validate(ofl, ifl); 2848 2849 /* 2850 * Now that all of the input sections have been processed, place 2851 * them in the appropriate output sections. 2852 */ 2853 for (ndx = 1; ndx < ifl->ifl_shnum; ndx++) { 2854 Is_desc *isp; 2855 2856 if (((isp = ifl->ifl_isdesc[ndx]) == NULL) || 2857 ((isp->is_flags & FLG_IS_PLACE) == 0)) 2858 continue; 2859 2860 /* 2861 * Place all non-ordered sections within their appropriate 2862 * output section. 2863 */ 2864 if ((isp->is_flags & FLG_IS_ORDERED) == 0) { 2865 if (ld_place_section(ofl, isp, path_info, 2866 isp->is_keyident, NULL) == (Os_desc *)S_ERROR) 2867 return (S_ERROR); 2868 continue; 2869 } 2870 2871 /* 2872 * Count the number of ordered sections and retain the first 2873 * ordered section index. This will be used to optimize the 2874 * ordered section loop that immediately follows this one. 2875 */ 2876 ordcnt++; 2877 if (ordndx == 0) 2878 ordndx = ndx; 2879 } 2880 2881 /* 2882 * Having placed all the non-ordered sections, it is now 2883 * safe to place SHF_ORDERED/SHF_LINK_ORDER sections. 2884 */ 2885 if (ifl->ifl_flags & FLG_IF_ORDERED) { 2886 for (ndx = ordndx; ndx < ifl->ifl_shnum; ndx++) { 2887 Is_desc *isp; 2888 2889 if (((isp = ifl->ifl_isdesc[ndx]) == NULL) || 2890 ((isp->is_flags & 2891 (FLG_IS_PLACE | FLG_IS_ORDERED)) != 2892 (FLG_IS_PLACE | FLG_IS_ORDERED))) 2893 continue; 2894 2895 /* ld_process_ordered() calls ld_place_section() */ 2896 if (ld_process_ordered(ofl, ifl, path_info, ndx) == 2897 S_ERROR) 2898 return (S_ERROR); 2899 2900 /* If we've done them all, stop searching */ 2901 if (--ordcnt == 0) 2902 break; 2903 } 2904 } 2905 2906 /* 2907 * If this is a shared object explicitly specified on the command 2908 * line (as opposed to being a dependency of such an object), 2909 * determine if the user has specified a control definition. This 2910 * descriptor may specify which version definitions can be used 2911 * from this object. It may also update the dependency to USED and 2912 * supply an alternative SONAME. 2913 */ 2914 sdf = NULL; 2915 if (column && (ifl->ifl_flags & FLG_IF_NEEDED)) { 2916 const char *base; 2917 2918 /* 2919 * Use the basename of the input file (typically this is the 2920 * compilation environment name, ie. libfoo.so). 2921 */ 2922 if ((base = strrchr(ifl->ifl_name, '/')) == NULL) 2923 base = ifl->ifl_name; 2924 else 2925 base++; 2926 2927 if ((sdf = sdf_find(base, ofl->ofl_socntl)) != NULL) { 2928 sdf->sdf_file = ifl; 2929 ifl->ifl_sdfdesc = sdf; 2930 } 2931 } 2932 2933 /* 2934 * Before symbol processing, process any capabilities. Capabilities 2935 * can reference a string table, which is why this processing is 2936 * carried out after the initial section processing. Capabilities, 2937 * together with -z symbolcap, can require the conversion of global 2938 * symbols to local symbols. 2939 */ 2940 if (capisp && (process_cap(ofl, ifl, capisp) == S_ERROR)) 2941 return (S_ERROR); 2942 2943 /* 2944 * Process any version dependencies. These will establish shared object 2945 * `needed' entries in the same manner as will be generated from the 2946 * .dynamic's NEEDED entries. 2947 */ 2948 if (vndisp && ((ofl->ofl_flags & (FLG_OF_NOUNDEF | FLG_OF_SYMBOLIC)) || 2949 OFL_GUIDANCE(ofl, FLG_OFG_NO_DEFS))) 2950 if (ld_vers_need_process(vndisp, ifl, ofl) == S_ERROR) 2951 return (S_ERROR); 2952 2953 /* 2954 * Before processing any symbol resolution or relocations process any 2955 * version sections. 2956 */ 2957 if (vsyisp) 2958 (void) ld_vers_sym_process(ofl, vsyisp, ifl); 2959 2960 if (ifl->ifl_versym && 2961 (vdfisp || (sdf && (sdf->sdf_flags & FLG_SDF_SELECT)))) 2962 if (ld_vers_def_process(vdfisp, ifl, ofl) == S_ERROR) 2963 return (S_ERROR); 2964 2965 /* 2966 * Having collected the appropriate sections carry out any additional 2967 * processing if necessary. 2968 */ 2969 for (ndx = 0; ndx < ifl->ifl_shnum; ndx++) { 2970 Is_desc *isp; 2971 2972 if ((isp = ifl->ifl_isdesc[ndx]) == NULL) 2973 continue; 2974 row = isp->is_shdr->sh_type; 2975 2976 if ((isp->is_flags & FLG_IS_DISCARD) == 0) 2977 ld_sup_section(ofl, isp->is_name, isp->is_shdr, ndx, 2978 isp->is_indata, elf); 2979 2980 /* 2981 * If this is a SHT_SUNW_move section from a relocatable file, 2982 * keep track of the section for later processing. 2983 */ 2984 if ((row == SHT_SUNW_move) && (column == 0)) { 2985 if (aplist_append(&(ofl->ofl_ismove), isp, 2986 AL_CNT_OFL_MOVE) == NULL) 2987 return (S_ERROR); 2988 } 2989 2990 /* 2991 * If this is a standard section type process it via the 2992 * appropriate action routine. 2993 */ 2994 if (row < SHT_NUM) { 2995 if (Final[row][column] != NULL) { 2996 if (Final[row][column](isp, ifl, 2997 ofl) == S_ERROR) 2998 return (S_ERROR); 2999 } 3000 #if defined(_ELF64) 3001 } else if ((row == SHT_AMD64_UNWIND) && (column == 0)) { 3002 Os_desc *osp = isp->is_osdesc; 3003 3004 /* 3005 * SHT_AMD64_UNWIND (0x70000001) is in the SHT_LOPROC - 3006 * SHT_HIPROC range reserved for processor-specific 3007 * semantics, and is only meaningful for amd64 targets. 3008 * 3009 * Only process unwind contents from relocatable 3010 * objects. 3011 */ 3012 if (osp && (ld_targ.t_m.m_mach == EM_AMD64) && 3013 (ld_unwind_register(osp, ofl) == S_ERROR)) 3014 return (S_ERROR); 3015 #endif 3016 } 3017 } 3018 3019 /* 3020 * Following symbol processing, if this relocatable object input file 3021 * provides symbol capabilities, tag the associated symbols so that 3022 * the symbols can be re-assigned to the new capabilities symbol 3023 * section that will be created for the output file. 3024 */ 3025 if (capinfoisp && (ifl->ifl_ehdr->e_type == ET_REL) && 3026 (process_capinfo(ofl, ifl, capinfoisp) == S_ERROR)) 3027 return (S_ERROR); 3028 3029 /* 3030 * After processing any symbol resolution, and if this dependency 3031 * indicates it contains symbols that can't be directly bound to, 3032 * set the symbols appropriately. 3033 */ 3034 if (sifisp && ((ifl->ifl_flags & (FLG_IF_NEEDED | FLG_IF_NODIRECT)) == 3035 (FLG_IF_NEEDED | FLG_IF_NODIRECT))) 3036 (void) ld_sym_nodirect(sifisp, ifl, ofl); 3037 3038 return (1); 3039 } 3040 3041 /* 3042 * Process the current input file. There are basically three types of files 3043 * that come through here: 3044 * 3045 * - files explicitly defined on the command line (ie. foo.o or bar.so), 3046 * in this case only the `name' field is valid. 3047 * 3048 * - libraries determined from the -l command line option (ie. -lbar), 3049 * in this case the `soname' field contains the basename of the located 3050 * file. 3051 * 3052 * Any shared object specified via the above two conventions must be recorded 3053 * as a needed dependency. 3054 * 3055 * - libraries specified as dependencies of those libraries already obtained 3056 * via the command line (ie. bar.so has a DT_NEEDED entry of fred.so.1), 3057 * in this case the `soname' field contains either a full pathname (if the 3058 * needed entry contained a `/'), or the basename of the located file. 3059 * These libraries are processed to verify symbol binding but are not 3060 * recorded as dependencies of the output file being generated. 3061 * 3062 * entry: 3063 * name - File name 3064 * soname - SONAME for needed sharable library, as described above 3065 * fd - Open file descriptor 3066 * elf - Open ELF handle 3067 * flags - FLG_IF_ flags applicable to file 3068 * ofl - Output file descriptor 3069 * rej - Rejection descriptor used to record rejection reason 3070 * ifl_ret - NULL, or address of pointer to receive reference to 3071 * resulting input descriptor for file. If ifl_ret is non-NULL, 3072 * the file cannot be an archive or it will be rejected. 3073 * 3074 * exit: 3075 * If a error occurs in examining the file, S_ERROR is returned. 3076 * If the file can be examined, but is not suitable, *rej is updated, 3077 * and 0 is returned. If the file is acceptable, 1 is returned, and if 3078 * ifl_ret is non-NULL, *ifl_ret is set to contain the pointer to the 3079 * resulting input descriptor. 3080 */ 3081 uintptr_t 3082 ld_process_ifl(const char *name, const char *soname, int fd, Elf *elf, 3083 Word flags, Ofl_desc *ofl, Rej_desc *rej, Ifl_desc **ifl_ret) 3084 { 3085 Ifl_desc *ifl; 3086 Ehdr *ehdr; 3087 uintptr_t error = 0; 3088 struct stat status; 3089 Ar_desc *adp; 3090 Rej_desc _rej; 3091 3092 /* 3093 * If this file was not extracted from an archive obtain its device 3094 * information. This will be used to determine if the file has already 3095 * been processed (rather than simply comparing filenames, the device 3096 * information provides a quicker comparison and detects linked files). 3097 */ 3098 if (fd && ((flags & FLG_IF_EXTRACT) == 0)) 3099 (void) fstat(fd, &status); 3100 else { 3101 status.st_dev = 0; 3102 status.st_ino = 0; 3103 } 3104 3105 switch (elf_kind(elf)) { 3106 case ELF_K_AR: 3107 /* 3108 * If the caller has supplied a non-NULL ifl_ret, then 3109 * we cannot process archives, for there will be no 3110 * input file descriptor for us to return. In this case, 3111 * reject the attempt. 3112 */ 3113 if (ifl_ret != NULL) { 3114 _rej.rej_type = SGS_REJ_ARCHIVE; 3115 _rej.rej_name = name; 3116 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 3117 ld_targ.t_m.m_mach)); 3118 if (rej->rej_type == 0) { 3119 *rej = _rej; 3120 rej->rej_name = strdup(_rej.rej_name); 3121 } 3122 return (0); 3123 } 3124 3125 /* 3126 * Determine if we've already come across this archive file. 3127 */ 3128 if (!(flags & FLG_IF_EXTRACT)) { 3129 Aliste idx; 3130 3131 for (APLIST_TRAVERSE(ofl->ofl_ars, idx, adp)) { 3132 if ((adp->ad_stdev != status.st_dev) || 3133 (adp->ad_stino != status.st_ino)) 3134 continue; 3135 3136 /* 3137 * We've seen this file before so reuse the 3138 * original archive descriptor and discard the 3139 * new elf descriptor. Note that a file 3140 * descriptor is unnecessary, as the file is 3141 * already available in memory. 3142 */ 3143 DBG_CALL(Dbg_file_reuse(ofl->ofl_lml, name, 3144 adp->ad_name)); 3145 (void) elf_end(elf); 3146 if (!ld_process_archive(name, -1, adp, ofl)) 3147 return (S_ERROR); 3148 return (1); 3149 } 3150 } 3151 3152 /* 3153 * As we haven't processed this file before establish a new 3154 * archive descriptor. 3155 */ 3156 adp = ld_ar_setup(name, elf, ofl); 3157 if ((adp == NULL) || (adp == (Ar_desc *)S_ERROR)) 3158 return ((uintptr_t)adp); 3159 adp->ad_stdev = status.st_dev; 3160 adp->ad_stino = status.st_ino; 3161 3162 ld_sup_file(ofl, name, ELF_K_AR, flags, elf); 3163 3164 /* 3165 * Indicate that the ELF descriptor no longer requires a file 3166 * descriptor by reading the entire file. The file is already 3167 * read via the initial mmap(2) behind elf_begin(3elf), thus 3168 * this operation is effectively a no-op. However, a side- 3169 * effect is that the internal file descriptor, maintained in 3170 * the ELF descriptor, is set to -1. This setting will not 3171 * be compared with any file descriptor that is passed to 3172 * elf_begin(), should this archive, or one of the archive 3173 * members, be processed again from the command line or 3174 * because of a -z rescan. 3175 */ 3176 if (elf_cntl(elf, ELF_C_FDREAD) == -1) { 3177 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_CNTL), 3178 name); 3179 return (0); 3180 } 3181 3182 if (!ld_process_archive(name, -1, adp, ofl)) 3183 return (S_ERROR); 3184 return (1); 3185 3186 case ELF_K_ELF: 3187 /* 3188 * Obtain the elf header so that we can determine what type of 3189 * elf ELF_K_ELF file this is. 3190 */ 3191 if ((ehdr = elf_getehdr(elf)) == NULL) { 3192 int _class = gelf_getclass(elf); 3193 3194 /* 3195 * This can fail for a number of reasons. Typically 3196 * the object class is incorrect (ie. user is building 3197 * 64-bit but managed to point at 32-bit libraries). 3198 * Other ELF errors can include a truncated or corrupt 3199 * file. Try to get the best error message possible. 3200 */ 3201 if (ld_targ.t_m.m_class != _class) { 3202 _rej.rej_type = SGS_REJ_CLASS; 3203 _rej.rej_info = (uint_t)_class; 3204 } else { 3205 _rej.rej_type = SGS_REJ_STR; 3206 _rej.rej_str = elf_errmsg(-1); 3207 } 3208 _rej.rej_name = name; 3209 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 3210 ld_targ.t_m.m_mach)); 3211 if (rej->rej_type == 0) { 3212 *rej = _rej; 3213 rej->rej_name = strdup(_rej.rej_name); 3214 } 3215 return (0); 3216 } 3217 3218 if (_gelf_getdynval(elf, DT_SUNW_KMOD) > 0) { 3219 _rej.rej_name = name; 3220 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 3221 ld_targ.t_m.m_mach)); 3222 _rej.rej_type = SGS_REJ_KMOD; 3223 _rej.rej_str = elf_errmsg(-1); 3224 _rej.rej_name = name; 3225 3226 if (rej->rej_type == 0) { 3227 *rej = _rej; 3228 rej->rej_name = strdup(_rej.rej_name); 3229 } 3230 return (0); 3231 } 3232 3233 /* 3234 * Determine if we've already come across this file. 3235 */ 3236 if (!(flags & FLG_IF_EXTRACT)) { 3237 APlist *apl; 3238 Aliste idx; 3239 3240 if (ehdr->e_type == ET_REL) 3241 apl = ofl->ofl_objs; 3242 else 3243 apl = ofl->ofl_sos; 3244 3245 /* 3246 * Traverse the appropriate file list and determine if 3247 * a dev/inode match is found. 3248 */ 3249 for (APLIST_TRAVERSE(apl, idx, ifl)) { 3250 /* 3251 * Ifl_desc generated via -Nneed, therefore no 3252 * actual file behind it. 3253 */ 3254 if (ifl->ifl_flags & FLG_IF_NEEDSTR) 3255 continue; 3256 3257 if ((ifl->ifl_stino != status.st_ino) || 3258 (ifl->ifl_stdev != status.st_dev)) 3259 continue; 3260 3261 /* 3262 * Disregard (skip) this image. 3263 */ 3264 DBG_CALL(Dbg_file_skip(ofl->ofl_lml, 3265 ifl->ifl_name, name)); 3266 (void) elf_end(elf); 3267 3268 /* 3269 * If the file was explicitly defined on the 3270 * command line (this is always the case for 3271 * relocatable objects, and is true for shared 3272 * objects when they weren't specified via -l or 3273 * were dragged in as an implicit dependency), 3274 * then warn the user. 3275 */ 3276 if ((flags & FLG_IF_CMDLINE) || 3277 (ifl->ifl_flags & FLG_IF_CMDLINE)) { 3278 const char *errmsg; 3279 3280 /* 3281 * Determine whether this is the same 3282 * file name as originally encountered 3283 * so as to provide the most 3284 * descriptive diagnostic. 3285 */ 3286 errmsg = 3287 (strcmp(name, ifl->ifl_name) == 0) ? 3288 MSG_INTL(MSG_FIL_MULINC_1) : 3289 MSG_INTL(MSG_FIL_MULINC_2); 3290 ld_eprintf(ofl, ERR_WARNING, 3291 errmsg, name, ifl->ifl_name); 3292 } 3293 if (ifl_ret) 3294 *ifl_ret = ifl; 3295 return (1); 3296 } 3297 } 3298 3299 /* 3300 * At this point, we know we need the file. Establish an input 3301 * file descriptor and continue processing. 3302 */ 3303 ifl = ifl_setup(name, ehdr, elf, flags, ofl, rej); 3304 if ((ifl == NULL) || (ifl == (Ifl_desc *)S_ERROR)) 3305 return ((uintptr_t)ifl); 3306 ifl->ifl_stdev = status.st_dev; 3307 ifl->ifl_stino = status.st_ino; 3308 3309 /* 3310 * If -zignore is in effect, mark this file as a potential 3311 * candidate (the files use isn't actually determined until 3312 * symbol resolution and relocation processing are completed). 3313 */ 3314 if (ofl->ofl_flags1 & FLG_OF1_IGNORE) 3315 ifl->ifl_flags |= FLG_IF_IGNORE; 3316 3317 switch (ehdr->e_type) { 3318 case ET_REL: 3319 (*ld_targ.t_mr.mr_mach_eflags)(ehdr, ofl); 3320 error = process_elf(ifl, elf, ofl); 3321 break; 3322 case ET_DYN: 3323 if ((ofl->ofl_flags & FLG_OF_STATIC) || 3324 !(ofl->ofl_flags & FLG_OF_DYNLIBS)) { 3325 ld_eprintf(ofl, ERR_FATAL, 3326 MSG_INTL(MSG_FIL_SOINSTAT), name); 3327 return (0); 3328 } 3329 3330 /* 3331 * Record any additional shared object information. 3332 * If no soname is specified (eg. this file was 3333 * derived from a explicit filename declaration on the 3334 * command line, ie. bar.so) use the pathname. 3335 * This entry may be overridden if the files dynamic 3336 * section specifies an DT_SONAME value. 3337 */ 3338 if (soname == NULL) 3339 ifl->ifl_soname = ifl->ifl_name; 3340 else 3341 ifl->ifl_soname = soname; 3342 3343 /* 3344 * If direct bindings, lazy loading, group permissions, 3345 * or deferred dependencies need to be established, mark 3346 * this object. 3347 */ 3348 if (ofl->ofl_flags1 & FLG_OF1_ZDIRECT) 3349 ifl->ifl_flags |= FLG_IF_DIRECT; 3350 if (ofl->ofl_flags1 & FLG_OF1_LAZYLD) 3351 ifl->ifl_flags |= FLG_IF_LAZYLD; 3352 if (ofl->ofl_flags1 & FLG_OF1_GRPPRM) 3353 ifl->ifl_flags |= FLG_IF_GRPPRM; 3354 if (ofl->ofl_flags1 & FLG_OF1_DEFERRED) 3355 ifl->ifl_flags |= 3356 (FLG_IF_LAZYLD | FLG_IF_DEFERRED); 3357 3358 error = process_elf(ifl, elf, ofl); 3359 3360 /* 3361 * Determine whether this dependency requires a syminfo. 3362 */ 3363 if (ifl->ifl_flags & MSK_IF_SYMINFO) 3364 ofl->ofl_flags |= FLG_OF_SYMINFO; 3365 3366 /* 3367 * Guidance: Use -z lazyload/nolazyload. 3368 * libc is exempt from this advice, because it cannot 3369 * be lazy loaded, and requests to do so are ignored. 3370 */ 3371 if (OFL_GUIDANCE(ofl, FLG_OFG_NO_LAZY) && 3372 ((ifl->ifl_flags & FLG_IF_RTLDINF) == 0)) { 3373 ld_eprintf(ofl, ERR_GUIDANCE, 3374 MSG_INTL(MSG_GUIDE_LAZYLOAD)); 3375 ofl->ofl_guideflags |= FLG_OFG_NO_LAZY; 3376 } 3377 3378 /* 3379 * Guidance: Use -B direct/nodirect or 3380 * -z direct/nodirect. 3381 */ 3382 if (OFL_GUIDANCE(ofl, FLG_OFG_NO_DB)) { 3383 ld_eprintf(ofl, ERR_GUIDANCE, 3384 MSG_INTL(MSG_GUIDE_DIRECT)); 3385 ofl->ofl_guideflags |= FLG_OFG_NO_DB; 3386 } 3387 3388 break; 3389 default: 3390 (void) elf_errno(); 3391 _rej.rej_type = SGS_REJ_UNKFILE; 3392 _rej.rej_name = name; 3393 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 3394 ld_targ.t_m.m_mach)); 3395 if (rej->rej_type == 0) { 3396 *rej = _rej; 3397 rej->rej_name = strdup(_rej.rej_name); 3398 } 3399 return (0); 3400 } 3401 break; 3402 default: 3403 (void) elf_errno(); 3404 _rej.rej_type = SGS_REJ_UNKFILE; 3405 _rej.rej_name = name; 3406 DBG_CALL(Dbg_file_rejected(ofl->ofl_lml, &_rej, 3407 ld_targ.t_m.m_mach)); 3408 if (rej->rej_type == 0) { 3409 *rej = _rej; 3410 rej->rej_name = strdup(_rej.rej_name); 3411 } 3412 return (0); 3413 } 3414 if ((error == 0) || (error == S_ERROR)) 3415 return (error); 3416 3417 if (ifl_ret) 3418 *ifl_ret = ifl; 3419 return (1); 3420 } 3421 3422 /* 3423 * Having successfully opened a file, set up the necessary elf structures to 3424 * process it further. This small section of processing is slightly different 3425 * from the elf initialization required to process a relocatable object from an 3426 * archive (see libs.c: ld_process_archive()). 3427 */ 3428 uintptr_t 3429 ld_process_open(const char *opath, const char *ofile, int *fd, Ofl_desc *ofl, 3430 Word flags, Rej_desc *rej, Ifl_desc **ifl_ret) 3431 { 3432 Elf *elf; 3433 const char *npath = opath; 3434 const char *nfile = ofile; 3435 3436 if ((elf = elf_begin(*fd, ELF_C_READ, NULL)) == NULL) { 3437 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_BEGIN), npath); 3438 return (0); 3439 } 3440 3441 /* 3442 * Determine whether the support library wishes to process this open. 3443 * The support library may return: 3444 * . a different ELF descriptor (in which case they should have 3445 * closed the original) 3446 * . a different file descriptor (in which case they should have 3447 * closed the original) 3448 * . a different path and file name (presumably associated with 3449 * a different file descriptor) 3450 * 3451 * A file descriptor of -1, or and ELF descriptor of zero indicates 3452 * the file should be ignored. 3453 */ 3454 ld_sup_open(ofl, &npath, &nfile, fd, flags, &elf, NULL, 0, 3455 elf_kind(elf)); 3456 3457 if ((*fd == -1) || (elf == NULL)) 3458 return (0); 3459 3460 return (ld_process_ifl(npath, nfile, *fd, elf, flags, ofl, rej, 3461 ifl_ret)); 3462 } 3463 3464 /* 3465 * Having successfully mapped a file, set up the necessary elf structures to 3466 * process it further. This routine is patterned after ld_process_open() and 3467 * is only called by ld.so.1(1) to process a relocatable object. 3468 */ 3469 Ifl_desc * 3470 ld_process_mem(const char *path, const char *file, char *addr, size_t size, 3471 Ofl_desc *ofl, Rej_desc *rej) 3472 { 3473 Elf *elf; 3474 uintptr_t open_ret; 3475 Ifl_desc *ifl; 3476 3477 if ((elf = elf_memory(addr, size)) == NULL) { 3478 ld_eprintf(ofl, ERR_ELF, MSG_INTL(MSG_ELF_MEMORY), path); 3479 return (0); 3480 } 3481 3482 open_ret = ld_process_ifl(path, file, 0, elf, 0, ofl, rej, &ifl); 3483 if (open_ret != 1) 3484 return ((Ifl_desc *) open_ret); 3485 return (ifl); 3486 } 3487 3488 /* 3489 * Process a required library (i.e. the dependency of a shared object). 3490 * Combine the directory and filename, check the resultant path size, and try 3491 * opening the pathname. 3492 */ 3493 static Ifl_desc * 3494 process_req_lib(Sdf_desc *sdf, const char *dir, const char *file, 3495 Ofl_desc *ofl, Rej_desc *rej) 3496 { 3497 size_t dlen, plen; 3498 int fd; 3499 char path[PATH_MAX]; 3500 const char *_dir = dir; 3501 3502 /* 3503 * Determine the sizes of the directory and filename to insure we don't 3504 * exceed our buffer. 3505 */ 3506 if ((dlen = strlen(dir)) == 0) { 3507 _dir = MSG_ORIG(MSG_STR_DOT); 3508 dlen = 1; 3509 } 3510 dlen++; 3511 plen = dlen + strlen(file) + 1; 3512 if (plen > PATH_MAX) { 3513 ld_eprintf(ofl, ERR_FATAL, MSG_INTL(MSG_FIL_PTHTOLONG), 3514 _dir, file); 3515 return (0); 3516 } 3517 3518 /* 3519 * Build the entire pathname and try and open the file. 3520 */ 3521 (void) strcpy(path, _dir); 3522 (void) strcat(path, MSG_ORIG(MSG_STR_SLASH)); 3523 (void) strcat(path, file); 3524 DBG_CALL(Dbg_libs_req(ofl->ofl_lml, sdf->sdf_name, 3525 sdf->sdf_rfile, path)); 3526 3527 if ((fd = open(path, O_RDONLY)) == -1) 3528 return (0); 3529 else { 3530 uintptr_t open_ret; 3531 Ifl_desc *ifl; 3532 char *_path; 3533 3534 if ((_path = libld_malloc(strlen(path) + 1)) == NULL) 3535 return ((Ifl_desc *)S_ERROR); 3536 (void) strcpy(_path, path); 3537 open_ret = ld_process_open(_path, &_path[dlen], &fd, ofl, 3538 0, rej, &ifl); 3539 if (fd != -1) 3540 (void) close(fd); 3541 if (open_ret != 1) 3542 return ((Ifl_desc *)open_ret); 3543 return (ifl); 3544 } 3545 } 3546 3547 /* 3548 * Finish any library processing. Walk the list of so's that have been listed 3549 * as "included" by shared objects we have previously processed. Examine them, 3550 * without adding them as explicit dependents of this program, in order to 3551 * complete our symbol definition process. The search path rules are: 3552 * 3553 * - use any user supplied paths, i.e. LD_LIBRARY_PATH and -L, then 3554 * 3555 * - use any RPATH defined within the parent shared object, then 3556 * 3557 * - use the default directories, i.e. LIBPATH or -YP. 3558 */ 3559 uintptr_t 3560 ld_finish_libs(Ofl_desc *ofl) 3561 { 3562 Aliste idx1; 3563 Sdf_desc *sdf; 3564 Rej_desc rej = { 0 }; 3565 3566 /* 3567 * Make sure we are back in dynamic mode. 3568 */ 3569 ofl->ofl_flags |= FLG_OF_DYNLIBS; 3570 3571 for (APLIST_TRAVERSE(ofl->ofl_soneed, idx1, sdf)) { 3572 Aliste idx2; 3573 char *path, *slash = NULL; 3574 int fd; 3575 Ifl_desc *ifl; 3576 char *file = (char *)sdf->sdf_name; 3577 3578 /* 3579 * See if this file has already been processed. At the time 3580 * this implicit dependency was determined there may still have 3581 * been more explicit dependencies to process. Note, if we ever 3582 * do parse the command line three times we would be able to 3583 * do all this checking when processing the dynamic section. 3584 */ 3585 if (sdf->sdf_file) 3586 continue; 3587 3588 for (APLIST_TRAVERSE(ofl->ofl_sos, idx2, ifl)) { 3589 if (!(ifl->ifl_flags & FLG_IF_NEEDSTR) && 3590 (strcmp(file, ifl->ifl_soname) == 0)) { 3591 sdf->sdf_file = ifl; 3592 break; 3593 } 3594 } 3595 if (sdf->sdf_file) 3596 continue; 3597 3598 /* 3599 * If the current path name element embeds a "/", then it's to 3600 * be taken "as is", with no searching involved. Process all 3601 * "/" occurrences, so that we can deduce the base file name. 3602 */ 3603 for (path = file; *path; path++) { 3604 if (*path == '/') 3605 slash = path; 3606 } 3607 if (slash) { 3608 DBG_CALL(Dbg_libs_req(ofl->ofl_lml, sdf->sdf_name, 3609 sdf->sdf_rfile, file)); 3610 if ((fd = open(file, O_RDONLY)) == -1) { 3611 ld_eprintf(ofl, ERR_WARNING, 3612 MSG_INTL(MSG_FIL_NOTFOUND), file, 3613 sdf->sdf_rfile); 3614 } else { 3615 uintptr_t open_ret; 3616 Rej_desc _rej = { 0 }; 3617 3618 open_ret = ld_process_open(file, ++slash, 3619 &fd, ofl, 0, &_rej, &ifl); 3620 if (fd != -1) 3621 (void) close(fd); 3622 if (open_ret == S_ERROR) 3623 return (S_ERROR); 3624 3625 if (_rej.rej_type) { 3626 Conv_reject_desc_buf_t rej_buf; 3627 3628 ld_eprintf(ofl, ERR_WARNING, 3629 MSG_INTL(reject[_rej.rej_type]), 3630 _rej.rej_name ? rej.rej_name : 3631 MSG_INTL(MSG_STR_UNKNOWN), 3632 conv_reject_desc(&_rej, &rej_buf, 3633 ld_targ.t_m.m_mach)); 3634 } else 3635 sdf->sdf_file = ifl; 3636 } 3637 continue; 3638 } 3639 3640 /* 3641 * Now search for this file in any user defined directories. 3642 */ 3643 for (APLIST_TRAVERSE(ofl->ofl_ulibdirs, idx2, path)) { 3644 Rej_desc _rej = { 0 }; 3645 3646 ifl = process_req_lib(sdf, path, file, ofl, &_rej); 3647 if (ifl == (Ifl_desc *)S_ERROR) { 3648 return (S_ERROR); 3649 } 3650 if (_rej.rej_type) { 3651 if (rej.rej_type == 0) { 3652 rej = _rej; 3653 rej.rej_name = strdup(_rej.rej_name); 3654 } 3655 } 3656 if (ifl) { 3657 sdf->sdf_file = ifl; 3658 break; 3659 } 3660 } 3661 if (sdf->sdf_file) 3662 continue; 3663 3664 /* 3665 * Next use the local rules defined within the parent shared 3666 * object. 3667 */ 3668 if (sdf->sdf_rpath != NULL) { 3669 char *rpath, *next; 3670 3671 rpath = libld_malloc(strlen(sdf->sdf_rpath) + 1); 3672 if (rpath == NULL) 3673 return (S_ERROR); 3674 (void) strcpy(rpath, sdf->sdf_rpath); 3675 DBG_CALL(Dbg_libs_path(ofl->ofl_lml, rpath, 3676 LA_SER_RUNPATH, sdf->sdf_rfile)); 3677 if ((path = strtok_r(rpath, 3678 MSG_ORIG(MSG_STR_COLON), &next)) != NULL) { 3679 do { 3680 Rej_desc _rej = { 0 }; 3681 3682 path = expand(sdf->sdf_rfile, path, 3683 &next); 3684 3685 ifl = process_req_lib(sdf, path, 3686 file, ofl, &_rej); 3687 if (ifl == (Ifl_desc *)S_ERROR) { 3688 return (S_ERROR); 3689 } 3690 if ((_rej.rej_type) && 3691 (rej.rej_type == 0)) { 3692 rej = _rej; 3693 rej.rej_name = 3694 strdup(_rej.rej_name); 3695 } 3696 if (ifl) { 3697 sdf->sdf_file = ifl; 3698 break; 3699 } 3700 } while ((path = strtok_r(NULL, 3701 MSG_ORIG(MSG_STR_COLON), &next)) != NULL); 3702 } 3703 } 3704 if (sdf->sdf_file) 3705 continue; 3706 3707 /* 3708 * Finally try the default library search directories. 3709 */ 3710 for (APLIST_TRAVERSE(ofl->ofl_dlibdirs, idx2, path)) { 3711 Rej_desc _rej = { 0 }; 3712 3713 ifl = process_req_lib(sdf, path, file, ofl, &rej); 3714 if (ifl == (Ifl_desc *)S_ERROR) { 3715 return (S_ERROR); 3716 } 3717 if (_rej.rej_type) { 3718 if (rej.rej_type == 0) { 3719 rej = _rej; 3720 rej.rej_name = strdup(_rej.rej_name); 3721 } 3722 } 3723 if (ifl) { 3724 sdf->sdf_file = ifl; 3725 break; 3726 } 3727 } 3728 if (sdf->sdf_file) 3729 continue; 3730 3731 /* 3732 * If we've got this far we haven't found the shared object. 3733 * If an object was found, but was rejected for some reason, 3734 * print a diagnostic to that effect, otherwise generate a 3735 * generic "not found" diagnostic. 3736 */ 3737 if (rej.rej_type) { 3738 Conv_reject_desc_buf_t rej_buf; 3739 3740 ld_eprintf(ofl, ERR_WARNING, 3741 MSG_INTL(reject[rej.rej_type]), 3742 rej.rej_name ? rej.rej_name : 3743 MSG_INTL(MSG_STR_UNKNOWN), 3744 conv_reject_desc(&rej, &rej_buf, 3745 ld_targ.t_m.m_mach)); 3746 } else { 3747 ld_eprintf(ofl, ERR_WARNING, 3748 MSG_INTL(MSG_FIL_NOTFOUND), file, sdf->sdf_rfile); 3749 } 3750 } 3751 3752 /* 3753 * Finally, now that all objects have been input, make sure any version 3754 * requirements have been met. 3755 */ 3756 return (ld_vers_verify(ofl)); 3757 } 3758