xref: /titanic_41/usr/src/cmd/sgs/rtld/common/analyze.c (revision 91c7793e73e8fb0edb9c55f2828d2dfd8ff09994)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  *	Copyright (c) 1988 AT&T
24  *	  All Rights Reserved
25  *
26  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
27  * Use is subject to license terms.
28  */
29 #pragma ident	"%Z%%M%	%I%	%E% SMI"
30 
31 #include	"_synonyms.h"
32 
33 #include	<string.h>
34 #include	<stdio.h>
35 #include	<unistd.h>
36 #include	<sys/stat.h>
37 #include	<sys/mman.h>
38 #include	<fcntl.h>
39 #include	<limits.h>
40 #include	<dlfcn.h>
41 #include	<errno.h>
42 #include	<link.h>
43 #include	<debug.h>
44 #include	<conv.h>
45 #include	"_rtld.h"
46 #include	"_audit.h"
47 #include	"_elf.h"
48 #include	"msg.h"
49 
50 static Fct *	vector[] = {
51 	&elf_fct,
52 #ifdef A_OUT
53 	&aout_fct,
54 #endif
55 	0
56 };
57 
58 /*
59  * If a load filter flag is in effect, and this object is a filter, trigger the
60  * loading of all its filtees.  The load filter flag is in effect when creating
61  * configuration files, or when under the control of ldd(1), or the LD_LOADFLTR
62  * environment variable is set, or this object was built with the -zloadfltr
63  * flag.  Otherwise, filtee loading is deferred until triggered by a relocation.
64  */
65 static void
66 load_filtees(Rt_map *lmp)
67 {
68 	if ((FLAGS1(lmp) & MSK_RT_FILTER) &&
69 	    ((FLAGS(lmp) & FLG_RT_LOADFLTR) ||
70 	    (LIST(lmp)->lm_tflags & LML_TFLG_LOADFLTR))) {
71 		Dyninfo *	dip =  DYNINFO(lmp);
72 		uint_t		cnt, max = DYNINFOCNT(lmp);
73 		Slookup		sl;
74 
75 		sl.sl_name = 0;
76 		sl.sl_hash = 0;
77 		sl.sl_imap = sl.sl_cmap = lmp;
78 
79 		for (cnt = 0; cnt < max; cnt++, dip++) {
80 			if (((dip->di_flags & MSK_DI_FILTER) == 0) ||
81 			    ((dip->di_flags & FLG_DI_AUXFLTR) &&
82 			    (rtld_flags & RT_FL_NOAUXFLTR)))
83 				continue;
84 			(void) elf_lookup_filtee(&sl, 0, 0, cnt);
85 		}
86 	}
87 }
88 
89 /*
90  * Analyze one or more link-maps of a link map control list.  This routine is
91  * called at startup to continue the processing of the main executable.  It is
92  * also called each time a new set of objects are loaded, ie. from filters,
93  * lazy-loaded objects, or dlopen().
94  *
95  * In each instance we traverse the link-map control list starting with the
96  * initial object.  As dependencies are analyzed they are added to the link-map
97  * control list.  Thus the list grows as we traverse it - this results in the
98  * breadth first ordering of all needed objects.
99  */
100 int
101 analyze_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp)
102 {
103 	Rt_map	*lmp = nlmp;
104 	Lm_cntl	*nlmc;
105 	int	ret = 1;
106 
107 	/*
108 	 * If this link-map control list is being analyzed, return.  The object
109 	 * that has just been added will be picked up by the existing analysis
110 	 * thread.  Note, this is only really meaningful during process init-
111 	 * ialization, as objects are added to the main link-map control list.
112 	 * Following this initialization, each family of objects that are loaded
113 	 * are added to a new link-map control list.
114 	 */
115 	/* LINTED */
116 	nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
117 	if (nlmc->lc_flags & LMC_FLG_ANALYZING)
118 		return (1);
119 
120 	/*
121 	 * If this object doesn't belong to the present link-map control list
122 	 * then it must already have been analyzed, or it is in the process of
123 	 * being analyzed prior to us recursing into this analysis.  In either
124 	 * case, ignore the object as it's already being taken care of.
125 	 */
126 	if (nlmco != CNTL(nlmp))
127 		return (1);
128 
129 	nlmc->lc_flags |= LMC_FLG_ANALYZING;
130 
131 	for (; lmp; lmp = (Rt_map *)NEXT(lmp)) {
132 		if (FLAGS(lmp) &
133 		    (FLG_RT_ANALZING | FLG_RT_ANALYZED | FLG_RT_DELETE))
134 			continue;
135 
136 		/*
137 		 * Indicate that analyzing is under way.
138 		 */
139 		FLAGS(lmp) |= FLG_RT_ANALZING;
140 
141 		/*
142 		 * If this link map represents a relocatable object, then we
143 		 * need to finish the link-editing of the object at this point.
144 		 */
145 		if (FLAGS(lmp) & FLG_RT_OBJECT) {
146 			if (elf_obj_fini(lml, lmp) == 0) {
147 				if (lml->lm_flags & LML_FLG_TRC_ENABLE)
148 					continue;
149 				ret = 0;
150 				break;
151 			}
152 		}
153 
154 		DBG_CALL(Dbg_file_analyze(lmp));
155 
156 		/*
157 		 * Establish any dependencies this object requires.
158 		 */
159 		if (LM_NEEDED(lmp)(lml, nlmco, lmp) == 0) {
160 			if (lml->lm_flags & LML_FLG_TRC_ENABLE)
161 				continue;
162 			ret = 0;
163 			break;
164 		}
165 
166 		FLAGS(lmp) &= ~FLG_RT_ANALZING;
167 		FLAGS(lmp) |= FLG_RT_ANALYZED;
168 
169 		/*
170 		 * If we're building a configuration file, determine if this
171 		 * object is a filter and if so load its filtees.  This
172 		 * traversal is only necessary for crle(1), as typical use of
173 		 * an object will load filters as part of relocation processing.
174 		 */
175 		if (MODE(nlmp) & RTLD_CONFGEN)
176 			load_filtees(lmp);
177 
178 		/*
179 		 * If an interposer has been added, it will have been inserted
180 		 * in the link-map before the link we're presently analyzing.
181 		 * Break out of this analysis loop and return to the head of
182 		 * the link-map control list to analyze the interposer.  Note
183 		 * that this rescan preserves the breadth first loading of
184 		 * dependencies.
185 		 */
186 		/* LINTED */
187 		nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
188 		if (nlmc->lc_flags & LMC_FLG_REANALYZE) {
189 			nlmc->lc_flags &= ~LMC_FLG_REANALYZE;
190 			lmp = nlmc->lc_head;
191 		}
192 	}
193 
194 	/* LINTED */
195 	nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
196 	nlmc->lc_flags &= ~LMC_FLG_ANALYZING;
197 
198 	return (ret);
199 }
200 
201 /*
202  * Copy relocation test.  If the symbol definition is within .bss, then it's
203  * zero filled, and as the destination is within .bss, we can skip copying
204  * zero's to zero's.  However, if the destination object has a MOVE table, it's
205  * .bss might contain non-zero data, in which case copy it regardless.
206  */
207 static int
208 copy_zerobits(Rt_map *dlmp, Sym *dsym)
209 {
210 	if ((FLAGS(dlmp) & FLG_RT_MOVE) == 0) {
211 		Mmap	*mmaps;
212 		caddr_t	daddr = (caddr_t)dsym->st_value;
213 
214 		if ((FLAGS(dlmp) & FLG_RT_FIXED) == 0)
215 			daddr += ADDR(dlmp);
216 
217 		for (mmaps = MMAPS(dlmp); mmaps->m_vaddr; mmaps++) {
218 			if ((mmaps->m_fsize != mmaps->m_msize) &&
219 			    (daddr >= (mmaps->m_vaddr + mmaps->m_fsize)) &&
220 			    (daddr < (mmaps->m_vaddr + mmaps->m_msize)))
221 				return (1);
222 		}
223 	}
224 	return (0);
225 }
226 
227 /*
228  * Relocate an individual object.
229  */
230 static int
231 relocate_so(Lm_list *lml, Rt_map *lmp, int *relocated, int now)
232 {
233 	/*
234 	 * If we're running under ldd(1), and haven't been asked to trace any
235 	 * warnings, skip any actual relocation processing.
236 	 */
237 	if (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) ||
238 	    (lml->lm_flags & LML_FLG_TRC_WARN)) {
239 
240 		if (relocated)
241 			(*relocated)++;
242 
243 		if ((LM_RELOC(lmp)(lmp, now) == 0) &&
244 		    ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0))
245 			return (0);
246 	}
247 	return (1);
248 }
249 
250 /*
251  * Relocate the objects on a link-map control list.
252  */
253 static int
254 _relocate_lmc(Lm_list *lml, Rt_map *nlmp, int *relocated)
255 {
256 	Rt_map	*lmp;
257 
258 	for (lmp = nlmp; lmp; lmp = (Rt_map *)NEXT(lmp)) {
259 		/*
260 		 * If this object has already been relocated, we're done.  If
261 		 * this object is being deleted, skip it, there's probably a
262 		 * relocation error somewhere that's causing this deletion.
263 		 */
264 		if (FLAGS(lmp) &
265 		    (FLG_RT_RELOCING | FLG_RT_RELOCED | FLG_RT_DELETE))
266 			continue;
267 
268 		/*
269 		 * Indicate that relocation processing is under way.
270 		 */
271 		FLAGS(lmp) |= FLG_RT_RELOCING;
272 
273 		/*
274 		 * Relocate the object.
275 		 */
276 		if (relocate_so(lml, lmp, relocated, 0) == 0)
277 			return (0);
278 
279 		/*
280 		 * Indicate that the objects relocation is complete.
281 		 */
282 		FLAGS(lmp) &= ~FLG_RT_RELOCING;
283 		FLAGS(lmp) |= FLG_RT_RELOCED;
284 
285 		/*
286 		 * Mark this object's init is available for harvesting.  Under
287 		 * ldd(1) this marking is necessary for -i (tsort) gathering.
288 		 */
289 		lml->lm_init++;
290 		lml->lm_flags |= LML_FLG_OBJADDED;
291 
292 		/*
293 		 * Process any move data (not necessary under ldd()).
294 		 */
295 		if ((FLAGS(lmp) & FLG_RT_MOVE) &&
296 		    ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0))
297 			move_data(lmp);
298 
299 		/*
300 		 * Determine if this object is a filter, and if a load filter
301 		 * flag is in effect, trigger the loading of all its filtees.
302 		 */
303 		load_filtees(lmp);
304 	}
305 
306 	/*
307 	 * Perform special copy relocations.  These are only meaningful for
308 	 * dynamic executables (fixed and head of their link-map list).  If
309 	 * this ever has to change then the infrastructure of COPY() has to
310 	 * change as presently this element is used to capture both receiver
311 	 * and supplier of copy data.
312 	 */
313 	if ((FLAGS(nlmp) & FLG_RT_FIXED) && (nlmp == LIST(nlmp)->lm_head) &&
314 	    (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) ||
315 	    (lml->lm_flags & LML_FLG_TRC_WARN))) {
316 		Rt_map **	lmpp;
317 		Aliste		off1;
318 		Word		tracing;
319 
320 #if	defined(__sparc) || defined(__amd64)
321 /* XX64 don't need this once the compilers are fixed */
322 #elif	defined(i386)
323 		if (elf_copy_gen(nlmp) == 0)
324 			return (0);
325 #endif
326 
327 		if (COPY(nlmp) == 0)
328 			return (1);
329 
330 		if ((LIST(nlmp)->lm_flags & LML_FLG_TRC_ENABLE) &&
331 		    (((rtld_flags & RT_FL_SILENCERR) == 0) ||
332 		    (LIST(nlmp)->lm_flags & LML_FLG_TRC_VERBOSE)))
333 			tracing = 1;
334 		else
335 			tracing = 0;
336 
337 		DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD));
338 
339 		for (ALIST_TRAVERSE(COPY(nlmp), off1, lmpp)) {
340 			Rt_map *	lmp = *lmpp;
341 			Rel_copy *	rcp;
342 			Aliste		off2;
343 
344 			for (ALIST_TRAVERSE(COPY(lmp), off2, rcp)) {
345 				int zero;
346 
347 				/*
348 				 * Only copy the bits if it's from non-zero
349 				 * filled memory.
350 				 */
351 				zero = copy_zerobits(rcp->r_dlmp, rcp->r_dsym);
352 				DBG_CALL(Dbg_reloc_copy(rcp->r_dlmp, nlmp,
353 				    rcp->r_name, zero));
354 				if (zero)
355 					continue;
356 
357 				(void) memcpy(rcp->r_radd, rcp->r_dadd,
358 				    rcp->r_size);
359 
360 				if ((tracing == 0) || ((FLAGS1(rcp->r_dlmp) &
361 				    FL1_RT_DISPREL) == 0))
362 					continue;
363 
364 				(void) printf(MSG_INTL(MSG_LDD_REL_CPYDISP),
365 				    demangle(rcp->r_name), NAME(rcp->r_dlmp));
366 			}
367 		}
368 
369 		DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD));
370 
371 		free(COPY(nlmp));
372 		COPY(nlmp) = 0;
373 	}
374 	return (1);
375 }
376 
377 int
378 relocate_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp)
379 {
380 	int	lret = 1, pret = 1;
381 	Alist	*alp;
382 	Aliste	plmco;
383 	Lm_cntl	*plmc, *nlmc;
384 
385 	/*
386 	 * If this link-map control list is being relocated, return.  The object
387 	 * that has just been added will be picked up by the existing relocation
388 	 * thread.  Note, this is only really meaningful during process init-
389 	 * ialization, as objects are added to the main link-map control list.
390 	 * Following this initialization, each family of objects that are loaded
391 	 * are added to a new link-map control list.
392 	 */
393 	/* LINTED */
394 	nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
395 
396 	if (nlmc->lc_flags & LMC_FLG_RELOCATING)
397 		return (1);
398 
399 	nlmc->lc_flags |= LMC_FLG_RELOCATING;
400 
401 	/*
402 	 * Relocate one or more link-maps of a link map control list.  If this
403 	 * object doesn't belong to the present link-map control list then it
404 	 * must already have been relocated, or it is in the process of being
405 	 * relocated prior to us recursing into this relocation.  In either
406 	 * case, ignore the object as it's already being taken care of, however,
407 	 * fall through and capture any relocation promotions that might have
408 	 * been established from the reference mode of this object.
409 	 *
410 	 * If we're generating a configuration file using crle(1), two passes
411 	 * may be involved.  Under the first pass, RTLD_CONFGEN is set.  Under
412 	 * this pass, crle() loads objects into the process address space.  No
413 	 * relocation is necessary at this point, we simply need to analyze the
414 	 * objects to insure any directly bound dependencies, filtees, etc.
415 	 * get loaded. Although we skip the relocation, fall through to insure
416 	 * any control lists are maintained appropriately.
417 	 *
418 	 * If objects are to be dldump(3c)'ed, crle(1) makes a second pass,
419 	 * using RTLD_NOW and RTLD_CONFGEN.  The RTLD_NOW effectively carries
420 	 * out the relocations of all loaded objects.
421 	 */
422 	if ((nlmco == CNTL(nlmp)) &&
423 	    ((MODE(nlmp) & (RTLD_NOW | RTLD_CONFGEN)) != RTLD_CONFGEN)) {
424 		int	relocated = 0;
425 
426 		/*
427 		 * Determine whether the initial link-map control list has
428 		 * started relocation.  From this point, should any interposing
429 		 * objects be added to this link-map control list, the objects
430 		 * are demoted to standard objects.  Their interposition can't
431 		 * be guaranteed once relocations have been carried out.
432 		 */
433 		if (nlmco == ALO_DATA)
434 			lml->lm_flags |= LML_FLG_STARTREL;
435 
436 		/*
437 		 * Relocate the link-map control list.
438 		 */
439 		lret = _relocate_lmc(lml, nlmp, &relocated);
440 	}
441 
442 	/*
443 	 * Determine the new, and previous link-map control lists.
444 	 */
445 	/* LINTED */
446 	nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
447 	if (nlmco == ALO_DATA) {
448 		plmco = nlmco;
449 		plmc = nlmc;
450 	} else {
451 		plmco = nlmco - lml->lm_lists->al_size;
452 		/* LINTED */
453 		plmc = (Lm_cntl *)((char *)lml->lm_lists + plmco);
454 	}
455 
456 	/*
457 	 * Having completed this control list of objects, they can now be bound
458 	 * to from other objects.  Move this control list to the control list
459 	 * that precedes it.  Although this control list may have only bound to
460 	 * controls lists much higher up the control list stack, it must only
461 	 * be moved up one control list so as to preserve the link-map order
462 	 * that may have already been traversed in search of symbols.
463 	 */
464 	if (lret && (nlmco != ALO_DATA) && nlmc->lc_head)
465 		lm_move(lml, nlmco, plmco, nlmc, plmc);
466 
467 	/*
468 	 * Determine whether existing objects that have already been relocated,
469 	 * need any additional relocations performed.  This can occur when new
470 	 * objects are loaded with RTLD_NOW, and these new objects have
471 	 * dependencies on objects that are already loaded.  Note, that we peel
472 	 * any relocation promotions off of one control list at a time.  This
473 	 * prevents relocations from being bound to objects that might yet fail
474 	 * to relocate themselves.
475 	 */
476 	while ((alp = plmc->lc_now) != 0) {
477 		Aliste	off;
478 		Rt_map	**lmpp;
479 
480 		/*
481 		 * Remove the relocation promotion list, as performing more
482 		 * relocations may result in discovering more objects that need
483 		 * promotion.
484 		 */
485 		plmc->lc_now = 0;
486 
487 		for (ALIST_TRAVERSE(alp, off, lmpp)) {
488 			Rt_map	*lmp = *lmpp;
489 
490 			/*
491 			 * If the original relocation of the link-map control
492 			 * list failed, or one of the relocation promotions of
493 			 * this loop has failed, demote any pending objects
494 			 * relocation mode.
495 			 */
496 			if ((lret == 0) || (pret == 0)) {
497 				MODE(lmp) &= ~RTLD_NOW;
498 				MODE(lmp) |= RTLD_LAZY;
499 				continue;
500 			}
501 
502 			/*
503 			 * If a relocation fails, save the error condition.
504 			 * It's possible that all new objects on the original
505 			 * link-map control list have been relocated
506 			 * successfully, but if the user request requires
507 			 * promoting objects that have already been loaded, we
508 			 * have to indicate that this operation couldn't be
509 			 * performed.  The unrelocated objects are in use on
510 			 * another control list, and may continue to be used.
511 			 * If the .plt that resulted in the error is called,
512 			 * then the process will receive a fatal error at that
513 			 * time.  But, the .plt may never be called.
514 			 */
515 			if (relocate_so(lml, lmp, 0, 1) == 0)
516 				pret = 0;
517 		}
518 
519 		/*
520 		 * Having promoted any objects, determine whether additional
521 		 * dependencies were added, and if so move them to the previous
522 		 * link-map control list.
523 		 */
524 		/* LINTED */
525 		nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
526 		/* LINTED */
527 		plmc = (Lm_cntl *)((char *)lml->lm_lists + plmco);
528 		if ((nlmco != ALO_DATA) && nlmc->lc_head)
529 			lm_move(lml, nlmco, plmco, nlmc, plmc);
530 		(void) free(alp);
531 	}
532 
533 	/*
534 	 * Indicate that relocations are no longer active for this control list.
535 	 */
536 	/* LINTED */
537 	nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco);
538 	nlmc->lc_flags &= ~LMC_FLG_RELOCATING;
539 
540 	if (lret && pret)
541 		return (1);
542 	else
543 		return (0);
544 }
545 
546 /*
547  * Inherit the first rejection message for possible later diagnostics.
548  *
549  * Any attempt to process a file that is unsuccessful, should be accompanied
550  * with an error diagnostic.  However, some operations like searching for a
551  * simple filename, involve trying numerous paths, and an error message for each
552  * lookup is not required.  Although a multiple search can fail, it's possible
553  * that a file was found, but was rejected because it was the wrong type.
554  * To satisfy these possibilities, the first failure is recorded as a rejection
555  * message, and this message is used later for a more specific diagnostic.
556  *
557  * File searches are focused at load_one(), and from here a rejection descriptor
558  * is passed down to various child routines.  If these child routines can
559  * process multiple files, then they will maintain their own rejection desc-
560  * riptor.  This is filled in for any failures, and a diagnostic produced to
561  * reflect the failure.  The child routines then employ rejection_inherit() to
562  * pass the first rejection message back to load_one().
563  *
564  * Note that the name, and rejection string must be duplicated, as the name
565  * buffer and error string buffer (see conv_ routines) may be reused for
566  * additional processing or rejection messages.
567  *
568  * As this routine is called to clean up after a failed open, remove any
569  * resolved pathname that might have been allocated as the file was processed.
570  */
571 void
572 rejection_inherit(Rej_desc *rej1, Rej_desc *rej2, Fdesc *fdp)
573 {
574 	if (rej2->rej_type && (rej1->rej_type == 0)) {
575 		rej1->rej_type = rej2->rej_type;
576 		rej1->rej_info = rej2->rej_info;
577 		rej1->rej_flag = rej2->rej_flag;
578 		if (rej2->rej_name)
579 			rej1->rej_name = strdup(rej2->rej_name);
580 		if (rej2->rej_str) {
581 			if ((rej1->rej_str = strdup(rej2->rej_str)) == 0)
582 				rej1->rej_str = MSG_ORIG(MSG_EMG_ENOMEM);
583 		}
584 	}
585 	if (fdp && fdp->fd_nname && fdp->fd_pname &&
586 	    (fdp->fd_pname != fdp->fd_nname)) {
587 		free((void *)fdp->fd_pname);
588 		fdp->fd_pname = 0;
589 	}
590 }
591 
592 /*
593  * Determine the object type of a file.
594  */
595 Fct *
596 are_u_this(Rej_desc *rej, int fd, struct stat *status, const char *name)
597 {
598 	int	i;
599 	char	*maddr = 0;
600 
601 	fmap->fm_fsize = status->st_size;
602 
603 	/*
604 	 * If this is a directory (which can't be mmap()'ed) generate a precise
605 	 * error message.
606 	 */
607 	if ((status->st_mode & S_IFMT) == S_IFDIR) {
608 		rej->rej_type = SGS_REJ_STR;
609 		rej->rej_str = strerror(EISDIR);
610 		return (0);
611 	}
612 
613 	/*
614 	 * Map in the first page of the file.  When this buffer is first used,
615 	 * the mapping is a single system page.  This is typically enough to
616 	 * inspect the ehdr and phdrs of the file, and can be reused for each
617 	 * file that get loaded.  If a larger mapping is required to read the
618 	 * ehdr and phdrs, a new mapping is created (see elf_map_it()).  This
619 	 * new mapping is again used for each new file loaded.  Some objects,
620 	 * such as filters, only take up one page, and in this case this mapping
621 	 * will suffice for the file.
622 	 */
623 	maddr = mmap(fmap->fm_maddr, fmap->fm_msize, (PROT_READ | PROT_EXEC),
624 	    fmap->fm_mflags, fd, 0);
625 #if defined(MAP_ALIGN)
626 	if ((maddr == MAP_FAILED) && (errno == EINVAL)) {
627 		/*
628 		 * If the mapping failed, and we used MAP_ALIGN, assume we're
629 		 * on a system that doesn't support this option.  Try again
630 		 * without MAP_ALIGN.
631 		 */
632 		if (fmap->fm_mflags & MAP_ALIGN) {
633 			rtld_flags2 |= RT_FL2_NOMALIGN;
634 			fmap_setup();
635 
636 			maddr = (char *)mmap(fmap->fm_maddr, fmap->fm_msize,
637 			    (PROT_READ | PROT_EXEC), fmap->fm_mflags, fd, 0);
638 		}
639 	}
640 #endif
641 	if (maddr == MAP_FAILED) {
642 		rej->rej_type = SGS_REJ_STR;
643 		rej->rej_str = strerror(errno);
644 		return (0);
645 	}
646 
647 	/*
648 	 * From now on we will re-use fmap->fm_maddr as the mapping address
649 	 * so we augment the flags with MAP_FIXED and drop any MAP_ALIGN.
650 	 */
651 	fmap->fm_maddr = maddr;
652 	fmap->fm_mflags |= MAP_FIXED;
653 #if defined(MAP_ALIGN)
654 	fmap->fm_mflags &= ~MAP_ALIGN;
655 #endif
656 
657 	/*
658 	 * Search through the object vectors to determine what kind of
659 	 * object we have.
660 	 */
661 	for (i = 0; vector[i]; i++) {
662 		if ((vector[i]->fct_are_u_this)(rej))
663 			return (vector[i]);
664 		else if (rej->rej_type) {
665 			Rt_map	*lmp;
666 
667 			/*
668 			 * If this object is an explicitly defined shared
669 			 * object under inspection by ldd, and contains a
670 			 * incompatible hardware capabilities requirement, then
671 			 * inform the user, but continue processing.
672 			 *
673 			 * XXXX - ldd -v for any rej failure.
674 			 */
675 			if ((rej->rej_type == SGS_REJ_HWCAP_1) &&
676 			    (lml_main.lm_flags & LML_FLG_TRC_LDDSTUB) &&
677 			    ((lmp = lml_main.lm_head) != 0) &&
678 			    (FLAGS1(lmp) & FL1_RT_LDDSTUB) &&
679 			    (NEXT(lmp) == 0)) {
680 				(void) printf(MSG_INTL(MSG_LDD_GEN_HWCAP_1),
681 				    name, rej->rej_str);
682 				return (vector[i]);
683 			}
684 			return (0);
685 		}
686 	}
687 
688 	/*
689 	 * Unknown file type.
690 	 */
691 	rej->rej_type = SGS_REJ_UNKFILE;
692 	return (0);
693 }
694 
695 
696 /*
697  * Function that determines whether a file name has already been loaded; if so,
698  * returns a pointer to its link map structure; else returns a NULL pointer.
699  */
700 static int
701 _is_so_matched(const char *name, const char *str, int base)
702 {
703 	const char	*_str;
704 
705 	if (base && ((_str = strrchr(str, '/')) != NULL))
706 		_str++;
707 	else
708 		_str = str;
709 
710 	return (strcmp(name, _str));
711 }
712 
713 static Rt_map *
714 is_so_matched(Rt_map *lmp, const char *name, int base)
715 {
716 	Aliste		off;
717 	const char	**cpp;
718 
719 	/*
720 	 * Typically, dependencies are specified as simple file names
721 	 * (DT_NEEDED == libc.so.1), which are expanded to full pathnames to
722 	 * open the file.  The full pathname is NAME(), and the original name
723 	 * is maintained on the ALIAS() list. Look through the ALIAS list first,
724 	 * as this is most likely to match other dependency uses.
725 	 */
726 	for (ALIST_TRAVERSE(ALIAS(lmp), off, cpp)) {
727 		if (_is_so_matched(name, *cpp, base) == 0)
728 			return (lmp);
729 	}
730 
731 	/*
732 	 * Finally compare full paths, this is sometimes useful for catching
733 	 * filter names, or for those that dlopen() the dynamic executable.
734 	 */
735 	if (_is_so_matched(name, NAME(lmp), base) == 0)
736 		return (lmp);
737 
738 	if (PATHNAME(lmp) != NAME(lmp)) {
739 		if (_is_so_matched(name, PATHNAME(lmp), base) == 0)
740 			return (lmp);
741 	}
742 	return (0);
743 }
744 
745 Rt_map *
746 is_so_loaded(Lm_list *lml, const char *name, int base)
747 {
748 	Rt_map		*lmp;
749 	const char	*_name;
750 	avl_index_t	where;
751 	Lm_cntl		*lmc;
752 	Aliste		off;
753 
754 	/*
755 	 * If we've been asked to do a basename search, first determine if
756 	 * the pathname is registered in the FullpathNode AVL tree.
757 	 */
758 	if (base && (name[0] == '/') &&
759 	    ((lmp = fpavl_loaded(lml, name, &where)) != NULL) &&
760 	    ((FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) == 0))
761 		return (lmp);
762 
763 	/*
764 	 * If we've been asked to do a basename search reduce the input name
765 	 * to its basename.
766 	 */
767 	if (base && ((_name = strrchr(name, '/')) != NULL))
768 		_name++;
769 	else
770 		_name = name;
771 
772 	/*
773 	 * Loop through the callers link-map lists.
774 	 */
775 	for (ALIST_TRAVERSE(lml->lm_lists, off, lmc)) {
776 		for (lmp = lmc->lc_head; lmp; lmp = (Rt_map *)NEXT(lmp)) {
777 			if (FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE))
778 				continue;
779 
780 			if (is_so_matched(lmp, _name, base))
781 				return (lmp);
782 		}
783 	}
784 	return ((Rt_map *)0);
785 }
786 
787 
788 /*
789  * Tracing is enabled by the LD_TRACE_LOADED_OPTIONS environment variable which
790  * is normally set from ldd(1).  For each link map we load, print the load name
791  * and the full pathname of the shared object.
792  */
793 /* ARGSUSED4 */
794 static void
795 trace_so(Rt_map *clmp, Rej_desc *rej, const char *name, const char *path,
796     int alter, const char *nfound)
797 {
798 	const char	*str = MSG_ORIG(MSG_STR_EMPTY);
799 	const char	*reject = MSG_ORIG(MSG_STR_EMPTY);
800 	char		_reject[PATH_MAX];
801 
802 	/*
803 	 * The first time through trace_so() will only have lddstub on the
804 	 * link-map list and the preloaded shared object is supplied as "path".
805 	 * As we don't want to print this shared object as a dependency, but
806 	 * instead inspect *its* dependencies, return.
807 	 */
808 	if (FLAGS1(clmp) & FL1_RT_LDDSTUB)
809 		return;
810 
811 	/*
812 	 * Without any rejection info, this is a supplied not-found condition.
813 	 */
814 	if (rej && (rej->rej_type == 0)) {
815 		(void) printf(nfound, name);
816 		return;
817 	}
818 
819 	/*
820 	 * If rejection information exists then establish what object was
821 	 * found and the reason for its rejection.
822 	 */
823 	if (rej) {
824 		/* LINTED */
825 		(void) snprintf(_reject, PATH_MAX,
826 		    MSG_INTL(ldd_reject[rej->rej_type]), conv_reject_desc(rej));
827 		if (rej->rej_name)
828 			path = rej->rej_name;
829 		reject = (char *)_reject;
830 
831 		/*
832 		 * Was an alternative pathname defined (from a configuration
833 		 * file).
834 		 */
835 		if (rej->rej_flag & FLG_FD_ALTER)
836 			str = MSG_INTL(MSG_LDD_FIL_ALTER);
837 	} else {
838 		if (alter)
839 			str = MSG_INTL(MSG_LDD_FIL_ALTER);
840 	}
841 
842 	/*
843 	 * If the load name isn't a full pathname print its associated pathname
844 	 * together with all the other information we've gathered.
845 	 */
846 	if (*name == '/')
847 	    (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), path, str, reject);
848 	else
849 	    (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), name, path, str, reject);
850 }
851 
852 
853 /*
854  * Establish a link-map mode, initializing it if it has just been loaded, or
855  * potentially updating it if it already exists.
856  */
857 int
858 update_mode(Rt_map *lmp, int omode, int nmode)
859 {
860 	Lm_list	*lml = LIST(lmp);
861 	int	pmode = 0;
862 
863 	/*
864 	 * A newly loaded object hasn't had its mode set yet.  Modes are used to
865 	 * load dependencies, so don't propagate any parent or no-load flags, as
866 	 * these would adversely affect this objects ability to load any of its
867 	 * dependencies that aren't already loaded.  RTLD_FIRST is applicable to
868 	 * this objects handle creation only, and should not be propagated.
869 	 */
870 	if ((FLAGS(lmp) & FLG_RT_MODESET) == 0) {
871 		MODE(lmp) |= nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST);
872 		FLAGS(lmp) |= FLG_RT_MODESET;
873 		return (1);
874 	}
875 
876 	/*
877 	 * Establish any new overriding modes.  RTLD_LAZY and RTLD_NOW should be
878 	 * represented individually (this is historic, as these two flags were
879 	 * the only flags originally available to dlopen()).  Other flags are
880 	 * accumulative, but have a hierarchy of preference.
881 	 */
882 	if ((omode & RTLD_LAZY) && (nmode & RTLD_NOW)) {
883 		MODE(lmp) &= ~RTLD_LAZY;
884 		pmode |= RTLD_NOW;
885 	}
886 
887 	pmode |= ((~omode & nmode) &
888 	    (RTLD_GLOBAL | RTLD_WORLD | RTLD_NODELETE));
889 	if (pmode) {
890 		DBG_CALL(Dbg_file_mode_promote(lmp, pmode));
891 		MODE(lmp) |= pmode;
892 	}
893 
894 	/*
895 	 * If this load is an RTLD_NOW request and the object has already been
896 	 * loaded non-RTLD_NOW, append this object to the relocation-now list
897 	 * of the objects associated control list.  Note, if the object hasn't
898 	 * yet been relocated, setting its MODE() to RTLD_NOW will establish
899 	 * full relocation processing when it eventually gets relocated.
900 	 */
901 	if ((pmode & RTLD_NOW) &&
902 	    (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))) {
903 		Lm_cntl	*lmc;
904 
905 		/* LINTED */
906 		lmc = (Lm_cntl *)((char *)(LIST(lmp)->lm_lists) + CNTL(lmp));
907 		(void) alist_append(&(lmc->lc_now), &lmp, sizeof (Rt_map *),
908 		    AL_CNT_LMNOW);
909 	}
910 
911 #ifdef	SIEBEL_DISABLE
912 	/*
913 	 * For patch backward compatibility the following .init collection
914 	 * is disabled.
915 	 */
916 	if (rtld_flags & RT_FL_DISFIX_1)
917 		return (pmode);
918 #endif
919 
920 	/*
921 	 * If this objects .init has been collected but has not yet been called,
922 	 * it may be necessary to reevaluate the object using tsort().  For
923 	 * example, a new dlopen() hierarchy may bind to uninitialized objects
924 	 * that are already loaded, or a dlopen(RTLD_NOW) can establish new
925 	 * bindings between already loaded objects that require the tsort()
926 	 * information be recomputed.  If however, no new objects have been
927 	 * added to the process, and this object hasn't been promoted, don't
928 	 * bother reevaluating the .init.  The present tsort() information is
929 	 * probably as accurate as necessary, and by not establishing a parallel
930 	 * tsort() we can help reduce the amount of recursion possible between
931 	 * .inits.
932 	 */
933 	if (((FLAGS(lmp) &
934 	    (FLG_RT_INITCLCT | FLG_RT_INITCALL)) == FLG_RT_INITCLCT) &&
935 	    ((lml->lm_flags & LML_FLG_OBJADDED) || ((pmode & RTLD_NOW) &&
936 	    (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))))) {
937 		FLAGS(lmp) &= ~FLG_RT_INITCLCT;
938 		LIST(lmp)->lm_init++;
939 		LIST(lmp)->lm_flags |= LML_FLG_OBJREEVAL;
940 	}
941 
942 	return (pmode);
943 }
944 
945 /*
946  * Determine whether an alias name already exists, and if not create one.  This
947  * is typically used to retain dependency names, such as "libc.so.1", which
948  * would have been expanded to full path names when they were loaded.  The
949  * full path names (NAME() and possibly PATHNAME()) are maintained as Fullpath
950  * AVL nodes, and thus would have been matched by fpavl_loaded() during
951  * file_open().
952  */
953 int
954 append_alias(Rt_map *lmp, const char *str, int *added)
955 {
956 	Aliste	off;
957 	char	**cpp, *cp;
958 
959 	/*
960 	 * Determine if this filename is already on the alias list.
961 	 */
962 	for (ALIST_TRAVERSE(ALIAS(lmp), off, cpp)) {
963 		if (strcmp(*cpp, str) == 0)
964 			return (1);
965 	}
966 
967 	/*
968 	 * This is a new alias, append it to the alias list.
969 	 */
970 	if ((cp = strdup(str)) == 0)
971 		return (0);
972 
973 	if (alist_append(&ALIAS(lmp), &cp, sizeof (char *),
974 	    AL_CNT_ALIAS) == 0) {
975 		free(cp);
976 		return (0);
977 	}
978 	if (added)
979 		*added = 1;
980 	return (1);
981 }
982 
983 /*
984  * Determine whether a file is already loaded by comparing device and inode
985  * values.
986  */
987 static Rt_map *
988 is_devinode_loaded(struct stat *status, Lm_list *lml, const char *name,
989     uint_t flags)
990 {
991 	Lm_cntl	*lmc;
992 	Aliste	off;
993 
994 	/*
995 	 * If this is an auditor, it will have been opened on a new link-map.
996 	 * To prevent multiple occurrances of the same auditor on multiple
997 	 * link-maps, search the head of each link-map list and see if this
998 	 * object is already loaded as an auditor.
999 	 */
1000 	if (flags & FLG_RT_AUDIT) {
1001 		Lm_list *	lml;
1002 		Listnode *	lnp;
1003 
1004 		for (LIST_TRAVERSE(&dynlm_list, lnp, lml)) {
1005 			Rt_map	*nlmp = lml->lm_head;
1006 
1007 			if (nlmp && ((FLAGS(nlmp) &
1008 			    (FLG_RT_AUDIT | FLG_RT_DELETE)) == FLG_RT_AUDIT) &&
1009 			    (STDEV(nlmp) == status->st_dev) &&
1010 			    (STINO(nlmp) == status->st_ino))
1011 				return (nlmp);
1012 		}
1013 		return ((Rt_map *)0);
1014 	}
1015 
1016 	/*
1017 	 * If the file has been found determine from the new files status
1018 	 * information if this file is actually linked to one we already have
1019 	 * mapped.  This catches symlink names not caught by is_so_loaded().
1020 	 */
1021 	for (ALIST_TRAVERSE(lml->lm_lists, off, lmc)) {
1022 		Rt_map	*nlmp;
1023 
1024 		for (nlmp = lmc->lc_head; nlmp; nlmp = (Rt_map *)NEXT(nlmp)) {
1025 			if ((FLAGS(nlmp) & FLG_RT_DELETE) ||
1026 			    (FLAGS1(nlmp) & FL1_RT_LDDSTUB))
1027 				continue;
1028 
1029 			if ((STDEV(nlmp) != status->st_dev) ||
1030 			    (STINO(nlmp) != status->st_ino))
1031 				continue;
1032 
1033 			if (lml->lm_flags & LML_FLG_TRC_VERBOSE) {
1034 				if (*name == '/')
1035 				    (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH),
1036 					name, MSG_ORIG(MSG_STR_EMPTY),
1037 					MSG_ORIG(MSG_STR_EMPTY));
1038 				else
1039 				    (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV),
1040 					name, NAME(nlmp),
1041 					MSG_ORIG(MSG_STR_EMPTY),
1042 					MSG_ORIG(MSG_STR_EMPTY));
1043 			}
1044 			return (nlmp);
1045 		}
1046 	}
1047 	return ((Rt_map *)0);
1048 }
1049 
1050 /*
1051  * Generate any error messages indicating a file could not be found.  When
1052  * preloading or auditing a secure application, it can be a little more helpful
1053  * to indicate that a search of secure directories has failed, so adjust the
1054  * messages accordingly.
1055  */
1056 void
1057 file_notfound(Lm_list *lml, const char *name, Rt_map *clmp, uint_t flags,
1058     Rej_desc * rej)
1059 {
1060 	int	secure = 0;
1061 
1062 	if ((rtld_flags & RT_FL_SECURE) &&
1063 	    (flags & (FLG_RT_PRELOAD | FLG_RT_AUDIT)))
1064 		secure++;
1065 
1066 	if (lml->lm_flags & LML_FLG_TRC_ENABLE) {
1067 		/*
1068 		 * Under ldd(1), auxiliary filtees that can't be loaded are
1069 		 * ignored, unless verbose errors are requested.
1070 		 */
1071 		if ((rtld_flags & RT_FL_SILENCERR) &&
1072 		    ((lml->lm_flags & LML_FLG_TRC_VERBOSE) == 0))
1073 			return;
1074 
1075 		if (secure)
1076 			trace_so(clmp, rej, name, 0, 0,
1077 			    MSG_INTL(MSG_LDD_SEC_NFOUND));
1078 		else
1079 			trace_so(clmp, rej, name, 0, 0,
1080 			    MSG_INTL(MSG_LDD_FIL_NFOUND));
1081 		return;
1082 	}
1083 
1084 	if (rej->rej_type) {
1085 		eprintf(lml, ERR_FATAL, MSG_INTL(err_reject[rej->rej_type]),
1086 		    rej->rej_name ? rej->rej_name : MSG_INTL(MSG_STR_UNKNOWN),
1087 		    conv_reject_desc(rej));
1088 		return;
1089 	}
1090 
1091 	if (secure)
1092 		eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SEC_OPEN), name);
1093 	else
1094 		eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), name,
1095 		    strerror(ENOENT));
1096 }
1097 
1098 static int
1099 file_open(int err, Lm_list *lml, const char *oname, const char *nname,
1100     Rt_map *clmp, uint_t flags, Fdesc * fdesc, Rej_desc *rej)
1101 {
1102 	struct stat	status;
1103 	Rt_map		*nlmp;
1104 
1105 	fdesc->fd_oname = oname;
1106 
1107 	if ((err == 0) && (fdesc->fd_flags & FLG_FD_ALTER))
1108 		DBG_CALL(Dbg_file_config_obj(lml, oname, 0, nname));
1109 
1110 	/*
1111 	 * If we're dealing with a full pathname, determine whether this
1112 	 * pathname is already known.  Other pathnames fall through to the
1113 	 * dev/inode check, as even though the pathname may look the same as
1114 	 * one previously used, the process may have changed directory.
1115 	 */
1116 	if ((err == 0) && (nname[0] == '/')) {
1117 		if ((nlmp = fpavl_loaded(lml, nname,
1118 		    &(fdesc->fd_avlwhere))) != NULL) {
1119 			fdesc->fd_nname = nname;
1120 			fdesc->fd_lmp = nlmp;
1121 			return (1);
1122 		}
1123 	}
1124 
1125 	if ((err == 0) && ((stat(nname, &status)) != -1)) {
1126 		char	path[PATH_MAX];
1127 		int	fd, size, added;
1128 
1129 		/*
1130 		 * If this path has been constructed as part of expanding a
1131 		 * HWCAP directory, ignore any subdirectories.  For any other
1132 		 * reference that expands to a directory, fall through to
1133 		 * contruct a meaningful rejection message.
1134 		 */
1135 		if ((flags & FLG_RT_HWCAP) &&
1136 		    ((status.st_mode & S_IFMT) == S_IFDIR))
1137 			return (0);
1138 
1139 		/*
1140 		 * Resolve the filename and determine whether the resolved name
1141 		 * is already known.  Typically, the previous fpavl_loaded()
1142 		 * will have caught this, as both NAME() and PATHNAME() for a
1143 		 * link-map are recorded in the FullNode AVL tree.  However,
1144 		 * instances exist where a file can be replaced (loop-back
1145 		 * mounts, bfu, etc.), and reference is made to the original
1146 		 * file through a symbolic link.  By checking the pathname here,
1147 		 * we don't fall through to the dev/inode check and conclude
1148 		 * that a new file should be loaded.
1149 		 */
1150 		if ((nname[0] == '/') && (rtld_flags & RT_FL_EXECNAME) &&
1151 		    ((size = resolvepath(nname, path, (PATH_MAX - 1))) > 0)) {
1152 			path[size] = '\0';
1153 
1154 			if (strcmp(nname, path)) {
1155 				if ((nlmp =
1156 				    fpavl_loaded(lml, path, 0)) != NULL) {
1157 					added = 0;
1158 
1159 					if (append_alias(nlmp, nname,
1160 					    &added) == 0)
1161 						return (0);
1162 					if (added)
1163 					    DBG_CALL(Dbg_file_skip(LIST(clmp),
1164 						NAME(nlmp), nname));
1165 					fdesc->fd_nname = nname;
1166 					fdesc->fd_lmp = nlmp;
1167 					return (1);
1168 				}
1169 
1170 				/*
1171 				 * If this pathname hasn't been loaded, save
1172 				 * the resolved pathname so that it doesn't
1173 				 * have to be recomputed as part of fullpath()
1174 				 * processing.
1175 				 */
1176 				if ((fdesc->fd_pname = strdup(path)) == 0)
1177 					return (0);
1178 			} else {
1179 				/*
1180 				 * If the resolved name doesn't differ from the
1181 				 * original, save it without duplication.
1182 				 * Having fd_pname set indicates that no further
1183 				 * resolvepath processing is necessary.
1184 				 */
1185 				fdesc->fd_pname = nname;
1186 			}
1187 		}
1188 
1189 		if (nlmp = is_devinode_loaded(&status, lml, nname, flags)) {
1190 			added = 0;
1191 
1192 			if (append_alias(nlmp, nname, &added) == 0)
1193 				return (0);
1194 			if (added) {
1195 				if ((nname[0] == '/') && (fpavl_insert(lml,
1196 				    nlmp, nname, 0) == 0))
1197 					return (0);
1198 				DBG_CALL(Dbg_file_skip(LIST(clmp), NAME(nlmp),
1199 				    nname));
1200 			}
1201 			fdesc->fd_nname = nname;
1202 			fdesc->fd_lmp = nlmp;
1203 			return (1);
1204 		}
1205 
1206 		if ((fd = open(nname, O_RDONLY, 0)) == -1) {
1207 			/*
1208 			 * As the file must exist for the previous stat() to
1209 			 * have succeeded, record the error condition.
1210 			 */
1211 			rej->rej_type = SGS_REJ_STR;
1212 			rej->rej_str = strerror(errno);
1213 		} else {
1214 			Fct	*ftp;
1215 
1216 			if ((ftp = are_u_this(rej, fd, &status, nname)) != 0) {
1217 				fdesc->fd_nname = nname;
1218 				fdesc->fd_ftp = ftp;
1219 				fdesc->fd_dev = status.st_dev;
1220 				fdesc->fd_ino = status.st_ino;
1221 				fdesc->fd_fd = fd;
1222 
1223 				/*
1224 				 * Trace that this open has succeeded.
1225 				 */
1226 				if (lml->lm_flags & LML_FLG_TRC_ENABLE) {
1227 				    trace_so(clmp, 0, oname, nname,
1228 					(fdesc->fd_flags & FLG_FD_ALTER), 0);
1229 				}
1230 				return (1);
1231 			}
1232 			(void) close(fd);
1233 		}
1234 
1235 	} else if (errno != ENOENT) {
1236 		/*
1237 		 * If the open() failed for anything other than the file not
1238 		 * existing, record the error condition.
1239 		 */
1240 		rej->rej_type = SGS_REJ_STR;
1241 		rej->rej_str = strerror(errno);
1242 	}
1243 
1244 	/*
1245 	 * Indicate any rejection.
1246 	 */
1247 	if (rej->rej_type) {
1248 		rej->rej_name = nname;
1249 		rej->rej_flag = (fdesc->fd_flags & FLG_FD_ALTER);
1250 		DBG_CALL(Dbg_file_rejected(lml, rej));
1251 	}
1252 	return (0);
1253 }
1254 
1255 /*
1256  * Find a full pathname (it contains a "/").
1257  */
1258 int
1259 find_path(Lm_list *lml, const char *oname, Rt_map *clmp, uint_t flags,
1260     Fdesc * fdesc, Rej_desc *rej)
1261 {
1262 	int	err = 0;
1263 
1264 	/*
1265 	 * If directory configuration exists determine if this path is known.
1266 	 */
1267 	if (rtld_flags & RT_FL_DIRCFG) {
1268 		Rtc_obj		*obj;
1269 		const char	*aname;
1270 
1271 		if ((obj = elf_config_ent(oname, (Word)elf_hash(oname),
1272 		    0, &aname)) != 0) {
1273 			/*
1274 			 * If the configuration file states that this path is a
1275 			 * directory, or the path is explicitly defined as
1276 			 * non-existent (ie. a unused platform specific
1277 			 * library), then go no further.
1278 			 */
1279 			if (obj->co_flags & RTC_OBJ_DIRENT) {
1280 				err = EISDIR;
1281 			} else if ((obj->co_flags &
1282 			    (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) ==
1283 			    RTC_OBJ_NOEXIST) {
1284 				err = ENOENT;
1285 			} else if ((obj->co_flags & RTC_OBJ_ALTER) &&
1286 			    (rtld_flags & RT_FL_OBJALT) && (lml == &lml_main)) {
1287 				int	ret;
1288 
1289 				fdesc->fd_flags |= FLG_FD_ALTER;
1290 				/*
1291 				 * Attempt to open the alternative path.  If
1292 				 * this fails, and the alternative is flagged
1293 				 * as optional, fall through to open the
1294 				 * original path.
1295 				 */
1296 				DBG_CALL(Dbg_libs_found(lml, aname,
1297 				    FLG_FD_ALTER));
1298 				if (((ret = file_open(0, lml, oname, aname,
1299 				    clmp, flags, fdesc, rej)) != 0) ||
1300 				    ((obj->co_flags & RTC_OBJ_OPTINAL) == 0))
1301 					return (ret);
1302 
1303 				fdesc->fd_flags &= ~FLG_FD_ALTER;
1304 			}
1305 		}
1306 	}
1307 	DBG_CALL(Dbg_libs_found(lml, oname, 0));
1308 	return (file_open(err, lml, oname, oname, clmp, flags, fdesc, rej));
1309 }
1310 
1311 /*
1312  * Find a simple filename (it doesn't contain a "/").
1313  */
1314 static int
1315 _find_file(Lm_list *lml, const char *oname, const char *nname, Rt_map *clmp,
1316     uint_t flags, Fdesc * fdesc, Rej_desc *rej, Pnode * dir, int aflag)
1317 {
1318 	DBG_CALL(Dbg_libs_found(lml, nname, aflag));
1319 	if ((lml->lm_flags & LML_FLG_TRC_SEARCH) &&
1320 	    ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) {
1321 		(void) printf(MSG_INTL(MSG_LDD_PTH_TRYING), nname, aflag ?
1322 		    MSG_INTL(MSG_LDD_FIL_ALTER) : MSG_ORIG(MSG_STR_EMPTY));
1323 	}
1324 
1325 	/*
1326 	 * If we're being audited tell the audit library of the file we're about
1327 	 * to go search for.  The audit library may offer an alternative
1328 	 * dependency, or indicate that this dependency should be ignored.
1329 	 */
1330 	if ((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_OBJSEARCH) {
1331 		char	*aname = audit_objsearch(clmp, nname, dir->p_orig);
1332 
1333 		if (aname == 0)
1334 			return (0);
1335 		nname = aname;
1336 	}
1337 	return (file_open(0, lml, oname, nname, clmp, flags, fdesc, rej));
1338 }
1339 
1340 static int
1341 find_file(Lm_list *lml, const char *oname, Rt_map *clmp, uint_t flags,
1342     Fdesc * fdesc, Rej_desc *rej, Pnode * dir, Word * strhash, size_t olen)
1343 {
1344 	static Rtc_obj	Obj = { 0 };
1345 	Rtc_obj *	dobj;
1346 	const char	*nname = oname;
1347 
1348 	if (dir->p_name == 0)
1349 		return (0);
1350 	if (dir->p_info) {
1351 		dobj = (Rtc_obj *)dir->p_info;
1352 		if ((dobj->co_flags &
1353 		    (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
1354 			return (0);
1355 	} else
1356 		dobj = 0;
1357 
1358 	/*
1359 	 * If configuration information exists see if this directory/file
1360 	 * combination exists.
1361 	 */
1362 	if ((rtld_flags & RT_FL_DIRCFG) &&
1363 	    ((dobj == 0) || (dobj->co_id != 0))) {
1364 		Rtc_obj		*fobj;
1365 		const char	*alt = 0;
1366 
1367 		/*
1368 		 * If this pnode has not yet been searched for in the
1369 		 * configuration file go find it.
1370 		 */
1371 		if (dobj == 0) {
1372 			dobj = elf_config_ent(dir->p_name,
1373 			    (Word)elf_hash(dir->p_name), 0, 0);
1374 			if (dobj == 0)
1375 				dobj = &Obj;
1376 			dir->p_info = (void *)dobj;
1377 
1378 			if ((dobj->co_flags & (RTC_OBJ_NOEXIST |
1379 			    RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
1380 				return (0);
1381 		}
1382 
1383 		/*
1384 		 * If we found a directory search for the file.
1385 		 */
1386 		if (dobj->co_id != 0) {
1387 			if (*strhash == 0)
1388 				*strhash = (Word)elf_hash(nname);
1389 			fobj = elf_config_ent(nname, *strhash,
1390 			    dobj->co_id, &alt);
1391 
1392 			/*
1393 			 * If this object specifically does not exist, or the
1394 			 * object can't be found in a know-all-entries
1395 			 * directory, continue looking.  If the object does
1396 			 * exist determine if an alternative object exists.
1397 			 */
1398 			if (fobj == 0) {
1399 				if (dobj->co_flags & RTC_OBJ_ALLENTS)
1400 					return (0);
1401 			} else {
1402 				if ((fobj->co_flags & (RTC_OBJ_NOEXIST |
1403 				    RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
1404 					return (0);
1405 
1406 				if ((fobj->co_flags & RTC_OBJ_ALTER) &&
1407 				    (rtld_flags & RT_FL_OBJALT) &&
1408 				    (lml == &lml_main)) {
1409 					int	ret;
1410 
1411 					fdesc->fd_flags |= FLG_FD_ALTER;
1412 					/*
1413 					 * Attempt to open the alternative path.
1414 					 * If this fails, and the alternative is
1415 					 * flagged as optional, fall through to
1416 					 * open the original path.
1417 					 */
1418 					ret = _find_file(lml, oname, alt, clmp,
1419 					    flags, fdesc, rej, dir, 1);
1420 					if (ret || ((fobj->co_flags &
1421 					    RTC_OBJ_OPTINAL) == 0))
1422 						return (ret);
1423 
1424 					fdesc->fd_flags &= ~FLG_FD_ALTER;
1425 				}
1426 			}
1427 		}
1428 	}
1429 
1430 	/*
1431 	 * Protect ourselves from building an invalid pathname.
1432 	 */
1433 	if ((olen + dir->p_len + 1) >= PATH_MAX) {
1434 		eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), nname,
1435 		    strerror(ENAMETOOLONG));
1436 			return (0);
1437 	}
1438 	if ((nname = (LM_GET_SO(clmp)(dir->p_name, nname))) == 0)
1439 		return (0);
1440 
1441 	return (_find_file(lml, oname, nname, clmp, flags, fdesc, rej, dir, 0));
1442 }
1443 
1444 /*
1445  * A unique file has been opened.  Create a link-map to represent it, and
1446  * process the various names by which it can be referenced.
1447  */
1448 static Rt_map *
1449 load_file(Lm_list *lml, Aliste lmco, Fdesc *fdesc)
1450 {
1451 	const char	*oname = fdesc->fd_oname;
1452 	const char	*nname = fdesc->fd_nname;
1453 	Rt_map		*nlmp;
1454 
1455 	/*
1456 	 * Typically we call fct_map_so() with the full pathname of the opened
1457 	 * file (nname) and the name that started the search (oname), thus for
1458 	 * a typical dependency on libc this would be /usr/lib/libc.so.1 and
1459 	 * libc.so.1 (DT_NEEDED).  The original name is maintained on an ALIAS
1460 	 * list for comparison when bringing in new dependencies.  If the user
1461 	 * specified name as a full path (from a dlopen() for example) then
1462 	 * there's no need to create an ALIAS.
1463 	 */
1464 	if (strcmp(oname, nname) == 0)
1465 		oname = 0;
1466 
1467 	/*
1468 	 * A new file has been opened, now map it into the process.  Close the
1469 	 * original file so as not to accumulate file descriptors.
1470 	 */
1471 	nlmp = ((fdesc->fd_ftp)->fct_map_so)(lml, lmco, nname, oname,
1472 	    fdesc->fd_fd);
1473 	(void) close(fdesc->fd_fd);
1474 	fdesc->fd_fd = 0;
1475 
1476 	if (nlmp == 0)
1477 		return (0);
1478 
1479 	/*
1480 	 * Save the dev/inode information for later comparisons.
1481 	 */
1482 	STDEV(nlmp) = fdesc->fd_dev;
1483 	STINO(nlmp) = fdesc->fd_ino;
1484 
1485 	/*
1486 	 * Insert the names of this link-map into the FullpathNode AVL tree.
1487 	 * Save both the NAME() and PATHNAME() is they differ.
1488 	 *
1489 	 * If this is an OBJECT file, don't insert it yet as this is only a
1490 	 * temporary link-map.  During elf_obj_fini() the final link-map is
1491 	 * created, and its names will be inserted in the FullpathNode AVL
1492 	 * tree at that time.
1493 	 */
1494 	if ((FLAGS(nlmp) & FLG_RT_OBJECT) == 0) {
1495 		/*
1496 		 * Update the objects full path information if necessary.
1497 		 * Note, with pathname expansion in effect, the fd_pname will
1498 		 * be used as PATHNAME().  This allocated string will be freed
1499 		 * should this object be deleted.  However, without pathname
1500 		 * expansion, the fd_name should be freed now, as it is no
1501 		 * longer referenced.
1502 		 */
1503 		if (FLAGS1(nlmp) & FL1_RT_RELATIVE)
1504 			(void) fullpath(nlmp, fdesc->fd_pname);
1505 		else if (fdesc->fd_pname != fdesc->fd_nname)
1506 			free((void *)fdesc->fd_pname);
1507 		fdesc->fd_pname = 0;
1508 
1509 		if ((NAME(nlmp)[0] == '/') && (fpavl_insert(lml, nlmp,
1510 		    NAME(nlmp), fdesc->fd_avlwhere) == 0)) {
1511 			remove_so(lml, nlmp);
1512 			return (0);
1513 		}
1514 		if (((NAME(nlmp)[0] != '/') ||
1515 		    (NAME(nlmp) != PATHNAME(nlmp))) &&
1516 		    (fpavl_insert(lml, nlmp, PATHNAME(nlmp), 0) == 0)) {
1517 			remove_so(lml, nlmp);
1518 			return (0);
1519 		}
1520 	}
1521 
1522 	/*
1523 	 * If we're processing an alternative object reset the original name
1524 	 * for possible $ORIGIN processing.
1525 	 */
1526 	if (fdesc->fd_flags & FLG_FD_ALTER) {
1527 		const char	*odir;
1528 		char		*ndir;
1529 		size_t		olen;
1530 
1531 		FLAGS(nlmp) |= FLG_RT_ALTER;
1532 
1533 		/*
1534 		 * If we were given a pathname containing a slash then the
1535 		 * original name is still in oname.  Otherwise the original
1536 		 * directory is in dir->p_name (which is all we need for
1537 		 * $ORIGIN).
1538 		 */
1539 		if (fdesc->fd_flags & FLG_FD_SLASH) {
1540 			char	*ofil;
1541 
1542 			odir = oname;
1543 			ofil = strrchr(oname, '/');
1544 			olen = ofil - odir + 1;
1545 		} else {
1546 			odir = fdesc->fd_odir;
1547 			olen = strlen(odir) + 1;
1548 		}
1549 
1550 		if ((ndir = (char *)malloc(olen)) == 0) {
1551 			remove_so(lml, nlmp);
1552 			return (0);
1553 		}
1554 		(void) strncpy(ndir, odir, olen);
1555 		ndir[--olen] = '\0';
1556 
1557 		ORIGNAME(nlmp) = ndir;
1558 		DIRSZ(nlmp) = olen;
1559 	}
1560 
1561 	/*
1562 	 * Identify this as a new object.
1563 	 */
1564 	FLAGS(nlmp) |= FLG_RT_NEWLOAD;
1565 
1566 	return (nlmp);
1567 }
1568 
1569 /*
1570  * This function loads the named file and returns a pointer to its link map.
1571  * It is assumed that the caller has already checked that the file is not
1572  * already loaded before calling this function (refer is_so_loaded()).
1573  * Find and open the file, map it into memory, add it to the end of the list
1574  * of link maps and return a pointer to the new link map.  Return 0 on error.
1575  */
1576 static Rt_map *
1577 load_so(Lm_list *lml, Aliste lmco, const char *oname, Rt_map *clmp,
1578     uint_t flags, Fdesc *nfdp, Rej_desc *rej)
1579 {
1580 	char		*name;
1581 	uint_t		slash = 0;
1582 	size_t		olen;
1583 	Fdesc		fdesc = { 0 };
1584 	Pnode		*dir;
1585 
1586 	/*
1587 	 * If the file is the run time linker then it's already loaded.
1588 	 */
1589 	if (interp && (strcmp(oname, NAME(lml_rtld.lm_head)) == 0))
1590 		return (lml_rtld.lm_head);
1591 
1592 	/*
1593 	 * If this isn't a hardware capabilites pathname, which is already a
1594 	 * full, duplicated pathname, determine whether the pathname contains
1595 	 * a slash, and if not determine the input filename (for max path
1596 	 * length verification).
1597 	 */
1598 	if ((flags & FLG_RT_HWCAP) == 0) {
1599 		const char	*str;
1600 
1601 		for (str = oname; *str; str++) {
1602 			if (*str == '/') {
1603 				slash++;
1604 				break;
1605 			}
1606 		}
1607 		if (slash == 0)
1608 			olen = (str - oname) + 1;
1609 	}
1610 
1611 	/*
1612 	 * If we are passed a 'null' link-map this means that this is the first
1613 	 * object to be loaded on this link-map list.  In that case we set the
1614 	 * link-map to ld.so.1's link-map.
1615 	 *
1616 	 * This link-map is referenced to determine what lookup rules to use
1617 	 * when searching for files.  By using ld.so.1's we are defaulting to
1618 	 * ELF look-up rules.
1619 	 *
1620 	 * Note: This case happens when loading the first object onto
1621 	 *	 the plt_tracing link-map.
1622 	 */
1623 	if (clmp == 0)
1624 		clmp = lml_rtld.lm_head;
1625 
1626 	/*
1627 	 * If this path resulted from a $HWCAP specification, then the best
1628 	 * hardware capability object has already been establish, and is
1629 	 * available in the calling file descriptor.  Perform some minor book-
1630 	 * keeping so that we can fall through into common code.
1631 	 */
1632 	if (flags & FLG_RT_HWCAP) {
1633 		/*
1634 		 * If this object is already loaded, we're done.
1635 		 */
1636 		if (nfdp->fd_lmp)
1637 			return (nfdp->fd_lmp);
1638 
1639 		/*
1640 		 * Obtain the avl index for this object.
1641 		 */
1642 		(void) fpavl_loaded(lml, nfdp->fd_nname, &(nfdp->fd_avlwhere));
1643 
1644 		/*
1645 		 * If the name and resolved pathname differ, duplicate the path
1646 		 * name once more to provide for genric cleanup by the caller.
1647 		 */
1648 		if (nfdp->fd_pname && (nfdp->fd_nname != nfdp->fd_pname)) {
1649 			char	*pname;
1650 
1651 			if ((pname = strdup(nfdp->fd_pname)) == 0)
1652 				return (0);
1653 			nfdp->fd_pname = pname;
1654 		}
1655 	} else if (slash) {
1656 		Rej_desc	_rej = { 0 };
1657 
1658 		*nfdp = fdesc;
1659 		nfdp->fd_flags = FLG_FD_SLASH;
1660 
1661 		if (find_path(lml, oname, clmp, flags, nfdp, &_rej) == 0) {
1662 			rejection_inherit(rej, &_rej, nfdp);
1663 			return (0);
1664 		}
1665 
1666 		/*
1667 		 * If this object is already loaded, we're done.
1668 		 */
1669 		if (nfdp->fd_lmp)
1670 			return (nfdp->fd_lmp);
1671 
1672 	} else {
1673 		/*
1674 		 * No '/' - for each directory on list, make a pathname using
1675 		 * that directory and filename and try to open that file.
1676 		 */
1677 		Pnode		*dirlist = (Pnode *)0;
1678 		Word		strhash = 0;
1679 #if	!defined(ISSOLOAD_BASENAME_DISABLED)
1680 		Rt_map		*nlmp;
1681 #endif
1682 		DBG_CALL(Dbg_libs_find(lml, oname));
1683 
1684 #if	!defined(ISSOLOAD_BASENAME_DISABLED)
1685 		if ((nlmp = is_so_loaded(lml, oname, 0)))
1686 			return (nlmp);
1687 #endif
1688 		/*
1689 		 * Make sure we clear the file descriptor new name in case the
1690 		 * following directory search doesn't provide any directories
1691 		 * (odd, but this can be forced with a -znodefaultlib test).
1692 		 */
1693 		*nfdp = fdesc;
1694 		for (dir = get_next_dir(&dirlist, clmp, flags); dir;
1695 		    dir = get_next_dir(&dirlist, clmp, flags)) {
1696 			Rej_desc	_rej = { 0 };
1697 
1698 			*nfdp = fdesc;
1699 
1700 			/*
1701 			 * Try and locate this file.  Make sure to clean up
1702 			 * any rejection information should the file have
1703 			 * been found, but not appropriate.
1704 			 */
1705 			if (find_file(lml, oname, clmp, flags, nfdp, &_rej,
1706 			    dir, &strhash, olen) == 0) {
1707 				rejection_inherit(rej, &_rej, nfdp);
1708 				continue;
1709 			}
1710 
1711 			/*
1712 			 * If this object is already loaded, we're done.
1713 			 */
1714 			if (nfdp->fd_lmp)
1715 				return (nfdp->fd_lmp);
1716 
1717 			nfdp->fd_odir = dir->p_name;
1718 			break;
1719 		}
1720 
1721 		/*
1722 		 * If the file couldn't be loaded, do another comparison of
1723 		 * loaded files using just the basename.  This catches folks
1724 		 * who may have loaded multiple full pathname files (possibly
1725 		 * from setxid applications) to satisfy dependency relationships
1726 		 * (i.e., a file might have a dependency on foo.so.1 which has
1727 		 * already been opened using its full pathname).
1728 		 */
1729 		if (nfdp->fd_nname == 0)
1730 			return (is_so_loaded(lml, oname, 1));
1731 	}
1732 
1733 	/*
1734 	 * Duplicate the file name so that NAME() is available in core files.
1735 	 * Note, that hardware capability names are already duplicated, but
1736 	 * they get duplicated once more to insure consistent cleanup in the
1737 	 * event of an error condition.
1738 	 */
1739 	if ((name = strdup(nfdp->fd_nname)) == 0)
1740 		return (0);
1741 
1742 	if (nfdp->fd_nname == nfdp->fd_pname)
1743 		nfdp->fd_nname = nfdp->fd_pname = name;
1744 	else
1745 		nfdp->fd_nname = name;
1746 
1747 	/*
1748 	 * Finish mapping the file and return the link-map descriptor.  Note,
1749 	 * if this request originated from a HWCAP request, re-establish the
1750 	 * fdesc information.  For single paged objects, such as filters, the
1751 	 * original mapping may have been sufficient to capture the file, thus
1752 	 * this mapping needs to be reset to insure it doesn't mistakenly get
1753 	 * unmapped as part of HWCAP cleanup.
1754 	 */
1755 	return (load_file(lml, lmco, nfdp));
1756 }
1757 
1758 /*
1759  * Trace an attempt to load an object.
1760  */
1761 const char *
1762 load_trace(Lm_list *lml, const char *name, Rt_map *clmp)
1763 {
1764 	/*
1765 	 * First generate any ldd(1) diagnostics.
1766 	 */
1767 	if ((lml->lm_flags & (LML_FLG_TRC_VERBOSE | LML_FLG_TRC_SEARCH)) &&
1768 	    ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0))
1769 		(void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, NAME(clmp));
1770 
1771 	/*
1772 	 * If we're being audited tell the audit library of the file we're
1773 	 * about to go search for.
1774 	 */
1775 	if (((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_ACTIVITY) &&
1776 	    (lml == LIST(clmp)))
1777 		audit_activity(clmp, LA_ACT_ADD);
1778 
1779 	if ((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_OBJSEARCH) {
1780 		char	*_name;
1781 
1782 		/*
1783 		 * The auditor can indicate that this object should be ignored.
1784 		 */
1785 		if ((_name = audit_objsearch(clmp, name, LA_SER_ORIG)) == 0) {
1786 			eprintf(lml, ERR_FATAL, MSG_INTL(MSG_GEN_AUDITERM),
1787 			    name);
1788 			return (0);
1789 		}
1790 
1791 		/*
1792 		 * The auditor can provide an alternative name.
1793 		 */
1794 		if (_name != name) {
1795 			free((void *)name);
1796 			name = strdup(_name);
1797 		}
1798 	}
1799 	return (name);
1800 }
1801 
1802 /*
1803  * Having loaded an object and created a link-map to describe it, finish
1804  * processing this stage, including verifying any versioning requirements,
1805  * updating the objects mode, creating a handle if necessary, and adding this
1806  * object to existing handles if required.
1807  */
1808 static int
1809 load_finish(Lm_list *lml, const char *name, Rt_map *clmp, int nmode,
1810     uint_t flags, Grp_hdl **hdl, Rt_map *nlmp)
1811 {
1812 	Aliste		off;
1813 	Grp_hdl		*ghp, **ghpp;
1814 	int		promote;
1815 
1816 	/*
1817 	 * If this dependency is associated with a required version insure that
1818 	 * the version is present in the loaded file.
1819 	 */
1820 	if (((rtld_flags & RT_FL_NOVERSION) == 0) &&
1821 	    (FCT(clmp) == &elf_fct) && VERNEED(clmp) &&
1822 	    (LM_VERIFY_VERS(clmp)(name, clmp, nlmp) == 0))
1823 		return (0);
1824 
1825 	/*
1826 	 * If this object has indicated that it should be isolated as a group
1827 	 * (DT_FLAGS_1 contains DF_1_GROUP - object was built with -B group),
1828 	 * or if the callers direct bindings indicate it should be isolated as
1829 	 * a group (DYNINFO flags contains FLG_DI_GROUP - dependency followed
1830 	 * -zgroupperm), establish the appropriate mode.
1831 	 *
1832 	 * The intent of an object defining itself as a group is to isolate the
1833 	 * relocation of the group within its own members, however, unless
1834 	 * opened through dlopen(), in which case we assume dlsym() will be used
1835 	 * to located symbols in the new object, we still need to associate it
1836 	 * with the caller for it to be bound with.  This is equivalent to a
1837 	 * dlopen(RTLD_GROUP) and dlsym() using the returned handle.
1838 	 */
1839 	if ((FLAGS(nlmp) | flags) & FLG_RT_SETGROUP) {
1840 		nmode &= ~RTLD_WORLD;
1841 		nmode |= RTLD_GROUP;
1842 
1843 		/*
1844 		 * If the object wasn't explicitly dlopen()'ed associate it with
1845 		 * the parent.
1846 		 */
1847 		if (flags != FLG_RT_HANDLE)
1848 			nmode |= RTLD_PARENT;
1849 	}
1850 
1851 	/*
1852 	 * Establish new mode and flags.
1853 	 *
1854 	 * For patch backward compatibility, the following use of update_mode()
1855 	 * is disabled.
1856 	 */
1857 #ifdef	SIEBEL_DISABLE
1858 	if (rtld_flags & RT_FL_DISFIX_1)
1859 		promote = MODE(nlmp) |=
1860 		    (nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST));
1861 	else
1862 #endif
1863 		promote = update_mode(nlmp, MODE(nlmp), nmode);
1864 
1865 	FLAGS(nlmp) |= flags;
1866 
1867 	/*
1868 	 * If we've been asked to establish a handle create one for this object.
1869 	 * Or, if this object has already been analyzed, but this reference
1870 	 * requires that the mode of the object be promoted, also create a
1871 	 * handle to propagate the new modes to all this objects dependencies.
1872 	 */
1873 	if (((FLAGS(nlmp) | flags) & FLG_RT_HANDLE) || (promote &&
1874 	    (FLAGS(nlmp) & FLG_RT_ANALYZED))) {
1875 		uint_t	oflags, hflags = 0;
1876 
1877 		if (nmode & RTLD_PARENT)
1878 			hflags |=  GPH_PARENT;
1879 		if (nmode & RTLD_FIRST)
1880 			hflags |=  GPH_FIRST;
1881 
1882 		/*
1883 		 * Now that a handle is being created, remove this state from
1884 		 * the object so that it doesn't mistakenly get inherited by
1885 		 * a dependency.
1886 		 */
1887 		oflags = FLAGS(nlmp);
1888 		FLAGS(nlmp) &= ~FLG_RT_HANDLE;
1889 
1890 		if ((ghp = hdl_create(lml, nlmp, clmp, hflags)) == 0)
1891 			return (0);
1892 
1893 		/*
1894 		 * Add any dependencies that are already loaded, to the handle.
1895 		 */
1896 		if (hdl_initialize(ghp, nlmp, clmp, nmode, promote) == 0)
1897 			return (0);
1898 
1899 		if (hdl)
1900 			*hdl = ghp;
1901 
1902 		/*
1903 		 * If we were asked to create a handle, we're done.  Otherwise,
1904 		 * remove the handle. The handle was only used to establish this
1905 		 * objects dependencies and promote any modes, so we don't want
1906 		 * this handle preventing the objects deletion.  Fall through to
1907 		 * carry out any group processing.
1908 		 */
1909 		if ((oflags | flags) & FLG_RT_HANDLE)
1910 			return (1);
1911 
1912 		free_hdl(ghp);
1913 	}
1914 
1915 	/*
1916 	 * If the caller isn't part of a group we're done.
1917 	 */
1918 	if (GROUPS(clmp) == 0)
1919 		return (1);
1920 
1921 	/*
1922 	 * Determine if our caller is already associated with a handle, if so
1923 	 * we need to add this object to any handles that already exist.
1924 	 * Traverse the list of groups our caller is a member of and add this
1925 	 * new link-map to those groups.
1926 	 */
1927 	DBG_CALL(Dbg_file_hdl_title(DBG_DEP_ADD));
1928 	for (ALIST_TRAVERSE(GROUPS(clmp), off, ghpp)) {
1929 		Aliste		off1;
1930 		Grp_desc	*gdp;
1931 		int		exist;
1932 		Rt_map		**lmpp;
1933 		Alist		*lmalp = 0;
1934 
1935 		ghp = *ghpp;
1936 
1937 		/*
1938 		 * If the caller doesn't indicate that its dependencies should
1939 		 * be added to a handle, ignore it.  This case identifies a
1940 		 * parent of a dlopen(RTLD_PARENT) request.
1941 		 */
1942 		for (ALIST_TRAVERSE(ghp->gh_depends, off1, gdp)) {
1943 			if (gdp->gd_depend == clmp)
1944 				break;
1945 		}
1946 		if ((gdp->gd_flags & GPD_ADDEPS) == 0)
1947 			continue;
1948 
1949 		if ((exist = hdl_add(ghp, nlmp,
1950 		    (GPD_AVAIL | GPD_ADDEPS))) == 0)
1951 			return (0);
1952 
1953 		/*
1954 		 * If this member already exists then its dependencies will
1955 		 * have already been processed.
1956 		 */
1957 		if (exist == ALE_EXISTS)
1958 			continue;
1959 
1960 		/*
1961 		 * If the object we've added has just been opened, it will not
1962 		 * yet have been processed for its dependencies, these will be
1963 		 * added on later calls to load_one().  If it doesn't have any
1964 		 * dependencies we're also done.
1965 		 */
1966 		if (((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) ||
1967 		    (DEPENDS(nlmp) == 0))
1968 			continue;
1969 
1970 		/*
1971 		 * Otherwise, this object exists and has dependencies, so add
1972 		 * all of its dependencies to the handle were operating on.
1973 		 */
1974 		if (alist_append(&lmalp, &nlmp, sizeof (Rt_map *),
1975 		    AL_CNT_DEPCLCT) == 0)
1976 			return (0);
1977 
1978 		for (ALIST_TRAVERSE(lmalp, off1, lmpp)) {
1979 			Rt_map *	dlmp1 = *lmpp;
1980 			Aliste		off2;
1981 			Bnd_desc **	bdpp;
1982 
1983 			/*
1984 			 * Add any dependencies of this dependency to the
1985 			 * dynamic dependency list so they can be further
1986 			 * processed.
1987 			 */
1988 			for (ALIST_TRAVERSE(DEPENDS(dlmp1), off2, bdpp)) {
1989 				Bnd_desc *	bdp = *bdpp;
1990 				Rt_map *	dlmp2 = bdp->b_depend;
1991 
1992 				if ((bdp->b_flags & BND_NEEDED) == 0)
1993 					continue;
1994 
1995 				if (alist_test(&lmalp, dlmp2, sizeof (Rt_map *),
1996 				    AL_CNT_DEPCLCT) == 0) {
1997 					free(lmalp);
1998 					return (0);
1999 				}
2000 			}
2001 
2002 			if (nlmp == dlmp1)
2003 				continue;
2004 
2005 			if ((exist = hdl_add(ghp, dlmp1,
2006 			    (GPD_AVAIL | GPD_ADDEPS))) != 0) {
2007 				if (exist == ALE_CREATE)
2008 				    (void) update_mode(dlmp1, MODE(dlmp1),
2009 					nmode);
2010 				continue;
2011 			}
2012 			free(lmalp);
2013 			return (0);
2014 		}
2015 		free(lmalp);
2016 	}
2017 	return (1);
2018 }
2019 
2020 /*
2021  * The central routine for loading shared objects.  Insures ldd() diagnostics,
2022  * handles and any other related additions are all done in one place.
2023  */
2024 static Rt_map *
2025 _load_path(Lm_list *lml, Aliste lmco, const char *name, Rt_map *clmp,
2026     int nmode, uint_t flags, Grp_hdl ** hdl, Fdesc *nfdp, Rej_desc *rej)
2027 {
2028 	Rt_map	*nlmp;
2029 
2030 	if ((nmode & RTLD_NOLOAD) == 0) {
2031 		/*
2032 		 * If this isn't a noload request attempt to load the file.
2033 		 */
2034 		if ((name = load_trace(lml, name, clmp)) == 0)
2035 			return (0);
2036 
2037 		if ((nlmp = load_so(lml, lmco, name, clmp, flags,
2038 		    nfdp, rej)) == 0)
2039 			return (0);
2040 
2041 		/*
2042 		 * If we've loaded a library which identifies itself as not
2043 		 * being dlopen()'able catch it here.  Let non-dlopen()'able
2044 		 * objects through under RTLD_CONFGEN as they're only being
2045 		 * mapped to be dldump()'ed.
2046 		 */
2047 		if ((rtld_flags & RT_FL_APPLIC) && ((FLAGS(nlmp) &
2048 		    (FLG_RT_NOOPEN | FLG_RT_RELOCED)) == FLG_RT_NOOPEN) &&
2049 		    ((nmode & RTLD_CONFGEN) == 0)) {
2050 			Rej_desc	_rej = { 0 };
2051 
2052 			_rej.rej_name = name;
2053 			_rej.rej_type = SGS_REJ_STR;
2054 			_rej.rej_str = MSG_INTL(MSG_GEN_NOOPEN);
2055 			DBG_CALL(Dbg_file_rejected(lml, &_rej));
2056 			rejection_inherit(rej, &_rej, nfdp);
2057 			remove_so(lml, nlmp);
2058 			return (0);
2059 		}
2060 	} else {
2061 		/*
2062 		 * If it's a NOLOAD request - check to see if the object
2063 		 * has already been loaded.
2064 		 */
2065 		/* LINTED */
2066 		if ((nlmp = is_so_loaded(lml, name, 0)) ||
2067 		    (nlmp = is_so_loaded(lml, name, 1))) {
2068 			if ((lml->lm_flags & LML_FLG_TRC_VERBOSE) &&
2069 			    ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) {
2070 				(void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name,
2071 					NAME(clmp));
2072 				if (*name == '/')
2073 				    (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH),
2074 					name, MSG_ORIG(MSG_STR_EMPTY),
2075 					MSG_ORIG(MSG_STR_EMPTY));
2076 				else
2077 				    (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV),
2078 					name, NAME(nlmp),
2079 					MSG_ORIG(MSG_STR_EMPTY),
2080 					MSG_ORIG(MSG_STR_EMPTY));
2081 			}
2082 		} else {
2083 			Rej_desc	_rej = { 0 };
2084 
2085 			_rej.rej_name = name;
2086 			_rej.rej_type = SGS_REJ_STR;
2087 			_rej.rej_str = strerror(ENOENT);
2088 			DBG_CALL(Dbg_file_rejected(lml, &_rej));
2089 			rejection_inherit(rej, &_rej, nfdp);
2090 			return (0);
2091 		}
2092 	}
2093 
2094 	/*
2095 	 * Finish processing this loaded object.
2096 	 */
2097 	if (load_finish(lml, name, clmp, nmode, flags, hdl, nlmp) == 0) {
2098 		FLAGS(nlmp) &= ~FLG_RT_NEWLOAD;
2099 
2100 		/*
2101 		 * If this object has already been analyzed, then it is in use,
2102 		 * so even though this operation has failed, it should not be
2103 		 * torn down.
2104 		 */
2105 		if ((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0)
2106 			remove_so(lml, nlmp);
2107 		return (0);
2108 	}
2109 
2110 	/*
2111 	 * If this object is new, and we're being audited, tell the audit
2112 	 * library of the file we've just opened.  Note, if the new link-map
2113 	 * requires local auditing of its dependencies we also register its
2114 	 * opening.
2115 	 */
2116 	if (FLAGS(nlmp) & FLG_RT_NEWLOAD) {
2117 		FLAGS(nlmp) &= ~FLG_RT_NEWLOAD;
2118 
2119 		if (((lml->lm_tflags | FLAGS1(clmp) | FLAGS1(nlmp)) &
2120 		    LML_TFLG_AUD_MASK) && (((lml->lm_flags |
2121 		    LIST(clmp)->lm_flags) & LML_FLG_NOAUDIT) == 0)) {
2122 			if (audit_objopen(clmp, nlmp) == 0) {
2123 				remove_so(lml, nlmp);
2124 				return (0);
2125 			}
2126 		}
2127 	}
2128 	return (nlmp);
2129 }
2130 
2131 Rt_map *
2132 load_path(Lm_list *lml, Aliste lmco, const char *name, Rt_map *clmp,
2133     int nmode, uint_t flags, Grp_hdl **hdl, Fdesc *cfdp, Rej_desc *rej)
2134 {
2135 	Rt_map	*lmp;
2136 	Fdesc	nfdp = { 0 };
2137 
2138 	/*
2139 	 * If this path resulted from a $HWCAP specification, then the best
2140 	 * hardware capability object has already been establish, and is
2141 	 * available in the calling file descriptor.
2142 	 */
2143 	if (flags & FLG_RT_HWCAP) {
2144 		if (cfdp->fd_lmp == 0) {
2145 			/*
2146 			 * If this object hasn't yet been mapped, re-establish
2147 			 * the file descriptor structure to reflect this objects
2148 			 * original initial page mapping.  Make sure any present
2149 			 * file descriptor mapping is removed before overwriting
2150 			 * the structure.
2151 			 */
2152 #if	defined(MAP_ALIGN)
2153 			if (fmap->fm_maddr &&
2154 			    ((fmap->fm_mflags & MAP_ALIGN) == 0))
2155 #else
2156 			if (fmap->fm_maddr)
2157 #endif
2158 				(void) munmap(fmap->fm_maddr, fmap->fm_msize);
2159 		}
2160 		nfdp = *cfdp;
2161 		*fmap = cfdp->fd_fmap;
2162 	}
2163 
2164 	lmp = _load_path(lml, lmco, name, clmp, nmode, flags, hdl, &nfdp, rej);
2165 
2166 	/*
2167 	 * If this path originated from a $HWCAP specification, re-establish the
2168 	 * fdesc information.  For single paged objects, such as filters, the
2169 	 * original mapping may have been sufficient to capture the file, thus
2170 	 * this mapping needs to be reset to insure it doesn't mistakenly get
2171 	 * unmapped as part of HWCAP cleanup.
2172 	 */
2173 	if (flags & FLG_RT_HWCAP) {
2174 		cfdp->fd_fmap.fm_maddr = fmap->fm_maddr;
2175 		cfdp->fd_fmap.fm_mflags = fmap->fm_mflags;
2176 		cfdp->fd_fd = nfdp.fd_fd;
2177 	}
2178 
2179 	return (lmp);
2180 }
2181 
2182 /*
2183  * Load one object from a possible list of objects.  Typically, for requests
2184  * such as NEEDED's, only one object is specified.  However, this object could
2185  * be specified using $ISALIST or $HWCAP, in which case only the first object
2186  * that can be loaded is used (ie. the best).
2187  */
2188 Rt_map *
2189 load_one(Lm_list *lml, Aliste lmco, Pnode *pnp, Rt_map *clmp, int mode,
2190     uint_t flags, Grp_hdl ** hdl)
2191 {
2192 	Rej_desc	rej = { 0 };
2193 	Pnode   	*tpnp;
2194 	const char	*name;
2195 	Rt_map		*tlmp;
2196 
2197 	for (tpnp = pnp; tpnp && tpnp->p_name; tpnp = tpnp->p_next) {
2198 		/*
2199 		 * A Hardware capabilities requirement can itself expand into
2200 		 * a number of candidates.
2201 		 */
2202 		if (tpnp->p_orig & PN_TKN_HWCAP) {
2203 			if ((tlmp = load_hwcap(lml, lmco, tpnp->p_name, clmp,
2204 			    mode, (flags | FLG_RT_HWCAP), hdl, &rej)) != 0) {
2205 				remove_rej(&rej);
2206 				return (tlmp);
2207 			}
2208 		} else {
2209 			if ((tlmp = load_path(lml, lmco, tpnp->p_name, clmp,
2210 			    mode, flags, hdl, 0, &rej)) != 0) {
2211 				remove_rej(&rej);
2212 				return (tlmp);
2213 			}
2214 		}
2215 	}
2216 
2217 	/*
2218 	 * If this pathname originated from an expanded token, use the original
2219 	 * for any diagnostic output.
2220 	 */
2221 	if ((name = pnp->p_oname) == 0)
2222 		name = pnp->p_name;
2223 
2224 	file_notfound(lml, name, clmp, flags, &rej);
2225 	remove_rej(&rej);
2226 	return (0);
2227 }
2228 
2229 /*
2230  * While processing direct or group bindings, determine whether the object to
2231  * which we've bound can be interposed upon.  In this context, copy relocations
2232  * are a form of interposition.
2233  */
2234 static Sym *
2235 lookup_sym_interpose(Slookup *slp, Rt_map **dlmp, uint_t *binfo, Lm_list * lml,
2236     Sym * sym)
2237 {
2238 	Rt_map *	lmp;
2239 	Slookup		sl;
2240 
2241 	/*
2242 	 * If we've bound to a copy relocation definition then we need to assign
2243 	 * this binding to the original copy reference.  Fabricate an inter-
2244 	 * position diagnostic, as this is a legitimate form of interposition.
2245 	 */
2246 	if (FLAGS1(*dlmp) & FL1_RT_COPYTOOK) {
2247 		Rel_copy	*rcp;
2248 		Aliste		off;
2249 
2250 		for (ALIST_TRAVERSE(COPY(*dlmp), off, rcp)) {
2251 			if ((sym == rcp->r_dsym) || (sym->st_value &&
2252 			    (sym->st_value == rcp->r_dsym->st_value))) {
2253 				*dlmp = rcp->r_rlmp;
2254 				*binfo |=
2255 				    (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF);
2256 				return (rcp->r_rsym);
2257 			}
2258 		}
2259 	}
2260 
2261 	if ((lml->lm_flags & LML_FLG_INTRPOSE) == 0)
2262 		return ((Sym *)0);
2263 
2264 	/*
2265 	 * Traverse the list of known interposers to determine whether any
2266 	 * offer the same symbol.  Note, the head of the link-map could be
2267 	 * identified as an interposer.  If it is, make sure we only look for
2268 	 * symbol definitions.  Otherwise, skip the head of the link-map, so
2269 	 * that we don't bind to any .plt references, or copy-relocations
2270 	 * unintentionally.
2271 	 */
2272 	lmp = lml->lm_head;
2273 	sl = *slp;
2274 	if (((FLAGS(lmp) & FLG_RT_INTRPOSE) == 0) || (sl.sl_flags & LKUP_COPY))
2275 		lmp = (Rt_map *)NEXT(lmp);
2276 	else
2277 		sl.sl_flags &= ~LKUP_SPEC;
2278 
2279 	for (; lmp; lmp = (Rt_map *)NEXT(lmp)) {
2280 		if (FLAGS(lmp) & FLG_RT_DELETE)
2281 			continue;
2282 		if ((FLAGS(lmp) & FLG_RT_INTRPOSE) == 0)
2283 			break;
2284 
2285 		if (callable(lmp, *dlmp, 0)) {
2286 			sl.sl_imap = lmp;
2287 			if (sym = SYMINTP(lmp)(&sl, dlmp, binfo)) {
2288 				*binfo |= DBG_BINFO_INTERPOSE;
2289 				return (sym);
2290 			}
2291 		}
2292 	}
2293 	return ((Sym *)0);
2294 }
2295 
2296 /*
2297  * If an object specifies direct bindings (it contains a syminfo structure
2298  * describing where each binding was established during link-editing, and the
2299  * object was built -Bdirect), then look for the symbol in the specific object.
2300  */
2301 static Sym *
2302 lookup_sym_direct(Slookup *slp, Rt_map **dlmp, uint_t *binfo, Syminfo *sip,
2303     Rt_map *lmp)
2304 {
2305 	Rt_map	*clmp = slp->sl_cmap;
2306 	Sym	*sym;
2307 	Slookup	sl;
2308 
2309 	/*
2310 	 * If a direct binding resolves to the definition of a copy relocated
2311 	 * variable, it must be redirected to the copy (in the executable) that
2312 	 * will eventually be made.  Typically, this redirection occurs in
2313 	 * lookup_sym_interpose().  But, there's an edge condition.  If a
2314 	 * directly bound executable contains pic code, there may be a
2315 	 * reference to a definition that will eventually have a copy made.
2316 	 * However, this copy relocation may not yet have occurred, because
2317 	 * the relocation making this reference comes before the relocation
2318 	 * that will create the copy.
2319 	 * Under direct bindings, the syminfo indicates that a copy will be
2320 	 * taken (SYMINFO_FLG_COPY).  This can only be set in an executable.
2321 	 * Thus, the caller must be the executable, so bind to the destination
2322 	 * of the copy within the executable.
2323 	 */
2324 	if (((slp->sl_flags & LKUP_COPY) == 0) &&
2325 	    (sip->si_flags & SYMINFO_FLG_COPY)) {
2326 
2327 		slp->sl_imap = LIST(clmp)->lm_head;
2328 		if (sym = SYMINTP(clmp)(slp, dlmp, binfo))
2329 			*binfo |= (DBG_BINFO_DIRECT | DBG_BINFO_COPYREF);
2330 		return (sym);
2331 	}
2332 
2333 	/*
2334 	 * If we need to direct bind to our parent start looking in each caller
2335 	 * link map.
2336 	 */
2337 	sl = *slp;
2338 	sl.sl_flags |= LKUP_DIRECT;
2339 	sym = 0;
2340 
2341 	if (sip->si_boundto == SYMINFO_BT_PARENT) {
2342 		Aliste		off;
2343 		Bnd_desc **	bdpp;
2344 
2345 		for (ALIST_TRAVERSE(CALLERS(clmp), off, bdpp)) {
2346 			sl.sl_imap = lmp = (*bdpp)->b_caller;
2347 			if ((sym = SYMINTP(lmp)(&sl, dlmp, binfo)) != 0)
2348 				break;
2349 		}
2350 	} else {
2351 		/*
2352 		 * If we need to direct bind to anything else look in the
2353 		 * link map associated with this symbol reference.
2354 		 */
2355 		if (sip->si_boundto == SYMINFO_BT_SELF)
2356 			sl.sl_imap = lmp = clmp;
2357 		else
2358 			sl.sl_imap = lmp;
2359 
2360 		if (lmp)
2361 			sym = SYMINTP(lmp)(&sl, dlmp, binfo);
2362 	}
2363 
2364 	if (sym)
2365 		*binfo |= DBG_BINFO_DIRECT;
2366 
2367 	/*
2368 	 * If we've bound to an object, determine whether that object can be
2369 	 * interposed upon for this symbol.
2370 	 */
2371 	if (sym && (LIST(*dlmp)->lm_head != *dlmp) &&
2372 	    (LIST(*dlmp) == LIST(clmp))) {
2373 		Sym *	isym;
2374 
2375 		if ((isym = lookup_sym_interpose(slp, dlmp, binfo,
2376 		    LIST(*dlmp), sym)) != 0)
2377 			return (isym);
2378 	}
2379 
2380 	return (sym);
2381 }
2382 
2383 static Sym *
2384 _lookup_sym(Rt_map *ilmp, Slookup *slp, Rt_map **dlmp, uint_t *binfo,
2385     Aliste off)
2386 {
2387 	Rt_map	*lmp;
2388 
2389 	/*
2390 	 * Copy relocations should start their search after the head of the
2391 	 * main link-map control list.
2392 	 */
2393 	if ((off == ALO_DATA) && (slp->sl_flags & LKUP_COPY) && ilmp)
2394 		lmp = (Rt_map *)NEXT(ilmp);
2395 	else
2396 		lmp = ilmp;
2397 
2398 	for (; lmp; lmp = (Rt_map *)NEXT(lmp)) {
2399 		if (callable(slp->sl_cmap, lmp, 0)) {
2400 			Sym	*sym;
2401 
2402 			slp->sl_imap = lmp;
2403 			if ((sym = SYMINTP(lmp)(slp, dlmp, binfo)) != 0)
2404 				return (sym);
2405 		}
2406 	}
2407 	return (0);
2408 }
2409 
2410 static Sym *
2411 _lazy_find_sym(Rt_map *ilmp, Slookup *slp, Rt_map **dlmp, uint_t *binfo)
2412 {
2413 	Rt_map	*lmp;
2414 
2415 	for (lmp = ilmp; lmp; lmp = (Rt_map *)NEXT(lmp)) {
2416 		if (LAZY(lmp) == 0)
2417 			continue;
2418 		if (callable(slp->sl_cmap, lmp, 0)) {
2419 			Sym	*sym;
2420 
2421 			slp->sl_imap = lmp;
2422 			if ((sym = elf_lazy_find_sym(slp, dlmp, binfo)) != 0)
2423 				return (sym);
2424 		}
2425 	}
2426 	return (0);
2427 }
2428 
2429 /*
2430  * Symbol lookup routine.  Takes an ELF symbol name, and a list of link maps to
2431  * search (if the flag indicates LKUP_FIRST only the first link map of the list
2432  * is searched ie. we've been called from dlsym()).
2433  * If successful, return a pointer to the symbol table entry and a pointer to
2434  * the link map of the enclosing object.  Else return a null pointer.
2435  *
2436  * To improve elf performance, we first compute the elf hash value and pass
2437  * it to each find_sym() routine.  The elf function will use this value to
2438  * locate the symbol, the a.out function will simply ignore it.
2439  */
2440 Sym *
2441 lookup_sym(Slookup *slp, Rt_map **dlmp, uint_t *binfo)
2442 {
2443 	const char	*name = slp->sl_name;
2444 	Rt_map		*clmp = slp->sl_cmap;
2445 	Rt_map		*ilmp = slp->sl_imap, *lmp;
2446 	uint_t		flags = slp->sl_flags;
2447 	ulong_t		rsymndx;
2448 	Sym		*sym = 0;
2449 	Syminfo		*sip;
2450 	Slookup		sl;
2451 
2452 	if (slp->sl_hash == 0)
2453 		slp->sl_hash = elf_hash(name);
2454 	*binfo = 0;
2455 
2456 	/*
2457 	 * Search the initial link map for the required symbol (this category is
2458 	 * selected by dlsym(), where individual link maps are searched for a
2459 	 * required symbol.  Therefore, we know we have permission to look at
2460 	 * the link map).
2461 	 */
2462 	if (flags & LKUP_FIRST)
2463 		return (SYMINTP(ilmp)(slp, dlmp, binfo));
2464 
2465 	/*
2466 	 * Determine whether this lookup can be satisfied by an objects direct,
2467 	 * or lazy binding information.  This is triggered by a relocation from
2468 	 * the object (hence rsymndx is set).
2469 	 */
2470 	if (((rsymndx = slp->sl_rsymndx) != 0) &&
2471 	    ((sip = SYMINFO(clmp)) != 0)) {
2472 
2473 		/*
2474 		 * Find the corresponding Syminfo entry for the original
2475 		 * referencing symbol.
2476 		 */
2477 		/* LINTED */
2478 		sip = (Syminfo *)((char *)sip + (rsymndx * SYMINENT(clmp)));
2479 
2480 		/*
2481 		 * If the symbol information indicates a direct binding,
2482 		 * determine the link map that is required to satisfy the
2483 		 * binding.  Note, if the dependency can not be found, but a
2484 		 * direct binding isn't required, we will still fall through
2485 		 * to perform any default symbol search.
2486 		 */
2487 		if (sip->si_flags & SYMINFO_FLG_DIRECT) {
2488 			uint_t	bound = sip->si_boundto;
2489 
2490 			lmp = 0;
2491 			if (bound < SYMINFO_BT_LOWRESERVE)
2492 				lmp = elf_lazy_load(clmp, bound, name);
2493 
2494 			/*
2495 			 * If direct bindings have been disabled, and this isn't
2496 			 * a translator, skip any direct binding now that we've
2497 			 * insured the resolving object has been loaded.
2498 			 *
2499 			 * If we need to direct bind to anything, we look in
2500 			 * ourselves, our parent, or in the link map we've just
2501 			 * loaded.  Otherwise, even though we may have lazily
2502 			 * loaded an object we still continue to search for
2503 			 * symbols from the head of the link map list.
2504 			 */
2505 			if (((FLAGS(clmp) & FLG_RT_TRANS) ||
2506 			    (!(LIST(clmp)->lm_tflags & LML_TFLG_NODIRECT))) &&
2507 			    ((FLAGS(clmp) & FLG_RT_DIRECT) ||
2508 			    (sip->si_flags & SYMINFO_FLG_DIRECTBIND))) {
2509 				sym = lookup_sym_direct(slp, dlmp, binfo,
2510 				    sip, lmp);
2511 
2512 				/*
2513 				 * If this direct binding has been disabled
2514 				 * (presumably because the symbol definition has
2515 				 * been changed since the referring object was
2516 				 * built), fall back to a standard symbol
2517 				 * search.
2518 				 */
2519 				if ((*binfo & BINFO_DIRECTDIS) == 0)
2520 					return (sym);
2521 			}
2522 		}
2523 	}
2524 
2525 	sl = *slp;
2526 
2527 	/*
2528 	 * If the referencing object has the DF_SYMBOLIC flag set, look in the
2529 	 * referencing object for the symbol first.  Failing that, fall back to
2530 	 * our generic search.
2531 	 */
2532 	if (FLAGS1(clmp) & FL1_RT_SYMBOLIC) {
2533 		sl.sl_imap = clmp;
2534 		if (sym = SYMINTP(clmp)(&sl, dlmp, binfo))
2535 			return (sym);
2536 	}
2537 
2538 	/*
2539 	 * If this lookup originates from a standard relocation, then traverse
2540 	 * all link-map lists inspecting any object that is available to this
2541 	 * caller.  Otherwise, traverse the link-map list associate with the
2542 	 * caller.
2543 	 */
2544 	if (flags & LKUP_ALLCNTLIST) {
2545 		Aliste	off;
2546 		Lm_cntl	*lmc;
2547 
2548 		sym = 0;
2549 
2550 		for (ALIST_TRAVERSE(LIST(clmp)->lm_lists, off, lmc)) {
2551 			if ((sym = _lookup_sym(lmc->lc_head, &sl, dlmp,
2552 			    binfo, off)) != 0)
2553 				break;
2554 		}
2555 	} else
2556 		sym = _lookup_sym(ilmp, &sl, dlmp, binfo, ALO_DATA);
2557 
2558 	/*
2559 	 * To allow transitioning into a world of lazy loading dependencies see
2560 	 * if this link map contains objects that have lazy dependencies still
2561 	 * outstanding.  If so, and we haven't been able to locate a non-weak
2562 	 * symbol reference, start bringing in any lazy dependencies to see if
2563 	 * the reference can be satisfied.  Use of dlsym(RTLD_PROBE) sets the
2564 	 * LKUP_NOFALBACK flag, and this flag disables this fall back.
2565 	 */
2566 	if ((sym == 0) && ((sl.sl_flags & LKUP_NOFALBACK) == 0)) {
2567 		if ((lmp = ilmp) == 0)
2568 			lmp = LIST(clmp)->lm_head;
2569 		if ((flags & LKUP_WEAK) || (LIST(lmp)->lm_lazy == 0))
2570 			return ((Sym *)0);
2571 
2572 		DBG_CALL(Dbg_syms_lazy_rescan(LIST(clmp), name));
2573 
2574 		/*
2575 		 * If this request originated from a dlsym(RTLD_NEXT) then start
2576 		 * looking for dependencies from the caller, otherwise use the
2577 		 * initial link-map.
2578 		 */
2579 		if (flags & LKUP_NEXT)
2580 			sym = _lazy_find_sym(clmp, &sl, dlmp, binfo);
2581 		else {
2582 			Aliste	off;
2583 			Lm_cntl	*lmc;
2584 
2585 			for (ALIST_TRAVERSE(LIST(clmp)->lm_lists, off, lmc)) {
2586 				sl.sl_flags |= LKUP_NOFALBACK;
2587 				if ((sym = _lazy_find_sym(lmc->lc_head, &sl,
2588 				    dlmp, binfo)) != 0)
2589 					break;
2590 			}
2591 		}
2592 	}
2593 
2594 	/*
2595 	 * If the caller is restricted to a symbol search within its group,
2596 	 * determine if it is necessary to follow a binding from outside of
2597 	 * the group.
2598 	 */
2599 	if (sym && ((MODE(clmp) & (RTLD_GROUP | RTLD_WORLD)) == RTLD_GROUP)) {
2600 		Sym *	isym;
2601 
2602 		if ((isym = lookup_sym_interpose(slp, dlmp, binfo, LIST(*dlmp),
2603 		    sym)) != 0)
2604 			return (isym);
2605 	}
2606 	return (sym);
2607 }
2608 
2609 /*
2610  * Associate a binding descriptor with a caller and its dependency, or update
2611  * an existing descriptor.
2612  */
2613 int
2614 bind_one(Rt_map *clmp, Rt_map *dlmp, uint_t flags)
2615 {
2616 	Bnd_desc	**bdpp, *bdp;
2617 	Aliste		off;
2618 	int		found = ALE_CREATE;
2619 
2620 	/*
2621 	 * Determine whether a binding descriptor already exists between the
2622 	 * two objects.
2623 	 */
2624 	for (ALIST_TRAVERSE(DEPENDS(clmp), off, bdpp)) {
2625 		bdp = *bdpp;
2626 
2627 		if (bdp->b_depend == dlmp) {
2628 			found = ALE_EXISTS;
2629 			break;
2630 		}
2631 	}
2632 
2633 	if (found == ALE_CREATE) {
2634 		/*
2635 		 * Create a new binding descriptor.
2636 		 */
2637 		if ((bdp = malloc(sizeof (Bnd_desc))) == 0)
2638 			return (0);
2639 
2640 		bdp->b_caller = clmp;
2641 		bdp->b_depend = dlmp;
2642 		bdp->b_flags = 0;
2643 
2644 		/*
2645 		 * Append the binding descriptor to the caller and the
2646 		 * dependency.
2647 		 */
2648 		if (alist_append(&DEPENDS(clmp), &bdp,
2649 		    sizeof (Bnd_desc *), AL_CNT_DEPENDS) == 0)
2650 			return (0);
2651 
2652 		if (alist_append(&CALLERS(dlmp), &bdp,
2653 		    sizeof (Bnd_desc *), AL_CNT_CALLERS) == 0)
2654 			return (0);
2655 	}
2656 
2657 	if ((found == ALE_CREATE) || ((bdp->b_flags & flags) != flags)) {
2658 		bdp->b_flags |= flags;
2659 
2660 		if (flags & BND_REFER)
2661 			FLAGS1(dlmp) |= FL1_RT_USED;
2662 
2663 		DBG_CALL(Dbg_file_bind_entry(LIST(clmp), bdp));
2664 	}
2665 	return (found);
2666 }
2667 
2668 /*
2669  * Cleanup after relocation processing.
2670  */
2671 int
2672 relocate_finish(Rt_map *lmp, Alist *bound, int textrel, int ret)
2673 {
2674 	DBG_CALL(Dbg_reloc_run(lmp, 0, ret, DBG_REL_FINISH));
2675 
2676 	/*
2677 	 * Establish bindings to all objects that have been bound to.
2678 	 */
2679 	if (bound) {
2680 		Aliste	off;
2681 		Rt_map	**lmpp;
2682 
2683 		if (ret) {
2684 			for (ALIST_TRAVERSE(bound, off, lmpp)) {
2685 				if (bind_one(lmp, *lmpp, BND_REFER) == 0) {
2686 					ret = 0;
2687 					break;
2688 				}
2689 			}
2690 		}
2691 		free(bound);
2692 	}
2693 
2694 	/*
2695 	 * If we write enabled the text segment to perform these relocations
2696 	 * re-protect by disabling writes.
2697 	 */
2698 	if (textrel)
2699 		(void) LM_SET_PROT(lmp)(lmp, 0);
2700 
2701 	return (ret);
2702 }
2703