17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate * CDDL HEADER START
37c478bd9Sstevel@tonic-gate *
47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
55aefb655Srie * Common Development and Distribution License (the "License").
65aefb655Srie * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate *
87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate * and limitations under the License.
127c478bd9Sstevel@tonic-gate *
137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate *
197c478bd9Sstevel@tonic-gate * CDDL HEADER END
207c478bd9Sstevel@tonic-gate */
21fb1354edSrie
227c478bd9Sstevel@tonic-gate /*
23f441771bSRod Evans * Copyright (c) 1990, 2010, Oracle and/or its affiliates. All rights reserved.
247c478bd9Sstevel@tonic-gate */
257c478bd9Sstevel@tonic-gate
267257d1b4Sraf /*
277257d1b4Sraf * Copyright (c) 1988 AT&T
287257d1b4Sraf * All Rights Reserved
297257d1b4Sraf */
307257d1b4Sraf
317c478bd9Sstevel@tonic-gate #include <string.h>
327c478bd9Sstevel@tonic-gate #include <stdio.h>
337c478bd9Sstevel@tonic-gate #include <unistd.h>
347c478bd9Sstevel@tonic-gate #include <sys/stat.h>
357c478bd9Sstevel@tonic-gate #include <sys/mman.h>
3656deab07SRod Evans #include <sys/debug.h>
377c478bd9Sstevel@tonic-gate #include <fcntl.h>
387c478bd9Sstevel@tonic-gate #include <limits.h>
397c478bd9Sstevel@tonic-gate #include <dlfcn.h>
407c478bd9Sstevel@tonic-gate #include <errno.h>
417c478bd9Sstevel@tonic-gate #include <link.h>
425aefb655Srie #include <debug.h>
435aefb655Srie #include <conv.h>
447c478bd9Sstevel@tonic-gate #include "_rtld.h"
457c478bd9Sstevel@tonic-gate #include "_audit.h"
467c478bd9Sstevel@tonic-gate #include "_elf.h"
4756deab07SRod Evans #include "_a.out.h"
48f441771bSRod Evans #include "_inline_gen.h"
497c478bd9Sstevel@tonic-gate #include "msg.h"
507c478bd9Sstevel@tonic-gate
517c478bd9Sstevel@tonic-gate /*
527c478bd9Sstevel@tonic-gate * If a load filter flag is in effect, and this object is a filter, trigger the
537c478bd9Sstevel@tonic-gate * loading of all its filtees. The load filter flag is in effect when creating
547c478bd9Sstevel@tonic-gate * configuration files, or when under the control of ldd(1), or the LD_LOADFLTR
557c478bd9Sstevel@tonic-gate * environment variable is set, or this object was built with the -zloadfltr
567c478bd9Sstevel@tonic-gate * flag. Otherwise, filtee loading is deferred until triggered by a relocation.
577c478bd9Sstevel@tonic-gate */
587c478bd9Sstevel@tonic-gate static void
load_filtees(Rt_map * lmp,int * in_nfavl)599aa23310Srie load_filtees(Rt_map *lmp, int *in_nfavl)
607c478bd9Sstevel@tonic-gate {
617c478bd9Sstevel@tonic-gate if ((FLAGS1(lmp) & MSK_RT_FILTER) &&
627c478bd9Sstevel@tonic-gate ((FLAGS(lmp) & FLG_RT_LOADFLTR) ||
637c478bd9Sstevel@tonic-gate (LIST(lmp)->lm_tflags & LML_TFLG_LOADFLTR))) {
647c478bd9Sstevel@tonic-gate Dyninfo *dip = DYNINFO(lmp);
657c478bd9Sstevel@tonic-gate uint_t cnt, max = DYNINFOCNT(lmp);
667c478bd9Sstevel@tonic-gate Slookup sl;
677c478bd9Sstevel@tonic-gate
6875e7992aSrie /*
6908278a5eSRod Evans * Initialize the symbol lookup data structure. Note, no symbol
7008278a5eSRod Evans * name is supplied. This NULL name causes filters to be loaded
7108278a5eSRod Evans * but no symbol to be searched for.
7275e7992aSrie */
7375e7992aSrie SLOOKUP_INIT(sl, 0, lmp, lmp, ld_entry_cnt, 0, 0, 0, 0, 0);
747c478bd9Sstevel@tonic-gate
757c478bd9Sstevel@tonic-gate for (cnt = 0; cnt < max; cnt++, dip++) {
7608278a5eSRod Evans uint_t binfo;
7708278a5eSRod Evans Sresult sr;
7808278a5eSRod Evans
7908278a5eSRod Evans SRESULT_INIT(sr, NULL);
8008278a5eSRod Evans
817c478bd9Sstevel@tonic-gate if (((dip->di_flags & MSK_DI_FILTER) == 0) ||
827c478bd9Sstevel@tonic-gate ((dip->di_flags & FLG_DI_AUXFLTR) &&
837c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_NOAUXFLTR)))
847c478bd9Sstevel@tonic-gate continue;
8508278a5eSRod Evans (void) elf_lookup_filtee(&sl, &sr, &binfo, cnt,
8608278a5eSRod Evans in_nfavl);
877c478bd9Sstevel@tonic-gate }
887c478bd9Sstevel@tonic-gate }
897c478bd9Sstevel@tonic-gate }
907c478bd9Sstevel@tonic-gate
917c478bd9Sstevel@tonic-gate /*
927c478bd9Sstevel@tonic-gate * Analyze one or more link-maps of a link map control list. This routine is
937c478bd9Sstevel@tonic-gate * called at startup to continue the processing of the main executable. It is
947c478bd9Sstevel@tonic-gate * also called each time a new set of objects are loaded, ie. from filters,
957c478bd9Sstevel@tonic-gate * lazy-loaded objects, or dlopen().
967c478bd9Sstevel@tonic-gate *
977c478bd9Sstevel@tonic-gate * In each instance we traverse the link-map control list starting with the
987c478bd9Sstevel@tonic-gate * initial object. As dependencies are analyzed they are added to the link-map
997c478bd9Sstevel@tonic-gate * control list. Thus the list grows as we traverse it - this results in the
1007c478bd9Sstevel@tonic-gate * breadth first ordering of all needed objects.
10156deab07SRod Evans *
10256deab07SRod Evans * Return the initial link-map from which analysis starts for relocate_lmc().
1037c478bd9Sstevel@tonic-gate */
10456deab07SRod Evans Rt_map *
analyze_lmc(Lm_list * lml,Aliste nlmco,Rt_map * nlmp,Rt_map * clmp,int * in_nfavl)105*2020b2b6SRod Evans analyze_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp, Rt_map *clmp,
106*2020b2b6SRod Evans int *in_nfavl)
1077c478bd9Sstevel@tonic-gate {
10856deab07SRod Evans Rt_map *lmp;
1097c478bd9Sstevel@tonic-gate Lm_cntl *nlmc;
1107c478bd9Sstevel@tonic-gate
1117c478bd9Sstevel@tonic-gate /*
1127c478bd9Sstevel@tonic-gate * If this link-map control list is being analyzed, return. The object
1137c478bd9Sstevel@tonic-gate * that has just been added will be picked up by the existing analysis
1147c478bd9Sstevel@tonic-gate * thread. Note, this is only really meaningful during process init-
1157c478bd9Sstevel@tonic-gate * ialization, as objects are added to the main link-map control list.
1167c478bd9Sstevel@tonic-gate * Following this initialization, each family of objects that are loaded
1177c478bd9Sstevel@tonic-gate * are added to a new link-map control list.
1187c478bd9Sstevel@tonic-gate */
1197c478bd9Sstevel@tonic-gate /* LINTED */
120cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
1217c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_ANALYZING)
12256deab07SRod Evans return (nlmp);
1237c478bd9Sstevel@tonic-gate
1247c478bd9Sstevel@tonic-gate /*
1257c478bd9Sstevel@tonic-gate * If this object doesn't belong to the present link-map control list
1267c478bd9Sstevel@tonic-gate * then it must already have been analyzed, or it is in the process of
1277c478bd9Sstevel@tonic-gate * being analyzed prior to us recursing into this analysis. In either
1287c478bd9Sstevel@tonic-gate * case, ignore the object as it's already being taken care of.
1297c478bd9Sstevel@tonic-gate */
1307c478bd9Sstevel@tonic-gate if (nlmco != CNTL(nlmp))
13156deab07SRod Evans return (nlmp);
1327c478bd9Sstevel@tonic-gate
1337c478bd9Sstevel@tonic-gate nlmc->lc_flags |= LMC_FLG_ANALYZING;
1347c478bd9Sstevel@tonic-gate
13556deab07SRod Evans for (lmp = nlmp; lmp; lmp = NEXT_RT_MAP(lmp)) {
1367c478bd9Sstevel@tonic-gate if (FLAGS(lmp) &
1377c478bd9Sstevel@tonic-gate (FLG_RT_ANALZING | FLG_RT_ANALYZED | FLG_RT_DELETE))
1387c478bd9Sstevel@tonic-gate continue;
1397c478bd9Sstevel@tonic-gate
1407c478bd9Sstevel@tonic-gate /*
1417c478bd9Sstevel@tonic-gate * Indicate that analyzing is under way.
1427c478bd9Sstevel@tonic-gate */
1437c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_ANALZING;
1447c478bd9Sstevel@tonic-gate
1457c478bd9Sstevel@tonic-gate /*
1467c478bd9Sstevel@tonic-gate * If this link map represents a relocatable object, then we
1477c478bd9Sstevel@tonic-gate * need to finish the link-editing of the object at this point.
1487c478bd9Sstevel@tonic-gate */
1497c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & FLG_RT_OBJECT) {
15056deab07SRod Evans Rt_map *olmp;
15156deab07SRod Evans
152*2020b2b6SRod Evans if ((olmp = elf_obj_fini(lml, lmp, clmp,
153*2020b2b6SRod Evans in_nfavl)) == NULL) {
1547c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE)
1557c478bd9Sstevel@tonic-gate continue;
15656deab07SRod Evans nlmp = NULL;
1577c478bd9Sstevel@tonic-gate break;
1587c478bd9Sstevel@tonic-gate }
15956deab07SRod Evans
16056deab07SRod Evans /*
16156deab07SRod Evans * The original link-map that captured a relocatable
16256deab07SRod Evans * object is a temporary link-map, that basically acts
16356deab07SRod Evans * as a place holder in the link-map list. On
16456deab07SRod Evans * completion of relocatable object processing, a new
16556deab07SRod Evans * link-map is created, and switched with the place
16656deab07SRod Evans * holder. Therefore, reassign both the present
16756deab07SRod Evans * link-map pointer and the return link-map pointer.
16856deab07SRod Evans * The former resets this routines link-map processing,
16956deab07SRod Evans * while the latter provides for later functions, like
17056deab07SRod Evans * relocate_lmc(), to start processing from this new
17156deab07SRod Evans * link-map.
17256deab07SRod Evans */
17356deab07SRod Evans if (nlmp == lmp)
17456deab07SRod Evans nlmp = olmp;
17556deab07SRod Evans lmp = olmp;
1767c478bd9Sstevel@tonic-gate }
1777c478bd9Sstevel@tonic-gate
1787c478bd9Sstevel@tonic-gate DBG_CALL(Dbg_file_analyze(lmp));
1797c478bd9Sstevel@tonic-gate
1807c478bd9Sstevel@tonic-gate /*
1817c478bd9Sstevel@tonic-gate * Establish any dependencies this object requires.
1827c478bd9Sstevel@tonic-gate */
1839aa23310Srie if (LM_NEEDED(lmp)(lml, nlmco, lmp, in_nfavl) == 0) {
1847c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE)
1857c478bd9Sstevel@tonic-gate continue;
18656deab07SRod Evans nlmp = NULL;
1877c478bd9Sstevel@tonic-gate break;
1887c478bd9Sstevel@tonic-gate }
1897c478bd9Sstevel@tonic-gate
1907c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_ANALZING;
1917c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_ANALYZED;
1927c478bd9Sstevel@tonic-gate
1937c478bd9Sstevel@tonic-gate /*
1947c478bd9Sstevel@tonic-gate * If we're building a configuration file, determine if this
1957c478bd9Sstevel@tonic-gate * object is a filter and if so load its filtees. This
1967c478bd9Sstevel@tonic-gate * traversal is only necessary for crle(1), as typical use of
1977c478bd9Sstevel@tonic-gate * an object will load filters as part of relocation processing.
1987c478bd9Sstevel@tonic-gate */
1997c478bd9Sstevel@tonic-gate if (MODE(nlmp) & RTLD_CONFGEN)
2009aa23310Srie load_filtees(lmp, in_nfavl);
2017c478bd9Sstevel@tonic-gate
2027c478bd9Sstevel@tonic-gate /*
2037c478bd9Sstevel@tonic-gate * If an interposer has been added, it will have been inserted
2047c478bd9Sstevel@tonic-gate * in the link-map before the link we're presently analyzing.
2057c478bd9Sstevel@tonic-gate * Break out of this analysis loop and return to the head of
2067c478bd9Sstevel@tonic-gate * the link-map control list to analyze the interposer. Note
2077c478bd9Sstevel@tonic-gate * that this rescan preserves the breadth first loading of
2087c478bd9Sstevel@tonic-gate * dependencies.
2097c478bd9Sstevel@tonic-gate */
21024a6229eSrie /* LINTED */
211cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
2127c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_REANALYZE) {
2137c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_REANALYZE;
2147c478bd9Sstevel@tonic-gate lmp = nlmc->lc_head;
2157c478bd9Sstevel@tonic-gate }
2167c478bd9Sstevel@tonic-gate }
2177c478bd9Sstevel@tonic-gate
21824a6229eSrie /* LINTED */
219cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
2207c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_ANALYZING;
2217c478bd9Sstevel@tonic-gate
22256deab07SRod Evans return (nlmp);
2237c478bd9Sstevel@tonic-gate }
2247c478bd9Sstevel@tonic-gate
2257c478bd9Sstevel@tonic-gate /*
226466e2a62Srie * Determine whether a symbol represents zero, .bss, bits. Most commonly this
227466e2a62Srie * function is used to determine whether the data for a copy relocation refers
228466e2a62Srie * to initialized data or .bss. If the data definition is within .bss, then the
229466e2a62Srie * data is zero filled, and as the copy destination within the executable is
230466e2a62Srie * .bss, we can skip copying zero's to zero's.
231466e2a62Srie *
232466e2a62Srie * However, if the defining object has MOVE data, it's .bss might contain
233466e2a62Srie * non-zero data, in which case copy the definition regardless.
234466e2a62Srie *
235466e2a62Srie * For backward compatibility copy relocation processing, this routine can be
236466e2a62Srie * used to determine precisely if a copy destination is a move record recipient.
2377c478bd9Sstevel@tonic-gate */
2387c478bd9Sstevel@tonic-gate static int
are_bits_zero(Rt_map * dlmp,Sym * dsym,int dest)239466e2a62Srie are_bits_zero(Rt_map *dlmp, Sym *dsym, int dest)
2407c478bd9Sstevel@tonic-gate {
24156deab07SRod Evans mmapobj_result_t *mpp;
2427c478bd9Sstevel@tonic-gate caddr_t daddr = (caddr_t)dsym->st_value;
2437c478bd9Sstevel@tonic-gate
2447c478bd9Sstevel@tonic-gate if ((FLAGS(dlmp) & FLG_RT_FIXED) == 0)
2457c478bd9Sstevel@tonic-gate daddr += ADDR(dlmp);
2467c478bd9Sstevel@tonic-gate
247466e2a62Srie /*
248466e2a62Srie * Determine the segment that contains the copy definition. Given that
249466e2a62Srie * the copy relocation records have already been captured and verified,
250466e2a62Srie * a segment must be found (but we add an escape clause never the less).
251466e2a62Srie */
25256deab07SRod Evans if ((mpp = find_segment(daddr, dlmp)) == NULL)
2537c478bd9Sstevel@tonic-gate return (1);
254466e2a62Srie
255466e2a62Srie /*
256466e2a62Srie * If the definition is not within .bss, indicate this is not zero data.
257466e2a62Srie */
25856deab07SRod Evans if (daddr < (mpp->mr_addr + mpp->mr_offset + mpp->mr_fsize))
2597c478bd9Sstevel@tonic-gate return (0);
260466e2a62Srie
261466e2a62Srie /*
262466e2a62Srie * If the definition is within .bss, make sure the definition isn't the
263466e2a62Srie * recipient of a move record. Note, we don't precisely analyze whether
264466e2a62Srie * the address is a move record recipient, as the infrastructure to
265466e2a62Srie * prepare for, and carry out this analysis, is probably more costly
266466e2a62Srie * than just copying the bytes regardless.
267466e2a62Srie */
268466e2a62Srie if ((FLAGS(dlmp) & FLG_RT_MOVE) == 0)
269466e2a62Srie return (1);
270466e2a62Srie
271466e2a62Srie /*
272466e2a62Srie * However, for backward compatibility copy relocation processing, we
273466e2a62Srie * can afford to work a little harder. Here, determine precisely
274466e2a62Srie * whether the destination in the executable is a move record recipient.
275466e2a62Srie * See comments in lookup_sym_interpose(), below.
276466e2a62Srie */
277466e2a62Srie if (dest && is_move_data(daddr))
278466e2a62Srie return (0);
279466e2a62Srie
280466e2a62Srie return (1);
2817c478bd9Sstevel@tonic-gate }
2827c478bd9Sstevel@tonic-gate
2837c478bd9Sstevel@tonic-gate /*
2847c478bd9Sstevel@tonic-gate * Relocate an individual object.
2857c478bd9Sstevel@tonic-gate */
2867c478bd9Sstevel@tonic-gate static int
relocate_so(Lm_list * lml,Rt_map * lmp,int * relocated,int now,int * in_nfavl)2879aa23310Srie relocate_so(Lm_list *lml, Rt_map *lmp, int *relocated, int now, int *in_nfavl)
2887c478bd9Sstevel@tonic-gate {
28956deab07SRod Evans APlist *textrel = NULL;
29056deab07SRod Evans int ret = 1;
29156deab07SRod Evans
2927c478bd9Sstevel@tonic-gate /*
2937c478bd9Sstevel@tonic-gate * If we're running under ldd(1), and haven't been asked to trace any
2947c478bd9Sstevel@tonic-gate * warnings, skip any actual relocation processing.
2957c478bd9Sstevel@tonic-gate */
2967c478bd9Sstevel@tonic-gate if (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) ||
2977c478bd9Sstevel@tonic-gate (lml->lm_flags & LML_FLG_TRC_WARN)) {
2987c478bd9Sstevel@tonic-gate
2997c478bd9Sstevel@tonic-gate if (relocated)
3007c478bd9Sstevel@tonic-gate (*relocated)++;
3017c478bd9Sstevel@tonic-gate
30256deab07SRod Evans if ((LM_RELOC(lmp)(lmp, now, in_nfavl, &textrel) == 0) &&
3037c478bd9Sstevel@tonic-gate ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0))
30456deab07SRod Evans ret = 0;
30556deab07SRod Evans
30656deab07SRod Evans /*
30756deab07SRod Evans * Finally process any move data. Note, this is carried out
30856deab07SRod Evans * with ldd(1) under relocation processing too, as it can flush
30956deab07SRod Evans * out move errors, and enables lari(1) to provide a true
31056deab07SRod Evans * representation of the runtime bindings.
31156deab07SRod Evans */
31256deab07SRod Evans if ((FLAGS(lmp) & FLG_RT_MOVE) &&
31356deab07SRod Evans (move_data(lmp, &textrel) == 0) &&
31456deab07SRod Evans ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0))
31556deab07SRod Evans ret = 0;
3167c478bd9Sstevel@tonic-gate }
31756deab07SRod Evans
31856deab07SRod Evans /*
31956deab07SRod Evans * If a text segment was write enabled to perform any relocations or
32056deab07SRod Evans * move records, then re-protect the segment by disabling writes.
32156deab07SRod Evans */
32256deab07SRod Evans if (textrel) {
32356deab07SRod Evans mmapobj_result_t *mpp;
32456deab07SRod Evans Aliste idx;
32556deab07SRod Evans
32656deab07SRod Evans for (APLIST_TRAVERSE(textrel, idx, mpp))
32756deab07SRod Evans (void) set_prot(lmp, mpp, 0);
32856deab07SRod Evans free(textrel);
32956deab07SRod Evans }
33056deab07SRod Evans
33156deab07SRod Evans return (ret);
3327c478bd9Sstevel@tonic-gate }
3337c478bd9Sstevel@tonic-gate
3347c478bd9Sstevel@tonic-gate /*
3357c478bd9Sstevel@tonic-gate * Relocate the objects on a link-map control list.
3367c478bd9Sstevel@tonic-gate */
3377c478bd9Sstevel@tonic-gate static int
_relocate_lmc(Lm_list * lml,Aliste lmco,Rt_map * nlmp,int * relocated,int * in_nfavl)33856deab07SRod Evans _relocate_lmc(Lm_list *lml, Aliste lmco, Rt_map *nlmp, int *relocated,
33956deab07SRod Evans int *in_nfavl)
3407c478bd9Sstevel@tonic-gate {
3417c478bd9Sstevel@tonic-gate Rt_map *lmp;
3427c478bd9Sstevel@tonic-gate
343cb511613SAli Bahrami for (lmp = nlmp; lmp; lmp = NEXT_RT_MAP(lmp)) {
3447c478bd9Sstevel@tonic-gate /*
3457c478bd9Sstevel@tonic-gate * If this object has already been relocated, we're done. If
3467c478bd9Sstevel@tonic-gate * this object is being deleted, skip it, there's probably a
3477c478bd9Sstevel@tonic-gate * relocation error somewhere that's causing this deletion.
3487c478bd9Sstevel@tonic-gate */
3497c478bd9Sstevel@tonic-gate if (FLAGS(lmp) &
3507c478bd9Sstevel@tonic-gate (FLG_RT_RELOCING | FLG_RT_RELOCED | FLG_RT_DELETE))
3517c478bd9Sstevel@tonic-gate continue;
3527c478bd9Sstevel@tonic-gate
3537c478bd9Sstevel@tonic-gate /*
3547c478bd9Sstevel@tonic-gate * Indicate that relocation processing is under way.
3557c478bd9Sstevel@tonic-gate */
3567c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_RELOCING;
3577c478bd9Sstevel@tonic-gate
3587c478bd9Sstevel@tonic-gate /*
3597c478bd9Sstevel@tonic-gate * Relocate the object.
3607c478bd9Sstevel@tonic-gate */
3619aa23310Srie if (relocate_so(lml, lmp, relocated, 0, in_nfavl) == 0)
3627c478bd9Sstevel@tonic-gate return (0);
3637c478bd9Sstevel@tonic-gate
3647c478bd9Sstevel@tonic-gate /*
3657c478bd9Sstevel@tonic-gate * Indicate that the objects relocation is complete.
3667c478bd9Sstevel@tonic-gate */
3677c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_RELOCING;
3687c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_RELOCED;
3697c478bd9Sstevel@tonic-gate
3707c478bd9Sstevel@tonic-gate /*
37156deab07SRod Evans * If this object is being relocated on the main link-map list
37256deab07SRod Evans * indicate that this object's init is available for harvesting.
37356deab07SRod Evans * Objects that are being collected on other link-map lists
37456deab07SRod Evans * will have there init availability tagged when the objects
37556deab07SRod Evans * are move to the main link-map list (ie, after we know they,
37656deab07SRod Evans * and their dependencies, are fully relocated and ready for
37756deab07SRod Evans * use).
37856deab07SRod Evans *
37956deab07SRod Evans * Note, even under ldd(1) this init identification is necessary
38056deab07SRod Evans * for -i (tsort) gathering.
3817c478bd9Sstevel@tonic-gate */
38256deab07SRod Evans if (lmco == ALIST_OFF_DATA) {
3837c478bd9Sstevel@tonic-gate lml->lm_init++;
384dffec89cSrie lml->lm_flags |= LML_FLG_OBJADDED;
385466e2a62Srie }
3867c478bd9Sstevel@tonic-gate
3877c478bd9Sstevel@tonic-gate /*
3887c478bd9Sstevel@tonic-gate * Determine if this object is a filter, and if a load filter
3897c478bd9Sstevel@tonic-gate * flag is in effect, trigger the loading of all its filtees.
3907c478bd9Sstevel@tonic-gate */
3919aa23310Srie load_filtees(lmp, in_nfavl);
3927c478bd9Sstevel@tonic-gate }
3937c478bd9Sstevel@tonic-gate
3947c478bd9Sstevel@tonic-gate /*
3957c478bd9Sstevel@tonic-gate * Perform special copy relocations. These are only meaningful for
3967c478bd9Sstevel@tonic-gate * dynamic executables (fixed and head of their link-map list). If
3977c478bd9Sstevel@tonic-gate * this ever has to change then the infrastructure of COPY() has to
398cce0e03bSab196087 * change. Presently, a given link map can only have a receiver or
399cce0e03bSab196087 * supplier of copy data, so a union is used to overlap the storage
400cce0e03bSab196087 * for the COPY_R() and COPY_S() lists. These lists would need to
401cce0e03bSab196087 * be separated.
4027c478bd9Sstevel@tonic-gate */
4037c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_FIXED) && (nlmp == LIST(nlmp)->lm_head) &&
4047c478bd9Sstevel@tonic-gate (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) ||
4057c478bd9Sstevel@tonic-gate (lml->lm_flags & LML_FLG_TRC_WARN))) {
406cce0e03bSab196087 Rt_map *lmp;
407cce0e03bSab196087 Aliste idx1;
4087c478bd9Sstevel@tonic-gate Word tracing;
4097c478bd9Sstevel@tonic-gate
41002ca3e02Srie #if defined(__i386)
4117c478bd9Sstevel@tonic-gate if (elf_copy_gen(nlmp) == 0)
4127c478bd9Sstevel@tonic-gate return (0);
4137c478bd9Sstevel@tonic-gate #endif
414cce0e03bSab196087 if (COPY_S(nlmp) == NULL)
4157c478bd9Sstevel@tonic-gate return (1);
4167c478bd9Sstevel@tonic-gate
4177c478bd9Sstevel@tonic-gate if ((LIST(nlmp)->lm_flags & LML_FLG_TRC_ENABLE) &&
4187c478bd9Sstevel@tonic-gate (((rtld_flags & RT_FL_SILENCERR) == 0) ||
4197c478bd9Sstevel@tonic-gate (LIST(nlmp)->lm_flags & LML_FLG_TRC_VERBOSE)))
4207c478bd9Sstevel@tonic-gate tracing = 1;
4217c478bd9Sstevel@tonic-gate else
4227c478bd9Sstevel@tonic-gate tracing = 0;
4237c478bd9Sstevel@tonic-gate
4245aefb655Srie DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD));
4257c478bd9Sstevel@tonic-gate
426cce0e03bSab196087 for (APLIST_TRAVERSE(COPY_S(nlmp), idx1, lmp)) {
4277c478bd9Sstevel@tonic-gate Rel_copy *rcp;
428cce0e03bSab196087 Aliste idx2;
4297c478bd9Sstevel@tonic-gate
430cce0e03bSab196087 for (ALIST_TRAVERSE(COPY_R(lmp), idx2, rcp)) {
4317c478bd9Sstevel@tonic-gate int zero;
4327c478bd9Sstevel@tonic-gate
4337c478bd9Sstevel@tonic-gate /*
434466e2a62Srie * Only copy the data if the data is from
435466e2a62Srie * a non-zero definition (ie. not .bss).
4367c478bd9Sstevel@tonic-gate */
437466e2a62Srie zero = are_bits_zero(rcp->r_dlmp,
438466e2a62Srie rcp->r_dsym, 0);
4395aefb655Srie DBG_CALL(Dbg_reloc_copy(rcp->r_dlmp, nlmp,
4405aefb655Srie rcp->r_name, zero));
4417c478bd9Sstevel@tonic-gate if (zero)
4427c478bd9Sstevel@tonic-gate continue;
4437c478bd9Sstevel@tonic-gate
4447c478bd9Sstevel@tonic-gate (void) memcpy(rcp->r_radd, rcp->r_dadd,
4457c478bd9Sstevel@tonic-gate rcp->r_size);
4467c478bd9Sstevel@tonic-gate
4477c478bd9Sstevel@tonic-gate if ((tracing == 0) || ((FLAGS1(rcp->r_dlmp) &
4487c478bd9Sstevel@tonic-gate FL1_RT_DISPREL) == 0))
4497c478bd9Sstevel@tonic-gate continue;
4507c478bd9Sstevel@tonic-gate
4517c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_REL_CPYDISP),
4527c478bd9Sstevel@tonic-gate demangle(rcp->r_name), NAME(rcp->r_dlmp));
4537c478bd9Sstevel@tonic-gate }
4547c478bd9Sstevel@tonic-gate }
4557c478bd9Sstevel@tonic-gate
4565aefb655Srie DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD));
4577c478bd9Sstevel@tonic-gate
458cce0e03bSab196087 free(COPY_S(nlmp));
4592017c965SRod Evans COPY_S(nlmp) = NULL;
4607c478bd9Sstevel@tonic-gate }
4617c478bd9Sstevel@tonic-gate return (1);
4627c478bd9Sstevel@tonic-gate }
4637c478bd9Sstevel@tonic-gate
4647c478bd9Sstevel@tonic-gate int
relocate_lmc(Lm_list * lml,Aliste nlmco,Rt_map * clmp,Rt_map * nlmp,int * in_nfavl)4659aa23310Srie relocate_lmc(Lm_list *lml, Aliste nlmco, Rt_map *clmp, Rt_map *nlmp,
4669aa23310Srie int *in_nfavl)
4677c478bd9Sstevel@tonic-gate {
4687c478bd9Sstevel@tonic-gate int lret = 1, pret = 1;
469cce0e03bSab196087 APlist *alp;
4707c478bd9Sstevel@tonic-gate Aliste plmco;
4717c478bd9Sstevel@tonic-gate Lm_cntl *plmc, *nlmc;
4727c478bd9Sstevel@tonic-gate
4737c478bd9Sstevel@tonic-gate /*
4747c478bd9Sstevel@tonic-gate * If this link-map control list is being relocated, return. The object
4757c478bd9Sstevel@tonic-gate * that has just been added will be picked up by the existing relocation
4767c478bd9Sstevel@tonic-gate * thread. Note, this is only really meaningful during process init-
4777c478bd9Sstevel@tonic-gate * ialization, as objects are added to the main link-map control list.
4787c478bd9Sstevel@tonic-gate * Following this initialization, each family of objects that are loaded
4797c478bd9Sstevel@tonic-gate * are added to a new link-map control list.
4807c478bd9Sstevel@tonic-gate */
4817c478bd9Sstevel@tonic-gate /* LINTED */
482cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
4837c478bd9Sstevel@tonic-gate
4847c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_RELOCATING)
4857c478bd9Sstevel@tonic-gate return (1);
4867c478bd9Sstevel@tonic-gate
4877c478bd9Sstevel@tonic-gate nlmc->lc_flags |= LMC_FLG_RELOCATING;
4887c478bd9Sstevel@tonic-gate
4897c478bd9Sstevel@tonic-gate /*
4907c478bd9Sstevel@tonic-gate * Relocate one or more link-maps of a link map control list. If this
4917c478bd9Sstevel@tonic-gate * object doesn't belong to the present link-map control list then it
4927c478bd9Sstevel@tonic-gate * must already have been relocated, or it is in the process of being
4937c478bd9Sstevel@tonic-gate * relocated prior to us recursing into this relocation. In either
4947c478bd9Sstevel@tonic-gate * case, ignore the object as it's already being taken care of, however,
4957c478bd9Sstevel@tonic-gate * fall through and capture any relocation promotions that might have
4967c478bd9Sstevel@tonic-gate * been established from the reference mode of this object.
4977c478bd9Sstevel@tonic-gate *
4987c478bd9Sstevel@tonic-gate * If we're generating a configuration file using crle(1), two passes
4997c478bd9Sstevel@tonic-gate * may be involved. Under the first pass, RTLD_CONFGEN is set. Under
5007c478bd9Sstevel@tonic-gate * this pass, crle() loads objects into the process address space. No
5017c478bd9Sstevel@tonic-gate * relocation is necessary at this point, we simply need to analyze the
50208278a5eSRod Evans * objects to ensure any directly bound dependencies, filtees, etc.
50308278a5eSRod Evans * get loaded. Although we skip the relocation, fall through to ensure
5047c478bd9Sstevel@tonic-gate * any control lists are maintained appropriately.
5057c478bd9Sstevel@tonic-gate *
5067c478bd9Sstevel@tonic-gate * If objects are to be dldump(3c)'ed, crle(1) makes a second pass,
5077c478bd9Sstevel@tonic-gate * using RTLD_NOW and RTLD_CONFGEN. The RTLD_NOW effectively carries
5087c478bd9Sstevel@tonic-gate * out the relocations of all loaded objects.
5097c478bd9Sstevel@tonic-gate */
5107c478bd9Sstevel@tonic-gate if ((nlmco == CNTL(nlmp)) &&
5117c478bd9Sstevel@tonic-gate ((MODE(nlmp) & (RTLD_NOW | RTLD_CONFGEN)) != RTLD_CONFGEN)) {
5127c478bd9Sstevel@tonic-gate int relocated = 0;
5137c478bd9Sstevel@tonic-gate
5147c478bd9Sstevel@tonic-gate /*
5157c478bd9Sstevel@tonic-gate * Determine whether the initial link-map control list has
5167c478bd9Sstevel@tonic-gate * started relocation. From this point, should any interposing
5177c478bd9Sstevel@tonic-gate * objects be added to this link-map control list, the objects
5187c478bd9Sstevel@tonic-gate * are demoted to standard objects. Their interposition can't
5197c478bd9Sstevel@tonic-gate * be guaranteed once relocations have been carried out.
5207c478bd9Sstevel@tonic-gate */
521cce0e03bSab196087 if (nlmco == ALIST_OFF_DATA)
5227c478bd9Sstevel@tonic-gate lml->lm_flags |= LML_FLG_STARTREL;
5237c478bd9Sstevel@tonic-gate
5247c478bd9Sstevel@tonic-gate /*
52502ca3e02Srie * Relocate the link-map control list. Should this relocation
52602ca3e02Srie * fail, clean up this link-map list. Relocations within this
52702ca3e02Srie * list may have required relocation promotions on other lists,
52802ca3e02Srie * so before acting upon these, and possibly adding more objects
52902ca3e02Srie * to the present link-map control list, try and clean up any
53002ca3e02Srie * failed objects now.
5317c478bd9Sstevel@tonic-gate */
53256deab07SRod Evans lret = _relocate_lmc(lml, nlmco, nlmp, &relocated, in_nfavl);
533cce0e03bSab196087 if ((lret == 0) && (nlmco != ALIST_OFF_DATA))
534481bba9eSRod Evans remove_lmc(lml, clmp, nlmco, NAME(nlmp));
5357c478bd9Sstevel@tonic-gate }
5367c478bd9Sstevel@tonic-gate
5377c478bd9Sstevel@tonic-gate /*
5387c478bd9Sstevel@tonic-gate * Determine the new, and previous link-map control lists.
5397c478bd9Sstevel@tonic-gate */
54024a6229eSrie /* LINTED */
541cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
542cce0e03bSab196087 if (nlmco == ALIST_OFF_DATA) {
5436679fdc0Srie plmco = nlmco;
5447c478bd9Sstevel@tonic-gate plmc = nlmc;
5456679fdc0Srie } else {
5467c478bd9Sstevel@tonic-gate plmco = nlmco - lml->lm_lists->al_size;
5477c478bd9Sstevel@tonic-gate /* LINTED */
548cce0e03bSab196087 plmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, plmco);
5497c478bd9Sstevel@tonic-gate }
5507c478bd9Sstevel@tonic-gate
5517c478bd9Sstevel@tonic-gate /*
5527c478bd9Sstevel@tonic-gate * Having completed this control list of objects, they can now be bound
5537c478bd9Sstevel@tonic-gate * to from other objects. Move this control list to the control list
5547c478bd9Sstevel@tonic-gate * that precedes it. Although this control list may have only bound to
5557c478bd9Sstevel@tonic-gate * controls lists much higher up the control list stack, it must only
5567c478bd9Sstevel@tonic-gate * be moved up one control list so as to preserve the link-map order
5577c478bd9Sstevel@tonic-gate * that may have already been traversed in search of symbols.
5587c478bd9Sstevel@tonic-gate */
559cce0e03bSab196087 if (lret && (nlmco != ALIST_OFF_DATA) && nlmc->lc_head)
5607c478bd9Sstevel@tonic-gate lm_move(lml, nlmco, plmco, nlmc, plmc);
5617c478bd9Sstevel@tonic-gate
5627c478bd9Sstevel@tonic-gate /*
5637c478bd9Sstevel@tonic-gate * Determine whether existing objects that have already been relocated,
5647c478bd9Sstevel@tonic-gate * need any additional relocations performed. This can occur when new
5657c478bd9Sstevel@tonic-gate * objects are loaded with RTLD_NOW, and these new objects have
5667c478bd9Sstevel@tonic-gate * dependencies on objects that are already loaded. Note, that we peel
5677c478bd9Sstevel@tonic-gate * any relocation promotions off of one control list at a time. This
5687c478bd9Sstevel@tonic-gate * prevents relocations from being bound to objects that might yet fail
5697c478bd9Sstevel@tonic-gate * to relocate themselves.
5707c478bd9Sstevel@tonic-gate */
571cce0e03bSab196087 while ((alp = plmc->lc_now) != NULL) {
572cce0e03bSab196087 Aliste idx;
573cce0e03bSab196087 Rt_map *lmp;
5747c478bd9Sstevel@tonic-gate
5757c478bd9Sstevel@tonic-gate /*
5767c478bd9Sstevel@tonic-gate * Remove the relocation promotion list, as performing more
5777c478bd9Sstevel@tonic-gate * relocations may result in discovering more objects that need
5787c478bd9Sstevel@tonic-gate * promotion.
5797c478bd9Sstevel@tonic-gate */
580cce0e03bSab196087 plmc->lc_now = NULL;
5817c478bd9Sstevel@tonic-gate
582cce0e03bSab196087 for (APLIST_TRAVERSE(alp, idx, lmp)) {
5837c478bd9Sstevel@tonic-gate /*
5847c478bd9Sstevel@tonic-gate * If the original relocation of the link-map control
5857c478bd9Sstevel@tonic-gate * list failed, or one of the relocation promotions of
5867c478bd9Sstevel@tonic-gate * this loop has failed, demote any pending objects
5877c478bd9Sstevel@tonic-gate * relocation mode.
5887c478bd9Sstevel@tonic-gate */
5897c478bd9Sstevel@tonic-gate if ((lret == 0) || (pret == 0)) {
5907c478bd9Sstevel@tonic-gate MODE(lmp) &= ~RTLD_NOW;
5917c478bd9Sstevel@tonic-gate MODE(lmp) |= RTLD_LAZY;
5927c478bd9Sstevel@tonic-gate continue;
5937c478bd9Sstevel@tonic-gate }
5947c478bd9Sstevel@tonic-gate
5957c478bd9Sstevel@tonic-gate /*
5967c478bd9Sstevel@tonic-gate * If a relocation fails, save the error condition.
5977c478bd9Sstevel@tonic-gate * It's possible that all new objects on the original
5987c478bd9Sstevel@tonic-gate * link-map control list have been relocated
5997c478bd9Sstevel@tonic-gate * successfully, but if the user request requires
6007c478bd9Sstevel@tonic-gate * promoting objects that have already been loaded, we
6017c478bd9Sstevel@tonic-gate * have to indicate that this operation couldn't be
6027c478bd9Sstevel@tonic-gate * performed. The unrelocated objects are in use on
6037c478bd9Sstevel@tonic-gate * another control list, and may continue to be used.
6047c478bd9Sstevel@tonic-gate * If the .plt that resulted in the error is called,
6057c478bd9Sstevel@tonic-gate * then the process will receive a fatal error at that
6067c478bd9Sstevel@tonic-gate * time. But, the .plt may never be called.
6077c478bd9Sstevel@tonic-gate */
6089aa23310Srie if (relocate_so(lml, lmp, 0, 1, in_nfavl) == 0)
6097c478bd9Sstevel@tonic-gate pret = 0;
6107c478bd9Sstevel@tonic-gate }
6117c478bd9Sstevel@tonic-gate
6127c478bd9Sstevel@tonic-gate /*
6137c478bd9Sstevel@tonic-gate * Having promoted any objects, determine whether additional
6147c478bd9Sstevel@tonic-gate * dependencies were added, and if so move them to the previous
6157c478bd9Sstevel@tonic-gate * link-map control list.
6167c478bd9Sstevel@tonic-gate */
61724a6229eSrie /* LINTED */
618cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
61924a6229eSrie /* LINTED */
620cce0e03bSab196087 plmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, plmco);
621cce0e03bSab196087 if ((nlmco != ALIST_OFF_DATA) && nlmc->lc_head)
6227c478bd9Sstevel@tonic-gate lm_move(lml, nlmco, plmco, nlmc, plmc);
6238521e5e6Srie free(alp);
6247c478bd9Sstevel@tonic-gate }
6257c478bd9Sstevel@tonic-gate
62624a6229eSrie /*
62702ca3e02Srie * If relocations have been successful, indicate that relocations are
62802ca3e02Srie * no longer active for this control list. Otherwise, leave the
62902ca3e02Srie * relocation flag, as this flag is used to determine the style of
63002ca3e02Srie * cleanup (see remove_lmc()).
63124a6229eSrie */
63202ca3e02Srie if (lret && pret) {
63324a6229eSrie /* LINTED */
634cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco);
6357c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_RELOCATING;
6367c478bd9Sstevel@tonic-gate
6377c478bd9Sstevel@tonic-gate return (1);
63802ca3e02Srie }
63902ca3e02Srie
6407c478bd9Sstevel@tonic-gate return (0);
6417c478bd9Sstevel@tonic-gate }
6427c478bd9Sstevel@tonic-gate
6437c478bd9Sstevel@tonic-gate /*
6447c478bd9Sstevel@tonic-gate * Inherit the first rejection message for possible later diagnostics.
6457c478bd9Sstevel@tonic-gate *
6467c478bd9Sstevel@tonic-gate * Any attempt to process a file that is unsuccessful, should be accompanied
6477c478bd9Sstevel@tonic-gate * with an error diagnostic. However, some operations like searching for a
6487c478bd9Sstevel@tonic-gate * simple filename, involve trying numerous paths, and an error message for each
6497c478bd9Sstevel@tonic-gate * lookup is not required. Although a multiple search can fail, it's possible
6507c478bd9Sstevel@tonic-gate * that a file was found, but was rejected because it was the wrong type.
6517c478bd9Sstevel@tonic-gate * To satisfy these possibilities, the first failure is recorded as a rejection
6527c478bd9Sstevel@tonic-gate * message, and this message is used later for a more specific diagnostic.
6537c478bd9Sstevel@tonic-gate *
6547c478bd9Sstevel@tonic-gate * File searches are focused at load_one(), and from here a rejection descriptor
6557c478bd9Sstevel@tonic-gate * is passed down to various child routines. If these child routines can
6567c478bd9Sstevel@tonic-gate * process multiple files, then they will maintain their own rejection desc-
6577c478bd9Sstevel@tonic-gate * riptor. This is filled in for any failures, and a diagnostic produced to
6587c478bd9Sstevel@tonic-gate * reflect the failure. The child routines then employ rejection_inherit() to
6597c478bd9Sstevel@tonic-gate * pass the first rejection message back to load_one().
6607c478bd9Sstevel@tonic-gate *
6617c478bd9Sstevel@tonic-gate * Note that the name, and rejection string must be duplicated, as the name
6627c478bd9Sstevel@tonic-gate * buffer and error string buffer (see conv_ routines) may be reused for
6637c478bd9Sstevel@tonic-gate * additional processing or rejection messages.
6647c478bd9Sstevel@tonic-gate */
6657c478bd9Sstevel@tonic-gate void
rejection_inherit(Rej_desc * rej1,Rej_desc * rej2)66631fdd7caSab196087 rejection_inherit(Rej_desc *rej1, Rej_desc *rej2)
6677c478bd9Sstevel@tonic-gate {
6687c478bd9Sstevel@tonic-gate if (rej2->rej_type && (rej1->rej_type == 0)) {
6697c478bd9Sstevel@tonic-gate rej1->rej_type = rej2->rej_type;
6707c478bd9Sstevel@tonic-gate rej1->rej_info = rej2->rej_info;
67156deab07SRod Evans rej1->rej_flags = rej2->rej_flags;
6727c478bd9Sstevel@tonic-gate if (rej2->rej_name)
67356deab07SRod Evans rej1->rej_name = stravl_insert(rej2->rej_name, 0, 0, 0);
67456deab07SRod Evans if ((rej2->rej_str) && ((rej1->rej_str =
67556deab07SRod Evans stravl_insert(rej2->rej_str, 0, 0, 0)) == NULL))
6767c478bd9Sstevel@tonic-gate rej1->rej_str = MSG_ORIG(MSG_EMG_ENOMEM);
6777c478bd9Sstevel@tonic-gate }
6787c478bd9Sstevel@tonic-gate }
6797c478bd9Sstevel@tonic-gate
6807c478bd9Sstevel@tonic-gate /*
6810aa3cd4dSrie * Helper routine for is_so_matched() that consolidates matching a path name,
6820aa3cd4dSrie * or file name component of a link-map name.
6837c478bd9Sstevel@tonic-gate */
68456deab07SRod Evans inline static int
_is_so_matched(const char * name,const char * str,int path)6850aa3cd4dSrie _is_so_matched(const char *name, const char *str, int path)
6867c478bd9Sstevel@tonic-gate {
6877c478bd9Sstevel@tonic-gate const char *_str;
6887c478bd9Sstevel@tonic-gate
6890aa3cd4dSrie if ((path == 0) && ((_str = strrchr(str, '/')) != NULL))
6907c478bd9Sstevel@tonic-gate _str++;
6917c478bd9Sstevel@tonic-gate else
6927c478bd9Sstevel@tonic-gate _str = str;
6937c478bd9Sstevel@tonic-gate
6947c478bd9Sstevel@tonic-gate return (strcmp(name, _str));
6957c478bd9Sstevel@tonic-gate }
6967c478bd9Sstevel@tonic-gate
6970aa3cd4dSrie /*
6980aa3cd4dSrie * Determine whether a search name matches one of the names associated with a
6990aa3cd4dSrie * link-map. A link-map contains several names:
7000aa3cd4dSrie *
7012017c965SRod Evans * - a NAME() - this is the basename of the dynamic executable that started
7022017c965SRod Evans * the process, and the path name of any dependencies used by the process.
7032017c965SRod Evans * Most executables are received as full path names, as exec() prepends a
7042017c965SRod Evans * search $PATH to locate the executable. However, simple file names can
7052017c965SRod Evans * be received from exec() if the file is executed from the present working
7062017c965SRod Evans * directory. Regardless, ld.so.1 maintains NAME() as the basename, as
7072017c965SRod Evans * this has always been the name used in diagnostics and error messages.
7082017c965SRod Evans * Most dependencies are full path names, as the typical search for a
7092017c965SRod Evans * dependency, say "libx.so.1", results in search paths being prepended to
7102017c965SRod Evans * the name, which eventually open "/lib/libx.so.1". However, relative
7112017c965SRod Evans * path names can be supplied as dependencies, e.g. dlopen("../libx.so.1").
7120aa3cd4dSrie *
7132017c965SRod Evans * - a PATHNAME() - this is the fully resolved path name of the object. This
7142017c965SRod Evans * name will differ from NAME() for all dynamic executables, and may differ
7152017c965SRod Evans * from the NAME() of dependencies, if the dependency is not a full path
7162017c965SRod Evans * name, or the dependency resolves to a symbolic link.
7170aa3cd4dSrie *
7182017c965SRod Evans * - an ALIAS() name - these are alternative names by which the object has
71956deab07SRod Evans * been found, ie. when dependencies are loaded through a variety of
72056deab07SRod Evans * different symbolic links.
7210aa3cd4dSrie *
7220aa3cd4dSrie * The name pattern matching can differ depending on whether we are looking
7230aa3cd4dSrie * for a full path name (path != 0), or a simple file name (path == 0). Full
72456deab07SRod Evans * path names typically match NAME() or PATHNAME() entries.
7250aa3cd4dSrie *
7260aa3cd4dSrie * For all full path name searches, the link-map names are taken as is. For
7270aa3cd4dSrie * simple file name searches, only the file name component of any link-map
7280aa3cd4dSrie * names are used for comparison.
7290aa3cd4dSrie */
73056deab07SRod Evans inline static Rt_map *
is_so_matched(Rt_map * lmp,const char * name,int path)7310aa3cd4dSrie is_so_matched(Rt_map *lmp, const char *name, int path)
7327c478bd9Sstevel@tonic-gate {
733cce0e03bSab196087 Aliste idx;
734cce0e03bSab196087 const char *cp;
7357c478bd9Sstevel@tonic-gate
73656deab07SRod Evans if (_is_so_matched(name, NAME(lmp), path) == 0)
7377c478bd9Sstevel@tonic-gate return (lmp);
7387c478bd9Sstevel@tonic-gate
7397c478bd9Sstevel@tonic-gate if (PATHNAME(lmp) != NAME(lmp)) {
74056deab07SRod Evans if (_is_so_matched(name, PATHNAME(lmp), path) == 0)
7417c478bd9Sstevel@tonic-gate return (lmp);
7427c478bd9Sstevel@tonic-gate }
7430aa3cd4dSrie
744cce0e03bSab196087 for (APLIST_TRAVERSE(ALIAS(lmp), idx, cp)) {
745cce0e03bSab196087 if (_is_so_matched(name, cp, path) == 0)
7460aa3cd4dSrie return (lmp);
7470aa3cd4dSrie }
7480aa3cd4dSrie
74937ffaf83SRod Evans return (NULL);
7507c478bd9Sstevel@tonic-gate }
7517c478bd9Sstevel@tonic-gate
7520aa3cd4dSrie /*
7530aa3cd4dSrie * Files are opened by ld.so.1 to satisfy dependencies, filtees and dlopen()
7540aa3cd4dSrie * requests. Each request investigates the file based upon the callers
7559aa23310Srie * environment. Once a full path name has been established, the following
7569aa23310Srie * checks are made:
7570aa3cd4dSrie *
7582017c965SRod Evans * - does the path exist in the link-map lists FullPathNode AVL tree? if
7599aa23310Srie * so, the file is already loaded, and its associated link-map pointer
7609aa23310Srie * is returned.
7612017c965SRod Evans * - does the path exist in the not-found AVL tree? if so, this path has
7629aa23310Srie * already been determined to not exist, and a failure is returned.
7632017c965SRod Evans * - a device/inode check, to ensure the same file isn't mapped multiple
7649aa23310Srie * times through different paths. See file_open().
7659aa23310Srie *
7669aa23310Srie * However, there are cases where a test for an existing file name needs to be
7679aa23310Srie * carried out, such as dlopen(NOLOAD) requests, dldump() requests, and as a
7689aa23310Srie * final fallback to dependency loading. These requests are handled by
7699aa23310Srie * is_so_loaded().
7700aa3cd4dSrie *
7710aa3cd4dSrie * A traversal through the callers link-map list is carried out, and from each
7720aa3cd4dSrie * link-map, a comparison is made against all of the various names by which the
77308278a5eSRod Evans * object has been referenced. is_so_matched() is used to compare the link-map
7749aa23310Srie * names against the name being searched for. Whether the search name is a full
7759aa23310Srie * path name or a simple file name, governs what comparisons are made.
7760aa3cd4dSrie *
7770aa3cd4dSrie * A full path name, which is a fully resolved path name that starts with a "/"
7780aa3cd4dSrie * character, or a relative path name that includes a "/" character, must match
77956deab07SRod Evans * the link-map names exactly. A simple file name, which is any name *not*
7800aa3cd4dSrie * containing a "/" character, are matched against the file name component of
7810aa3cd4dSrie * any link-map names.
7820aa3cd4dSrie */
7837c478bd9Sstevel@tonic-gate Rt_map *
is_so_loaded(Lm_list * lml,const char * name,int * in_nfavl)7849aa23310Srie is_so_loaded(Lm_list *lml, const char *name, int *in_nfavl)
7857c478bd9Sstevel@tonic-gate {
7867c478bd9Sstevel@tonic-gate Rt_map *lmp;
7877c478bd9Sstevel@tonic-gate avl_index_t where;
7887c478bd9Sstevel@tonic-gate Lm_cntl *lmc;
789cce0e03bSab196087 Aliste idx;
7900aa3cd4dSrie int path = 0;
7917c478bd9Sstevel@tonic-gate
7927c478bd9Sstevel@tonic-gate /*
7930aa3cd4dSrie * If the name is a full path name, first determine if the path name is
7949aa23310Srie * registered on the FullPathNode AVL, or not-found AVL trees.
7957c478bd9Sstevel@tonic-gate */
7969aa23310Srie if (name[0] == '/') {
79756deab07SRod Evans uint_t hash = sgs_str_hash(name);
79856deab07SRod Evans
79956deab07SRod Evans if (((lmp = fpavl_recorded(lml, name, hash, &where)) != NULL) &&
8007c478bd9Sstevel@tonic-gate ((FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) == 0))
8017c478bd9Sstevel@tonic-gate return (lmp);
80256deab07SRod Evans
80308278a5eSRod Evans if (pnavl_recorded(&nfavl, name, hash, NULL)) {
8049aa23310Srie /*
8059aa23310Srie * For dlopen() and dlsym() fall backs, indicate that
8069aa23310Srie * a registered not-found path has indicated that this
8079aa23310Srie * object does not exist.
8089aa23310Srie */
8099aa23310Srie if (in_nfavl)
8109aa23310Srie (*in_nfavl)++;
81137ffaf83SRod Evans return (NULL);
8129aa23310Srie }
8139aa23310Srie }
8147c478bd9Sstevel@tonic-gate
8157c478bd9Sstevel@tonic-gate /*
8160aa3cd4dSrie * Determine whether the name is a simple file name, or a path name.
8177c478bd9Sstevel@tonic-gate */
8180aa3cd4dSrie if (strchr(name, '/'))
8190aa3cd4dSrie path++;
8207c478bd9Sstevel@tonic-gate
8217c478bd9Sstevel@tonic-gate /*
8227c478bd9Sstevel@tonic-gate * Loop through the callers link-map lists.
8237c478bd9Sstevel@tonic-gate */
824cce0e03bSab196087 for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) {
825cb511613SAli Bahrami for (lmp = lmc->lc_head; lmp; lmp = NEXT_RT_MAP(lmp)) {
8267c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE))
8277c478bd9Sstevel@tonic-gate continue;
8287c478bd9Sstevel@tonic-gate
8290aa3cd4dSrie if (is_so_matched(lmp, name, path))
8307c478bd9Sstevel@tonic-gate return (lmp);
8317c478bd9Sstevel@tonic-gate }
8327c478bd9Sstevel@tonic-gate }
83337ffaf83SRod Evans return (NULL);
8347c478bd9Sstevel@tonic-gate }
8357c478bd9Sstevel@tonic-gate
8367c478bd9Sstevel@tonic-gate /*
8377c478bd9Sstevel@tonic-gate * Tracing is enabled by the LD_TRACE_LOADED_OPTIONS environment variable which
8387c478bd9Sstevel@tonic-gate * is normally set from ldd(1). For each link map we load, print the load name
83908278a5eSRod Evans * and the full pathname of the associated object.
8407c478bd9Sstevel@tonic-gate */
8417c478bd9Sstevel@tonic-gate /* ARGSUSED4 */
8427c478bd9Sstevel@tonic-gate static void
trace_so(Rt_map * clmp,Rej_desc * rej,const char * name,const char * path,int alter,const char * nfound)8437c478bd9Sstevel@tonic-gate trace_so(Rt_map *clmp, Rej_desc *rej, const char *name, const char *path,
8447c478bd9Sstevel@tonic-gate int alter, const char *nfound)
8457c478bd9Sstevel@tonic-gate {
8467c478bd9Sstevel@tonic-gate const char *str = MSG_ORIG(MSG_STR_EMPTY);
8477c478bd9Sstevel@tonic-gate const char *reject = MSG_ORIG(MSG_STR_EMPTY);
8487c478bd9Sstevel@tonic-gate char _reject[PATH_MAX];
8497c478bd9Sstevel@tonic-gate
8507c478bd9Sstevel@tonic-gate /*
8517c478bd9Sstevel@tonic-gate * The first time through trace_so() will only have lddstub on the
8527c478bd9Sstevel@tonic-gate * link-map list and the preloaded shared object is supplied as "path".
8537c478bd9Sstevel@tonic-gate * As we don't want to print this shared object as a dependency, but
8547c478bd9Sstevel@tonic-gate * instead inspect *its* dependencies, return.
8557c478bd9Sstevel@tonic-gate */
8567c478bd9Sstevel@tonic-gate if (FLAGS1(clmp) & FL1_RT_LDDSTUB)
8577c478bd9Sstevel@tonic-gate return;
8587c478bd9Sstevel@tonic-gate
8597c478bd9Sstevel@tonic-gate /*
8607c478bd9Sstevel@tonic-gate * Without any rejection info, this is a supplied not-found condition.
8617c478bd9Sstevel@tonic-gate */
8627c478bd9Sstevel@tonic-gate if (rej && (rej->rej_type == 0)) {
8637c478bd9Sstevel@tonic-gate (void) printf(nfound, name);
8647c478bd9Sstevel@tonic-gate return;
8657c478bd9Sstevel@tonic-gate }
8667c478bd9Sstevel@tonic-gate
8677c478bd9Sstevel@tonic-gate /*
8687c478bd9Sstevel@tonic-gate * If rejection information exists then establish what object was
8697c478bd9Sstevel@tonic-gate * found and the reason for its rejection.
8707c478bd9Sstevel@tonic-gate */
8717c478bd9Sstevel@tonic-gate if (rej) {
872de777a60Sab196087 Conv_reject_desc_buf_t rej_buf;
873de777a60Sab196087
8747c478bd9Sstevel@tonic-gate /* LINTED */
8757c478bd9Sstevel@tonic-gate (void) snprintf(_reject, PATH_MAX,
876de777a60Sab196087 MSG_INTL(ldd_reject[rej->rej_type]),
877ba2be530Sab196087 conv_reject_desc(rej, &rej_buf, M_MACH));
8787c478bd9Sstevel@tonic-gate if (rej->rej_name)
8797c478bd9Sstevel@tonic-gate path = rej->rej_name;
8807c478bd9Sstevel@tonic-gate reject = (char *)_reject;
8817c478bd9Sstevel@tonic-gate
8827c478bd9Sstevel@tonic-gate /*
8837c478bd9Sstevel@tonic-gate * Was an alternative pathname defined (from a configuration
8847c478bd9Sstevel@tonic-gate * file).
8857c478bd9Sstevel@tonic-gate */
88656deab07SRod Evans if (rej->rej_flags & FLG_REJ_ALTER)
8877c478bd9Sstevel@tonic-gate str = MSG_INTL(MSG_LDD_FIL_ALTER);
8887c478bd9Sstevel@tonic-gate } else {
8897c478bd9Sstevel@tonic-gate if (alter)
8907c478bd9Sstevel@tonic-gate str = MSG_INTL(MSG_LDD_FIL_ALTER);
8917c478bd9Sstevel@tonic-gate }
8927c478bd9Sstevel@tonic-gate
8937c478bd9Sstevel@tonic-gate /*
8947c478bd9Sstevel@tonic-gate * If the load name isn't a full pathname print its associated pathname
8957c478bd9Sstevel@tonic-gate * together with all the other information we've gathered.
8967c478bd9Sstevel@tonic-gate */
8977c478bd9Sstevel@tonic-gate if (*name == '/')
8987c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), path, str, reject);
8997c478bd9Sstevel@tonic-gate else
9007247f888Srie (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), name, path, str,
9017247f888Srie reject);
9027c478bd9Sstevel@tonic-gate }
9037c478bd9Sstevel@tonic-gate
9047c478bd9Sstevel@tonic-gate /*
9057c478bd9Sstevel@tonic-gate * Establish a link-map mode, initializing it if it has just been loaded, or
9067c478bd9Sstevel@tonic-gate * potentially updating it if it already exists.
9077c478bd9Sstevel@tonic-gate */
9087c478bd9Sstevel@tonic-gate int
update_mode(Rt_map * lmp,int omode,int nmode)9097c478bd9Sstevel@tonic-gate update_mode(Rt_map *lmp, int omode, int nmode)
9107c478bd9Sstevel@tonic-gate {
911dffec89cSrie Lm_list *lml = LIST(lmp);
9127c478bd9Sstevel@tonic-gate int pmode = 0;
9137c478bd9Sstevel@tonic-gate
9147c478bd9Sstevel@tonic-gate /*
9157c478bd9Sstevel@tonic-gate * A newly loaded object hasn't had its mode set yet. Modes are used to
9167c478bd9Sstevel@tonic-gate * load dependencies, so don't propagate any parent or no-load flags, as
9177c478bd9Sstevel@tonic-gate * these would adversely affect this objects ability to load any of its
9187c478bd9Sstevel@tonic-gate * dependencies that aren't already loaded. RTLD_FIRST is applicable to
9197c478bd9Sstevel@tonic-gate * this objects handle creation only, and should not be propagated.
9207c478bd9Sstevel@tonic-gate */
9217c478bd9Sstevel@tonic-gate if ((FLAGS(lmp) & FLG_RT_MODESET) == 0) {
9227c478bd9Sstevel@tonic-gate MODE(lmp) |= nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST);
9237c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_MODESET;
9247c478bd9Sstevel@tonic-gate return (1);
9257c478bd9Sstevel@tonic-gate }
9267c478bd9Sstevel@tonic-gate
9277c478bd9Sstevel@tonic-gate /*
9287c478bd9Sstevel@tonic-gate * Establish any new overriding modes. RTLD_LAZY and RTLD_NOW should be
9297c478bd9Sstevel@tonic-gate * represented individually (this is historic, as these two flags were
9307c478bd9Sstevel@tonic-gate * the only flags originally available to dlopen()). Other flags are
9317c478bd9Sstevel@tonic-gate * accumulative, but have a hierarchy of preference.
9327c478bd9Sstevel@tonic-gate */
9337c478bd9Sstevel@tonic-gate if ((omode & RTLD_LAZY) && (nmode & RTLD_NOW)) {
9347c478bd9Sstevel@tonic-gate MODE(lmp) &= ~RTLD_LAZY;
9357c478bd9Sstevel@tonic-gate pmode |= RTLD_NOW;
9367c478bd9Sstevel@tonic-gate }
9377c478bd9Sstevel@tonic-gate
9387c478bd9Sstevel@tonic-gate pmode |= ((~omode & nmode) &
9397c478bd9Sstevel@tonic-gate (RTLD_GLOBAL | RTLD_WORLD | RTLD_NODELETE));
9407c478bd9Sstevel@tonic-gate if (pmode) {
9415aefb655Srie DBG_CALL(Dbg_file_mode_promote(lmp, pmode));
9427c478bd9Sstevel@tonic-gate MODE(lmp) |= pmode;
9437c478bd9Sstevel@tonic-gate }
9447c478bd9Sstevel@tonic-gate
9457c478bd9Sstevel@tonic-gate /*
9467c478bd9Sstevel@tonic-gate * If this load is an RTLD_NOW request and the object has already been
9477c478bd9Sstevel@tonic-gate * loaded non-RTLD_NOW, append this object to the relocation-now list
9487c478bd9Sstevel@tonic-gate * of the objects associated control list. Note, if the object hasn't
9497c478bd9Sstevel@tonic-gate * yet been relocated, setting its MODE() to RTLD_NOW will establish
9507c478bd9Sstevel@tonic-gate * full relocation processing when it eventually gets relocated.
9517c478bd9Sstevel@tonic-gate */
9527c478bd9Sstevel@tonic-gate if ((pmode & RTLD_NOW) &&
9537c478bd9Sstevel@tonic-gate (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))) {
9547c478bd9Sstevel@tonic-gate Lm_cntl *lmc;
9557c478bd9Sstevel@tonic-gate
9567c478bd9Sstevel@tonic-gate /* LINTED */
957cce0e03bSab196087 lmc = (Lm_cntl *)alist_item_by_offset(LIST(lmp)->lm_lists,
958cce0e03bSab196087 CNTL(lmp));
959cce0e03bSab196087 (void) aplist_append(&lmc->lc_now, lmp, AL_CNT_LMNOW);
9607c478bd9Sstevel@tonic-gate }
9617c478bd9Sstevel@tonic-gate
9627c478bd9Sstevel@tonic-gate /*
963dffec89cSrie * If this objects .init has been collected but has not yet been called,
964dffec89cSrie * it may be necessary to reevaluate the object using tsort(). For
9657c478bd9Sstevel@tonic-gate * example, a new dlopen() hierarchy may bind to uninitialized objects
9667c478bd9Sstevel@tonic-gate * that are already loaded, or a dlopen(RTLD_NOW) can establish new
9677c478bd9Sstevel@tonic-gate * bindings between already loaded objects that require the tsort()
968dffec89cSrie * information be recomputed. If however, no new objects have been
969dffec89cSrie * added to the process, and this object hasn't been promoted, don't
970dffec89cSrie * bother reevaluating the .init. The present tsort() information is
971dffec89cSrie * probably as accurate as necessary, and by not establishing a parallel
972dffec89cSrie * tsort() we can help reduce the amount of recursion possible between
973dffec89cSrie * .inits.
9747c478bd9Sstevel@tonic-gate */
975dffec89cSrie if (((FLAGS(lmp) &
976dffec89cSrie (FLG_RT_INITCLCT | FLG_RT_INITCALL)) == FLG_RT_INITCLCT) &&
977dffec89cSrie ((lml->lm_flags & LML_FLG_OBJADDED) || ((pmode & RTLD_NOW) &&
978dffec89cSrie (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))))) {
9797c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_INITCLCT;
9807c478bd9Sstevel@tonic-gate LIST(lmp)->lm_init++;
981dffec89cSrie LIST(lmp)->lm_flags |= LML_FLG_OBJREEVAL;
9827c478bd9Sstevel@tonic-gate }
9837c478bd9Sstevel@tonic-gate
9847c478bd9Sstevel@tonic-gate return (pmode);
9857c478bd9Sstevel@tonic-gate }
9867c478bd9Sstevel@tonic-gate
9877c478bd9Sstevel@tonic-gate /*
9887c478bd9Sstevel@tonic-gate * Determine whether an alias name already exists, and if not create one. This
9897c478bd9Sstevel@tonic-gate * is typically used to retain dependency names, such as "libc.so.1", which
9907c478bd9Sstevel@tonic-gate * would have been expanded to full path names when they were loaded. The
99156deab07SRod Evans * full path names (NAME() and possibly PATHNAME()) are maintained on the
99256deab07SRod Evans * FullPathNode AVL tree, and thus would have been matched by fpavl_loaded()
99356deab07SRod Evans * during file_open().
9947c478bd9Sstevel@tonic-gate */
9957c478bd9Sstevel@tonic-gate int
append_alias(Rt_map * lmp,const char * str,int * added)9967c478bd9Sstevel@tonic-gate append_alias(Rt_map *lmp, const char *str, int *added)
9977c478bd9Sstevel@tonic-gate {
99856deab07SRod Evans const char *cp;
999cce0e03bSab196087 Aliste idx;
10007c478bd9Sstevel@tonic-gate
10017c478bd9Sstevel@tonic-gate /*
10027c478bd9Sstevel@tonic-gate * Determine if this filename is already on the alias list.
10037c478bd9Sstevel@tonic-gate */
1004cce0e03bSab196087 for (APLIST_TRAVERSE(ALIAS(lmp), idx, cp)) {
1005cce0e03bSab196087 if (strcmp(cp, str) == 0)
10067c478bd9Sstevel@tonic-gate return (1);
10077c478bd9Sstevel@tonic-gate }
10087c478bd9Sstevel@tonic-gate
10097c478bd9Sstevel@tonic-gate /*
10107c478bd9Sstevel@tonic-gate * This is a new alias, append it to the alias list.
10117c478bd9Sstevel@tonic-gate */
101256deab07SRod Evans if (((cp = stravl_insert(str, 0, 0, 0)) == NULL) ||
101356deab07SRod Evans (aplist_append(&ALIAS(lmp), cp, AL_CNT_ALIAS) == NULL))
10147c478bd9Sstevel@tonic-gate return (0);
10157c478bd9Sstevel@tonic-gate
10167c478bd9Sstevel@tonic-gate if (added)
10177c478bd9Sstevel@tonic-gate *added = 1;
10187c478bd9Sstevel@tonic-gate return (1);
10197c478bd9Sstevel@tonic-gate }
10207c478bd9Sstevel@tonic-gate
10217c478bd9Sstevel@tonic-gate /*
10227c478bd9Sstevel@tonic-gate * Determine whether a file is already loaded by comparing device and inode
10237c478bd9Sstevel@tonic-gate * values.
10247c478bd9Sstevel@tonic-gate */
10257c478bd9Sstevel@tonic-gate static Rt_map *
is_devinode_loaded(rtld_stat_t * status,Lm_list * lml,const char * name,uint_t flags)1026cb511613SAli Bahrami is_devinode_loaded(rtld_stat_t *status, Lm_list *lml, const char *name,
10277c478bd9Sstevel@tonic-gate uint_t flags)
10287c478bd9Sstevel@tonic-gate {
10297c478bd9Sstevel@tonic-gate Lm_cntl *lmc;
1030cce0e03bSab196087 Aliste idx;
10317c478bd9Sstevel@tonic-gate
10327c478bd9Sstevel@tonic-gate /*
10337c478bd9Sstevel@tonic-gate * If this is an auditor, it will have been opened on a new link-map.
10348af2c5b9Srie * To prevent multiple occurrences of the same auditor on multiple
10357c478bd9Sstevel@tonic-gate * link-maps, search the head of each link-map list and see if this
10367c478bd9Sstevel@tonic-gate * object is already loaded as an auditor.
10377c478bd9Sstevel@tonic-gate */
10387c478bd9Sstevel@tonic-gate if (flags & FLG_RT_AUDIT) {
10397c478bd9Sstevel@tonic-gate Lm_list *lml;
10407c478bd9Sstevel@tonic-gate
104157ef7aa9SRod Evans for (APLIST_TRAVERSE(dynlm_list, idx, lml)) {
10427c478bd9Sstevel@tonic-gate Rt_map *nlmp = lml->lm_head;
10437c478bd9Sstevel@tonic-gate
10447c478bd9Sstevel@tonic-gate if (nlmp && ((FLAGS(nlmp) &
10457c478bd9Sstevel@tonic-gate (FLG_RT_AUDIT | FLG_RT_DELETE)) == FLG_RT_AUDIT) &&
10467c478bd9Sstevel@tonic-gate (STDEV(nlmp) == status->st_dev) &&
10477c478bd9Sstevel@tonic-gate (STINO(nlmp) == status->st_ino))
10487c478bd9Sstevel@tonic-gate return (nlmp);
10497c478bd9Sstevel@tonic-gate }
105037ffaf83SRod Evans return (NULL);
10517c478bd9Sstevel@tonic-gate }
10527c478bd9Sstevel@tonic-gate
10537c478bd9Sstevel@tonic-gate /*
10547c478bd9Sstevel@tonic-gate * If the file has been found determine from the new files status
10557c478bd9Sstevel@tonic-gate * information if this file is actually linked to one we already have
10567c478bd9Sstevel@tonic-gate * mapped. This catches symlink names not caught by is_so_loaded().
10577c478bd9Sstevel@tonic-gate */
1058cce0e03bSab196087 for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) {
10597c478bd9Sstevel@tonic-gate Rt_map *nlmp;
10607c478bd9Sstevel@tonic-gate
1061cb511613SAli Bahrami for (nlmp = lmc->lc_head; nlmp; nlmp = NEXT_RT_MAP(nlmp)) {
10627c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_DELETE) ||
10637c478bd9Sstevel@tonic-gate (FLAGS1(nlmp) & FL1_RT_LDDSTUB))
10647c478bd9Sstevel@tonic-gate continue;
10657c478bd9Sstevel@tonic-gate
10667c478bd9Sstevel@tonic-gate if ((STDEV(nlmp) != status->st_dev) ||
10677c478bd9Sstevel@tonic-gate (STINO(nlmp) != status->st_ino))
10687c478bd9Sstevel@tonic-gate continue;
10697c478bd9Sstevel@tonic-gate
10707c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_VERBOSE) {
10717247f888Srie /* BEGIN CSTYLED */
10727c478bd9Sstevel@tonic-gate if (*name == '/')
10737c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH),
10747c478bd9Sstevel@tonic-gate name, MSG_ORIG(MSG_STR_EMPTY),
10757c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY));
10767c478bd9Sstevel@tonic-gate else
10777c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV),
10787c478bd9Sstevel@tonic-gate name, NAME(nlmp),
10797c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY),
10807c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY));
10817247f888Srie /* END CSTYLED */
10827c478bd9Sstevel@tonic-gate }
10837c478bd9Sstevel@tonic-gate return (nlmp);
10847c478bd9Sstevel@tonic-gate }
10857c478bd9Sstevel@tonic-gate }
108637ffaf83SRod Evans return (NULL);
10877c478bd9Sstevel@tonic-gate }
10887c478bd9Sstevel@tonic-gate
10897c478bd9Sstevel@tonic-gate /*
10907c478bd9Sstevel@tonic-gate * Generate any error messages indicating a file could not be found. When
10917c478bd9Sstevel@tonic-gate * preloading or auditing a secure application, it can be a little more helpful
10927c478bd9Sstevel@tonic-gate * to indicate that a search of secure directories has failed, so adjust the
10937c478bd9Sstevel@tonic-gate * messages accordingly.
10947c478bd9Sstevel@tonic-gate */
10957c478bd9Sstevel@tonic-gate void
file_notfound(Lm_list * lml,const char * name,Rt_map * clmp,uint_t flags,Rej_desc * rej)10967c478bd9Sstevel@tonic-gate file_notfound(Lm_list *lml, const char *name, Rt_map *clmp, uint_t flags,
10977c478bd9Sstevel@tonic-gate Rej_desc *rej)
10987c478bd9Sstevel@tonic-gate {
10997c478bd9Sstevel@tonic-gate int secure = 0;
11007c478bd9Sstevel@tonic-gate
11017c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_SECURE) &&
11027c478bd9Sstevel@tonic-gate (flags & (FLG_RT_PRELOAD | FLG_RT_AUDIT)))
11037c478bd9Sstevel@tonic-gate secure++;
11047c478bd9Sstevel@tonic-gate
11057c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE) {
11067c478bd9Sstevel@tonic-gate /*
11077c478bd9Sstevel@tonic-gate * Under ldd(1), auxiliary filtees that can't be loaded are
11087c478bd9Sstevel@tonic-gate * ignored, unless verbose errors are requested.
11097c478bd9Sstevel@tonic-gate */
11107c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_SILENCERR) &&
11117c478bd9Sstevel@tonic-gate ((lml->lm_flags & LML_FLG_TRC_VERBOSE) == 0))
11127c478bd9Sstevel@tonic-gate return;
11137c478bd9Sstevel@tonic-gate
11147c478bd9Sstevel@tonic-gate if (secure)
11157c478bd9Sstevel@tonic-gate trace_so(clmp, rej, name, 0, 0,
11167c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_SEC_NFOUND));
11177c478bd9Sstevel@tonic-gate else
11187c478bd9Sstevel@tonic-gate trace_so(clmp, rej, name, 0, 0,
11197c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_FIL_NFOUND));
11207c478bd9Sstevel@tonic-gate return;
11217c478bd9Sstevel@tonic-gate }
11227c478bd9Sstevel@tonic-gate
11237c478bd9Sstevel@tonic-gate if (rej->rej_type) {
1124de777a60Sab196087 Conv_reject_desc_buf_t rej_buf;
1125de777a60Sab196087
11265aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(err_reject[rej->rej_type]),
11277c478bd9Sstevel@tonic-gate rej->rej_name ? rej->rej_name : MSG_INTL(MSG_STR_UNKNOWN),
1128ba2be530Sab196087 conv_reject_desc(rej, &rej_buf, M_MACH));
11297c478bd9Sstevel@tonic-gate return;
11307c478bd9Sstevel@tonic-gate }
11317c478bd9Sstevel@tonic-gate
11327c478bd9Sstevel@tonic-gate if (secure)
11335aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SEC_OPEN), name);
11347c478bd9Sstevel@tonic-gate else
11355aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), name,
11367c478bd9Sstevel@tonic-gate strerror(ENOENT));
11377c478bd9Sstevel@tonic-gate }
11387c478bd9Sstevel@tonic-gate
11397c478bd9Sstevel@tonic-gate static int
file_open(int err,Lm_list * lml,Rt_map * clmp,uint_t flags,Fdesc * fdp,Rej_desc * rej,int * in_nfavl)114056deab07SRod Evans file_open(int err, Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp,
114156deab07SRod Evans Rej_desc *rej, int *in_nfavl)
11427c478bd9Sstevel@tonic-gate {
1143cb511613SAli Bahrami rtld_stat_t status;
11447c478bd9Sstevel@tonic-gate Rt_map *nlmp;
11459aa23310Srie avl_index_t nfavlwhere = 0;
114656deab07SRod Evans const char *oname = fdp->fd_oname, *nname = fdp->fd_nname;
114756deab07SRod Evans uint_t hash = sgs_str_hash(nname);
11487c478bd9Sstevel@tonic-gate
11497c478bd9Sstevel@tonic-gate
115056deab07SRod Evans if ((nname = stravl_insert(fdp->fd_nname, hash, 0, 0)) == NULL)
115156deab07SRod Evans return (0);
115256deab07SRod Evans fdp->fd_nname = nname;
115356deab07SRod Evans
115456deab07SRod Evans if ((err == 0) && (fdp->fd_flags & FLG_FD_ALTER))
11555aefb655Srie DBG_CALL(Dbg_file_config_obj(lml, oname, 0, nname));
11567c478bd9Sstevel@tonic-gate
11577c478bd9Sstevel@tonic-gate /*
11587c478bd9Sstevel@tonic-gate * If we're dealing with a full pathname, determine whether this
11597c478bd9Sstevel@tonic-gate * pathname is already known. Other pathnames fall through to the
11607c478bd9Sstevel@tonic-gate * dev/inode check, as even though the pathname may look the same as
11617c478bd9Sstevel@tonic-gate * one previously used, the process may have changed directory.
11627c478bd9Sstevel@tonic-gate */
11637c478bd9Sstevel@tonic-gate if ((err == 0) && (nname[0] == '/')) {
116456deab07SRod Evans if ((nlmp = fpavl_recorded(lml, nname, hash,
116556deab07SRod Evans &(fdp->fd_avlwhere))) != NULL) {
116656deab07SRod Evans fdp->fd_lmp = nlmp;
11677c478bd9Sstevel@tonic-gate return (1);
11687c478bd9Sstevel@tonic-gate }
116908278a5eSRod Evans if (pnavl_recorded(&nfavl, nname, hash, &nfavlwhere)) {
11709aa23310Srie /*
11719aa23310Srie * For dlopen() and dlsym() fall backs, indicate that
11729aa23310Srie * a registered not-found path has indicated that this
11739aa23310Srie * object does not exist. If this path has been
117408278a5eSRod Evans * constructed as part of expanding a CAPABILITY
117508278a5eSRod Evans * directory, this is a silent failure, where no
117608278a5eSRod Evans * rejection message is created.
11779aa23310Srie */
11789aa23310Srie if (in_nfavl)
11799aa23310Srie (*in_nfavl)++;
11809aa23310Srie return (0);
11819aa23310Srie }
11827c478bd9Sstevel@tonic-gate }
11837c478bd9Sstevel@tonic-gate
1184cb511613SAli Bahrami if ((err == 0) && ((rtld_stat(nname, &status)) != -1)) {
11857c478bd9Sstevel@tonic-gate char path[PATH_MAX];
11867c478bd9Sstevel@tonic-gate int fd, size, added;
11877c478bd9Sstevel@tonic-gate
11887c478bd9Sstevel@tonic-gate /*
11897c478bd9Sstevel@tonic-gate * If this path has been constructed as part of expanding a
119008278a5eSRod Evans * CAPABILITY directory, ignore any subdirectories. As this
119108278a5eSRod Evans * is a silent failure, no rejection message is created. For
119208278a5eSRod Evans * any other reference that expands to a directory, fall
119308278a5eSRod Evans * through to construct a meaningful rejection message.
11947c478bd9Sstevel@tonic-gate */
119508278a5eSRod Evans if ((flags & FLG_RT_CAP) &&
119656deab07SRod Evans ((status.st_mode & S_IFMT) == S_IFDIR))
119756deab07SRod Evans return (0);
119856deab07SRod Evans
119956deab07SRod Evans /*
120056deab07SRod Evans * If this is a directory (which can't be mmap()'ed) generate a
120156deab07SRod Evans * precise error message.
120256deab07SRod Evans */
120356deab07SRod Evans if ((status.st_mode & S_IFMT) == S_IFDIR) {
120456deab07SRod Evans rej->rej_name = nname;
120556deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER)
120656deab07SRod Evans rej->rej_flags = FLG_REJ_ALTER;
120756deab07SRod Evans rej->rej_type = SGS_REJ_STR;
120856deab07SRod Evans rej->rej_str = strerror(EISDIR);
120956deab07SRod Evans DBG_CALL(Dbg_file_rejected(lml, rej, M_MACH));
12107c478bd9Sstevel@tonic-gate return (0);
12118521e5e6Srie }
12127c478bd9Sstevel@tonic-gate
12137c478bd9Sstevel@tonic-gate /*
12147c478bd9Sstevel@tonic-gate * Resolve the filename and determine whether the resolved name
12157c478bd9Sstevel@tonic-gate * is already known. Typically, the previous fpavl_loaded()
12167c478bd9Sstevel@tonic-gate * will have caught this, as both NAME() and PATHNAME() for a
121756deab07SRod Evans * link-map are recorded in the FullPathNode AVL tree. However,
12187c478bd9Sstevel@tonic-gate * instances exist where a file can be replaced (loop-back
12197c478bd9Sstevel@tonic-gate * mounts, bfu, etc.), and reference is made to the original
12207c478bd9Sstevel@tonic-gate * file through a symbolic link. By checking the pathname here,
12217c478bd9Sstevel@tonic-gate * we don't fall through to the dev/inode check and conclude
12227c478bd9Sstevel@tonic-gate * that a new file should be loaded.
12237c478bd9Sstevel@tonic-gate */
122456deab07SRod Evans if ((nname[0] == '/') &&
12257c478bd9Sstevel@tonic-gate ((size = resolvepath(nname, path, (PATH_MAX - 1))) > 0)) {
12267c478bd9Sstevel@tonic-gate path[size] = '\0';
12277c478bd9Sstevel@tonic-gate
122856deab07SRod Evans fdp->fd_flags |= FLG_FD_RESOLVED;
122956deab07SRod Evans
12307c478bd9Sstevel@tonic-gate if (strcmp(nname, path)) {
123124a6229eSrie if ((nlmp =
123256deab07SRod Evans fpavl_recorded(lml, path, 0, 0)) != NULL) {
12337c478bd9Sstevel@tonic-gate added = 0;
12347c478bd9Sstevel@tonic-gate
12357c478bd9Sstevel@tonic-gate if (append_alias(nlmp, nname,
12367c478bd9Sstevel@tonic-gate &added) == 0)
12377c478bd9Sstevel@tonic-gate return (0);
12387247f888Srie /* BEGIN CSTYLED */
12397c478bd9Sstevel@tonic-gate if (added)
124010a4fa49Srie DBG_CALL(Dbg_file_skip(LIST(clmp),
12415aefb655Srie NAME(nlmp), nname));
12427247f888Srie /* END CSTYLED */
124356deab07SRod Evans fdp->fd_lmp = nlmp;
12447c478bd9Sstevel@tonic-gate return (1);
12457c478bd9Sstevel@tonic-gate }
12467c478bd9Sstevel@tonic-gate
12477c478bd9Sstevel@tonic-gate /*
12487c478bd9Sstevel@tonic-gate * If this pathname hasn't been loaded, save
12497c478bd9Sstevel@tonic-gate * the resolved pathname so that it doesn't
12507c478bd9Sstevel@tonic-gate * have to be recomputed as part of fullpath()
12517c478bd9Sstevel@tonic-gate * processing.
12527c478bd9Sstevel@tonic-gate */
125356deab07SRod Evans if ((fdp->fd_pname = stravl_insert(path, 0,
125456deab07SRod Evans (size + 1), 0)) == NULL)
12557c478bd9Sstevel@tonic-gate return (0);
12567c478bd9Sstevel@tonic-gate }
12577c478bd9Sstevel@tonic-gate }
12587c478bd9Sstevel@tonic-gate
12597c478bd9Sstevel@tonic-gate if (nlmp = is_devinode_loaded(&status, lml, nname, flags)) {
1260c75e1b9dSrie if (flags & FLG_RT_AUDIT) {
1261c75e1b9dSrie /*
1262c75e1b9dSrie * If we've been requested to load an auditor,
1263c75e1b9dSrie * and an auditor of the same name already
1264c75e1b9dSrie * exists, then the original auditor is used.
1265c75e1b9dSrie */
1266c75e1b9dSrie DBG_CALL(Dbg_audit_skip(LIST(clmp),
1267c75e1b9dSrie NAME(nlmp), LIST(nlmp)->lm_lmidstr));
1268c75e1b9dSrie } else {
1269c75e1b9dSrie /*
1270c75e1b9dSrie * Otherwise, if an alternatively named file
1271c75e1b9dSrie * has been found for the same dev/inode, add
127256deab07SRod Evans * a new name alias. Insert any alias full path
127356deab07SRod Evans * name in the FullPathNode AVL tree.
1274c75e1b9dSrie */
12757c478bd9Sstevel@tonic-gate added = 0;
12767c478bd9Sstevel@tonic-gate
12777c478bd9Sstevel@tonic-gate if (append_alias(nlmp, nname, &added) == 0)
12787c478bd9Sstevel@tonic-gate return (0);
12797c478bd9Sstevel@tonic-gate if (added) {
1280c75e1b9dSrie if ((nname[0] == '/') &&
1281c75e1b9dSrie (fpavl_insert(lml, nlmp,
1282c75e1b9dSrie nname, 0) == 0))
12837c478bd9Sstevel@tonic-gate return (0);
1284c75e1b9dSrie DBG_CALL(Dbg_file_skip(LIST(clmp),
1285c75e1b9dSrie NAME(nlmp), nname));
12867c478bd9Sstevel@tonic-gate }
1287c75e1b9dSrie }
1288c75e1b9dSrie
1289c75e1b9dSrie /*
1290c75e1b9dSrie * Record in the file descriptor the existing object
1291c75e1b9dSrie * that satisfies this open request.
1292c75e1b9dSrie */
129356deab07SRod Evans fdp->fd_lmp = nlmp;
12947c478bd9Sstevel@tonic-gate return (1);
12957c478bd9Sstevel@tonic-gate }
12967c478bd9Sstevel@tonic-gate
12977c478bd9Sstevel@tonic-gate if ((fd = open(nname, O_RDONLY, 0)) == -1) {
12987c478bd9Sstevel@tonic-gate /*
12997c478bd9Sstevel@tonic-gate * As the file must exist for the previous stat() to
13007c478bd9Sstevel@tonic-gate * have succeeded, record the error condition.
13017c478bd9Sstevel@tonic-gate */
13027c478bd9Sstevel@tonic-gate rej->rej_type = SGS_REJ_STR;
13037c478bd9Sstevel@tonic-gate rej->rej_str = strerror(errno);
13047c478bd9Sstevel@tonic-gate } else {
130556deab07SRod Evans /*
130656deab07SRod Evans * Map the object. A successful return indicates that
130756deab07SRod Evans * the object is appropriate for ld.so.1 processing.
130856deab07SRod Evans */
130956deab07SRod Evans fdp->fd_ftp = map_obj(lml, fdp, status.st_size, nname,
131056deab07SRod Evans fd, rej);
131156deab07SRod Evans (void) close(fd);
13127c478bd9Sstevel@tonic-gate
131356deab07SRod Evans if (fdp->fd_ftp != NULL) {
131456deab07SRod Evans fdp->fd_dev = status.st_dev;
131556deab07SRod Evans fdp->fd_ino = status.st_ino;
13167c478bd9Sstevel@tonic-gate return (1);
13177c478bd9Sstevel@tonic-gate }
13187c478bd9Sstevel@tonic-gate }
13197c478bd9Sstevel@tonic-gate
13207c478bd9Sstevel@tonic-gate } else if (errno != ENOENT) {
13217c478bd9Sstevel@tonic-gate /*
13227c478bd9Sstevel@tonic-gate * If the open() failed for anything other than the file not
13237c478bd9Sstevel@tonic-gate * existing, record the error condition.
13247c478bd9Sstevel@tonic-gate */
13257c478bd9Sstevel@tonic-gate rej->rej_type = SGS_REJ_STR;
13267c478bd9Sstevel@tonic-gate rej->rej_str = strerror(errno);
13277c478bd9Sstevel@tonic-gate }
13287c478bd9Sstevel@tonic-gate
13297c478bd9Sstevel@tonic-gate /*
13309aa23310Srie * Regardless of error, duplicate and record any full path names that
13319aa23310Srie * can't be used on the "not-found" AVL tree.
13329aa23310Srie */
133356deab07SRod Evans if (nname[0] == '/')
133456deab07SRod Evans nfavl_insert(nname, nfavlwhere);
13359aa23310Srie
13369aa23310Srie /*
13377c478bd9Sstevel@tonic-gate * Indicate any rejection.
13387c478bd9Sstevel@tonic-gate */
13397c478bd9Sstevel@tonic-gate if (rej->rej_type) {
13407c478bd9Sstevel@tonic-gate rej->rej_name = nname;
134156deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER)
134256deab07SRod Evans rej->rej_flags = FLG_REJ_ALTER;
1343ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, rej, M_MACH));
13447c478bd9Sstevel@tonic-gate }
13457c478bd9Sstevel@tonic-gate return (0);
13467c478bd9Sstevel@tonic-gate }
13477c478bd9Sstevel@tonic-gate
13487c478bd9Sstevel@tonic-gate /*
13497c478bd9Sstevel@tonic-gate * Find a full pathname (it contains a "/").
13507c478bd9Sstevel@tonic-gate */
13517c478bd9Sstevel@tonic-gate int
find_path(Lm_list * lml,Rt_map * clmp,uint_t flags,Fdesc * fdp,Rej_desc * rej,int * in_nfavl)135256deab07SRod Evans find_path(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej,
135356deab07SRod Evans int *in_nfavl)
13547c478bd9Sstevel@tonic-gate {
135556deab07SRod Evans const char *oname = fdp->fd_oname;
13567c478bd9Sstevel@tonic-gate int err = 0;
13577c478bd9Sstevel@tonic-gate
13587c478bd9Sstevel@tonic-gate /*
13597c478bd9Sstevel@tonic-gate * If directory configuration exists determine if this path is known.
13607c478bd9Sstevel@tonic-gate */
13617c478bd9Sstevel@tonic-gate if (rtld_flags & RT_FL_DIRCFG) {
13627c478bd9Sstevel@tonic-gate Rtc_obj *obj;
13637c478bd9Sstevel@tonic-gate const char *aname;
13647c478bd9Sstevel@tonic-gate
13657c478bd9Sstevel@tonic-gate if ((obj = elf_config_ent(oname, (Word)elf_hash(oname),
13667c478bd9Sstevel@tonic-gate 0, &aname)) != 0) {
13677c478bd9Sstevel@tonic-gate /*
13687c478bd9Sstevel@tonic-gate * If the configuration file states that this path is a
13697c478bd9Sstevel@tonic-gate * directory, or the path is explicitly defined as
13707c478bd9Sstevel@tonic-gate * non-existent (ie. a unused platform specific
13717c478bd9Sstevel@tonic-gate * library), then go no further.
13727c478bd9Sstevel@tonic-gate */
13737c478bd9Sstevel@tonic-gate if (obj->co_flags & RTC_OBJ_DIRENT) {
13747c478bd9Sstevel@tonic-gate err = EISDIR;
13757c478bd9Sstevel@tonic-gate } else if ((obj->co_flags &
13767c478bd9Sstevel@tonic-gate (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) ==
13777c478bd9Sstevel@tonic-gate RTC_OBJ_NOEXIST) {
13787c478bd9Sstevel@tonic-gate err = ENOENT;
13797c478bd9Sstevel@tonic-gate } else if ((obj->co_flags & RTC_OBJ_ALTER) &&
13807c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_OBJALT) && (lml == &lml_main)) {
13817c478bd9Sstevel@tonic-gate int ret;
13827c478bd9Sstevel@tonic-gate
138356deab07SRod Evans fdp->fd_flags |= FLG_FD_ALTER;
138456deab07SRod Evans fdp->fd_nname = aname;
138556deab07SRod Evans
13867c478bd9Sstevel@tonic-gate /*
13877c478bd9Sstevel@tonic-gate * Attempt to open the alternative path. If
13887c478bd9Sstevel@tonic-gate * this fails, and the alternative is flagged
13897c478bd9Sstevel@tonic-gate * as optional, fall through to open the
13907c478bd9Sstevel@tonic-gate * original path.
13917c478bd9Sstevel@tonic-gate */
13925aefb655Srie DBG_CALL(Dbg_libs_found(lml, aname,
13935aefb655Srie FLG_FD_ALTER));
139456deab07SRod Evans ret = file_open(0, lml, clmp, flags, fdp,
139556deab07SRod Evans rej, in_nfavl);
139656deab07SRod Evans if (ret || ((obj->co_flags &
139756deab07SRod Evans RTC_OBJ_OPTINAL) == 0))
13987c478bd9Sstevel@tonic-gate return (ret);
13997c478bd9Sstevel@tonic-gate
140056deab07SRod Evans fdp->fd_flags &= ~FLG_FD_ALTER;
14017c478bd9Sstevel@tonic-gate }
14027c478bd9Sstevel@tonic-gate }
14037c478bd9Sstevel@tonic-gate }
14045aefb655Srie DBG_CALL(Dbg_libs_found(lml, oname, 0));
140556deab07SRod Evans fdp->fd_nname = oname;
140656deab07SRod Evans return (file_open(err, lml, clmp, flags, fdp, rej, in_nfavl));
14077c478bd9Sstevel@tonic-gate }
14087c478bd9Sstevel@tonic-gate
14097c478bd9Sstevel@tonic-gate /*
14107c478bd9Sstevel@tonic-gate * Find a simple filename (it doesn't contain a "/").
14117c478bd9Sstevel@tonic-gate */
14127c478bd9Sstevel@tonic-gate static int
_find_file(Lm_list * lml,Rt_map * clmp,uint_t flags,Fdesc * fdp,Rej_desc * rej,Pdesc * pdp,int aflag,int * in_nfavl)141356deab07SRod Evans _find_file(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej,
141456deab07SRod Evans Pdesc *pdp, int aflag, int *in_nfavl)
14157c478bd9Sstevel@tonic-gate {
141656deab07SRod Evans const char *nname = fdp->fd_nname;
141756deab07SRod Evans
14185aefb655Srie DBG_CALL(Dbg_libs_found(lml, nname, aflag));
14197c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_TRC_SEARCH) &&
14207c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) {
14217c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_PTH_TRYING), nname, aflag ?
14227c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_FIL_ALTER) : MSG_ORIG(MSG_STR_EMPTY));
14237c478bd9Sstevel@tonic-gate }
14247c478bd9Sstevel@tonic-gate
14257c478bd9Sstevel@tonic-gate /*
14267c478bd9Sstevel@tonic-gate * If we're being audited tell the audit library of the file we're about
14277c478bd9Sstevel@tonic-gate * to go search for. The audit library may offer an alternative
14287c478bd9Sstevel@tonic-gate * dependency, or indicate that this dependency should be ignored.
14297c478bd9Sstevel@tonic-gate */
143056deab07SRod Evans if ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_OBJSEARCH) {
14319aa23310Srie char *aname;
14327c478bd9Sstevel@tonic-gate
14339aa23310Srie if ((aname = audit_objsearch(clmp, nname,
143456deab07SRod Evans (pdp->pd_flags & LA_SER_MASK))) == NULL) {
14357247f888Srie DBG_CALL(Dbg_audit_terminate(lml, nname));
14367c478bd9Sstevel@tonic-gate return (0);
14377247f888Srie }
14387247f888Srie
143956deab07SRod Evans if (aname != nname) {
144056deab07SRod Evans fdp->fd_flags &= ~FLG_FD_SLASH;
144156deab07SRod Evans fdp->fd_nname = aname;
14427c478bd9Sstevel@tonic-gate }
144356deab07SRod Evans }
144456deab07SRod Evans return (file_open(0, lml, clmp, flags, fdp, rej, in_nfavl));
14457c478bd9Sstevel@tonic-gate }
14467c478bd9Sstevel@tonic-gate
1447390b98b5Srie static int
find_file(Lm_list * lml,Rt_map * clmp,uint_t flags,Fdesc * fdp,Rej_desc * rej,Pdesc * pdp,Word * strhash,int * in_nfavl)144856deab07SRod Evans find_file(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej,
144956deab07SRod Evans Pdesc *pdp, Word *strhash, int *in_nfavl)
14507c478bd9Sstevel@tonic-gate {
14517c478bd9Sstevel@tonic-gate static Rtc_obj Obj = { 0 };
14527c478bd9Sstevel@tonic-gate Rtc_obj *dobj;
145356deab07SRod Evans const char *oname = fdp->fd_oname;
145456deab07SRod Evans size_t olen = strlen(oname);
14557c478bd9Sstevel@tonic-gate
145656deab07SRod Evans if (pdp->pd_pname == NULL)
14577c478bd9Sstevel@tonic-gate return (0);
145856deab07SRod Evans if (pdp->pd_info) {
145956deab07SRod Evans dobj = (Rtc_obj *)pdp->pd_info;
14607c478bd9Sstevel@tonic-gate if ((dobj->co_flags &
14617c478bd9Sstevel@tonic-gate (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
14627c478bd9Sstevel@tonic-gate return (0);
14637c478bd9Sstevel@tonic-gate } else
146456deab07SRod Evans dobj = NULL;
14657c478bd9Sstevel@tonic-gate
14667c478bd9Sstevel@tonic-gate /*
14677c478bd9Sstevel@tonic-gate * If configuration information exists see if this directory/file
14687c478bd9Sstevel@tonic-gate * combination exists.
14697c478bd9Sstevel@tonic-gate */
14707c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_DIRCFG) &&
147156deab07SRod Evans ((dobj == NULL) || (dobj->co_id != 0))) {
14727c478bd9Sstevel@tonic-gate Rtc_obj *fobj;
147356deab07SRod Evans const char *aname = NULL;
14747c478bd9Sstevel@tonic-gate
14757c478bd9Sstevel@tonic-gate /*
147656deab07SRod Evans * If this object descriptor has not yet been searched for in
147756deab07SRod Evans * the configuration file go find it.
14787c478bd9Sstevel@tonic-gate */
147956deab07SRod Evans if (dobj == NULL) {
148056deab07SRod Evans dobj = elf_config_ent(pdp->pd_pname,
148156deab07SRod Evans (Word)elf_hash(pdp->pd_pname), 0, 0);
148256deab07SRod Evans if (dobj == NULL)
14837c478bd9Sstevel@tonic-gate dobj = &Obj;
148456deab07SRod Evans pdp->pd_info = (void *)dobj;
14857c478bd9Sstevel@tonic-gate
14867c478bd9Sstevel@tonic-gate if ((dobj->co_flags & (RTC_OBJ_NOEXIST |
14877c478bd9Sstevel@tonic-gate RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
14887c478bd9Sstevel@tonic-gate return (0);
14897c478bd9Sstevel@tonic-gate }
14907c478bd9Sstevel@tonic-gate
14917c478bd9Sstevel@tonic-gate /*
14927c478bd9Sstevel@tonic-gate * If we found a directory search for the file.
14937c478bd9Sstevel@tonic-gate */
14947c478bd9Sstevel@tonic-gate if (dobj->co_id != 0) {
149556deab07SRod Evans if (*strhash == NULL)
149656deab07SRod Evans *strhash = (Word)elf_hash(oname);
149756deab07SRod Evans fobj = elf_config_ent(oname, *strhash,
149856deab07SRod Evans dobj->co_id, &aname);
14997c478bd9Sstevel@tonic-gate
15007c478bd9Sstevel@tonic-gate /*
15017c478bd9Sstevel@tonic-gate * If this object specifically does not exist, or the
15027c478bd9Sstevel@tonic-gate * object can't be found in a know-all-entries
15037c478bd9Sstevel@tonic-gate * directory, continue looking. If the object does
15047c478bd9Sstevel@tonic-gate * exist determine if an alternative object exists.
15057c478bd9Sstevel@tonic-gate */
150656deab07SRod Evans if (fobj == NULL) {
15077c478bd9Sstevel@tonic-gate if (dobj->co_flags & RTC_OBJ_ALLENTS)
15087c478bd9Sstevel@tonic-gate return (0);
15097c478bd9Sstevel@tonic-gate } else {
15107c478bd9Sstevel@tonic-gate if ((fobj->co_flags & (RTC_OBJ_NOEXIST |
15117c478bd9Sstevel@tonic-gate RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST)
15127c478bd9Sstevel@tonic-gate return (0);
15137c478bd9Sstevel@tonic-gate
15147c478bd9Sstevel@tonic-gate if ((fobj->co_flags & RTC_OBJ_ALTER) &&
15157c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_OBJALT) &&
15167c478bd9Sstevel@tonic-gate (lml == &lml_main)) {
15177c478bd9Sstevel@tonic-gate int ret;
15187c478bd9Sstevel@tonic-gate
151956deab07SRod Evans fdp->fd_flags |= FLG_FD_ALTER;
152056deab07SRod Evans fdp->fd_nname = aname;
152156deab07SRod Evans
15227c478bd9Sstevel@tonic-gate /*
15237c478bd9Sstevel@tonic-gate * Attempt to open the alternative path.
15247c478bd9Sstevel@tonic-gate * If this fails, and the alternative is
15257c478bd9Sstevel@tonic-gate * flagged as optional, fall through to
15267c478bd9Sstevel@tonic-gate * open the original path.
15277c478bd9Sstevel@tonic-gate */
152856deab07SRod Evans ret = _find_file(lml, clmp, flags, fdp,
152956deab07SRod Evans rej, pdp, 1, in_nfavl);
15307c478bd9Sstevel@tonic-gate if (ret || ((fobj->co_flags &
15317c478bd9Sstevel@tonic-gate RTC_OBJ_OPTINAL) == 0))
15327c478bd9Sstevel@tonic-gate return (ret);
15337c478bd9Sstevel@tonic-gate
153456deab07SRod Evans fdp->fd_flags &= ~FLG_FD_ALTER;
15357c478bd9Sstevel@tonic-gate }
15367c478bd9Sstevel@tonic-gate }
15377c478bd9Sstevel@tonic-gate }
15387c478bd9Sstevel@tonic-gate }
15397c478bd9Sstevel@tonic-gate
15407c478bd9Sstevel@tonic-gate /*
15417c478bd9Sstevel@tonic-gate * Protect ourselves from building an invalid pathname.
15427c478bd9Sstevel@tonic-gate */
154356deab07SRod Evans if ((olen + pdp->pd_plen + 1) >= PATH_MAX) {
154456deab07SRod Evans eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), oname,
15457c478bd9Sstevel@tonic-gate strerror(ENAMETOOLONG));
15467c478bd9Sstevel@tonic-gate return (0);
15477c478bd9Sstevel@tonic-gate }
154856deab07SRod Evans if ((fdp->fd_nname = (LM_GET_SO(clmp)(pdp->pd_pname, oname,
154956deab07SRod Evans pdp->pd_plen, olen))) == NULL)
15507c478bd9Sstevel@tonic-gate return (0);
15517c478bd9Sstevel@tonic-gate
155256deab07SRod Evans return (_find_file(lml, clmp, flags, fdp, rej, pdp, 0, in_nfavl));
155356deab07SRod Evans }
155456deab07SRod Evans
155556deab07SRod Evans static Fct *Vector[] = {
155656deab07SRod Evans &elf_fct,
155756deab07SRod Evans #ifdef A_OUT
155856deab07SRod Evans &aout_fct,
155956deab07SRod Evans #endif
156056deab07SRod Evans 0
156156deab07SRod Evans };
156256deab07SRod Evans
156356deab07SRod Evans /*
156456deab07SRod Evans * Remap the first page of a file to provide a better diagnostic as to why
156556deab07SRod Evans * an mmapobj(2) operation on this file failed. Sadly, mmapobj(), and all
156656deab07SRod Evans * system calls for that matter, only pass back a generic failure in errno.
156756deab07SRod Evans * Hopefully one day this will be improved, but in the mean time we repeat
156856deab07SRod Evans * the kernels ELF verification to try and provide more detailed information.
156956deab07SRod Evans */
157056deab07SRod Evans static int
map_fail(Fdesc * fdp,size_t fsize,const char * name,int fd,Rej_desc * rej)157156deab07SRod Evans map_fail(Fdesc *fdp, size_t fsize, const char *name, int fd, Rej_desc *rej)
157256deab07SRod Evans {
157356deab07SRod Evans caddr_t addr;
157456deab07SRod Evans int vnum;
157556deab07SRod Evans size_t size;
157656deab07SRod Evans
157756deab07SRod Evans /*
157856deab07SRod Evans * Use the original file size to determine what to map, and catch the
157956deab07SRod Evans * obvious error of a zero sized file.
158056deab07SRod Evans */
158156deab07SRod Evans if (fsize == 0) {
158256deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE;
158356deab07SRod Evans return (1);
158456deab07SRod Evans } else if (fsize < syspagsz)
158556deab07SRod Evans size = fsize;
158656deab07SRod Evans else
158756deab07SRod Evans size = syspagsz;
158856deab07SRod Evans
158956deab07SRod Evans if ((addr = mmap(0, size, PROT_READ, MAP_PRIVATE, fd, 0)) == MAP_FAILED)
159056deab07SRod Evans return (0);
159156deab07SRod Evans
159256deab07SRod Evans rej->rej_type = 0;
159356deab07SRod Evans
159456deab07SRod Evans /*
159556deab07SRod Evans * Validate the file against each supported file type. Should a
159656deab07SRod Evans * characteristic of the file be found invalid for this platform, a
159756deab07SRod Evans * rejection message will have been recorded.
159856deab07SRod Evans */
159956deab07SRod Evans for (vnum = 0; Vector[vnum]; vnum++) {
160056deab07SRod Evans if (((Vector[vnum]->fct_verify_file)(addr, size,
160156deab07SRod Evans fdp, name, rej) == 0) && rej->rej_type)
160256deab07SRod Evans break;
160356deab07SRod Evans }
160456deab07SRod Evans
160556deab07SRod Evans /*
160656deab07SRod Evans * If no rejection message has been recorded, then this is simply an
160756deab07SRod Evans * unknown file type.
160856deab07SRod Evans */
160956deab07SRod Evans if (rej->rej_type == 0)
161056deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE;
161156deab07SRod Evans
161256deab07SRod Evans (void) munmap(addr, size);
161356deab07SRod Evans return (1);
161456deab07SRod Evans }
161556deab07SRod Evans
161656deab07SRod Evans /*
161756deab07SRod Evans * Unmap a file.
161856deab07SRod Evans */
161956deab07SRod Evans void
unmap_obj(mmapobj_result_t * mpp,uint_t mapnum)162056deab07SRod Evans unmap_obj(mmapobj_result_t *mpp, uint_t mapnum)
162156deab07SRod Evans {
162256deab07SRod Evans uint_t num;
162356deab07SRod Evans
162456deab07SRod Evans for (num = 0; num < mapnum; num++) {
162556deab07SRod Evans /* LINTED */
162656deab07SRod Evans (void) munmap((void *)(uintptr_t)mpp[num].mr_addr,
162756deab07SRod Evans mpp[num].mr_msize);
162856deab07SRod Evans }
162920272c2eSAli Bahrami cnt_unmap++;
163056deab07SRod Evans }
163156deab07SRod Evans
163256deab07SRod Evans /*
163356deab07SRod Evans * Map a file.
163456deab07SRod Evans */
163556deab07SRod Evans Fct *
map_obj(Lm_list * lml,Fdesc * fdp,size_t fsize,const char * name,int fd,Rej_desc * rej)163656deab07SRod Evans map_obj(Lm_list *lml, Fdesc *fdp, size_t fsize, const char *name, int fd,
163756deab07SRod Evans Rej_desc *rej)
163856deab07SRod Evans {
163956deab07SRod Evans static mmapobj_result_t *smpp = NULL;
164056deab07SRod Evans static uint_t smapnum;
164156deab07SRod Evans mmapobj_result_t *mpp;
164256deab07SRod Evans uint_t mnum, mapnum, mflags;
164356deab07SRod Evans void *padding;
164456deab07SRod Evans
164556deab07SRod Evans /*
164656deab07SRod Evans * Allocate an initial mapping array. The initial size should be large
164756deab07SRod Evans * enough to handle the normal ELF objects we come across.
164856deab07SRod Evans */
164956deab07SRod Evans if (smpp == NULL) {
165056deab07SRod Evans smpp = malloc(sizeof (mmapobj_result_t) * MMAPFD_NUM);
165156deab07SRod Evans if (smpp == NULL)
165256deab07SRod Evans return (NULL);
165356deab07SRod Evans smapnum = MMAPFD_NUM;
165456deab07SRod Evans }
165556deab07SRod Evans
165656deab07SRod Evans /*
165756deab07SRod Evans * If object padding is required, set the necessary flags.
165856deab07SRod Evans */
165956deab07SRod Evans if (r_debug.rtd_objpad) {
166056deab07SRod Evans mflags = MMOBJ_INTERPRET | MMOBJ_PADDING;
166156deab07SRod Evans padding = &r_debug.rtd_objpad;
166256deab07SRod Evans } else {
166356deab07SRod Evans mflags = MMOBJ_INTERPRET;
166456deab07SRod Evans padding = NULL;
166556deab07SRod Evans }
166656deab07SRod Evans
166756deab07SRod Evans /*
166856deab07SRod Evans * Map the file. If the number of mappings required by this file
166956deab07SRod Evans * exceeds the present mapping structure, an error indicating the
167056deab07SRod Evans * return data is too big is returned. Bail on any other error.
167156deab07SRod Evans */
167256deab07SRod Evans mapnum = smapnum;
167356deab07SRod Evans if (mmapobj(fd, mflags, smpp, &mapnum, padding) == -1) {
167456deab07SRod Evans if (errno != E2BIG) {
167556deab07SRod Evans int err = errno;
167656deab07SRod Evans
167756deab07SRod Evans /*
167856deab07SRod Evans * An unsupported error indicates that there's something
167956deab07SRod Evans * incompatible with this ELF file, and the process that
168056deab07SRod Evans * is already running. Map the first page of the file
168156deab07SRod Evans * and see if we can generate a better error message.
168256deab07SRod Evans */
168356deab07SRod Evans if ((errno == ENOTSUP) && map_fail(fdp, fsize, name,
168456deab07SRod Evans fd, rej))
168556deab07SRod Evans return (NULL);
168656deab07SRod Evans
168756deab07SRod Evans rej->rej_type = SGS_REJ_STR;
168856deab07SRod Evans rej->rej_str = strerror(err);
168956deab07SRod Evans return (NULL);
169056deab07SRod Evans }
169156deab07SRod Evans
169256deab07SRod Evans /*
169356deab07SRod Evans * The mapping requirement exceeds the present mapping
169456deab07SRod Evans * structure, however the number of mapping required is
169556deab07SRod Evans * available in the mapping number.
169656deab07SRod Evans */
169756deab07SRod Evans free((void *)smpp);
169856deab07SRod Evans if ((smpp = malloc(sizeof (mmapobj_result_t) * mapnum)) == NULL)
169956deab07SRod Evans return (NULL);
170056deab07SRod Evans smapnum = mapnum;
170156deab07SRod Evans
170256deab07SRod Evans /*
170356deab07SRod Evans * With the appropriate mapping structure, try the mapping
170456deab07SRod Evans * request again.
170556deab07SRod Evans */
170656deab07SRod Evans if (mmapobj(fd, mflags, smpp, &mapnum, padding) == -1) {
170756deab07SRod Evans rej->rej_type = SGS_REJ_STR;
170856deab07SRod Evans rej->rej_str = strerror(errno);
170956deab07SRod Evans return (NULL);
171056deab07SRod Evans }
171156deab07SRod Evans }
171256deab07SRod Evans ASSERT(mapnum != 0);
171356deab07SRod Evans
171456deab07SRod Evans /*
171556deab07SRod Evans * Traverse the mappings in search of a file type ld.so.1 can process.
171656deab07SRod Evans * If the file type is verified as one ld.so.1 can process, retain the
171756deab07SRod Evans * mapping information, and the number of mappings this object uses,
171856deab07SRod Evans * and clear the static mapping pointer for the next map_obj() use of
171956deab07SRod Evans * mmapobj().
172056deab07SRod Evans */
172156deab07SRod Evans DBG_CALL(Dbg_file_mmapobj(lml, name, smpp, mapnum));
172220272c2eSAli Bahrami cnt_map++;
172356deab07SRod Evans
172456deab07SRod Evans for (mnum = 0, mpp = smpp; mnum < mapnum; mnum++, mpp++) {
172556deab07SRod Evans uint_t flags = (mpp->mr_flags & MR_TYPE_MASK);
172656deab07SRod Evans Fct *fptr = NULL;
172756deab07SRod Evans
172856deab07SRod Evans if (flags == MR_HDR_ELF) {
172956deab07SRod Evans fptr = elf_verify((mpp->mr_addr + mpp->mr_offset),
173056deab07SRod Evans mpp->mr_fsize, fdp, name, rej);
173156deab07SRod Evans }
173256deab07SRod Evans #ifdef A_OUT
173356deab07SRod Evans if (flags == MR_HDR_AOUT) {
173456deab07SRod Evans fptr = aout_verify((mpp->mr_addr + mpp->mr_offset),
173556deab07SRod Evans mpp->mr_fsize, fdp, name, rej);
173656deab07SRod Evans }
173756deab07SRod Evans #endif
173856deab07SRod Evans if (fptr) {
173956deab07SRod Evans fdp->fd_mapn = mapnum;
174056deab07SRod Evans fdp->fd_mapp = smpp;
174156deab07SRod Evans
174256deab07SRod Evans smpp = NULL;
174356deab07SRod Evans
174456deab07SRod Evans return (fptr);
174556deab07SRod Evans }
174656deab07SRod Evans }
174756deab07SRod Evans
174856deab07SRod Evans /*
174956deab07SRod Evans * If the mapped file is inappropriate, indicate that the file type is
175056deab07SRod Evans * unknown, and free the mapping.
175156deab07SRod Evans */
175256deab07SRod Evans if (rej->rej_type == 0)
175356deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE;
175456deab07SRod Evans unmap_obj(smpp, mapnum);
175556deab07SRod Evans
175656deab07SRod Evans return (NULL);
17577c478bd9Sstevel@tonic-gate }
17587c478bd9Sstevel@tonic-gate
17597c478bd9Sstevel@tonic-gate /*
17607c478bd9Sstevel@tonic-gate * A unique file has been opened. Create a link-map to represent it, and
17617c478bd9Sstevel@tonic-gate * process the various names by which it can be referenced.
17627c478bd9Sstevel@tonic-gate */
176356deab07SRod Evans Rt_map *
load_file(Lm_list * lml,Aliste lmco,Rt_map * clmp,Fdesc * fdp,int * in_nfavl)1764*2020b2b6SRod Evans load_file(Lm_list *lml, Aliste lmco, Rt_map *clmp, Fdesc *fdp, int *in_nfavl)
17657c478bd9Sstevel@tonic-gate {
176656deab07SRod Evans mmapobj_result_t *fpmpp = NULL, *fmpp = NULL, *lpmpp, *lmpp;
176756deab07SRod Evans mmapobj_result_t *hmpp, *mpp, *ompp = fdp->fd_mapp;
176856deab07SRod Evans uint_t mnum, omapnum = fdp->fd_mapn;
176956deab07SRod Evans const char *nname = fdp->fd_nname;
17707c478bd9Sstevel@tonic-gate Rt_map *nlmp;
177156deab07SRod Evans Ehdr *ehdr = NULL;
17727c478bd9Sstevel@tonic-gate
17737c478bd9Sstevel@tonic-gate /*
177456deab07SRod Evans * Traverse the mappings for the input file to capture generic mapping
177556deab07SRod Evans * information, and create a link-map to represent the file.
17767c478bd9Sstevel@tonic-gate */
177756deab07SRod Evans for (mnum = 0, mpp = ompp; mnum < omapnum; mnum++, mpp++) {
177856deab07SRod Evans uint_t flags = (mpp->mr_flags & MR_TYPE_MASK);
17797c478bd9Sstevel@tonic-gate
17807c478bd9Sstevel@tonic-gate /*
178156deab07SRod Evans * Keep track of the first and last mappings that may include
178256deab07SRod Evans * padding.
17837c478bd9Sstevel@tonic-gate */
178456deab07SRod Evans if (fpmpp == NULL)
178556deab07SRod Evans fpmpp = mpp;
178656deab07SRod Evans lpmpp = mpp;
17877c478bd9Sstevel@tonic-gate
178856deab07SRod Evans /*
178956deab07SRod Evans * Keep track of the first and last mappings that do not include
179056deab07SRod Evans * padding.
179156deab07SRod Evans */
179256deab07SRod Evans if (flags != MR_PADDING) {
179356deab07SRod Evans if (fmpp == NULL)
179456deab07SRod Evans fmpp = mpp;
179556deab07SRod Evans lmpp = mpp;
179656deab07SRod Evans }
179756deab07SRod Evans if (flags == MR_HDR_ELF) {
179856deab07SRod Evans /* LINTED */
179956deab07SRod Evans ehdr = (Ehdr *)(mpp->mr_addr + mpp->mr_offset);
180056deab07SRod Evans hmpp = mpp;
180156deab07SRod Evans } else if (flags == MR_HDR_AOUT)
180256deab07SRod Evans hmpp = mpp;
180356deab07SRod Evans }
180456deab07SRod Evans
180556deab07SRod Evans /*
180656deab07SRod Evans * The only ELF files we can handle are ET_EXEC, ET_DYN, and ET_REL.
180756deab07SRod Evans *
180856deab07SRod Evans * ET_REL must be processed by ld(1) to create an in-memory ET_DYN.
180956deab07SRod Evans * The initial processing carried out by elf_obj_file() creates a
181056deab07SRod Evans * temporary link-map, that acts as a place holder, until the objects
181156deab07SRod Evans * processing is finished with elf_obj_fini().
181256deab07SRod Evans */
181356deab07SRod Evans if (ehdr && (ehdr->e_type == ET_REL)) {
1814*2020b2b6SRod Evans if ((nlmp = elf_obj_file(lml, lmco, clmp, nname, hmpp, ompp,
181556deab07SRod Evans omapnum)) == NULL)
181656deab07SRod Evans return (nlmp);
181756deab07SRod Evans } else {
181856deab07SRod Evans Addr addr;
181956deab07SRod Evans size_t msize;
182056deab07SRod Evans
182156deab07SRod Evans /*
182256deab07SRod Evans * The size of the total reservation, and the padding range,
182356deab07SRod Evans * are a historic artifact required by debuggers. Although
182456deab07SRod Evans * these values express the range of the associated mappings,
182556deab07SRod Evans * there can be holes between segments (in which small objects
182656deab07SRod Evans * could be mapped). Anyone who needs to verify offsets
182756deab07SRod Evans * against segments should analyze all the object mappings,
182856deab07SRod Evans * rather than relying on these address ranges.
182956deab07SRod Evans */
183056deab07SRod Evans addr = (Addr)(hmpp->mr_addr + hmpp->mr_offset);
183156deab07SRod Evans msize = lmpp->mr_addr + lmpp->mr_msize - fmpp->mr_addr;
183256deab07SRod Evans
183356deab07SRod Evans if ((nlmp = ((fdp->fd_ftp)->fct_new_lmp)(lml, lmco, fdp, addr,
1834*2020b2b6SRod Evans msize, NULL, clmp, in_nfavl)) == NULL)
183537ffaf83SRod Evans return (NULL);
18367c478bd9Sstevel@tonic-gate
18377c478bd9Sstevel@tonic-gate /*
183856deab07SRod Evans * Save generic mapping information.
18397c478bd9Sstevel@tonic-gate */
184056deab07SRod Evans MMAPS(nlmp) = ompp;
184156deab07SRod Evans MMAPCNT(nlmp) = omapnum;
184256deab07SRod Evans PADSTART(nlmp) = (ulong_t)fpmpp->mr_addr;
184356deab07SRod Evans PADIMLEN(nlmp) = lpmpp->mr_addr + lpmpp->mr_msize -
184456deab07SRod Evans fpmpp->mr_addr;
184556deab07SRod Evans }
18467c478bd9Sstevel@tonic-gate
18477c478bd9Sstevel@tonic-gate /*
184856deab07SRod Evans * Save the dev/inode information for later comparisons, and identify
184956deab07SRod Evans * this as a new object.
18507c478bd9Sstevel@tonic-gate */
185156deab07SRod Evans STDEV(nlmp) = fdp->fd_dev;
185256deab07SRod Evans STINO(nlmp) = fdp->fd_ino;
185356deab07SRod Evans FLAGS(nlmp) |= FLG_RT_NEWLOAD;
18547c478bd9Sstevel@tonic-gate
185556deab07SRod Evans /*
185656deab07SRod Evans * If this is ELF relocatable object, we're done for now.
185756deab07SRod Evans */
185856deab07SRod Evans if (ehdr && (ehdr->e_type == ET_REL))
185956deab07SRod Evans return (nlmp);
186056deab07SRod Evans
186156deab07SRod Evans /*
186256deab07SRod Evans * Insert the names of this link-map into the FullPathNode AVL tree.
186356deab07SRod Evans * Save both the NAME() and PATHNAME() if the names differ.
186456deab07SRod Evans */
186556deab07SRod Evans (void) fullpath(nlmp, fdp);
186656deab07SRod Evans
186756deab07SRod Evans if ((NAME(nlmp)[0] == '/') && (fpavl_insert(lml, nlmp, NAME(nlmp),
186856deab07SRod Evans fdp->fd_avlwhere) == 0)) {
1869*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
187037ffaf83SRod Evans return (NULL);
18717c478bd9Sstevel@tonic-gate }
187256deab07SRod Evans if (((NAME(nlmp)[0] != '/') || (NAME(nlmp) != PATHNAME(nlmp))) &&
18737c478bd9Sstevel@tonic-gate (fpavl_insert(lml, nlmp, PATHNAME(nlmp), 0) == 0)) {
1874*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
187537ffaf83SRod Evans return (NULL);
18767c478bd9Sstevel@tonic-gate }
18773dbfc803SRod Evans
18783dbfc803SRod Evans /*
187956deab07SRod Evans * If this is a secure application, record any full path name directory
188056deab07SRod Evans * in which this dependency has been found. This directory can be
188156deab07SRod Evans * deemed safe (as we've already found a dependency here). This
188256deab07SRod Evans * recording provides a fall-back should another objects $ORIGIN
188356deab07SRod Evans * definition expands to this directory, an expansion that would
188456deab07SRod Evans * ordinarily be deemed insecure.
18853dbfc803SRod Evans */
18863dbfc803SRod Evans if (rtld_flags & RT_FL_SECURE) {
18873dbfc803SRod Evans if (NAME(nlmp)[0] == '/')
18883dbfc803SRod Evans spavl_insert(NAME(nlmp));
18893dbfc803SRod Evans if ((NAME(nlmp) != PATHNAME(nlmp)) &&
18903dbfc803SRod Evans (PATHNAME(nlmp)[0] == '/'))
18913dbfc803SRod Evans spavl_insert(PATHNAME(nlmp));
18923dbfc803SRod Evans }
18937c478bd9Sstevel@tonic-gate
18947c478bd9Sstevel@tonic-gate /*
18957c478bd9Sstevel@tonic-gate * If we're processing an alternative object reset the original name
18967c478bd9Sstevel@tonic-gate * for possible $ORIGIN processing.
18977c478bd9Sstevel@tonic-gate */
189856deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER) {
189956deab07SRod Evans const char *odir, *ndir;
19007c478bd9Sstevel@tonic-gate size_t olen;
19017c478bd9Sstevel@tonic-gate
19027c478bd9Sstevel@tonic-gate FLAGS(nlmp) |= FLG_RT_ALTER;
19037c478bd9Sstevel@tonic-gate
19047c478bd9Sstevel@tonic-gate /*
19057c478bd9Sstevel@tonic-gate * If we were given a pathname containing a slash then the
19067c478bd9Sstevel@tonic-gate * original name is still in oname. Otherwise the original
19077c478bd9Sstevel@tonic-gate * directory is in dir->p_name (which is all we need for
19087c478bd9Sstevel@tonic-gate * $ORIGIN).
19097c478bd9Sstevel@tonic-gate */
191056deab07SRod Evans if (fdp->fd_flags & FLG_FD_SLASH) {
19117c478bd9Sstevel@tonic-gate char *ofil;
19127c478bd9Sstevel@tonic-gate
191356deab07SRod Evans odir = fdp->fd_oname;
191456deab07SRod Evans ofil = strrchr(fdp->fd_oname, '/');
19157c478bd9Sstevel@tonic-gate olen = ofil - odir + 1;
19167c478bd9Sstevel@tonic-gate } else {
191756deab07SRod Evans odir = fdp->fd_odir;
19187c478bd9Sstevel@tonic-gate olen = strlen(odir) + 1;
19197c478bd9Sstevel@tonic-gate }
192056deab07SRod Evans if ((ndir = stravl_insert(odir, 0, olen, 1)) == NULL) {
1921*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
192237ffaf83SRod Evans return (NULL);
19237c478bd9Sstevel@tonic-gate }
19247c478bd9Sstevel@tonic-gate ORIGNAME(nlmp) = ndir;
192556deab07SRod Evans DIRSZ(nlmp) = --olen;
19267c478bd9Sstevel@tonic-gate }
19277c478bd9Sstevel@tonic-gate
19287c478bd9Sstevel@tonic-gate return (nlmp);
19297c478bd9Sstevel@tonic-gate }
19307c478bd9Sstevel@tonic-gate
19317c478bd9Sstevel@tonic-gate /*
19327c478bd9Sstevel@tonic-gate * This function loads the named file and returns a pointer to its link map.
19337c478bd9Sstevel@tonic-gate * It is assumed that the caller has already checked that the file is not
19347c478bd9Sstevel@tonic-gate * already loaded before calling this function (refer is_so_loaded()).
19357c478bd9Sstevel@tonic-gate * Find and open the file, map it into memory, add it to the end of the list
19367c478bd9Sstevel@tonic-gate * of link maps and return a pointer to the new link map. Return 0 on error.
19377c478bd9Sstevel@tonic-gate */
19387c478bd9Sstevel@tonic-gate static Rt_map *
load_so(Lm_list * lml,Aliste lmco,Rt_map * clmp,uint_t flags,Fdesc * fdp,Rej_desc * rej,int * in_nfavl)193956deab07SRod Evans load_so(Lm_list *lml, Aliste lmco, Rt_map *clmp, uint_t flags,
194056deab07SRod Evans Fdesc *fdp, Rej_desc *rej, int *in_nfavl)
19417c478bd9Sstevel@tonic-gate {
194256deab07SRod Evans const char *oname = fdp->fd_oname;
194356deab07SRod Evans Pdesc *pdp;
19447c478bd9Sstevel@tonic-gate
19457c478bd9Sstevel@tonic-gate /*
194656deab07SRod Evans * If this path name hasn't already been identified as containing a
194756deab07SRod Evans * slash, check the path name. Most paths have been constructed
194856deab07SRod Evans * through appending a file name to a search path, and/or have been
194956deab07SRod Evans * inspected by expand(), and thus have a slash. However, we can
195056deab07SRod Evans * receive path names via auditors or configuration files, and thus
195156deab07SRod Evans * an evaluation here catches these instances.
19527c478bd9Sstevel@tonic-gate */
195356deab07SRod Evans if ((fdp->fd_flags & FLG_FD_SLASH) == 0) {
19547c478bd9Sstevel@tonic-gate const char *str;
19557c478bd9Sstevel@tonic-gate
19567c478bd9Sstevel@tonic-gate for (str = oname; *str; str++) {
19577c478bd9Sstevel@tonic-gate if (*str == '/') {
195856deab07SRod Evans fdp->fd_flags |= FLG_FD_SLASH;
19597c478bd9Sstevel@tonic-gate break;
19607c478bd9Sstevel@tonic-gate }
19617c478bd9Sstevel@tonic-gate }
19627c478bd9Sstevel@tonic-gate }
19637c478bd9Sstevel@tonic-gate
19647c478bd9Sstevel@tonic-gate /*
19657c478bd9Sstevel@tonic-gate * If we are passed a 'null' link-map this means that this is the first
19667c478bd9Sstevel@tonic-gate * object to be loaded on this link-map list. In that case we set the
19677c478bd9Sstevel@tonic-gate * link-map to ld.so.1's link-map.
19687c478bd9Sstevel@tonic-gate *
19697c478bd9Sstevel@tonic-gate * This link-map is referenced to determine what lookup rules to use
19707c478bd9Sstevel@tonic-gate * when searching for files. By using ld.so.1's we are defaulting to
19717c478bd9Sstevel@tonic-gate * ELF look-up rules.
19727c478bd9Sstevel@tonic-gate *
19737c478bd9Sstevel@tonic-gate * Note: This case happens when loading the first object onto
19747c478bd9Sstevel@tonic-gate * the plt_tracing link-map.
19757c478bd9Sstevel@tonic-gate */
19767c478bd9Sstevel@tonic-gate if (clmp == 0)
19777c478bd9Sstevel@tonic-gate clmp = lml_rtld.lm_head;
19787c478bd9Sstevel@tonic-gate
19797c478bd9Sstevel@tonic-gate /*
198008278a5eSRod Evans * If this path resulted from a $CAPABILITY specification, then the
198108278a5eSRod Evans * best capability object has already been establish, and is available
198208278a5eSRod Evans * in the calling file descriptor. Perform some minor book-keeping so
198308278a5eSRod Evans * that we can fall through into common code.
19847c478bd9Sstevel@tonic-gate */
198508278a5eSRod Evans if (flags & FLG_RT_CAP) {
19867c478bd9Sstevel@tonic-gate /*
1987fb1354edSrie * If this object is already loaded, we're done.
19887c478bd9Sstevel@tonic-gate */
198956deab07SRod Evans if (fdp->fd_lmp)
199056deab07SRod Evans return (fdp->fd_lmp);
19917c478bd9Sstevel@tonic-gate
19927c478bd9Sstevel@tonic-gate /*
19937c478bd9Sstevel@tonic-gate * Obtain the avl index for this object.
19947c478bd9Sstevel@tonic-gate */
199556deab07SRod Evans (void) fpavl_recorded(lml, fdp->fd_nname, 0,
199656deab07SRod Evans &(fdp->fd_avlwhere));
1997bbf522bdSrie
199856deab07SRod Evans } else if (fdp->fd_flags & FLG_FD_SLASH) {
19997c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 };
20007c478bd9Sstevel@tonic-gate
200156deab07SRod Evans if (find_path(lml, clmp, flags, fdp, &_rej, in_nfavl) == 0) {
200231fdd7caSab196087 rejection_inherit(rej, &_rej);
200337ffaf83SRod Evans return (NULL);
20047c478bd9Sstevel@tonic-gate }
20057c478bd9Sstevel@tonic-gate
20067c478bd9Sstevel@tonic-gate /*
20077c478bd9Sstevel@tonic-gate * If this object is already loaded, we're done.
20087c478bd9Sstevel@tonic-gate */
200956deab07SRod Evans if (fdp->fd_lmp)
201056deab07SRod Evans return (fdp->fd_lmp);
20117c478bd9Sstevel@tonic-gate
20127c478bd9Sstevel@tonic-gate } else {
20137c478bd9Sstevel@tonic-gate /*
20147c478bd9Sstevel@tonic-gate * No '/' - for each directory on list, make a pathname using
20157c478bd9Sstevel@tonic-gate * that directory and filename and try to open that file.
20167c478bd9Sstevel@tonic-gate */
201756deab07SRod Evans Spath_desc sd = { search_rules, NULL, 0 };
20187c478bd9Sstevel@tonic-gate Word strhash = 0;
201956deab07SRod Evans int found = 0;
202056deab07SRod Evans
20217c478bd9Sstevel@tonic-gate /*
202256deab07SRod Evans * Traverse the search path lists, creating full pathnames and
202356deab07SRod Evans * attempt to load each path.
20247c478bd9Sstevel@tonic-gate */
202556deab07SRod Evans for (pdp = get_next_dir(&sd, clmp, flags); pdp;
202656deab07SRod Evans pdp = get_next_dir(&sd, clmp, flags)) {
20277c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 };
202856deab07SRod Evans Fdesc fd = { 0 };
20297c478bd9Sstevel@tonic-gate
20307c478bd9Sstevel@tonic-gate /*
20319aa23310Srie * Under debugging, duplicate path name entries are
20329aa23310Srie * tagged but remain part of the search path list so
20339aa23310Srie * that they can be diagnosed under "unused" processing.
20349aa23310Srie * Skip these entries, as this path would have already
20359aa23310Srie * been attempted.
20369aa23310Srie */
203756deab07SRod Evans if (pdp->pd_flags & PD_FLG_DUPLICAT)
20389aa23310Srie continue;
20399aa23310Srie
204056deab07SRod Evans fd = *fdp;
204156deab07SRod Evans
20429aa23310Srie /*
20437c478bd9Sstevel@tonic-gate * Try and locate this file. Make sure to clean up
20447c478bd9Sstevel@tonic-gate * any rejection information should the file have
20457c478bd9Sstevel@tonic-gate * been found, but not appropriate.
20467c478bd9Sstevel@tonic-gate */
204756deab07SRod Evans if (find_file(lml, clmp, flags, &fd, &_rej, pdp,
204856deab07SRod Evans &strhash, in_nfavl) == 0) {
204931fdd7caSab196087 rejection_inherit(rej, &_rej);
20507c478bd9Sstevel@tonic-gate continue;
20517c478bd9Sstevel@tonic-gate }
20527c478bd9Sstevel@tonic-gate
20537c478bd9Sstevel@tonic-gate /*
20549aa23310Srie * Indicate that this search path has been used. If
20559aa23310Srie * this is an LD_LIBRARY_PATH setting, ignore any use
20569aa23310Srie * by ld.so.1 itself.
20579aa23310Srie */
205856deab07SRod Evans if (((pdp->pd_flags & LA_SER_LIBPATH) == 0) ||
20599aa23310Srie ((lml->lm_flags & LML_FLG_RTLDLM) == 0))
206056deab07SRod Evans pdp->pd_flags |= PD_FLG_USED;
20619aa23310Srie
20629aa23310Srie /*
20637c478bd9Sstevel@tonic-gate * If this object is already loaded, we're done.
20647c478bd9Sstevel@tonic-gate */
206556deab07SRod Evans *fdp = fd;
206656deab07SRod Evans if (fdp->fd_lmp)
206756deab07SRod Evans return (fdp->fd_lmp);
20687c478bd9Sstevel@tonic-gate
206956deab07SRod Evans fdp->fd_odir = pdp->pd_pname;
207056deab07SRod Evans found = 1;
20717c478bd9Sstevel@tonic-gate break;
20727c478bd9Sstevel@tonic-gate }
20737c478bd9Sstevel@tonic-gate
20747c478bd9Sstevel@tonic-gate /*
20757c478bd9Sstevel@tonic-gate * If the file couldn't be loaded, do another comparison of
20767c478bd9Sstevel@tonic-gate * loaded files using just the basename. This catches folks
20777c478bd9Sstevel@tonic-gate * who may have loaded multiple full pathname files (possibly
20787c478bd9Sstevel@tonic-gate * from setxid applications) to satisfy dependency relationships
20797c478bd9Sstevel@tonic-gate * (i.e., a file might have a dependency on foo.so.1 which has
20807c478bd9Sstevel@tonic-gate * already been opened using its full pathname).
20817c478bd9Sstevel@tonic-gate */
208256deab07SRod Evans if (found == 0)
20839aa23310Srie return (is_so_loaded(lml, oname, in_nfavl));
20847c478bd9Sstevel@tonic-gate }
20857c478bd9Sstevel@tonic-gate
20867c478bd9Sstevel@tonic-gate /*
208708278a5eSRod Evans * Trace that this successfully opened file is about to be processed.
208808278a5eSRod Evans * Note, as part of processing a family of hardware capabilities filtees
208908278a5eSRod Evans * a number of candidates may have been opened and mapped to determine
209008278a5eSRod Evans * their capability requirements. At this point we've decided which
209108278a5eSRod Evans * of the candidates to use.
209208278a5eSRod Evans */
209308278a5eSRod Evans if (lml->lm_flags & LML_FLG_TRC_ENABLE) {
209408278a5eSRod Evans trace_so(clmp, 0, fdp->fd_oname, fdp->fd_nname,
209508278a5eSRod Evans (fdp->fd_flags & FLG_FD_ALTER), 0);
209608278a5eSRod Evans }
209708278a5eSRod Evans
209808278a5eSRod Evans /*
209908278a5eSRod Evans * Finish mapping the file and return the link-map descriptor.
21007c478bd9Sstevel@tonic-gate */
2101*2020b2b6SRod Evans return (load_file(lml, lmco, clmp, fdp, in_nfavl));
21027c478bd9Sstevel@tonic-gate }
21037c478bd9Sstevel@tonic-gate
21047c478bd9Sstevel@tonic-gate /*
210556deab07SRod Evans * Trace an attempt to load an object, and seed the originating name.
21067c478bd9Sstevel@tonic-gate */
210756deab07SRod Evans const char *
load_trace(Lm_list * lml,Pdesc * pdp,Rt_map * clmp,Fdesc * fdp)210856deab07SRod Evans load_trace(Lm_list *lml, Pdesc *pdp, Rt_map *clmp, Fdesc *fdp)
21097c478bd9Sstevel@tonic-gate {
211056deab07SRod Evans const char *name = pdp->pd_pname;
21117247f888Srie
2112*2020b2b6SRod Evans DBG_CALL(Dbg_libs_find(lml, name));
2113*2020b2b6SRod Evans
21147c478bd9Sstevel@tonic-gate /*
21157c478bd9Sstevel@tonic-gate * First generate any ldd(1) diagnostics.
21167c478bd9Sstevel@tonic-gate */
21177c478bd9Sstevel@tonic-gate if ((lml->lm_flags & (LML_FLG_TRC_VERBOSE | LML_FLG_TRC_SEARCH)) &&
21187c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0))
21197c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, NAME(clmp));
21207c478bd9Sstevel@tonic-gate
21217c478bd9Sstevel@tonic-gate /*
212256deab07SRod Evans * Propagate any knowledge of a slash within the path name.
212356deab07SRod Evans */
212456deab07SRod Evans if (pdp->pd_flags & PD_FLG_PNSLASH)
212556deab07SRod Evans fdp->fd_flags |= FLG_FD_SLASH;
212656deab07SRod Evans
212756deab07SRod Evans /*
2128*2020b2b6SRod Evans * If we're being audited tell any audit libraries of the file we're
21297c478bd9Sstevel@tonic-gate * about to go search for.
21307c478bd9Sstevel@tonic-gate */
2131*2020b2b6SRod Evans if (aud_activity ||
2132*2020b2b6SRod Evans ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_ACTIVITY))
21337c478bd9Sstevel@tonic-gate audit_activity(clmp, LA_ACT_ADD);
21347c478bd9Sstevel@tonic-gate
213556deab07SRod Evans if ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_OBJSEARCH) {
213656deab07SRod Evans char *aname;
21377c478bd9Sstevel@tonic-gate
21387c478bd9Sstevel@tonic-gate /*
21397c478bd9Sstevel@tonic-gate * The auditor can indicate that this object should be ignored.
21407c478bd9Sstevel@tonic-gate */
214156deab07SRod Evans if ((aname =
214256deab07SRod Evans audit_objsearch(clmp, name, LA_SER_ORIG)) == NULL) {
21437247f888Srie DBG_CALL(Dbg_audit_terminate(lml, name));
214456deab07SRod Evans return (NULL);
21457c478bd9Sstevel@tonic-gate }
21467c478bd9Sstevel@tonic-gate
21477247f888Srie if (name != aname) {
214856deab07SRod Evans fdp->fd_flags &= ~FLG_FD_SLASH;
214956deab07SRod Evans name = aname;
21507c478bd9Sstevel@tonic-gate }
21517c478bd9Sstevel@tonic-gate }
215256deab07SRod Evans fdp->fd_oname = name;
215356deab07SRod Evans return (name);
21547c478bd9Sstevel@tonic-gate }
21557c478bd9Sstevel@tonic-gate
21567c478bd9Sstevel@tonic-gate /*
21577c478bd9Sstevel@tonic-gate * Having loaded an object and created a link-map to describe it, finish
21587c478bd9Sstevel@tonic-gate * processing this stage, including verifying any versioning requirements,
21597c478bd9Sstevel@tonic-gate * updating the objects mode, creating a handle if necessary, and adding this
21607c478bd9Sstevel@tonic-gate * object to existing handles if required.
21617c478bd9Sstevel@tonic-gate */
2162390b98b5Srie static int
load_finish(Lm_list * lml,const char * name,Rt_map * clmp,int nmode,uint_t flags,Grp_hdl ** hdl,Rt_map * nlmp)21637c478bd9Sstevel@tonic-gate load_finish(Lm_list *lml, const char *name, Rt_map *clmp, int nmode,
21647c478bd9Sstevel@tonic-gate uint_t flags, Grp_hdl **hdl, Rt_map *nlmp)
21657c478bd9Sstevel@tonic-gate {
21662017c965SRod Evans Aliste idx1;
2167cce0e03bSab196087 Grp_hdl *ghp;
21687c478bd9Sstevel@tonic-gate int promote;
21692017c965SRod Evans uint_t rdflags;
21707c478bd9Sstevel@tonic-gate
21717c478bd9Sstevel@tonic-gate /*
21722017c965SRod Evans * If this dependency is associated with a required version ensure that
21737c478bd9Sstevel@tonic-gate * the version is present in the loaded file.
21747c478bd9Sstevel@tonic-gate */
217556deab07SRod Evans if (((rtld_flags & RT_FL_NOVERSION) == 0) && THIS_IS_ELF(clmp) &&
217656deab07SRod Evans VERNEED(clmp) && (elf_verify_vers(name, clmp, nlmp) == 0))
21777c478bd9Sstevel@tonic-gate return (0);
21787c478bd9Sstevel@tonic-gate
21797c478bd9Sstevel@tonic-gate /*
21807c478bd9Sstevel@tonic-gate * If this object has indicated that it should be isolated as a group
21817c478bd9Sstevel@tonic-gate * (DT_FLAGS_1 contains DF_1_GROUP - object was built with -B group),
21827c478bd9Sstevel@tonic-gate * or if the callers direct bindings indicate it should be isolated as
21832017c965SRod Evans * a group (DYNINFO flags contains FLG_DI_GROUP - dependency following
21847c478bd9Sstevel@tonic-gate * -zgroupperm), establish the appropriate mode.
21857c478bd9Sstevel@tonic-gate *
21867c478bd9Sstevel@tonic-gate * The intent of an object defining itself as a group is to isolate the
21877c478bd9Sstevel@tonic-gate * relocation of the group within its own members, however, unless
21887c478bd9Sstevel@tonic-gate * opened through dlopen(), in which case we assume dlsym() will be used
21892017c965SRod Evans * to locate symbols in the new object, we still need to associate the
21902017c965SRod Evans * new object with the caller so that the caller can bind to this new
21912017c965SRod Evans * object. This is equivalent to a dlopen(RTLD_GROUP) and dlsym()
21922017c965SRod Evans * using the returned handle.
21937c478bd9Sstevel@tonic-gate */
21947c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) | flags) & FLG_RT_SETGROUP) {
21957c478bd9Sstevel@tonic-gate nmode &= ~RTLD_WORLD;
21967c478bd9Sstevel@tonic-gate nmode |= RTLD_GROUP;
21977c478bd9Sstevel@tonic-gate
21987c478bd9Sstevel@tonic-gate /*
21992017c965SRod Evans * If the object wasn't explicitly dlopen()'ed, in which case a
22002017c965SRod Evans * handle would have been requested, associate the object with
22017c478bd9Sstevel@tonic-gate * the parent.
22027c478bd9Sstevel@tonic-gate */
22032017c965SRod Evans if ((flags & FLG_RT_PUBHDL) == 0)
22047c478bd9Sstevel@tonic-gate nmode |= RTLD_PARENT;
22057c478bd9Sstevel@tonic-gate }
22067c478bd9Sstevel@tonic-gate
22077c478bd9Sstevel@tonic-gate /*
22087c478bd9Sstevel@tonic-gate * Establish new mode and flags.
22097c478bd9Sstevel@tonic-gate */
22107c478bd9Sstevel@tonic-gate promote = update_mode(nlmp, MODE(nlmp), nmode);
22117c478bd9Sstevel@tonic-gate FLAGS(nlmp) |= flags;
22127c478bd9Sstevel@tonic-gate
22137c478bd9Sstevel@tonic-gate /*
22142017c965SRod Evans * Establish the flags for any referenced dependency descriptors
22152017c965SRod Evans * (Grp_desc).
22162017c965SRod Evans *
22172017c965SRod Evans * - The referenced object is available for dlsym().
22182017c965SRod Evans * - The referenced object is available to relocate against.
22192017c965SRod Evans * - The referenced object should have it's dependencies
22202017c965SRod Evans * added to this handle
22212017c965SRod Evans */
22222017c965SRod Evans rdflags = (GPD_DLSYM | GPD_RELOC | GPD_ADDEPS);
22232017c965SRod Evans
22242017c965SRod Evans /*
22257c478bd9Sstevel@tonic-gate * If we've been asked to establish a handle create one for this object.
22267c478bd9Sstevel@tonic-gate * Or, if this object has already been analyzed, but this reference
22272017c965SRod Evans * requires that the mode of the object be promoted, create a private
22287c478bd9Sstevel@tonic-gate * handle to propagate the new modes to all this objects dependencies.
22297c478bd9Sstevel@tonic-gate */
22302017c965SRod Evans if ((FLAGS(nlmp) & (FLG_RT_PUBHDL | FLG_RT_PRIHDL)) ||
22312017c965SRod Evans (promote && (FLAGS(nlmp) & FLG_RT_ANALYZED))) {
22322017c965SRod Evans uint_t oflags, hflags, cdflags = 0;
22337c478bd9Sstevel@tonic-gate
22348af2c5b9Srie /*
22358af2c5b9Srie * Establish any flags for the handle (Grp_hdl).
22368af2c5b9Srie *
22372017c965SRod Evans * - Public handles establish dependencies between objects
22382017c965SRod Evans * that must be taken into account when dlclose()'ing
22392017c965SRod Evans * objects. Private handles provide for collecting
22402017c965SRod Evans * dependencies, but do not affect dlclose(). Note that
22412017c965SRod Evans * a handle may already exist, but the public/private
22422017c965SRod Evans * state is set to trigger the required propagation of the
22432017c965SRod Evans * handle's flags and any dependency gathering.
22442017c965SRod Evans * - Use of the RTLD_FIRST flag indicates that only the first
22458af2c5b9Srie * dependency on the handle (the new object) can be used
22468af2c5b9Srie * to satisfy dlsym() requests.
22478af2c5b9Srie */
22482017c965SRod Evans if (FLAGS(nlmp) & FLG_RT_PUBHDL)
22492017c965SRod Evans hflags = GPH_PUBLIC;
22502017c965SRod Evans else
22512017c965SRod Evans hflags = GPH_PRIVATE;
22522017c965SRod Evans
22537c478bd9Sstevel@tonic-gate if (nmode & RTLD_FIRST)
22542017c965SRod Evans hflags |= GPH_FIRST;
22558af2c5b9Srie
22568af2c5b9Srie /*
22578af2c5b9Srie * Establish the flags for this callers dependency descriptor
22588af2c5b9Srie * (Grp_desc).
22598af2c5b9Srie *
22602017c965SRod Evans * - The creation of a public handle creates a descriptor
22612017c965SRod Evans * for the referenced object and the caller (parent).
22628af2c5b9Srie * Typically, the handle is created for dlopen() or for
22632017c965SRod Evans * filtering. A private handle does not need to maintain
22642017c965SRod Evans * a descriptor to the parent.
22652017c965SRod Evans * - Use of the RTLD_PARENT flag indicates that the parent
22668af2c5b9Srie * can be relocated against.
22678af2c5b9Srie */
22682017c965SRod Evans if (FLAGS(nlmp) & FLG_RT_PUBHDL) {
22692017c965SRod Evans cdflags |= GPD_PARENT;
22708af2c5b9Srie if (nmode & RTLD_PARENT)
22718af2c5b9Srie cdflags |= GPD_RELOC;
22722017c965SRod Evans }
22737c478bd9Sstevel@tonic-gate
22747c478bd9Sstevel@tonic-gate /*
22752017c965SRod Evans * Now that the handle flags have been established, remove any
22762017c965SRod Evans * handle definition from the referenced object so that the
22772017c965SRod Evans * definitions don't mistakenly get inherited by a dependency.
22787c478bd9Sstevel@tonic-gate */
22797c478bd9Sstevel@tonic-gate oflags = FLAGS(nlmp);
22802017c965SRod Evans FLAGS(nlmp) &= ~(FLG_RT_PUBHDL | FLG_RT_PRIHDL);
22817c478bd9Sstevel@tonic-gate
22828af2c5b9Srie DBG_CALL(Dbg_file_hdl_title(DBG_HDL_ADD));
22832017c965SRod Evans if ((ghp = hdl_create(lml, nlmp, clmp, hflags, rdflags,
22842017c965SRod Evans cdflags)) == NULL)
22857c478bd9Sstevel@tonic-gate return (0);
22867c478bd9Sstevel@tonic-gate
22877c478bd9Sstevel@tonic-gate /*
22887c478bd9Sstevel@tonic-gate * Add any dependencies that are already loaded, to the handle.
22897c478bd9Sstevel@tonic-gate */
229002ca3e02Srie if (hdl_initialize(ghp, nlmp, nmode, promote) == 0)
22917c478bd9Sstevel@tonic-gate return (0);
22927c478bd9Sstevel@tonic-gate
22937c478bd9Sstevel@tonic-gate if (hdl)
22947c478bd9Sstevel@tonic-gate *hdl = ghp;
22957c478bd9Sstevel@tonic-gate
22967c478bd9Sstevel@tonic-gate /*
22972017c965SRod Evans * If we were asked to create a public handle, we're done.
22988af2c5b9Srie *
22992017c965SRod Evans * If this is a private handle request, then the handle is left
23002017c965SRod Evans * intact with a GPH_PRIVATE identifier. This handle is a
23012017c965SRod Evans * convenience for processing the dependencies of this object,
23022017c965SRod Evans * but does not affect how this object might be dlclose()'d.
23032017c965SRod Evans * For a private handle, fall through to carry out any group
23042017c965SRod Evans * processing.
23058af2c5b9Srie */
23062017c965SRod Evans if (oflags & FLG_RT_PUBHDL)
23072017c965SRod Evans return (1);
23087c478bd9Sstevel@tonic-gate }
23097c478bd9Sstevel@tonic-gate
23107c478bd9Sstevel@tonic-gate /*
23117c478bd9Sstevel@tonic-gate * If the caller isn't part of a group we're done.
23127c478bd9Sstevel@tonic-gate */
2313cce0e03bSab196087 if (GROUPS(clmp) == NULL)
23147c478bd9Sstevel@tonic-gate return (1);
23157c478bd9Sstevel@tonic-gate
23167c478bd9Sstevel@tonic-gate /*
23177c478bd9Sstevel@tonic-gate * Determine if our caller is already associated with a handle, if so
23187c478bd9Sstevel@tonic-gate * we need to add this object to any handles that already exist.
23197c478bd9Sstevel@tonic-gate * Traverse the list of groups our caller is a member of and add this
23207c478bd9Sstevel@tonic-gate * new link-map to those groups.
23217c478bd9Sstevel@tonic-gate */
23222017c965SRod Evans for (APLIST_TRAVERSE(GROUPS(clmp), idx1, ghp)) {
23232017c965SRod Evans Aliste idx2;
23247c478bd9Sstevel@tonic-gate Grp_desc *gdp;
23252017c965SRod Evans int ale;
2326cce0e03bSab196087 Rt_map *dlmp1;
2327cce0e03bSab196087 APlist *lmalp = NULL;
23287c478bd9Sstevel@tonic-gate
23292017c965SRod Evans DBG_CALL(Dbg_file_hdl_title(DBG_HDL_ADD));
23302017c965SRod Evans
23317c478bd9Sstevel@tonic-gate /*
23327c478bd9Sstevel@tonic-gate * If the caller doesn't indicate that its dependencies should
23337c478bd9Sstevel@tonic-gate * be added to a handle, ignore it. This case identifies a
23347c478bd9Sstevel@tonic-gate * parent of a dlopen(RTLD_PARENT) request.
23357c478bd9Sstevel@tonic-gate */
23362017c965SRod Evans for (ALIST_TRAVERSE(ghp->gh_depends, idx2, gdp)) {
23377c478bd9Sstevel@tonic-gate if (gdp->gd_depend == clmp)
23387c478bd9Sstevel@tonic-gate break;
23397c478bd9Sstevel@tonic-gate }
23407c478bd9Sstevel@tonic-gate if ((gdp->gd_flags & GPD_ADDEPS) == 0)
23417c478bd9Sstevel@tonic-gate continue;
23427c478bd9Sstevel@tonic-gate
23432017c965SRod Evans if ((gdp = hdl_add(ghp, nlmp, rdflags, &ale)) == NULL)
23447c478bd9Sstevel@tonic-gate return (0);
23457c478bd9Sstevel@tonic-gate
23467c478bd9Sstevel@tonic-gate /*
23477c478bd9Sstevel@tonic-gate * If this member already exists then its dependencies will
23487c478bd9Sstevel@tonic-gate * have already been processed.
23497c478bd9Sstevel@tonic-gate */
23502017c965SRod Evans if (ale == ALE_EXISTS)
23517c478bd9Sstevel@tonic-gate continue;
23527c478bd9Sstevel@tonic-gate
23537c478bd9Sstevel@tonic-gate /*
23547c478bd9Sstevel@tonic-gate * If the object we've added has just been opened, it will not
23557c478bd9Sstevel@tonic-gate * yet have been processed for its dependencies, these will be
23567c478bd9Sstevel@tonic-gate * added on later calls to load_one(). If it doesn't have any
23577c478bd9Sstevel@tonic-gate * dependencies we're also done.
23587c478bd9Sstevel@tonic-gate */
23597c478bd9Sstevel@tonic-gate if (((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) ||
2360cce0e03bSab196087 (DEPENDS(nlmp) == NULL))
23617c478bd9Sstevel@tonic-gate continue;
23627c478bd9Sstevel@tonic-gate
23637c478bd9Sstevel@tonic-gate /*
23647c478bd9Sstevel@tonic-gate * Otherwise, this object exists and has dependencies, so add
23657c478bd9Sstevel@tonic-gate * all of its dependencies to the handle were operating on.
23667c478bd9Sstevel@tonic-gate */
236756deab07SRod Evans if (aplist_append(&lmalp, nlmp, AL_CNT_DEPCLCT) == NULL)
23687c478bd9Sstevel@tonic-gate return (0);
23697c478bd9Sstevel@tonic-gate
23702017c965SRod Evans for (APLIST_TRAVERSE(lmalp, idx2, dlmp1)) {
23712017c965SRod Evans Aliste idx3;
2372cce0e03bSab196087 Bnd_desc *bdp;
23737c478bd9Sstevel@tonic-gate
23747c478bd9Sstevel@tonic-gate /*
23757c478bd9Sstevel@tonic-gate * Add any dependencies of this dependency to the
23767c478bd9Sstevel@tonic-gate * dynamic dependency list so they can be further
23777c478bd9Sstevel@tonic-gate * processed.
23787c478bd9Sstevel@tonic-gate */
23792017c965SRod Evans for (APLIST_TRAVERSE(DEPENDS(dlmp1), idx3, bdp)) {
23807c478bd9Sstevel@tonic-gate Rt_map *dlmp2 = bdp->b_depend;
23817c478bd9Sstevel@tonic-gate
23827c478bd9Sstevel@tonic-gate if ((bdp->b_flags & BND_NEEDED) == 0)
23837c478bd9Sstevel@tonic-gate continue;
23847c478bd9Sstevel@tonic-gate
2385cce0e03bSab196087 if (aplist_test(&lmalp, dlmp2,
23867c478bd9Sstevel@tonic-gate AL_CNT_DEPCLCT) == 0) {
23877c478bd9Sstevel@tonic-gate free(lmalp);
23887c478bd9Sstevel@tonic-gate return (0);
23897c478bd9Sstevel@tonic-gate }
23907c478bd9Sstevel@tonic-gate }
23917c478bd9Sstevel@tonic-gate
23927c478bd9Sstevel@tonic-gate if (nlmp == dlmp1)
23937c478bd9Sstevel@tonic-gate continue;
23947c478bd9Sstevel@tonic-gate
23952017c965SRod Evans if ((gdp =
23962017c965SRod Evans hdl_add(ghp, dlmp1, rdflags, &ale)) == NULL) {
23977c478bd9Sstevel@tonic-gate free(lmalp);
23987c478bd9Sstevel@tonic-gate return (0);
23997c478bd9Sstevel@tonic-gate }
240056deab07SRod Evans
2401e0e63816SRod Evans if (ale == ALE_CREATE)
2402e0e63816SRod Evans (void) update_mode(dlmp1, MODE(dlmp1), nmode);
240356deab07SRod Evans }
24047c478bd9Sstevel@tonic-gate free(lmalp);
24057c478bd9Sstevel@tonic-gate }
24067c478bd9Sstevel@tonic-gate return (1);
24077c478bd9Sstevel@tonic-gate }
24087c478bd9Sstevel@tonic-gate
24097c478bd9Sstevel@tonic-gate /*
24107c478bd9Sstevel@tonic-gate * The central routine for loading shared objects. Insures ldd() diagnostics,
2411*2020b2b6SRod Evans * handle creation, and any other related additions are all done in one place.
24127c478bd9Sstevel@tonic-gate */
241356deab07SRod Evans Rt_map *
load_path(Lm_list * lml,Aliste lmco,Rt_map * clmp,int nmode,uint_t flags,Grp_hdl ** hdl,Fdesc * fdp,Rej_desc * rej,int * in_nfavl)241456deab07SRod Evans load_path(Lm_list *lml, Aliste lmco, Rt_map *clmp, int nmode, uint_t flags,
241556deab07SRod Evans Grp_hdl **hdl, Fdesc *fdp, Rej_desc *rej, int *in_nfavl)
24167c478bd9Sstevel@tonic-gate {
241756deab07SRod Evans const char *name = fdp->fd_oname;
24187c478bd9Sstevel@tonic-gate Rt_map *nlmp;
24197c478bd9Sstevel@tonic-gate
24207c478bd9Sstevel@tonic-gate if ((nmode & RTLD_NOLOAD) == 0) {
2421e0e63816SRod Evans int oin_nfavl;
2422e0e63816SRod Evans
2423e0e63816SRod Evans /*
2424e0e63816SRod Evans * Keep track of the number of not-found loads.
2425e0e63816SRod Evans */
2426e0e63816SRod Evans if (in_nfavl)
2427e0e63816SRod Evans oin_nfavl = *in_nfavl;
2428e0e63816SRod Evans
24297c478bd9Sstevel@tonic-gate /*
24307c478bd9Sstevel@tonic-gate * If this isn't a noload request attempt to load the file.
24317c478bd9Sstevel@tonic-gate */
243256deab07SRod Evans if ((nlmp = load_so(lml, lmco, clmp, flags, fdp, rej,
243356deab07SRod Evans in_nfavl)) == NULL)
243437ffaf83SRod Evans return (NULL);
24357c478bd9Sstevel@tonic-gate
24367c478bd9Sstevel@tonic-gate /*
2437e0e63816SRod Evans * If this file has been found, reset the not-found load count.
2438e0e63816SRod Evans * Although a search for this file might have inspected a number
2439e0e63816SRod Evans * of non-existent path names, the file has been found so there
244008278a5eSRod Evans * is no need to accumulate a non-found count, as this may
2441e0e63816SRod Evans * trigger unnecessary fall back (retry) processing.
2442e0e63816SRod Evans */
2443e0e63816SRod Evans if (in_nfavl)
2444e0e63816SRod Evans *in_nfavl = oin_nfavl;
2445e0e63816SRod Evans
2446e0e63816SRod Evans /*
24477c478bd9Sstevel@tonic-gate * If we've loaded a library which identifies itself as not
24487c478bd9Sstevel@tonic-gate * being dlopen()'able catch it here. Let non-dlopen()'able
24497c478bd9Sstevel@tonic-gate * objects through under RTLD_CONFGEN as they're only being
24507c478bd9Sstevel@tonic-gate * mapped to be dldump()'ed.
24517c478bd9Sstevel@tonic-gate */
24527c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_APPLIC) && ((FLAGS(nlmp) &
24537c478bd9Sstevel@tonic-gate (FLG_RT_NOOPEN | FLG_RT_RELOCED)) == FLG_RT_NOOPEN) &&
24547c478bd9Sstevel@tonic-gate ((nmode & RTLD_CONFGEN) == 0)) {
24557c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 };
24567c478bd9Sstevel@tonic-gate
24577c478bd9Sstevel@tonic-gate _rej.rej_name = name;
24587c478bd9Sstevel@tonic-gate _rej.rej_type = SGS_REJ_STR;
24597c478bd9Sstevel@tonic-gate _rej.rej_str = MSG_INTL(MSG_GEN_NOOPEN);
2460ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, &_rej, M_MACH));
246131fdd7caSab196087 rejection_inherit(rej, &_rej);
2462*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
246337ffaf83SRod Evans return (NULL);
24647c478bd9Sstevel@tonic-gate }
24657c478bd9Sstevel@tonic-gate } else {
24667c478bd9Sstevel@tonic-gate /*
24677c478bd9Sstevel@tonic-gate * If it's a NOLOAD request - check to see if the object
24687c478bd9Sstevel@tonic-gate * has already been loaded.
24697c478bd9Sstevel@tonic-gate */
24707c478bd9Sstevel@tonic-gate /* LINTED */
24719aa23310Srie if (nlmp = is_so_loaded(lml, name, in_nfavl)) {
24727c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_TRC_VERBOSE) &&
24737c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) {
24747c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name,
24757c478bd9Sstevel@tonic-gate NAME(clmp));
24767247f888Srie /* BEGIN CSTYLED */
24777c478bd9Sstevel@tonic-gate if (*name == '/')
24787c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH),
24797c478bd9Sstevel@tonic-gate name, MSG_ORIG(MSG_STR_EMPTY),
24807c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY));
24817c478bd9Sstevel@tonic-gate else
24827c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV),
24837c478bd9Sstevel@tonic-gate name, NAME(nlmp),
24847c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY),
24857c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY));
24867247f888Srie /* END CSTYLED */
24877c478bd9Sstevel@tonic-gate }
24887c478bd9Sstevel@tonic-gate } else {
24897c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 };
24907c478bd9Sstevel@tonic-gate
24917c478bd9Sstevel@tonic-gate _rej.rej_name = name;
24927c478bd9Sstevel@tonic-gate _rej.rej_type = SGS_REJ_STR;
24937c478bd9Sstevel@tonic-gate _rej.rej_str = strerror(ENOENT);
2494ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, &_rej, M_MACH));
249531fdd7caSab196087 rejection_inherit(rej, &_rej);
249637ffaf83SRod Evans return (NULL);
24977c478bd9Sstevel@tonic-gate }
24987c478bd9Sstevel@tonic-gate }
24997c478bd9Sstevel@tonic-gate
25007c478bd9Sstevel@tonic-gate /*
25017c478bd9Sstevel@tonic-gate * Finish processing this loaded object.
25027c478bd9Sstevel@tonic-gate */
2503390b98b5Srie if (load_finish(lml, name, clmp, nmode, flags, hdl, nlmp) == 0) {
2504390b98b5Srie FLAGS(nlmp) &= ~FLG_RT_NEWLOAD;
25057c478bd9Sstevel@tonic-gate
25067c478bd9Sstevel@tonic-gate /*
2507390b98b5Srie * If this object has already been analyzed, then it is in use,
2508390b98b5Srie * so even though this operation has failed, it should not be
2509390b98b5Srie * torn down.
25107c478bd9Sstevel@tonic-gate */
25117c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0)
2512*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
251337ffaf83SRod Evans return (NULL);
25147c478bd9Sstevel@tonic-gate }
25157c478bd9Sstevel@tonic-gate
25167c478bd9Sstevel@tonic-gate /*
2517390b98b5Srie * If this object is new, and we're being audited, tell the audit
2518*2020b2b6SRod Evans * libraries of the file we've just opened. Note, if the new link-map
2519390b98b5Srie * requires local auditing of its dependencies we also register its
2520390b98b5Srie * opening.
2521390b98b5Srie */
2522390b98b5Srie if (FLAGS(nlmp) & FLG_RT_NEWLOAD) {
2523390b98b5Srie FLAGS(nlmp) &= ~FLG_RT_NEWLOAD;
2524390b98b5Srie
2525*2020b2b6SRod Evans if ((lml->lm_tflags | AFLAGS(clmp) | AFLAGS(nlmp)) &
2526*2020b2b6SRod Evans LML_TFLG_AUD_MASK) {
2527390b98b5Srie if (audit_objopen(clmp, nlmp) == 0) {
2528*2020b2b6SRod Evans remove_so(lml, nlmp, clmp);
252937ffaf83SRod Evans return (NULL);
2530390b98b5Srie }
2531390b98b5Srie }
2532390b98b5Srie }
2533390b98b5Srie return (nlmp);
2534390b98b5Srie }
2535390b98b5Srie
2536390b98b5Srie /*
25377c478bd9Sstevel@tonic-gate * Load one object from a possible list of objects. Typically, for requests
25387c478bd9Sstevel@tonic-gate * such as NEEDED's, only one object is specified. However, this object could
253908278a5eSRod Evans * be specified using $ISALIST or $CAPABILITY, in which case only the first
254008278a5eSRod Evans * object that can be loaded is used (ie. the best).
25417c478bd9Sstevel@tonic-gate */
25427c478bd9Sstevel@tonic-gate Rt_map *
load_one(Lm_list * lml,Aliste lmco,Alist * palp,Rt_map * clmp,int mode,uint_t flags,Grp_hdl ** hdl,int * in_nfavl)254356deab07SRod Evans load_one(Lm_list *lml, Aliste lmco, Alist *palp, Rt_map *clmp, int mode,
25449aa23310Srie uint_t flags, Grp_hdl **hdl, int *in_nfavl)
25457c478bd9Sstevel@tonic-gate {
25467c478bd9Sstevel@tonic-gate Rej_desc rej = { 0 };
254756deab07SRod Evans Aliste idx;
254856deab07SRod Evans Pdesc *pdp;
25497c478bd9Sstevel@tonic-gate const char *name;
25507c478bd9Sstevel@tonic-gate
255156deab07SRod Evans for (ALIST_TRAVERSE(palp, idx, pdp)) {
255256deab07SRod Evans Rt_map *lmp = NULL;
25537247f888Srie
25547c478bd9Sstevel@tonic-gate /*
255508278a5eSRod Evans * A $CAPABILITY/$HWCAP requirement can expand into a number of
255608278a5eSRod Evans * candidates.
25577c478bd9Sstevel@tonic-gate */
255808278a5eSRod Evans if (pdp->pd_flags & PD_TKN_CAP) {
255908278a5eSRod Evans lmp = load_cap(lml, lmco, pdp->pd_pname, clmp,
256008278a5eSRod Evans mode, (flags | FLG_RT_CAP), hdl, &rej, in_nfavl);
25617c478bd9Sstevel@tonic-gate } else {
256256deab07SRod Evans Fdesc fd = { 0 };
256356deab07SRod Evans
256456deab07SRod Evans /*
256556deab07SRod Evans * Trace the inspection of this file, determine any
256656deab07SRod Evans * auditor substitution, and seed the file descriptor
256756deab07SRod Evans * with the originating name.
256856deab07SRod Evans */
256956deab07SRod Evans if (load_trace(lml, pdp, clmp, &fd) == NULL)
257056deab07SRod Evans continue;
257156deab07SRod Evans
257256deab07SRod Evans /*
257356deab07SRod Evans * Locate and load the file.
257456deab07SRod Evans */
257556deab07SRod Evans lmp = load_path(lml, lmco, clmp, mode, flags, hdl, &fd,
257656deab07SRod Evans &rej, in_nfavl);
25777c478bd9Sstevel@tonic-gate }
257856deab07SRod Evans if (lmp)
257956deab07SRod Evans return (lmp);
25807c478bd9Sstevel@tonic-gate }
25817c478bd9Sstevel@tonic-gate
25827c478bd9Sstevel@tonic-gate /*
258356deab07SRod Evans * If no objects can be found, use the first path name from the Alist
258456deab07SRod Evans * to provide a diagnostic. If this pathname originated from an
258556deab07SRod Evans * expanded token, use the original name for any diagnostic output.
25867c478bd9Sstevel@tonic-gate */
258756deab07SRod Evans pdp = alist_item(palp, 0);
258856deab07SRod Evans
258956deab07SRod Evans if ((name = pdp->pd_oname) == 0)
259056deab07SRod Evans name = pdp->pd_pname;
25917c478bd9Sstevel@tonic-gate
25927c478bd9Sstevel@tonic-gate file_notfound(lml, name, clmp, flags, &rej);
259337ffaf83SRod Evans return (NULL);
25947c478bd9Sstevel@tonic-gate }
25957c478bd9Sstevel@tonic-gate
25967c478bd9Sstevel@tonic-gate /*
25979a411307Srie * Determine whether a symbol is defined as an interposer.
25989a411307Srie */
25999a411307Srie int
is_sym_interposer(Rt_map * lmp,Sym * sym)26009a411307Srie is_sym_interposer(Rt_map *lmp, Sym *sym)
26019a411307Srie {
26029a411307Srie Syminfo *sip = SYMINFO(lmp);
26039a411307Srie
26049a411307Srie if (sip) {
26059a411307Srie ulong_t ndx;
26069a411307Srie
26079a411307Srie ndx = (((ulong_t)sym - (ulong_t)SYMTAB(lmp)) / SYMENT(lmp));
26089a411307Srie /* LINTED */
26099a411307Srie sip = (Syminfo *)((char *)sip + (ndx * SYMINENT(lmp)));
26109a411307Srie if (sip->si_flags & SYMINFO_FLG_INTERPOSE)
26119a411307Srie return (1);
26129a411307Srie }
26139a411307Srie return (0);
26149a411307Srie }
26159a411307Srie
26169a411307Srie /*
26177c478bd9Sstevel@tonic-gate * While processing direct or group bindings, determine whether the object to
26187c478bd9Sstevel@tonic-gate * which we've bound can be interposed upon. In this context, copy relocations
26197c478bd9Sstevel@tonic-gate * are a form of interposition.
26207c478bd9Sstevel@tonic-gate */
262108278a5eSRod Evans static int
lookup_sym_interpose(Slookup * slp,Sresult * srp,uint_t * binfo,int * in_nfavl)262208278a5eSRod Evans lookup_sym_interpose(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl)
26237c478bd9Sstevel@tonic-gate {
262408278a5eSRod Evans Rt_map *lmp, *clmp, *dlmp = srp->sr_dmap;
262508278a5eSRod Evans Sym *osym = srp->sr_sym;
26267c478bd9Sstevel@tonic-gate Slookup sl;
2627adbfe822Srie Lm_list *lml;
26287c478bd9Sstevel@tonic-gate
26297c478bd9Sstevel@tonic-gate /*
26307c478bd9Sstevel@tonic-gate * If we've bound to a copy relocation definition then we need to assign
26317c478bd9Sstevel@tonic-gate * this binding to the original copy reference. Fabricate an inter-
26327c478bd9Sstevel@tonic-gate * position diagnostic, as this is a legitimate form of interposition.
26337c478bd9Sstevel@tonic-gate */
263408278a5eSRod Evans if (osym && (FLAGS1(dlmp) & FL1_RT_COPYTOOK)) {
26357c478bd9Sstevel@tonic-gate Rel_copy *rcp;
2636cce0e03bSab196087 Aliste idx;
26377c478bd9Sstevel@tonic-gate
263808278a5eSRod Evans for (ALIST_TRAVERSE(COPY_R(dlmp), idx, rcp)) {
2639aa736cbeSrie if ((osym == rcp->r_dsym) || (osym->st_value &&
2640aa736cbeSrie (osym->st_value == rcp->r_dsym->st_value))) {
264108278a5eSRod Evans srp->sr_dmap = rcp->r_rlmp;
264208278a5eSRod Evans srp->sr_sym = rcp->r_rsym;
26437c478bd9Sstevel@tonic-gate *binfo |=
26447c478bd9Sstevel@tonic-gate (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF);
264508278a5eSRod Evans return (1);
26467c478bd9Sstevel@tonic-gate }
26477c478bd9Sstevel@tonic-gate }
26487c478bd9Sstevel@tonic-gate }
26497c478bd9Sstevel@tonic-gate
2650aa736cbeSrie /*
2651adbfe822Srie * If a symbol binding has been established, inspect the link-map list
2652adbfe822Srie * of the destination object, otherwise use the link-map list of the
2653adbfe822Srie * original caller.
2654adbfe822Srie */
2655adbfe822Srie if (osym)
265608278a5eSRod Evans clmp = dlmp;
2657adbfe822Srie else
2658adbfe822Srie clmp = slp->sl_cmap;
2659adbfe822Srie
2660adbfe822Srie lml = LIST(clmp);
2661adbfe822Srie lmp = lml->lm_head;
2662adbfe822Srie
2663adbfe822Srie /*
2664aa736cbeSrie * Prior to Solaris 8, external references from an executable that were
2665aa736cbeSrie * bound to an uninitialized variable (.bss) within a shared object did
2666aa736cbeSrie * not establish a copy relocation. This was thought to be an
2667aa736cbeSrie * optimization, to prevent copying zero's to zero's. Typically,
2668aa736cbeSrie * interposition took its course, with the shared object binding to the
2669aa736cbeSrie * executables data definition.
2670aa736cbeSrie *
2671aa736cbeSrie * This scenario can be broken when this old executable runs against a
2672aa736cbeSrie * new shared object that is directly bound. With no copy-relocation
2673aa736cbeSrie * record, ld.so.1 has no data to trigger the normal vectoring of the
2674aa736cbeSrie * binding to the executable.
2675aa736cbeSrie *
2676aa736cbeSrie * Starting with Solaris 8, a DT_FLAGS entry is written to all objects,
2677aa736cbeSrie * regardless of there being any DF_ flags entries. Therefore, an
2678aa736cbeSrie * object without this dynamic tag is susceptible to the copy relocation
2679aa736cbeSrie * issue. If the executable has no DT_FLAGS tag, and contains the same
2680aa736cbeSrie * .bss symbol definition as has been directly bound to, redirect the
2681aa736cbeSrie * binding to the executables data definition.
2682aa736cbeSrie */
268356deab07SRod Evans if (osym && ((FLAGS1(lmp) & FL1_RT_DTFLAGS) == 0) &&
2684adbfe822Srie (FCT(lmp) == &elf_fct) &&
2685466e2a62Srie (ELF_ST_TYPE(osym->st_info) != STT_FUNC) &&
268608278a5eSRod Evans are_bits_zero(dlmp, osym, 0)) {
268708278a5eSRod Evans Sresult sr;
2688aa736cbeSrie
268908278a5eSRod Evans /*
269008278a5eSRod Evans * Initialize a local symbol result descriptor, using the
269108278a5eSRod Evans * original symbol name. Initialize a local symbol lookup
269208278a5eSRod Evans * descriptor, using the original lookup information, and a
269308278a5eSRod Evans * new initial link-map.
269408278a5eSRod Evans */
269508278a5eSRod Evans SRESULT_INIT(sr, slp->sl_name);
2696adbfe822Srie sl = *slp;
2697adbfe822Srie sl.sl_imap = lmp;
2698adbfe822Srie
2699aa736cbeSrie /*
2700aa736cbeSrie * Determine whether the same symbol name exists within the
2701aa736cbeSrie * executable, that the size and type of symbol are the same,
2702aa736cbeSrie * and that the symbol is also associated with .bss.
2703aa736cbeSrie */
270408278a5eSRod Evans if (SYMINTP(lmp)(&sl, &sr, binfo, in_nfavl)) {
270508278a5eSRod Evans Sym *isym = sr.sr_sym;
270608278a5eSRod Evans
270708278a5eSRod Evans if ((isym->st_size == osym->st_size) &&
2708aa736cbeSrie (isym->st_info == osym->st_info) &&
2709466e2a62Srie are_bits_zero(lmp, isym, 1)) {
271008278a5eSRod Evans *srp = sr;
271108278a5eSRod Evans *binfo |=
271208278a5eSRod Evans (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF);
271308278a5eSRod Evans return (1);
271408278a5eSRod Evans }
2715aa736cbeSrie }
2716aa736cbeSrie }
2717aa736cbeSrie
27187c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_INTRPOSE) == 0)
271937ffaf83SRod Evans return (NULL);
27207c478bd9Sstevel@tonic-gate
27217c478bd9Sstevel@tonic-gate /*
27227c478bd9Sstevel@tonic-gate * Traverse the list of known interposers to determine whether any
27237c478bd9Sstevel@tonic-gate * offer the same symbol. Note, the head of the link-map could be
2724aa736cbeSrie * identified as an interposer. Otherwise, skip the head of the
2725aa736cbeSrie * link-map, so that we don't bind to any .plt references, or
2726aa736cbeSrie * copy-relocation destinations unintentionally.
27277c478bd9Sstevel@tonic-gate */
27287c478bd9Sstevel@tonic-gate lmp = lml->lm_head;
27297c478bd9Sstevel@tonic-gate sl = *slp;
2730adbfe822Srie
27319a411307Srie if (((FLAGS(lmp) & MSK_RT_INTPOSE) == 0) || (sl.sl_flags & LKUP_COPY))
2732cb511613SAli Bahrami lmp = NEXT_RT_MAP(lmp);
27337c478bd9Sstevel@tonic-gate
2734cb511613SAli Bahrami for (; lmp; lmp = NEXT_RT_MAP(lmp)) {
27357c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & FLG_RT_DELETE)
27367c478bd9Sstevel@tonic-gate continue;
27379a411307Srie if ((FLAGS(lmp) & MSK_RT_INTPOSE) == 0)
27387c478bd9Sstevel@tonic-gate break;
27397c478bd9Sstevel@tonic-gate
2740e0e63816SRod Evans /*
2741e0e63816SRod Evans * If we had already bound to this object, there's no point in
2742e0e63816SRod Evans * searching it again, we're done.
2743e0e63816SRod Evans */
274408278a5eSRod Evans if (lmp == dlmp)
2745e0e63816SRod Evans break;
2746e0e63816SRod Evans
2747e0e63816SRod Evans /*
2748e0e63816SRod Evans * If this interposer can be inspected by the caller, look for
2749e0e63816SRod Evans * the symbol within the interposer.
2750e0e63816SRod Evans */
2751e0e63816SRod Evans if (callable(clmp, lmp, 0, sl.sl_flags)) {
275208278a5eSRod Evans Sresult sr;
27539a411307Srie
275408278a5eSRod Evans /*
275508278a5eSRod Evans * Initialize a local symbol result descriptor, using
275608278a5eSRod Evans * the original symbol name. Initialize a local symbol
275708278a5eSRod Evans * lookup descriptor, using the original lookup
275808278a5eSRod Evans * information, and a new initial link-map.
275908278a5eSRod Evans */
276008278a5eSRod Evans SRESULT_INIT(sr, slp->sl_name);
27617c478bd9Sstevel@tonic-gate sl.sl_imap = lmp;
276208278a5eSRod Evans
276308278a5eSRod Evans if (SYMINTP(lmp)(&sl, &sr, binfo, in_nfavl)) {
276408278a5eSRod Evans Sym *isym = sr.sr_sym;
276508278a5eSRod Evans Rt_map *ilmp = sr.sr_dmap;
276608278a5eSRod Evans
27679a411307Srie /*
27689a411307Srie * If this object provides individual symbol
27699a411307Srie * interposers, make sure that the symbol we
27709a411307Srie * have found is tagged as an interposer.
27719a411307Srie */
27729a411307Srie if ((FLAGS(ilmp) & FLG_RT_SYMINTPO) &&
2773aa736cbeSrie (is_sym_interposer(ilmp, isym) == 0))
27749a411307Srie continue;
27759a411307Srie
27769a411307Srie /*
27779a411307Srie * Indicate this binding has occurred to an
27789a411307Srie * interposer, and return the symbol.
27799a411307Srie */
278008278a5eSRod Evans *srp = sr;
27817c478bd9Sstevel@tonic-gate *binfo |= DBG_BINFO_INTERPOSE;
278208278a5eSRod Evans return (1);
27837c478bd9Sstevel@tonic-gate }
27847c478bd9Sstevel@tonic-gate }
27857c478bd9Sstevel@tonic-gate }
278608278a5eSRod Evans return (0);
27877c478bd9Sstevel@tonic-gate }
27887c478bd9Sstevel@tonic-gate
27897c478bd9Sstevel@tonic-gate /*
27907c478bd9Sstevel@tonic-gate * If an object specifies direct bindings (it contains a syminfo structure
27917c478bd9Sstevel@tonic-gate * describing where each binding was established during link-editing, and the
27927c478bd9Sstevel@tonic-gate * object was built -Bdirect), then look for the symbol in the specific object.
27937c478bd9Sstevel@tonic-gate */
279408278a5eSRod Evans static int
lookup_sym_direct(Slookup * slp,Sresult * srp,uint_t * binfo,Syminfo * sip,Rt_map * lmp,int * in_nfavl)279508278a5eSRod Evans lookup_sym_direct(Slookup *slp, Sresult *srp, uint_t *binfo, Syminfo *sip,
27969aa23310Srie Rt_map *lmp, int *in_nfavl)
27977c478bd9Sstevel@tonic-gate {
279808278a5eSRod Evans Rt_map *dlmp, *clmp = slp->sl_cmap;
279908278a5eSRod Evans int ret;
28007c478bd9Sstevel@tonic-gate Slookup sl;
28017c478bd9Sstevel@tonic-gate
28027c478bd9Sstevel@tonic-gate /*
28037c478bd9Sstevel@tonic-gate * If a direct binding resolves to the definition of a copy relocated
28047c478bd9Sstevel@tonic-gate * variable, it must be redirected to the copy (in the executable) that
28057c478bd9Sstevel@tonic-gate * will eventually be made. Typically, this redirection occurs in
28067c478bd9Sstevel@tonic-gate * lookup_sym_interpose(). But, there's an edge condition. If a
28077c478bd9Sstevel@tonic-gate * directly bound executable contains pic code, there may be a
28087c478bd9Sstevel@tonic-gate * reference to a definition that will eventually have a copy made.
28097c478bd9Sstevel@tonic-gate * However, this copy relocation may not yet have occurred, because
28107c478bd9Sstevel@tonic-gate * the relocation making this reference comes before the relocation
28117c478bd9Sstevel@tonic-gate * that will create the copy.
28127c478bd9Sstevel@tonic-gate * Under direct bindings, the syminfo indicates that a copy will be
28137c478bd9Sstevel@tonic-gate * taken (SYMINFO_FLG_COPY). This can only be set in an executable.
28147c478bd9Sstevel@tonic-gate * Thus, the caller must be the executable, so bind to the destination
28157c478bd9Sstevel@tonic-gate * of the copy within the executable.
28167c478bd9Sstevel@tonic-gate */
28177c478bd9Sstevel@tonic-gate if (((slp->sl_flags & LKUP_COPY) == 0) &&
28187c478bd9Sstevel@tonic-gate (sip->si_flags & SYMINFO_FLG_COPY)) {
28197c478bd9Sstevel@tonic-gate slp->sl_imap = LIST(clmp)->lm_head;
282008278a5eSRod Evans
282108278a5eSRod Evans if (ret = SYMINTP(clmp)(slp, srp, binfo, in_nfavl))
28227c478bd9Sstevel@tonic-gate *binfo |= (DBG_BINFO_DIRECT | DBG_BINFO_COPYREF);
282308278a5eSRod Evans return (ret);
28247c478bd9Sstevel@tonic-gate }
28257c478bd9Sstevel@tonic-gate
28267c478bd9Sstevel@tonic-gate /*
2827efb9e8b8Srie * If we need to directly bind to our parent, start looking in each
2828efb9e8b8Srie * callers link map.
28297c478bd9Sstevel@tonic-gate */
28307c478bd9Sstevel@tonic-gate sl = *slp;
28317c478bd9Sstevel@tonic-gate sl.sl_flags |= LKUP_DIRECT;
283208278a5eSRod Evans ret = 0;
28337c478bd9Sstevel@tonic-gate
28347c478bd9Sstevel@tonic-gate if (sip->si_boundto == SYMINFO_BT_PARENT) {
2835cce0e03bSab196087 Aliste idx1;
2836cce0e03bSab196087 Bnd_desc *bdp;
2837cce0e03bSab196087 Grp_hdl *ghp;
28387c478bd9Sstevel@tonic-gate
2839efb9e8b8Srie /*
2840efb9e8b8Srie * Determine the parent of this explicit dependency from its
2841efb9e8b8Srie * CALLERS()'s list.
2842efb9e8b8Srie */
2843cce0e03bSab196087 for (APLIST_TRAVERSE(CALLERS(clmp), idx1, bdp)) {
2844cce0e03bSab196087 sl.sl_imap = lmp = bdp->b_caller;
284508278a5eSRod Evans if (ret = SYMINTP(lmp)(&sl, srp, binfo, in_nfavl))
2846efb9e8b8Srie goto found;
2847efb9e8b8Srie }
2848efb9e8b8Srie
2849efb9e8b8Srie /*
2850efb9e8b8Srie * A caller can also be defined as the parent of a dlopen()
2851efb9e8b8Srie * call. Determine whether this object has any handles. The
2852efb9e8b8Srie * dependencies maintained with the handle represent the
2853efb9e8b8Srie * explicit dependencies of the dlopen()'ed object, and the
2854efb9e8b8Srie * calling parent.
2855efb9e8b8Srie */
2856cce0e03bSab196087 for (APLIST_TRAVERSE(HANDLES(clmp), idx1, ghp)) {
2857efb9e8b8Srie Grp_desc *gdp;
2858cce0e03bSab196087 Aliste idx2;
2859efb9e8b8Srie
2860cce0e03bSab196087 for (ALIST_TRAVERSE(ghp->gh_depends, idx2, gdp)) {
2861efb9e8b8Srie if ((gdp->gd_flags & GPD_PARENT) == 0)
2862efb9e8b8Srie continue;
2863efb9e8b8Srie sl.sl_imap = lmp = gdp->gd_depend;
286408278a5eSRod Evans if (ret = SYMINTP(lmp)(&sl, srp, binfo,
286508278a5eSRod Evans in_nfavl))
2866efb9e8b8Srie goto found;
2867efb9e8b8Srie }
28687c478bd9Sstevel@tonic-gate }
28697c478bd9Sstevel@tonic-gate } else {
28707c478bd9Sstevel@tonic-gate /*
28717c478bd9Sstevel@tonic-gate * If we need to direct bind to anything else look in the
28727c478bd9Sstevel@tonic-gate * link map associated with this symbol reference.
28737c478bd9Sstevel@tonic-gate */
28747c478bd9Sstevel@tonic-gate if (sip->si_boundto == SYMINFO_BT_SELF)
28757c478bd9Sstevel@tonic-gate sl.sl_imap = lmp = clmp;
28767c478bd9Sstevel@tonic-gate else
28777c478bd9Sstevel@tonic-gate sl.sl_imap = lmp;
28787c478bd9Sstevel@tonic-gate
28797c478bd9Sstevel@tonic-gate if (lmp)
288008278a5eSRod Evans ret = SYMINTP(lmp)(&sl, srp, binfo, in_nfavl);
28817c478bd9Sstevel@tonic-gate }
2882efb9e8b8Srie found:
288308278a5eSRod Evans if (ret)
28847c478bd9Sstevel@tonic-gate *binfo |= DBG_BINFO_DIRECT;
28857c478bd9Sstevel@tonic-gate
28867c478bd9Sstevel@tonic-gate /*
2887adbfe822Srie * If a reference to a directly bound symbol can't be satisfied, then
2888adbfe822Srie * determine whether an interposer can provide the missing symbol. If
2889adbfe822Srie * a reference to a directly bound symbol is satisfied, then determine
2890adbfe822Srie * whether that object can be interposed upon for this symbol.
28917c478bd9Sstevel@tonic-gate */
289208278a5eSRod Evans dlmp = srp->sr_dmap;
289308278a5eSRod Evans if ((ret == 0) || (dlmp && (LIST(dlmp)->lm_head != dlmp) &&
289408278a5eSRod Evans (LIST(dlmp) == LIST(clmp)))) {
289508278a5eSRod Evans if (lookup_sym_interpose(slp, srp, binfo, in_nfavl))
289608278a5eSRod Evans return (1);
28977c478bd9Sstevel@tonic-gate }
28987c478bd9Sstevel@tonic-gate
289908278a5eSRod Evans return (ret);
29007c478bd9Sstevel@tonic-gate }
29017c478bd9Sstevel@tonic-gate
290208278a5eSRod Evans static int
core_lookup_sym(Rt_map * ilmp,Slookup * slp,Sresult * srp,uint_t * binfo,Aliste off,int * in_nfavl)290308278a5eSRod Evans core_lookup_sym(Rt_map *ilmp, Slookup *slp, Sresult *srp, uint_t *binfo,
29049aa23310Srie Aliste off, int *in_nfavl)
29057c478bd9Sstevel@tonic-gate {
29067c478bd9Sstevel@tonic-gate Rt_map *lmp;
29077c478bd9Sstevel@tonic-gate
29087c478bd9Sstevel@tonic-gate /*
29097c478bd9Sstevel@tonic-gate * Copy relocations should start their search after the head of the
29107c478bd9Sstevel@tonic-gate * main link-map control list.
29117c478bd9Sstevel@tonic-gate */
2912cce0e03bSab196087 if ((off == ALIST_OFF_DATA) && (slp->sl_flags & LKUP_COPY) && ilmp)
2913cb511613SAli Bahrami lmp = NEXT_RT_MAP(ilmp);
29147c478bd9Sstevel@tonic-gate else
29157c478bd9Sstevel@tonic-gate lmp = ilmp;
29167c478bd9Sstevel@tonic-gate
2917cb511613SAli Bahrami for (; lmp; lmp = NEXT_RT_MAP(lmp)) {
291860758829Srie if (callable(slp->sl_cmap, lmp, 0, slp->sl_flags)) {
29197c478bd9Sstevel@tonic-gate
29207c478bd9Sstevel@tonic-gate slp->sl_imap = lmp;
292108278a5eSRod Evans if ((SYMINTP(lmp)(slp, srp, binfo, in_nfavl)) ||
292237ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN))
292308278a5eSRod Evans return (1);
29247c478bd9Sstevel@tonic-gate }
29257c478bd9Sstevel@tonic-gate }
292608278a5eSRod Evans return (0);
29277c478bd9Sstevel@tonic-gate }
29287c478bd9Sstevel@tonic-gate
292908278a5eSRod Evans static int
rescan_lazy_find_sym(Rt_map * ilmp,Slookup * slp,Sresult * srp,uint_t * binfo,int * in_nfavl)293008278a5eSRod Evans rescan_lazy_find_sym(Rt_map *ilmp, Slookup *slp, Sresult *srp, uint_t *binfo,
29319aa23310Srie int *in_nfavl)
29327c478bd9Sstevel@tonic-gate {
29337c478bd9Sstevel@tonic-gate Rt_map *lmp;
29347c478bd9Sstevel@tonic-gate
2935cb511613SAli Bahrami for (lmp = ilmp; lmp; lmp = NEXT_RT_MAP(lmp)) {
29367c478bd9Sstevel@tonic-gate if (LAZY(lmp) == 0)
29377c478bd9Sstevel@tonic-gate continue;
293860758829Srie if (callable(slp->sl_cmap, lmp, 0, slp->sl_flags)) {
29397c478bd9Sstevel@tonic-gate
29407c478bd9Sstevel@tonic-gate slp->sl_imap = lmp;
294108278a5eSRod Evans if (elf_lazy_find_sym(slp, srp, binfo, in_nfavl))
294208278a5eSRod Evans return (1);
29437c478bd9Sstevel@tonic-gate }
29447c478bd9Sstevel@tonic-gate }
294508278a5eSRod Evans return (0);
29467c478bd9Sstevel@tonic-gate }
29477c478bd9Sstevel@tonic-gate
294808278a5eSRod Evans static int
_lookup_sym(Slookup * slp,Sresult * srp,uint_t * binfo,int * in_nfavl)294908278a5eSRod Evans _lookup_sym(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl)
29507c478bd9Sstevel@tonic-gate {
29517c478bd9Sstevel@tonic-gate const char *name = slp->sl_name;
29527c478bd9Sstevel@tonic-gate Rt_map *clmp = slp->sl_cmap;
2953dae2dfb7Srie Lm_list *lml = LIST(clmp);
29547c478bd9Sstevel@tonic-gate Rt_map *ilmp = slp->sl_imap, *lmp;
29557c478bd9Sstevel@tonic-gate ulong_t rsymndx;
295608278a5eSRod Evans int ret;
29577c478bd9Sstevel@tonic-gate Syminfo *sip;
29587c478bd9Sstevel@tonic-gate Slookup sl;
29597c478bd9Sstevel@tonic-gate
29607c478bd9Sstevel@tonic-gate /*
29617c478bd9Sstevel@tonic-gate * Search the initial link map for the required symbol (this category is
29627c478bd9Sstevel@tonic-gate * selected by dlsym(), where individual link maps are searched for a
29637c478bd9Sstevel@tonic-gate * required symbol. Therefore, we know we have permission to look at
29647c478bd9Sstevel@tonic-gate * the link map).
29657c478bd9Sstevel@tonic-gate */
296660758829Srie if (slp->sl_flags & LKUP_FIRST)
296708278a5eSRod Evans return (SYMINTP(ilmp)(slp, srp, binfo, in_nfavl));
29687c478bd9Sstevel@tonic-gate
29697c478bd9Sstevel@tonic-gate /*
29707c478bd9Sstevel@tonic-gate * Determine whether this lookup can be satisfied by an objects direct,
29717c478bd9Sstevel@tonic-gate * or lazy binding information. This is triggered by a relocation from
29727c478bd9Sstevel@tonic-gate * the object (hence rsymndx is set).
29737c478bd9Sstevel@tonic-gate */
29747c478bd9Sstevel@tonic-gate if (((rsymndx = slp->sl_rsymndx) != 0) &&
2975aa736cbeSrie ((sip = SYMINFO(clmp)) != NULL)) {
2976dae2dfb7Srie uint_t bound;
2977dae2dfb7Srie
29787c478bd9Sstevel@tonic-gate /*
29797c478bd9Sstevel@tonic-gate * Find the corresponding Syminfo entry for the original
29807c478bd9Sstevel@tonic-gate * referencing symbol.
29817c478bd9Sstevel@tonic-gate */
29827c478bd9Sstevel@tonic-gate /* LINTED */
29837c478bd9Sstevel@tonic-gate sip = (Syminfo *)((char *)sip + (rsymndx * SYMINENT(clmp)));
2984dae2dfb7Srie bound = sip->si_boundto;
2985dae2dfb7Srie
2986dae2dfb7Srie /*
2987dae2dfb7Srie * Identify any EXTERN or PARENT references for ldd(1).
2988dae2dfb7Srie */
2989dae2dfb7Srie if ((lml->lm_flags & LML_FLG_TRC_WARN) &&
2990dae2dfb7Srie (bound > SYMINFO_BT_LOWRESERVE)) {
2991dae2dfb7Srie if (bound == SYMINFO_BT_PARENT)
2992dae2dfb7Srie *binfo |= DBG_BINFO_REF_PARENT;
2993dae2dfb7Srie if (bound == SYMINFO_BT_EXTERN)
2994dae2dfb7Srie *binfo |= DBG_BINFO_REF_EXTERN;
2995dae2dfb7Srie }
29967c478bd9Sstevel@tonic-gate
29977c478bd9Sstevel@tonic-gate /*
29987c478bd9Sstevel@tonic-gate * If the symbol information indicates a direct binding,
29997c478bd9Sstevel@tonic-gate * determine the link map that is required to satisfy the
30007c478bd9Sstevel@tonic-gate * binding. Note, if the dependency can not be found, but a
30017c478bd9Sstevel@tonic-gate * direct binding isn't required, we will still fall through
30027c478bd9Sstevel@tonic-gate * to perform any default symbol search.
30037c478bd9Sstevel@tonic-gate */
30047c478bd9Sstevel@tonic-gate if (sip->si_flags & SYMINFO_FLG_DIRECT) {
30057c478bd9Sstevel@tonic-gate
30067c478bd9Sstevel@tonic-gate lmp = 0;
30077c478bd9Sstevel@tonic-gate if (bound < SYMINFO_BT_LOWRESERVE)
30089aa23310Srie lmp = elf_lazy_load(clmp, slp, bound,
30092017c965SRod Evans name, 0, NULL, in_nfavl);
30107c478bd9Sstevel@tonic-gate
30117c478bd9Sstevel@tonic-gate /*
30127c478bd9Sstevel@tonic-gate * If direct bindings have been disabled, and this isn't
30137c478bd9Sstevel@tonic-gate * a translator, skip any direct binding now that we've
301460758829Srie * ensured the resolving object has been loaded.
30157c478bd9Sstevel@tonic-gate *
30167c478bd9Sstevel@tonic-gate * If we need to direct bind to anything, we look in
30177c478bd9Sstevel@tonic-gate * ourselves, our parent, or in the link map we've just
30187c478bd9Sstevel@tonic-gate * loaded. Otherwise, even though we may have lazily
30197c478bd9Sstevel@tonic-gate * loaded an object we still continue to search for
30207c478bd9Sstevel@tonic-gate * symbols from the head of the link map list.
30217c478bd9Sstevel@tonic-gate */
30227c478bd9Sstevel@tonic-gate if (((FLAGS(clmp) & FLG_RT_TRANS) ||
3023dae2dfb7Srie (((lml->lm_tflags & LML_TFLG_NODIRECT) == 0) &&
3024dae2dfb7Srie ((slp->sl_flags & LKUP_SINGLETON) == 0))) &&
30259a411307Srie ((FLAGS1(clmp) & FL1_RT_DIRECT) ||
30267c478bd9Sstevel@tonic-gate (sip->si_flags & SYMINFO_FLG_DIRECTBIND))) {
302708278a5eSRod Evans ret = lookup_sym_direct(slp, srp, binfo,
30289aa23310Srie sip, lmp, in_nfavl);
30297c478bd9Sstevel@tonic-gate
30307c478bd9Sstevel@tonic-gate /*
303160758829Srie * Determine whether this direct binding has
303260758829Srie * been rejected. If we've bound to a singleton
303360758829Srie * without following a singleton search, then
303460758829Srie * return. The caller detects this condition
303560758829Srie * and will trigger a new singleton search.
303660758829Srie *
303760758829Srie * For any other rejection (such as binding to
303860758829Srie * a symbol labeled as nodirect - presumably
303960758829Srie * because the symbol definition has been
304060758829Srie * changed since the referring object was last
304160758829Srie * built), fall through to a standard symbol
30427c478bd9Sstevel@tonic-gate * search.
30437c478bd9Sstevel@tonic-gate */
304437ffaf83SRod Evans if (((*binfo & BINFO_MSK_REJECTED) == 0) ||
304537ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN))
304608278a5eSRod Evans return (ret);
304760758829Srie
304837ffaf83SRod Evans *binfo &= ~BINFO_MSK_REJECTED;
30497c478bd9Sstevel@tonic-gate }
30507c478bd9Sstevel@tonic-gate }
30517c478bd9Sstevel@tonic-gate }
30527c478bd9Sstevel@tonic-gate
305360758829Srie /*
305460758829Srie * Duplicate the lookup information, as we'll need to modify this
305560758829Srie * information for some of the following searches.
305660758829Srie */
30577c478bd9Sstevel@tonic-gate sl = *slp;
30587c478bd9Sstevel@tonic-gate
30597c478bd9Sstevel@tonic-gate /*
30607c478bd9Sstevel@tonic-gate * If the referencing object has the DF_SYMBOLIC flag set, look in the
30617c478bd9Sstevel@tonic-gate * referencing object for the symbol first. Failing that, fall back to
30627c478bd9Sstevel@tonic-gate * our generic search.
30637c478bd9Sstevel@tonic-gate */
306460758829Srie if ((FLAGS1(clmp) & FL1_RT_SYMBOLIC) &&
306560758829Srie ((sl.sl_flags & LKUP_SINGLETON) == 0)) {
306608278a5eSRod Evans
30677c478bd9Sstevel@tonic-gate sl.sl_imap = clmp;
306808278a5eSRod Evans if (SYMINTP(clmp)(&sl, srp, binfo, in_nfavl)) {
306908278a5eSRod Evans Rt_map *dlmp = srp->sr_dmap;
307008278a5eSRod Evans ulong_t dsymndx = (((ulong_t)srp->sr_sym -
307108278a5eSRod Evans (ulong_t)SYMTAB(dlmp)) / SYMENT(dlmp));
30729a411307Srie
30739a411307Srie /*
30749a411307Srie * Make sure this symbol hasn't explicitly been defined
30759a411307Srie * as nodirect.
30769a411307Srie */
307708278a5eSRod Evans if (((sip = SYMINFO(dlmp)) == 0) ||
30789a411307Srie /* LINTED */
30799a411307Srie ((sip = (Syminfo *)((char *)sip +
308008278a5eSRod Evans (dsymndx * SYMINENT(dlmp)))) == 0) ||
30819a411307Srie ((sip->si_flags & SYMINFO_FLG_NOEXTDIRECT) == 0))
308208278a5eSRod Evans return (1);
30837c478bd9Sstevel@tonic-gate }
30849a411307Srie }
30857c478bd9Sstevel@tonic-gate
308660758829Srie sl.sl_flags |= LKUP_STANDARD;
308760758829Srie
30887c478bd9Sstevel@tonic-gate /*
30897c478bd9Sstevel@tonic-gate * If this lookup originates from a standard relocation, then traverse
309060758829Srie * all link-map control lists, inspecting any object that is available
309160758829Srie * to this caller. Otherwise, traverse the link-map control list
309260758829Srie * associated with the caller.
30937c478bd9Sstevel@tonic-gate */
309460758829Srie if (sl.sl_flags & LKUP_STDRELOC) {
30957c478bd9Sstevel@tonic-gate Aliste off;
30967c478bd9Sstevel@tonic-gate Lm_cntl *lmc;
30977c478bd9Sstevel@tonic-gate
309808278a5eSRod Evans ret = 0;
30997c478bd9Sstevel@tonic-gate
3100dae2dfb7Srie for (ALIST_TRAVERSE_BY_OFFSET(lml->lm_lists, off, lmc)) {
310108278a5eSRod Evans if (((ret = core_lookup_sym(lmc->lc_head, &sl, srp,
310208278a5eSRod Evans binfo, off, in_nfavl)) != 0) ||
310337ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN))
31047c478bd9Sstevel@tonic-gate break;
31057c478bd9Sstevel@tonic-gate }
31067c478bd9Sstevel@tonic-gate } else
310708278a5eSRod Evans ret = core_lookup_sym(ilmp, &sl, srp, binfo, ALIST_OFF_DATA,
31089aa23310Srie in_nfavl);
310960758829Srie
311060758829Srie /*
311137ffaf83SRod Evans * If a symbol binding should be retried, return so that the search can
311237ffaf83SRod Evans * be repeated.
311360758829Srie */
311437ffaf83SRod Evans if (*binfo & BINFO_MSK_TRYAGAIN)
311508278a5eSRod Evans return (0);
31167c478bd9Sstevel@tonic-gate
31177c478bd9Sstevel@tonic-gate /*
31187c478bd9Sstevel@tonic-gate * To allow transitioning into a world of lazy loading dependencies see
31197c478bd9Sstevel@tonic-gate * if this link map contains objects that have lazy dependencies still
31207c478bd9Sstevel@tonic-gate * outstanding. If so, and we haven't been able to locate a non-weak
31217c478bd9Sstevel@tonic-gate * symbol reference, start bringing in any lazy dependencies to see if
31227c478bd9Sstevel@tonic-gate * the reference can be satisfied. Use of dlsym(RTLD_PROBE) sets the
312375e7992aSrie * LKUP_NOFALLBACK flag, and this flag disables this fall back.
31247c478bd9Sstevel@tonic-gate */
312508278a5eSRod Evans if ((ret == 0) && ((sl.sl_flags & LKUP_NOFALLBACK) == 0)) {
31267c478bd9Sstevel@tonic-gate if ((lmp = ilmp) == 0)
31277c478bd9Sstevel@tonic-gate lmp = LIST(clmp)->lm_head;
312875e7992aSrie
3129dae2dfb7Srie lml = LIST(lmp);
3130dae2dfb7Srie if ((sl.sl_flags & LKUP_WEAK) || (lml->lm_lazy == 0))
313137ffaf83SRod Evans return (NULL);
31327c478bd9Sstevel@tonic-gate
3133dae2dfb7Srie DBG_CALL(Dbg_syms_lazy_rescan(lml, name));
31347c478bd9Sstevel@tonic-gate
31357c478bd9Sstevel@tonic-gate /*
31367c478bd9Sstevel@tonic-gate * If this request originated from a dlsym(RTLD_NEXT) then start
31377c478bd9Sstevel@tonic-gate * looking for dependencies from the caller, otherwise use the
31387c478bd9Sstevel@tonic-gate * initial link-map.
31397c478bd9Sstevel@tonic-gate */
314060758829Srie if (sl.sl_flags & LKUP_NEXT)
314108278a5eSRod Evans ret = rescan_lazy_find_sym(clmp, &sl, srp, binfo,
31422017c965SRod Evans in_nfavl);
31437c478bd9Sstevel@tonic-gate else {
3144cce0e03bSab196087 Aliste idx;
31457c478bd9Sstevel@tonic-gate Lm_cntl *lmc;
31467c478bd9Sstevel@tonic-gate
3147dae2dfb7Srie for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) {
314875e7992aSrie sl.sl_flags |= LKUP_NOFALLBACK;
314908278a5eSRod Evans if (ret = rescan_lazy_find_sym(lmc->lc_head,
315008278a5eSRod Evans &sl, srp, binfo, in_nfavl))
31517c478bd9Sstevel@tonic-gate break;
31527c478bd9Sstevel@tonic-gate }
31537c478bd9Sstevel@tonic-gate }
31547c478bd9Sstevel@tonic-gate }
315508278a5eSRod Evans return (ret);
315660758829Srie }
315760758829Srie
315860758829Srie /*
315960758829Srie * Symbol lookup routine. Takes an ELF symbol name, and a list of link maps to
316060758829Srie * search. If successful, return a pointer to the symbol table entry, a
316160758829Srie * pointer to the link map of the enclosing object, and information relating
316260758829Srie * to the type of binding. Else return a null pointer.
316360758829Srie *
316408278a5eSRod Evans * To improve ELF performance, we first compute the ELF hash value and pass
316508278a5eSRod Evans * it to each _lookup_sym() routine. The ELF function will use this value to
316660758829Srie * locate the symbol, the a.out function will simply ignore it.
316760758829Srie */
316808278a5eSRod Evans int
lookup_sym(Slookup * slp,Sresult * srp,uint_t * binfo,int * in_nfavl)316908278a5eSRod Evans lookup_sym(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl)
317060758829Srie {
317160758829Srie Rt_map *clmp = slp->sl_cmap;
317208278a5eSRod Evans Sym *rsym = slp->sl_rsym;
317308278a5eSRod Evans uchar_t rtype = slp->sl_rtype, vis;
317408278a5eSRod Evans int ret, mode;
317560758829Srie
317660758829Srie if (slp->sl_hash == 0)
317775e7992aSrie slp->sl_hash = elf_hash(slp->sl_name);
317860758829Srie *binfo = 0;
317960758829Srie
318060758829Srie if (rsym) {
318108278a5eSRod Evans vis = ELF_ST_VISIBILITY(rsym->st_other);
318208278a5eSRod Evans
318308278a5eSRod Evans /*
318408278a5eSRod Evans * Symbols that are defined as protected, or hidden, within an
318508278a5eSRod Evans * object usually have any relocation references from within
318608278a5eSRod Evans * the same object bound at link-edit time. Therefore, ld.so.1
318708278a5eSRod Evans * is not involved. However, if a reference is to a
318808278a5eSRod Evans * capabilities symbol, this reference must be resolved at
318908278a5eSRod Evans * runtime. In this case look directly within the calling
319008278a5eSRod Evans * object, and only within the calling object, for these
319108278a5eSRod Evans * symbols. Note, an object may still use dlsym() to search
319208278a5eSRod Evans * externally for a symbol which is defined as protected within
319308278a5eSRod Evans * the same object.
319408278a5eSRod Evans */
319508278a5eSRod Evans if ((rsym->st_shndx != SHN_UNDEF) &&
319608278a5eSRod Evans ((slp->sl_flags & LKUP_DLSYM) == 0) &&
319708278a5eSRod Evans ((vis == STV_PROTECTED) || (vis == STV_HIDDEN))) {
319808278a5eSRod Evans slp->sl_imap = clmp;
319908278a5eSRod Evans return (SYMINTP(clmp)(slp, srp, binfo, in_nfavl));
320008278a5eSRod Evans }
320108278a5eSRod Evans
320208278a5eSRod Evans /*
320308278a5eSRod Evans * Establish any state that might be associated with a symbol
320408278a5eSRod Evans * reference.
320508278a5eSRod Evans */
320660758829Srie if ((slp->sl_flags & LKUP_STDRELOC) &&
320760758829Srie (ELF_ST_BIND(rsym->st_info) == STB_WEAK))
320860758829Srie slp->sl_flags |= LKUP_WEAK;
320960758829Srie
321008278a5eSRod Evans if (vis == STV_SINGLETON)
321160758829Srie slp->sl_flags |= LKUP_SINGLETON;
321260758829Srie }
321360758829Srie
321460758829Srie /*
321560758829Srie * Establish any lookup state required for this type of relocation.
321660758829Srie */
321760758829Srie if ((slp->sl_flags & LKUP_STDRELOC) && rtype) {
321860758829Srie if (rtype == M_R_COPY)
321960758829Srie slp->sl_flags |= LKUP_COPY;
322060758829Srie
322160758829Srie if (rtype != M_R_JMP_SLOT)
322260758829Srie slp->sl_flags |= LKUP_SPEC;
322360758829Srie }
322460758829Srie
322560758829Srie /*
322660758829Srie * Under ldd -w, any unresolved weak references are diagnosed. Set the
322760758829Srie * symbol binding as global to trigger a relocation error if the symbol
322860758829Srie * can not be found.
322960758829Srie */
323060758829Srie if (rsym) {
323160758829Srie if (LIST(slp->sl_cmap)->lm_flags & LML_FLG_TRC_NOUNRESWEAK)
323260758829Srie slp->sl_bind = STB_GLOBAL;
323360758829Srie else if ((slp->sl_bind = ELF_ST_BIND(rsym->st_info)) ==
323460758829Srie STB_WEAK)
323560758829Srie slp->sl_flags |= LKUP_WEAK;
323660758829Srie }
323760758829Srie
323860758829Srie /*
323937ffaf83SRod Evans * Save the callers MODE().
324037ffaf83SRod Evans */
324137ffaf83SRod Evans mode = MODE(clmp);
324237ffaf83SRod Evans
324337ffaf83SRod Evans /*
324460758829Srie * Carry out an initial symbol search. This search takes into account
324560758829Srie * all the modes of the requested search.
324660758829Srie */
324708278a5eSRod Evans if (((ret = _lookup_sym(slp, srp, binfo, in_nfavl)) == 0) &&
324837ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN)) {
324960758829Srie Slookup sl = *slp;
325060758829Srie
325160758829Srie /*
325237ffaf83SRod Evans * Try the symbol search again. This retry can be necessary if:
325337ffaf83SRod Evans *
32542017c965SRod Evans * - a binding has been rejected because of binding to a
325537ffaf83SRod Evans * singleton without going through a singleton search.
32562017c965SRod Evans * - a group binding has resulted in binding to a symbol
325737ffaf83SRod Evans * that indicates no-direct binding.
325837ffaf83SRod Evans *
325937ffaf83SRod Evans * Reset the lookup data, and try again.
326060758829Srie */
326160758829Srie sl.sl_imap = LIST(sl.sl_cmap)->lm_head;
326260758829Srie sl.sl_flags &= ~(LKUP_FIRST | LKUP_SELF | LKUP_NEXT);
326360758829Srie sl.sl_rsymndx = 0;
326437ffaf83SRod Evans
326537ffaf83SRod Evans if (*binfo & BINFO_REJSINGLE)
326637ffaf83SRod Evans sl.sl_flags |= LKUP_SINGLETON;
326737ffaf83SRod Evans if (*binfo & BINFO_REJGROUP) {
326837ffaf83SRod Evans sl.sl_flags |= LKUP_WORLD;
326937ffaf83SRod Evans mode |= RTLD_WORLD;
327037ffaf83SRod Evans }
327137ffaf83SRod Evans *binfo &= ~BINFO_MSK_REJECTED;
327237ffaf83SRod Evans
327308278a5eSRod Evans ret = _lookup_sym(&sl, srp, binfo, in_nfavl);
327460758829Srie }
32757c478bd9Sstevel@tonic-gate
32767c478bd9Sstevel@tonic-gate /*
32777c478bd9Sstevel@tonic-gate * If the caller is restricted to a symbol search within its group,
32787c478bd9Sstevel@tonic-gate * determine if it is necessary to follow a binding from outside of
32797c478bd9Sstevel@tonic-gate * the group.
32807c478bd9Sstevel@tonic-gate */
328108278a5eSRod Evans if (((mode & (RTLD_GROUP | RTLD_WORLD)) == RTLD_GROUP) &&
328208278a5eSRod Evans (lookup_sym_interpose(slp, srp, binfo, in_nfavl)))
328308278a5eSRod Evans return (1);
32847c478bd9Sstevel@tonic-gate
328508278a5eSRod Evans return (ret);
32867c478bd9Sstevel@tonic-gate }
32877c478bd9Sstevel@tonic-gate
32887c478bd9Sstevel@tonic-gate /*
32897c478bd9Sstevel@tonic-gate * Associate a binding descriptor with a caller and its dependency, or update
32907c478bd9Sstevel@tonic-gate * an existing descriptor.
32917c478bd9Sstevel@tonic-gate */
32927c478bd9Sstevel@tonic-gate int
bind_one(Rt_map * clmp,Rt_map * dlmp,uint_t flags)32937c478bd9Sstevel@tonic-gate bind_one(Rt_map *clmp, Rt_map *dlmp, uint_t flags)
32947c478bd9Sstevel@tonic-gate {
3295cce0e03bSab196087 Bnd_desc *bdp;
3296cce0e03bSab196087 Aliste idx;
32977c478bd9Sstevel@tonic-gate int found = ALE_CREATE;
32987c478bd9Sstevel@tonic-gate
32997c478bd9Sstevel@tonic-gate /*
33007c478bd9Sstevel@tonic-gate * Determine whether a binding descriptor already exists between the
33017c478bd9Sstevel@tonic-gate * two objects.
33027c478bd9Sstevel@tonic-gate */
3303cce0e03bSab196087 for (APLIST_TRAVERSE(DEPENDS(clmp), idx, bdp)) {
33047c478bd9Sstevel@tonic-gate if (bdp->b_depend == dlmp) {
33057c478bd9Sstevel@tonic-gate found = ALE_EXISTS;
33067c478bd9Sstevel@tonic-gate break;
33077c478bd9Sstevel@tonic-gate }
33087c478bd9Sstevel@tonic-gate }
33097c478bd9Sstevel@tonic-gate
33107c478bd9Sstevel@tonic-gate if (found == ALE_CREATE) {
33117c478bd9Sstevel@tonic-gate /*
33127c478bd9Sstevel@tonic-gate * Create a new binding descriptor.
33137c478bd9Sstevel@tonic-gate */
331437ffaf83SRod Evans if ((bdp = malloc(sizeof (Bnd_desc))) == NULL)
33157c478bd9Sstevel@tonic-gate return (0);
33167c478bd9Sstevel@tonic-gate
33177c478bd9Sstevel@tonic-gate bdp->b_caller = clmp;
33187c478bd9Sstevel@tonic-gate bdp->b_depend = dlmp;
33197c478bd9Sstevel@tonic-gate bdp->b_flags = 0;
33207c478bd9Sstevel@tonic-gate
33217c478bd9Sstevel@tonic-gate /*
33227c478bd9Sstevel@tonic-gate * Append the binding descriptor to the caller and the
33237c478bd9Sstevel@tonic-gate * dependency.
33247c478bd9Sstevel@tonic-gate */
332556deab07SRod Evans if (aplist_append(&DEPENDS(clmp), bdp, AL_CNT_DEPENDS) == NULL)
33267c478bd9Sstevel@tonic-gate return (0);
33277c478bd9Sstevel@tonic-gate
332856deab07SRod Evans if (aplist_append(&CALLERS(dlmp), bdp, AL_CNT_CALLERS) == NULL)
33297c478bd9Sstevel@tonic-gate return (0);
33307c478bd9Sstevel@tonic-gate }
33317c478bd9Sstevel@tonic-gate
33327c478bd9Sstevel@tonic-gate if ((found == ALE_CREATE) || ((bdp->b_flags & flags) != flags)) {
33337c478bd9Sstevel@tonic-gate bdp->b_flags |= flags;
33347c478bd9Sstevel@tonic-gate
33357c478bd9Sstevel@tonic-gate if (flags & BND_REFER)
33367c478bd9Sstevel@tonic-gate FLAGS1(dlmp) |= FL1_RT_USED;
33377c478bd9Sstevel@tonic-gate
33385aefb655Srie DBG_CALL(Dbg_file_bind_entry(LIST(clmp), bdp));
33397c478bd9Sstevel@tonic-gate }
33407c478bd9Sstevel@tonic-gate return (found);
33417c478bd9Sstevel@tonic-gate }
33427c478bd9Sstevel@tonic-gate
33437c478bd9Sstevel@tonic-gate /*
33447c478bd9Sstevel@tonic-gate * Cleanup after relocation processing.
33457c478bd9Sstevel@tonic-gate */
33467c478bd9Sstevel@tonic-gate int
relocate_finish(Rt_map * lmp,APlist * bound,int ret)334756deab07SRod Evans relocate_finish(Rt_map *lmp, APlist *bound, int ret)
33487c478bd9Sstevel@tonic-gate {
33495aefb655Srie DBG_CALL(Dbg_reloc_run(lmp, 0, ret, DBG_REL_FINISH));
33507c478bd9Sstevel@tonic-gate
33517c478bd9Sstevel@tonic-gate /*
33527c478bd9Sstevel@tonic-gate * Establish bindings to all objects that have been bound to.
33537c478bd9Sstevel@tonic-gate */
33547c478bd9Sstevel@tonic-gate if (bound) {
3355cce0e03bSab196087 Rt_map *_lmp;
33568a20d9f8Srie Word used;
33577c478bd9Sstevel@tonic-gate
33588a20d9f8Srie /*
33598a20d9f8Srie * Only create bindings if the callers relocation was
33608a20d9f8Srie * successful (ret != 0), otherwise the object will eventually
33618a20d9f8Srie * be torn down. Create these bindings if running under ldd(1)
33628a20d9f8Srie * with the -U/-u options regardless of relocation errors, as
33638a20d9f8Srie * the unused processing needs to traverse these bindings to
33648a20d9f8Srie * diagnose unused objects.
33658a20d9f8Srie */
33668a20d9f8Srie used = LIST(lmp)->lm_flags &
33678a20d9f8Srie (LML_FLG_TRC_UNREF | LML_FLG_TRC_UNUSED);
33688a20d9f8Srie
33698a20d9f8Srie if (ret || used) {
337056deab07SRod Evans Aliste idx;
337156deab07SRod Evans
3372cce0e03bSab196087 for (APLIST_TRAVERSE(bound, idx, _lmp)) {
33738a20d9f8Srie if (bind_one(lmp, _lmp, BND_REFER) || used)
33748a20d9f8Srie continue;
33758a20d9f8Srie
33767c478bd9Sstevel@tonic-gate ret = 0;
33777c478bd9Sstevel@tonic-gate break;
33787c478bd9Sstevel@tonic-gate }
33797c478bd9Sstevel@tonic-gate }
33807c478bd9Sstevel@tonic-gate free(bound);
33817c478bd9Sstevel@tonic-gate }
33827c478bd9Sstevel@tonic-gate
33837c478bd9Sstevel@tonic-gate return (ret);
33847c478bd9Sstevel@tonic-gate }
338556deab07SRod Evans
338656deab07SRod Evans /*
338756deab07SRod Evans * Function to correct protection settings. Segments are all mapped initially
338856deab07SRod Evans * with permissions as given in the segment header. We need to turn on write
338956deab07SRod Evans * permissions on a text segment if there are any relocations against that
339056deab07SRod Evans * segment, and then turn write permission back off again before returning
339156deab07SRod Evans * control to the caller. This function turns the permission on or off
339256deab07SRod Evans * depending on the value of the permission argument.
339356deab07SRod Evans */
339456deab07SRod Evans int
set_prot(Rt_map * lmp,mmapobj_result_t * mpp,int perm)339556deab07SRod Evans set_prot(Rt_map *lmp, mmapobj_result_t *mpp, int perm)
339656deab07SRod Evans {
339756deab07SRod Evans int prot;
339856deab07SRod Evans
339956deab07SRod Evans /*
340056deab07SRod Evans * If this is an allocated image (ie. a relocatable object) we can't
340156deab07SRod Evans * mprotect() anything.
340256deab07SRod Evans */
340356deab07SRod Evans if (FLAGS(lmp) & FLG_RT_IMGALLOC)
340456deab07SRod Evans return (1);
340556deab07SRod Evans
340656deab07SRod Evans DBG_CALL(Dbg_file_prot(lmp, perm));
340756deab07SRod Evans
340856deab07SRod Evans if (perm)
340956deab07SRod Evans prot = mpp->mr_prot | PROT_WRITE;
341056deab07SRod Evans else
341156deab07SRod Evans prot = mpp->mr_prot & ~PROT_WRITE;
341256deab07SRod Evans
341356deab07SRod Evans if (mprotect((void *)(uintptr_t)mpp->mr_addr,
341456deab07SRod Evans mpp->mr_msize, prot) == -1) {
341556deab07SRod Evans int err = errno;
341656deab07SRod Evans eprintf(LIST(lmp), ERR_FATAL, MSG_INTL(MSG_SYS_MPROT),
341756deab07SRod Evans NAME(lmp), strerror(err));
341856deab07SRod Evans return (0);
341956deab07SRod Evans }
342056deab07SRod Evans mpp->mr_prot = prot;
342156deab07SRod Evans return (1);
342256deab07SRod Evans }
3423