1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright (c) 1988 AT&T 24 * All Rights Reserved 25 * 26 * Copyright 2006 Sun Microsystems, Inc. All rights reserved. 27 * Use is subject to license terms. 28 */ 29 #pragma ident "%Z%%M% %I% %E% SMI" 30 31 #include "_synonyms.h" 32 33 #include <string.h> 34 #include <stdio.h> 35 #include <unistd.h> 36 #include <sys/stat.h> 37 #include <sys/mman.h> 38 #include <fcntl.h> 39 #include <limits.h> 40 #include <dlfcn.h> 41 #include <errno.h> 42 #include <link.h> 43 #include <debug.h> 44 #include <conv.h> 45 #include "_rtld.h" 46 #include "_audit.h" 47 #include "_elf.h" 48 #include "msg.h" 49 50 static Fct * vector[] = { 51 &elf_fct, 52 #ifdef A_OUT 53 &aout_fct, 54 #endif 55 0 56 }; 57 58 /* 59 * If a load filter flag is in effect, and this object is a filter, trigger the 60 * loading of all its filtees. The load filter flag is in effect when creating 61 * configuration files, or when under the control of ldd(1), or the LD_LOADFLTR 62 * environment variable is set, or this object was built with the -zloadfltr 63 * flag. Otherwise, filtee loading is deferred until triggered by a relocation. 64 */ 65 static void 66 load_filtees(Rt_map *lmp) 67 { 68 if ((FLAGS1(lmp) & MSK_RT_FILTER) && 69 ((FLAGS(lmp) & FLG_RT_LOADFLTR) || 70 (LIST(lmp)->lm_tflags & LML_TFLG_LOADFLTR))) { 71 Dyninfo * dip = DYNINFO(lmp); 72 uint_t cnt, max = DYNINFOCNT(lmp); 73 Slookup sl; 74 75 sl.sl_name = 0; 76 sl.sl_hash = 0; 77 sl.sl_imap = sl.sl_cmap = lmp; 78 79 for (cnt = 0; cnt < max; cnt++, dip++) { 80 if (((dip->di_flags & MSK_DI_FILTER) == 0) || 81 ((dip->di_flags & FLG_DI_AUXFLTR) && 82 (rtld_flags & RT_FL_NOAUXFLTR))) 83 continue; 84 (void) elf_lookup_filtee(&sl, 0, 0, cnt); 85 } 86 } 87 } 88 89 /* 90 * Analyze one or more link-maps of a link map control list. This routine is 91 * called at startup to continue the processing of the main executable. It is 92 * also called each time a new set of objects are loaded, ie. from filters, 93 * lazy-loaded objects, or dlopen(). 94 * 95 * In each instance we traverse the link-map control list starting with the 96 * initial object. As dependencies are analyzed they are added to the link-map 97 * control list. Thus the list grows as we traverse it - this results in the 98 * breadth first ordering of all needed objects. 99 */ 100 int 101 analyze_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp) 102 { 103 Rt_map *lmp = nlmp; 104 Lm_cntl *nlmc; 105 int ret = 1; 106 107 /* 108 * If this link-map control list is being analyzed, return. The object 109 * that has just been added will be picked up by the existing analysis 110 * thread. Note, this is only really meaningful during process init- 111 * ialization, as objects are added to the main link-map control list. 112 * Following this initialization, each family of objects that are loaded 113 * are added to a new link-map control list. 114 */ 115 /* LINTED */ 116 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 117 if (nlmc->lc_flags & LMC_FLG_ANALYZING) 118 return (1); 119 120 /* 121 * If this object doesn't belong to the present link-map control list 122 * then it must already have been analyzed, or it is in the process of 123 * being analyzed prior to us recursing into this analysis. In either 124 * case, ignore the object as it's already being taken care of. 125 */ 126 if (nlmco != CNTL(nlmp)) 127 return (1); 128 129 nlmc->lc_flags |= LMC_FLG_ANALYZING; 130 131 for (; lmp; lmp = (Rt_map *)NEXT(lmp)) { 132 if (FLAGS(lmp) & 133 (FLG_RT_ANALZING | FLG_RT_ANALYZED | FLG_RT_DELETE)) 134 continue; 135 136 /* 137 * Indicate that analyzing is under way. 138 */ 139 FLAGS(lmp) |= FLG_RT_ANALZING; 140 141 /* 142 * If this link map represents a relocatable object, then we 143 * need to finish the link-editing of the object at this point. 144 */ 145 if (FLAGS(lmp) & FLG_RT_OBJECT) { 146 if (elf_obj_fini(lml, lmp) == 0) { 147 if (lml->lm_flags & LML_FLG_TRC_ENABLE) 148 continue; 149 ret = 0; 150 break; 151 } 152 } 153 154 DBG_CALL(Dbg_file_analyze(lmp)); 155 156 /* 157 * Establish any dependencies this object requires. 158 */ 159 if (LM_NEEDED(lmp)(lml, nlmco, lmp) == 0) { 160 if (lml->lm_flags & LML_FLG_TRC_ENABLE) 161 continue; 162 ret = 0; 163 break; 164 } 165 166 FLAGS(lmp) &= ~FLG_RT_ANALZING; 167 FLAGS(lmp) |= FLG_RT_ANALYZED; 168 169 /* 170 * If we're building a configuration file, determine if this 171 * object is a filter and if so load its filtees. This 172 * traversal is only necessary for crle(1), as typical use of 173 * an object will load filters as part of relocation processing. 174 */ 175 if (MODE(nlmp) & RTLD_CONFGEN) 176 load_filtees(lmp); 177 178 /* 179 * If an interposer has been added, it will have been inserted 180 * in the link-map before the link we're presently analyzing. 181 * Break out of this analysis loop and return to the head of 182 * the link-map control list to analyze the interposer. Note 183 * that this rescan preserves the breadth first loading of 184 * dependencies. 185 */ 186 /* LINTED */ 187 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 188 if (nlmc->lc_flags & LMC_FLG_REANALYZE) { 189 nlmc->lc_flags &= ~LMC_FLG_REANALYZE; 190 lmp = nlmc->lc_head; 191 } 192 } 193 194 /* LINTED */ 195 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 196 nlmc->lc_flags &= ~LMC_FLG_ANALYZING; 197 198 return (ret); 199 } 200 201 /* 202 * Copy relocation test. If the symbol definition is within .bss, then it's 203 * zero filled, and as the destination is within .bss, we can skip copying 204 * zero's to zero's. However, if the destination object has a MOVE table, it's 205 * .bss might contain non-zero data, in which case copy it regardless. 206 */ 207 static int 208 copy_zerobits(Rt_map *dlmp, Sym *dsym) 209 { 210 if ((FLAGS(dlmp) & FLG_RT_MOVE) == 0) { 211 Mmap *mmaps; 212 caddr_t daddr = (caddr_t)dsym->st_value; 213 214 if ((FLAGS(dlmp) & FLG_RT_FIXED) == 0) 215 daddr += ADDR(dlmp); 216 217 for (mmaps = MMAPS(dlmp); mmaps->m_vaddr; mmaps++) { 218 if ((mmaps->m_fsize != mmaps->m_msize) && 219 (daddr >= (mmaps->m_vaddr + mmaps->m_fsize)) && 220 (daddr < (mmaps->m_vaddr + mmaps->m_msize))) 221 return (1); 222 } 223 } 224 return (0); 225 } 226 227 /* 228 * Relocate an individual object. 229 */ 230 static int 231 relocate_so(Lm_list *lml, Rt_map *lmp, int *relocated, int now) 232 { 233 /* 234 * If we're running under ldd(1), and haven't been asked to trace any 235 * warnings, skip any actual relocation processing. 236 */ 237 if (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) || 238 (lml->lm_flags & LML_FLG_TRC_WARN)) { 239 240 if (relocated) 241 (*relocated)++; 242 243 if ((LM_RELOC(lmp)(lmp, now) == 0) && 244 ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0)) 245 return (0); 246 } 247 return (1); 248 } 249 250 /* 251 * Relocate the objects on a link-map control list. 252 */ 253 static int 254 _relocate_lmc(Lm_list *lml, Rt_map *nlmp, int *relocated) 255 { 256 Rt_map *lmp; 257 258 for (lmp = nlmp; lmp; lmp = (Rt_map *)NEXT(lmp)) { 259 /* 260 * If this object has already been relocated, we're done. If 261 * this object is being deleted, skip it, there's probably a 262 * relocation error somewhere that's causing this deletion. 263 */ 264 if (FLAGS(lmp) & 265 (FLG_RT_RELOCING | FLG_RT_RELOCED | FLG_RT_DELETE)) 266 continue; 267 268 /* 269 * Indicate that relocation processing is under way. 270 */ 271 FLAGS(lmp) |= FLG_RT_RELOCING; 272 273 /* 274 * Relocate the object. 275 */ 276 if (relocate_so(lml, lmp, relocated, 0) == 0) 277 return (0); 278 279 /* 280 * Indicate that the objects relocation is complete. 281 */ 282 FLAGS(lmp) &= ~FLG_RT_RELOCING; 283 FLAGS(lmp) |= FLG_RT_RELOCED; 284 285 /* 286 * Mark this object's init is available for harvesting. Under 287 * ldd(1) this marking is necessary for -i (tsort) gathering. 288 */ 289 lml->lm_init++; 290 lml->lm_flags |= LML_FLG_OBJADDED; 291 292 /* 293 * Process any move data (not necessary under ldd()). 294 */ 295 if ((FLAGS(lmp) & FLG_RT_MOVE) && 296 ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0)) 297 move_data(lmp); 298 299 /* 300 * Determine if this object is a filter, and if a load filter 301 * flag is in effect, trigger the loading of all its filtees. 302 */ 303 load_filtees(lmp); 304 } 305 306 /* 307 * Perform special copy relocations. These are only meaningful for 308 * dynamic executables (fixed and head of their link-map list). If 309 * this ever has to change then the infrastructure of COPY() has to 310 * change as presently this element is used to capture both receiver 311 * and supplier of copy data. 312 */ 313 if ((FLAGS(nlmp) & FLG_RT_FIXED) && (nlmp == LIST(nlmp)->lm_head) && 314 (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) || 315 (lml->lm_flags & LML_FLG_TRC_WARN))) { 316 Rt_map ** lmpp; 317 Aliste off1; 318 Word tracing; 319 320 #if defined(__sparc) || defined(__amd64) 321 /* XX64 don't need this once the compilers are fixed */ 322 #elif defined(i386) 323 if (elf_copy_gen(nlmp) == 0) 324 return (0); 325 #endif 326 327 if (COPY(nlmp) == 0) 328 return (1); 329 330 if ((LIST(nlmp)->lm_flags & LML_FLG_TRC_ENABLE) && 331 (((rtld_flags & RT_FL_SILENCERR) == 0) || 332 (LIST(nlmp)->lm_flags & LML_FLG_TRC_VERBOSE))) 333 tracing = 1; 334 else 335 tracing = 0; 336 337 DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD)); 338 339 for (ALIST_TRAVERSE(COPY(nlmp), off1, lmpp)) { 340 Rt_map * lmp = *lmpp; 341 Rel_copy * rcp; 342 Aliste off2; 343 344 for (ALIST_TRAVERSE(COPY(lmp), off2, rcp)) { 345 int zero; 346 347 /* 348 * Only copy the bits if it's from non-zero 349 * filled memory. 350 */ 351 zero = copy_zerobits(rcp->r_dlmp, rcp->r_dsym); 352 DBG_CALL(Dbg_reloc_copy(rcp->r_dlmp, nlmp, 353 rcp->r_name, zero)); 354 if (zero) 355 continue; 356 357 (void) memcpy(rcp->r_radd, rcp->r_dadd, 358 rcp->r_size); 359 360 if ((tracing == 0) || ((FLAGS1(rcp->r_dlmp) & 361 FL1_RT_DISPREL) == 0)) 362 continue; 363 364 (void) printf(MSG_INTL(MSG_LDD_REL_CPYDISP), 365 demangle(rcp->r_name), NAME(rcp->r_dlmp)); 366 } 367 } 368 369 DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD)); 370 371 free(COPY(nlmp)); 372 COPY(nlmp) = 0; 373 } 374 return (1); 375 } 376 377 int 378 relocate_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp) 379 { 380 int lret = 1, pret = 1; 381 Alist *alp; 382 Aliste plmco; 383 Lm_cntl *plmc, *nlmc; 384 385 /* 386 * If this link-map control list is being relocated, return. The object 387 * that has just been added will be picked up by the existing relocation 388 * thread. Note, this is only really meaningful during process init- 389 * ialization, as objects are added to the main link-map control list. 390 * Following this initialization, each family of objects that are loaded 391 * are added to a new link-map control list. 392 */ 393 /* LINTED */ 394 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 395 396 if (nlmc->lc_flags & LMC_FLG_RELOCATING) 397 return (1); 398 399 nlmc->lc_flags |= LMC_FLG_RELOCATING; 400 401 /* 402 * Relocate one or more link-maps of a link map control list. If this 403 * object doesn't belong to the present link-map control list then it 404 * must already have been relocated, or it is in the process of being 405 * relocated prior to us recursing into this relocation. In either 406 * case, ignore the object as it's already being taken care of, however, 407 * fall through and capture any relocation promotions that might have 408 * been established from the reference mode of this object. 409 * 410 * If we're generating a configuration file using crle(1), two passes 411 * may be involved. Under the first pass, RTLD_CONFGEN is set. Under 412 * this pass, crle() loads objects into the process address space. No 413 * relocation is necessary at this point, we simply need to analyze the 414 * objects to insure any directly bound dependencies, filtees, etc. 415 * get loaded. Although we skip the relocation, fall through to insure 416 * any control lists are maintained appropriately. 417 * 418 * If objects are to be dldump(3c)'ed, crle(1) makes a second pass, 419 * using RTLD_NOW and RTLD_CONFGEN. The RTLD_NOW effectively carries 420 * out the relocations of all loaded objects. 421 */ 422 if ((nlmco == CNTL(nlmp)) && 423 ((MODE(nlmp) & (RTLD_NOW | RTLD_CONFGEN)) != RTLD_CONFGEN)) { 424 int relocated = 0; 425 426 /* 427 * Determine whether the initial link-map control list has 428 * started relocation. From this point, should any interposing 429 * objects be added to this link-map control list, the objects 430 * are demoted to standard objects. Their interposition can't 431 * be guaranteed once relocations have been carried out. 432 */ 433 if (nlmco == ALO_DATA) 434 lml->lm_flags |= LML_FLG_STARTREL; 435 436 /* 437 * Relocate the link-map control list. 438 */ 439 lret = _relocate_lmc(lml, nlmp, &relocated); 440 } 441 442 /* 443 * Determine the new, and previous link-map control lists. 444 */ 445 /* LINTED */ 446 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 447 if (nlmco == ALO_DATA) { 448 plmco = nlmco; 449 plmc = nlmc; 450 } else { 451 plmco = nlmco - lml->lm_lists->al_size; 452 /* LINTED */ 453 plmc = (Lm_cntl *)((char *)lml->lm_lists + plmco); 454 } 455 456 /* 457 * Having completed this control list of objects, they can now be bound 458 * to from other objects. Move this control list to the control list 459 * that precedes it. Although this control list may have only bound to 460 * controls lists much higher up the control list stack, it must only 461 * be moved up one control list so as to preserve the link-map order 462 * that may have already been traversed in search of symbols. 463 */ 464 if (lret && (nlmco != ALO_DATA) && nlmc->lc_head) 465 lm_move(lml, nlmco, plmco, nlmc, plmc); 466 467 /* 468 * Determine whether existing objects that have already been relocated, 469 * need any additional relocations performed. This can occur when new 470 * objects are loaded with RTLD_NOW, and these new objects have 471 * dependencies on objects that are already loaded. Note, that we peel 472 * any relocation promotions off of one control list at a time. This 473 * prevents relocations from being bound to objects that might yet fail 474 * to relocate themselves. 475 */ 476 while ((alp = plmc->lc_now) != 0) { 477 Aliste off; 478 Rt_map **lmpp; 479 480 /* 481 * Remove the relocation promotion list, as performing more 482 * relocations may result in discovering more objects that need 483 * promotion. 484 */ 485 plmc->lc_now = 0; 486 487 for (ALIST_TRAVERSE(alp, off, lmpp)) { 488 Rt_map *lmp = *lmpp; 489 490 /* 491 * If the original relocation of the link-map control 492 * list failed, or one of the relocation promotions of 493 * this loop has failed, demote any pending objects 494 * relocation mode. 495 */ 496 if ((lret == 0) || (pret == 0)) { 497 MODE(lmp) &= ~RTLD_NOW; 498 MODE(lmp) |= RTLD_LAZY; 499 continue; 500 } 501 502 /* 503 * If a relocation fails, save the error condition. 504 * It's possible that all new objects on the original 505 * link-map control list have been relocated 506 * successfully, but if the user request requires 507 * promoting objects that have already been loaded, we 508 * have to indicate that this operation couldn't be 509 * performed. The unrelocated objects are in use on 510 * another control list, and may continue to be used. 511 * If the .plt that resulted in the error is called, 512 * then the process will receive a fatal error at that 513 * time. But, the .plt may never be called. 514 */ 515 if (relocate_so(lml, lmp, 0, 1) == 0) 516 pret = 0; 517 } 518 519 /* 520 * Having promoted any objects, determine whether additional 521 * dependencies were added, and if so move them to the previous 522 * link-map control list. 523 */ 524 /* LINTED */ 525 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 526 /* LINTED */ 527 plmc = (Lm_cntl *)((char *)lml->lm_lists + plmco); 528 if ((nlmco != ALO_DATA) && nlmc->lc_head) 529 lm_move(lml, nlmco, plmco, nlmc, plmc); 530 (void) free(alp); 531 } 532 533 /* 534 * Indicate that relocations are no longer active for this control list. 535 */ 536 /* LINTED */ 537 nlmc = (Lm_cntl *)((char *)lml->lm_lists + nlmco); 538 nlmc->lc_flags &= ~LMC_FLG_RELOCATING; 539 540 if (lret && pret) 541 return (1); 542 else 543 return (0); 544 } 545 546 /* 547 * Inherit the first rejection message for possible later diagnostics. 548 * 549 * Any attempt to process a file that is unsuccessful, should be accompanied 550 * with an error diagnostic. However, some operations like searching for a 551 * simple filename, involve trying numerous paths, and an error message for each 552 * lookup is not required. Although a multiple search can fail, it's possible 553 * that a file was found, but was rejected because it was the wrong type. 554 * To satisfy these possibilities, the first failure is recorded as a rejection 555 * message, and this message is used later for a more specific diagnostic. 556 * 557 * File searches are focused at load_one(), and from here a rejection descriptor 558 * is passed down to various child routines. If these child routines can 559 * process multiple files, then they will maintain their own rejection desc- 560 * riptor. This is filled in for any failures, and a diagnostic produced to 561 * reflect the failure. The child routines then employ rejection_inherit() to 562 * pass the first rejection message back to load_one(). 563 * 564 * Note that the name, and rejection string must be duplicated, as the name 565 * buffer and error string buffer (see conv_ routines) may be reused for 566 * additional processing or rejection messages. 567 * 568 * As this routine is called to clean up after a failed open, remove any 569 * resolved pathname that might have been allocated as the file was processed. 570 */ 571 void 572 rejection_inherit(Rej_desc *rej1, Rej_desc *rej2, Fdesc *fdp) 573 { 574 if (rej2->rej_type && (rej1->rej_type == 0)) { 575 rej1->rej_type = rej2->rej_type; 576 rej1->rej_info = rej2->rej_info; 577 rej1->rej_flag = rej2->rej_flag; 578 if (rej2->rej_name) 579 rej1->rej_name = strdup(rej2->rej_name); 580 if (rej2->rej_str) { 581 if ((rej1->rej_str = strdup(rej2->rej_str)) == 0) 582 rej1->rej_str = MSG_ORIG(MSG_EMG_ENOMEM); 583 } 584 } 585 if (fdp && fdp->fd_nname && fdp->fd_pname && 586 (fdp->fd_pname != fdp->fd_nname)) { 587 free((void *)fdp->fd_pname); 588 fdp->fd_pname = 0; 589 } 590 } 591 592 /* 593 * Determine the object type of a file. 594 */ 595 Fct * 596 are_u_this(Rej_desc *rej, int fd, struct stat *status, const char *name) 597 { 598 int i; 599 char *maddr = 0; 600 601 fmap->fm_fsize = status->st_size; 602 603 /* 604 * If this is a directory (which can't be mmap()'ed) generate a precise 605 * error message. 606 */ 607 if ((status->st_mode & S_IFMT) == S_IFDIR) { 608 rej->rej_type = SGS_REJ_STR; 609 rej->rej_str = strerror(EISDIR); 610 return (0); 611 } 612 613 /* 614 * Map in the first page of the file. When this buffer is first used, 615 * the mapping is a single system page. This is typically enough to 616 * inspect the ehdr and phdrs of the file, and can be reused for each 617 * file that get loaded. If a larger mapping is required to read the 618 * ehdr and phdrs, a new mapping is created (see elf_map_it()). This 619 * new mapping is again used for each new file loaded. Some objects, 620 * such as filters, only take up one page, and in this case this mapping 621 * will suffice for the file. 622 */ 623 maddr = mmap(fmap->fm_maddr, fmap->fm_msize, (PROT_READ | PROT_EXEC), 624 fmap->fm_mflags, fd, 0); 625 #if defined(MAP_ALIGN) 626 if ((maddr == MAP_FAILED) && (errno == EINVAL)) { 627 /* 628 * If the mapping failed, and we used MAP_ALIGN, assume we're 629 * on a system that doesn't support this option. Try again 630 * without MAP_ALIGN. 631 */ 632 if (fmap->fm_mflags & MAP_ALIGN) { 633 rtld_flags2 |= RT_FL2_NOMALIGN; 634 fmap_setup(); 635 636 maddr = (char *)mmap(fmap->fm_maddr, fmap->fm_msize, 637 (PROT_READ | PROT_EXEC), fmap->fm_mflags, fd, 0); 638 } 639 } 640 #endif 641 if (maddr == MAP_FAILED) { 642 rej->rej_type = SGS_REJ_STR; 643 rej->rej_str = strerror(errno); 644 return (0); 645 } 646 647 /* 648 * From now on we will re-use fmap->fm_maddr as the mapping address 649 * so we augment the flags with MAP_FIXED and drop any MAP_ALIGN. 650 */ 651 fmap->fm_maddr = maddr; 652 fmap->fm_mflags |= MAP_FIXED; 653 #if defined(MAP_ALIGN) 654 fmap->fm_mflags &= ~MAP_ALIGN; 655 #endif 656 657 /* 658 * Search through the object vectors to determine what kind of 659 * object we have. 660 */ 661 for (i = 0; vector[i]; i++) { 662 if ((vector[i]->fct_are_u_this)(rej)) 663 return (vector[i]); 664 else if (rej->rej_type) { 665 Rt_map *lmp; 666 667 /* 668 * If this object is an explicitly defined shared 669 * object under inspection by ldd, and contains a 670 * incompatible hardware capabilities requirement, then 671 * inform the user, but continue processing. 672 * 673 * XXXX - ldd -v for any rej failure. 674 */ 675 if ((rej->rej_type == SGS_REJ_HWCAP_1) && 676 (lml_main.lm_flags & LML_FLG_TRC_LDDSTUB) && 677 ((lmp = lml_main.lm_head) != 0) && 678 (FLAGS1(lmp) & FL1_RT_LDDSTUB) && 679 (NEXT(lmp) == 0)) { 680 (void) printf(MSG_INTL(MSG_LDD_GEN_HWCAP_1), 681 name, rej->rej_str); 682 return (vector[i]); 683 } 684 return (0); 685 } 686 } 687 688 /* 689 * Unknown file type. 690 */ 691 rej->rej_type = SGS_REJ_UNKFILE; 692 return (0); 693 } 694 695 696 /* 697 * Function that determines whether a file name has already been loaded; if so, 698 * returns a pointer to its link map structure; else returns a NULL pointer. 699 */ 700 static int 701 _is_so_matched(const char *name, const char *str, int base) 702 { 703 const char *_str; 704 705 if (base && ((_str = strrchr(str, '/')) != NULL)) 706 _str++; 707 else 708 _str = str; 709 710 return (strcmp(name, _str)); 711 } 712 713 static Rt_map * 714 is_so_matched(Rt_map *lmp, const char *name, int base) 715 { 716 Aliste off; 717 const char **cpp; 718 719 /* 720 * Typically, dependencies are specified as simple file names 721 * (DT_NEEDED == libc.so.1), which are expanded to full pathnames to 722 * open the file. The full pathname is NAME(), and the original name 723 * is maintained on the ALIAS() list. Look through the ALIAS list first, 724 * as this is most likely to match other dependency uses. 725 */ 726 for (ALIST_TRAVERSE(ALIAS(lmp), off, cpp)) { 727 if (_is_so_matched(name, *cpp, base) == 0) 728 return (lmp); 729 } 730 731 /* 732 * Finally compare full paths, this is sometimes useful for catching 733 * filter names, or for those that dlopen() the dynamic executable. 734 */ 735 if (_is_so_matched(name, NAME(lmp), base) == 0) 736 return (lmp); 737 738 if (PATHNAME(lmp) != NAME(lmp)) { 739 if (_is_so_matched(name, PATHNAME(lmp), base) == 0) 740 return (lmp); 741 } 742 return (0); 743 } 744 745 Rt_map * 746 is_so_loaded(Lm_list *lml, const char *name, int base) 747 { 748 Rt_map *lmp; 749 const char *_name; 750 avl_index_t where; 751 Lm_cntl *lmc; 752 Aliste off; 753 754 /* 755 * If we've been asked to do a basename search, first determine if 756 * the pathname is registered in the FullpathNode AVL tree. 757 */ 758 if (base && (name[0] == '/') && 759 ((lmp = fpavl_loaded(lml, name, &where)) != NULL) && 760 ((FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) == 0)) 761 return (lmp); 762 763 /* 764 * If we've been asked to do a basename search reduce the input name 765 * to its basename. 766 */ 767 if (base && ((_name = strrchr(name, '/')) != NULL)) 768 _name++; 769 else 770 _name = name; 771 772 /* 773 * Loop through the callers link-map lists. 774 */ 775 for (ALIST_TRAVERSE(lml->lm_lists, off, lmc)) { 776 for (lmp = lmc->lc_head; lmp; lmp = (Rt_map *)NEXT(lmp)) { 777 if (FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) 778 continue; 779 780 if (is_so_matched(lmp, _name, base)) 781 return (lmp); 782 } 783 } 784 return ((Rt_map *)0); 785 } 786 787 788 /* 789 * Tracing is enabled by the LD_TRACE_LOADED_OPTIONS environment variable which 790 * is normally set from ldd(1). For each link map we load, print the load name 791 * and the full pathname of the shared object. 792 */ 793 /* ARGSUSED4 */ 794 static void 795 trace_so(Rt_map *clmp, Rej_desc *rej, const char *name, const char *path, 796 int alter, const char *nfound) 797 { 798 const char *str = MSG_ORIG(MSG_STR_EMPTY); 799 const char *reject = MSG_ORIG(MSG_STR_EMPTY); 800 char _reject[PATH_MAX]; 801 802 /* 803 * The first time through trace_so() will only have lddstub on the 804 * link-map list and the preloaded shared object is supplied as "path". 805 * As we don't want to print this shared object as a dependency, but 806 * instead inspect *its* dependencies, return. 807 */ 808 if (FLAGS1(clmp) & FL1_RT_LDDSTUB) 809 return; 810 811 /* 812 * Without any rejection info, this is a supplied not-found condition. 813 */ 814 if (rej && (rej->rej_type == 0)) { 815 (void) printf(nfound, name); 816 return; 817 } 818 819 /* 820 * If rejection information exists then establish what object was 821 * found and the reason for its rejection. 822 */ 823 if (rej) { 824 /* LINTED */ 825 (void) snprintf(_reject, PATH_MAX, 826 MSG_INTL(ldd_reject[rej->rej_type]), conv_reject_desc(rej)); 827 if (rej->rej_name) 828 path = rej->rej_name; 829 reject = (char *)_reject; 830 831 /* 832 * Was an alternative pathname defined (from a configuration 833 * file). 834 */ 835 if (rej->rej_flag & FLG_FD_ALTER) 836 str = MSG_INTL(MSG_LDD_FIL_ALTER); 837 } else { 838 if (alter) 839 str = MSG_INTL(MSG_LDD_FIL_ALTER); 840 } 841 842 /* 843 * If the load name isn't a full pathname print its associated pathname 844 * together with all the other information we've gathered. 845 */ 846 if (*name == '/') 847 (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), path, str, reject); 848 else 849 (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), name, path, str, reject); 850 } 851 852 853 /* 854 * Establish a link-map mode, initializing it if it has just been loaded, or 855 * potentially updating it if it already exists. 856 */ 857 int 858 update_mode(Rt_map *lmp, int omode, int nmode) 859 { 860 Lm_list *lml = LIST(lmp); 861 int pmode = 0; 862 863 /* 864 * A newly loaded object hasn't had its mode set yet. Modes are used to 865 * load dependencies, so don't propagate any parent or no-load flags, as 866 * these would adversely affect this objects ability to load any of its 867 * dependencies that aren't already loaded. RTLD_FIRST is applicable to 868 * this objects handle creation only, and should not be propagated. 869 */ 870 if ((FLAGS(lmp) & FLG_RT_MODESET) == 0) { 871 MODE(lmp) |= nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST); 872 FLAGS(lmp) |= FLG_RT_MODESET; 873 return (1); 874 } 875 876 /* 877 * Establish any new overriding modes. RTLD_LAZY and RTLD_NOW should be 878 * represented individually (this is historic, as these two flags were 879 * the only flags originally available to dlopen()). Other flags are 880 * accumulative, but have a hierarchy of preference. 881 */ 882 if ((omode & RTLD_LAZY) && (nmode & RTLD_NOW)) { 883 MODE(lmp) &= ~RTLD_LAZY; 884 pmode |= RTLD_NOW; 885 } 886 887 pmode |= ((~omode & nmode) & 888 (RTLD_GLOBAL | RTLD_WORLD | RTLD_NODELETE)); 889 if (pmode) { 890 DBG_CALL(Dbg_file_mode_promote(lmp, pmode)); 891 MODE(lmp) |= pmode; 892 } 893 894 /* 895 * If this load is an RTLD_NOW request and the object has already been 896 * loaded non-RTLD_NOW, append this object to the relocation-now list 897 * of the objects associated control list. Note, if the object hasn't 898 * yet been relocated, setting its MODE() to RTLD_NOW will establish 899 * full relocation processing when it eventually gets relocated. 900 */ 901 if ((pmode & RTLD_NOW) && 902 (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))) { 903 Lm_cntl *lmc; 904 905 /* LINTED */ 906 lmc = (Lm_cntl *)((char *)(LIST(lmp)->lm_lists) + CNTL(lmp)); 907 (void) alist_append(&(lmc->lc_now), &lmp, sizeof (Rt_map *), 908 AL_CNT_LMNOW); 909 } 910 911 #ifdef SIEBEL_DISABLE 912 /* 913 * For patch backward compatibility the following .init collection 914 * is disabled. 915 */ 916 if (rtld_flags & RT_FL_DISFIX_1) 917 return (pmode); 918 #endif 919 920 /* 921 * If this objects .init has been collected but has not yet been called, 922 * it may be necessary to reevaluate the object using tsort(). For 923 * example, a new dlopen() hierarchy may bind to uninitialized objects 924 * that are already loaded, or a dlopen(RTLD_NOW) can establish new 925 * bindings between already loaded objects that require the tsort() 926 * information be recomputed. If however, no new objects have been 927 * added to the process, and this object hasn't been promoted, don't 928 * bother reevaluating the .init. The present tsort() information is 929 * probably as accurate as necessary, and by not establishing a parallel 930 * tsort() we can help reduce the amount of recursion possible between 931 * .inits. 932 */ 933 if (((FLAGS(lmp) & 934 (FLG_RT_INITCLCT | FLG_RT_INITCALL)) == FLG_RT_INITCLCT) && 935 ((lml->lm_flags & LML_FLG_OBJADDED) || ((pmode & RTLD_NOW) && 936 (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))))) { 937 FLAGS(lmp) &= ~FLG_RT_INITCLCT; 938 LIST(lmp)->lm_init++; 939 LIST(lmp)->lm_flags |= LML_FLG_OBJREEVAL; 940 } 941 942 return (pmode); 943 } 944 945 /* 946 * Determine whether an alias name already exists, and if not create one. This 947 * is typically used to retain dependency names, such as "libc.so.1", which 948 * would have been expanded to full path names when they were loaded. The 949 * full path names (NAME() and possibly PATHNAME()) are maintained as Fullpath 950 * AVL nodes, and thus would have been matched by fpavl_loaded() during 951 * file_open(). 952 */ 953 int 954 append_alias(Rt_map *lmp, const char *str, int *added) 955 { 956 Aliste off; 957 char **cpp, *cp; 958 959 /* 960 * Determine if this filename is already on the alias list. 961 */ 962 for (ALIST_TRAVERSE(ALIAS(lmp), off, cpp)) { 963 if (strcmp(*cpp, str) == 0) 964 return (1); 965 } 966 967 /* 968 * This is a new alias, append it to the alias list. 969 */ 970 if ((cp = strdup(str)) == 0) 971 return (0); 972 973 if (alist_append(&ALIAS(lmp), &cp, sizeof (char *), 974 AL_CNT_ALIAS) == 0) { 975 free(cp); 976 return (0); 977 } 978 if (added) 979 *added = 1; 980 return (1); 981 } 982 983 /* 984 * Determine whether a file is already loaded by comparing device and inode 985 * values. 986 */ 987 static Rt_map * 988 is_devinode_loaded(struct stat *status, Lm_list *lml, const char *name, 989 uint_t flags) 990 { 991 Lm_cntl *lmc; 992 Aliste off; 993 994 /* 995 * If this is an auditor, it will have been opened on a new link-map. 996 * To prevent multiple occurrances of the same auditor on multiple 997 * link-maps, search the head of each link-map list and see if this 998 * object is already loaded as an auditor. 999 */ 1000 if (flags & FLG_RT_AUDIT) { 1001 Lm_list * lml; 1002 Listnode * lnp; 1003 1004 for (LIST_TRAVERSE(&dynlm_list, lnp, lml)) { 1005 Rt_map *nlmp = lml->lm_head; 1006 1007 if (nlmp && ((FLAGS(nlmp) & 1008 (FLG_RT_AUDIT | FLG_RT_DELETE)) == FLG_RT_AUDIT) && 1009 (STDEV(nlmp) == status->st_dev) && 1010 (STINO(nlmp) == status->st_ino)) 1011 return (nlmp); 1012 } 1013 return ((Rt_map *)0); 1014 } 1015 1016 /* 1017 * If the file has been found determine from the new files status 1018 * information if this file is actually linked to one we already have 1019 * mapped. This catches symlink names not caught by is_so_loaded(). 1020 */ 1021 for (ALIST_TRAVERSE(lml->lm_lists, off, lmc)) { 1022 Rt_map *nlmp; 1023 1024 for (nlmp = lmc->lc_head; nlmp; nlmp = (Rt_map *)NEXT(nlmp)) { 1025 if ((FLAGS(nlmp) & FLG_RT_DELETE) || 1026 (FLAGS1(nlmp) & FL1_RT_LDDSTUB)) 1027 continue; 1028 1029 if ((STDEV(nlmp) != status->st_dev) || 1030 (STINO(nlmp) != status->st_ino)) 1031 continue; 1032 1033 if (lml->lm_flags & LML_FLG_TRC_VERBOSE) { 1034 if (*name == '/') 1035 (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), 1036 name, MSG_ORIG(MSG_STR_EMPTY), 1037 MSG_ORIG(MSG_STR_EMPTY)); 1038 else 1039 (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), 1040 name, NAME(nlmp), 1041 MSG_ORIG(MSG_STR_EMPTY), 1042 MSG_ORIG(MSG_STR_EMPTY)); 1043 } 1044 return (nlmp); 1045 } 1046 } 1047 return ((Rt_map *)0); 1048 } 1049 1050 /* 1051 * Generate any error messages indicating a file could not be found. When 1052 * preloading or auditing a secure application, it can be a little more helpful 1053 * to indicate that a search of secure directories has failed, so adjust the 1054 * messages accordingly. 1055 */ 1056 void 1057 file_notfound(Lm_list *lml, const char *name, Rt_map *clmp, uint_t flags, 1058 Rej_desc * rej) 1059 { 1060 int secure = 0; 1061 1062 if ((rtld_flags & RT_FL_SECURE) && 1063 (flags & (FLG_RT_PRELOAD | FLG_RT_AUDIT))) 1064 secure++; 1065 1066 if (lml->lm_flags & LML_FLG_TRC_ENABLE) { 1067 /* 1068 * Under ldd(1), auxiliary filtees that can't be loaded are 1069 * ignored, unless verbose errors are requested. 1070 */ 1071 if ((rtld_flags & RT_FL_SILENCERR) && 1072 ((lml->lm_flags & LML_FLG_TRC_VERBOSE) == 0)) 1073 return; 1074 1075 if (secure) 1076 trace_so(clmp, rej, name, 0, 0, 1077 MSG_INTL(MSG_LDD_SEC_NFOUND)); 1078 else 1079 trace_so(clmp, rej, name, 0, 0, 1080 MSG_INTL(MSG_LDD_FIL_NFOUND)); 1081 return; 1082 } 1083 1084 if (rej->rej_type) { 1085 eprintf(lml, ERR_FATAL, MSG_INTL(err_reject[rej->rej_type]), 1086 rej->rej_name ? rej->rej_name : MSG_INTL(MSG_STR_UNKNOWN), 1087 conv_reject_desc(rej)); 1088 return; 1089 } 1090 1091 if (secure) 1092 eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SEC_OPEN), name); 1093 else 1094 eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), name, 1095 strerror(ENOENT)); 1096 } 1097 1098 static int 1099 file_open(int err, Lm_list *lml, const char *oname, const char *nname, 1100 Rt_map *clmp, uint_t flags, Fdesc * fdesc, Rej_desc *rej) 1101 { 1102 struct stat status; 1103 Rt_map *nlmp; 1104 1105 fdesc->fd_oname = oname; 1106 1107 if ((err == 0) && (fdesc->fd_flags & FLG_FD_ALTER)) 1108 DBG_CALL(Dbg_file_config_obj(lml, oname, 0, nname)); 1109 1110 /* 1111 * If we're dealing with a full pathname, determine whether this 1112 * pathname is already known. Other pathnames fall through to the 1113 * dev/inode check, as even though the pathname may look the same as 1114 * one previously used, the process may have changed directory. 1115 */ 1116 if ((err == 0) && (nname[0] == '/')) { 1117 if ((nlmp = fpavl_loaded(lml, nname, 1118 &(fdesc->fd_avlwhere))) != NULL) { 1119 fdesc->fd_nname = nname; 1120 fdesc->fd_lmp = nlmp; 1121 return (1); 1122 } 1123 } 1124 1125 if ((err == 0) && ((stat(nname, &status)) != -1)) { 1126 char path[PATH_MAX]; 1127 int fd, size, added; 1128 1129 /* 1130 * If this path has been constructed as part of expanding a 1131 * HWCAP directory, ignore any subdirectories. For any other 1132 * reference that expands to a directory, fall through to 1133 * contruct a meaningful rejection message. 1134 */ 1135 if ((flags & FLG_RT_HWCAP) && 1136 ((status.st_mode & S_IFMT) == S_IFDIR)) 1137 return (0); 1138 1139 /* 1140 * Resolve the filename and determine whether the resolved name 1141 * is already known. Typically, the previous fpavl_loaded() 1142 * will have caught this, as both NAME() and PATHNAME() for a 1143 * link-map are recorded in the FullNode AVL tree. However, 1144 * instances exist where a file can be replaced (loop-back 1145 * mounts, bfu, etc.), and reference is made to the original 1146 * file through a symbolic link. By checking the pathname here, 1147 * we don't fall through to the dev/inode check and conclude 1148 * that a new file should be loaded. 1149 */ 1150 if ((nname[0] == '/') && (rtld_flags & RT_FL_EXECNAME) && 1151 ((size = resolvepath(nname, path, (PATH_MAX - 1))) > 0)) { 1152 path[size] = '\0'; 1153 1154 if (strcmp(nname, path)) { 1155 if ((nlmp = 1156 fpavl_loaded(lml, path, 0)) != NULL) { 1157 added = 0; 1158 1159 if (append_alias(nlmp, nname, 1160 &added) == 0) 1161 return (0); 1162 if (added) 1163 DBG_CALL(Dbg_file_skip(LIST(clmp), 1164 NAME(nlmp), nname)); 1165 fdesc->fd_nname = nname; 1166 fdesc->fd_lmp = nlmp; 1167 return (1); 1168 } 1169 1170 /* 1171 * If this pathname hasn't been loaded, save 1172 * the resolved pathname so that it doesn't 1173 * have to be recomputed as part of fullpath() 1174 * processing. 1175 */ 1176 if ((fdesc->fd_pname = strdup(path)) == 0) 1177 return (0); 1178 } else { 1179 /* 1180 * If the resolved name doesn't differ from the 1181 * original, save it without duplication. 1182 * Having fd_pname set indicates that no further 1183 * resolvepath processing is necessary. 1184 */ 1185 fdesc->fd_pname = nname; 1186 } 1187 } 1188 1189 if (nlmp = is_devinode_loaded(&status, lml, nname, flags)) { 1190 added = 0; 1191 1192 if (append_alias(nlmp, nname, &added) == 0) 1193 return (0); 1194 if (added) { 1195 if ((nname[0] == '/') && (fpavl_insert(lml, 1196 nlmp, nname, 0) == 0)) 1197 return (0); 1198 DBG_CALL(Dbg_file_skip(LIST(clmp), NAME(nlmp), 1199 nname)); 1200 } 1201 fdesc->fd_nname = nname; 1202 fdesc->fd_lmp = nlmp; 1203 return (1); 1204 } 1205 1206 if ((fd = open(nname, O_RDONLY, 0)) == -1) { 1207 /* 1208 * As the file must exist for the previous stat() to 1209 * have succeeded, record the error condition. 1210 */ 1211 rej->rej_type = SGS_REJ_STR; 1212 rej->rej_str = strerror(errno); 1213 } else { 1214 Fct *ftp; 1215 1216 if ((ftp = are_u_this(rej, fd, &status, nname)) != 0) { 1217 fdesc->fd_nname = nname; 1218 fdesc->fd_ftp = ftp; 1219 fdesc->fd_dev = status.st_dev; 1220 fdesc->fd_ino = status.st_ino; 1221 fdesc->fd_fd = fd; 1222 1223 /* 1224 * Trace that this open has succeeded. 1225 */ 1226 if (lml->lm_flags & LML_FLG_TRC_ENABLE) { 1227 trace_so(clmp, 0, oname, nname, 1228 (fdesc->fd_flags & FLG_FD_ALTER), 0); 1229 } 1230 return (1); 1231 } 1232 (void) close(fd); 1233 } 1234 1235 } else if (errno != ENOENT) { 1236 /* 1237 * If the open() failed for anything other than the file not 1238 * existing, record the error condition. 1239 */ 1240 rej->rej_type = SGS_REJ_STR; 1241 rej->rej_str = strerror(errno); 1242 } 1243 1244 /* 1245 * Indicate any rejection. 1246 */ 1247 if (rej->rej_type) { 1248 rej->rej_name = nname; 1249 rej->rej_flag = (fdesc->fd_flags & FLG_FD_ALTER); 1250 DBG_CALL(Dbg_file_rejected(lml, rej)); 1251 } 1252 return (0); 1253 } 1254 1255 /* 1256 * Find a full pathname (it contains a "/"). 1257 */ 1258 int 1259 find_path(Lm_list *lml, const char *oname, Rt_map *clmp, uint_t flags, 1260 Fdesc * fdesc, Rej_desc *rej) 1261 { 1262 int err = 0; 1263 1264 /* 1265 * If directory configuration exists determine if this path is known. 1266 */ 1267 if (rtld_flags & RT_FL_DIRCFG) { 1268 Rtc_obj *obj; 1269 const char *aname; 1270 1271 if ((obj = elf_config_ent(oname, (Word)elf_hash(oname), 1272 0, &aname)) != 0) { 1273 /* 1274 * If the configuration file states that this path is a 1275 * directory, or the path is explicitly defined as 1276 * non-existent (ie. a unused platform specific 1277 * library), then go no further. 1278 */ 1279 if (obj->co_flags & RTC_OBJ_DIRENT) { 1280 err = EISDIR; 1281 } else if ((obj->co_flags & 1282 (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == 1283 RTC_OBJ_NOEXIST) { 1284 err = ENOENT; 1285 } else if ((obj->co_flags & RTC_OBJ_ALTER) && 1286 (rtld_flags & RT_FL_OBJALT) && (lml == &lml_main)) { 1287 int ret; 1288 1289 fdesc->fd_flags |= FLG_FD_ALTER; 1290 /* 1291 * Attempt to open the alternative path. If 1292 * this fails, and the alternative is flagged 1293 * as optional, fall through to open the 1294 * original path. 1295 */ 1296 DBG_CALL(Dbg_libs_found(lml, aname, 1297 FLG_FD_ALTER)); 1298 if (((ret = file_open(0, lml, oname, aname, 1299 clmp, flags, fdesc, rej)) != 0) || 1300 ((obj->co_flags & RTC_OBJ_OPTINAL) == 0)) 1301 return (ret); 1302 1303 fdesc->fd_flags &= ~FLG_FD_ALTER; 1304 } 1305 } 1306 } 1307 DBG_CALL(Dbg_libs_found(lml, oname, 0)); 1308 return (file_open(err, lml, oname, oname, clmp, flags, fdesc, rej)); 1309 } 1310 1311 /* 1312 * Find a simple filename (it doesn't contain a "/"). 1313 */ 1314 static int 1315 _find_file(Lm_list *lml, const char *oname, const char *nname, Rt_map *clmp, 1316 uint_t flags, Fdesc * fdesc, Rej_desc *rej, Pnode * dir, int aflag) 1317 { 1318 DBG_CALL(Dbg_libs_found(lml, nname, aflag)); 1319 if ((lml->lm_flags & LML_FLG_TRC_SEARCH) && 1320 ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) { 1321 (void) printf(MSG_INTL(MSG_LDD_PTH_TRYING), nname, aflag ? 1322 MSG_INTL(MSG_LDD_FIL_ALTER) : MSG_ORIG(MSG_STR_EMPTY)); 1323 } 1324 1325 /* 1326 * If we're being audited tell the audit library of the file we're about 1327 * to go search for. The audit library may offer an alternative 1328 * dependency, or indicate that this dependency should be ignored. 1329 */ 1330 if ((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_OBJSEARCH) { 1331 char *aname = audit_objsearch(clmp, nname, dir->p_orig); 1332 1333 if (aname == 0) 1334 return (0); 1335 nname = aname; 1336 } 1337 return (file_open(0, lml, oname, nname, clmp, flags, fdesc, rej)); 1338 } 1339 1340 static int 1341 find_file(Lm_list *lml, const char *oname, Rt_map *clmp, uint_t flags, 1342 Fdesc * fdesc, Rej_desc *rej, Pnode * dir, Word * strhash, size_t olen) 1343 { 1344 static Rtc_obj Obj = { 0 }; 1345 Rtc_obj * dobj; 1346 const char *nname = oname; 1347 1348 if (dir->p_name == 0) 1349 return (0); 1350 if (dir->p_info) { 1351 dobj = (Rtc_obj *)dir->p_info; 1352 if ((dobj->co_flags & 1353 (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 1354 return (0); 1355 } else 1356 dobj = 0; 1357 1358 /* 1359 * If configuration information exists see if this directory/file 1360 * combination exists. 1361 */ 1362 if ((rtld_flags & RT_FL_DIRCFG) && 1363 ((dobj == 0) || (dobj->co_id != 0))) { 1364 Rtc_obj *fobj; 1365 const char *alt = 0; 1366 1367 /* 1368 * If this pnode has not yet been searched for in the 1369 * configuration file go find it. 1370 */ 1371 if (dobj == 0) { 1372 dobj = elf_config_ent(dir->p_name, 1373 (Word)elf_hash(dir->p_name), 0, 0); 1374 if (dobj == 0) 1375 dobj = &Obj; 1376 dir->p_info = (void *)dobj; 1377 1378 if ((dobj->co_flags & (RTC_OBJ_NOEXIST | 1379 RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 1380 return (0); 1381 } 1382 1383 /* 1384 * If we found a directory search for the file. 1385 */ 1386 if (dobj->co_id != 0) { 1387 if (*strhash == 0) 1388 *strhash = (Word)elf_hash(nname); 1389 fobj = elf_config_ent(nname, *strhash, 1390 dobj->co_id, &alt); 1391 1392 /* 1393 * If this object specifically does not exist, or the 1394 * object can't be found in a know-all-entries 1395 * directory, continue looking. If the object does 1396 * exist determine if an alternative object exists. 1397 */ 1398 if (fobj == 0) { 1399 if (dobj->co_flags & RTC_OBJ_ALLENTS) 1400 return (0); 1401 } else { 1402 if ((fobj->co_flags & (RTC_OBJ_NOEXIST | 1403 RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 1404 return (0); 1405 1406 if ((fobj->co_flags & RTC_OBJ_ALTER) && 1407 (rtld_flags & RT_FL_OBJALT) && 1408 (lml == &lml_main)) { 1409 int ret; 1410 1411 fdesc->fd_flags |= FLG_FD_ALTER; 1412 /* 1413 * Attempt to open the alternative path. 1414 * If this fails, and the alternative is 1415 * flagged as optional, fall through to 1416 * open the original path. 1417 */ 1418 ret = _find_file(lml, oname, alt, clmp, 1419 flags, fdesc, rej, dir, 1); 1420 if (ret || ((fobj->co_flags & 1421 RTC_OBJ_OPTINAL) == 0)) 1422 return (ret); 1423 1424 fdesc->fd_flags &= ~FLG_FD_ALTER; 1425 } 1426 } 1427 } 1428 } 1429 1430 /* 1431 * Protect ourselves from building an invalid pathname. 1432 */ 1433 if ((olen + dir->p_len + 1) >= PATH_MAX) { 1434 eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), nname, 1435 strerror(ENAMETOOLONG)); 1436 return (0); 1437 } 1438 if ((nname = (LM_GET_SO(clmp)(dir->p_name, nname))) == 0) 1439 return (0); 1440 1441 return (_find_file(lml, oname, nname, clmp, flags, fdesc, rej, dir, 0)); 1442 } 1443 1444 /* 1445 * A unique file has been opened. Create a link-map to represent it, and 1446 * process the various names by which it can be referenced. 1447 */ 1448 static Rt_map * 1449 load_file(Lm_list *lml, Aliste lmco, Fdesc *fdesc) 1450 { 1451 const char *oname = fdesc->fd_oname; 1452 const char *nname = fdesc->fd_nname; 1453 Rt_map *nlmp; 1454 1455 /* 1456 * Typically we call fct_map_so() with the full pathname of the opened 1457 * file (nname) and the name that started the search (oname), thus for 1458 * a typical dependency on libc this would be /usr/lib/libc.so.1 and 1459 * libc.so.1 (DT_NEEDED). The original name is maintained on an ALIAS 1460 * list for comparison when bringing in new dependencies. If the user 1461 * specified name as a full path (from a dlopen() for example) then 1462 * there's no need to create an ALIAS. 1463 */ 1464 if (strcmp(oname, nname) == 0) 1465 oname = 0; 1466 1467 /* 1468 * A new file has been opened, now map it into the process. Close the 1469 * original file so as not to accumulate file descriptors. 1470 */ 1471 nlmp = ((fdesc->fd_ftp)->fct_map_so)(lml, lmco, nname, oname, 1472 fdesc->fd_fd); 1473 (void) close(fdesc->fd_fd); 1474 fdesc->fd_fd = 0; 1475 1476 if (nlmp == 0) 1477 return (0); 1478 1479 /* 1480 * Save the dev/inode information for later comparisons. 1481 */ 1482 STDEV(nlmp) = fdesc->fd_dev; 1483 STINO(nlmp) = fdesc->fd_ino; 1484 1485 /* 1486 * Insert the names of this link-map into the FullpathNode AVL tree. 1487 * Save both the NAME() and PATHNAME() is they differ. 1488 * 1489 * If this is an OBJECT file, don't insert it yet as this is only a 1490 * temporary link-map. During elf_obj_fini() the final link-map is 1491 * created, and its names will be inserted in the FullpathNode AVL 1492 * tree at that time. 1493 */ 1494 if ((FLAGS(nlmp) & FLG_RT_OBJECT) == 0) { 1495 /* 1496 * Update the objects full path information if necessary. 1497 * Note, with pathname expansion in effect, the fd_pname will 1498 * be used as PATHNAME(). This allocated string will be freed 1499 * should this object be deleted. However, without pathname 1500 * expansion, the fd_name should be freed now, as it is no 1501 * longer referenced. 1502 */ 1503 if (FLAGS1(nlmp) & FL1_RT_RELATIVE) 1504 (void) fullpath(nlmp, fdesc->fd_pname); 1505 else if (fdesc->fd_pname != fdesc->fd_nname) 1506 free((void *)fdesc->fd_pname); 1507 fdesc->fd_pname = 0; 1508 1509 if ((NAME(nlmp)[0] == '/') && (fpavl_insert(lml, nlmp, 1510 NAME(nlmp), fdesc->fd_avlwhere) == 0)) { 1511 remove_so(lml, nlmp); 1512 return (0); 1513 } 1514 if (((NAME(nlmp)[0] != '/') || 1515 (NAME(nlmp) != PATHNAME(nlmp))) && 1516 (fpavl_insert(lml, nlmp, PATHNAME(nlmp), 0) == 0)) { 1517 remove_so(lml, nlmp); 1518 return (0); 1519 } 1520 } 1521 1522 /* 1523 * If we're processing an alternative object reset the original name 1524 * for possible $ORIGIN processing. 1525 */ 1526 if (fdesc->fd_flags & FLG_FD_ALTER) { 1527 const char *odir; 1528 char *ndir; 1529 size_t olen; 1530 1531 FLAGS(nlmp) |= FLG_RT_ALTER; 1532 1533 /* 1534 * If we were given a pathname containing a slash then the 1535 * original name is still in oname. Otherwise the original 1536 * directory is in dir->p_name (which is all we need for 1537 * $ORIGIN). 1538 */ 1539 if (fdesc->fd_flags & FLG_FD_SLASH) { 1540 char *ofil; 1541 1542 odir = oname; 1543 ofil = strrchr(oname, '/'); 1544 olen = ofil - odir + 1; 1545 } else { 1546 odir = fdesc->fd_odir; 1547 olen = strlen(odir) + 1; 1548 } 1549 1550 if ((ndir = (char *)malloc(olen)) == 0) { 1551 remove_so(lml, nlmp); 1552 return (0); 1553 } 1554 (void) strncpy(ndir, odir, olen); 1555 ndir[--olen] = '\0'; 1556 1557 ORIGNAME(nlmp) = ndir; 1558 DIRSZ(nlmp) = olen; 1559 } 1560 1561 /* 1562 * Identify this as a new object. 1563 */ 1564 FLAGS(nlmp) |= FLG_RT_NEWLOAD; 1565 1566 return (nlmp); 1567 } 1568 1569 /* 1570 * This function loads the named file and returns a pointer to its link map. 1571 * It is assumed that the caller has already checked that the file is not 1572 * already loaded before calling this function (refer is_so_loaded()). 1573 * Find and open the file, map it into memory, add it to the end of the list 1574 * of link maps and return a pointer to the new link map. Return 0 on error. 1575 */ 1576 static Rt_map * 1577 load_so(Lm_list *lml, Aliste lmco, const char *oname, Rt_map *clmp, 1578 uint_t flags, Fdesc *nfdp, Rej_desc *rej) 1579 { 1580 char *name; 1581 uint_t slash = 0; 1582 size_t olen; 1583 Fdesc fdesc = { 0 }; 1584 Pnode *dir; 1585 1586 /* 1587 * If the file is the run time linker then it's already loaded. 1588 */ 1589 if (interp && (strcmp(oname, NAME(lml_rtld.lm_head)) == 0)) 1590 return (lml_rtld.lm_head); 1591 1592 /* 1593 * If this isn't a hardware capabilites pathname, which is already a 1594 * full, duplicated pathname, determine whether the pathname contains 1595 * a slash, and if not determine the input filename (for max path 1596 * length verification). 1597 */ 1598 if ((flags & FLG_RT_HWCAP) == 0) { 1599 const char *str; 1600 1601 for (str = oname; *str; str++) { 1602 if (*str == '/') { 1603 slash++; 1604 break; 1605 } 1606 } 1607 if (slash == 0) 1608 olen = (str - oname) + 1; 1609 } 1610 1611 /* 1612 * If we are passed a 'null' link-map this means that this is the first 1613 * object to be loaded on this link-map list. In that case we set the 1614 * link-map to ld.so.1's link-map. 1615 * 1616 * This link-map is referenced to determine what lookup rules to use 1617 * when searching for files. By using ld.so.1's we are defaulting to 1618 * ELF look-up rules. 1619 * 1620 * Note: This case happens when loading the first object onto 1621 * the plt_tracing link-map. 1622 */ 1623 if (clmp == 0) 1624 clmp = lml_rtld.lm_head; 1625 1626 /* 1627 * If this path resulted from a $HWCAP specification, then the best 1628 * hardware capability object has already been establish, and is 1629 * available in the calling file descriptor. Perform some minor book- 1630 * keeping so that we can fall through into common code. 1631 */ 1632 if (flags & FLG_RT_HWCAP) { 1633 /* 1634 * If this object is already loaded, we're done. 1635 */ 1636 if (nfdp->fd_lmp) 1637 return (nfdp->fd_lmp); 1638 1639 /* 1640 * Obtain the avl index for this object. 1641 */ 1642 (void) fpavl_loaded(lml, nfdp->fd_nname, &(nfdp->fd_avlwhere)); 1643 1644 /* 1645 * If the name and resolved pathname differ, duplicate the path 1646 * name once more to provide for genric cleanup by the caller. 1647 */ 1648 if (nfdp->fd_pname && (nfdp->fd_nname != nfdp->fd_pname)) { 1649 char *pname; 1650 1651 if ((pname = strdup(nfdp->fd_pname)) == 0) 1652 return (0); 1653 nfdp->fd_pname = pname; 1654 } 1655 } else if (slash) { 1656 Rej_desc _rej = { 0 }; 1657 1658 *nfdp = fdesc; 1659 nfdp->fd_flags = FLG_FD_SLASH; 1660 1661 if (find_path(lml, oname, clmp, flags, nfdp, &_rej) == 0) { 1662 rejection_inherit(rej, &_rej, nfdp); 1663 return (0); 1664 } 1665 1666 /* 1667 * If this object is already loaded, we're done. 1668 */ 1669 if (nfdp->fd_lmp) 1670 return (nfdp->fd_lmp); 1671 1672 } else { 1673 /* 1674 * No '/' - for each directory on list, make a pathname using 1675 * that directory and filename and try to open that file. 1676 */ 1677 Pnode *dirlist = (Pnode *)0; 1678 Word strhash = 0; 1679 #if !defined(ISSOLOAD_BASENAME_DISABLED) 1680 Rt_map *nlmp; 1681 #endif 1682 DBG_CALL(Dbg_libs_find(lml, oname)); 1683 1684 #if !defined(ISSOLOAD_BASENAME_DISABLED) 1685 if ((nlmp = is_so_loaded(lml, oname, 0))) 1686 return (nlmp); 1687 #endif 1688 /* 1689 * Make sure we clear the file descriptor new name in case the 1690 * following directory search doesn't provide any directories 1691 * (odd, but this can be forced with a -znodefaultlib test). 1692 */ 1693 *nfdp = fdesc; 1694 for (dir = get_next_dir(&dirlist, clmp, flags); dir; 1695 dir = get_next_dir(&dirlist, clmp, flags)) { 1696 Rej_desc _rej = { 0 }; 1697 1698 *nfdp = fdesc; 1699 1700 /* 1701 * Try and locate this file. Make sure to clean up 1702 * any rejection information should the file have 1703 * been found, but not appropriate. 1704 */ 1705 if (find_file(lml, oname, clmp, flags, nfdp, &_rej, 1706 dir, &strhash, olen) == 0) { 1707 rejection_inherit(rej, &_rej, nfdp); 1708 continue; 1709 } 1710 1711 /* 1712 * If this object is already loaded, we're done. 1713 */ 1714 if (nfdp->fd_lmp) 1715 return (nfdp->fd_lmp); 1716 1717 nfdp->fd_odir = dir->p_name; 1718 break; 1719 } 1720 1721 /* 1722 * If the file couldn't be loaded, do another comparison of 1723 * loaded files using just the basename. This catches folks 1724 * who may have loaded multiple full pathname files (possibly 1725 * from setxid applications) to satisfy dependency relationships 1726 * (i.e., a file might have a dependency on foo.so.1 which has 1727 * already been opened using its full pathname). 1728 */ 1729 if (nfdp->fd_nname == 0) 1730 return (is_so_loaded(lml, oname, 1)); 1731 } 1732 1733 /* 1734 * Duplicate the file name so that NAME() is available in core files. 1735 * Note, that hardware capability names are already duplicated, but 1736 * they get duplicated once more to insure consistent cleanup in the 1737 * event of an error condition. 1738 */ 1739 if ((name = strdup(nfdp->fd_nname)) == 0) 1740 return (0); 1741 1742 if (nfdp->fd_nname == nfdp->fd_pname) 1743 nfdp->fd_nname = nfdp->fd_pname = name; 1744 else 1745 nfdp->fd_nname = name; 1746 1747 /* 1748 * Finish mapping the file and return the link-map descriptor. Note, 1749 * if this request originated from a HWCAP request, re-establish the 1750 * fdesc information. For single paged objects, such as filters, the 1751 * original mapping may have been sufficient to capture the file, thus 1752 * this mapping needs to be reset to insure it doesn't mistakenly get 1753 * unmapped as part of HWCAP cleanup. 1754 */ 1755 return (load_file(lml, lmco, nfdp)); 1756 } 1757 1758 /* 1759 * Trace an attempt to load an object. 1760 */ 1761 const char * 1762 load_trace(Lm_list *lml, const char *name, Rt_map *clmp) 1763 { 1764 /* 1765 * First generate any ldd(1) diagnostics. 1766 */ 1767 if ((lml->lm_flags & (LML_FLG_TRC_VERBOSE | LML_FLG_TRC_SEARCH)) && 1768 ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) 1769 (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, NAME(clmp)); 1770 1771 /* 1772 * If we're being audited tell the audit library of the file we're 1773 * about to go search for. 1774 */ 1775 if (((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_ACTIVITY) && 1776 (lml == LIST(clmp))) 1777 audit_activity(clmp, LA_ACT_ADD); 1778 1779 if ((lml->lm_tflags | FLAGS1(clmp)) & LML_TFLG_AUD_OBJSEARCH) { 1780 char *_name; 1781 1782 /* 1783 * The auditor can indicate that this object should be ignored. 1784 */ 1785 if ((_name = audit_objsearch(clmp, name, LA_SER_ORIG)) == 0) { 1786 eprintf(lml, ERR_FATAL, MSG_INTL(MSG_GEN_AUDITERM), 1787 name); 1788 return (0); 1789 } 1790 1791 /* 1792 * The auditor can provide an alternative name. 1793 */ 1794 if (_name != name) { 1795 free((void *)name); 1796 name = strdup(_name); 1797 } 1798 } 1799 return (name); 1800 } 1801 1802 /* 1803 * Having loaded an object and created a link-map to describe it, finish 1804 * processing this stage, including verifying any versioning requirements, 1805 * updating the objects mode, creating a handle if necessary, and adding this 1806 * object to existing handles if required. 1807 */ 1808 static int 1809 load_finish(Lm_list *lml, const char *name, Rt_map *clmp, int nmode, 1810 uint_t flags, Grp_hdl **hdl, Rt_map *nlmp) 1811 { 1812 Aliste off; 1813 Grp_hdl *ghp, **ghpp; 1814 int promote; 1815 1816 /* 1817 * If this dependency is associated with a required version insure that 1818 * the version is present in the loaded file. 1819 */ 1820 if (((rtld_flags & RT_FL_NOVERSION) == 0) && 1821 (FCT(clmp) == &elf_fct) && VERNEED(clmp) && 1822 (LM_VERIFY_VERS(clmp)(name, clmp, nlmp) == 0)) 1823 return (0); 1824 1825 /* 1826 * If this object has indicated that it should be isolated as a group 1827 * (DT_FLAGS_1 contains DF_1_GROUP - object was built with -B group), 1828 * or if the callers direct bindings indicate it should be isolated as 1829 * a group (DYNINFO flags contains FLG_DI_GROUP - dependency followed 1830 * -zgroupperm), establish the appropriate mode. 1831 * 1832 * The intent of an object defining itself as a group is to isolate the 1833 * relocation of the group within its own members, however, unless 1834 * opened through dlopen(), in which case we assume dlsym() will be used 1835 * to located symbols in the new object, we still need to associate it 1836 * with the caller for it to be bound with. This is equivalent to a 1837 * dlopen(RTLD_GROUP) and dlsym() using the returned handle. 1838 */ 1839 if ((FLAGS(nlmp) | flags) & FLG_RT_SETGROUP) { 1840 nmode &= ~RTLD_WORLD; 1841 nmode |= RTLD_GROUP; 1842 1843 /* 1844 * If the object wasn't explicitly dlopen()'ed associate it with 1845 * the parent. 1846 */ 1847 if (flags != FLG_RT_HANDLE) 1848 nmode |= RTLD_PARENT; 1849 } 1850 1851 /* 1852 * Establish new mode and flags. 1853 * 1854 * For patch backward compatibility, the following use of update_mode() 1855 * is disabled. 1856 */ 1857 #ifdef SIEBEL_DISABLE 1858 if (rtld_flags & RT_FL_DISFIX_1) 1859 promote = MODE(nlmp) |= 1860 (nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST)); 1861 else 1862 #endif 1863 promote = update_mode(nlmp, MODE(nlmp), nmode); 1864 1865 FLAGS(nlmp) |= flags; 1866 1867 /* 1868 * If we've been asked to establish a handle create one for this object. 1869 * Or, if this object has already been analyzed, but this reference 1870 * requires that the mode of the object be promoted, also create a 1871 * handle to propagate the new modes to all this objects dependencies. 1872 */ 1873 if (((FLAGS(nlmp) | flags) & FLG_RT_HANDLE) || (promote && 1874 (FLAGS(nlmp) & FLG_RT_ANALYZED))) { 1875 uint_t oflags, hflags = 0; 1876 1877 if (nmode & RTLD_PARENT) 1878 hflags |= GPH_PARENT; 1879 if (nmode & RTLD_FIRST) 1880 hflags |= GPH_FIRST; 1881 1882 /* 1883 * Now that a handle is being created, remove this state from 1884 * the object so that it doesn't mistakenly get inherited by 1885 * a dependency. 1886 */ 1887 oflags = FLAGS(nlmp); 1888 FLAGS(nlmp) &= ~FLG_RT_HANDLE; 1889 1890 if ((ghp = hdl_create(lml, nlmp, clmp, hflags)) == 0) 1891 return (0); 1892 1893 /* 1894 * Add any dependencies that are already loaded, to the handle. 1895 */ 1896 if (hdl_initialize(ghp, nlmp, clmp, nmode, promote) == 0) 1897 return (0); 1898 1899 if (hdl) 1900 *hdl = ghp; 1901 1902 /* 1903 * If we were asked to create a handle, we're done. Otherwise, 1904 * remove the handle. The handle was only used to establish this 1905 * objects dependencies and promote any modes, so we don't want 1906 * this handle preventing the objects deletion. Fall through to 1907 * carry out any group processing. 1908 */ 1909 if ((oflags | flags) & FLG_RT_HANDLE) 1910 return (1); 1911 1912 free_hdl(ghp); 1913 } 1914 1915 /* 1916 * If the caller isn't part of a group we're done. 1917 */ 1918 if (GROUPS(clmp) == 0) 1919 return (1); 1920 1921 /* 1922 * Determine if our caller is already associated with a handle, if so 1923 * we need to add this object to any handles that already exist. 1924 * Traverse the list of groups our caller is a member of and add this 1925 * new link-map to those groups. 1926 */ 1927 DBG_CALL(Dbg_file_hdl_title(DBG_DEP_ADD)); 1928 for (ALIST_TRAVERSE(GROUPS(clmp), off, ghpp)) { 1929 Aliste off1; 1930 Grp_desc *gdp; 1931 int exist; 1932 Rt_map **lmpp; 1933 Alist *lmalp = 0; 1934 1935 ghp = *ghpp; 1936 1937 /* 1938 * If the caller doesn't indicate that its dependencies should 1939 * be added to a handle, ignore it. This case identifies a 1940 * parent of a dlopen(RTLD_PARENT) request. 1941 */ 1942 for (ALIST_TRAVERSE(ghp->gh_depends, off1, gdp)) { 1943 if (gdp->gd_depend == clmp) 1944 break; 1945 } 1946 if ((gdp->gd_flags & GPD_ADDEPS) == 0) 1947 continue; 1948 1949 if ((exist = hdl_add(ghp, nlmp, 1950 (GPD_AVAIL | GPD_ADDEPS))) == 0) 1951 return (0); 1952 1953 /* 1954 * If this member already exists then its dependencies will 1955 * have already been processed. 1956 */ 1957 if (exist == ALE_EXISTS) 1958 continue; 1959 1960 /* 1961 * If the object we've added has just been opened, it will not 1962 * yet have been processed for its dependencies, these will be 1963 * added on later calls to load_one(). If it doesn't have any 1964 * dependencies we're also done. 1965 */ 1966 if (((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) || 1967 (DEPENDS(nlmp) == 0)) 1968 continue; 1969 1970 /* 1971 * Otherwise, this object exists and has dependencies, so add 1972 * all of its dependencies to the handle were operating on. 1973 */ 1974 if (alist_append(&lmalp, &nlmp, sizeof (Rt_map *), 1975 AL_CNT_DEPCLCT) == 0) 1976 return (0); 1977 1978 for (ALIST_TRAVERSE(lmalp, off1, lmpp)) { 1979 Rt_map * dlmp1 = *lmpp; 1980 Aliste off2; 1981 Bnd_desc ** bdpp; 1982 1983 /* 1984 * Add any dependencies of this dependency to the 1985 * dynamic dependency list so they can be further 1986 * processed. 1987 */ 1988 for (ALIST_TRAVERSE(DEPENDS(dlmp1), off2, bdpp)) { 1989 Bnd_desc * bdp = *bdpp; 1990 Rt_map * dlmp2 = bdp->b_depend; 1991 1992 if ((bdp->b_flags & BND_NEEDED) == 0) 1993 continue; 1994 1995 if (alist_test(&lmalp, dlmp2, sizeof (Rt_map *), 1996 AL_CNT_DEPCLCT) == 0) { 1997 free(lmalp); 1998 return (0); 1999 } 2000 } 2001 2002 if (nlmp == dlmp1) 2003 continue; 2004 2005 if ((exist = hdl_add(ghp, dlmp1, 2006 (GPD_AVAIL | GPD_ADDEPS))) != 0) { 2007 if (exist == ALE_CREATE) 2008 (void) update_mode(dlmp1, MODE(dlmp1), 2009 nmode); 2010 continue; 2011 } 2012 free(lmalp); 2013 return (0); 2014 } 2015 free(lmalp); 2016 } 2017 return (1); 2018 } 2019 2020 /* 2021 * The central routine for loading shared objects. Insures ldd() diagnostics, 2022 * handles and any other related additions are all done in one place. 2023 */ 2024 static Rt_map * 2025 _load_path(Lm_list *lml, Aliste lmco, const char *name, Rt_map *clmp, 2026 int nmode, uint_t flags, Grp_hdl ** hdl, Fdesc *nfdp, Rej_desc *rej) 2027 { 2028 Rt_map *nlmp; 2029 2030 if ((nmode & RTLD_NOLOAD) == 0) { 2031 /* 2032 * If this isn't a noload request attempt to load the file. 2033 */ 2034 if ((name = load_trace(lml, name, clmp)) == 0) 2035 return (0); 2036 2037 if ((nlmp = load_so(lml, lmco, name, clmp, flags, 2038 nfdp, rej)) == 0) 2039 return (0); 2040 2041 /* 2042 * If we've loaded a library which identifies itself as not 2043 * being dlopen()'able catch it here. Let non-dlopen()'able 2044 * objects through under RTLD_CONFGEN as they're only being 2045 * mapped to be dldump()'ed. 2046 */ 2047 if ((rtld_flags & RT_FL_APPLIC) && ((FLAGS(nlmp) & 2048 (FLG_RT_NOOPEN | FLG_RT_RELOCED)) == FLG_RT_NOOPEN) && 2049 ((nmode & RTLD_CONFGEN) == 0)) { 2050 Rej_desc _rej = { 0 }; 2051 2052 _rej.rej_name = name; 2053 _rej.rej_type = SGS_REJ_STR; 2054 _rej.rej_str = MSG_INTL(MSG_GEN_NOOPEN); 2055 DBG_CALL(Dbg_file_rejected(lml, &_rej)); 2056 rejection_inherit(rej, &_rej, nfdp); 2057 remove_so(lml, nlmp); 2058 return (0); 2059 } 2060 } else { 2061 /* 2062 * If it's a NOLOAD request - check to see if the object 2063 * has already been loaded. 2064 */ 2065 /* LINTED */ 2066 if ((nlmp = is_so_loaded(lml, name, 0)) || 2067 (nlmp = is_so_loaded(lml, name, 1))) { 2068 if ((lml->lm_flags & LML_FLG_TRC_VERBOSE) && 2069 ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) { 2070 (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, 2071 NAME(clmp)); 2072 if (*name == '/') 2073 (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), 2074 name, MSG_ORIG(MSG_STR_EMPTY), 2075 MSG_ORIG(MSG_STR_EMPTY)); 2076 else 2077 (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), 2078 name, NAME(nlmp), 2079 MSG_ORIG(MSG_STR_EMPTY), 2080 MSG_ORIG(MSG_STR_EMPTY)); 2081 } 2082 } else { 2083 Rej_desc _rej = { 0 }; 2084 2085 _rej.rej_name = name; 2086 _rej.rej_type = SGS_REJ_STR; 2087 _rej.rej_str = strerror(ENOENT); 2088 DBG_CALL(Dbg_file_rejected(lml, &_rej)); 2089 rejection_inherit(rej, &_rej, nfdp); 2090 return (0); 2091 } 2092 } 2093 2094 /* 2095 * Finish processing this loaded object. 2096 */ 2097 if (load_finish(lml, name, clmp, nmode, flags, hdl, nlmp) == 0) { 2098 FLAGS(nlmp) &= ~FLG_RT_NEWLOAD; 2099 2100 /* 2101 * If this object has already been analyzed, then it is in use, 2102 * so even though this operation has failed, it should not be 2103 * torn down. 2104 */ 2105 if ((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) 2106 remove_so(lml, nlmp); 2107 return (0); 2108 } 2109 2110 /* 2111 * If this object is new, and we're being audited, tell the audit 2112 * library of the file we've just opened. Note, if the new link-map 2113 * requires local auditing of its dependencies we also register its 2114 * opening. 2115 */ 2116 if (FLAGS(nlmp) & FLG_RT_NEWLOAD) { 2117 FLAGS(nlmp) &= ~FLG_RT_NEWLOAD; 2118 2119 if (((lml->lm_tflags | FLAGS1(clmp) | FLAGS1(nlmp)) & 2120 LML_TFLG_AUD_MASK) && (((lml->lm_flags | 2121 LIST(clmp)->lm_flags) & LML_FLG_NOAUDIT) == 0)) { 2122 if (audit_objopen(clmp, nlmp) == 0) { 2123 remove_so(lml, nlmp); 2124 return (0); 2125 } 2126 } 2127 } 2128 return (nlmp); 2129 } 2130 2131 Rt_map * 2132 load_path(Lm_list *lml, Aliste lmco, const char *name, Rt_map *clmp, 2133 int nmode, uint_t flags, Grp_hdl **hdl, Fdesc *cfdp, Rej_desc *rej) 2134 { 2135 Rt_map *lmp; 2136 Fdesc nfdp = { 0 }; 2137 2138 /* 2139 * If this path resulted from a $HWCAP specification, then the best 2140 * hardware capability object has already been establish, and is 2141 * available in the calling file descriptor. 2142 */ 2143 if (flags & FLG_RT_HWCAP) { 2144 if (cfdp->fd_lmp == 0) { 2145 /* 2146 * If this object hasn't yet been mapped, re-establish 2147 * the file descriptor structure to reflect this objects 2148 * original initial page mapping. Make sure any present 2149 * file descriptor mapping is removed before overwriting 2150 * the structure. 2151 */ 2152 #if defined(MAP_ALIGN) 2153 if (fmap->fm_maddr && 2154 ((fmap->fm_mflags & MAP_ALIGN) == 0)) 2155 #else 2156 if (fmap->fm_maddr) 2157 #endif 2158 (void) munmap(fmap->fm_maddr, fmap->fm_msize); 2159 } 2160 nfdp = *cfdp; 2161 *fmap = cfdp->fd_fmap; 2162 } 2163 2164 lmp = _load_path(lml, lmco, name, clmp, nmode, flags, hdl, &nfdp, rej); 2165 2166 /* 2167 * If this path originated from a $HWCAP specification, re-establish the 2168 * fdesc information. For single paged objects, such as filters, the 2169 * original mapping may have been sufficient to capture the file, thus 2170 * this mapping needs to be reset to insure it doesn't mistakenly get 2171 * unmapped as part of HWCAP cleanup. 2172 */ 2173 if (flags & FLG_RT_HWCAP) { 2174 cfdp->fd_fmap.fm_maddr = fmap->fm_maddr; 2175 cfdp->fd_fmap.fm_mflags = fmap->fm_mflags; 2176 cfdp->fd_fd = nfdp.fd_fd; 2177 } 2178 2179 return (lmp); 2180 } 2181 2182 /* 2183 * Load one object from a possible list of objects. Typically, for requests 2184 * such as NEEDED's, only one object is specified. However, this object could 2185 * be specified using $ISALIST or $HWCAP, in which case only the first object 2186 * that can be loaded is used (ie. the best). 2187 */ 2188 Rt_map * 2189 load_one(Lm_list *lml, Aliste lmco, Pnode *pnp, Rt_map *clmp, int mode, 2190 uint_t flags, Grp_hdl ** hdl) 2191 { 2192 Rej_desc rej = { 0 }; 2193 Pnode *tpnp; 2194 const char *name; 2195 Rt_map *tlmp; 2196 2197 for (tpnp = pnp; tpnp && tpnp->p_name; tpnp = tpnp->p_next) { 2198 /* 2199 * A Hardware capabilities requirement can itself expand into 2200 * a number of candidates. 2201 */ 2202 if (tpnp->p_orig & PN_TKN_HWCAP) { 2203 if ((tlmp = load_hwcap(lml, lmco, tpnp->p_name, clmp, 2204 mode, (flags | FLG_RT_HWCAP), hdl, &rej)) != 0) { 2205 remove_rej(&rej); 2206 return (tlmp); 2207 } 2208 } else { 2209 if ((tlmp = load_path(lml, lmco, tpnp->p_name, clmp, 2210 mode, flags, hdl, 0, &rej)) != 0) { 2211 remove_rej(&rej); 2212 return (tlmp); 2213 } 2214 } 2215 } 2216 2217 /* 2218 * If this pathname originated from an expanded token, use the original 2219 * for any diagnostic output. 2220 */ 2221 if ((name = pnp->p_oname) == 0) 2222 name = pnp->p_name; 2223 2224 file_notfound(lml, name, clmp, flags, &rej); 2225 remove_rej(&rej); 2226 return (0); 2227 } 2228 2229 /* 2230 * While processing direct or group bindings, determine whether the object to 2231 * which we've bound can be interposed upon. In this context, copy relocations 2232 * are a form of interposition. 2233 */ 2234 static Sym * 2235 lookup_sym_interpose(Slookup *slp, Rt_map **dlmp, uint_t *binfo, Lm_list * lml, 2236 Sym * sym) 2237 { 2238 Rt_map * lmp; 2239 Slookup sl; 2240 2241 /* 2242 * If we've bound to a copy relocation definition then we need to assign 2243 * this binding to the original copy reference. Fabricate an inter- 2244 * position diagnostic, as this is a legitimate form of interposition. 2245 */ 2246 if (FLAGS1(*dlmp) & FL1_RT_COPYTOOK) { 2247 Rel_copy *rcp; 2248 Aliste off; 2249 2250 for (ALIST_TRAVERSE(COPY(*dlmp), off, rcp)) { 2251 if ((sym == rcp->r_dsym) || (sym->st_value && 2252 (sym->st_value == rcp->r_dsym->st_value))) { 2253 *dlmp = rcp->r_rlmp; 2254 *binfo |= 2255 (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF); 2256 return (rcp->r_rsym); 2257 } 2258 } 2259 } 2260 2261 if ((lml->lm_flags & LML_FLG_INTRPOSE) == 0) 2262 return ((Sym *)0); 2263 2264 /* 2265 * Traverse the list of known interposers to determine whether any 2266 * offer the same symbol. Note, the head of the link-map could be 2267 * identified as an interposer. If it is, make sure we only look for 2268 * symbol definitions. Otherwise, skip the head of the link-map, so 2269 * that we don't bind to any .plt references, or copy-relocations 2270 * unintentionally. 2271 */ 2272 lmp = lml->lm_head; 2273 sl = *slp; 2274 if (((FLAGS(lmp) & FLG_RT_INTRPOSE) == 0) || (sl.sl_flags & LKUP_COPY)) 2275 lmp = (Rt_map *)NEXT(lmp); 2276 else 2277 sl.sl_flags &= ~LKUP_SPEC; 2278 2279 for (; lmp; lmp = (Rt_map *)NEXT(lmp)) { 2280 if (FLAGS(lmp) & FLG_RT_DELETE) 2281 continue; 2282 if ((FLAGS(lmp) & FLG_RT_INTRPOSE) == 0) 2283 break; 2284 2285 if (callable(lmp, *dlmp, 0)) { 2286 sl.sl_imap = lmp; 2287 if (sym = SYMINTP(lmp)(&sl, dlmp, binfo)) { 2288 *binfo |= DBG_BINFO_INTERPOSE; 2289 return (sym); 2290 } 2291 } 2292 } 2293 return ((Sym *)0); 2294 } 2295 2296 /* 2297 * If an object specifies direct bindings (it contains a syminfo structure 2298 * describing where each binding was established during link-editing, and the 2299 * object was built -Bdirect), then look for the symbol in the specific object. 2300 */ 2301 static Sym * 2302 lookup_sym_direct(Slookup *slp, Rt_map **dlmp, uint_t *binfo, Syminfo *sip, 2303 Rt_map *lmp) 2304 { 2305 Rt_map *clmp = slp->sl_cmap; 2306 Sym *sym; 2307 Slookup sl; 2308 2309 /* 2310 * If a direct binding resolves to the definition of a copy relocated 2311 * variable, it must be redirected to the copy (in the executable) that 2312 * will eventually be made. Typically, this redirection occurs in 2313 * lookup_sym_interpose(). But, there's an edge condition. If a 2314 * directly bound executable contains pic code, there may be a 2315 * reference to a definition that will eventually have a copy made. 2316 * However, this copy relocation may not yet have occurred, because 2317 * the relocation making this reference comes before the relocation 2318 * that will create the copy. 2319 * Under direct bindings, the syminfo indicates that a copy will be 2320 * taken (SYMINFO_FLG_COPY). This can only be set in an executable. 2321 * Thus, the caller must be the executable, so bind to the destination 2322 * of the copy within the executable. 2323 */ 2324 if (((slp->sl_flags & LKUP_COPY) == 0) && 2325 (sip->si_flags & SYMINFO_FLG_COPY)) { 2326 2327 slp->sl_imap = LIST(clmp)->lm_head; 2328 if (sym = SYMINTP(clmp)(slp, dlmp, binfo)) 2329 *binfo |= (DBG_BINFO_DIRECT | DBG_BINFO_COPYREF); 2330 return (sym); 2331 } 2332 2333 /* 2334 * If we need to direct bind to our parent start looking in each caller 2335 * link map. 2336 */ 2337 sl = *slp; 2338 sl.sl_flags |= LKUP_DIRECT; 2339 sym = 0; 2340 2341 if (sip->si_boundto == SYMINFO_BT_PARENT) { 2342 Aliste off; 2343 Bnd_desc ** bdpp; 2344 2345 for (ALIST_TRAVERSE(CALLERS(clmp), off, bdpp)) { 2346 sl.sl_imap = lmp = (*bdpp)->b_caller; 2347 if ((sym = SYMINTP(lmp)(&sl, dlmp, binfo)) != 0) 2348 break; 2349 } 2350 } else { 2351 /* 2352 * If we need to direct bind to anything else look in the 2353 * link map associated with this symbol reference. 2354 */ 2355 if (sip->si_boundto == SYMINFO_BT_SELF) 2356 sl.sl_imap = lmp = clmp; 2357 else 2358 sl.sl_imap = lmp; 2359 2360 if (lmp) 2361 sym = SYMINTP(lmp)(&sl, dlmp, binfo); 2362 } 2363 2364 if (sym) 2365 *binfo |= DBG_BINFO_DIRECT; 2366 2367 /* 2368 * If we've bound to an object, determine whether that object can be 2369 * interposed upon for this symbol. 2370 */ 2371 if (sym && (LIST(*dlmp)->lm_head != *dlmp) && 2372 (LIST(*dlmp) == LIST(clmp))) { 2373 Sym * isym; 2374 2375 if ((isym = lookup_sym_interpose(slp, dlmp, binfo, 2376 LIST(*dlmp), sym)) != 0) 2377 return (isym); 2378 } 2379 2380 return (sym); 2381 } 2382 2383 static Sym * 2384 _lookup_sym(Rt_map *ilmp, Slookup *slp, Rt_map **dlmp, uint_t *binfo, 2385 Aliste off) 2386 { 2387 Rt_map *lmp; 2388 2389 /* 2390 * Copy relocations should start their search after the head of the 2391 * main link-map control list. 2392 */ 2393 if ((off == ALO_DATA) && (slp->sl_flags & LKUP_COPY) && ilmp) 2394 lmp = (Rt_map *)NEXT(ilmp); 2395 else 2396 lmp = ilmp; 2397 2398 for (; lmp; lmp = (Rt_map *)NEXT(lmp)) { 2399 if (callable(slp->sl_cmap, lmp, 0)) { 2400 Sym *sym; 2401 2402 slp->sl_imap = lmp; 2403 if ((sym = SYMINTP(lmp)(slp, dlmp, binfo)) != 0) 2404 return (sym); 2405 } 2406 } 2407 return (0); 2408 } 2409 2410 static Sym * 2411 _lazy_find_sym(Rt_map *ilmp, Slookup *slp, Rt_map **dlmp, uint_t *binfo) 2412 { 2413 Rt_map *lmp; 2414 2415 for (lmp = ilmp; lmp; lmp = (Rt_map *)NEXT(lmp)) { 2416 if (LAZY(lmp) == 0) 2417 continue; 2418 if (callable(slp->sl_cmap, lmp, 0)) { 2419 Sym *sym; 2420 2421 slp->sl_imap = lmp; 2422 if ((sym = elf_lazy_find_sym(slp, dlmp, binfo)) != 0) 2423 return (sym); 2424 } 2425 } 2426 return (0); 2427 } 2428 2429 /* 2430 * Symbol lookup routine. Takes an ELF symbol name, and a list of link maps to 2431 * search (if the flag indicates LKUP_FIRST only the first link map of the list 2432 * is searched ie. we've been called from dlsym()). 2433 * If successful, return a pointer to the symbol table entry and a pointer to 2434 * the link map of the enclosing object. Else return a null pointer. 2435 * 2436 * To improve elf performance, we first compute the elf hash value and pass 2437 * it to each find_sym() routine. The elf function will use this value to 2438 * locate the symbol, the a.out function will simply ignore it. 2439 */ 2440 Sym * 2441 lookup_sym(Slookup *slp, Rt_map **dlmp, uint_t *binfo) 2442 { 2443 const char *name = slp->sl_name; 2444 Rt_map *clmp = slp->sl_cmap; 2445 Rt_map *ilmp = slp->sl_imap, *lmp; 2446 uint_t flags = slp->sl_flags; 2447 ulong_t rsymndx; 2448 Sym *sym = 0; 2449 Syminfo *sip; 2450 Slookup sl; 2451 2452 if (slp->sl_hash == 0) 2453 slp->sl_hash = elf_hash(name); 2454 *binfo = 0; 2455 2456 /* 2457 * Search the initial link map for the required symbol (this category is 2458 * selected by dlsym(), where individual link maps are searched for a 2459 * required symbol. Therefore, we know we have permission to look at 2460 * the link map). 2461 */ 2462 if (flags & LKUP_FIRST) 2463 return (SYMINTP(ilmp)(slp, dlmp, binfo)); 2464 2465 /* 2466 * Determine whether this lookup can be satisfied by an objects direct, 2467 * or lazy binding information. This is triggered by a relocation from 2468 * the object (hence rsymndx is set). 2469 */ 2470 if (((rsymndx = slp->sl_rsymndx) != 0) && 2471 ((sip = SYMINFO(clmp)) != 0)) { 2472 2473 /* 2474 * Find the corresponding Syminfo entry for the original 2475 * referencing symbol. 2476 */ 2477 /* LINTED */ 2478 sip = (Syminfo *)((char *)sip + (rsymndx * SYMINENT(clmp))); 2479 2480 /* 2481 * If the symbol information indicates a direct binding, 2482 * determine the link map that is required to satisfy the 2483 * binding. Note, if the dependency can not be found, but a 2484 * direct binding isn't required, we will still fall through 2485 * to perform any default symbol search. 2486 */ 2487 if (sip->si_flags & SYMINFO_FLG_DIRECT) { 2488 uint_t bound = sip->si_boundto; 2489 2490 lmp = 0; 2491 if (bound < SYMINFO_BT_LOWRESERVE) 2492 lmp = elf_lazy_load(clmp, bound, name); 2493 2494 /* 2495 * If direct bindings have been disabled, and this isn't 2496 * a translator, skip any direct binding now that we've 2497 * insured the resolving object has been loaded. 2498 * 2499 * If we need to direct bind to anything, we look in 2500 * ourselves, our parent, or in the link map we've just 2501 * loaded. Otherwise, even though we may have lazily 2502 * loaded an object we still continue to search for 2503 * symbols from the head of the link map list. 2504 */ 2505 if (((FLAGS(clmp) & FLG_RT_TRANS) || 2506 (!(LIST(clmp)->lm_tflags & LML_TFLG_NODIRECT))) && 2507 ((FLAGS(clmp) & FLG_RT_DIRECT) || 2508 (sip->si_flags & SYMINFO_FLG_DIRECTBIND))) { 2509 sym = lookup_sym_direct(slp, dlmp, binfo, 2510 sip, lmp); 2511 2512 /* 2513 * If this direct binding has been disabled 2514 * (presumably because the symbol definition has 2515 * been changed since the referring object was 2516 * built), fall back to a standard symbol 2517 * search. 2518 */ 2519 if ((*binfo & BINFO_DIRECTDIS) == 0) 2520 return (sym); 2521 } 2522 } 2523 } 2524 2525 sl = *slp; 2526 2527 /* 2528 * If the referencing object has the DF_SYMBOLIC flag set, look in the 2529 * referencing object for the symbol first. Failing that, fall back to 2530 * our generic search. 2531 */ 2532 if (FLAGS1(clmp) & FL1_RT_SYMBOLIC) { 2533 sl.sl_imap = clmp; 2534 if (sym = SYMINTP(clmp)(&sl, dlmp, binfo)) 2535 return (sym); 2536 } 2537 2538 /* 2539 * If this lookup originates from a standard relocation, then traverse 2540 * all link-map lists inspecting any object that is available to this 2541 * caller. Otherwise, traverse the link-map list associate with the 2542 * caller. 2543 */ 2544 if (flags & LKUP_ALLCNTLIST) { 2545 Aliste off; 2546 Lm_cntl *lmc; 2547 2548 sym = 0; 2549 2550 for (ALIST_TRAVERSE(LIST(clmp)->lm_lists, off, lmc)) { 2551 if ((sym = _lookup_sym(lmc->lc_head, &sl, dlmp, 2552 binfo, off)) != 0) 2553 break; 2554 } 2555 } else 2556 sym = _lookup_sym(ilmp, &sl, dlmp, binfo, ALO_DATA); 2557 2558 /* 2559 * To allow transitioning into a world of lazy loading dependencies see 2560 * if this link map contains objects that have lazy dependencies still 2561 * outstanding. If so, and we haven't been able to locate a non-weak 2562 * symbol reference, start bringing in any lazy dependencies to see if 2563 * the reference can be satisfied. Use of dlsym(RTLD_PROBE) sets the 2564 * LKUP_NOFALBACK flag, and this flag disables this fall back. 2565 */ 2566 if ((sym == 0) && ((sl.sl_flags & LKUP_NOFALBACK) == 0)) { 2567 if ((lmp = ilmp) == 0) 2568 lmp = LIST(clmp)->lm_head; 2569 if ((flags & LKUP_WEAK) || (LIST(lmp)->lm_lazy == 0)) 2570 return ((Sym *)0); 2571 2572 DBG_CALL(Dbg_syms_lazy_rescan(LIST(clmp), name)); 2573 2574 /* 2575 * If this request originated from a dlsym(RTLD_NEXT) then start 2576 * looking for dependencies from the caller, otherwise use the 2577 * initial link-map. 2578 */ 2579 if (flags & LKUP_NEXT) 2580 sym = _lazy_find_sym(clmp, &sl, dlmp, binfo); 2581 else { 2582 Aliste off; 2583 Lm_cntl *lmc; 2584 2585 for (ALIST_TRAVERSE(LIST(clmp)->lm_lists, off, lmc)) { 2586 sl.sl_flags |= LKUP_NOFALBACK; 2587 if ((sym = _lazy_find_sym(lmc->lc_head, &sl, 2588 dlmp, binfo)) != 0) 2589 break; 2590 } 2591 } 2592 } 2593 2594 /* 2595 * If the caller is restricted to a symbol search within its group, 2596 * determine if it is necessary to follow a binding from outside of 2597 * the group. 2598 */ 2599 if (sym && ((MODE(clmp) & (RTLD_GROUP | RTLD_WORLD)) == RTLD_GROUP)) { 2600 Sym * isym; 2601 2602 if ((isym = lookup_sym_interpose(slp, dlmp, binfo, LIST(*dlmp), 2603 sym)) != 0) 2604 return (isym); 2605 } 2606 return (sym); 2607 } 2608 2609 /* 2610 * Associate a binding descriptor with a caller and its dependency, or update 2611 * an existing descriptor. 2612 */ 2613 int 2614 bind_one(Rt_map *clmp, Rt_map *dlmp, uint_t flags) 2615 { 2616 Bnd_desc **bdpp, *bdp; 2617 Aliste off; 2618 int found = ALE_CREATE; 2619 2620 /* 2621 * Determine whether a binding descriptor already exists between the 2622 * two objects. 2623 */ 2624 for (ALIST_TRAVERSE(DEPENDS(clmp), off, bdpp)) { 2625 bdp = *bdpp; 2626 2627 if (bdp->b_depend == dlmp) { 2628 found = ALE_EXISTS; 2629 break; 2630 } 2631 } 2632 2633 if (found == ALE_CREATE) { 2634 /* 2635 * Create a new binding descriptor. 2636 */ 2637 if ((bdp = malloc(sizeof (Bnd_desc))) == 0) 2638 return (0); 2639 2640 bdp->b_caller = clmp; 2641 bdp->b_depend = dlmp; 2642 bdp->b_flags = 0; 2643 2644 /* 2645 * Append the binding descriptor to the caller and the 2646 * dependency. 2647 */ 2648 if (alist_append(&DEPENDS(clmp), &bdp, 2649 sizeof (Bnd_desc *), AL_CNT_DEPENDS) == 0) 2650 return (0); 2651 2652 if (alist_append(&CALLERS(dlmp), &bdp, 2653 sizeof (Bnd_desc *), AL_CNT_CALLERS) == 0) 2654 return (0); 2655 } 2656 2657 if ((found == ALE_CREATE) || ((bdp->b_flags & flags) != flags)) { 2658 bdp->b_flags |= flags; 2659 2660 if (flags & BND_REFER) 2661 FLAGS1(dlmp) |= FL1_RT_USED; 2662 2663 DBG_CALL(Dbg_file_bind_entry(LIST(clmp), bdp)); 2664 } 2665 return (found); 2666 } 2667 2668 /* 2669 * Cleanup after relocation processing. 2670 */ 2671 int 2672 relocate_finish(Rt_map *lmp, Alist *bound, int textrel, int ret) 2673 { 2674 DBG_CALL(Dbg_reloc_run(lmp, 0, ret, DBG_REL_FINISH)); 2675 2676 /* 2677 * Establish bindings to all objects that have been bound to. 2678 */ 2679 if (bound) { 2680 Aliste off; 2681 Rt_map **lmpp; 2682 2683 if (ret) { 2684 for (ALIST_TRAVERSE(bound, off, lmpp)) { 2685 if (bind_one(lmp, *lmpp, BND_REFER) == 0) { 2686 ret = 0; 2687 break; 2688 } 2689 } 2690 } 2691 free(bound); 2692 } 2693 2694 /* 2695 * If we write enabled the text segment to perform these relocations 2696 * re-protect by disabling writes. 2697 */ 2698 if (textrel) 2699 (void) LM_SET_PROT(lmp)(lmp, 0); 2700 2701 return (ret); 2702 } 2703