17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 55aefb655Srie * Common Development and Distribution License (the "License"). 65aefb655Srie * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21fb1354edSrie 227c478bd9Sstevel@tonic-gate /* 23f441771bSRod Evans * Copyright (c) 1990, 2010, Oracle and/or its affiliates. All rights reserved. 247c478bd9Sstevel@tonic-gate */ 257c478bd9Sstevel@tonic-gate 267257d1b4Sraf /* 277257d1b4Sraf * Copyright (c) 1988 AT&T 287257d1b4Sraf * All Rights Reserved 297257d1b4Sraf */ 307257d1b4Sraf 317c478bd9Sstevel@tonic-gate #include <string.h> 327c478bd9Sstevel@tonic-gate #include <stdio.h> 337c478bd9Sstevel@tonic-gate #include <unistd.h> 347c478bd9Sstevel@tonic-gate #include <sys/stat.h> 357c478bd9Sstevel@tonic-gate #include <sys/mman.h> 3656deab07SRod Evans #include <sys/debug.h> 377c478bd9Sstevel@tonic-gate #include <fcntl.h> 387c478bd9Sstevel@tonic-gate #include <limits.h> 397c478bd9Sstevel@tonic-gate #include <dlfcn.h> 407c478bd9Sstevel@tonic-gate #include <errno.h> 417c478bd9Sstevel@tonic-gate #include <link.h> 425aefb655Srie #include <debug.h> 435aefb655Srie #include <conv.h> 447c478bd9Sstevel@tonic-gate #include "_rtld.h" 457c478bd9Sstevel@tonic-gate #include "_audit.h" 467c478bd9Sstevel@tonic-gate #include "_elf.h" 4756deab07SRod Evans #include "_a.out.h" 48f441771bSRod Evans #include "_inline_gen.h" 497c478bd9Sstevel@tonic-gate #include "msg.h" 507c478bd9Sstevel@tonic-gate 517c478bd9Sstevel@tonic-gate /* 527c478bd9Sstevel@tonic-gate * If a load filter flag is in effect, and this object is a filter, trigger the 537c478bd9Sstevel@tonic-gate * loading of all its filtees. The load filter flag is in effect when creating 547c478bd9Sstevel@tonic-gate * configuration files, or when under the control of ldd(1), or the LD_LOADFLTR 557c478bd9Sstevel@tonic-gate * environment variable is set, or this object was built with the -zloadfltr 567c478bd9Sstevel@tonic-gate * flag. Otherwise, filtee loading is deferred until triggered by a relocation. 577c478bd9Sstevel@tonic-gate */ 587c478bd9Sstevel@tonic-gate static void 599aa23310Srie load_filtees(Rt_map *lmp, int *in_nfavl) 607c478bd9Sstevel@tonic-gate { 617c478bd9Sstevel@tonic-gate if ((FLAGS1(lmp) & MSK_RT_FILTER) && 627c478bd9Sstevel@tonic-gate ((FLAGS(lmp) & FLG_RT_LOADFLTR) || 637c478bd9Sstevel@tonic-gate (LIST(lmp)->lm_tflags & LML_TFLG_LOADFLTR))) { 647c478bd9Sstevel@tonic-gate Dyninfo *dip = DYNINFO(lmp); 657c478bd9Sstevel@tonic-gate uint_t cnt, max = DYNINFOCNT(lmp); 667c478bd9Sstevel@tonic-gate Slookup sl; 677c478bd9Sstevel@tonic-gate 6875e7992aSrie /* 6908278a5eSRod Evans * Initialize the symbol lookup data structure. Note, no symbol 7008278a5eSRod Evans * name is supplied. This NULL name causes filters to be loaded 7108278a5eSRod Evans * but no symbol to be searched for. 7275e7992aSrie */ 7375e7992aSrie SLOOKUP_INIT(sl, 0, lmp, lmp, ld_entry_cnt, 0, 0, 0, 0, 0); 747c478bd9Sstevel@tonic-gate 757c478bd9Sstevel@tonic-gate for (cnt = 0; cnt < max; cnt++, dip++) { 7608278a5eSRod Evans uint_t binfo; 7708278a5eSRod Evans Sresult sr; 7808278a5eSRod Evans 7908278a5eSRod Evans SRESULT_INIT(sr, NULL); 8008278a5eSRod Evans 817c478bd9Sstevel@tonic-gate if (((dip->di_flags & MSK_DI_FILTER) == 0) || 827c478bd9Sstevel@tonic-gate ((dip->di_flags & FLG_DI_AUXFLTR) && 837c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_NOAUXFLTR))) 847c478bd9Sstevel@tonic-gate continue; 8508278a5eSRod Evans (void) elf_lookup_filtee(&sl, &sr, &binfo, cnt, 8608278a5eSRod Evans in_nfavl); 877c478bd9Sstevel@tonic-gate } 887c478bd9Sstevel@tonic-gate } 897c478bd9Sstevel@tonic-gate } 907c478bd9Sstevel@tonic-gate 917c478bd9Sstevel@tonic-gate /* 927c478bd9Sstevel@tonic-gate * Analyze one or more link-maps of a link map control list. This routine is 937c478bd9Sstevel@tonic-gate * called at startup to continue the processing of the main executable. It is 947c478bd9Sstevel@tonic-gate * also called each time a new set of objects are loaded, ie. from filters, 957c478bd9Sstevel@tonic-gate * lazy-loaded objects, or dlopen(). 967c478bd9Sstevel@tonic-gate * 977c478bd9Sstevel@tonic-gate * In each instance we traverse the link-map control list starting with the 987c478bd9Sstevel@tonic-gate * initial object. As dependencies are analyzed they are added to the link-map 997c478bd9Sstevel@tonic-gate * control list. Thus the list grows as we traverse it - this results in the 1007c478bd9Sstevel@tonic-gate * breadth first ordering of all needed objects. 10156deab07SRod Evans * 10256deab07SRod Evans * Return the initial link-map from which analysis starts for relocate_lmc(). 1037c478bd9Sstevel@tonic-gate */ 10456deab07SRod Evans Rt_map * 105*2020b2b6SRod Evans analyze_lmc(Lm_list *lml, Aliste nlmco, Rt_map *nlmp, Rt_map *clmp, 106*2020b2b6SRod Evans int *in_nfavl) 1077c478bd9Sstevel@tonic-gate { 10856deab07SRod Evans Rt_map *lmp; 1097c478bd9Sstevel@tonic-gate Lm_cntl *nlmc; 1107c478bd9Sstevel@tonic-gate 1117c478bd9Sstevel@tonic-gate /* 1127c478bd9Sstevel@tonic-gate * If this link-map control list is being analyzed, return. The object 1137c478bd9Sstevel@tonic-gate * that has just been added will be picked up by the existing analysis 1147c478bd9Sstevel@tonic-gate * thread. Note, this is only really meaningful during process init- 1157c478bd9Sstevel@tonic-gate * ialization, as objects are added to the main link-map control list. 1167c478bd9Sstevel@tonic-gate * Following this initialization, each family of objects that are loaded 1177c478bd9Sstevel@tonic-gate * are added to a new link-map control list. 1187c478bd9Sstevel@tonic-gate */ 1197c478bd9Sstevel@tonic-gate /* LINTED */ 120cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 1217c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_ANALYZING) 12256deab07SRod Evans return (nlmp); 1237c478bd9Sstevel@tonic-gate 1247c478bd9Sstevel@tonic-gate /* 1257c478bd9Sstevel@tonic-gate * If this object doesn't belong to the present link-map control list 1267c478bd9Sstevel@tonic-gate * then it must already have been analyzed, or it is in the process of 1277c478bd9Sstevel@tonic-gate * being analyzed prior to us recursing into this analysis. In either 1287c478bd9Sstevel@tonic-gate * case, ignore the object as it's already being taken care of. 1297c478bd9Sstevel@tonic-gate */ 1307c478bd9Sstevel@tonic-gate if (nlmco != CNTL(nlmp)) 13156deab07SRod Evans return (nlmp); 1327c478bd9Sstevel@tonic-gate 1337c478bd9Sstevel@tonic-gate nlmc->lc_flags |= LMC_FLG_ANALYZING; 1347c478bd9Sstevel@tonic-gate 13556deab07SRod Evans for (lmp = nlmp; lmp; lmp = NEXT_RT_MAP(lmp)) { 1367c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & 1377c478bd9Sstevel@tonic-gate (FLG_RT_ANALZING | FLG_RT_ANALYZED | FLG_RT_DELETE)) 1387c478bd9Sstevel@tonic-gate continue; 1397c478bd9Sstevel@tonic-gate 1407c478bd9Sstevel@tonic-gate /* 1417c478bd9Sstevel@tonic-gate * Indicate that analyzing is under way. 1427c478bd9Sstevel@tonic-gate */ 1437c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_ANALZING; 1447c478bd9Sstevel@tonic-gate 1457c478bd9Sstevel@tonic-gate /* 1467c478bd9Sstevel@tonic-gate * If this link map represents a relocatable object, then we 1477c478bd9Sstevel@tonic-gate * need to finish the link-editing of the object at this point. 1487c478bd9Sstevel@tonic-gate */ 1497c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & FLG_RT_OBJECT) { 15056deab07SRod Evans Rt_map *olmp; 15156deab07SRod Evans 152*2020b2b6SRod Evans if ((olmp = elf_obj_fini(lml, lmp, clmp, 153*2020b2b6SRod Evans in_nfavl)) == NULL) { 1547c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE) 1557c478bd9Sstevel@tonic-gate continue; 15656deab07SRod Evans nlmp = NULL; 1577c478bd9Sstevel@tonic-gate break; 1587c478bd9Sstevel@tonic-gate } 15956deab07SRod Evans 16056deab07SRod Evans /* 16156deab07SRod Evans * The original link-map that captured a relocatable 16256deab07SRod Evans * object is a temporary link-map, that basically acts 16356deab07SRod Evans * as a place holder in the link-map list. On 16456deab07SRod Evans * completion of relocatable object processing, a new 16556deab07SRod Evans * link-map is created, and switched with the place 16656deab07SRod Evans * holder. Therefore, reassign both the present 16756deab07SRod Evans * link-map pointer and the return link-map pointer. 16856deab07SRod Evans * The former resets this routines link-map processing, 16956deab07SRod Evans * while the latter provides for later functions, like 17056deab07SRod Evans * relocate_lmc(), to start processing from this new 17156deab07SRod Evans * link-map. 17256deab07SRod Evans */ 17356deab07SRod Evans if (nlmp == lmp) 17456deab07SRod Evans nlmp = olmp; 17556deab07SRod Evans lmp = olmp; 1767c478bd9Sstevel@tonic-gate } 1777c478bd9Sstevel@tonic-gate 1787c478bd9Sstevel@tonic-gate DBG_CALL(Dbg_file_analyze(lmp)); 1797c478bd9Sstevel@tonic-gate 1807c478bd9Sstevel@tonic-gate /* 1817c478bd9Sstevel@tonic-gate * Establish any dependencies this object requires. 1827c478bd9Sstevel@tonic-gate */ 1839aa23310Srie if (LM_NEEDED(lmp)(lml, nlmco, lmp, in_nfavl) == 0) { 1847c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE) 1857c478bd9Sstevel@tonic-gate continue; 18656deab07SRod Evans nlmp = NULL; 1877c478bd9Sstevel@tonic-gate break; 1887c478bd9Sstevel@tonic-gate } 1897c478bd9Sstevel@tonic-gate 1907c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_ANALZING; 1917c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_ANALYZED; 1927c478bd9Sstevel@tonic-gate 1937c478bd9Sstevel@tonic-gate /* 1947c478bd9Sstevel@tonic-gate * If we're building a configuration file, determine if this 1957c478bd9Sstevel@tonic-gate * object is a filter and if so load its filtees. This 1967c478bd9Sstevel@tonic-gate * traversal is only necessary for crle(1), as typical use of 1977c478bd9Sstevel@tonic-gate * an object will load filters as part of relocation processing. 1987c478bd9Sstevel@tonic-gate */ 1997c478bd9Sstevel@tonic-gate if (MODE(nlmp) & RTLD_CONFGEN) 2009aa23310Srie load_filtees(lmp, in_nfavl); 2017c478bd9Sstevel@tonic-gate 2027c478bd9Sstevel@tonic-gate /* 2037c478bd9Sstevel@tonic-gate * If an interposer has been added, it will have been inserted 2047c478bd9Sstevel@tonic-gate * in the link-map before the link we're presently analyzing. 2057c478bd9Sstevel@tonic-gate * Break out of this analysis loop and return to the head of 2067c478bd9Sstevel@tonic-gate * the link-map control list to analyze the interposer. Note 2077c478bd9Sstevel@tonic-gate * that this rescan preserves the breadth first loading of 2087c478bd9Sstevel@tonic-gate * dependencies. 2097c478bd9Sstevel@tonic-gate */ 21024a6229eSrie /* LINTED */ 211cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 2127c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_REANALYZE) { 2137c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_REANALYZE; 2147c478bd9Sstevel@tonic-gate lmp = nlmc->lc_head; 2157c478bd9Sstevel@tonic-gate } 2167c478bd9Sstevel@tonic-gate } 2177c478bd9Sstevel@tonic-gate 21824a6229eSrie /* LINTED */ 219cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 2207c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_ANALYZING; 2217c478bd9Sstevel@tonic-gate 22256deab07SRod Evans return (nlmp); 2237c478bd9Sstevel@tonic-gate } 2247c478bd9Sstevel@tonic-gate 2257c478bd9Sstevel@tonic-gate /* 226466e2a62Srie * Determine whether a symbol represents zero, .bss, bits. Most commonly this 227466e2a62Srie * function is used to determine whether the data for a copy relocation refers 228466e2a62Srie * to initialized data or .bss. If the data definition is within .bss, then the 229466e2a62Srie * data is zero filled, and as the copy destination within the executable is 230466e2a62Srie * .bss, we can skip copying zero's to zero's. 231466e2a62Srie * 232466e2a62Srie * However, if the defining object has MOVE data, it's .bss might contain 233466e2a62Srie * non-zero data, in which case copy the definition regardless. 234466e2a62Srie * 235466e2a62Srie * For backward compatibility copy relocation processing, this routine can be 236466e2a62Srie * used to determine precisely if a copy destination is a move record recipient. 2377c478bd9Sstevel@tonic-gate */ 2387c478bd9Sstevel@tonic-gate static int 239466e2a62Srie are_bits_zero(Rt_map *dlmp, Sym *dsym, int dest) 2407c478bd9Sstevel@tonic-gate { 24156deab07SRod Evans mmapobj_result_t *mpp; 2427c478bd9Sstevel@tonic-gate caddr_t daddr = (caddr_t)dsym->st_value; 2437c478bd9Sstevel@tonic-gate 2447c478bd9Sstevel@tonic-gate if ((FLAGS(dlmp) & FLG_RT_FIXED) == 0) 2457c478bd9Sstevel@tonic-gate daddr += ADDR(dlmp); 2467c478bd9Sstevel@tonic-gate 247466e2a62Srie /* 248466e2a62Srie * Determine the segment that contains the copy definition. Given that 249466e2a62Srie * the copy relocation records have already been captured and verified, 250466e2a62Srie * a segment must be found (but we add an escape clause never the less). 251466e2a62Srie */ 25256deab07SRod Evans if ((mpp = find_segment(daddr, dlmp)) == NULL) 2537c478bd9Sstevel@tonic-gate return (1); 254466e2a62Srie 255466e2a62Srie /* 256466e2a62Srie * If the definition is not within .bss, indicate this is not zero data. 257466e2a62Srie */ 25856deab07SRod Evans if (daddr < (mpp->mr_addr + mpp->mr_offset + mpp->mr_fsize)) 2597c478bd9Sstevel@tonic-gate return (0); 260466e2a62Srie 261466e2a62Srie /* 262466e2a62Srie * If the definition is within .bss, make sure the definition isn't the 263466e2a62Srie * recipient of a move record. Note, we don't precisely analyze whether 264466e2a62Srie * the address is a move record recipient, as the infrastructure to 265466e2a62Srie * prepare for, and carry out this analysis, is probably more costly 266466e2a62Srie * than just copying the bytes regardless. 267466e2a62Srie */ 268466e2a62Srie if ((FLAGS(dlmp) & FLG_RT_MOVE) == 0) 269466e2a62Srie return (1); 270466e2a62Srie 271466e2a62Srie /* 272466e2a62Srie * However, for backward compatibility copy relocation processing, we 273466e2a62Srie * can afford to work a little harder. Here, determine precisely 274466e2a62Srie * whether the destination in the executable is a move record recipient. 275466e2a62Srie * See comments in lookup_sym_interpose(), below. 276466e2a62Srie */ 277466e2a62Srie if (dest && is_move_data(daddr)) 278466e2a62Srie return (0); 279466e2a62Srie 280466e2a62Srie return (1); 2817c478bd9Sstevel@tonic-gate } 2827c478bd9Sstevel@tonic-gate 2837c478bd9Sstevel@tonic-gate /* 2847c478bd9Sstevel@tonic-gate * Relocate an individual object. 2857c478bd9Sstevel@tonic-gate */ 2867c478bd9Sstevel@tonic-gate static int 2879aa23310Srie relocate_so(Lm_list *lml, Rt_map *lmp, int *relocated, int now, int *in_nfavl) 2887c478bd9Sstevel@tonic-gate { 28956deab07SRod Evans APlist *textrel = NULL; 29056deab07SRod Evans int ret = 1; 29156deab07SRod Evans 2927c478bd9Sstevel@tonic-gate /* 2937c478bd9Sstevel@tonic-gate * If we're running under ldd(1), and haven't been asked to trace any 2947c478bd9Sstevel@tonic-gate * warnings, skip any actual relocation processing. 2957c478bd9Sstevel@tonic-gate */ 2967c478bd9Sstevel@tonic-gate if (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) || 2977c478bd9Sstevel@tonic-gate (lml->lm_flags & LML_FLG_TRC_WARN)) { 2987c478bd9Sstevel@tonic-gate 2997c478bd9Sstevel@tonic-gate if (relocated) 3007c478bd9Sstevel@tonic-gate (*relocated)++; 3017c478bd9Sstevel@tonic-gate 30256deab07SRod Evans if ((LM_RELOC(lmp)(lmp, now, in_nfavl, &textrel) == 0) && 3037c478bd9Sstevel@tonic-gate ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0)) 30456deab07SRod Evans ret = 0; 30556deab07SRod Evans 30656deab07SRod Evans /* 30756deab07SRod Evans * Finally process any move data. Note, this is carried out 30856deab07SRod Evans * with ldd(1) under relocation processing too, as it can flush 30956deab07SRod Evans * out move errors, and enables lari(1) to provide a true 31056deab07SRod Evans * representation of the runtime bindings. 31156deab07SRod Evans */ 31256deab07SRod Evans if ((FLAGS(lmp) & FLG_RT_MOVE) && 31356deab07SRod Evans (move_data(lmp, &textrel) == 0) && 31456deab07SRod Evans ((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0)) 31556deab07SRod Evans ret = 0; 3167c478bd9Sstevel@tonic-gate } 31756deab07SRod Evans 31856deab07SRod Evans /* 31956deab07SRod Evans * If a text segment was write enabled to perform any relocations or 32056deab07SRod Evans * move records, then re-protect the segment by disabling writes. 32156deab07SRod Evans */ 32256deab07SRod Evans if (textrel) { 32356deab07SRod Evans mmapobj_result_t *mpp; 32456deab07SRod Evans Aliste idx; 32556deab07SRod Evans 32656deab07SRod Evans for (APLIST_TRAVERSE(textrel, idx, mpp)) 32756deab07SRod Evans (void) set_prot(lmp, mpp, 0); 32856deab07SRod Evans free(textrel); 32956deab07SRod Evans } 33056deab07SRod Evans 33156deab07SRod Evans return (ret); 3327c478bd9Sstevel@tonic-gate } 3337c478bd9Sstevel@tonic-gate 3347c478bd9Sstevel@tonic-gate /* 3357c478bd9Sstevel@tonic-gate * Relocate the objects on a link-map control list. 3367c478bd9Sstevel@tonic-gate */ 3377c478bd9Sstevel@tonic-gate static int 33856deab07SRod Evans _relocate_lmc(Lm_list *lml, Aliste lmco, Rt_map *nlmp, int *relocated, 33956deab07SRod Evans int *in_nfavl) 3407c478bd9Sstevel@tonic-gate { 3417c478bd9Sstevel@tonic-gate Rt_map *lmp; 3427c478bd9Sstevel@tonic-gate 343cb511613SAli Bahrami for (lmp = nlmp; lmp; lmp = NEXT_RT_MAP(lmp)) { 3447c478bd9Sstevel@tonic-gate /* 3457c478bd9Sstevel@tonic-gate * If this object has already been relocated, we're done. If 3467c478bd9Sstevel@tonic-gate * this object is being deleted, skip it, there's probably a 3477c478bd9Sstevel@tonic-gate * relocation error somewhere that's causing this deletion. 3487c478bd9Sstevel@tonic-gate */ 3497c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & 3507c478bd9Sstevel@tonic-gate (FLG_RT_RELOCING | FLG_RT_RELOCED | FLG_RT_DELETE)) 3517c478bd9Sstevel@tonic-gate continue; 3527c478bd9Sstevel@tonic-gate 3537c478bd9Sstevel@tonic-gate /* 3547c478bd9Sstevel@tonic-gate * Indicate that relocation processing is under way. 3557c478bd9Sstevel@tonic-gate */ 3567c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_RELOCING; 3577c478bd9Sstevel@tonic-gate 3587c478bd9Sstevel@tonic-gate /* 3597c478bd9Sstevel@tonic-gate * Relocate the object. 3607c478bd9Sstevel@tonic-gate */ 3619aa23310Srie if (relocate_so(lml, lmp, relocated, 0, in_nfavl) == 0) 3627c478bd9Sstevel@tonic-gate return (0); 3637c478bd9Sstevel@tonic-gate 3647c478bd9Sstevel@tonic-gate /* 3657c478bd9Sstevel@tonic-gate * Indicate that the objects relocation is complete. 3667c478bd9Sstevel@tonic-gate */ 3677c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_RELOCING; 3687c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_RELOCED; 3697c478bd9Sstevel@tonic-gate 3707c478bd9Sstevel@tonic-gate /* 37156deab07SRod Evans * If this object is being relocated on the main link-map list 37256deab07SRod Evans * indicate that this object's init is available for harvesting. 37356deab07SRod Evans * Objects that are being collected on other link-map lists 37456deab07SRod Evans * will have there init availability tagged when the objects 37556deab07SRod Evans * are move to the main link-map list (ie, after we know they, 37656deab07SRod Evans * and their dependencies, are fully relocated and ready for 37756deab07SRod Evans * use). 37856deab07SRod Evans * 37956deab07SRod Evans * Note, even under ldd(1) this init identification is necessary 38056deab07SRod Evans * for -i (tsort) gathering. 3817c478bd9Sstevel@tonic-gate */ 38256deab07SRod Evans if (lmco == ALIST_OFF_DATA) { 3837c478bd9Sstevel@tonic-gate lml->lm_init++; 384dffec89cSrie lml->lm_flags |= LML_FLG_OBJADDED; 385466e2a62Srie } 3867c478bd9Sstevel@tonic-gate 3877c478bd9Sstevel@tonic-gate /* 3887c478bd9Sstevel@tonic-gate * Determine if this object is a filter, and if a load filter 3897c478bd9Sstevel@tonic-gate * flag is in effect, trigger the loading of all its filtees. 3907c478bd9Sstevel@tonic-gate */ 3919aa23310Srie load_filtees(lmp, in_nfavl); 3927c478bd9Sstevel@tonic-gate } 3937c478bd9Sstevel@tonic-gate 3947c478bd9Sstevel@tonic-gate /* 3957c478bd9Sstevel@tonic-gate * Perform special copy relocations. These are only meaningful for 3967c478bd9Sstevel@tonic-gate * dynamic executables (fixed and head of their link-map list). If 3977c478bd9Sstevel@tonic-gate * this ever has to change then the infrastructure of COPY() has to 398cce0e03bSab196087 * change. Presently, a given link map can only have a receiver or 399cce0e03bSab196087 * supplier of copy data, so a union is used to overlap the storage 400cce0e03bSab196087 * for the COPY_R() and COPY_S() lists. These lists would need to 401cce0e03bSab196087 * be separated. 4027c478bd9Sstevel@tonic-gate */ 4037c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_FIXED) && (nlmp == LIST(nlmp)->lm_head) && 4047c478bd9Sstevel@tonic-gate (((lml->lm_flags & LML_FLG_TRC_ENABLE) == 0) || 4057c478bd9Sstevel@tonic-gate (lml->lm_flags & LML_FLG_TRC_WARN))) { 406cce0e03bSab196087 Rt_map *lmp; 407cce0e03bSab196087 Aliste idx1; 4087c478bd9Sstevel@tonic-gate Word tracing; 4097c478bd9Sstevel@tonic-gate 41002ca3e02Srie #if defined(__i386) 4117c478bd9Sstevel@tonic-gate if (elf_copy_gen(nlmp) == 0) 4127c478bd9Sstevel@tonic-gate return (0); 4137c478bd9Sstevel@tonic-gate #endif 414cce0e03bSab196087 if (COPY_S(nlmp) == NULL) 4157c478bd9Sstevel@tonic-gate return (1); 4167c478bd9Sstevel@tonic-gate 4177c478bd9Sstevel@tonic-gate if ((LIST(nlmp)->lm_flags & LML_FLG_TRC_ENABLE) && 4187c478bd9Sstevel@tonic-gate (((rtld_flags & RT_FL_SILENCERR) == 0) || 4197c478bd9Sstevel@tonic-gate (LIST(nlmp)->lm_flags & LML_FLG_TRC_VERBOSE))) 4207c478bd9Sstevel@tonic-gate tracing = 1; 4217c478bd9Sstevel@tonic-gate else 4227c478bd9Sstevel@tonic-gate tracing = 0; 4237c478bd9Sstevel@tonic-gate 4245aefb655Srie DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD)); 4257c478bd9Sstevel@tonic-gate 426cce0e03bSab196087 for (APLIST_TRAVERSE(COPY_S(nlmp), idx1, lmp)) { 4277c478bd9Sstevel@tonic-gate Rel_copy *rcp; 428cce0e03bSab196087 Aliste idx2; 4297c478bd9Sstevel@tonic-gate 430cce0e03bSab196087 for (ALIST_TRAVERSE(COPY_R(lmp), idx2, rcp)) { 4317c478bd9Sstevel@tonic-gate int zero; 4327c478bd9Sstevel@tonic-gate 4337c478bd9Sstevel@tonic-gate /* 434466e2a62Srie * Only copy the data if the data is from 435466e2a62Srie * a non-zero definition (ie. not .bss). 4367c478bd9Sstevel@tonic-gate */ 437466e2a62Srie zero = are_bits_zero(rcp->r_dlmp, 438466e2a62Srie rcp->r_dsym, 0); 4395aefb655Srie DBG_CALL(Dbg_reloc_copy(rcp->r_dlmp, nlmp, 4405aefb655Srie rcp->r_name, zero)); 4417c478bd9Sstevel@tonic-gate if (zero) 4427c478bd9Sstevel@tonic-gate continue; 4437c478bd9Sstevel@tonic-gate 4447c478bd9Sstevel@tonic-gate (void) memcpy(rcp->r_radd, rcp->r_dadd, 4457c478bd9Sstevel@tonic-gate rcp->r_size); 4467c478bd9Sstevel@tonic-gate 4477c478bd9Sstevel@tonic-gate if ((tracing == 0) || ((FLAGS1(rcp->r_dlmp) & 4487c478bd9Sstevel@tonic-gate FL1_RT_DISPREL) == 0)) 4497c478bd9Sstevel@tonic-gate continue; 4507c478bd9Sstevel@tonic-gate 4517c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_REL_CPYDISP), 4527c478bd9Sstevel@tonic-gate demangle(rcp->r_name), NAME(rcp->r_dlmp)); 4537c478bd9Sstevel@tonic-gate } 4547c478bd9Sstevel@tonic-gate } 4557c478bd9Sstevel@tonic-gate 4565aefb655Srie DBG_CALL(Dbg_util_nl(lml, DBG_NL_STD)); 4577c478bd9Sstevel@tonic-gate 458cce0e03bSab196087 free(COPY_S(nlmp)); 4592017c965SRod Evans COPY_S(nlmp) = NULL; 4607c478bd9Sstevel@tonic-gate } 4617c478bd9Sstevel@tonic-gate return (1); 4627c478bd9Sstevel@tonic-gate } 4637c478bd9Sstevel@tonic-gate 4647c478bd9Sstevel@tonic-gate int 4659aa23310Srie relocate_lmc(Lm_list *lml, Aliste nlmco, Rt_map *clmp, Rt_map *nlmp, 4669aa23310Srie int *in_nfavl) 4677c478bd9Sstevel@tonic-gate { 4687c478bd9Sstevel@tonic-gate int lret = 1, pret = 1; 469cce0e03bSab196087 APlist *alp; 4707c478bd9Sstevel@tonic-gate Aliste plmco; 4717c478bd9Sstevel@tonic-gate Lm_cntl *plmc, *nlmc; 4727c478bd9Sstevel@tonic-gate 4737c478bd9Sstevel@tonic-gate /* 4747c478bd9Sstevel@tonic-gate * If this link-map control list is being relocated, return. The object 4757c478bd9Sstevel@tonic-gate * that has just been added will be picked up by the existing relocation 4767c478bd9Sstevel@tonic-gate * thread. Note, this is only really meaningful during process init- 4777c478bd9Sstevel@tonic-gate * ialization, as objects are added to the main link-map control list. 4787c478bd9Sstevel@tonic-gate * Following this initialization, each family of objects that are loaded 4797c478bd9Sstevel@tonic-gate * are added to a new link-map control list. 4807c478bd9Sstevel@tonic-gate */ 4817c478bd9Sstevel@tonic-gate /* LINTED */ 482cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 4837c478bd9Sstevel@tonic-gate 4847c478bd9Sstevel@tonic-gate if (nlmc->lc_flags & LMC_FLG_RELOCATING) 4857c478bd9Sstevel@tonic-gate return (1); 4867c478bd9Sstevel@tonic-gate 4877c478bd9Sstevel@tonic-gate nlmc->lc_flags |= LMC_FLG_RELOCATING; 4887c478bd9Sstevel@tonic-gate 4897c478bd9Sstevel@tonic-gate /* 4907c478bd9Sstevel@tonic-gate * Relocate one or more link-maps of a link map control list. If this 4917c478bd9Sstevel@tonic-gate * object doesn't belong to the present link-map control list then it 4927c478bd9Sstevel@tonic-gate * must already have been relocated, or it is in the process of being 4937c478bd9Sstevel@tonic-gate * relocated prior to us recursing into this relocation. In either 4947c478bd9Sstevel@tonic-gate * case, ignore the object as it's already being taken care of, however, 4957c478bd9Sstevel@tonic-gate * fall through and capture any relocation promotions that might have 4967c478bd9Sstevel@tonic-gate * been established from the reference mode of this object. 4977c478bd9Sstevel@tonic-gate * 4987c478bd9Sstevel@tonic-gate * If we're generating a configuration file using crle(1), two passes 4997c478bd9Sstevel@tonic-gate * may be involved. Under the first pass, RTLD_CONFGEN is set. Under 5007c478bd9Sstevel@tonic-gate * this pass, crle() loads objects into the process address space. No 5017c478bd9Sstevel@tonic-gate * relocation is necessary at this point, we simply need to analyze the 50208278a5eSRod Evans * objects to ensure any directly bound dependencies, filtees, etc. 50308278a5eSRod Evans * get loaded. Although we skip the relocation, fall through to ensure 5047c478bd9Sstevel@tonic-gate * any control lists are maintained appropriately. 5057c478bd9Sstevel@tonic-gate * 5067c478bd9Sstevel@tonic-gate * If objects are to be dldump(3c)'ed, crle(1) makes a second pass, 5077c478bd9Sstevel@tonic-gate * using RTLD_NOW and RTLD_CONFGEN. The RTLD_NOW effectively carries 5087c478bd9Sstevel@tonic-gate * out the relocations of all loaded objects. 5097c478bd9Sstevel@tonic-gate */ 5107c478bd9Sstevel@tonic-gate if ((nlmco == CNTL(nlmp)) && 5117c478bd9Sstevel@tonic-gate ((MODE(nlmp) & (RTLD_NOW | RTLD_CONFGEN)) != RTLD_CONFGEN)) { 5127c478bd9Sstevel@tonic-gate int relocated = 0; 5137c478bd9Sstevel@tonic-gate 5147c478bd9Sstevel@tonic-gate /* 5157c478bd9Sstevel@tonic-gate * Determine whether the initial link-map control list has 5167c478bd9Sstevel@tonic-gate * started relocation. From this point, should any interposing 5177c478bd9Sstevel@tonic-gate * objects be added to this link-map control list, the objects 5187c478bd9Sstevel@tonic-gate * are demoted to standard objects. Their interposition can't 5197c478bd9Sstevel@tonic-gate * be guaranteed once relocations have been carried out. 5207c478bd9Sstevel@tonic-gate */ 521cce0e03bSab196087 if (nlmco == ALIST_OFF_DATA) 5227c478bd9Sstevel@tonic-gate lml->lm_flags |= LML_FLG_STARTREL; 5237c478bd9Sstevel@tonic-gate 5247c478bd9Sstevel@tonic-gate /* 52502ca3e02Srie * Relocate the link-map control list. Should this relocation 52602ca3e02Srie * fail, clean up this link-map list. Relocations within this 52702ca3e02Srie * list may have required relocation promotions on other lists, 52802ca3e02Srie * so before acting upon these, and possibly adding more objects 52902ca3e02Srie * to the present link-map control list, try and clean up any 53002ca3e02Srie * failed objects now. 5317c478bd9Sstevel@tonic-gate */ 53256deab07SRod Evans lret = _relocate_lmc(lml, nlmco, nlmp, &relocated, in_nfavl); 533cce0e03bSab196087 if ((lret == 0) && (nlmco != ALIST_OFF_DATA)) 534481bba9eSRod Evans remove_lmc(lml, clmp, nlmco, NAME(nlmp)); 5357c478bd9Sstevel@tonic-gate } 5367c478bd9Sstevel@tonic-gate 5377c478bd9Sstevel@tonic-gate /* 5387c478bd9Sstevel@tonic-gate * Determine the new, and previous link-map control lists. 5397c478bd9Sstevel@tonic-gate */ 54024a6229eSrie /* LINTED */ 541cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 542cce0e03bSab196087 if (nlmco == ALIST_OFF_DATA) { 5436679fdc0Srie plmco = nlmco; 5447c478bd9Sstevel@tonic-gate plmc = nlmc; 5456679fdc0Srie } else { 5467c478bd9Sstevel@tonic-gate plmco = nlmco - lml->lm_lists->al_size; 5477c478bd9Sstevel@tonic-gate /* LINTED */ 548cce0e03bSab196087 plmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, plmco); 5497c478bd9Sstevel@tonic-gate } 5507c478bd9Sstevel@tonic-gate 5517c478bd9Sstevel@tonic-gate /* 5527c478bd9Sstevel@tonic-gate * Having completed this control list of objects, they can now be bound 5537c478bd9Sstevel@tonic-gate * to from other objects. Move this control list to the control list 5547c478bd9Sstevel@tonic-gate * that precedes it. Although this control list may have only bound to 5557c478bd9Sstevel@tonic-gate * controls lists much higher up the control list stack, it must only 5567c478bd9Sstevel@tonic-gate * be moved up one control list so as to preserve the link-map order 5577c478bd9Sstevel@tonic-gate * that may have already been traversed in search of symbols. 5587c478bd9Sstevel@tonic-gate */ 559cce0e03bSab196087 if (lret && (nlmco != ALIST_OFF_DATA) && nlmc->lc_head) 5607c478bd9Sstevel@tonic-gate lm_move(lml, nlmco, plmco, nlmc, plmc); 5617c478bd9Sstevel@tonic-gate 5627c478bd9Sstevel@tonic-gate /* 5637c478bd9Sstevel@tonic-gate * Determine whether existing objects that have already been relocated, 5647c478bd9Sstevel@tonic-gate * need any additional relocations performed. This can occur when new 5657c478bd9Sstevel@tonic-gate * objects are loaded with RTLD_NOW, and these new objects have 5667c478bd9Sstevel@tonic-gate * dependencies on objects that are already loaded. Note, that we peel 5677c478bd9Sstevel@tonic-gate * any relocation promotions off of one control list at a time. This 5687c478bd9Sstevel@tonic-gate * prevents relocations from being bound to objects that might yet fail 5697c478bd9Sstevel@tonic-gate * to relocate themselves. 5707c478bd9Sstevel@tonic-gate */ 571cce0e03bSab196087 while ((alp = plmc->lc_now) != NULL) { 572cce0e03bSab196087 Aliste idx; 573cce0e03bSab196087 Rt_map *lmp; 5747c478bd9Sstevel@tonic-gate 5757c478bd9Sstevel@tonic-gate /* 5767c478bd9Sstevel@tonic-gate * Remove the relocation promotion list, as performing more 5777c478bd9Sstevel@tonic-gate * relocations may result in discovering more objects that need 5787c478bd9Sstevel@tonic-gate * promotion. 5797c478bd9Sstevel@tonic-gate */ 580cce0e03bSab196087 plmc->lc_now = NULL; 5817c478bd9Sstevel@tonic-gate 582cce0e03bSab196087 for (APLIST_TRAVERSE(alp, idx, lmp)) { 5837c478bd9Sstevel@tonic-gate /* 5847c478bd9Sstevel@tonic-gate * If the original relocation of the link-map control 5857c478bd9Sstevel@tonic-gate * list failed, or one of the relocation promotions of 5867c478bd9Sstevel@tonic-gate * this loop has failed, demote any pending objects 5877c478bd9Sstevel@tonic-gate * relocation mode. 5887c478bd9Sstevel@tonic-gate */ 5897c478bd9Sstevel@tonic-gate if ((lret == 0) || (pret == 0)) { 5907c478bd9Sstevel@tonic-gate MODE(lmp) &= ~RTLD_NOW; 5917c478bd9Sstevel@tonic-gate MODE(lmp) |= RTLD_LAZY; 5927c478bd9Sstevel@tonic-gate continue; 5937c478bd9Sstevel@tonic-gate } 5947c478bd9Sstevel@tonic-gate 5957c478bd9Sstevel@tonic-gate /* 5967c478bd9Sstevel@tonic-gate * If a relocation fails, save the error condition. 5977c478bd9Sstevel@tonic-gate * It's possible that all new objects on the original 5987c478bd9Sstevel@tonic-gate * link-map control list have been relocated 5997c478bd9Sstevel@tonic-gate * successfully, but if the user request requires 6007c478bd9Sstevel@tonic-gate * promoting objects that have already been loaded, we 6017c478bd9Sstevel@tonic-gate * have to indicate that this operation couldn't be 6027c478bd9Sstevel@tonic-gate * performed. The unrelocated objects are in use on 6037c478bd9Sstevel@tonic-gate * another control list, and may continue to be used. 6047c478bd9Sstevel@tonic-gate * If the .plt that resulted in the error is called, 6057c478bd9Sstevel@tonic-gate * then the process will receive a fatal error at that 6067c478bd9Sstevel@tonic-gate * time. But, the .plt may never be called. 6077c478bd9Sstevel@tonic-gate */ 6089aa23310Srie if (relocate_so(lml, lmp, 0, 1, in_nfavl) == 0) 6097c478bd9Sstevel@tonic-gate pret = 0; 6107c478bd9Sstevel@tonic-gate } 6117c478bd9Sstevel@tonic-gate 6127c478bd9Sstevel@tonic-gate /* 6137c478bd9Sstevel@tonic-gate * Having promoted any objects, determine whether additional 6147c478bd9Sstevel@tonic-gate * dependencies were added, and if so move them to the previous 6157c478bd9Sstevel@tonic-gate * link-map control list. 6167c478bd9Sstevel@tonic-gate */ 61724a6229eSrie /* LINTED */ 618cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 61924a6229eSrie /* LINTED */ 620cce0e03bSab196087 plmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, plmco); 621cce0e03bSab196087 if ((nlmco != ALIST_OFF_DATA) && nlmc->lc_head) 6227c478bd9Sstevel@tonic-gate lm_move(lml, nlmco, plmco, nlmc, plmc); 6238521e5e6Srie free(alp); 6247c478bd9Sstevel@tonic-gate } 6257c478bd9Sstevel@tonic-gate 62624a6229eSrie /* 62702ca3e02Srie * If relocations have been successful, indicate that relocations are 62802ca3e02Srie * no longer active for this control list. Otherwise, leave the 62902ca3e02Srie * relocation flag, as this flag is used to determine the style of 63002ca3e02Srie * cleanup (see remove_lmc()). 63124a6229eSrie */ 63202ca3e02Srie if (lret && pret) { 63324a6229eSrie /* LINTED */ 634cce0e03bSab196087 nlmc = (Lm_cntl *)alist_item_by_offset(lml->lm_lists, nlmco); 6357c478bd9Sstevel@tonic-gate nlmc->lc_flags &= ~LMC_FLG_RELOCATING; 6367c478bd9Sstevel@tonic-gate 6377c478bd9Sstevel@tonic-gate return (1); 63802ca3e02Srie } 63902ca3e02Srie 6407c478bd9Sstevel@tonic-gate return (0); 6417c478bd9Sstevel@tonic-gate } 6427c478bd9Sstevel@tonic-gate 6437c478bd9Sstevel@tonic-gate /* 6447c478bd9Sstevel@tonic-gate * Inherit the first rejection message for possible later diagnostics. 6457c478bd9Sstevel@tonic-gate * 6467c478bd9Sstevel@tonic-gate * Any attempt to process a file that is unsuccessful, should be accompanied 6477c478bd9Sstevel@tonic-gate * with an error diagnostic. However, some operations like searching for a 6487c478bd9Sstevel@tonic-gate * simple filename, involve trying numerous paths, and an error message for each 6497c478bd9Sstevel@tonic-gate * lookup is not required. Although a multiple search can fail, it's possible 6507c478bd9Sstevel@tonic-gate * that a file was found, but was rejected because it was the wrong type. 6517c478bd9Sstevel@tonic-gate * To satisfy these possibilities, the first failure is recorded as a rejection 6527c478bd9Sstevel@tonic-gate * message, and this message is used later for a more specific diagnostic. 6537c478bd9Sstevel@tonic-gate * 6547c478bd9Sstevel@tonic-gate * File searches are focused at load_one(), and from here a rejection descriptor 6557c478bd9Sstevel@tonic-gate * is passed down to various child routines. If these child routines can 6567c478bd9Sstevel@tonic-gate * process multiple files, then they will maintain their own rejection desc- 6577c478bd9Sstevel@tonic-gate * riptor. This is filled in for any failures, and a diagnostic produced to 6587c478bd9Sstevel@tonic-gate * reflect the failure. The child routines then employ rejection_inherit() to 6597c478bd9Sstevel@tonic-gate * pass the first rejection message back to load_one(). 6607c478bd9Sstevel@tonic-gate * 6617c478bd9Sstevel@tonic-gate * Note that the name, and rejection string must be duplicated, as the name 6627c478bd9Sstevel@tonic-gate * buffer and error string buffer (see conv_ routines) may be reused for 6637c478bd9Sstevel@tonic-gate * additional processing or rejection messages. 6647c478bd9Sstevel@tonic-gate */ 6657c478bd9Sstevel@tonic-gate void 66631fdd7caSab196087 rejection_inherit(Rej_desc *rej1, Rej_desc *rej2) 6677c478bd9Sstevel@tonic-gate { 6687c478bd9Sstevel@tonic-gate if (rej2->rej_type && (rej1->rej_type == 0)) { 6697c478bd9Sstevel@tonic-gate rej1->rej_type = rej2->rej_type; 6707c478bd9Sstevel@tonic-gate rej1->rej_info = rej2->rej_info; 67156deab07SRod Evans rej1->rej_flags = rej2->rej_flags; 6727c478bd9Sstevel@tonic-gate if (rej2->rej_name) 67356deab07SRod Evans rej1->rej_name = stravl_insert(rej2->rej_name, 0, 0, 0); 67456deab07SRod Evans if ((rej2->rej_str) && ((rej1->rej_str = 67556deab07SRod Evans stravl_insert(rej2->rej_str, 0, 0, 0)) == NULL)) 6767c478bd9Sstevel@tonic-gate rej1->rej_str = MSG_ORIG(MSG_EMG_ENOMEM); 6777c478bd9Sstevel@tonic-gate } 6787c478bd9Sstevel@tonic-gate } 6797c478bd9Sstevel@tonic-gate 6807c478bd9Sstevel@tonic-gate /* 6810aa3cd4dSrie * Helper routine for is_so_matched() that consolidates matching a path name, 6820aa3cd4dSrie * or file name component of a link-map name. 6837c478bd9Sstevel@tonic-gate */ 68456deab07SRod Evans inline static int 6850aa3cd4dSrie _is_so_matched(const char *name, const char *str, int path) 6867c478bd9Sstevel@tonic-gate { 6877c478bd9Sstevel@tonic-gate const char *_str; 6887c478bd9Sstevel@tonic-gate 6890aa3cd4dSrie if ((path == 0) && ((_str = strrchr(str, '/')) != NULL)) 6907c478bd9Sstevel@tonic-gate _str++; 6917c478bd9Sstevel@tonic-gate else 6927c478bd9Sstevel@tonic-gate _str = str; 6937c478bd9Sstevel@tonic-gate 6947c478bd9Sstevel@tonic-gate return (strcmp(name, _str)); 6957c478bd9Sstevel@tonic-gate } 6967c478bd9Sstevel@tonic-gate 6970aa3cd4dSrie /* 6980aa3cd4dSrie * Determine whether a search name matches one of the names associated with a 6990aa3cd4dSrie * link-map. A link-map contains several names: 7000aa3cd4dSrie * 7012017c965SRod Evans * - a NAME() - this is the basename of the dynamic executable that started 7022017c965SRod Evans * the process, and the path name of any dependencies used by the process. 7032017c965SRod Evans * Most executables are received as full path names, as exec() prepends a 7042017c965SRod Evans * search $PATH to locate the executable. However, simple file names can 7052017c965SRod Evans * be received from exec() if the file is executed from the present working 7062017c965SRod Evans * directory. Regardless, ld.so.1 maintains NAME() as the basename, as 7072017c965SRod Evans * this has always been the name used in diagnostics and error messages. 7082017c965SRod Evans * Most dependencies are full path names, as the typical search for a 7092017c965SRod Evans * dependency, say "libx.so.1", results in search paths being prepended to 7102017c965SRod Evans * the name, which eventually open "/lib/libx.so.1". However, relative 7112017c965SRod Evans * path names can be supplied as dependencies, e.g. dlopen("../libx.so.1"). 7120aa3cd4dSrie * 7132017c965SRod Evans * - a PATHNAME() - this is the fully resolved path name of the object. This 7142017c965SRod Evans * name will differ from NAME() for all dynamic executables, and may differ 7152017c965SRod Evans * from the NAME() of dependencies, if the dependency is not a full path 7162017c965SRod Evans * name, or the dependency resolves to a symbolic link. 7170aa3cd4dSrie * 7182017c965SRod Evans * - an ALIAS() name - these are alternative names by which the object has 71956deab07SRod Evans * been found, ie. when dependencies are loaded through a variety of 72056deab07SRod Evans * different symbolic links. 7210aa3cd4dSrie * 7220aa3cd4dSrie * The name pattern matching can differ depending on whether we are looking 7230aa3cd4dSrie * for a full path name (path != 0), or a simple file name (path == 0). Full 72456deab07SRod Evans * path names typically match NAME() or PATHNAME() entries. 7250aa3cd4dSrie * 7260aa3cd4dSrie * For all full path name searches, the link-map names are taken as is. For 7270aa3cd4dSrie * simple file name searches, only the file name component of any link-map 7280aa3cd4dSrie * names are used for comparison. 7290aa3cd4dSrie */ 73056deab07SRod Evans inline static Rt_map * 7310aa3cd4dSrie is_so_matched(Rt_map *lmp, const char *name, int path) 7327c478bd9Sstevel@tonic-gate { 733cce0e03bSab196087 Aliste idx; 734cce0e03bSab196087 const char *cp; 7357c478bd9Sstevel@tonic-gate 73656deab07SRod Evans if (_is_so_matched(name, NAME(lmp), path) == 0) 7377c478bd9Sstevel@tonic-gate return (lmp); 7387c478bd9Sstevel@tonic-gate 7397c478bd9Sstevel@tonic-gate if (PATHNAME(lmp) != NAME(lmp)) { 74056deab07SRod Evans if (_is_so_matched(name, PATHNAME(lmp), path) == 0) 7417c478bd9Sstevel@tonic-gate return (lmp); 7427c478bd9Sstevel@tonic-gate } 7430aa3cd4dSrie 744cce0e03bSab196087 for (APLIST_TRAVERSE(ALIAS(lmp), idx, cp)) { 745cce0e03bSab196087 if (_is_so_matched(name, cp, path) == 0) 7460aa3cd4dSrie return (lmp); 7470aa3cd4dSrie } 7480aa3cd4dSrie 74937ffaf83SRod Evans return (NULL); 7507c478bd9Sstevel@tonic-gate } 7517c478bd9Sstevel@tonic-gate 7520aa3cd4dSrie /* 7530aa3cd4dSrie * Files are opened by ld.so.1 to satisfy dependencies, filtees and dlopen() 7540aa3cd4dSrie * requests. Each request investigates the file based upon the callers 7559aa23310Srie * environment. Once a full path name has been established, the following 7569aa23310Srie * checks are made: 7570aa3cd4dSrie * 7582017c965SRod Evans * - does the path exist in the link-map lists FullPathNode AVL tree? if 7599aa23310Srie * so, the file is already loaded, and its associated link-map pointer 7609aa23310Srie * is returned. 7612017c965SRod Evans * - does the path exist in the not-found AVL tree? if so, this path has 7629aa23310Srie * already been determined to not exist, and a failure is returned. 7632017c965SRod Evans * - a device/inode check, to ensure the same file isn't mapped multiple 7649aa23310Srie * times through different paths. See file_open(). 7659aa23310Srie * 7669aa23310Srie * However, there are cases where a test for an existing file name needs to be 7679aa23310Srie * carried out, such as dlopen(NOLOAD) requests, dldump() requests, and as a 7689aa23310Srie * final fallback to dependency loading. These requests are handled by 7699aa23310Srie * is_so_loaded(). 7700aa3cd4dSrie * 7710aa3cd4dSrie * A traversal through the callers link-map list is carried out, and from each 7720aa3cd4dSrie * link-map, a comparison is made against all of the various names by which the 77308278a5eSRod Evans * object has been referenced. is_so_matched() is used to compare the link-map 7749aa23310Srie * names against the name being searched for. Whether the search name is a full 7759aa23310Srie * path name or a simple file name, governs what comparisons are made. 7760aa3cd4dSrie * 7770aa3cd4dSrie * A full path name, which is a fully resolved path name that starts with a "/" 7780aa3cd4dSrie * character, or a relative path name that includes a "/" character, must match 77956deab07SRod Evans * the link-map names exactly. A simple file name, which is any name *not* 7800aa3cd4dSrie * containing a "/" character, are matched against the file name component of 7810aa3cd4dSrie * any link-map names. 7820aa3cd4dSrie */ 7837c478bd9Sstevel@tonic-gate Rt_map * 7849aa23310Srie is_so_loaded(Lm_list *lml, const char *name, int *in_nfavl) 7857c478bd9Sstevel@tonic-gate { 7867c478bd9Sstevel@tonic-gate Rt_map *lmp; 7877c478bd9Sstevel@tonic-gate avl_index_t where; 7887c478bd9Sstevel@tonic-gate Lm_cntl *lmc; 789cce0e03bSab196087 Aliste idx; 7900aa3cd4dSrie int path = 0; 7917c478bd9Sstevel@tonic-gate 7927c478bd9Sstevel@tonic-gate /* 7930aa3cd4dSrie * If the name is a full path name, first determine if the path name is 7949aa23310Srie * registered on the FullPathNode AVL, or not-found AVL trees. 7957c478bd9Sstevel@tonic-gate */ 7969aa23310Srie if (name[0] == '/') { 79756deab07SRod Evans uint_t hash = sgs_str_hash(name); 79856deab07SRod Evans 79956deab07SRod Evans if (((lmp = fpavl_recorded(lml, name, hash, &where)) != NULL) && 8007c478bd9Sstevel@tonic-gate ((FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) == 0)) 8017c478bd9Sstevel@tonic-gate return (lmp); 80256deab07SRod Evans 80308278a5eSRod Evans if (pnavl_recorded(&nfavl, name, hash, NULL)) { 8049aa23310Srie /* 8059aa23310Srie * For dlopen() and dlsym() fall backs, indicate that 8069aa23310Srie * a registered not-found path has indicated that this 8079aa23310Srie * object does not exist. 8089aa23310Srie */ 8099aa23310Srie if (in_nfavl) 8109aa23310Srie (*in_nfavl)++; 81137ffaf83SRod Evans return (NULL); 8129aa23310Srie } 8139aa23310Srie } 8147c478bd9Sstevel@tonic-gate 8157c478bd9Sstevel@tonic-gate /* 8160aa3cd4dSrie * Determine whether the name is a simple file name, or a path name. 8177c478bd9Sstevel@tonic-gate */ 8180aa3cd4dSrie if (strchr(name, '/')) 8190aa3cd4dSrie path++; 8207c478bd9Sstevel@tonic-gate 8217c478bd9Sstevel@tonic-gate /* 8227c478bd9Sstevel@tonic-gate * Loop through the callers link-map lists. 8237c478bd9Sstevel@tonic-gate */ 824cce0e03bSab196087 for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) { 825cb511613SAli Bahrami for (lmp = lmc->lc_head; lmp; lmp = NEXT_RT_MAP(lmp)) { 8267c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & (FLG_RT_OBJECT | FLG_RT_DELETE)) 8277c478bd9Sstevel@tonic-gate continue; 8287c478bd9Sstevel@tonic-gate 8290aa3cd4dSrie if (is_so_matched(lmp, name, path)) 8307c478bd9Sstevel@tonic-gate return (lmp); 8317c478bd9Sstevel@tonic-gate } 8327c478bd9Sstevel@tonic-gate } 83337ffaf83SRod Evans return (NULL); 8347c478bd9Sstevel@tonic-gate } 8357c478bd9Sstevel@tonic-gate 8367c478bd9Sstevel@tonic-gate /* 8377c478bd9Sstevel@tonic-gate * Tracing is enabled by the LD_TRACE_LOADED_OPTIONS environment variable which 8387c478bd9Sstevel@tonic-gate * is normally set from ldd(1). For each link map we load, print the load name 83908278a5eSRod Evans * and the full pathname of the associated object. 8407c478bd9Sstevel@tonic-gate */ 8417c478bd9Sstevel@tonic-gate /* ARGSUSED4 */ 8427c478bd9Sstevel@tonic-gate static void 8437c478bd9Sstevel@tonic-gate trace_so(Rt_map *clmp, Rej_desc *rej, const char *name, const char *path, 8447c478bd9Sstevel@tonic-gate int alter, const char *nfound) 8457c478bd9Sstevel@tonic-gate { 8467c478bd9Sstevel@tonic-gate const char *str = MSG_ORIG(MSG_STR_EMPTY); 8477c478bd9Sstevel@tonic-gate const char *reject = MSG_ORIG(MSG_STR_EMPTY); 8487c478bd9Sstevel@tonic-gate char _reject[PATH_MAX]; 8497c478bd9Sstevel@tonic-gate 8507c478bd9Sstevel@tonic-gate /* 8517c478bd9Sstevel@tonic-gate * The first time through trace_so() will only have lddstub on the 8527c478bd9Sstevel@tonic-gate * link-map list and the preloaded shared object is supplied as "path". 8537c478bd9Sstevel@tonic-gate * As we don't want to print this shared object as a dependency, but 8547c478bd9Sstevel@tonic-gate * instead inspect *its* dependencies, return. 8557c478bd9Sstevel@tonic-gate */ 8567c478bd9Sstevel@tonic-gate if (FLAGS1(clmp) & FL1_RT_LDDSTUB) 8577c478bd9Sstevel@tonic-gate return; 8587c478bd9Sstevel@tonic-gate 8597c478bd9Sstevel@tonic-gate /* 8607c478bd9Sstevel@tonic-gate * Without any rejection info, this is a supplied not-found condition. 8617c478bd9Sstevel@tonic-gate */ 8627c478bd9Sstevel@tonic-gate if (rej && (rej->rej_type == 0)) { 8637c478bd9Sstevel@tonic-gate (void) printf(nfound, name); 8647c478bd9Sstevel@tonic-gate return; 8657c478bd9Sstevel@tonic-gate } 8667c478bd9Sstevel@tonic-gate 8677c478bd9Sstevel@tonic-gate /* 8687c478bd9Sstevel@tonic-gate * If rejection information exists then establish what object was 8697c478bd9Sstevel@tonic-gate * found and the reason for its rejection. 8707c478bd9Sstevel@tonic-gate */ 8717c478bd9Sstevel@tonic-gate if (rej) { 872de777a60Sab196087 Conv_reject_desc_buf_t rej_buf; 873de777a60Sab196087 8747c478bd9Sstevel@tonic-gate /* LINTED */ 8757c478bd9Sstevel@tonic-gate (void) snprintf(_reject, PATH_MAX, 876de777a60Sab196087 MSG_INTL(ldd_reject[rej->rej_type]), 877ba2be530Sab196087 conv_reject_desc(rej, &rej_buf, M_MACH)); 8787c478bd9Sstevel@tonic-gate if (rej->rej_name) 8797c478bd9Sstevel@tonic-gate path = rej->rej_name; 8807c478bd9Sstevel@tonic-gate reject = (char *)_reject; 8817c478bd9Sstevel@tonic-gate 8827c478bd9Sstevel@tonic-gate /* 8837c478bd9Sstevel@tonic-gate * Was an alternative pathname defined (from a configuration 8847c478bd9Sstevel@tonic-gate * file). 8857c478bd9Sstevel@tonic-gate */ 88656deab07SRod Evans if (rej->rej_flags & FLG_REJ_ALTER) 8877c478bd9Sstevel@tonic-gate str = MSG_INTL(MSG_LDD_FIL_ALTER); 8887c478bd9Sstevel@tonic-gate } else { 8897c478bd9Sstevel@tonic-gate if (alter) 8907c478bd9Sstevel@tonic-gate str = MSG_INTL(MSG_LDD_FIL_ALTER); 8917c478bd9Sstevel@tonic-gate } 8927c478bd9Sstevel@tonic-gate 8937c478bd9Sstevel@tonic-gate /* 8947c478bd9Sstevel@tonic-gate * If the load name isn't a full pathname print its associated pathname 8957c478bd9Sstevel@tonic-gate * together with all the other information we've gathered. 8967c478bd9Sstevel@tonic-gate */ 8977c478bd9Sstevel@tonic-gate if (*name == '/') 8987c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), path, str, reject); 8997c478bd9Sstevel@tonic-gate else 9007247f888Srie (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), name, path, str, 9017247f888Srie reject); 9027c478bd9Sstevel@tonic-gate } 9037c478bd9Sstevel@tonic-gate 9047c478bd9Sstevel@tonic-gate /* 9057c478bd9Sstevel@tonic-gate * Establish a link-map mode, initializing it if it has just been loaded, or 9067c478bd9Sstevel@tonic-gate * potentially updating it if it already exists. 9077c478bd9Sstevel@tonic-gate */ 9087c478bd9Sstevel@tonic-gate int 9097c478bd9Sstevel@tonic-gate update_mode(Rt_map *lmp, int omode, int nmode) 9107c478bd9Sstevel@tonic-gate { 911dffec89cSrie Lm_list *lml = LIST(lmp); 9127c478bd9Sstevel@tonic-gate int pmode = 0; 9137c478bd9Sstevel@tonic-gate 9147c478bd9Sstevel@tonic-gate /* 9157c478bd9Sstevel@tonic-gate * A newly loaded object hasn't had its mode set yet. Modes are used to 9167c478bd9Sstevel@tonic-gate * load dependencies, so don't propagate any parent or no-load flags, as 9177c478bd9Sstevel@tonic-gate * these would adversely affect this objects ability to load any of its 9187c478bd9Sstevel@tonic-gate * dependencies that aren't already loaded. RTLD_FIRST is applicable to 9197c478bd9Sstevel@tonic-gate * this objects handle creation only, and should not be propagated. 9207c478bd9Sstevel@tonic-gate */ 9217c478bd9Sstevel@tonic-gate if ((FLAGS(lmp) & FLG_RT_MODESET) == 0) { 9227c478bd9Sstevel@tonic-gate MODE(lmp) |= nmode & ~(RTLD_PARENT | RTLD_NOLOAD | RTLD_FIRST); 9237c478bd9Sstevel@tonic-gate FLAGS(lmp) |= FLG_RT_MODESET; 9247c478bd9Sstevel@tonic-gate return (1); 9257c478bd9Sstevel@tonic-gate } 9267c478bd9Sstevel@tonic-gate 9277c478bd9Sstevel@tonic-gate /* 9287c478bd9Sstevel@tonic-gate * Establish any new overriding modes. RTLD_LAZY and RTLD_NOW should be 9297c478bd9Sstevel@tonic-gate * represented individually (this is historic, as these two flags were 9307c478bd9Sstevel@tonic-gate * the only flags originally available to dlopen()). Other flags are 9317c478bd9Sstevel@tonic-gate * accumulative, but have a hierarchy of preference. 9327c478bd9Sstevel@tonic-gate */ 9337c478bd9Sstevel@tonic-gate if ((omode & RTLD_LAZY) && (nmode & RTLD_NOW)) { 9347c478bd9Sstevel@tonic-gate MODE(lmp) &= ~RTLD_LAZY; 9357c478bd9Sstevel@tonic-gate pmode |= RTLD_NOW; 9367c478bd9Sstevel@tonic-gate } 9377c478bd9Sstevel@tonic-gate 9387c478bd9Sstevel@tonic-gate pmode |= ((~omode & nmode) & 9397c478bd9Sstevel@tonic-gate (RTLD_GLOBAL | RTLD_WORLD | RTLD_NODELETE)); 9407c478bd9Sstevel@tonic-gate if (pmode) { 9415aefb655Srie DBG_CALL(Dbg_file_mode_promote(lmp, pmode)); 9427c478bd9Sstevel@tonic-gate MODE(lmp) |= pmode; 9437c478bd9Sstevel@tonic-gate } 9447c478bd9Sstevel@tonic-gate 9457c478bd9Sstevel@tonic-gate /* 9467c478bd9Sstevel@tonic-gate * If this load is an RTLD_NOW request and the object has already been 9477c478bd9Sstevel@tonic-gate * loaded non-RTLD_NOW, append this object to the relocation-now list 9487c478bd9Sstevel@tonic-gate * of the objects associated control list. Note, if the object hasn't 9497c478bd9Sstevel@tonic-gate * yet been relocated, setting its MODE() to RTLD_NOW will establish 9507c478bd9Sstevel@tonic-gate * full relocation processing when it eventually gets relocated. 9517c478bd9Sstevel@tonic-gate */ 9527c478bd9Sstevel@tonic-gate if ((pmode & RTLD_NOW) && 9537c478bd9Sstevel@tonic-gate (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))) { 9547c478bd9Sstevel@tonic-gate Lm_cntl *lmc; 9557c478bd9Sstevel@tonic-gate 9567c478bd9Sstevel@tonic-gate /* LINTED */ 957cce0e03bSab196087 lmc = (Lm_cntl *)alist_item_by_offset(LIST(lmp)->lm_lists, 958cce0e03bSab196087 CNTL(lmp)); 959cce0e03bSab196087 (void) aplist_append(&lmc->lc_now, lmp, AL_CNT_LMNOW); 9607c478bd9Sstevel@tonic-gate } 9617c478bd9Sstevel@tonic-gate 9627c478bd9Sstevel@tonic-gate /* 963dffec89cSrie * If this objects .init has been collected but has not yet been called, 964dffec89cSrie * it may be necessary to reevaluate the object using tsort(). For 9657c478bd9Sstevel@tonic-gate * example, a new dlopen() hierarchy may bind to uninitialized objects 9667c478bd9Sstevel@tonic-gate * that are already loaded, or a dlopen(RTLD_NOW) can establish new 9677c478bd9Sstevel@tonic-gate * bindings between already loaded objects that require the tsort() 968dffec89cSrie * information be recomputed. If however, no new objects have been 969dffec89cSrie * added to the process, and this object hasn't been promoted, don't 970dffec89cSrie * bother reevaluating the .init. The present tsort() information is 971dffec89cSrie * probably as accurate as necessary, and by not establishing a parallel 972dffec89cSrie * tsort() we can help reduce the amount of recursion possible between 973dffec89cSrie * .inits. 9747c478bd9Sstevel@tonic-gate */ 975dffec89cSrie if (((FLAGS(lmp) & 976dffec89cSrie (FLG_RT_INITCLCT | FLG_RT_INITCALL)) == FLG_RT_INITCLCT) && 977dffec89cSrie ((lml->lm_flags & LML_FLG_OBJADDED) || ((pmode & RTLD_NOW) && 978dffec89cSrie (FLAGS(lmp) & (FLG_RT_RELOCED | FLG_RT_RELOCING))))) { 9797c478bd9Sstevel@tonic-gate FLAGS(lmp) &= ~FLG_RT_INITCLCT; 9807c478bd9Sstevel@tonic-gate LIST(lmp)->lm_init++; 981dffec89cSrie LIST(lmp)->lm_flags |= LML_FLG_OBJREEVAL; 9827c478bd9Sstevel@tonic-gate } 9837c478bd9Sstevel@tonic-gate 9847c478bd9Sstevel@tonic-gate return (pmode); 9857c478bd9Sstevel@tonic-gate } 9867c478bd9Sstevel@tonic-gate 9877c478bd9Sstevel@tonic-gate /* 9887c478bd9Sstevel@tonic-gate * Determine whether an alias name already exists, and if not create one. This 9897c478bd9Sstevel@tonic-gate * is typically used to retain dependency names, such as "libc.so.1", which 9907c478bd9Sstevel@tonic-gate * would have been expanded to full path names when they were loaded. The 99156deab07SRod Evans * full path names (NAME() and possibly PATHNAME()) are maintained on the 99256deab07SRod Evans * FullPathNode AVL tree, and thus would have been matched by fpavl_loaded() 99356deab07SRod Evans * during file_open(). 9947c478bd9Sstevel@tonic-gate */ 9957c478bd9Sstevel@tonic-gate int 9967c478bd9Sstevel@tonic-gate append_alias(Rt_map *lmp, const char *str, int *added) 9977c478bd9Sstevel@tonic-gate { 99856deab07SRod Evans const char *cp; 999cce0e03bSab196087 Aliste idx; 10007c478bd9Sstevel@tonic-gate 10017c478bd9Sstevel@tonic-gate /* 10027c478bd9Sstevel@tonic-gate * Determine if this filename is already on the alias list. 10037c478bd9Sstevel@tonic-gate */ 1004cce0e03bSab196087 for (APLIST_TRAVERSE(ALIAS(lmp), idx, cp)) { 1005cce0e03bSab196087 if (strcmp(cp, str) == 0) 10067c478bd9Sstevel@tonic-gate return (1); 10077c478bd9Sstevel@tonic-gate } 10087c478bd9Sstevel@tonic-gate 10097c478bd9Sstevel@tonic-gate /* 10107c478bd9Sstevel@tonic-gate * This is a new alias, append it to the alias list. 10117c478bd9Sstevel@tonic-gate */ 101256deab07SRod Evans if (((cp = stravl_insert(str, 0, 0, 0)) == NULL) || 101356deab07SRod Evans (aplist_append(&ALIAS(lmp), cp, AL_CNT_ALIAS) == NULL)) 10147c478bd9Sstevel@tonic-gate return (0); 10157c478bd9Sstevel@tonic-gate 10167c478bd9Sstevel@tonic-gate if (added) 10177c478bd9Sstevel@tonic-gate *added = 1; 10187c478bd9Sstevel@tonic-gate return (1); 10197c478bd9Sstevel@tonic-gate } 10207c478bd9Sstevel@tonic-gate 10217c478bd9Sstevel@tonic-gate /* 10227c478bd9Sstevel@tonic-gate * Determine whether a file is already loaded by comparing device and inode 10237c478bd9Sstevel@tonic-gate * values. 10247c478bd9Sstevel@tonic-gate */ 10257c478bd9Sstevel@tonic-gate static Rt_map * 1026cb511613SAli Bahrami is_devinode_loaded(rtld_stat_t *status, Lm_list *lml, const char *name, 10277c478bd9Sstevel@tonic-gate uint_t flags) 10287c478bd9Sstevel@tonic-gate { 10297c478bd9Sstevel@tonic-gate Lm_cntl *lmc; 1030cce0e03bSab196087 Aliste idx; 10317c478bd9Sstevel@tonic-gate 10327c478bd9Sstevel@tonic-gate /* 10337c478bd9Sstevel@tonic-gate * If this is an auditor, it will have been opened on a new link-map. 10348af2c5b9Srie * To prevent multiple occurrences of the same auditor on multiple 10357c478bd9Sstevel@tonic-gate * link-maps, search the head of each link-map list and see if this 10367c478bd9Sstevel@tonic-gate * object is already loaded as an auditor. 10377c478bd9Sstevel@tonic-gate */ 10387c478bd9Sstevel@tonic-gate if (flags & FLG_RT_AUDIT) { 10397c478bd9Sstevel@tonic-gate Lm_list *lml; 10407c478bd9Sstevel@tonic-gate 104157ef7aa9SRod Evans for (APLIST_TRAVERSE(dynlm_list, idx, lml)) { 10427c478bd9Sstevel@tonic-gate Rt_map *nlmp = lml->lm_head; 10437c478bd9Sstevel@tonic-gate 10447c478bd9Sstevel@tonic-gate if (nlmp && ((FLAGS(nlmp) & 10457c478bd9Sstevel@tonic-gate (FLG_RT_AUDIT | FLG_RT_DELETE)) == FLG_RT_AUDIT) && 10467c478bd9Sstevel@tonic-gate (STDEV(nlmp) == status->st_dev) && 10477c478bd9Sstevel@tonic-gate (STINO(nlmp) == status->st_ino)) 10487c478bd9Sstevel@tonic-gate return (nlmp); 10497c478bd9Sstevel@tonic-gate } 105037ffaf83SRod Evans return (NULL); 10517c478bd9Sstevel@tonic-gate } 10527c478bd9Sstevel@tonic-gate 10537c478bd9Sstevel@tonic-gate /* 10547c478bd9Sstevel@tonic-gate * If the file has been found determine from the new files status 10557c478bd9Sstevel@tonic-gate * information if this file is actually linked to one we already have 10567c478bd9Sstevel@tonic-gate * mapped. This catches symlink names not caught by is_so_loaded(). 10577c478bd9Sstevel@tonic-gate */ 1058cce0e03bSab196087 for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) { 10597c478bd9Sstevel@tonic-gate Rt_map *nlmp; 10607c478bd9Sstevel@tonic-gate 1061cb511613SAli Bahrami for (nlmp = lmc->lc_head; nlmp; nlmp = NEXT_RT_MAP(nlmp)) { 10627c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_DELETE) || 10637c478bd9Sstevel@tonic-gate (FLAGS1(nlmp) & FL1_RT_LDDSTUB)) 10647c478bd9Sstevel@tonic-gate continue; 10657c478bd9Sstevel@tonic-gate 10667c478bd9Sstevel@tonic-gate if ((STDEV(nlmp) != status->st_dev) || 10677c478bd9Sstevel@tonic-gate (STINO(nlmp) != status->st_ino)) 10687c478bd9Sstevel@tonic-gate continue; 10697c478bd9Sstevel@tonic-gate 10707c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_VERBOSE) { 10717247f888Srie /* BEGIN CSTYLED */ 10727c478bd9Sstevel@tonic-gate if (*name == '/') 10737c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), 10747c478bd9Sstevel@tonic-gate name, MSG_ORIG(MSG_STR_EMPTY), 10757c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY)); 10767c478bd9Sstevel@tonic-gate else 10777c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), 10787c478bd9Sstevel@tonic-gate name, NAME(nlmp), 10797c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY), 10807c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY)); 10817247f888Srie /* END CSTYLED */ 10827c478bd9Sstevel@tonic-gate } 10837c478bd9Sstevel@tonic-gate return (nlmp); 10847c478bd9Sstevel@tonic-gate } 10857c478bd9Sstevel@tonic-gate } 108637ffaf83SRod Evans return (NULL); 10877c478bd9Sstevel@tonic-gate } 10887c478bd9Sstevel@tonic-gate 10897c478bd9Sstevel@tonic-gate /* 10907c478bd9Sstevel@tonic-gate * Generate any error messages indicating a file could not be found. When 10917c478bd9Sstevel@tonic-gate * preloading or auditing a secure application, it can be a little more helpful 10927c478bd9Sstevel@tonic-gate * to indicate that a search of secure directories has failed, so adjust the 10937c478bd9Sstevel@tonic-gate * messages accordingly. 10947c478bd9Sstevel@tonic-gate */ 10957c478bd9Sstevel@tonic-gate void 10967c478bd9Sstevel@tonic-gate file_notfound(Lm_list *lml, const char *name, Rt_map *clmp, uint_t flags, 10977c478bd9Sstevel@tonic-gate Rej_desc *rej) 10987c478bd9Sstevel@tonic-gate { 10997c478bd9Sstevel@tonic-gate int secure = 0; 11007c478bd9Sstevel@tonic-gate 11017c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_SECURE) && 11027c478bd9Sstevel@tonic-gate (flags & (FLG_RT_PRELOAD | FLG_RT_AUDIT))) 11037c478bd9Sstevel@tonic-gate secure++; 11047c478bd9Sstevel@tonic-gate 11057c478bd9Sstevel@tonic-gate if (lml->lm_flags & LML_FLG_TRC_ENABLE) { 11067c478bd9Sstevel@tonic-gate /* 11077c478bd9Sstevel@tonic-gate * Under ldd(1), auxiliary filtees that can't be loaded are 11087c478bd9Sstevel@tonic-gate * ignored, unless verbose errors are requested. 11097c478bd9Sstevel@tonic-gate */ 11107c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_SILENCERR) && 11117c478bd9Sstevel@tonic-gate ((lml->lm_flags & LML_FLG_TRC_VERBOSE) == 0)) 11127c478bd9Sstevel@tonic-gate return; 11137c478bd9Sstevel@tonic-gate 11147c478bd9Sstevel@tonic-gate if (secure) 11157c478bd9Sstevel@tonic-gate trace_so(clmp, rej, name, 0, 0, 11167c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_SEC_NFOUND)); 11177c478bd9Sstevel@tonic-gate else 11187c478bd9Sstevel@tonic-gate trace_so(clmp, rej, name, 0, 0, 11197c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_FIL_NFOUND)); 11207c478bd9Sstevel@tonic-gate return; 11217c478bd9Sstevel@tonic-gate } 11227c478bd9Sstevel@tonic-gate 11237c478bd9Sstevel@tonic-gate if (rej->rej_type) { 1124de777a60Sab196087 Conv_reject_desc_buf_t rej_buf; 1125de777a60Sab196087 11265aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(err_reject[rej->rej_type]), 11277c478bd9Sstevel@tonic-gate rej->rej_name ? rej->rej_name : MSG_INTL(MSG_STR_UNKNOWN), 1128ba2be530Sab196087 conv_reject_desc(rej, &rej_buf, M_MACH)); 11297c478bd9Sstevel@tonic-gate return; 11307c478bd9Sstevel@tonic-gate } 11317c478bd9Sstevel@tonic-gate 11327c478bd9Sstevel@tonic-gate if (secure) 11335aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SEC_OPEN), name); 11347c478bd9Sstevel@tonic-gate else 11355aefb655Srie eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), name, 11367c478bd9Sstevel@tonic-gate strerror(ENOENT)); 11377c478bd9Sstevel@tonic-gate } 11387c478bd9Sstevel@tonic-gate 11397c478bd9Sstevel@tonic-gate static int 114056deab07SRod Evans file_open(int err, Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, 114156deab07SRod Evans Rej_desc *rej, int *in_nfavl) 11427c478bd9Sstevel@tonic-gate { 1143cb511613SAli Bahrami rtld_stat_t status; 11447c478bd9Sstevel@tonic-gate Rt_map *nlmp; 11459aa23310Srie avl_index_t nfavlwhere = 0; 114656deab07SRod Evans const char *oname = fdp->fd_oname, *nname = fdp->fd_nname; 114756deab07SRod Evans uint_t hash = sgs_str_hash(nname); 11487c478bd9Sstevel@tonic-gate 11497c478bd9Sstevel@tonic-gate 115056deab07SRod Evans if ((nname = stravl_insert(fdp->fd_nname, hash, 0, 0)) == NULL) 115156deab07SRod Evans return (0); 115256deab07SRod Evans fdp->fd_nname = nname; 115356deab07SRod Evans 115456deab07SRod Evans if ((err == 0) && (fdp->fd_flags & FLG_FD_ALTER)) 11555aefb655Srie DBG_CALL(Dbg_file_config_obj(lml, oname, 0, nname)); 11567c478bd9Sstevel@tonic-gate 11577c478bd9Sstevel@tonic-gate /* 11587c478bd9Sstevel@tonic-gate * If we're dealing with a full pathname, determine whether this 11597c478bd9Sstevel@tonic-gate * pathname is already known. Other pathnames fall through to the 11607c478bd9Sstevel@tonic-gate * dev/inode check, as even though the pathname may look the same as 11617c478bd9Sstevel@tonic-gate * one previously used, the process may have changed directory. 11627c478bd9Sstevel@tonic-gate */ 11637c478bd9Sstevel@tonic-gate if ((err == 0) && (nname[0] == '/')) { 116456deab07SRod Evans if ((nlmp = fpavl_recorded(lml, nname, hash, 116556deab07SRod Evans &(fdp->fd_avlwhere))) != NULL) { 116656deab07SRod Evans fdp->fd_lmp = nlmp; 11677c478bd9Sstevel@tonic-gate return (1); 11687c478bd9Sstevel@tonic-gate } 116908278a5eSRod Evans if (pnavl_recorded(&nfavl, nname, hash, &nfavlwhere)) { 11709aa23310Srie /* 11719aa23310Srie * For dlopen() and dlsym() fall backs, indicate that 11729aa23310Srie * a registered not-found path has indicated that this 11739aa23310Srie * object does not exist. If this path has been 117408278a5eSRod Evans * constructed as part of expanding a CAPABILITY 117508278a5eSRod Evans * directory, this is a silent failure, where no 117608278a5eSRod Evans * rejection message is created. 11779aa23310Srie */ 11789aa23310Srie if (in_nfavl) 11799aa23310Srie (*in_nfavl)++; 11809aa23310Srie return (0); 11819aa23310Srie } 11827c478bd9Sstevel@tonic-gate } 11837c478bd9Sstevel@tonic-gate 1184cb511613SAli Bahrami if ((err == 0) && ((rtld_stat(nname, &status)) != -1)) { 11857c478bd9Sstevel@tonic-gate char path[PATH_MAX]; 11867c478bd9Sstevel@tonic-gate int fd, size, added; 11877c478bd9Sstevel@tonic-gate 11887c478bd9Sstevel@tonic-gate /* 11897c478bd9Sstevel@tonic-gate * If this path has been constructed as part of expanding a 119008278a5eSRod Evans * CAPABILITY directory, ignore any subdirectories. As this 119108278a5eSRod Evans * is a silent failure, no rejection message is created. For 119208278a5eSRod Evans * any other reference that expands to a directory, fall 119308278a5eSRod Evans * through to construct a meaningful rejection message. 11947c478bd9Sstevel@tonic-gate */ 119508278a5eSRod Evans if ((flags & FLG_RT_CAP) && 119656deab07SRod Evans ((status.st_mode & S_IFMT) == S_IFDIR)) 119756deab07SRod Evans return (0); 119856deab07SRod Evans 119956deab07SRod Evans /* 120056deab07SRod Evans * If this is a directory (which can't be mmap()'ed) generate a 120156deab07SRod Evans * precise error message. 120256deab07SRod Evans */ 120356deab07SRod Evans if ((status.st_mode & S_IFMT) == S_IFDIR) { 120456deab07SRod Evans rej->rej_name = nname; 120556deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER) 120656deab07SRod Evans rej->rej_flags = FLG_REJ_ALTER; 120756deab07SRod Evans rej->rej_type = SGS_REJ_STR; 120856deab07SRod Evans rej->rej_str = strerror(EISDIR); 120956deab07SRod Evans DBG_CALL(Dbg_file_rejected(lml, rej, M_MACH)); 12107c478bd9Sstevel@tonic-gate return (0); 12118521e5e6Srie } 12127c478bd9Sstevel@tonic-gate 12137c478bd9Sstevel@tonic-gate /* 12147c478bd9Sstevel@tonic-gate * Resolve the filename and determine whether the resolved name 12157c478bd9Sstevel@tonic-gate * is already known. Typically, the previous fpavl_loaded() 12167c478bd9Sstevel@tonic-gate * will have caught this, as both NAME() and PATHNAME() for a 121756deab07SRod Evans * link-map are recorded in the FullPathNode AVL tree. However, 12187c478bd9Sstevel@tonic-gate * instances exist where a file can be replaced (loop-back 12197c478bd9Sstevel@tonic-gate * mounts, bfu, etc.), and reference is made to the original 12207c478bd9Sstevel@tonic-gate * file through a symbolic link. By checking the pathname here, 12217c478bd9Sstevel@tonic-gate * we don't fall through to the dev/inode check and conclude 12227c478bd9Sstevel@tonic-gate * that a new file should be loaded. 12237c478bd9Sstevel@tonic-gate */ 122456deab07SRod Evans if ((nname[0] == '/') && 12257c478bd9Sstevel@tonic-gate ((size = resolvepath(nname, path, (PATH_MAX - 1))) > 0)) { 12267c478bd9Sstevel@tonic-gate path[size] = '\0'; 12277c478bd9Sstevel@tonic-gate 122856deab07SRod Evans fdp->fd_flags |= FLG_FD_RESOLVED; 122956deab07SRod Evans 12307c478bd9Sstevel@tonic-gate if (strcmp(nname, path)) { 123124a6229eSrie if ((nlmp = 123256deab07SRod Evans fpavl_recorded(lml, path, 0, 0)) != NULL) { 12337c478bd9Sstevel@tonic-gate added = 0; 12347c478bd9Sstevel@tonic-gate 12357c478bd9Sstevel@tonic-gate if (append_alias(nlmp, nname, 12367c478bd9Sstevel@tonic-gate &added) == 0) 12377c478bd9Sstevel@tonic-gate return (0); 12387247f888Srie /* BEGIN CSTYLED */ 12397c478bd9Sstevel@tonic-gate if (added) 124010a4fa49Srie DBG_CALL(Dbg_file_skip(LIST(clmp), 12415aefb655Srie NAME(nlmp), nname)); 12427247f888Srie /* END CSTYLED */ 124356deab07SRod Evans fdp->fd_lmp = nlmp; 12447c478bd9Sstevel@tonic-gate return (1); 12457c478bd9Sstevel@tonic-gate } 12467c478bd9Sstevel@tonic-gate 12477c478bd9Sstevel@tonic-gate /* 12487c478bd9Sstevel@tonic-gate * If this pathname hasn't been loaded, save 12497c478bd9Sstevel@tonic-gate * the resolved pathname so that it doesn't 12507c478bd9Sstevel@tonic-gate * have to be recomputed as part of fullpath() 12517c478bd9Sstevel@tonic-gate * processing. 12527c478bd9Sstevel@tonic-gate */ 125356deab07SRod Evans if ((fdp->fd_pname = stravl_insert(path, 0, 125456deab07SRod Evans (size + 1), 0)) == NULL) 12557c478bd9Sstevel@tonic-gate return (0); 12567c478bd9Sstevel@tonic-gate } 12577c478bd9Sstevel@tonic-gate } 12587c478bd9Sstevel@tonic-gate 12597c478bd9Sstevel@tonic-gate if (nlmp = is_devinode_loaded(&status, lml, nname, flags)) { 1260c75e1b9dSrie if (flags & FLG_RT_AUDIT) { 1261c75e1b9dSrie /* 1262c75e1b9dSrie * If we've been requested to load an auditor, 1263c75e1b9dSrie * and an auditor of the same name already 1264c75e1b9dSrie * exists, then the original auditor is used. 1265c75e1b9dSrie */ 1266c75e1b9dSrie DBG_CALL(Dbg_audit_skip(LIST(clmp), 1267c75e1b9dSrie NAME(nlmp), LIST(nlmp)->lm_lmidstr)); 1268c75e1b9dSrie } else { 1269c75e1b9dSrie /* 1270c75e1b9dSrie * Otherwise, if an alternatively named file 1271c75e1b9dSrie * has been found for the same dev/inode, add 127256deab07SRod Evans * a new name alias. Insert any alias full path 127356deab07SRod Evans * name in the FullPathNode AVL tree. 1274c75e1b9dSrie */ 12757c478bd9Sstevel@tonic-gate added = 0; 12767c478bd9Sstevel@tonic-gate 12777c478bd9Sstevel@tonic-gate if (append_alias(nlmp, nname, &added) == 0) 12787c478bd9Sstevel@tonic-gate return (0); 12797c478bd9Sstevel@tonic-gate if (added) { 1280c75e1b9dSrie if ((nname[0] == '/') && 1281c75e1b9dSrie (fpavl_insert(lml, nlmp, 1282c75e1b9dSrie nname, 0) == 0)) 12837c478bd9Sstevel@tonic-gate return (0); 1284c75e1b9dSrie DBG_CALL(Dbg_file_skip(LIST(clmp), 1285c75e1b9dSrie NAME(nlmp), nname)); 12867c478bd9Sstevel@tonic-gate } 1287c75e1b9dSrie } 1288c75e1b9dSrie 1289c75e1b9dSrie /* 1290c75e1b9dSrie * Record in the file descriptor the existing object 1291c75e1b9dSrie * that satisfies this open request. 1292c75e1b9dSrie */ 129356deab07SRod Evans fdp->fd_lmp = nlmp; 12947c478bd9Sstevel@tonic-gate return (1); 12957c478bd9Sstevel@tonic-gate } 12967c478bd9Sstevel@tonic-gate 12977c478bd9Sstevel@tonic-gate if ((fd = open(nname, O_RDONLY, 0)) == -1) { 12987c478bd9Sstevel@tonic-gate /* 12997c478bd9Sstevel@tonic-gate * As the file must exist for the previous stat() to 13007c478bd9Sstevel@tonic-gate * have succeeded, record the error condition. 13017c478bd9Sstevel@tonic-gate */ 13027c478bd9Sstevel@tonic-gate rej->rej_type = SGS_REJ_STR; 13037c478bd9Sstevel@tonic-gate rej->rej_str = strerror(errno); 13047c478bd9Sstevel@tonic-gate } else { 130556deab07SRod Evans /* 130656deab07SRod Evans * Map the object. A successful return indicates that 130756deab07SRod Evans * the object is appropriate for ld.so.1 processing. 130856deab07SRod Evans */ 130956deab07SRod Evans fdp->fd_ftp = map_obj(lml, fdp, status.st_size, nname, 131056deab07SRod Evans fd, rej); 131156deab07SRod Evans (void) close(fd); 13127c478bd9Sstevel@tonic-gate 131356deab07SRod Evans if (fdp->fd_ftp != NULL) { 131456deab07SRod Evans fdp->fd_dev = status.st_dev; 131556deab07SRod Evans fdp->fd_ino = status.st_ino; 13167c478bd9Sstevel@tonic-gate return (1); 13177c478bd9Sstevel@tonic-gate } 13187c478bd9Sstevel@tonic-gate } 13197c478bd9Sstevel@tonic-gate 13207c478bd9Sstevel@tonic-gate } else if (errno != ENOENT) { 13217c478bd9Sstevel@tonic-gate /* 13227c478bd9Sstevel@tonic-gate * If the open() failed for anything other than the file not 13237c478bd9Sstevel@tonic-gate * existing, record the error condition. 13247c478bd9Sstevel@tonic-gate */ 13257c478bd9Sstevel@tonic-gate rej->rej_type = SGS_REJ_STR; 13267c478bd9Sstevel@tonic-gate rej->rej_str = strerror(errno); 13277c478bd9Sstevel@tonic-gate } 13287c478bd9Sstevel@tonic-gate 13297c478bd9Sstevel@tonic-gate /* 13309aa23310Srie * Regardless of error, duplicate and record any full path names that 13319aa23310Srie * can't be used on the "not-found" AVL tree. 13329aa23310Srie */ 133356deab07SRod Evans if (nname[0] == '/') 133456deab07SRod Evans nfavl_insert(nname, nfavlwhere); 13359aa23310Srie 13369aa23310Srie /* 13377c478bd9Sstevel@tonic-gate * Indicate any rejection. 13387c478bd9Sstevel@tonic-gate */ 13397c478bd9Sstevel@tonic-gate if (rej->rej_type) { 13407c478bd9Sstevel@tonic-gate rej->rej_name = nname; 134156deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER) 134256deab07SRod Evans rej->rej_flags = FLG_REJ_ALTER; 1343ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, rej, M_MACH)); 13447c478bd9Sstevel@tonic-gate } 13457c478bd9Sstevel@tonic-gate return (0); 13467c478bd9Sstevel@tonic-gate } 13477c478bd9Sstevel@tonic-gate 13487c478bd9Sstevel@tonic-gate /* 13497c478bd9Sstevel@tonic-gate * Find a full pathname (it contains a "/"). 13507c478bd9Sstevel@tonic-gate */ 13517c478bd9Sstevel@tonic-gate int 135256deab07SRod Evans find_path(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej, 135356deab07SRod Evans int *in_nfavl) 13547c478bd9Sstevel@tonic-gate { 135556deab07SRod Evans const char *oname = fdp->fd_oname; 13567c478bd9Sstevel@tonic-gate int err = 0; 13577c478bd9Sstevel@tonic-gate 13587c478bd9Sstevel@tonic-gate /* 13597c478bd9Sstevel@tonic-gate * If directory configuration exists determine if this path is known. 13607c478bd9Sstevel@tonic-gate */ 13617c478bd9Sstevel@tonic-gate if (rtld_flags & RT_FL_DIRCFG) { 13627c478bd9Sstevel@tonic-gate Rtc_obj *obj; 13637c478bd9Sstevel@tonic-gate const char *aname; 13647c478bd9Sstevel@tonic-gate 13657c478bd9Sstevel@tonic-gate if ((obj = elf_config_ent(oname, (Word)elf_hash(oname), 13667c478bd9Sstevel@tonic-gate 0, &aname)) != 0) { 13677c478bd9Sstevel@tonic-gate /* 13687c478bd9Sstevel@tonic-gate * If the configuration file states that this path is a 13697c478bd9Sstevel@tonic-gate * directory, or the path is explicitly defined as 13707c478bd9Sstevel@tonic-gate * non-existent (ie. a unused platform specific 13717c478bd9Sstevel@tonic-gate * library), then go no further. 13727c478bd9Sstevel@tonic-gate */ 13737c478bd9Sstevel@tonic-gate if (obj->co_flags & RTC_OBJ_DIRENT) { 13747c478bd9Sstevel@tonic-gate err = EISDIR; 13757c478bd9Sstevel@tonic-gate } else if ((obj->co_flags & 13767c478bd9Sstevel@tonic-gate (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == 13777c478bd9Sstevel@tonic-gate RTC_OBJ_NOEXIST) { 13787c478bd9Sstevel@tonic-gate err = ENOENT; 13797c478bd9Sstevel@tonic-gate } else if ((obj->co_flags & RTC_OBJ_ALTER) && 13807c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_OBJALT) && (lml == &lml_main)) { 13817c478bd9Sstevel@tonic-gate int ret; 13827c478bd9Sstevel@tonic-gate 138356deab07SRod Evans fdp->fd_flags |= FLG_FD_ALTER; 138456deab07SRod Evans fdp->fd_nname = aname; 138556deab07SRod Evans 13867c478bd9Sstevel@tonic-gate /* 13877c478bd9Sstevel@tonic-gate * Attempt to open the alternative path. If 13887c478bd9Sstevel@tonic-gate * this fails, and the alternative is flagged 13897c478bd9Sstevel@tonic-gate * as optional, fall through to open the 13907c478bd9Sstevel@tonic-gate * original path. 13917c478bd9Sstevel@tonic-gate */ 13925aefb655Srie DBG_CALL(Dbg_libs_found(lml, aname, 13935aefb655Srie FLG_FD_ALTER)); 139456deab07SRod Evans ret = file_open(0, lml, clmp, flags, fdp, 139556deab07SRod Evans rej, in_nfavl); 139656deab07SRod Evans if (ret || ((obj->co_flags & 139756deab07SRod Evans RTC_OBJ_OPTINAL) == 0)) 13987c478bd9Sstevel@tonic-gate return (ret); 13997c478bd9Sstevel@tonic-gate 140056deab07SRod Evans fdp->fd_flags &= ~FLG_FD_ALTER; 14017c478bd9Sstevel@tonic-gate } 14027c478bd9Sstevel@tonic-gate } 14037c478bd9Sstevel@tonic-gate } 14045aefb655Srie DBG_CALL(Dbg_libs_found(lml, oname, 0)); 140556deab07SRod Evans fdp->fd_nname = oname; 140656deab07SRod Evans return (file_open(err, lml, clmp, flags, fdp, rej, in_nfavl)); 14077c478bd9Sstevel@tonic-gate } 14087c478bd9Sstevel@tonic-gate 14097c478bd9Sstevel@tonic-gate /* 14107c478bd9Sstevel@tonic-gate * Find a simple filename (it doesn't contain a "/"). 14117c478bd9Sstevel@tonic-gate */ 14127c478bd9Sstevel@tonic-gate static int 141356deab07SRod Evans _find_file(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej, 141456deab07SRod Evans Pdesc *pdp, int aflag, int *in_nfavl) 14157c478bd9Sstevel@tonic-gate { 141656deab07SRod Evans const char *nname = fdp->fd_nname; 141756deab07SRod Evans 14185aefb655Srie DBG_CALL(Dbg_libs_found(lml, nname, aflag)); 14197c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_TRC_SEARCH) && 14207c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) { 14217c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_PTH_TRYING), nname, aflag ? 14227c478bd9Sstevel@tonic-gate MSG_INTL(MSG_LDD_FIL_ALTER) : MSG_ORIG(MSG_STR_EMPTY)); 14237c478bd9Sstevel@tonic-gate } 14247c478bd9Sstevel@tonic-gate 14257c478bd9Sstevel@tonic-gate /* 14267c478bd9Sstevel@tonic-gate * If we're being audited tell the audit library of the file we're about 14277c478bd9Sstevel@tonic-gate * to go search for. The audit library may offer an alternative 14287c478bd9Sstevel@tonic-gate * dependency, or indicate that this dependency should be ignored. 14297c478bd9Sstevel@tonic-gate */ 143056deab07SRod Evans if ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_OBJSEARCH) { 14319aa23310Srie char *aname; 14327c478bd9Sstevel@tonic-gate 14339aa23310Srie if ((aname = audit_objsearch(clmp, nname, 143456deab07SRod Evans (pdp->pd_flags & LA_SER_MASK))) == NULL) { 14357247f888Srie DBG_CALL(Dbg_audit_terminate(lml, nname)); 14367c478bd9Sstevel@tonic-gate return (0); 14377247f888Srie } 14387247f888Srie 143956deab07SRod Evans if (aname != nname) { 144056deab07SRod Evans fdp->fd_flags &= ~FLG_FD_SLASH; 144156deab07SRod Evans fdp->fd_nname = aname; 14427c478bd9Sstevel@tonic-gate } 144356deab07SRod Evans } 144456deab07SRod Evans return (file_open(0, lml, clmp, flags, fdp, rej, in_nfavl)); 14457c478bd9Sstevel@tonic-gate } 14467c478bd9Sstevel@tonic-gate 1447390b98b5Srie static int 144856deab07SRod Evans find_file(Lm_list *lml, Rt_map *clmp, uint_t flags, Fdesc *fdp, Rej_desc *rej, 144956deab07SRod Evans Pdesc *pdp, Word *strhash, int *in_nfavl) 14507c478bd9Sstevel@tonic-gate { 14517c478bd9Sstevel@tonic-gate static Rtc_obj Obj = { 0 }; 14527c478bd9Sstevel@tonic-gate Rtc_obj *dobj; 145356deab07SRod Evans const char *oname = fdp->fd_oname; 145456deab07SRod Evans size_t olen = strlen(oname); 14557c478bd9Sstevel@tonic-gate 145656deab07SRod Evans if (pdp->pd_pname == NULL) 14577c478bd9Sstevel@tonic-gate return (0); 145856deab07SRod Evans if (pdp->pd_info) { 145956deab07SRod Evans dobj = (Rtc_obj *)pdp->pd_info; 14607c478bd9Sstevel@tonic-gate if ((dobj->co_flags & 14617c478bd9Sstevel@tonic-gate (RTC_OBJ_NOEXIST | RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 14627c478bd9Sstevel@tonic-gate return (0); 14637c478bd9Sstevel@tonic-gate } else 146456deab07SRod Evans dobj = NULL; 14657c478bd9Sstevel@tonic-gate 14667c478bd9Sstevel@tonic-gate /* 14677c478bd9Sstevel@tonic-gate * If configuration information exists see if this directory/file 14687c478bd9Sstevel@tonic-gate * combination exists. 14697c478bd9Sstevel@tonic-gate */ 14707c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_DIRCFG) && 147156deab07SRod Evans ((dobj == NULL) || (dobj->co_id != 0))) { 14727c478bd9Sstevel@tonic-gate Rtc_obj *fobj; 147356deab07SRod Evans const char *aname = NULL; 14747c478bd9Sstevel@tonic-gate 14757c478bd9Sstevel@tonic-gate /* 147656deab07SRod Evans * If this object descriptor has not yet been searched for in 147756deab07SRod Evans * the configuration file go find it. 14787c478bd9Sstevel@tonic-gate */ 147956deab07SRod Evans if (dobj == NULL) { 148056deab07SRod Evans dobj = elf_config_ent(pdp->pd_pname, 148156deab07SRod Evans (Word)elf_hash(pdp->pd_pname), 0, 0); 148256deab07SRod Evans if (dobj == NULL) 14837c478bd9Sstevel@tonic-gate dobj = &Obj; 148456deab07SRod Evans pdp->pd_info = (void *)dobj; 14857c478bd9Sstevel@tonic-gate 14867c478bd9Sstevel@tonic-gate if ((dobj->co_flags & (RTC_OBJ_NOEXIST | 14877c478bd9Sstevel@tonic-gate RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 14887c478bd9Sstevel@tonic-gate return (0); 14897c478bd9Sstevel@tonic-gate } 14907c478bd9Sstevel@tonic-gate 14917c478bd9Sstevel@tonic-gate /* 14927c478bd9Sstevel@tonic-gate * If we found a directory search for the file. 14937c478bd9Sstevel@tonic-gate */ 14947c478bd9Sstevel@tonic-gate if (dobj->co_id != 0) { 149556deab07SRod Evans if (*strhash == NULL) 149656deab07SRod Evans *strhash = (Word)elf_hash(oname); 149756deab07SRod Evans fobj = elf_config_ent(oname, *strhash, 149856deab07SRod Evans dobj->co_id, &aname); 14997c478bd9Sstevel@tonic-gate 15007c478bd9Sstevel@tonic-gate /* 15017c478bd9Sstevel@tonic-gate * If this object specifically does not exist, or the 15027c478bd9Sstevel@tonic-gate * object can't be found in a know-all-entries 15037c478bd9Sstevel@tonic-gate * directory, continue looking. If the object does 15047c478bd9Sstevel@tonic-gate * exist determine if an alternative object exists. 15057c478bd9Sstevel@tonic-gate */ 150656deab07SRod Evans if (fobj == NULL) { 15077c478bd9Sstevel@tonic-gate if (dobj->co_flags & RTC_OBJ_ALLENTS) 15087c478bd9Sstevel@tonic-gate return (0); 15097c478bd9Sstevel@tonic-gate } else { 15107c478bd9Sstevel@tonic-gate if ((fobj->co_flags & (RTC_OBJ_NOEXIST | 15117c478bd9Sstevel@tonic-gate RTC_OBJ_ALTER)) == RTC_OBJ_NOEXIST) 15127c478bd9Sstevel@tonic-gate return (0); 15137c478bd9Sstevel@tonic-gate 15147c478bd9Sstevel@tonic-gate if ((fobj->co_flags & RTC_OBJ_ALTER) && 15157c478bd9Sstevel@tonic-gate (rtld_flags & RT_FL_OBJALT) && 15167c478bd9Sstevel@tonic-gate (lml == &lml_main)) { 15177c478bd9Sstevel@tonic-gate int ret; 15187c478bd9Sstevel@tonic-gate 151956deab07SRod Evans fdp->fd_flags |= FLG_FD_ALTER; 152056deab07SRod Evans fdp->fd_nname = aname; 152156deab07SRod Evans 15227c478bd9Sstevel@tonic-gate /* 15237c478bd9Sstevel@tonic-gate * Attempt to open the alternative path. 15247c478bd9Sstevel@tonic-gate * If this fails, and the alternative is 15257c478bd9Sstevel@tonic-gate * flagged as optional, fall through to 15267c478bd9Sstevel@tonic-gate * open the original path. 15277c478bd9Sstevel@tonic-gate */ 152856deab07SRod Evans ret = _find_file(lml, clmp, flags, fdp, 152956deab07SRod Evans rej, pdp, 1, in_nfavl); 15307c478bd9Sstevel@tonic-gate if (ret || ((fobj->co_flags & 15317c478bd9Sstevel@tonic-gate RTC_OBJ_OPTINAL) == 0)) 15327c478bd9Sstevel@tonic-gate return (ret); 15337c478bd9Sstevel@tonic-gate 153456deab07SRod Evans fdp->fd_flags &= ~FLG_FD_ALTER; 15357c478bd9Sstevel@tonic-gate } 15367c478bd9Sstevel@tonic-gate } 15377c478bd9Sstevel@tonic-gate } 15387c478bd9Sstevel@tonic-gate } 15397c478bd9Sstevel@tonic-gate 15407c478bd9Sstevel@tonic-gate /* 15417c478bd9Sstevel@tonic-gate * Protect ourselves from building an invalid pathname. 15427c478bd9Sstevel@tonic-gate */ 154356deab07SRod Evans if ((olen + pdp->pd_plen + 1) >= PATH_MAX) { 154456deab07SRod Evans eprintf(lml, ERR_FATAL, MSG_INTL(MSG_SYS_OPEN), oname, 15457c478bd9Sstevel@tonic-gate strerror(ENAMETOOLONG)); 15467c478bd9Sstevel@tonic-gate return (0); 15477c478bd9Sstevel@tonic-gate } 154856deab07SRod Evans if ((fdp->fd_nname = (LM_GET_SO(clmp)(pdp->pd_pname, oname, 154956deab07SRod Evans pdp->pd_plen, olen))) == NULL) 15507c478bd9Sstevel@tonic-gate return (0); 15517c478bd9Sstevel@tonic-gate 155256deab07SRod Evans return (_find_file(lml, clmp, flags, fdp, rej, pdp, 0, in_nfavl)); 155356deab07SRod Evans } 155456deab07SRod Evans 155556deab07SRod Evans static Fct *Vector[] = { 155656deab07SRod Evans &elf_fct, 155756deab07SRod Evans #ifdef A_OUT 155856deab07SRod Evans &aout_fct, 155956deab07SRod Evans #endif 156056deab07SRod Evans 0 156156deab07SRod Evans }; 156256deab07SRod Evans 156356deab07SRod Evans /* 156456deab07SRod Evans * Remap the first page of a file to provide a better diagnostic as to why 156556deab07SRod Evans * an mmapobj(2) operation on this file failed. Sadly, mmapobj(), and all 156656deab07SRod Evans * system calls for that matter, only pass back a generic failure in errno. 156756deab07SRod Evans * Hopefully one day this will be improved, but in the mean time we repeat 156856deab07SRod Evans * the kernels ELF verification to try and provide more detailed information. 156956deab07SRod Evans */ 157056deab07SRod Evans static int 157156deab07SRod Evans map_fail(Fdesc *fdp, size_t fsize, const char *name, int fd, Rej_desc *rej) 157256deab07SRod Evans { 157356deab07SRod Evans caddr_t addr; 157456deab07SRod Evans int vnum; 157556deab07SRod Evans size_t size; 157656deab07SRod Evans 157756deab07SRod Evans /* 157856deab07SRod Evans * Use the original file size to determine what to map, and catch the 157956deab07SRod Evans * obvious error of a zero sized file. 158056deab07SRod Evans */ 158156deab07SRod Evans if (fsize == 0) { 158256deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE; 158356deab07SRod Evans return (1); 158456deab07SRod Evans } else if (fsize < syspagsz) 158556deab07SRod Evans size = fsize; 158656deab07SRod Evans else 158756deab07SRod Evans size = syspagsz; 158856deab07SRod Evans 158956deab07SRod Evans if ((addr = mmap(0, size, PROT_READ, MAP_PRIVATE, fd, 0)) == MAP_FAILED) 159056deab07SRod Evans return (0); 159156deab07SRod Evans 159256deab07SRod Evans rej->rej_type = 0; 159356deab07SRod Evans 159456deab07SRod Evans /* 159556deab07SRod Evans * Validate the file against each supported file type. Should a 159656deab07SRod Evans * characteristic of the file be found invalid for this platform, a 159756deab07SRod Evans * rejection message will have been recorded. 159856deab07SRod Evans */ 159956deab07SRod Evans for (vnum = 0; Vector[vnum]; vnum++) { 160056deab07SRod Evans if (((Vector[vnum]->fct_verify_file)(addr, size, 160156deab07SRod Evans fdp, name, rej) == 0) && rej->rej_type) 160256deab07SRod Evans break; 160356deab07SRod Evans } 160456deab07SRod Evans 160556deab07SRod Evans /* 160656deab07SRod Evans * If no rejection message has been recorded, then this is simply an 160756deab07SRod Evans * unknown file type. 160856deab07SRod Evans */ 160956deab07SRod Evans if (rej->rej_type == 0) 161056deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE; 161156deab07SRod Evans 161256deab07SRod Evans (void) munmap(addr, size); 161356deab07SRod Evans return (1); 161456deab07SRod Evans } 161556deab07SRod Evans 161656deab07SRod Evans /* 161756deab07SRod Evans * Unmap a file. 161856deab07SRod Evans */ 161956deab07SRod Evans void 162056deab07SRod Evans unmap_obj(mmapobj_result_t *mpp, uint_t mapnum) 162156deab07SRod Evans { 162256deab07SRod Evans uint_t num; 162356deab07SRod Evans 162456deab07SRod Evans for (num = 0; num < mapnum; num++) { 162556deab07SRod Evans /* LINTED */ 162656deab07SRod Evans (void) munmap((void *)(uintptr_t)mpp[num].mr_addr, 162756deab07SRod Evans mpp[num].mr_msize); 162856deab07SRod Evans } 162920272c2eSAli Bahrami cnt_unmap++; 163056deab07SRod Evans } 163156deab07SRod Evans 163256deab07SRod Evans /* 163356deab07SRod Evans * Map a file. 163456deab07SRod Evans */ 163556deab07SRod Evans Fct * 163656deab07SRod Evans map_obj(Lm_list *lml, Fdesc *fdp, size_t fsize, const char *name, int fd, 163756deab07SRod Evans Rej_desc *rej) 163856deab07SRod Evans { 163956deab07SRod Evans static mmapobj_result_t *smpp = NULL; 164056deab07SRod Evans static uint_t smapnum; 164156deab07SRod Evans mmapobj_result_t *mpp; 164256deab07SRod Evans uint_t mnum, mapnum, mflags; 164356deab07SRod Evans void *padding; 164456deab07SRod Evans 164556deab07SRod Evans /* 164656deab07SRod Evans * Allocate an initial mapping array. The initial size should be large 164756deab07SRod Evans * enough to handle the normal ELF objects we come across. 164856deab07SRod Evans */ 164956deab07SRod Evans if (smpp == NULL) { 165056deab07SRod Evans smpp = malloc(sizeof (mmapobj_result_t) * MMAPFD_NUM); 165156deab07SRod Evans if (smpp == NULL) 165256deab07SRod Evans return (NULL); 165356deab07SRod Evans smapnum = MMAPFD_NUM; 165456deab07SRod Evans } 165556deab07SRod Evans 165656deab07SRod Evans /* 165756deab07SRod Evans * If object padding is required, set the necessary flags. 165856deab07SRod Evans */ 165956deab07SRod Evans if (r_debug.rtd_objpad) { 166056deab07SRod Evans mflags = MMOBJ_INTERPRET | MMOBJ_PADDING; 166156deab07SRod Evans padding = &r_debug.rtd_objpad; 166256deab07SRod Evans } else { 166356deab07SRod Evans mflags = MMOBJ_INTERPRET; 166456deab07SRod Evans padding = NULL; 166556deab07SRod Evans } 166656deab07SRod Evans 166756deab07SRod Evans /* 166856deab07SRod Evans * Map the file. If the number of mappings required by this file 166956deab07SRod Evans * exceeds the present mapping structure, an error indicating the 167056deab07SRod Evans * return data is too big is returned. Bail on any other error. 167156deab07SRod Evans */ 167256deab07SRod Evans mapnum = smapnum; 167356deab07SRod Evans if (mmapobj(fd, mflags, smpp, &mapnum, padding) == -1) { 167456deab07SRod Evans if (errno != E2BIG) { 167556deab07SRod Evans int err = errno; 167656deab07SRod Evans 167756deab07SRod Evans /* 167856deab07SRod Evans * An unsupported error indicates that there's something 167956deab07SRod Evans * incompatible with this ELF file, and the process that 168056deab07SRod Evans * is already running. Map the first page of the file 168156deab07SRod Evans * and see if we can generate a better error message. 168256deab07SRod Evans */ 168356deab07SRod Evans if ((errno == ENOTSUP) && map_fail(fdp, fsize, name, 168456deab07SRod Evans fd, rej)) 168556deab07SRod Evans return (NULL); 168656deab07SRod Evans 168756deab07SRod Evans rej->rej_type = SGS_REJ_STR; 168856deab07SRod Evans rej->rej_str = strerror(err); 168956deab07SRod Evans return (NULL); 169056deab07SRod Evans } 169156deab07SRod Evans 169256deab07SRod Evans /* 169356deab07SRod Evans * The mapping requirement exceeds the present mapping 169456deab07SRod Evans * structure, however the number of mapping required is 169556deab07SRod Evans * available in the mapping number. 169656deab07SRod Evans */ 169756deab07SRod Evans free((void *)smpp); 169856deab07SRod Evans if ((smpp = malloc(sizeof (mmapobj_result_t) * mapnum)) == NULL) 169956deab07SRod Evans return (NULL); 170056deab07SRod Evans smapnum = mapnum; 170156deab07SRod Evans 170256deab07SRod Evans /* 170356deab07SRod Evans * With the appropriate mapping structure, try the mapping 170456deab07SRod Evans * request again. 170556deab07SRod Evans */ 170656deab07SRod Evans if (mmapobj(fd, mflags, smpp, &mapnum, padding) == -1) { 170756deab07SRod Evans rej->rej_type = SGS_REJ_STR; 170856deab07SRod Evans rej->rej_str = strerror(errno); 170956deab07SRod Evans return (NULL); 171056deab07SRod Evans } 171156deab07SRod Evans } 171256deab07SRod Evans ASSERT(mapnum != 0); 171356deab07SRod Evans 171456deab07SRod Evans /* 171556deab07SRod Evans * Traverse the mappings in search of a file type ld.so.1 can process. 171656deab07SRod Evans * If the file type is verified as one ld.so.1 can process, retain the 171756deab07SRod Evans * mapping information, and the number of mappings this object uses, 171856deab07SRod Evans * and clear the static mapping pointer for the next map_obj() use of 171956deab07SRod Evans * mmapobj(). 172056deab07SRod Evans */ 172156deab07SRod Evans DBG_CALL(Dbg_file_mmapobj(lml, name, smpp, mapnum)); 172220272c2eSAli Bahrami cnt_map++; 172356deab07SRod Evans 172456deab07SRod Evans for (mnum = 0, mpp = smpp; mnum < mapnum; mnum++, mpp++) { 172556deab07SRod Evans uint_t flags = (mpp->mr_flags & MR_TYPE_MASK); 172656deab07SRod Evans Fct *fptr = NULL; 172756deab07SRod Evans 172856deab07SRod Evans if (flags == MR_HDR_ELF) { 172956deab07SRod Evans fptr = elf_verify((mpp->mr_addr + mpp->mr_offset), 173056deab07SRod Evans mpp->mr_fsize, fdp, name, rej); 173156deab07SRod Evans } 173256deab07SRod Evans #ifdef A_OUT 173356deab07SRod Evans if (flags == MR_HDR_AOUT) { 173456deab07SRod Evans fptr = aout_verify((mpp->mr_addr + mpp->mr_offset), 173556deab07SRod Evans mpp->mr_fsize, fdp, name, rej); 173656deab07SRod Evans } 173756deab07SRod Evans #endif 173856deab07SRod Evans if (fptr) { 173956deab07SRod Evans fdp->fd_mapn = mapnum; 174056deab07SRod Evans fdp->fd_mapp = smpp; 174156deab07SRod Evans 174256deab07SRod Evans smpp = NULL; 174356deab07SRod Evans 174456deab07SRod Evans return (fptr); 174556deab07SRod Evans } 174656deab07SRod Evans } 174756deab07SRod Evans 174856deab07SRod Evans /* 174956deab07SRod Evans * If the mapped file is inappropriate, indicate that the file type is 175056deab07SRod Evans * unknown, and free the mapping. 175156deab07SRod Evans */ 175256deab07SRod Evans if (rej->rej_type == 0) 175356deab07SRod Evans rej->rej_type = SGS_REJ_UNKFILE; 175456deab07SRod Evans unmap_obj(smpp, mapnum); 175556deab07SRod Evans 175656deab07SRod Evans return (NULL); 17577c478bd9Sstevel@tonic-gate } 17587c478bd9Sstevel@tonic-gate 17597c478bd9Sstevel@tonic-gate /* 17607c478bd9Sstevel@tonic-gate * A unique file has been opened. Create a link-map to represent it, and 17617c478bd9Sstevel@tonic-gate * process the various names by which it can be referenced. 17627c478bd9Sstevel@tonic-gate */ 176356deab07SRod Evans Rt_map * 1764*2020b2b6SRod Evans load_file(Lm_list *lml, Aliste lmco, Rt_map *clmp, Fdesc *fdp, int *in_nfavl) 17657c478bd9Sstevel@tonic-gate { 176656deab07SRod Evans mmapobj_result_t *fpmpp = NULL, *fmpp = NULL, *lpmpp, *lmpp; 176756deab07SRod Evans mmapobj_result_t *hmpp, *mpp, *ompp = fdp->fd_mapp; 176856deab07SRod Evans uint_t mnum, omapnum = fdp->fd_mapn; 176956deab07SRod Evans const char *nname = fdp->fd_nname; 17707c478bd9Sstevel@tonic-gate Rt_map *nlmp; 177156deab07SRod Evans Ehdr *ehdr = NULL; 17727c478bd9Sstevel@tonic-gate 17737c478bd9Sstevel@tonic-gate /* 177456deab07SRod Evans * Traverse the mappings for the input file to capture generic mapping 177556deab07SRod Evans * information, and create a link-map to represent the file. 17767c478bd9Sstevel@tonic-gate */ 177756deab07SRod Evans for (mnum = 0, mpp = ompp; mnum < omapnum; mnum++, mpp++) { 177856deab07SRod Evans uint_t flags = (mpp->mr_flags & MR_TYPE_MASK); 17797c478bd9Sstevel@tonic-gate 17807c478bd9Sstevel@tonic-gate /* 178156deab07SRod Evans * Keep track of the first and last mappings that may include 178256deab07SRod Evans * padding. 17837c478bd9Sstevel@tonic-gate */ 178456deab07SRod Evans if (fpmpp == NULL) 178556deab07SRod Evans fpmpp = mpp; 178656deab07SRod Evans lpmpp = mpp; 17877c478bd9Sstevel@tonic-gate 178856deab07SRod Evans /* 178956deab07SRod Evans * Keep track of the first and last mappings that do not include 179056deab07SRod Evans * padding. 179156deab07SRod Evans */ 179256deab07SRod Evans if (flags != MR_PADDING) { 179356deab07SRod Evans if (fmpp == NULL) 179456deab07SRod Evans fmpp = mpp; 179556deab07SRod Evans lmpp = mpp; 179656deab07SRod Evans } 179756deab07SRod Evans if (flags == MR_HDR_ELF) { 179856deab07SRod Evans /* LINTED */ 179956deab07SRod Evans ehdr = (Ehdr *)(mpp->mr_addr + mpp->mr_offset); 180056deab07SRod Evans hmpp = mpp; 180156deab07SRod Evans } else if (flags == MR_HDR_AOUT) 180256deab07SRod Evans hmpp = mpp; 180356deab07SRod Evans } 180456deab07SRod Evans 180556deab07SRod Evans /* 180656deab07SRod Evans * The only ELF files we can handle are ET_EXEC, ET_DYN, and ET_REL. 180756deab07SRod Evans * 180856deab07SRod Evans * ET_REL must be processed by ld(1) to create an in-memory ET_DYN. 180956deab07SRod Evans * The initial processing carried out by elf_obj_file() creates a 181056deab07SRod Evans * temporary link-map, that acts as a place holder, until the objects 181156deab07SRod Evans * processing is finished with elf_obj_fini(). 181256deab07SRod Evans */ 181356deab07SRod Evans if (ehdr && (ehdr->e_type == ET_REL)) { 1814*2020b2b6SRod Evans if ((nlmp = elf_obj_file(lml, lmco, clmp, nname, hmpp, ompp, 181556deab07SRod Evans omapnum)) == NULL) 181656deab07SRod Evans return (nlmp); 181756deab07SRod Evans } else { 181856deab07SRod Evans Addr addr; 181956deab07SRod Evans size_t msize; 182056deab07SRod Evans 182156deab07SRod Evans /* 182256deab07SRod Evans * The size of the total reservation, and the padding range, 182356deab07SRod Evans * are a historic artifact required by debuggers. Although 182456deab07SRod Evans * these values express the range of the associated mappings, 182556deab07SRod Evans * there can be holes between segments (in which small objects 182656deab07SRod Evans * could be mapped). Anyone who needs to verify offsets 182756deab07SRod Evans * against segments should analyze all the object mappings, 182856deab07SRod Evans * rather than relying on these address ranges. 182956deab07SRod Evans */ 183056deab07SRod Evans addr = (Addr)(hmpp->mr_addr + hmpp->mr_offset); 183156deab07SRod Evans msize = lmpp->mr_addr + lmpp->mr_msize - fmpp->mr_addr; 183256deab07SRod Evans 183356deab07SRod Evans if ((nlmp = ((fdp->fd_ftp)->fct_new_lmp)(lml, lmco, fdp, addr, 1834*2020b2b6SRod Evans msize, NULL, clmp, in_nfavl)) == NULL) 183537ffaf83SRod Evans return (NULL); 18367c478bd9Sstevel@tonic-gate 18377c478bd9Sstevel@tonic-gate /* 183856deab07SRod Evans * Save generic mapping information. 18397c478bd9Sstevel@tonic-gate */ 184056deab07SRod Evans MMAPS(nlmp) = ompp; 184156deab07SRod Evans MMAPCNT(nlmp) = omapnum; 184256deab07SRod Evans PADSTART(nlmp) = (ulong_t)fpmpp->mr_addr; 184356deab07SRod Evans PADIMLEN(nlmp) = lpmpp->mr_addr + lpmpp->mr_msize - 184456deab07SRod Evans fpmpp->mr_addr; 184556deab07SRod Evans } 18467c478bd9Sstevel@tonic-gate 18477c478bd9Sstevel@tonic-gate /* 184856deab07SRod Evans * Save the dev/inode information for later comparisons, and identify 184956deab07SRod Evans * this as a new object. 18507c478bd9Sstevel@tonic-gate */ 185156deab07SRod Evans STDEV(nlmp) = fdp->fd_dev; 185256deab07SRod Evans STINO(nlmp) = fdp->fd_ino; 185356deab07SRod Evans FLAGS(nlmp) |= FLG_RT_NEWLOAD; 18547c478bd9Sstevel@tonic-gate 185556deab07SRod Evans /* 185656deab07SRod Evans * If this is ELF relocatable object, we're done for now. 185756deab07SRod Evans */ 185856deab07SRod Evans if (ehdr && (ehdr->e_type == ET_REL)) 185956deab07SRod Evans return (nlmp); 186056deab07SRod Evans 186156deab07SRod Evans /* 186256deab07SRod Evans * Insert the names of this link-map into the FullPathNode AVL tree. 186356deab07SRod Evans * Save both the NAME() and PATHNAME() if the names differ. 186456deab07SRod Evans */ 186556deab07SRod Evans (void) fullpath(nlmp, fdp); 186656deab07SRod Evans 186756deab07SRod Evans if ((NAME(nlmp)[0] == '/') && (fpavl_insert(lml, nlmp, NAME(nlmp), 186856deab07SRod Evans fdp->fd_avlwhere) == 0)) { 1869*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 187037ffaf83SRod Evans return (NULL); 18717c478bd9Sstevel@tonic-gate } 187256deab07SRod Evans if (((NAME(nlmp)[0] != '/') || (NAME(nlmp) != PATHNAME(nlmp))) && 18737c478bd9Sstevel@tonic-gate (fpavl_insert(lml, nlmp, PATHNAME(nlmp), 0) == 0)) { 1874*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 187537ffaf83SRod Evans return (NULL); 18767c478bd9Sstevel@tonic-gate } 18773dbfc803SRod Evans 18783dbfc803SRod Evans /* 187956deab07SRod Evans * If this is a secure application, record any full path name directory 188056deab07SRod Evans * in which this dependency has been found. This directory can be 188156deab07SRod Evans * deemed safe (as we've already found a dependency here). This 188256deab07SRod Evans * recording provides a fall-back should another objects $ORIGIN 188356deab07SRod Evans * definition expands to this directory, an expansion that would 188456deab07SRod Evans * ordinarily be deemed insecure. 18853dbfc803SRod Evans */ 18863dbfc803SRod Evans if (rtld_flags & RT_FL_SECURE) { 18873dbfc803SRod Evans if (NAME(nlmp)[0] == '/') 18883dbfc803SRod Evans spavl_insert(NAME(nlmp)); 18893dbfc803SRod Evans if ((NAME(nlmp) != PATHNAME(nlmp)) && 18903dbfc803SRod Evans (PATHNAME(nlmp)[0] == '/')) 18913dbfc803SRod Evans spavl_insert(PATHNAME(nlmp)); 18923dbfc803SRod Evans } 18937c478bd9Sstevel@tonic-gate 18947c478bd9Sstevel@tonic-gate /* 18957c478bd9Sstevel@tonic-gate * If we're processing an alternative object reset the original name 18967c478bd9Sstevel@tonic-gate * for possible $ORIGIN processing. 18977c478bd9Sstevel@tonic-gate */ 189856deab07SRod Evans if (fdp->fd_flags & FLG_FD_ALTER) { 189956deab07SRod Evans const char *odir, *ndir; 19007c478bd9Sstevel@tonic-gate size_t olen; 19017c478bd9Sstevel@tonic-gate 19027c478bd9Sstevel@tonic-gate FLAGS(nlmp) |= FLG_RT_ALTER; 19037c478bd9Sstevel@tonic-gate 19047c478bd9Sstevel@tonic-gate /* 19057c478bd9Sstevel@tonic-gate * If we were given a pathname containing a slash then the 19067c478bd9Sstevel@tonic-gate * original name is still in oname. Otherwise the original 19077c478bd9Sstevel@tonic-gate * directory is in dir->p_name (which is all we need for 19087c478bd9Sstevel@tonic-gate * $ORIGIN). 19097c478bd9Sstevel@tonic-gate */ 191056deab07SRod Evans if (fdp->fd_flags & FLG_FD_SLASH) { 19117c478bd9Sstevel@tonic-gate char *ofil; 19127c478bd9Sstevel@tonic-gate 191356deab07SRod Evans odir = fdp->fd_oname; 191456deab07SRod Evans ofil = strrchr(fdp->fd_oname, '/'); 19157c478bd9Sstevel@tonic-gate olen = ofil - odir + 1; 19167c478bd9Sstevel@tonic-gate } else { 191756deab07SRod Evans odir = fdp->fd_odir; 19187c478bd9Sstevel@tonic-gate olen = strlen(odir) + 1; 19197c478bd9Sstevel@tonic-gate } 192056deab07SRod Evans if ((ndir = stravl_insert(odir, 0, olen, 1)) == NULL) { 1921*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 192237ffaf83SRod Evans return (NULL); 19237c478bd9Sstevel@tonic-gate } 19247c478bd9Sstevel@tonic-gate ORIGNAME(nlmp) = ndir; 192556deab07SRod Evans DIRSZ(nlmp) = --olen; 19267c478bd9Sstevel@tonic-gate } 19277c478bd9Sstevel@tonic-gate 19287c478bd9Sstevel@tonic-gate return (nlmp); 19297c478bd9Sstevel@tonic-gate } 19307c478bd9Sstevel@tonic-gate 19317c478bd9Sstevel@tonic-gate /* 19327c478bd9Sstevel@tonic-gate * This function loads the named file and returns a pointer to its link map. 19337c478bd9Sstevel@tonic-gate * It is assumed that the caller has already checked that the file is not 19347c478bd9Sstevel@tonic-gate * already loaded before calling this function (refer is_so_loaded()). 19357c478bd9Sstevel@tonic-gate * Find and open the file, map it into memory, add it to the end of the list 19367c478bd9Sstevel@tonic-gate * of link maps and return a pointer to the new link map. Return 0 on error. 19377c478bd9Sstevel@tonic-gate */ 19387c478bd9Sstevel@tonic-gate static Rt_map * 193956deab07SRod Evans load_so(Lm_list *lml, Aliste lmco, Rt_map *clmp, uint_t flags, 194056deab07SRod Evans Fdesc *fdp, Rej_desc *rej, int *in_nfavl) 19417c478bd9Sstevel@tonic-gate { 194256deab07SRod Evans const char *oname = fdp->fd_oname; 194356deab07SRod Evans Pdesc *pdp; 19447c478bd9Sstevel@tonic-gate 19457c478bd9Sstevel@tonic-gate /* 194656deab07SRod Evans * If this path name hasn't already been identified as containing a 194756deab07SRod Evans * slash, check the path name. Most paths have been constructed 194856deab07SRod Evans * through appending a file name to a search path, and/or have been 194956deab07SRod Evans * inspected by expand(), and thus have a slash. However, we can 195056deab07SRod Evans * receive path names via auditors or configuration files, and thus 195156deab07SRod Evans * an evaluation here catches these instances. 19527c478bd9Sstevel@tonic-gate */ 195356deab07SRod Evans if ((fdp->fd_flags & FLG_FD_SLASH) == 0) { 19547c478bd9Sstevel@tonic-gate const char *str; 19557c478bd9Sstevel@tonic-gate 19567c478bd9Sstevel@tonic-gate for (str = oname; *str; str++) { 19577c478bd9Sstevel@tonic-gate if (*str == '/') { 195856deab07SRod Evans fdp->fd_flags |= FLG_FD_SLASH; 19597c478bd9Sstevel@tonic-gate break; 19607c478bd9Sstevel@tonic-gate } 19617c478bd9Sstevel@tonic-gate } 19627c478bd9Sstevel@tonic-gate } 19637c478bd9Sstevel@tonic-gate 19647c478bd9Sstevel@tonic-gate /* 19657c478bd9Sstevel@tonic-gate * If we are passed a 'null' link-map this means that this is the first 19667c478bd9Sstevel@tonic-gate * object to be loaded on this link-map list. In that case we set the 19677c478bd9Sstevel@tonic-gate * link-map to ld.so.1's link-map. 19687c478bd9Sstevel@tonic-gate * 19697c478bd9Sstevel@tonic-gate * This link-map is referenced to determine what lookup rules to use 19707c478bd9Sstevel@tonic-gate * when searching for files. By using ld.so.1's we are defaulting to 19717c478bd9Sstevel@tonic-gate * ELF look-up rules. 19727c478bd9Sstevel@tonic-gate * 19737c478bd9Sstevel@tonic-gate * Note: This case happens when loading the first object onto 19747c478bd9Sstevel@tonic-gate * the plt_tracing link-map. 19757c478bd9Sstevel@tonic-gate */ 19767c478bd9Sstevel@tonic-gate if (clmp == 0) 19777c478bd9Sstevel@tonic-gate clmp = lml_rtld.lm_head; 19787c478bd9Sstevel@tonic-gate 19797c478bd9Sstevel@tonic-gate /* 198008278a5eSRod Evans * If this path resulted from a $CAPABILITY specification, then the 198108278a5eSRod Evans * best capability object has already been establish, and is available 198208278a5eSRod Evans * in the calling file descriptor. Perform some minor book-keeping so 198308278a5eSRod Evans * that we can fall through into common code. 19847c478bd9Sstevel@tonic-gate */ 198508278a5eSRod Evans if (flags & FLG_RT_CAP) { 19867c478bd9Sstevel@tonic-gate /* 1987fb1354edSrie * If this object is already loaded, we're done. 19887c478bd9Sstevel@tonic-gate */ 198956deab07SRod Evans if (fdp->fd_lmp) 199056deab07SRod Evans return (fdp->fd_lmp); 19917c478bd9Sstevel@tonic-gate 19927c478bd9Sstevel@tonic-gate /* 19937c478bd9Sstevel@tonic-gate * Obtain the avl index for this object. 19947c478bd9Sstevel@tonic-gate */ 199556deab07SRod Evans (void) fpavl_recorded(lml, fdp->fd_nname, 0, 199656deab07SRod Evans &(fdp->fd_avlwhere)); 1997bbf522bdSrie 199856deab07SRod Evans } else if (fdp->fd_flags & FLG_FD_SLASH) { 19997c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 }; 20007c478bd9Sstevel@tonic-gate 200156deab07SRod Evans if (find_path(lml, clmp, flags, fdp, &_rej, in_nfavl) == 0) { 200231fdd7caSab196087 rejection_inherit(rej, &_rej); 200337ffaf83SRod Evans return (NULL); 20047c478bd9Sstevel@tonic-gate } 20057c478bd9Sstevel@tonic-gate 20067c478bd9Sstevel@tonic-gate /* 20077c478bd9Sstevel@tonic-gate * If this object is already loaded, we're done. 20087c478bd9Sstevel@tonic-gate */ 200956deab07SRod Evans if (fdp->fd_lmp) 201056deab07SRod Evans return (fdp->fd_lmp); 20117c478bd9Sstevel@tonic-gate 20127c478bd9Sstevel@tonic-gate } else { 20137c478bd9Sstevel@tonic-gate /* 20147c478bd9Sstevel@tonic-gate * No '/' - for each directory on list, make a pathname using 20157c478bd9Sstevel@tonic-gate * that directory and filename and try to open that file. 20167c478bd9Sstevel@tonic-gate */ 201756deab07SRod Evans Spath_desc sd = { search_rules, NULL, 0 }; 20187c478bd9Sstevel@tonic-gate Word strhash = 0; 201956deab07SRod Evans int found = 0; 202056deab07SRod Evans 20217c478bd9Sstevel@tonic-gate /* 202256deab07SRod Evans * Traverse the search path lists, creating full pathnames and 202356deab07SRod Evans * attempt to load each path. 20247c478bd9Sstevel@tonic-gate */ 202556deab07SRod Evans for (pdp = get_next_dir(&sd, clmp, flags); pdp; 202656deab07SRod Evans pdp = get_next_dir(&sd, clmp, flags)) { 20277c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 }; 202856deab07SRod Evans Fdesc fd = { 0 }; 20297c478bd9Sstevel@tonic-gate 20307c478bd9Sstevel@tonic-gate /* 20319aa23310Srie * Under debugging, duplicate path name entries are 20329aa23310Srie * tagged but remain part of the search path list so 20339aa23310Srie * that they can be diagnosed under "unused" processing. 20349aa23310Srie * Skip these entries, as this path would have already 20359aa23310Srie * been attempted. 20369aa23310Srie */ 203756deab07SRod Evans if (pdp->pd_flags & PD_FLG_DUPLICAT) 20389aa23310Srie continue; 20399aa23310Srie 204056deab07SRod Evans fd = *fdp; 204156deab07SRod Evans 20429aa23310Srie /* 20437c478bd9Sstevel@tonic-gate * Try and locate this file. Make sure to clean up 20447c478bd9Sstevel@tonic-gate * any rejection information should the file have 20457c478bd9Sstevel@tonic-gate * been found, but not appropriate. 20467c478bd9Sstevel@tonic-gate */ 204756deab07SRod Evans if (find_file(lml, clmp, flags, &fd, &_rej, pdp, 204856deab07SRod Evans &strhash, in_nfavl) == 0) { 204931fdd7caSab196087 rejection_inherit(rej, &_rej); 20507c478bd9Sstevel@tonic-gate continue; 20517c478bd9Sstevel@tonic-gate } 20527c478bd9Sstevel@tonic-gate 20537c478bd9Sstevel@tonic-gate /* 20549aa23310Srie * Indicate that this search path has been used. If 20559aa23310Srie * this is an LD_LIBRARY_PATH setting, ignore any use 20569aa23310Srie * by ld.so.1 itself. 20579aa23310Srie */ 205856deab07SRod Evans if (((pdp->pd_flags & LA_SER_LIBPATH) == 0) || 20599aa23310Srie ((lml->lm_flags & LML_FLG_RTLDLM) == 0)) 206056deab07SRod Evans pdp->pd_flags |= PD_FLG_USED; 20619aa23310Srie 20629aa23310Srie /* 20637c478bd9Sstevel@tonic-gate * If this object is already loaded, we're done. 20647c478bd9Sstevel@tonic-gate */ 206556deab07SRod Evans *fdp = fd; 206656deab07SRod Evans if (fdp->fd_lmp) 206756deab07SRod Evans return (fdp->fd_lmp); 20687c478bd9Sstevel@tonic-gate 206956deab07SRod Evans fdp->fd_odir = pdp->pd_pname; 207056deab07SRod Evans found = 1; 20717c478bd9Sstevel@tonic-gate break; 20727c478bd9Sstevel@tonic-gate } 20737c478bd9Sstevel@tonic-gate 20747c478bd9Sstevel@tonic-gate /* 20757c478bd9Sstevel@tonic-gate * If the file couldn't be loaded, do another comparison of 20767c478bd9Sstevel@tonic-gate * loaded files using just the basename. This catches folks 20777c478bd9Sstevel@tonic-gate * who may have loaded multiple full pathname files (possibly 20787c478bd9Sstevel@tonic-gate * from setxid applications) to satisfy dependency relationships 20797c478bd9Sstevel@tonic-gate * (i.e., a file might have a dependency on foo.so.1 which has 20807c478bd9Sstevel@tonic-gate * already been opened using its full pathname). 20817c478bd9Sstevel@tonic-gate */ 208256deab07SRod Evans if (found == 0) 20839aa23310Srie return (is_so_loaded(lml, oname, in_nfavl)); 20847c478bd9Sstevel@tonic-gate } 20857c478bd9Sstevel@tonic-gate 20867c478bd9Sstevel@tonic-gate /* 208708278a5eSRod Evans * Trace that this successfully opened file is about to be processed. 208808278a5eSRod Evans * Note, as part of processing a family of hardware capabilities filtees 208908278a5eSRod Evans * a number of candidates may have been opened and mapped to determine 209008278a5eSRod Evans * their capability requirements. At this point we've decided which 209108278a5eSRod Evans * of the candidates to use. 209208278a5eSRod Evans */ 209308278a5eSRod Evans if (lml->lm_flags & LML_FLG_TRC_ENABLE) { 209408278a5eSRod Evans trace_so(clmp, 0, fdp->fd_oname, fdp->fd_nname, 209508278a5eSRod Evans (fdp->fd_flags & FLG_FD_ALTER), 0); 209608278a5eSRod Evans } 209708278a5eSRod Evans 209808278a5eSRod Evans /* 209908278a5eSRod Evans * Finish mapping the file and return the link-map descriptor. 21007c478bd9Sstevel@tonic-gate */ 2101*2020b2b6SRod Evans return (load_file(lml, lmco, clmp, fdp, in_nfavl)); 21027c478bd9Sstevel@tonic-gate } 21037c478bd9Sstevel@tonic-gate 21047c478bd9Sstevel@tonic-gate /* 210556deab07SRod Evans * Trace an attempt to load an object, and seed the originating name. 21067c478bd9Sstevel@tonic-gate */ 210756deab07SRod Evans const char * 210856deab07SRod Evans load_trace(Lm_list *lml, Pdesc *pdp, Rt_map *clmp, Fdesc *fdp) 21097c478bd9Sstevel@tonic-gate { 211056deab07SRod Evans const char *name = pdp->pd_pname; 21117247f888Srie 2112*2020b2b6SRod Evans DBG_CALL(Dbg_libs_find(lml, name)); 2113*2020b2b6SRod Evans 21147c478bd9Sstevel@tonic-gate /* 21157c478bd9Sstevel@tonic-gate * First generate any ldd(1) diagnostics. 21167c478bd9Sstevel@tonic-gate */ 21177c478bd9Sstevel@tonic-gate if ((lml->lm_flags & (LML_FLG_TRC_VERBOSE | LML_FLG_TRC_SEARCH)) && 21187c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) 21197c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, NAME(clmp)); 21207c478bd9Sstevel@tonic-gate 21217c478bd9Sstevel@tonic-gate /* 212256deab07SRod Evans * Propagate any knowledge of a slash within the path name. 212356deab07SRod Evans */ 212456deab07SRod Evans if (pdp->pd_flags & PD_FLG_PNSLASH) 212556deab07SRod Evans fdp->fd_flags |= FLG_FD_SLASH; 212656deab07SRod Evans 212756deab07SRod Evans /* 2128*2020b2b6SRod Evans * If we're being audited tell any audit libraries of the file we're 21297c478bd9Sstevel@tonic-gate * about to go search for. 21307c478bd9Sstevel@tonic-gate */ 2131*2020b2b6SRod Evans if (aud_activity || 2132*2020b2b6SRod Evans ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_ACTIVITY)) 21337c478bd9Sstevel@tonic-gate audit_activity(clmp, LA_ACT_ADD); 21347c478bd9Sstevel@tonic-gate 213556deab07SRod Evans if ((lml->lm_tflags | AFLAGS(clmp)) & LML_TFLG_AUD_OBJSEARCH) { 213656deab07SRod Evans char *aname; 21377c478bd9Sstevel@tonic-gate 21387c478bd9Sstevel@tonic-gate /* 21397c478bd9Sstevel@tonic-gate * The auditor can indicate that this object should be ignored. 21407c478bd9Sstevel@tonic-gate */ 214156deab07SRod Evans if ((aname = 214256deab07SRod Evans audit_objsearch(clmp, name, LA_SER_ORIG)) == NULL) { 21437247f888Srie DBG_CALL(Dbg_audit_terminate(lml, name)); 214456deab07SRod Evans return (NULL); 21457c478bd9Sstevel@tonic-gate } 21467c478bd9Sstevel@tonic-gate 21477247f888Srie if (name != aname) { 214856deab07SRod Evans fdp->fd_flags &= ~FLG_FD_SLASH; 214956deab07SRod Evans name = aname; 21507c478bd9Sstevel@tonic-gate } 21517c478bd9Sstevel@tonic-gate } 215256deab07SRod Evans fdp->fd_oname = name; 215356deab07SRod Evans return (name); 21547c478bd9Sstevel@tonic-gate } 21557c478bd9Sstevel@tonic-gate 21567c478bd9Sstevel@tonic-gate /* 21577c478bd9Sstevel@tonic-gate * Having loaded an object and created a link-map to describe it, finish 21587c478bd9Sstevel@tonic-gate * processing this stage, including verifying any versioning requirements, 21597c478bd9Sstevel@tonic-gate * updating the objects mode, creating a handle if necessary, and adding this 21607c478bd9Sstevel@tonic-gate * object to existing handles if required. 21617c478bd9Sstevel@tonic-gate */ 2162390b98b5Srie static int 21637c478bd9Sstevel@tonic-gate load_finish(Lm_list *lml, const char *name, Rt_map *clmp, int nmode, 21647c478bd9Sstevel@tonic-gate uint_t flags, Grp_hdl **hdl, Rt_map *nlmp) 21657c478bd9Sstevel@tonic-gate { 21662017c965SRod Evans Aliste idx1; 2167cce0e03bSab196087 Grp_hdl *ghp; 21687c478bd9Sstevel@tonic-gate int promote; 21692017c965SRod Evans uint_t rdflags; 21707c478bd9Sstevel@tonic-gate 21717c478bd9Sstevel@tonic-gate /* 21722017c965SRod Evans * If this dependency is associated with a required version ensure that 21737c478bd9Sstevel@tonic-gate * the version is present in the loaded file. 21747c478bd9Sstevel@tonic-gate */ 217556deab07SRod Evans if (((rtld_flags & RT_FL_NOVERSION) == 0) && THIS_IS_ELF(clmp) && 217656deab07SRod Evans VERNEED(clmp) && (elf_verify_vers(name, clmp, nlmp) == 0)) 21777c478bd9Sstevel@tonic-gate return (0); 21787c478bd9Sstevel@tonic-gate 21797c478bd9Sstevel@tonic-gate /* 21807c478bd9Sstevel@tonic-gate * If this object has indicated that it should be isolated as a group 21817c478bd9Sstevel@tonic-gate * (DT_FLAGS_1 contains DF_1_GROUP - object was built with -B group), 21827c478bd9Sstevel@tonic-gate * or if the callers direct bindings indicate it should be isolated as 21832017c965SRod Evans * a group (DYNINFO flags contains FLG_DI_GROUP - dependency following 21847c478bd9Sstevel@tonic-gate * -zgroupperm), establish the appropriate mode. 21857c478bd9Sstevel@tonic-gate * 21867c478bd9Sstevel@tonic-gate * The intent of an object defining itself as a group is to isolate the 21877c478bd9Sstevel@tonic-gate * relocation of the group within its own members, however, unless 21887c478bd9Sstevel@tonic-gate * opened through dlopen(), in which case we assume dlsym() will be used 21892017c965SRod Evans * to locate symbols in the new object, we still need to associate the 21902017c965SRod Evans * new object with the caller so that the caller can bind to this new 21912017c965SRod Evans * object. This is equivalent to a dlopen(RTLD_GROUP) and dlsym() 21922017c965SRod Evans * using the returned handle. 21937c478bd9Sstevel@tonic-gate */ 21947c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) | flags) & FLG_RT_SETGROUP) { 21957c478bd9Sstevel@tonic-gate nmode &= ~RTLD_WORLD; 21967c478bd9Sstevel@tonic-gate nmode |= RTLD_GROUP; 21977c478bd9Sstevel@tonic-gate 21987c478bd9Sstevel@tonic-gate /* 21992017c965SRod Evans * If the object wasn't explicitly dlopen()'ed, in which case a 22002017c965SRod Evans * handle would have been requested, associate the object with 22017c478bd9Sstevel@tonic-gate * the parent. 22027c478bd9Sstevel@tonic-gate */ 22032017c965SRod Evans if ((flags & FLG_RT_PUBHDL) == 0) 22047c478bd9Sstevel@tonic-gate nmode |= RTLD_PARENT; 22057c478bd9Sstevel@tonic-gate } 22067c478bd9Sstevel@tonic-gate 22077c478bd9Sstevel@tonic-gate /* 22087c478bd9Sstevel@tonic-gate * Establish new mode and flags. 22097c478bd9Sstevel@tonic-gate */ 22107c478bd9Sstevel@tonic-gate promote = update_mode(nlmp, MODE(nlmp), nmode); 22117c478bd9Sstevel@tonic-gate FLAGS(nlmp) |= flags; 22127c478bd9Sstevel@tonic-gate 22137c478bd9Sstevel@tonic-gate /* 22142017c965SRod Evans * Establish the flags for any referenced dependency descriptors 22152017c965SRod Evans * (Grp_desc). 22162017c965SRod Evans * 22172017c965SRod Evans * - The referenced object is available for dlsym(). 22182017c965SRod Evans * - The referenced object is available to relocate against. 22192017c965SRod Evans * - The referenced object should have it's dependencies 22202017c965SRod Evans * added to this handle 22212017c965SRod Evans */ 22222017c965SRod Evans rdflags = (GPD_DLSYM | GPD_RELOC | GPD_ADDEPS); 22232017c965SRod Evans 22242017c965SRod Evans /* 22257c478bd9Sstevel@tonic-gate * If we've been asked to establish a handle create one for this object. 22267c478bd9Sstevel@tonic-gate * Or, if this object has already been analyzed, but this reference 22272017c965SRod Evans * requires that the mode of the object be promoted, create a private 22287c478bd9Sstevel@tonic-gate * handle to propagate the new modes to all this objects dependencies. 22297c478bd9Sstevel@tonic-gate */ 22302017c965SRod Evans if ((FLAGS(nlmp) & (FLG_RT_PUBHDL | FLG_RT_PRIHDL)) || 22312017c965SRod Evans (promote && (FLAGS(nlmp) & FLG_RT_ANALYZED))) { 22322017c965SRod Evans uint_t oflags, hflags, cdflags = 0; 22337c478bd9Sstevel@tonic-gate 22348af2c5b9Srie /* 22358af2c5b9Srie * Establish any flags for the handle (Grp_hdl). 22368af2c5b9Srie * 22372017c965SRod Evans * - Public handles establish dependencies between objects 22382017c965SRod Evans * that must be taken into account when dlclose()'ing 22392017c965SRod Evans * objects. Private handles provide for collecting 22402017c965SRod Evans * dependencies, but do not affect dlclose(). Note that 22412017c965SRod Evans * a handle may already exist, but the public/private 22422017c965SRod Evans * state is set to trigger the required propagation of the 22432017c965SRod Evans * handle's flags and any dependency gathering. 22442017c965SRod Evans * - Use of the RTLD_FIRST flag indicates that only the first 22458af2c5b9Srie * dependency on the handle (the new object) can be used 22468af2c5b9Srie * to satisfy dlsym() requests. 22478af2c5b9Srie */ 22482017c965SRod Evans if (FLAGS(nlmp) & FLG_RT_PUBHDL) 22492017c965SRod Evans hflags = GPH_PUBLIC; 22502017c965SRod Evans else 22512017c965SRod Evans hflags = GPH_PRIVATE; 22522017c965SRod Evans 22537c478bd9Sstevel@tonic-gate if (nmode & RTLD_FIRST) 22542017c965SRod Evans hflags |= GPH_FIRST; 22558af2c5b9Srie 22568af2c5b9Srie /* 22578af2c5b9Srie * Establish the flags for this callers dependency descriptor 22588af2c5b9Srie * (Grp_desc). 22598af2c5b9Srie * 22602017c965SRod Evans * - The creation of a public handle creates a descriptor 22612017c965SRod Evans * for the referenced object and the caller (parent). 22628af2c5b9Srie * Typically, the handle is created for dlopen() or for 22632017c965SRod Evans * filtering. A private handle does not need to maintain 22642017c965SRod Evans * a descriptor to the parent. 22652017c965SRod Evans * - Use of the RTLD_PARENT flag indicates that the parent 22668af2c5b9Srie * can be relocated against. 22678af2c5b9Srie */ 22682017c965SRod Evans if (FLAGS(nlmp) & FLG_RT_PUBHDL) { 22692017c965SRod Evans cdflags |= GPD_PARENT; 22708af2c5b9Srie if (nmode & RTLD_PARENT) 22718af2c5b9Srie cdflags |= GPD_RELOC; 22722017c965SRod Evans } 22737c478bd9Sstevel@tonic-gate 22747c478bd9Sstevel@tonic-gate /* 22752017c965SRod Evans * Now that the handle flags have been established, remove any 22762017c965SRod Evans * handle definition from the referenced object so that the 22772017c965SRod Evans * definitions don't mistakenly get inherited by a dependency. 22787c478bd9Sstevel@tonic-gate */ 22797c478bd9Sstevel@tonic-gate oflags = FLAGS(nlmp); 22802017c965SRod Evans FLAGS(nlmp) &= ~(FLG_RT_PUBHDL | FLG_RT_PRIHDL); 22817c478bd9Sstevel@tonic-gate 22828af2c5b9Srie DBG_CALL(Dbg_file_hdl_title(DBG_HDL_ADD)); 22832017c965SRod Evans if ((ghp = hdl_create(lml, nlmp, clmp, hflags, rdflags, 22842017c965SRod Evans cdflags)) == NULL) 22857c478bd9Sstevel@tonic-gate return (0); 22867c478bd9Sstevel@tonic-gate 22877c478bd9Sstevel@tonic-gate /* 22887c478bd9Sstevel@tonic-gate * Add any dependencies that are already loaded, to the handle. 22897c478bd9Sstevel@tonic-gate */ 229002ca3e02Srie if (hdl_initialize(ghp, nlmp, nmode, promote) == 0) 22917c478bd9Sstevel@tonic-gate return (0); 22927c478bd9Sstevel@tonic-gate 22937c478bd9Sstevel@tonic-gate if (hdl) 22947c478bd9Sstevel@tonic-gate *hdl = ghp; 22957c478bd9Sstevel@tonic-gate 22967c478bd9Sstevel@tonic-gate /* 22972017c965SRod Evans * If we were asked to create a public handle, we're done. 22988af2c5b9Srie * 22992017c965SRod Evans * If this is a private handle request, then the handle is left 23002017c965SRod Evans * intact with a GPH_PRIVATE identifier. This handle is a 23012017c965SRod Evans * convenience for processing the dependencies of this object, 23022017c965SRod Evans * but does not affect how this object might be dlclose()'d. 23032017c965SRod Evans * For a private handle, fall through to carry out any group 23042017c965SRod Evans * processing. 23058af2c5b9Srie */ 23062017c965SRod Evans if (oflags & FLG_RT_PUBHDL) 23072017c965SRod Evans return (1); 23087c478bd9Sstevel@tonic-gate } 23097c478bd9Sstevel@tonic-gate 23107c478bd9Sstevel@tonic-gate /* 23117c478bd9Sstevel@tonic-gate * If the caller isn't part of a group we're done. 23127c478bd9Sstevel@tonic-gate */ 2313cce0e03bSab196087 if (GROUPS(clmp) == NULL) 23147c478bd9Sstevel@tonic-gate return (1); 23157c478bd9Sstevel@tonic-gate 23167c478bd9Sstevel@tonic-gate /* 23177c478bd9Sstevel@tonic-gate * Determine if our caller is already associated with a handle, if so 23187c478bd9Sstevel@tonic-gate * we need to add this object to any handles that already exist. 23197c478bd9Sstevel@tonic-gate * Traverse the list of groups our caller is a member of and add this 23207c478bd9Sstevel@tonic-gate * new link-map to those groups. 23217c478bd9Sstevel@tonic-gate */ 23222017c965SRod Evans for (APLIST_TRAVERSE(GROUPS(clmp), idx1, ghp)) { 23232017c965SRod Evans Aliste idx2; 23247c478bd9Sstevel@tonic-gate Grp_desc *gdp; 23252017c965SRod Evans int ale; 2326cce0e03bSab196087 Rt_map *dlmp1; 2327cce0e03bSab196087 APlist *lmalp = NULL; 23287c478bd9Sstevel@tonic-gate 23292017c965SRod Evans DBG_CALL(Dbg_file_hdl_title(DBG_HDL_ADD)); 23302017c965SRod Evans 23317c478bd9Sstevel@tonic-gate /* 23327c478bd9Sstevel@tonic-gate * If the caller doesn't indicate that its dependencies should 23337c478bd9Sstevel@tonic-gate * be added to a handle, ignore it. This case identifies a 23347c478bd9Sstevel@tonic-gate * parent of a dlopen(RTLD_PARENT) request. 23357c478bd9Sstevel@tonic-gate */ 23362017c965SRod Evans for (ALIST_TRAVERSE(ghp->gh_depends, idx2, gdp)) { 23377c478bd9Sstevel@tonic-gate if (gdp->gd_depend == clmp) 23387c478bd9Sstevel@tonic-gate break; 23397c478bd9Sstevel@tonic-gate } 23407c478bd9Sstevel@tonic-gate if ((gdp->gd_flags & GPD_ADDEPS) == 0) 23417c478bd9Sstevel@tonic-gate continue; 23427c478bd9Sstevel@tonic-gate 23432017c965SRod Evans if ((gdp = hdl_add(ghp, nlmp, rdflags, &ale)) == NULL) 23447c478bd9Sstevel@tonic-gate return (0); 23457c478bd9Sstevel@tonic-gate 23467c478bd9Sstevel@tonic-gate /* 23477c478bd9Sstevel@tonic-gate * If this member already exists then its dependencies will 23487c478bd9Sstevel@tonic-gate * have already been processed. 23497c478bd9Sstevel@tonic-gate */ 23502017c965SRod Evans if (ale == ALE_EXISTS) 23517c478bd9Sstevel@tonic-gate continue; 23527c478bd9Sstevel@tonic-gate 23537c478bd9Sstevel@tonic-gate /* 23547c478bd9Sstevel@tonic-gate * If the object we've added has just been opened, it will not 23557c478bd9Sstevel@tonic-gate * yet have been processed for its dependencies, these will be 23567c478bd9Sstevel@tonic-gate * added on later calls to load_one(). If it doesn't have any 23577c478bd9Sstevel@tonic-gate * dependencies we're also done. 23587c478bd9Sstevel@tonic-gate */ 23597c478bd9Sstevel@tonic-gate if (((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) || 2360cce0e03bSab196087 (DEPENDS(nlmp) == NULL)) 23617c478bd9Sstevel@tonic-gate continue; 23627c478bd9Sstevel@tonic-gate 23637c478bd9Sstevel@tonic-gate /* 23647c478bd9Sstevel@tonic-gate * Otherwise, this object exists and has dependencies, so add 23657c478bd9Sstevel@tonic-gate * all of its dependencies to the handle were operating on. 23667c478bd9Sstevel@tonic-gate */ 236756deab07SRod Evans if (aplist_append(&lmalp, nlmp, AL_CNT_DEPCLCT) == NULL) 23687c478bd9Sstevel@tonic-gate return (0); 23697c478bd9Sstevel@tonic-gate 23702017c965SRod Evans for (APLIST_TRAVERSE(lmalp, idx2, dlmp1)) { 23712017c965SRod Evans Aliste idx3; 2372cce0e03bSab196087 Bnd_desc *bdp; 23737c478bd9Sstevel@tonic-gate 23747c478bd9Sstevel@tonic-gate /* 23757c478bd9Sstevel@tonic-gate * Add any dependencies of this dependency to the 23767c478bd9Sstevel@tonic-gate * dynamic dependency list so they can be further 23777c478bd9Sstevel@tonic-gate * processed. 23787c478bd9Sstevel@tonic-gate */ 23792017c965SRod Evans for (APLIST_TRAVERSE(DEPENDS(dlmp1), idx3, bdp)) { 23807c478bd9Sstevel@tonic-gate Rt_map *dlmp2 = bdp->b_depend; 23817c478bd9Sstevel@tonic-gate 23827c478bd9Sstevel@tonic-gate if ((bdp->b_flags & BND_NEEDED) == 0) 23837c478bd9Sstevel@tonic-gate continue; 23847c478bd9Sstevel@tonic-gate 2385cce0e03bSab196087 if (aplist_test(&lmalp, dlmp2, 23867c478bd9Sstevel@tonic-gate AL_CNT_DEPCLCT) == 0) { 23877c478bd9Sstevel@tonic-gate free(lmalp); 23887c478bd9Sstevel@tonic-gate return (0); 23897c478bd9Sstevel@tonic-gate } 23907c478bd9Sstevel@tonic-gate } 23917c478bd9Sstevel@tonic-gate 23927c478bd9Sstevel@tonic-gate if (nlmp == dlmp1) 23937c478bd9Sstevel@tonic-gate continue; 23947c478bd9Sstevel@tonic-gate 23952017c965SRod Evans if ((gdp = 23962017c965SRod Evans hdl_add(ghp, dlmp1, rdflags, &ale)) == NULL) { 23977c478bd9Sstevel@tonic-gate free(lmalp); 23987c478bd9Sstevel@tonic-gate return (0); 23997c478bd9Sstevel@tonic-gate } 240056deab07SRod Evans 2401e0e63816SRod Evans if (ale == ALE_CREATE) 2402e0e63816SRod Evans (void) update_mode(dlmp1, MODE(dlmp1), nmode); 240356deab07SRod Evans } 24047c478bd9Sstevel@tonic-gate free(lmalp); 24057c478bd9Sstevel@tonic-gate } 24067c478bd9Sstevel@tonic-gate return (1); 24077c478bd9Sstevel@tonic-gate } 24087c478bd9Sstevel@tonic-gate 24097c478bd9Sstevel@tonic-gate /* 24107c478bd9Sstevel@tonic-gate * The central routine for loading shared objects. Insures ldd() diagnostics, 2411*2020b2b6SRod Evans * handle creation, and any other related additions are all done in one place. 24127c478bd9Sstevel@tonic-gate */ 241356deab07SRod Evans Rt_map * 241456deab07SRod Evans load_path(Lm_list *lml, Aliste lmco, Rt_map *clmp, int nmode, uint_t flags, 241556deab07SRod Evans Grp_hdl **hdl, Fdesc *fdp, Rej_desc *rej, int *in_nfavl) 24167c478bd9Sstevel@tonic-gate { 241756deab07SRod Evans const char *name = fdp->fd_oname; 24187c478bd9Sstevel@tonic-gate Rt_map *nlmp; 24197c478bd9Sstevel@tonic-gate 24207c478bd9Sstevel@tonic-gate if ((nmode & RTLD_NOLOAD) == 0) { 2421e0e63816SRod Evans int oin_nfavl; 2422e0e63816SRod Evans 2423e0e63816SRod Evans /* 2424e0e63816SRod Evans * Keep track of the number of not-found loads. 2425e0e63816SRod Evans */ 2426e0e63816SRod Evans if (in_nfavl) 2427e0e63816SRod Evans oin_nfavl = *in_nfavl; 2428e0e63816SRod Evans 24297c478bd9Sstevel@tonic-gate /* 24307c478bd9Sstevel@tonic-gate * If this isn't a noload request attempt to load the file. 24317c478bd9Sstevel@tonic-gate */ 243256deab07SRod Evans if ((nlmp = load_so(lml, lmco, clmp, flags, fdp, rej, 243356deab07SRod Evans in_nfavl)) == NULL) 243437ffaf83SRod Evans return (NULL); 24357c478bd9Sstevel@tonic-gate 24367c478bd9Sstevel@tonic-gate /* 2437e0e63816SRod Evans * If this file has been found, reset the not-found load count. 2438e0e63816SRod Evans * Although a search for this file might have inspected a number 2439e0e63816SRod Evans * of non-existent path names, the file has been found so there 244008278a5eSRod Evans * is no need to accumulate a non-found count, as this may 2441e0e63816SRod Evans * trigger unnecessary fall back (retry) processing. 2442e0e63816SRod Evans */ 2443e0e63816SRod Evans if (in_nfavl) 2444e0e63816SRod Evans *in_nfavl = oin_nfavl; 2445e0e63816SRod Evans 2446e0e63816SRod Evans /* 24477c478bd9Sstevel@tonic-gate * If we've loaded a library which identifies itself as not 24487c478bd9Sstevel@tonic-gate * being dlopen()'able catch it here. Let non-dlopen()'able 24497c478bd9Sstevel@tonic-gate * objects through under RTLD_CONFGEN as they're only being 24507c478bd9Sstevel@tonic-gate * mapped to be dldump()'ed. 24517c478bd9Sstevel@tonic-gate */ 24527c478bd9Sstevel@tonic-gate if ((rtld_flags & RT_FL_APPLIC) && ((FLAGS(nlmp) & 24537c478bd9Sstevel@tonic-gate (FLG_RT_NOOPEN | FLG_RT_RELOCED)) == FLG_RT_NOOPEN) && 24547c478bd9Sstevel@tonic-gate ((nmode & RTLD_CONFGEN) == 0)) { 24557c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 }; 24567c478bd9Sstevel@tonic-gate 24577c478bd9Sstevel@tonic-gate _rej.rej_name = name; 24587c478bd9Sstevel@tonic-gate _rej.rej_type = SGS_REJ_STR; 24597c478bd9Sstevel@tonic-gate _rej.rej_str = MSG_INTL(MSG_GEN_NOOPEN); 2460ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, &_rej, M_MACH)); 246131fdd7caSab196087 rejection_inherit(rej, &_rej); 2462*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 246337ffaf83SRod Evans return (NULL); 24647c478bd9Sstevel@tonic-gate } 24657c478bd9Sstevel@tonic-gate } else { 24667c478bd9Sstevel@tonic-gate /* 24677c478bd9Sstevel@tonic-gate * If it's a NOLOAD request - check to see if the object 24687c478bd9Sstevel@tonic-gate * has already been loaded. 24697c478bd9Sstevel@tonic-gate */ 24707c478bd9Sstevel@tonic-gate /* LINTED */ 24719aa23310Srie if (nlmp = is_so_loaded(lml, name, in_nfavl)) { 24727c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_TRC_VERBOSE) && 24737c478bd9Sstevel@tonic-gate ((FLAGS1(clmp) & FL1_RT_LDDSTUB) == 0)) { 24747c478bd9Sstevel@tonic-gate (void) printf(MSG_INTL(MSG_LDD_FIL_FIND), name, 24757c478bd9Sstevel@tonic-gate NAME(clmp)); 24767247f888Srie /* BEGIN CSTYLED */ 24777c478bd9Sstevel@tonic-gate if (*name == '/') 24787c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_PATH), 24797c478bd9Sstevel@tonic-gate name, MSG_ORIG(MSG_STR_EMPTY), 24807c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY)); 24817c478bd9Sstevel@tonic-gate else 24827c478bd9Sstevel@tonic-gate (void) printf(MSG_ORIG(MSG_LDD_FIL_EQUIV), 24837c478bd9Sstevel@tonic-gate name, NAME(nlmp), 24847c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY), 24857c478bd9Sstevel@tonic-gate MSG_ORIG(MSG_STR_EMPTY)); 24867247f888Srie /* END CSTYLED */ 24877c478bd9Sstevel@tonic-gate } 24887c478bd9Sstevel@tonic-gate } else { 24897c478bd9Sstevel@tonic-gate Rej_desc _rej = { 0 }; 24907c478bd9Sstevel@tonic-gate 24917c478bd9Sstevel@tonic-gate _rej.rej_name = name; 24927c478bd9Sstevel@tonic-gate _rej.rej_type = SGS_REJ_STR; 24937c478bd9Sstevel@tonic-gate _rej.rej_str = strerror(ENOENT); 2494ba2be530Sab196087 DBG_CALL(Dbg_file_rejected(lml, &_rej, M_MACH)); 249531fdd7caSab196087 rejection_inherit(rej, &_rej); 249637ffaf83SRod Evans return (NULL); 24977c478bd9Sstevel@tonic-gate } 24987c478bd9Sstevel@tonic-gate } 24997c478bd9Sstevel@tonic-gate 25007c478bd9Sstevel@tonic-gate /* 25017c478bd9Sstevel@tonic-gate * Finish processing this loaded object. 25027c478bd9Sstevel@tonic-gate */ 2503390b98b5Srie if (load_finish(lml, name, clmp, nmode, flags, hdl, nlmp) == 0) { 2504390b98b5Srie FLAGS(nlmp) &= ~FLG_RT_NEWLOAD; 25057c478bd9Sstevel@tonic-gate 25067c478bd9Sstevel@tonic-gate /* 2507390b98b5Srie * If this object has already been analyzed, then it is in use, 2508390b98b5Srie * so even though this operation has failed, it should not be 2509390b98b5Srie * torn down. 25107c478bd9Sstevel@tonic-gate */ 25117c478bd9Sstevel@tonic-gate if ((FLAGS(nlmp) & FLG_RT_ANALYZED) == 0) 2512*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 251337ffaf83SRod Evans return (NULL); 25147c478bd9Sstevel@tonic-gate } 25157c478bd9Sstevel@tonic-gate 25167c478bd9Sstevel@tonic-gate /* 2517390b98b5Srie * If this object is new, and we're being audited, tell the audit 2518*2020b2b6SRod Evans * libraries of the file we've just opened. Note, if the new link-map 2519390b98b5Srie * requires local auditing of its dependencies we also register its 2520390b98b5Srie * opening. 2521390b98b5Srie */ 2522390b98b5Srie if (FLAGS(nlmp) & FLG_RT_NEWLOAD) { 2523390b98b5Srie FLAGS(nlmp) &= ~FLG_RT_NEWLOAD; 2524390b98b5Srie 2525*2020b2b6SRod Evans if ((lml->lm_tflags | AFLAGS(clmp) | AFLAGS(nlmp)) & 2526*2020b2b6SRod Evans LML_TFLG_AUD_MASK) { 2527390b98b5Srie if (audit_objopen(clmp, nlmp) == 0) { 2528*2020b2b6SRod Evans remove_so(lml, nlmp, clmp); 252937ffaf83SRod Evans return (NULL); 2530390b98b5Srie } 2531390b98b5Srie } 2532390b98b5Srie } 2533390b98b5Srie return (nlmp); 2534390b98b5Srie } 2535390b98b5Srie 2536390b98b5Srie /* 25377c478bd9Sstevel@tonic-gate * Load one object from a possible list of objects. Typically, for requests 25387c478bd9Sstevel@tonic-gate * such as NEEDED's, only one object is specified. However, this object could 253908278a5eSRod Evans * be specified using $ISALIST or $CAPABILITY, in which case only the first 254008278a5eSRod Evans * object that can be loaded is used (ie. the best). 25417c478bd9Sstevel@tonic-gate */ 25427c478bd9Sstevel@tonic-gate Rt_map * 254356deab07SRod Evans load_one(Lm_list *lml, Aliste lmco, Alist *palp, Rt_map *clmp, int mode, 25449aa23310Srie uint_t flags, Grp_hdl **hdl, int *in_nfavl) 25457c478bd9Sstevel@tonic-gate { 25467c478bd9Sstevel@tonic-gate Rej_desc rej = { 0 }; 254756deab07SRod Evans Aliste idx; 254856deab07SRod Evans Pdesc *pdp; 25497c478bd9Sstevel@tonic-gate const char *name; 25507c478bd9Sstevel@tonic-gate 255156deab07SRod Evans for (ALIST_TRAVERSE(palp, idx, pdp)) { 255256deab07SRod Evans Rt_map *lmp = NULL; 25537247f888Srie 25547c478bd9Sstevel@tonic-gate /* 255508278a5eSRod Evans * A $CAPABILITY/$HWCAP requirement can expand into a number of 255608278a5eSRod Evans * candidates. 25577c478bd9Sstevel@tonic-gate */ 255808278a5eSRod Evans if (pdp->pd_flags & PD_TKN_CAP) { 255908278a5eSRod Evans lmp = load_cap(lml, lmco, pdp->pd_pname, clmp, 256008278a5eSRod Evans mode, (flags | FLG_RT_CAP), hdl, &rej, in_nfavl); 25617c478bd9Sstevel@tonic-gate } else { 256256deab07SRod Evans Fdesc fd = { 0 }; 256356deab07SRod Evans 256456deab07SRod Evans /* 256556deab07SRod Evans * Trace the inspection of this file, determine any 256656deab07SRod Evans * auditor substitution, and seed the file descriptor 256756deab07SRod Evans * with the originating name. 256856deab07SRod Evans */ 256956deab07SRod Evans if (load_trace(lml, pdp, clmp, &fd) == NULL) 257056deab07SRod Evans continue; 257156deab07SRod Evans 257256deab07SRod Evans /* 257356deab07SRod Evans * Locate and load the file. 257456deab07SRod Evans */ 257556deab07SRod Evans lmp = load_path(lml, lmco, clmp, mode, flags, hdl, &fd, 257656deab07SRod Evans &rej, in_nfavl); 25777c478bd9Sstevel@tonic-gate } 257856deab07SRod Evans if (lmp) 257956deab07SRod Evans return (lmp); 25807c478bd9Sstevel@tonic-gate } 25817c478bd9Sstevel@tonic-gate 25827c478bd9Sstevel@tonic-gate /* 258356deab07SRod Evans * If no objects can be found, use the first path name from the Alist 258456deab07SRod Evans * to provide a diagnostic. If this pathname originated from an 258556deab07SRod Evans * expanded token, use the original name for any diagnostic output. 25867c478bd9Sstevel@tonic-gate */ 258756deab07SRod Evans pdp = alist_item(palp, 0); 258856deab07SRod Evans 258956deab07SRod Evans if ((name = pdp->pd_oname) == 0) 259056deab07SRod Evans name = pdp->pd_pname; 25917c478bd9Sstevel@tonic-gate 25927c478bd9Sstevel@tonic-gate file_notfound(lml, name, clmp, flags, &rej); 259337ffaf83SRod Evans return (NULL); 25947c478bd9Sstevel@tonic-gate } 25957c478bd9Sstevel@tonic-gate 25967c478bd9Sstevel@tonic-gate /* 25979a411307Srie * Determine whether a symbol is defined as an interposer. 25989a411307Srie */ 25999a411307Srie int 26009a411307Srie is_sym_interposer(Rt_map *lmp, Sym *sym) 26019a411307Srie { 26029a411307Srie Syminfo *sip = SYMINFO(lmp); 26039a411307Srie 26049a411307Srie if (sip) { 26059a411307Srie ulong_t ndx; 26069a411307Srie 26079a411307Srie ndx = (((ulong_t)sym - (ulong_t)SYMTAB(lmp)) / SYMENT(lmp)); 26089a411307Srie /* LINTED */ 26099a411307Srie sip = (Syminfo *)((char *)sip + (ndx * SYMINENT(lmp))); 26109a411307Srie if (sip->si_flags & SYMINFO_FLG_INTERPOSE) 26119a411307Srie return (1); 26129a411307Srie } 26139a411307Srie return (0); 26149a411307Srie } 26159a411307Srie 26169a411307Srie /* 26177c478bd9Sstevel@tonic-gate * While processing direct or group bindings, determine whether the object to 26187c478bd9Sstevel@tonic-gate * which we've bound can be interposed upon. In this context, copy relocations 26197c478bd9Sstevel@tonic-gate * are a form of interposition. 26207c478bd9Sstevel@tonic-gate */ 262108278a5eSRod Evans static int 262208278a5eSRod Evans lookup_sym_interpose(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl) 26237c478bd9Sstevel@tonic-gate { 262408278a5eSRod Evans Rt_map *lmp, *clmp, *dlmp = srp->sr_dmap; 262508278a5eSRod Evans Sym *osym = srp->sr_sym; 26267c478bd9Sstevel@tonic-gate Slookup sl; 2627adbfe822Srie Lm_list *lml; 26287c478bd9Sstevel@tonic-gate 26297c478bd9Sstevel@tonic-gate /* 26307c478bd9Sstevel@tonic-gate * If we've bound to a copy relocation definition then we need to assign 26317c478bd9Sstevel@tonic-gate * this binding to the original copy reference. Fabricate an inter- 26327c478bd9Sstevel@tonic-gate * position diagnostic, as this is a legitimate form of interposition. 26337c478bd9Sstevel@tonic-gate */ 263408278a5eSRod Evans if (osym && (FLAGS1(dlmp) & FL1_RT_COPYTOOK)) { 26357c478bd9Sstevel@tonic-gate Rel_copy *rcp; 2636cce0e03bSab196087 Aliste idx; 26377c478bd9Sstevel@tonic-gate 263808278a5eSRod Evans for (ALIST_TRAVERSE(COPY_R(dlmp), idx, rcp)) { 2639aa736cbeSrie if ((osym == rcp->r_dsym) || (osym->st_value && 2640aa736cbeSrie (osym->st_value == rcp->r_dsym->st_value))) { 264108278a5eSRod Evans srp->sr_dmap = rcp->r_rlmp; 264208278a5eSRod Evans srp->sr_sym = rcp->r_rsym; 26437c478bd9Sstevel@tonic-gate *binfo |= 26447c478bd9Sstevel@tonic-gate (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF); 264508278a5eSRod Evans return (1); 26467c478bd9Sstevel@tonic-gate } 26477c478bd9Sstevel@tonic-gate } 26487c478bd9Sstevel@tonic-gate } 26497c478bd9Sstevel@tonic-gate 2650aa736cbeSrie /* 2651adbfe822Srie * If a symbol binding has been established, inspect the link-map list 2652adbfe822Srie * of the destination object, otherwise use the link-map list of the 2653adbfe822Srie * original caller. 2654adbfe822Srie */ 2655adbfe822Srie if (osym) 265608278a5eSRod Evans clmp = dlmp; 2657adbfe822Srie else 2658adbfe822Srie clmp = slp->sl_cmap; 2659adbfe822Srie 2660adbfe822Srie lml = LIST(clmp); 2661adbfe822Srie lmp = lml->lm_head; 2662adbfe822Srie 2663adbfe822Srie /* 2664aa736cbeSrie * Prior to Solaris 8, external references from an executable that were 2665aa736cbeSrie * bound to an uninitialized variable (.bss) within a shared object did 2666aa736cbeSrie * not establish a copy relocation. This was thought to be an 2667aa736cbeSrie * optimization, to prevent copying zero's to zero's. Typically, 2668aa736cbeSrie * interposition took its course, with the shared object binding to the 2669aa736cbeSrie * executables data definition. 2670aa736cbeSrie * 2671aa736cbeSrie * This scenario can be broken when this old executable runs against a 2672aa736cbeSrie * new shared object that is directly bound. With no copy-relocation 2673aa736cbeSrie * record, ld.so.1 has no data to trigger the normal vectoring of the 2674aa736cbeSrie * binding to the executable. 2675aa736cbeSrie * 2676aa736cbeSrie * Starting with Solaris 8, a DT_FLAGS entry is written to all objects, 2677aa736cbeSrie * regardless of there being any DF_ flags entries. Therefore, an 2678aa736cbeSrie * object without this dynamic tag is susceptible to the copy relocation 2679aa736cbeSrie * issue. If the executable has no DT_FLAGS tag, and contains the same 2680aa736cbeSrie * .bss symbol definition as has been directly bound to, redirect the 2681aa736cbeSrie * binding to the executables data definition. 2682aa736cbeSrie */ 268356deab07SRod Evans if (osym && ((FLAGS1(lmp) & FL1_RT_DTFLAGS) == 0) && 2684adbfe822Srie (FCT(lmp) == &elf_fct) && 2685466e2a62Srie (ELF_ST_TYPE(osym->st_info) != STT_FUNC) && 268608278a5eSRod Evans are_bits_zero(dlmp, osym, 0)) { 268708278a5eSRod Evans Sresult sr; 2688aa736cbeSrie 268908278a5eSRod Evans /* 269008278a5eSRod Evans * Initialize a local symbol result descriptor, using the 269108278a5eSRod Evans * original symbol name. Initialize a local symbol lookup 269208278a5eSRod Evans * descriptor, using the original lookup information, and a 269308278a5eSRod Evans * new initial link-map. 269408278a5eSRod Evans */ 269508278a5eSRod Evans SRESULT_INIT(sr, slp->sl_name); 2696adbfe822Srie sl = *slp; 2697adbfe822Srie sl.sl_imap = lmp; 2698adbfe822Srie 2699aa736cbeSrie /* 2700aa736cbeSrie * Determine whether the same symbol name exists within the 2701aa736cbeSrie * executable, that the size and type of symbol are the same, 2702aa736cbeSrie * and that the symbol is also associated with .bss. 2703aa736cbeSrie */ 270408278a5eSRod Evans if (SYMINTP(lmp)(&sl, &sr, binfo, in_nfavl)) { 270508278a5eSRod Evans Sym *isym = sr.sr_sym; 270608278a5eSRod Evans 270708278a5eSRod Evans if ((isym->st_size == osym->st_size) && 2708aa736cbeSrie (isym->st_info == osym->st_info) && 2709466e2a62Srie are_bits_zero(lmp, isym, 1)) { 271008278a5eSRod Evans *srp = sr; 271108278a5eSRod Evans *binfo |= 271208278a5eSRod Evans (DBG_BINFO_INTERPOSE | DBG_BINFO_COPYREF); 271308278a5eSRod Evans return (1); 271408278a5eSRod Evans } 2715aa736cbeSrie } 2716aa736cbeSrie } 2717aa736cbeSrie 27187c478bd9Sstevel@tonic-gate if ((lml->lm_flags & LML_FLG_INTRPOSE) == 0) 271937ffaf83SRod Evans return (NULL); 27207c478bd9Sstevel@tonic-gate 27217c478bd9Sstevel@tonic-gate /* 27227c478bd9Sstevel@tonic-gate * Traverse the list of known interposers to determine whether any 27237c478bd9Sstevel@tonic-gate * offer the same symbol. Note, the head of the link-map could be 2724aa736cbeSrie * identified as an interposer. Otherwise, skip the head of the 2725aa736cbeSrie * link-map, so that we don't bind to any .plt references, or 2726aa736cbeSrie * copy-relocation destinations unintentionally. 27277c478bd9Sstevel@tonic-gate */ 27287c478bd9Sstevel@tonic-gate lmp = lml->lm_head; 27297c478bd9Sstevel@tonic-gate sl = *slp; 2730adbfe822Srie 27319a411307Srie if (((FLAGS(lmp) & MSK_RT_INTPOSE) == 0) || (sl.sl_flags & LKUP_COPY)) 2732cb511613SAli Bahrami lmp = NEXT_RT_MAP(lmp); 27337c478bd9Sstevel@tonic-gate 2734cb511613SAli Bahrami for (; lmp; lmp = NEXT_RT_MAP(lmp)) { 27357c478bd9Sstevel@tonic-gate if (FLAGS(lmp) & FLG_RT_DELETE) 27367c478bd9Sstevel@tonic-gate continue; 27379a411307Srie if ((FLAGS(lmp) & MSK_RT_INTPOSE) == 0) 27387c478bd9Sstevel@tonic-gate break; 27397c478bd9Sstevel@tonic-gate 2740e0e63816SRod Evans /* 2741e0e63816SRod Evans * If we had already bound to this object, there's no point in 2742e0e63816SRod Evans * searching it again, we're done. 2743e0e63816SRod Evans */ 274408278a5eSRod Evans if (lmp == dlmp) 2745e0e63816SRod Evans break; 2746e0e63816SRod Evans 2747e0e63816SRod Evans /* 2748e0e63816SRod Evans * If this interposer can be inspected by the caller, look for 2749e0e63816SRod Evans * the symbol within the interposer. 2750e0e63816SRod Evans */ 2751e0e63816SRod Evans if (callable(clmp, lmp, 0, sl.sl_flags)) { 275208278a5eSRod Evans Sresult sr; 27539a411307Srie 275408278a5eSRod Evans /* 275508278a5eSRod Evans * Initialize a local symbol result descriptor, using 275608278a5eSRod Evans * the original symbol name. Initialize a local symbol 275708278a5eSRod Evans * lookup descriptor, using the original lookup 275808278a5eSRod Evans * information, and a new initial link-map. 275908278a5eSRod Evans */ 276008278a5eSRod Evans SRESULT_INIT(sr, slp->sl_name); 27617c478bd9Sstevel@tonic-gate sl.sl_imap = lmp; 276208278a5eSRod Evans 276308278a5eSRod Evans if (SYMINTP(lmp)(&sl, &sr, binfo, in_nfavl)) { 276408278a5eSRod Evans Sym *isym = sr.sr_sym; 276508278a5eSRod Evans Rt_map *ilmp = sr.sr_dmap; 276608278a5eSRod Evans 27679a411307Srie /* 27689a411307Srie * If this object provides individual symbol 27699a411307Srie * interposers, make sure that the symbol we 27709a411307Srie * have found is tagged as an interposer. 27719a411307Srie */ 27729a411307Srie if ((FLAGS(ilmp) & FLG_RT_SYMINTPO) && 2773aa736cbeSrie (is_sym_interposer(ilmp, isym) == 0)) 27749a411307Srie continue; 27759a411307Srie 27769a411307Srie /* 27779a411307Srie * Indicate this binding has occurred to an 27789a411307Srie * interposer, and return the symbol. 27799a411307Srie */ 278008278a5eSRod Evans *srp = sr; 27817c478bd9Sstevel@tonic-gate *binfo |= DBG_BINFO_INTERPOSE; 278208278a5eSRod Evans return (1); 27837c478bd9Sstevel@tonic-gate } 27847c478bd9Sstevel@tonic-gate } 27857c478bd9Sstevel@tonic-gate } 278608278a5eSRod Evans return (0); 27877c478bd9Sstevel@tonic-gate } 27887c478bd9Sstevel@tonic-gate 27897c478bd9Sstevel@tonic-gate /* 27907c478bd9Sstevel@tonic-gate * If an object specifies direct bindings (it contains a syminfo structure 27917c478bd9Sstevel@tonic-gate * describing where each binding was established during link-editing, and the 27927c478bd9Sstevel@tonic-gate * object was built -Bdirect), then look for the symbol in the specific object. 27937c478bd9Sstevel@tonic-gate */ 279408278a5eSRod Evans static int 279508278a5eSRod Evans lookup_sym_direct(Slookup *slp, Sresult *srp, uint_t *binfo, Syminfo *sip, 27969aa23310Srie Rt_map *lmp, int *in_nfavl) 27977c478bd9Sstevel@tonic-gate { 279808278a5eSRod Evans Rt_map *dlmp, *clmp = slp->sl_cmap; 279908278a5eSRod Evans int ret; 28007c478bd9Sstevel@tonic-gate Slookup sl; 28017c478bd9Sstevel@tonic-gate 28027c478bd9Sstevel@tonic-gate /* 28037c478bd9Sstevel@tonic-gate * If a direct binding resolves to the definition of a copy relocated 28047c478bd9Sstevel@tonic-gate * variable, it must be redirected to the copy (in the executable) that 28057c478bd9Sstevel@tonic-gate * will eventually be made. Typically, this redirection occurs in 28067c478bd9Sstevel@tonic-gate * lookup_sym_interpose(). But, there's an edge condition. If a 28077c478bd9Sstevel@tonic-gate * directly bound executable contains pic code, there may be a 28087c478bd9Sstevel@tonic-gate * reference to a definition that will eventually have a copy made. 28097c478bd9Sstevel@tonic-gate * However, this copy relocation may not yet have occurred, because 28107c478bd9Sstevel@tonic-gate * the relocation making this reference comes before the relocation 28117c478bd9Sstevel@tonic-gate * that will create the copy. 28127c478bd9Sstevel@tonic-gate * Under direct bindings, the syminfo indicates that a copy will be 28137c478bd9Sstevel@tonic-gate * taken (SYMINFO_FLG_COPY). This can only be set in an executable. 28147c478bd9Sstevel@tonic-gate * Thus, the caller must be the executable, so bind to the destination 28157c478bd9Sstevel@tonic-gate * of the copy within the executable. 28167c478bd9Sstevel@tonic-gate */ 28177c478bd9Sstevel@tonic-gate if (((slp->sl_flags & LKUP_COPY) == 0) && 28187c478bd9Sstevel@tonic-gate (sip->si_flags & SYMINFO_FLG_COPY)) { 28197c478bd9Sstevel@tonic-gate slp->sl_imap = LIST(clmp)->lm_head; 282008278a5eSRod Evans 282108278a5eSRod Evans if (ret = SYMINTP(clmp)(slp, srp, binfo, in_nfavl)) 28227c478bd9Sstevel@tonic-gate *binfo |= (DBG_BINFO_DIRECT | DBG_BINFO_COPYREF); 282308278a5eSRod Evans return (ret); 28247c478bd9Sstevel@tonic-gate } 28257c478bd9Sstevel@tonic-gate 28267c478bd9Sstevel@tonic-gate /* 2827efb9e8b8Srie * If we need to directly bind to our parent, start looking in each 2828efb9e8b8Srie * callers link map. 28297c478bd9Sstevel@tonic-gate */ 28307c478bd9Sstevel@tonic-gate sl = *slp; 28317c478bd9Sstevel@tonic-gate sl.sl_flags |= LKUP_DIRECT; 283208278a5eSRod Evans ret = 0; 28337c478bd9Sstevel@tonic-gate 28347c478bd9Sstevel@tonic-gate if (sip->si_boundto == SYMINFO_BT_PARENT) { 2835cce0e03bSab196087 Aliste idx1; 2836cce0e03bSab196087 Bnd_desc *bdp; 2837cce0e03bSab196087 Grp_hdl *ghp; 28387c478bd9Sstevel@tonic-gate 2839efb9e8b8Srie /* 2840efb9e8b8Srie * Determine the parent of this explicit dependency from its 2841efb9e8b8Srie * CALLERS()'s list. 2842efb9e8b8Srie */ 2843cce0e03bSab196087 for (APLIST_TRAVERSE(CALLERS(clmp), idx1, bdp)) { 2844cce0e03bSab196087 sl.sl_imap = lmp = bdp->b_caller; 284508278a5eSRod Evans if (ret = SYMINTP(lmp)(&sl, srp, binfo, in_nfavl)) 2846efb9e8b8Srie goto found; 2847efb9e8b8Srie } 2848efb9e8b8Srie 2849efb9e8b8Srie /* 2850efb9e8b8Srie * A caller can also be defined as the parent of a dlopen() 2851efb9e8b8Srie * call. Determine whether this object has any handles. The 2852efb9e8b8Srie * dependencies maintained with the handle represent the 2853efb9e8b8Srie * explicit dependencies of the dlopen()'ed object, and the 2854efb9e8b8Srie * calling parent. 2855efb9e8b8Srie */ 2856cce0e03bSab196087 for (APLIST_TRAVERSE(HANDLES(clmp), idx1, ghp)) { 2857efb9e8b8Srie Grp_desc *gdp; 2858cce0e03bSab196087 Aliste idx2; 2859efb9e8b8Srie 2860cce0e03bSab196087 for (ALIST_TRAVERSE(ghp->gh_depends, idx2, gdp)) { 2861efb9e8b8Srie if ((gdp->gd_flags & GPD_PARENT) == 0) 2862efb9e8b8Srie continue; 2863efb9e8b8Srie sl.sl_imap = lmp = gdp->gd_depend; 286408278a5eSRod Evans if (ret = SYMINTP(lmp)(&sl, srp, binfo, 286508278a5eSRod Evans in_nfavl)) 2866efb9e8b8Srie goto found; 2867efb9e8b8Srie } 28687c478bd9Sstevel@tonic-gate } 28697c478bd9Sstevel@tonic-gate } else { 28707c478bd9Sstevel@tonic-gate /* 28717c478bd9Sstevel@tonic-gate * If we need to direct bind to anything else look in the 28727c478bd9Sstevel@tonic-gate * link map associated with this symbol reference. 28737c478bd9Sstevel@tonic-gate */ 28747c478bd9Sstevel@tonic-gate if (sip->si_boundto == SYMINFO_BT_SELF) 28757c478bd9Sstevel@tonic-gate sl.sl_imap = lmp = clmp; 28767c478bd9Sstevel@tonic-gate else 28777c478bd9Sstevel@tonic-gate sl.sl_imap = lmp; 28787c478bd9Sstevel@tonic-gate 28797c478bd9Sstevel@tonic-gate if (lmp) 288008278a5eSRod Evans ret = SYMINTP(lmp)(&sl, srp, binfo, in_nfavl); 28817c478bd9Sstevel@tonic-gate } 2882efb9e8b8Srie found: 288308278a5eSRod Evans if (ret) 28847c478bd9Sstevel@tonic-gate *binfo |= DBG_BINFO_DIRECT; 28857c478bd9Sstevel@tonic-gate 28867c478bd9Sstevel@tonic-gate /* 2887adbfe822Srie * If a reference to a directly bound symbol can't be satisfied, then 2888adbfe822Srie * determine whether an interposer can provide the missing symbol. If 2889adbfe822Srie * a reference to a directly bound symbol is satisfied, then determine 2890adbfe822Srie * whether that object can be interposed upon for this symbol. 28917c478bd9Sstevel@tonic-gate */ 289208278a5eSRod Evans dlmp = srp->sr_dmap; 289308278a5eSRod Evans if ((ret == 0) || (dlmp && (LIST(dlmp)->lm_head != dlmp) && 289408278a5eSRod Evans (LIST(dlmp) == LIST(clmp)))) { 289508278a5eSRod Evans if (lookup_sym_interpose(slp, srp, binfo, in_nfavl)) 289608278a5eSRod Evans return (1); 28977c478bd9Sstevel@tonic-gate } 28987c478bd9Sstevel@tonic-gate 289908278a5eSRod Evans return (ret); 29007c478bd9Sstevel@tonic-gate } 29017c478bd9Sstevel@tonic-gate 290208278a5eSRod Evans static int 290308278a5eSRod Evans core_lookup_sym(Rt_map *ilmp, Slookup *slp, Sresult *srp, uint_t *binfo, 29049aa23310Srie Aliste off, int *in_nfavl) 29057c478bd9Sstevel@tonic-gate { 29067c478bd9Sstevel@tonic-gate Rt_map *lmp; 29077c478bd9Sstevel@tonic-gate 29087c478bd9Sstevel@tonic-gate /* 29097c478bd9Sstevel@tonic-gate * Copy relocations should start their search after the head of the 29107c478bd9Sstevel@tonic-gate * main link-map control list. 29117c478bd9Sstevel@tonic-gate */ 2912cce0e03bSab196087 if ((off == ALIST_OFF_DATA) && (slp->sl_flags & LKUP_COPY) && ilmp) 2913cb511613SAli Bahrami lmp = NEXT_RT_MAP(ilmp); 29147c478bd9Sstevel@tonic-gate else 29157c478bd9Sstevel@tonic-gate lmp = ilmp; 29167c478bd9Sstevel@tonic-gate 2917cb511613SAli Bahrami for (; lmp; lmp = NEXT_RT_MAP(lmp)) { 291860758829Srie if (callable(slp->sl_cmap, lmp, 0, slp->sl_flags)) { 29197c478bd9Sstevel@tonic-gate 29207c478bd9Sstevel@tonic-gate slp->sl_imap = lmp; 292108278a5eSRod Evans if ((SYMINTP(lmp)(slp, srp, binfo, in_nfavl)) || 292237ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN)) 292308278a5eSRod Evans return (1); 29247c478bd9Sstevel@tonic-gate } 29257c478bd9Sstevel@tonic-gate } 292608278a5eSRod Evans return (0); 29277c478bd9Sstevel@tonic-gate } 29287c478bd9Sstevel@tonic-gate 292908278a5eSRod Evans static int 293008278a5eSRod Evans rescan_lazy_find_sym(Rt_map *ilmp, Slookup *slp, Sresult *srp, uint_t *binfo, 29319aa23310Srie int *in_nfavl) 29327c478bd9Sstevel@tonic-gate { 29337c478bd9Sstevel@tonic-gate Rt_map *lmp; 29347c478bd9Sstevel@tonic-gate 2935cb511613SAli Bahrami for (lmp = ilmp; lmp; lmp = NEXT_RT_MAP(lmp)) { 29367c478bd9Sstevel@tonic-gate if (LAZY(lmp) == 0) 29377c478bd9Sstevel@tonic-gate continue; 293860758829Srie if (callable(slp->sl_cmap, lmp, 0, slp->sl_flags)) { 29397c478bd9Sstevel@tonic-gate 29407c478bd9Sstevel@tonic-gate slp->sl_imap = lmp; 294108278a5eSRod Evans if (elf_lazy_find_sym(slp, srp, binfo, in_nfavl)) 294208278a5eSRod Evans return (1); 29437c478bd9Sstevel@tonic-gate } 29447c478bd9Sstevel@tonic-gate } 294508278a5eSRod Evans return (0); 29467c478bd9Sstevel@tonic-gate } 29477c478bd9Sstevel@tonic-gate 294808278a5eSRod Evans static int 294908278a5eSRod Evans _lookup_sym(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl) 29507c478bd9Sstevel@tonic-gate { 29517c478bd9Sstevel@tonic-gate const char *name = slp->sl_name; 29527c478bd9Sstevel@tonic-gate Rt_map *clmp = slp->sl_cmap; 2953dae2dfb7Srie Lm_list *lml = LIST(clmp); 29547c478bd9Sstevel@tonic-gate Rt_map *ilmp = slp->sl_imap, *lmp; 29557c478bd9Sstevel@tonic-gate ulong_t rsymndx; 295608278a5eSRod Evans int ret; 29577c478bd9Sstevel@tonic-gate Syminfo *sip; 29587c478bd9Sstevel@tonic-gate Slookup sl; 29597c478bd9Sstevel@tonic-gate 29607c478bd9Sstevel@tonic-gate /* 29617c478bd9Sstevel@tonic-gate * Search the initial link map for the required symbol (this category is 29627c478bd9Sstevel@tonic-gate * selected by dlsym(), where individual link maps are searched for a 29637c478bd9Sstevel@tonic-gate * required symbol. Therefore, we know we have permission to look at 29647c478bd9Sstevel@tonic-gate * the link map). 29657c478bd9Sstevel@tonic-gate */ 296660758829Srie if (slp->sl_flags & LKUP_FIRST) 296708278a5eSRod Evans return (SYMINTP(ilmp)(slp, srp, binfo, in_nfavl)); 29687c478bd9Sstevel@tonic-gate 29697c478bd9Sstevel@tonic-gate /* 29707c478bd9Sstevel@tonic-gate * Determine whether this lookup can be satisfied by an objects direct, 29717c478bd9Sstevel@tonic-gate * or lazy binding information. This is triggered by a relocation from 29727c478bd9Sstevel@tonic-gate * the object (hence rsymndx is set). 29737c478bd9Sstevel@tonic-gate */ 29747c478bd9Sstevel@tonic-gate if (((rsymndx = slp->sl_rsymndx) != 0) && 2975aa736cbeSrie ((sip = SYMINFO(clmp)) != NULL)) { 2976dae2dfb7Srie uint_t bound; 2977dae2dfb7Srie 29787c478bd9Sstevel@tonic-gate /* 29797c478bd9Sstevel@tonic-gate * Find the corresponding Syminfo entry for the original 29807c478bd9Sstevel@tonic-gate * referencing symbol. 29817c478bd9Sstevel@tonic-gate */ 29827c478bd9Sstevel@tonic-gate /* LINTED */ 29837c478bd9Sstevel@tonic-gate sip = (Syminfo *)((char *)sip + (rsymndx * SYMINENT(clmp))); 2984dae2dfb7Srie bound = sip->si_boundto; 2985dae2dfb7Srie 2986dae2dfb7Srie /* 2987dae2dfb7Srie * Identify any EXTERN or PARENT references for ldd(1). 2988dae2dfb7Srie */ 2989dae2dfb7Srie if ((lml->lm_flags & LML_FLG_TRC_WARN) && 2990dae2dfb7Srie (bound > SYMINFO_BT_LOWRESERVE)) { 2991dae2dfb7Srie if (bound == SYMINFO_BT_PARENT) 2992dae2dfb7Srie *binfo |= DBG_BINFO_REF_PARENT; 2993dae2dfb7Srie if (bound == SYMINFO_BT_EXTERN) 2994dae2dfb7Srie *binfo |= DBG_BINFO_REF_EXTERN; 2995dae2dfb7Srie } 29967c478bd9Sstevel@tonic-gate 29977c478bd9Sstevel@tonic-gate /* 29987c478bd9Sstevel@tonic-gate * If the symbol information indicates a direct binding, 29997c478bd9Sstevel@tonic-gate * determine the link map that is required to satisfy the 30007c478bd9Sstevel@tonic-gate * binding. Note, if the dependency can not be found, but a 30017c478bd9Sstevel@tonic-gate * direct binding isn't required, we will still fall through 30027c478bd9Sstevel@tonic-gate * to perform any default symbol search. 30037c478bd9Sstevel@tonic-gate */ 30047c478bd9Sstevel@tonic-gate if (sip->si_flags & SYMINFO_FLG_DIRECT) { 30057c478bd9Sstevel@tonic-gate 30067c478bd9Sstevel@tonic-gate lmp = 0; 30077c478bd9Sstevel@tonic-gate if (bound < SYMINFO_BT_LOWRESERVE) 30089aa23310Srie lmp = elf_lazy_load(clmp, slp, bound, 30092017c965SRod Evans name, 0, NULL, in_nfavl); 30107c478bd9Sstevel@tonic-gate 30117c478bd9Sstevel@tonic-gate /* 30127c478bd9Sstevel@tonic-gate * If direct bindings have been disabled, and this isn't 30137c478bd9Sstevel@tonic-gate * a translator, skip any direct binding now that we've 301460758829Srie * ensured the resolving object has been loaded. 30157c478bd9Sstevel@tonic-gate * 30167c478bd9Sstevel@tonic-gate * If we need to direct bind to anything, we look in 30177c478bd9Sstevel@tonic-gate * ourselves, our parent, or in the link map we've just 30187c478bd9Sstevel@tonic-gate * loaded. Otherwise, even though we may have lazily 30197c478bd9Sstevel@tonic-gate * loaded an object we still continue to search for 30207c478bd9Sstevel@tonic-gate * symbols from the head of the link map list. 30217c478bd9Sstevel@tonic-gate */ 30227c478bd9Sstevel@tonic-gate if (((FLAGS(clmp) & FLG_RT_TRANS) || 3023dae2dfb7Srie (((lml->lm_tflags & LML_TFLG_NODIRECT) == 0) && 3024dae2dfb7Srie ((slp->sl_flags & LKUP_SINGLETON) == 0))) && 30259a411307Srie ((FLAGS1(clmp) & FL1_RT_DIRECT) || 30267c478bd9Sstevel@tonic-gate (sip->si_flags & SYMINFO_FLG_DIRECTBIND))) { 302708278a5eSRod Evans ret = lookup_sym_direct(slp, srp, binfo, 30289aa23310Srie sip, lmp, in_nfavl); 30297c478bd9Sstevel@tonic-gate 30307c478bd9Sstevel@tonic-gate /* 303160758829Srie * Determine whether this direct binding has 303260758829Srie * been rejected. If we've bound to a singleton 303360758829Srie * without following a singleton search, then 303460758829Srie * return. The caller detects this condition 303560758829Srie * and will trigger a new singleton search. 303660758829Srie * 303760758829Srie * For any other rejection (such as binding to 303860758829Srie * a symbol labeled as nodirect - presumably 303960758829Srie * because the symbol definition has been 304060758829Srie * changed since the referring object was last 304160758829Srie * built), fall through to a standard symbol 30427c478bd9Sstevel@tonic-gate * search. 30437c478bd9Sstevel@tonic-gate */ 304437ffaf83SRod Evans if (((*binfo & BINFO_MSK_REJECTED) == 0) || 304537ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN)) 304608278a5eSRod Evans return (ret); 304760758829Srie 304837ffaf83SRod Evans *binfo &= ~BINFO_MSK_REJECTED; 30497c478bd9Sstevel@tonic-gate } 30507c478bd9Sstevel@tonic-gate } 30517c478bd9Sstevel@tonic-gate } 30527c478bd9Sstevel@tonic-gate 305360758829Srie /* 305460758829Srie * Duplicate the lookup information, as we'll need to modify this 305560758829Srie * information for some of the following searches. 305660758829Srie */ 30577c478bd9Sstevel@tonic-gate sl = *slp; 30587c478bd9Sstevel@tonic-gate 30597c478bd9Sstevel@tonic-gate /* 30607c478bd9Sstevel@tonic-gate * If the referencing object has the DF_SYMBOLIC flag set, look in the 30617c478bd9Sstevel@tonic-gate * referencing object for the symbol first. Failing that, fall back to 30627c478bd9Sstevel@tonic-gate * our generic search. 30637c478bd9Sstevel@tonic-gate */ 306460758829Srie if ((FLAGS1(clmp) & FL1_RT_SYMBOLIC) && 306560758829Srie ((sl.sl_flags & LKUP_SINGLETON) == 0)) { 306608278a5eSRod Evans 30677c478bd9Sstevel@tonic-gate sl.sl_imap = clmp; 306808278a5eSRod Evans if (SYMINTP(clmp)(&sl, srp, binfo, in_nfavl)) { 306908278a5eSRod Evans Rt_map *dlmp = srp->sr_dmap; 307008278a5eSRod Evans ulong_t dsymndx = (((ulong_t)srp->sr_sym - 307108278a5eSRod Evans (ulong_t)SYMTAB(dlmp)) / SYMENT(dlmp)); 30729a411307Srie 30739a411307Srie /* 30749a411307Srie * Make sure this symbol hasn't explicitly been defined 30759a411307Srie * as nodirect. 30769a411307Srie */ 307708278a5eSRod Evans if (((sip = SYMINFO(dlmp)) == 0) || 30789a411307Srie /* LINTED */ 30799a411307Srie ((sip = (Syminfo *)((char *)sip + 308008278a5eSRod Evans (dsymndx * SYMINENT(dlmp)))) == 0) || 30819a411307Srie ((sip->si_flags & SYMINFO_FLG_NOEXTDIRECT) == 0)) 308208278a5eSRod Evans return (1); 30837c478bd9Sstevel@tonic-gate } 30849a411307Srie } 30857c478bd9Sstevel@tonic-gate 308660758829Srie sl.sl_flags |= LKUP_STANDARD; 308760758829Srie 30887c478bd9Sstevel@tonic-gate /* 30897c478bd9Sstevel@tonic-gate * If this lookup originates from a standard relocation, then traverse 309060758829Srie * all link-map control lists, inspecting any object that is available 309160758829Srie * to this caller. Otherwise, traverse the link-map control list 309260758829Srie * associated with the caller. 30937c478bd9Sstevel@tonic-gate */ 309460758829Srie if (sl.sl_flags & LKUP_STDRELOC) { 30957c478bd9Sstevel@tonic-gate Aliste off; 30967c478bd9Sstevel@tonic-gate Lm_cntl *lmc; 30977c478bd9Sstevel@tonic-gate 309808278a5eSRod Evans ret = 0; 30997c478bd9Sstevel@tonic-gate 3100dae2dfb7Srie for (ALIST_TRAVERSE_BY_OFFSET(lml->lm_lists, off, lmc)) { 310108278a5eSRod Evans if (((ret = core_lookup_sym(lmc->lc_head, &sl, srp, 310208278a5eSRod Evans binfo, off, in_nfavl)) != 0) || 310337ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN)) 31047c478bd9Sstevel@tonic-gate break; 31057c478bd9Sstevel@tonic-gate } 31067c478bd9Sstevel@tonic-gate } else 310708278a5eSRod Evans ret = core_lookup_sym(ilmp, &sl, srp, binfo, ALIST_OFF_DATA, 31089aa23310Srie in_nfavl); 310960758829Srie 311060758829Srie /* 311137ffaf83SRod Evans * If a symbol binding should be retried, return so that the search can 311237ffaf83SRod Evans * be repeated. 311360758829Srie */ 311437ffaf83SRod Evans if (*binfo & BINFO_MSK_TRYAGAIN) 311508278a5eSRod Evans return (0); 31167c478bd9Sstevel@tonic-gate 31177c478bd9Sstevel@tonic-gate /* 31187c478bd9Sstevel@tonic-gate * To allow transitioning into a world of lazy loading dependencies see 31197c478bd9Sstevel@tonic-gate * if this link map contains objects that have lazy dependencies still 31207c478bd9Sstevel@tonic-gate * outstanding. If so, and we haven't been able to locate a non-weak 31217c478bd9Sstevel@tonic-gate * symbol reference, start bringing in any lazy dependencies to see if 31227c478bd9Sstevel@tonic-gate * the reference can be satisfied. Use of dlsym(RTLD_PROBE) sets the 312375e7992aSrie * LKUP_NOFALLBACK flag, and this flag disables this fall back. 31247c478bd9Sstevel@tonic-gate */ 312508278a5eSRod Evans if ((ret == 0) && ((sl.sl_flags & LKUP_NOFALLBACK) == 0)) { 31267c478bd9Sstevel@tonic-gate if ((lmp = ilmp) == 0) 31277c478bd9Sstevel@tonic-gate lmp = LIST(clmp)->lm_head; 312875e7992aSrie 3129dae2dfb7Srie lml = LIST(lmp); 3130dae2dfb7Srie if ((sl.sl_flags & LKUP_WEAK) || (lml->lm_lazy == 0)) 313137ffaf83SRod Evans return (NULL); 31327c478bd9Sstevel@tonic-gate 3133dae2dfb7Srie DBG_CALL(Dbg_syms_lazy_rescan(lml, name)); 31347c478bd9Sstevel@tonic-gate 31357c478bd9Sstevel@tonic-gate /* 31367c478bd9Sstevel@tonic-gate * If this request originated from a dlsym(RTLD_NEXT) then start 31377c478bd9Sstevel@tonic-gate * looking for dependencies from the caller, otherwise use the 31387c478bd9Sstevel@tonic-gate * initial link-map. 31397c478bd9Sstevel@tonic-gate */ 314060758829Srie if (sl.sl_flags & LKUP_NEXT) 314108278a5eSRod Evans ret = rescan_lazy_find_sym(clmp, &sl, srp, binfo, 31422017c965SRod Evans in_nfavl); 31437c478bd9Sstevel@tonic-gate else { 3144cce0e03bSab196087 Aliste idx; 31457c478bd9Sstevel@tonic-gate Lm_cntl *lmc; 31467c478bd9Sstevel@tonic-gate 3147dae2dfb7Srie for (ALIST_TRAVERSE(lml->lm_lists, idx, lmc)) { 314875e7992aSrie sl.sl_flags |= LKUP_NOFALLBACK; 314908278a5eSRod Evans if (ret = rescan_lazy_find_sym(lmc->lc_head, 315008278a5eSRod Evans &sl, srp, binfo, in_nfavl)) 31517c478bd9Sstevel@tonic-gate break; 31527c478bd9Sstevel@tonic-gate } 31537c478bd9Sstevel@tonic-gate } 31547c478bd9Sstevel@tonic-gate } 315508278a5eSRod Evans return (ret); 315660758829Srie } 315760758829Srie 315860758829Srie /* 315960758829Srie * Symbol lookup routine. Takes an ELF symbol name, and a list of link maps to 316060758829Srie * search. If successful, return a pointer to the symbol table entry, a 316160758829Srie * pointer to the link map of the enclosing object, and information relating 316260758829Srie * to the type of binding. Else return a null pointer. 316360758829Srie * 316408278a5eSRod Evans * To improve ELF performance, we first compute the ELF hash value and pass 316508278a5eSRod Evans * it to each _lookup_sym() routine. The ELF function will use this value to 316660758829Srie * locate the symbol, the a.out function will simply ignore it. 316760758829Srie */ 316808278a5eSRod Evans int 316908278a5eSRod Evans lookup_sym(Slookup *slp, Sresult *srp, uint_t *binfo, int *in_nfavl) 317060758829Srie { 317160758829Srie Rt_map *clmp = slp->sl_cmap; 317208278a5eSRod Evans Sym *rsym = slp->sl_rsym; 317308278a5eSRod Evans uchar_t rtype = slp->sl_rtype, vis; 317408278a5eSRod Evans int ret, mode; 317560758829Srie 317660758829Srie if (slp->sl_hash == 0) 317775e7992aSrie slp->sl_hash = elf_hash(slp->sl_name); 317860758829Srie *binfo = 0; 317960758829Srie 318060758829Srie if (rsym) { 318108278a5eSRod Evans vis = ELF_ST_VISIBILITY(rsym->st_other); 318208278a5eSRod Evans 318308278a5eSRod Evans /* 318408278a5eSRod Evans * Symbols that are defined as protected, or hidden, within an 318508278a5eSRod Evans * object usually have any relocation references from within 318608278a5eSRod Evans * the same object bound at link-edit time. Therefore, ld.so.1 318708278a5eSRod Evans * is not involved. However, if a reference is to a 318808278a5eSRod Evans * capabilities symbol, this reference must be resolved at 318908278a5eSRod Evans * runtime. In this case look directly within the calling 319008278a5eSRod Evans * object, and only within the calling object, for these 319108278a5eSRod Evans * symbols. Note, an object may still use dlsym() to search 319208278a5eSRod Evans * externally for a symbol which is defined as protected within 319308278a5eSRod Evans * the same object. 319408278a5eSRod Evans */ 319508278a5eSRod Evans if ((rsym->st_shndx != SHN_UNDEF) && 319608278a5eSRod Evans ((slp->sl_flags & LKUP_DLSYM) == 0) && 319708278a5eSRod Evans ((vis == STV_PROTECTED) || (vis == STV_HIDDEN))) { 319808278a5eSRod Evans slp->sl_imap = clmp; 319908278a5eSRod Evans return (SYMINTP(clmp)(slp, srp, binfo, in_nfavl)); 320008278a5eSRod Evans } 320108278a5eSRod Evans 320208278a5eSRod Evans /* 320308278a5eSRod Evans * Establish any state that might be associated with a symbol 320408278a5eSRod Evans * reference. 320508278a5eSRod Evans */ 320660758829Srie if ((slp->sl_flags & LKUP_STDRELOC) && 320760758829Srie (ELF_ST_BIND(rsym->st_info) == STB_WEAK)) 320860758829Srie slp->sl_flags |= LKUP_WEAK; 320960758829Srie 321008278a5eSRod Evans if (vis == STV_SINGLETON) 321160758829Srie slp->sl_flags |= LKUP_SINGLETON; 321260758829Srie } 321360758829Srie 321460758829Srie /* 321560758829Srie * Establish any lookup state required for this type of relocation. 321660758829Srie */ 321760758829Srie if ((slp->sl_flags & LKUP_STDRELOC) && rtype) { 321860758829Srie if (rtype == M_R_COPY) 321960758829Srie slp->sl_flags |= LKUP_COPY; 322060758829Srie 322160758829Srie if (rtype != M_R_JMP_SLOT) 322260758829Srie slp->sl_flags |= LKUP_SPEC; 322360758829Srie } 322460758829Srie 322560758829Srie /* 322660758829Srie * Under ldd -w, any unresolved weak references are diagnosed. Set the 322760758829Srie * symbol binding as global to trigger a relocation error if the symbol 322860758829Srie * can not be found. 322960758829Srie */ 323060758829Srie if (rsym) { 323160758829Srie if (LIST(slp->sl_cmap)->lm_flags & LML_FLG_TRC_NOUNRESWEAK) 323260758829Srie slp->sl_bind = STB_GLOBAL; 323360758829Srie else if ((slp->sl_bind = ELF_ST_BIND(rsym->st_info)) == 323460758829Srie STB_WEAK) 323560758829Srie slp->sl_flags |= LKUP_WEAK; 323660758829Srie } 323760758829Srie 323860758829Srie /* 323937ffaf83SRod Evans * Save the callers MODE(). 324037ffaf83SRod Evans */ 324137ffaf83SRod Evans mode = MODE(clmp); 324237ffaf83SRod Evans 324337ffaf83SRod Evans /* 324460758829Srie * Carry out an initial symbol search. This search takes into account 324560758829Srie * all the modes of the requested search. 324660758829Srie */ 324708278a5eSRod Evans if (((ret = _lookup_sym(slp, srp, binfo, in_nfavl)) == 0) && 324837ffaf83SRod Evans (*binfo & BINFO_MSK_TRYAGAIN)) { 324960758829Srie Slookup sl = *slp; 325060758829Srie 325160758829Srie /* 325237ffaf83SRod Evans * Try the symbol search again. This retry can be necessary if: 325337ffaf83SRod Evans * 32542017c965SRod Evans * - a binding has been rejected because of binding to a 325537ffaf83SRod Evans * singleton without going through a singleton search. 32562017c965SRod Evans * - a group binding has resulted in binding to a symbol 325737ffaf83SRod Evans * that indicates no-direct binding. 325837ffaf83SRod Evans * 325937ffaf83SRod Evans * Reset the lookup data, and try again. 326060758829Srie */ 326160758829Srie sl.sl_imap = LIST(sl.sl_cmap)->lm_head; 326260758829Srie sl.sl_flags &= ~(LKUP_FIRST | LKUP_SELF | LKUP_NEXT); 326360758829Srie sl.sl_rsymndx = 0; 326437ffaf83SRod Evans 326537ffaf83SRod Evans if (*binfo & BINFO_REJSINGLE) 326637ffaf83SRod Evans sl.sl_flags |= LKUP_SINGLETON; 326737ffaf83SRod Evans if (*binfo & BINFO_REJGROUP) { 326837ffaf83SRod Evans sl.sl_flags |= LKUP_WORLD; 326937ffaf83SRod Evans mode |= RTLD_WORLD; 327037ffaf83SRod Evans } 327137ffaf83SRod Evans *binfo &= ~BINFO_MSK_REJECTED; 327237ffaf83SRod Evans 327308278a5eSRod Evans ret = _lookup_sym(&sl, srp, binfo, in_nfavl); 327460758829Srie } 32757c478bd9Sstevel@tonic-gate 32767c478bd9Sstevel@tonic-gate /* 32777c478bd9Sstevel@tonic-gate * If the caller is restricted to a symbol search within its group, 32787c478bd9Sstevel@tonic-gate * determine if it is necessary to follow a binding from outside of 32797c478bd9Sstevel@tonic-gate * the group. 32807c478bd9Sstevel@tonic-gate */ 328108278a5eSRod Evans if (((mode & (RTLD_GROUP | RTLD_WORLD)) == RTLD_GROUP) && 328208278a5eSRod Evans (lookup_sym_interpose(slp, srp, binfo, in_nfavl))) 328308278a5eSRod Evans return (1); 32847c478bd9Sstevel@tonic-gate 328508278a5eSRod Evans return (ret); 32867c478bd9Sstevel@tonic-gate } 32877c478bd9Sstevel@tonic-gate 32887c478bd9Sstevel@tonic-gate /* 32897c478bd9Sstevel@tonic-gate * Associate a binding descriptor with a caller and its dependency, or update 32907c478bd9Sstevel@tonic-gate * an existing descriptor. 32917c478bd9Sstevel@tonic-gate */ 32927c478bd9Sstevel@tonic-gate int 32937c478bd9Sstevel@tonic-gate bind_one(Rt_map *clmp, Rt_map *dlmp, uint_t flags) 32947c478bd9Sstevel@tonic-gate { 3295cce0e03bSab196087 Bnd_desc *bdp; 3296cce0e03bSab196087 Aliste idx; 32977c478bd9Sstevel@tonic-gate int found = ALE_CREATE; 32987c478bd9Sstevel@tonic-gate 32997c478bd9Sstevel@tonic-gate /* 33007c478bd9Sstevel@tonic-gate * Determine whether a binding descriptor already exists between the 33017c478bd9Sstevel@tonic-gate * two objects. 33027c478bd9Sstevel@tonic-gate */ 3303cce0e03bSab196087 for (APLIST_TRAVERSE(DEPENDS(clmp), idx, bdp)) { 33047c478bd9Sstevel@tonic-gate if (bdp->b_depend == dlmp) { 33057c478bd9Sstevel@tonic-gate found = ALE_EXISTS; 33067c478bd9Sstevel@tonic-gate break; 33077c478bd9Sstevel@tonic-gate } 33087c478bd9Sstevel@tonic-gate } 33097c478bd9Sstevel@tonic-gate 33107c478bd9Sstevel@tonic-gate if (found == ALE_CREATE) { 33117c478bd9Sstevel@tonic-gate /* 33127c478bd9Sstevel@tonic-gate * Create a new binding descriptor. 33137c478bd9Sstevel@tonic-gate */ 331437ffaf83SRod Evans if ((bdp = malloc(sizeof (Bnd_desc))) == NULL) 33157c478bd9Sstevel@tonic-gate return (0); 33167c478bd9Sstevel@tonic-gate 33177c478bd9Sstevel@tonic-gate bdp->b_caller = clmp; 33187c478bd9Sstevel@tonic-gate bdp->b_depend = dlmp; 33197c478bd9Sstevel@tonic-gate bdp->b_flags = 0; 33207c478bd9Sstevel@tonic-gate 33217c478bd9Sstevel@tonic-gate /* 33227c478bd9Sstevel@tonic-gate * Append the binding descriptor to the caller and the 33237c478bd9Sstevel@tonic-gate * dependency. 33247c478bd9Sstevel@tonic-gate */ 332556deab07SRod Evans if (aplist_append(&DEPENDS(clmp), bdp, AL_CNT_DEPENDS) == NULL) 33267c478bd9Sstevel@tonic-gate return (0); 33277c478bd9Sstevel@tonic-gate 332856deab07SRod Evans if (aplist_append(&CALLERS(dlmp), bdp, AL_CNT_CALLERS) == NULL) 33297c478bd9Sstevel@tonic-gate return (0); 33307c478bd9Sstevel@tonic-gate } 33317c478bd9Sstevel@tonic-gate 33327c478bd9Sstevel@tonic-gate if ((found == ALE_CREATE) || ((bdp->b_flags & flags) != flags)) { 33337c478bd9Sstevel@tonic-gate bdp->b_flags |= flags; 33347c478bd9Sstevel@tonic-gate 33357c478bd9Sstevel@tonic-gate if (flags & BND_REFER) 33367c478bd9Sstevel@tonic-gate FLAGS1(dlmp) |= FL1_RT_USED; 33377c478bd9Sstevel@tonic-gate 33385aefb655Srie DBG_CALL(Dbg_file_bind_entry(LIST(clmp), bdp)); 33397c478bd9Sstevel@tonic-gate } 33407c478bd9Sstevel@tonic-gate return (found); 33417c478bd9Sstevel@tonic-gate } 33427c478bd9Sstevel@tonic-gate 33437c478bd9Sstevel@tonic-gate /* 33447c478bd9Sstevel@tonic-gate * Cleanup after relocation processing. 33457c478bd9Sstevel@tonic-gate */ 33467c478bd9Sstevel@tonic-gate int 334756deab07SRod Evans relocate_finish(Rt_map *lmp, APlist *bound, int ret) 33487c478bd9Sstevel@tonic-gate { 33495aefb655Srie DBG_CALL(Dbg_reloc_run(lmp, 0, ret, DBG_REL_FINISH)); 33507c478bd9Sstevel@tonic-gate 33517c478bd9Sstevel@tonic-gate /* 33527c478bd9Sstevel@tonic-gate * Establish bindings to all objects that have been bound to. 33537c478bd9Sstevel@tonic-gate */ 33547c478bd9Sstevel@tonic-gate if (bound) { 3355cce0e03bSab196087 Rt_map *_lmp; 33568a20d9f8Srie Word used; 33577c478bd9Sstevel@tonic-gate 33588a20d9f8Srie /* 33598a20d9f8Srie * Only create bindings if the callers relocation was 33608a20d9f8Srie * successful (ret != 0), otherwise the object will eventually 33618a20d9f8Srie * be torn down. Create these bindings if running under ldd(1) 33628a20d9f8Srie * with the -U/-u options regardless of relocation errors, as 33638a20d9f8Srie * the unused processing needs to traverse these bindings to 33648a20d9f8Srie * diagnose unused objects. 33658a20d9f8Srie */ 33668a20d9f8Srie used = LIST(lmp)->lm_flags & 33678a20d9f8Srie (LML_FLG_TRC_UNREF | LML_FLG_TRC_UNUSED); 33688a20d9f8Srie 33698a20d9f8Srie if (ret || used) { 337056deab07SRod Evans Aliste idx; 337156deab07SRod Evans 3372cce0e03bSab196087 for (APLIST_TRAVERSE(bound, idx, _lmp)) { 33738a20d9f8Srie if (bind_one(lmp, _lmp, BND_REFER) || used) 33748a20d9f8Srie continue; 33758a20d9f8Srie 33767c478bd9Sstevel@tonic-gate ret = 0; 33777c478bd9Sstevel@tonic-gate break; 33787c478bd9Sstevel@tonic-gate } 33797c478bd9Sstevel@tonic-gate } 33807c478bd9Sstevel@tonic-gate free(bound); 33817c478bd9Sstevel@tonic-gate } 33827c478bd9Sstevel@tonic-gate 33837c478bd9Sstevel@tonic-gate return (ret); 33847c478bd9Sstevel@tonic-gate } 338556deab07SRod Evans 338656deab07SRod Evans /* 338756deab07SRod Evans * Function to correct protection settings. Segments are all mapped initially 338856deab07SRod Evans * with permissions as given in the segment header. We need to turn on write 338956deab07SRod Evans * permissions on a text segment if there are any relocations against that 339056deab07SRod Evans * segment, and then turn write permission back off again before returning 339156deab07SRod Evans * control to the caller. This function turns the permission on or off 339256deab07SRod Evans * depending on the value of the permission argument. 339356deab07SRod Evans */ 339456deab07SRod Evans int 339556deab07SRod Evans set_prot(Rt_map *lmp, mmapobj_result_t *mpp, int perm) 339656deab07SRod Evans { 339756deab07SRod Evans int prot; 339856deab07SRod Evans 339956deab07SRod Evans /* 340056deab07SRod Evans * If this is an allocated image (ie. a relocatable object) we can't 340156deab07SRod Evans * mprotect() anything. 340256deab07SRod Evans */ 340356deab07SRod Evans if (FLAGS(lmp) & FLG_RT_IMGALLOC) 340456deab07SRod Evans return (1); 340556deab07SRod Evans 340656deab07SRod Evans DBG_CALL(Dbg_file_prot(lmp, perm)); 340756deab07SRod Evans 340856deab07SRod Evans if (perm) 340956deab07SRod Evans prot = mpp->mr_prot | PROT_WRITE; 341056deab07SRod Evans else 341156deab07SRod Evans prot = mpp->mr_prot & ~PROT_WRITE; 341256deab07SRod Evans 341356deab07SRod Evans if (mprotect((void *)(uintptr_t)mpp->mr_addr, 341456deab07SRod Evans mpp->mr_msize, prot) == -1) { 341556deab07SRod Evans int err = errno; 341656deab07SRod Evans eprintf(LIST(lmp), ERR_FATAL, MSG_INTL(MSG_SYS_MPROT), 341756deab07SRod Evans NAME(lmp), strerror(err)); 341856deab07SRod Evans return (0); 341956deab07SRod Evans } 342056deab07SRod Evans mpp->mr_prot = prot; 342156deab07SRod Evans return (1); 342256deab07SRod Evans } 3423