auto import from //depot/cupcake/@132589
This commit is contained in:
161
linker/linker.c
161
linker/linker.c
@@ -49,8 +49,6 @@
|
||||
#include "linker.h"
|
||||
#include "linker_debug.h"
|
||||
|
||||
#include "ba.h"
|
||||
|
||||
#define SO_MAX 64
|
||||
|
||||
/* >>> IMPORTANT NOTE - READ ME BEFORE MODIFYING <<<
|
||||
@@ -112,8 +110,7 @@ extern void __attribute__((noinline)) rtld_db_dlactivity(void);
|
||||
|
||||
extern void sched_yield(void);
|
||||
|
||||
static struct r_debug _r_debug = {1, NULL, &rtld_db_dlactivity,
|
||||
RT_CONSISTENT, 0};
|
||||
static struct r_debug _r_debug = {1, NULL, &rtld_db_dlactivity, RT_CONSISTENT, 0};
|
||||
static struct link_map *r_debug_tail = 0;
|
||||
|
||||
//static pthread_mutex_t _r_debug_lock = PTHREAD_MUTEX_INITIALIZER;
|
||||
@@ -210,7 +207,6 @@ static soinfo *alloc_info(const char *name)
|
||||
memset(si, 0, sizeof(soinfo));
|
||||
strcpy((char*) si->name, name);
|
||||
sonext->next = si;
|
||||
si->ba_index = -1; /* by default, prelinked */
|
||||
si->next = NULL;
|
||||
si->refcount = 0;
|
||||
sonext = si;
|
||||
@@ -482,6 +478,8 @@ static int open_library(const char *name)
|
||||
return -1;
|
||||
}
|
||||
|
||||
static unsigned libbase = LIBBASE;
|
||||
|
||||
/* temporary space for holding the first page of the shared lib
|
||||
* which contains the elf header (with the pht). */
|
||||
static unsigned char __header[PAGE_SIZE];
|
||||
@@ -627,67 +625,64 @@ get_lib_extents(int fd, const char *name, void *__hdr, unsigned *total_sz)
|
||||
* segments into the correct locations within this memory range.
|
||||
*
|
||||
* Args:
|
||||
* si->base: The requested base of the allocation. If 0, a sane one will be
|
||||
* req_base: The requested base of the allocation. If 0, a sane one will be
|
||||
* chosen in the range LIBBASE <= base < LIBLAST.
|
||||
* si->size: The size of the allocation.
|
||||
* sz: The size of the allocation.
|
||||
*
|
||||
* Returns:
|
||||
* -1 on failure, and 0 on success. On success, si->base will contain
|
||||
* the virtual address at which the library will be mapped.
|
||||
* NULL on failure, and non-NULL pointer to memory region on success.
|
||||
*/
|
||||
|
||||
static int reserve_mem_region(soinfo *si)
|
||||
static void *
|
||||
alloc_mem_region(const char *name, unsigned req_base, unsigned sz)
|
||||
{
|
||||
void *base = mmap((void *)si->base, si->size, PROT_READ | PROT_EXEC,
|
||||
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
|
||||
if (base == MAP_FAILED) {
|
||||
ERROR("%5d can NOT map (%sprelinked) library '%s' at 0x%08x "
|
||||
"as requested, will try general pool: %d (%s)\n",
|
||||
pid, (si->base ? "" : "non-"), si->name, si->base,
|
||||
errno, strerror(errno));
|
||||
return -1;
|
||||
} else if (base != (void *)si->base) {
|
||||
ERROR("OOPS: %5d %sprelinked library '%s' mapped at 0x%08x, "
|
||||
"not at 0x%08x\n", pid, (si->base ? "" : "non-"),
|
||||
si->name, (unsigned)base, si->base);
|
||||
munmap(base, si->size);
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
void *base;
|
||||
|
||||
static int
|
||||
alloc_mem_region(soinfo *si)
|
||||
{
|
||||
if (si->base) {
|
||||
/* Attempt to mmap a prelinked library. */
|
||||
si->ba_index = -1;
|
||||
return reserve_mem_region(si);
|
||||
}
|
||||
|
||||
/* This is not a prelinked library, so we attempt to allocate space
|
||||
for it from the buddy allocator, which manages the area between
|
||||
LIBBASE and LIBLAST.
|
||||
*/
|
||||
si->ba_index = ba_allocate(si->size);
|
||||
if(si->ba_index >= 0) {
|
||||
si->base = ba_start_addr(si->ba_index);
|
||||
PRINT("%5d mapping library '%s' at %08x (index %d) " \
|
||||
"through buddy allocator.\n",
|
||||
pid, si->name, si->base, si->ba_index);
|
||||
if (reserve_mem_region(si) < 0) {
|
||||
ba_free(si->ba_index);
|
||||
si->ba_index = -1;
|
||||
si->base = 0;
|
||||
goto err;
|
||||
if (req_base) {
|
||||
/* we should probably map it as PROT_NONE, but the init code needs
|
||||
* to read the phdr, so mark everything as readable. */
|
||||
base = mmap((void *)req_base, sz, PROT_READ | PROT_EXEC,
|
||||
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
|
||||
if (base == MAP_FAILED) {
|
||||
WARN("%5d can NOT map (prelinked) library '%s' at 0x%08x "
|
||||
"as requested, will try general pool: %d (%s)\n",
|
||||
pid, name, req_base, errno, strerror(errno));
|
||||
} else if (base != (void *)req_base) {
|
||||
ERROR("OOPS: %5d prelinked library '%s' mapped at 0x%08x, "
|
||||
"not at 0x%08x\n", pid, name, (unsigned)base, req_base);
|
||||
munmap(base, sz);
|
||||
return NULL;
|
||||
}
|
||||
return 0;
|
||||
|
||||
/* Here we know that we got a valid allocation. Hooray! */
|
||||
return base;
|
||||
}
|
||||
|
||||
/* We either did not request a specific base address to map at
|
||||
* (i.e. not-prelinked) OR we could not map at the requested address.
|
||||
* Try to find a memory range in our "reserved" area that can be mapped.
|
||||
*/
|
||||
while(libbase < LIBLAST) {
|
||||
base = mmap((void*) libbase, sz, PROT_READ | PROT_EXEC,
|
||||
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
|
||||
|
||||
if(((unsigned)base) == libbase) {
|
||||
/* success -- got the address we wanted */
|
||||
return base;
|
||||
}
|
||||
|
||||
/* If we got a different address than requested (rather than
|
||||
* just a failure), we need to unmap the mismapped library
|
||||
* before trying again
|
||||
*/
|
||||
if(base != MAP_FAILED)
|
||||
munmap(base, sz);
|
||||
|
||||
libbase += LIBINC;
|
||||
}
|
||||
|
||||
err:
|
||||
ERROR("OOPS: %5d cannot map library '%s'. no vspace available.\n",
|
||||
pid, si->name);
|
||||
return -1;
|
||||
pid, name);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
#define MAYBE_MAP_FLAG(x,from,to) (((x) & (from)) ? (to) : 0)
|
||||
@@ -917,7 +912,8 @@ load_library(const char *name)
|
||||
int cnt;
|
||||
unsigned ext_sz;
|
||||
unsigned req_base;
|
||||
soinfo *si = NULL;
|
||||
void *base;
|
||||
soinfo *si;
|
||||
Elf32_Ehdr *hdr;
|
||||
|
||||
if(fd == -1)
|
||||
@@ -943,6 +939,14 @@ load_library(const char *name)
|
||||
TRACE("[ %5d - '%s' (%s) wants base=0x%08x sz=0x%08x ]\n", pid, name,
|
||||
(req_base ? "prelinked" : "not pre-linked"), req_base, ext_sz);
|
||||
|
||||
/* Carve out a chunk of memory where we will map in the individual
|
||||
* segments */
|
||||
base = alloc_mem_region(name, req_base, ext_sz);
|
||||
if (base == NULL)
|
||||
goto fail;
|
||||
TRACE("[ %5d allocated memory for %s @ %p (0x%08x) ]\n",
|
||||
pid, name, base, (unsigned) ext_sz);
|
||||
|
||||
/* Now configure the soinfo struct where we'll store all of our data
|
||||
* for the ELF object. If the loading fails, we waste the entry, but
|
||||
* same thing would happen if we failed during linking. Configuring the
|
||||
@@ -952,31 +956,19 @@ load_library(const char *name)
|
||||
if (si == NULL)
|
||||
goto fail;
|
||||
|
||||
/* Carve out a chunk of memory where we will map in the individual
|
||||
* segments */
|
||||
si->base = req_base;
|
||||
si->base = (unsigned)base;
|
||||
si->size = ext_sz;
|
||||
si->flags = 0;
|
||||
si->entry = 0;
|
||||
si->dynamic = (unsigned *)-1;
|
||||
if (alloc_mem_region(si) < 0)
|
||||
goto fail;
|
||||
|
||||
TRACE("[ %5d allocated memory for %s @ %p (0x%08x) ]\n",
|
||||
pid, name, (void *)si->base, (unsigned) ext_sz);
|
||||
|
||||
/* Now actually load the library's segments into right places in memory */
|
||||
if (load_segments(fd, &__header[0], si) < 0) {
|
||||
if (si->ba_index >= 0) {
|
||||
ba_free(si->ba_index);
|
||||
si->ba_index = -1;
|
||||
}
|
||||
if (load_segments(fd, &__header[0], si) < 0)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
/* this might not be right. Technically, we don't even need this info
|
||||
* once we go through 'load_segments'. */
|
||||
hdr = (Elf32_Ehdr *)si->base;
|
||||
hdr = (Elf32_Ehdr *)base;
|
||||
si->phdr = (Elf32_Phdr *)((unsigned char *)si->base + hdr->e_phoff);
|
||||
si->phnum = hdr->e_phnum;
|
||||
/**/
|
||||
@@ -985,7 +977,6 @@ load_library(const char *name)
|
||||
return si;
|
||||
|
||||
fail:
|
||||
if (si) free_info(si);
|
||||
close(fd);
|
||||
return NULL;
|
||||
}
|
||||
@@ -994,6 +985,8 @@ static soinfo *
|
||||
init_library(soinfo *si)
|
||||
{
|
||||
unsigned wr_offset = 0xffffffff;
|
||||
unsigned libbase_before = 0;
|
||||
unsigned libbase_after = 0;
|
||||
|
||||
/* At this point we know that whatever is loaded @ base is a valid ELF
|
||||
* shared library whose segments are properly mapped in. */
|
||||
@@ -1003,10 +996,24 @@ init_library(soinfo *si)
|
||||
if (si->base < LIBBASE || si->base >= LIBLAST)
|
||||
si->flags |= FLAG_PRELINKED;
|
||||
|
||||
/* Adjust libbase for the size of this library, rounded up to
|
||||
** LIBINC alignment. Make note of the previous and current
|
||||
** value of libbase to allow us to roll back in the event of
|
||||
** a link failure.
|
||||
*/
|
||||
if (!(si->flags & FLAG_PRELINKED)) {
|
||||
libbase_before = libbase;
|
||||
libbase += (si->size + (LIBINC - 1)) & (~(LIBINC - 1));
|
||||
libbase_after = libbase;
|
||||
}
|
||||
|
||||
if(link_image(si, wr_offset)) {
|
||||
/* We failed to link. However, we can only restore libbase
|
||||
** if no additional libraries have moved it since we updated it.
|
||||
*/
|
||||
if(!(si->flags & FLAG_PRELINKED) && (libbase == libbase_after)) {
|
||||
libbase = libbase_before;
|
||||
}
|
||||
munmap((void *)si->base, si->size);
|
||||
return NULL;
|
||||
}
|
||||
@@ -1060,12 +1067,6 @@ unsigned unload_library(soinfo *si)
|
||||
}
|
||||
|
||||
munmap((char *)si->base, si->size);
|
||||
if (si->ba_index >= 0) {
|
||||
PRINT("%5d releasing library '%s' address space at %08x "\
|
||||
"through buddy allocator.\n",
|
||||
pid, si->name, si->base);
|
||||
ba_free(si->ba_index);
|
||||
}
|
||||
free_info(si);
|
||||
si->refcount = 0;
|
||||
}
|
||||
@@ -1707,8 +1708,6 @@ unsigned __linker_init(unsigned **elfdata)
|
||||
vecs += 2;
|
||||
}
|
||||
|
||||
ba_init();
|
||||
|
||||
si->base = 0;
|
||||
si->dynamic = (unsigned *)-1;
|
||||
si->wrprotect_start = 0xffffffff;
|
||||
|
Reference in New Issue
Block a user