Skip to content
Snippets Groups Projects
  1. Apr 13, 2020
  2. Apr 10, 2020
  3. Apr 07, 2020
    • Jeremy Soller's avatar
      Merge branch 'use_kernel_loaded_elf' into 'master' · 69fc6227
      Jeremy Soller authored
      Use Kernel mapped binaries when available.
      
      See merge request redox-os/relibc!262
      69fc6227
    • Ahmed Abd El Mawgood's avatar
      Use Kernel mapped binaries when available. · cc305fc5
      Ahmed Abd El Mawgood authored
      At least in linux kernel, assuming that a.out is an elf that is linked
      against relibc's own ld.so. When a user attempts `./a.out`, Linux kernel
      will map `./a.out`, then map `ld.so` and jump into ld.so entry point.
      In relibc ld.so will simply ignore the kernel mapped a.out and create
      its own mapping. This patch forces relic ld.so to use the already mapped
      `a.out` when ever possible. This would normally have slight performance
      improvement (especially that currently relibc doesn't map a.out but
      instead copy the data into empty mmaped memory).
      
      The real motivation behind this patch is while impelemnting Runtime
      linker debugging protocol for relibc. part of the protocol is ld.so
      inseting address of some ld.so managed data structure into .dynamic
      seciton of a.out then the debugger would check it there. The thing is
      that debuggers have information about the kernel loaded ./a.out and they
      check that one specifically which is in our case totally ignored by
      relibc.
      cc305fc5
  4. Mar 30, 2020
  5. Mar 25, 2020
  6. Mar 19, 2020
  7. Mar 11, 2020
  8. Mar 08, 2020
    • Ahmed Abd El Mawgood's avatar
      Resolve Both strong and weak symbols · 4860ab12
      Ahmed Abd El Mawgood authored
      This patch keep 2 lists, one for strong symbols and one for weak
      symbols. First it will check for the symbol to be resolved in the strong
      symbols' list, if it is not there it will then check in the weak symbol
      list.
      4860ab12
  9. Mar 07, 2020
    • Ahmed Abd El Mawgood's avatar
      Running ./fmt.sh · c2488b50
      Ahmed Abd El Mawgood authored
      These files needs formating by the auto formatter and It keeps popping
      up every time I format my own code.
      c2488b50
    • Ahmed Abd El Mawgood's avatar
      Refactor Linker::Link · 04ea2f93
      Ahmed Abd El Mawgood authored
      This patch does basically two things:
      - First make `global` variable not public, And make it accessable via a
      function `get_sym`.
      - Isolate the procedure that collect global symbols into single function
      that does that and call it `collect_syms`.
      
      The motivation of this patch is the second one where this procedure is
      extended, thus it needs a seamless way to access those symbols
      04ea2f93
  10. Mar 06, 2020
  11. Mar 01, 2020
  12. Feb 29, 2020
  13. Feb 24, 2020
    • Ahmed Abd El Mawgood's avatar
    • Ahmed Abd El Mawgood's avatar
      Add support for invoking ld.so via execve() and friends · 7f8dc2f2
      Ahmed Abd El Mawgood authored
      Introduction:
      
      The original implementation of `relibc_ld_so_start` assumes that
      ld.so will always be invoked manually as in "/lib/ld64.so ./a.out"
      The problem is regarding this snippet.
          if sp.argc < 2 {
            eprintln!("ld.so [executable] [arguments...]");
            unistd::_exit(1);
            loop {}
          }
      
      As such, In linux when user types "./a.out" he will recieve the message
          ld.so [executable] [arguments...]
      
      This patch makes use of AUXV, specifically AT_ENTRY. When invoking ld.so
      manually, AT_ENTRY happens to be the entry point of ld.so. But when
      running `./a.out` directly, AT_ENTRY becomes the entry point of `a.out`
      this patch compares AT_ENTRY to the entry point of ld.so, if they are
      equal only then it will assume that argv[1] is the real program and
      adjust the stack, otherwise it will proceed with the stack unadjusted.
      7f8dc2f2
  14. Feb 18, 2020
  15. Feb 14, 2020
  16. Feb 07, 2020
  17. Feb 06, 2020
    • Tiago's avatar
      platform/redox: Support AF_UNIX in accept. · 76f07b16
      Tiago authored
      As with the previous commit, accept() was calling inner_get_name() and
      assuming only "tcp:" or "udp:" addresses would be received. Thus, in
      order to support AF_UNIX sockets, inner_get_name() was split into two,
      inner_af_inet() and inner_af_unix() - where the former keeps the
      previous logic, dealing with "tcp:" and "udp:" addresses, and the latter
      deals now with "chan:" addresses and filling in the sockaddr_un
      appropriately.
      76f07b16
    • Tiago's avatar
      platform/redox: Support AF_UNIX in bind / connect. · d36cd727
      Tiago authored
      Previously, domain AF_INET was assumed while processing bind() /
      connect(), which end up calling bind_or_connect!. Instead, match on the
      domain type and process the path for AF_UNIX domains.
      d36cd727
    • Tiago's avatar
      platform/redox: Support AF_UNIX in socket. · 12f6ffd1
      Tiago authored
      To add support for UNIX sockets (AF_UNIX), of SOCK_STREAM type, the
      "chan:" scheme is used, which will be supportedby the ipcd running in
      userspace.
      
      Later commits add similar AF_UNIX support for the rest of the methods in
      impl PalSocket.
      12f6ffd1
    • Tiago's avatar
      header/sys_un: Set sockaddr_un members to public. · 2bc667f7
      Tiago authored
      Future commits will make use of this, in order to support AF_UNIX
      sockets.
      2bc667f7
  18. Jan 29, 2020
  19. Jan 28, 2020
  20. Jan 22, 2020
  21. Jan 20, 2020
Loading