Skip to content
Snippets Groups Projects
  1. Apr 26, 2020
  2. Apr 24, 2020
  3. Apr 19, 2020
    • Jeremy Soller's avatar
      Merge branch 'init_fini_ld.so' into 'master' · 763bb248
      Jeremy Soller authored
      Init fini ld.so
      
      See merge request redox-os/relibc!265
      763bb248
    • Ahmed Abd El Mawgood's avatar
      Move IO Initialization to .init_array section · b717f6cf
      Ahmed Abd El Mawgood authored
      Most shared object in linux have their initialization in a separate
      .init_array section. but glibc does not have the same behavour. Instead
      the initialization is part of crt0. which (as it seams to me) run after
      .init_array section. As such, this patch move IO initialization to
      separate function that is marked as .init_array member and then the crt0
      call this function only if init_array was never invoked (as in
      statically linked binaries).
      b717f6cf
    • Ahmed Abd El Mawgood's avatar
      Implement code that use .init_array and .fini_array · 6aeb2d6f
      Ahmed Abd El Mawgood authored
      This patch implements ld.so code that makes use of both .init_array and
      .fini_array. .init_array is fully utilized and is used in the correct
      manner. However .fini_array is not used yet although the function that
      runs .fini_array exists
      6aeb2d6f
    • Ahmed Abd El Mawgood's avatar
      Catch circular dependency when resolving loading shared libraries · cc7ff54d
      Ahmed Abd El Mawgood authored
      This patch implements tree-based data-structure for catching circular
      dependency where libA.so will depen on arbitrarily long chain (including
      zero length) of libNs.so one of which will depend on libA.so again. The
      main intention of this patch was merely capturing the dependency tree to
      prioterize which Elf's .init_array and which .fini_array should run
      first, but as a side effect it can capture circular dependencies as well.
      cc7ff54d
  4. Apr 15, 2020
  5. Apr 14, 2020
  6. Apr 13, 2020
  7. Apr 10, 2020
  8. Apr 07, 2020
    • Jeremy Soller's avatar
      Merge branch 'use_kernel_loaded_elf' into 'master' · 69fc6227
      Jeremy Soller authored
      Use Kernel mapped binaries when available.
      
      See merge request redox-os/relibc!262
      69fc6227
    • Ahmed Abd El Mawgood's avatar
      Use Kernel mapped binaries when available. · cc305fc5
      Ahmed Abd El Mawgood authored
      At least in linux kernel, assuming that a.out is an elf that is linked
      against relibc's own ld.so. When a user attempts `./a.out`, Linux kernel
      will map `./a.out`, then map `ld.so` and jump into ld.so entry point.
      In relibc ld.so will simply ignore the kernel mapped a.out and create
      its own mapping. This patch forces relic ld.so to use the already mapped
      `a.out` when ever possible. This would normally have slight performance
      improvement (especially that currently relibc doesn't map a.out but
      instead copy the data into empty mmaped memory).
      
      The real motivation behind this patch is while impelemnting Runtime
      linker debugging protocol for relibc. part of the protocol is ld.so
      inseting address of some ld.so managed data structure into .dynamic
      seciton of a.out then the debugger would check it there. The thing is
      that debuggers have information about the kernel loaded ./a.out and they
      check that one specifically which is in our case totally ignored by
      relibc.
      cc305fc5
  9. Mar 30, 2020
  10. Mar 25, 2020
  11. Mar 19, 2020
  12. Mar 11, 2020
  13. Mar 08, 2020
    • Ahmed Abd El Mawgood's avatar
      Resolve Both strong and weak symbols · 4860ab12
      Ahmed Abd El Mawgood authored
      This patch keep 2 lists, one for strong symbols and one for weak
      symbols. First it will check for the symbol to be resolved in the strong
      symbols' list, if it is not there it will then check in the weak symbol
      list.
      4860ab12
  14. Mar 07, 2020
    • Ahmed Abd El Mawgood's avatar
      Running ./fmt.sh · c2488b50
      Ahmed Abd El Mawgood authored
      These files needs formating by the auto formatter and It keeps popping
      up every time I format my own code.
      c2488b50
    • Ahmed Abd El Mawgood's avatar
      Refactor Linker::Link · 04ea2f93
      Ahmed Abd El Mawgood authored
      This patch does basically two things:
      - First make `global` variable not public, And make it accessable via a
      function `get_sym`.
      - Isolate the procedure that collect global symbols into single function
      that does that and call it `collect_syms`.
      
      The motivation of this patch is the second one where this procedure is
      extended, thus it needs a seamless way to access those symbols
      04ea2f93
  15. Mar 06, 2020
  16. Mar 01, 2020
  17. Feb 29, 2020
  18. Feb 24, 2020
    • Ahmed Abd El Mawgood's avatar
    • Ahmed Abd El Mawgood's avatar
      Add support for invoking ld.so via execve() and friends · 7f8dc2f2
      Ahmed Abd El Mawgood authored
      Introduction:
      
      The original implementation of `relibc_ld_so_start` assumes that
      ld.so will always be invoked manually as in "/lib/ld64.so ./a.out"
      The problem is regarding this snippet.
          if sp.argc < 2 {
            eprintln!("ld.so [executable] [arguments...]");
            unistd::_exit(1);
            loop {}
          }
      
      As such, In linux when user types "./a.out" he will recieve the message
          ld.so [executable] [arguments...]
      
      This patch makes use of AUXV, specifically AT_ENTRY. When invoking ld.so
      manually, AT_ENTRY happens to be the entry point of ld.so. But when
      running `./a.out` directly, AT_ENTRY becomes the entry point of `a.out`
      this patch compares AT_ENTRY to the entry point of ld.so, if they are
      equal only then it will assume that argv[1] is the real program and
      adjust the stack, otherwise it will proceed with the stack unadjusted.
      7f8dc2f2
  19. Feb 18, 2020
  20. Feb 14, 2020
  21. Feb 07, 2020
  22. Feb 06, 2020
    • Tiago's avatar
      platform/redox: Support AF_UNIX in accept. · 76f07b16
      Tiago authored
      As with the previous commit, accept() was calling inner_get_name() and
      assuming only "tcp:" or "udp:" addresses would be received. Thus, in
      order to support AF_UNIX sockets, inner_get_name() was split into two,
      inner_af_inet() and inner_af_unix() - where the former keeps the
      previous logic, dealing with "tcp:" and "udp:" addresses, and the latter
      deals now with "chan:" addresses and filling in the sockaddr_un
      appropriately.
      76f07b16
Loading