2
0

start.rs 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296
  1. use alloc::{boxed::Box, vec::Vec};
  2. use core::{intrinsics, ptr, fmt::Debug};
  3. use crate::{
  4. header::{libgen, stdio, stdlib},
  5. ld_so::{self, linker::Linker},
  6. platform::{self, get_auxvs, new_mspace, types::*, Pal, Sys},
  7. sync::mutex::Mutex,
  8. ALLOCATOR,
  9. };
  10. #[repr(C)]
  11. pub struct Stack {
  12. pub argc: isize,
  13. pub argv0: *const c_char,
  14. }
  15. impl Stack {
  16. pub fn argv(&self) -> *const *const c_char {
  17. &self.argv0 as *const _
  18. }
  19. pub fn envp(&self) -> *const *const c_char {
  20. unsafe { self.argv().offset(self.argc + 1) }
  21. }
  22. pub fn auxv(&self) -> *const (usize, usize) {
  23. unsafe {
  24. let mut envp = self.envp();
  25. while !(*envp).is_null() {
  26. envp = envp.add(1);
  27. }//timer_init
  28. envp.add(1) as *const (usize, usize)
  29. }
  30. }
  31. }
  32. impl Debug for Stack{
  33. fn fmt(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
  34. f.debug_struct("Stack")
  35. .field("argc", &self.argc)
  36. .field("argv0", &self.argv0)
  37. .finish()
  38. }
  39. }
  40. unsafe fn copy_string_array(array: *const *const c_char, len: usize) -> Vec<*mut c_char> {
  41. println!("copy_string_array: array: {:p}, len: {}", array, len);
  42. let mut vec = Vec::with_capacity(len + 1);
  43. let x = vec.into_raw_parts();
  44. println!("{:#018x?}",x.0);
  45. let mut vec=alloc::vec::Vec::from_raw_parts(x.0, x.1, x.2);
  46. println!("new vec ok");
  47. for i in 0..len {
  48. let item = *array.add(i);
  49. let mut len = 0;
  50. while *item.add(len) != 0 {
  51. len += 1;
  52. }
  53. let buf = platform::alloc(len + 1) as *mut c_char;
  54. for i in 0..=len {
  55. *buf.add(i) = *item.add(i);
  56. }
  57. vec.push(buf);
  58. }
  59. vec.push(ptr::null_mut());
  60. vec
  61. }
  62. // Since Redox and Linux are so similar, it is easy to accidentally run a binary from one on the
  63. // other. This will test that the current system is compatible with the current binary
  64. #[no_mangle]
  65. pub unsafe fn relibc_verify_host() {
  66. if !Sys::verify() {
  67. intrinsics::abort();
  68. }
  69. }
  70. #[link_section = ".init_array"]
  71. #[used]
  72. static INIT_ARRAY: [extern "C" fn(); 1] = [init_array];
  73. static mut init_complete: bool = false;
  74. #[used]
  75. #[no_mangle]
  76. static mut __relibc_init_environ: *mut *mut c_char = ptr::null_mut();
  77. fn alloc_init() {
  78. unsafe {
  79. if init_complete {
  80. return;
  81. }
  82. }
  83. unsafe {
  84. dbg!("in alloc init");
  85. if let Some(tcb) = ld_so::tcb::Tcb::current() {
  86. println!("tcb.mspace {}",tcb.mspace);
  87. if tcb.mspace != 0 {
  88. ALLOCATOR.set_book_keeper(tcb.mspace);
  89. } else if ALLOCATOR.get_book_keeper() == 0 {
  90. ALLOCATOR.set_book_keeper(new_mspace());
  91. }
  92. } else if ALLOCATOR.get_book_keeper() == 0 {
  93. dbg!("TRY");
  94. ALLOCATOR.set_book_keeper(new_mspace());
  95. dbg!("ALLOCATOR OWARI DAWA");
  96. }
  97. }
  98. }
  99. extern "C" fn init_array() {
  100. // The thing is that we cannot guarantee if
  101. // init_array runs first or if relibc_start runs first
  102. // Still whoever gets to run first must initialize rust
  103. // memory allocator before doing anything else.
  104. unsafe {
  105. if init_complete {
  106. return;
  107. }
  108. }
  109. alloc_init();
  110. io_init();
  111. unsafe {
  112. if platform::environ.is_null() {
  113. platform::environ = __relibc_init_environ;
  114. }
  115. }
  116. extern "C" {
  117. fn pthread_init();
  118. }
  119. unsafe {
  120. pthread_init();
  121. init_complete = true
  122. }
  123. }
  124. fn io_init() {
  125. unsafe {
  126. // Initialize stdin/stdout/stderr,
  127. // see https://github.com/rust-lang/rust/issues/51718
  128. stdio::stdin = stdio::default_stdin.get();
  129. stdio::stdout = stdio::default_stdout.get();
  130. stdio::stderr = stdio::default_stderr.get();
  131. }
  132. }
  133. #[cfg(target_os = "redox")]
  134. fn setup_sigstack() {
  135. use syscall::{Map, MapFlags};
  136. const SIGSTACK_SIZE: usize = 1024 * 256;
  137. let sigstack = unsafe {
  138. syscall::fmap(
  139. !0,
  140. &Map {
  141. address: 0,
  142. offset: 0,
  143. flags: MapFlags::MAP_PRIVATE | MapFlags::PROT_READ | MapFlags::PROT_WRITE,
  144. size: SIGSTACK_SIZE,
  145. },
  146. )
  147. }
  148. .expect("failed to allocate sigstack")
  149. + SIGSTACK_SIZE;
  150. let fd = syscall::open(
  151. "thisproc:current/sigstack",
  152. syscall::O_WRONLY | syscall::O_CLOEXEC,
  153. )
  154. .expect("failed to open thisproc:current/sigstack");
  155. syscall::write(fd, &usize::to_ne_bytes(sigstack))
  156. .expect("failed to write to thisproc:current/sigstack");
  157. let _ = syscall::close(fd);
  158. }
  159. #[inline(never)]
  160. #[no_mangle]
  161. pub unsafe extern "C" fn relibc_start(sp: &'static Stack) -> ! {
  162. extern "C" {
  163. static __preinit_array_start: extern "C" fn();
  164. static __preinit_array_end: extern "C" fn();
  165. static __init_array_start: extern "C" fn();
  166. static __init_array_end: extern "C" fn();
  167. fn _init();
  168. fn main(argc: isize, argv: *mut *mut c_char, envp: *mut *mut c_char) -> c_int;
  169. }
  170. println!("relibc_start: sp={:?}", sp);
  171. // Ensure correct host system before executing more system calls
  172. relibc_verify_host();
  173. use core::arch::asm;
  174. // Initialize TLS, if necessary
  175. ld_so::init(sp);
  176. println!("alloc init");
  177. //println!("alloc init ok_________________");
  178. // Set up the right allocator...
  179. // if any memory rust based memory allocation happen before this step .. we are doomed.
  180. alloc_init();
  181. println!("alloc init ok");
  182. if let Some(tcb) = ld_so::tcb::Tcb::current() {
  183. // Update TCB mspace
  184. tcb.mspace = ALLOCATOR.get_book_keeper();
  185. // Set linker pointer if necessary
  186. if tcb.linker_ptr.is_null() {
  187. //TODO: get ld path
  188. let linker = Linker::new(None);
  189. //TODO: load root object
  190. tcb.linker_ptr = Box::into_raw(Box::new(Mutex::new(linker)));
  191. }
  192. }
  193. println!("to copy args");
  194. // Set up argc and argv
  195. let argc = sp.argc;
  196. let argv = sp.argv();
  197. platform::inner_argv = copy_string_array(argv, argc as usize);
  198. println!("copy args ok");
  199. platform::argv = platform::inner_argv.as_mut_ptr();
  200. // Special code for program_invocation_name and program_invocation_short_name
  201. if let Some(arg) = platform::inner_argv.get(0) {
  202. platform::program_invocation_name = *arg;
  203. platform::program_invocation_short_name = libgen::basename(*arg);
  204. }
  205. println!("to check environ");
  206. // We check for NULL here since ld.so might already have initialized it for us, and we don't
  207. // want to overwrite it if constructors in .init_array of dependency libraries have called
  208. // setenv.
  209. if platform::environ.is_null() {
  210. // Set up envp
  211. let envp = sp.envp();
  212. let mut len = 0;
  213. while !(*envp.add(len)).is_null() {
  214. len += 1;
  215. }
  216. platform::OUR_ENVIRON = copy_string_array(envp, len);
  217. platform::environ = platform::OUR_ENVIRON.as_mut_ptr();
  218. }
  219. println!("to get auxvs");
  220. let auxvs = get_auxvs(sp.auxv().cast());
  221. println!("to init platform");
  222. crate::platform::init(auxvs);
  223. // Setup signal stack, otherwise we cannot handle any signals besides SIG_IGN/SIG_DFL behavior.
  224. #[cfg(target_os = "redox")]
  225. setup_sigstack();
  226. println!("before init_array()");
  227. init_array();
  228. println!("init_array() ok");
  229. // Run preinit array
  230. {
  231. let mut f = &__preinit_array_start as *const _;
  232. #[allow(clippy::op_ref)]
  233. while f < &__preinit_array_end {
  234. (*f)();
  235. f = f.offset(1);
  236. }
  237. }
  238. println!("before _init()");
  239. // Call init section
  240. _init();
  241. println!("after _init()");
  242. // Run init array
  243. {
  244. let mut f = &__init_array_start as *const _;
  245. #[allow(clippy::op_ref)]
  246. while f < &__init_array_end {
  247. (*f)();
  248. f = f.offset(1);
  249. }
  250. }
  251. println!("to run main()");
  252. // not argv or envp, because programs like bash try to modify this *const* pointer :|
  253. stdlib::exit(main(argc, platform::argv, platform::environ));
  254. unreachable!();
  255. }