Revert previous checkins as they introduced a bug when running zsh.
This commit is contained in:
		| @@ -116,18 +116,6 @@ dll_list::operator[] (const PWCHAR name) | ||||
|   return NULL; | ||||
| } | ||||
|  | ||||
| /* Look for a dll based on is short name only (no path) */ | ||||
| dll * | ||||
| dll_list::find_by_modname (const PWCHAR name) | ||||
| { | ||||
|   dll *d = &start; | ||||
|   while ((d = d->next) != NULL) | ||||
|     if (!wcscasecmp (name, d->modname)) | ||||
|       return d; | ||||
|  | ||||
|   return NULL; | ||||
| } | ||||
|  | ||||
| #define RETRIES 1000 | ||||
|  | ||||
| /* Allocate space for a dll struct. */ | ||||
| @@ -173,14 +161,14 @@ dll_list::alloc (HINSTANCE h, per_process *p, dll_type type) | ||||
|       d->handle = h; | ||||
|       d->has_dtors = true; | ||||
|       d->p = p; | ||||
|       d->image_size = ((pefile*)h)->optional_hdr ()->SizeOfImage; | ||||
|       d->ndeps = 0; | ||||
|       d->deps = NULL; | ||||
|       d->modname = wcsrchr (d->name, L'\\'); | ||||
|       if (d->modname) | ||||
| 	d->modname++; | ||||
|       d->type = type; | ||||
|       append (d); | ||||
|       if (end == NULL) | ||||
| 	end = &start;	/* Point to "end" of dll chain. */ | ||||
|       end->next = d;	/* Standard linked list stuff. */ | ||||
|       d->next = NULL; | ||||
|       d->prev = end; | ||||
|       end = d; | ||||
|       tot++; | ||||
|       if (type == DLL_LOAD) | ||||
| 	loaded_dlls++; | ||||
|     } | ||||
| @@ -189,119 +177,6 @@ dll_list::alloc (HINSTANCE h, per_process *p, dll_type type) | ||||
|   return d; | ||||
| } | ||||
|  | ||||
| void | ||||
| dll_list::append (dll* d) | ||||
| { | ||||
|   if (end == NULL) | ||||
|     end = &start;	/* Point to "end" of dll chain. */ | ||||
|   end->next = d;	/* Standard linked list stuff. */ | ||||
|   d->next = NULL; | ||||
|   d->prev = end; | ||||
|   end = d; | ||||
|   tot++; | ||||
| } | ||||
|  | ||||
| void dll_list::populate_deps (dll* d) | ||||
| { | ||||
|   WCHAR wmodname[NT_MAX_PATH]; | ||||
|   pefile* pef = (pefile*) d->handle; | ||||
|   PIMAGE_DATA_DIRECTORY dd = pef->idata_dir (IMAGE_DIRECTORY_ENTRY_IMPORT); | ||||
|   /* Annoyance: calling crealloc with a NULL pointer will use the | ||||
|      wrong heap and crash, so we have to replicate some code */ | ||||
|   long maxdeps = 4; | ||||
|   d->deps = (dll**) cmalloc (HEAP_2_DLL, maxdeps*sizeof (dll*)); | ||||
|   d->ndeps = 0; | ||||
|   for (PIMAGE_IMPORT_DESCRIPTOR id= | ||||
| 	(PIMAGE_IMPORT_DESCRIPTOR) pef->rva (dd->VirtualAddress); | ||||
|       dd->Size && id->Name; | ||||
|       id++) | ||||
|     { | ||||
|       char* modname = pef->rva (id->Name); | ||||
|       sys_mbstowcs (wmodname, NT_MAX_PATH, modname); | ||||
|       if (dll* dep = find_by_modname (wmodname)) | ||||
| 	{ | ||||
| 	  if (d->ndeps >= maxdeps) | ||||
| 	    { | ||||
| 	      maxdeps = 2*(1+maxdeps); | ||||
| 	      d->deps = (dll**) crealloc (d->deps, maxdeps*sizeof (dll*)); | ||||
| 	    } | ||||
| 	  d->deps[d->ndeps++] = dep; | ||||
| 	} | ||||
|     } | ||||
|    | ||||
|   /* add one to differentiate no deps from unknown */ | ||||
|   d->ndeps++; | ||||
| } | ||||
|  | ||||
|  | ||||
| void | ||||
| dll_list::topsort () | ||||
| { | ||||
|   /* Anything to do? */ | ||||
|   if (!end) | ||||
|     return; | ||||
|    | ||||
|   /* make sure we have all the deps available */ | ||||
|   dll* d = &start; | ||||
|   while ((d = d->next)) | ||||
|     if (!d->ndeps) | ||||
|       populate_deps (d); | ||||
|    | ||||
|   /* unlink head and tail pointers so the sort can rebuild the list */ | ||||
|   d = start.next; | ||||
|   start.next = end = NULL; | ||||
|   topsort_visit (d, true); | ||||
|  | ||||
|   /* clear node markings made by the sort */ | ||||
|   d = &start; | ||||
|   while ((d = d->next)) | ||||
|     { | ||||
|       debug_printf ("%W", d->modname); | ||||
|       for (int i=1; i < -d->ndeps; i++) | ||||
| 	debug_printf ("-> %W", d->deps[i-1]->modname); | ||||
|  | ||||
|       /* It would be really nice to be able to keep this information | ||||
| 	 around for next time, but we don't have an easy way to | ||||
| 	 invalidate cached dependencies when a module unloads. */ | ||||
|       d->ndeps = 0; | ||||
|       cfree (d->deps); | ||||
|       d->deps = NULL; | ||||
|     } | ||||
| } | ||||
|  | ||||
| /* A recursive in-place topological sort. The result is ordered so that | ||||
|    dependencies of a dll appear before it in the list. | ||||
|  | ||||
|    NOTE: this algorithm is guaranteed to terminate with a "partial | ||||
|    order" of dlls but does not do anything smart about cycles: an | ||||
|    arbitrary dependent dll will necessarily appear first. Perhaps not | ||||
|    surprisingly, Windows ships several dlls containing dependency | ||||
|    cycles, including SspiCli/RPCRT4.dll and a lovely tangle involving | ||||
|    USP10/LPK/GDI32/USER32.dll). Fortunately, we don't care about | ||||
|    Windows DLLs here, and cygwin dlls should behave better */ | ||||
| void | ||||
| dll_list::topsort_visit (dll* d, bool seek_tail) | ||||
| { | ||||
|   /* Recurse to the end of the dll chain, then visit nodes as we | ||||
|      unwind. We do this because once we start visiting nodes we can no | ||||
|      longer trust any _next_ pointers. | ||||
|  | ||||
|      We "mark" visited nodes (to avoid revisiting them) by negating | ||||
|      ndeps (undone once the sort completes). */ | ||||
|   if (seek_tail && d->next) | ||||
|     topsort_visit (d->next, true); | ||||
|    | ||||
|   if (d->ndeps > 0) | ||||
|     { | ||||
|       d->ndeps = -d->ndeps; | ||||
|       for (long i=1; i < -d->ndeps; i++) | ||||
| 	topsort_visit (d->deps[i-1], false); | ||||
|  | ||||
|       append (d); | ||||
|     } | ||||
| } | ||||
|  | ||||
|  | ||||
| dll * | ||||
| dll_list::find (void *retaddr) | ||||
| { | ||||
| @@ -417,33 +292,21 @@ release_upto (const PWCHAR name, DWORD here) | ||||
|       } | ||||
| } | ||||
|  | ||||
| /* Reserve the chunk of free address space starting _here_ and (usually) | ||||
|    covering at least _dll_size_ bytes. However, we must take care not | ||||
|    to clobber the dll's target address range because it often overlaps. | ||||
|  */ | ||||
| /* Mark one page at "here" as reserved.  This may force | ||||
|    Windows NT to load a DLL elsewhere. */ | ||||
| static DWORD | ||||
| reserve_at (const PWCHAR name, DWORD here, DWORD dll_base, DWORD dll_size) | ||||
| reserve_at (const PWCHAR name, DWORD here) | ||||
| { | ||||
|   DWORD size; | ||||
|   MEMORY_BASIC_INFORMATION mb; | ||||
|  | ||||
|   if (!VirtualQuery ((void *) here, &mb, sizeof (mb))) | ||||
|     api_fatal ("couldn't examine memory at %08lx while mapping %W, %E", | ||||
| 	       here, name); | ||||
|     size = 64 * 1024; | ||||
|  | ||||
|   if (mb.State != MEM_FREE) | ||||
|     return 0; | ||||
|  | ||||
|   size = mb.RegionSize; | ||||
|    | ||||
|   // don't clobber the space where we want the dll to land | ||||
|   DWORD end = here + size; | ||||
|   DWORD dll_end = dll_base + dll_size; | ||||
|   if (dll_base < here && dll_end > here) | ||||
|       here = dll_end; // the dll straddles our left edge | ||||
|   else if (dll_base >= here && dll_base < end) | ||||
|       end = dll_base; // the dll overlaps partly or fully to our right | ||||
|    | ||||
|   size = end - here; | ||||
|   if (!VirtualAlloc ((void *) here, size, MEM_RESERVE, PAGE_NOACCESS)) | ||||
|     api_fatal ("couldn't allocate memory %p(%d) for '%W' alignment, %E\n", | ||||
|                here, size, name); | ||||
| @@ -521,8 +384,7 @@ dll_list::load_after_fork (HANDLE parent) | ||||
|              can in the child, due to differences in the load ordering. | ||||
|              Block memory at it's preferred address and try again. */ | ||||
|           if ((DWORD) h > (DWORD) d->handle) | ||||
|             preferred_block = reserve_at (d->name, (DWORD) h, | ||||
| 					  (DWORD) d->handle, d->image_size); | ||||
|             preferred_block = reserve_at (d->name, (DWORD) h); | ||||
|  | ||||
| 	} | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user