diff options
author | Laurentiu Palcu <laurentiu.palcu@intel.com> | 2013-04-05 19:12:26 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2013-04-05 17:36:34 +0100 |
commit | 1872ee316b77926d2b9ede27f9d428a3b2a8b3fe (patch) | |
tree | 5753f00ef1bc5445e929fe079af83d2013756713 /scripts/postinst-intercepts | |
parent | 419ef63ba5741ab67c91cbb96ee0c11e44975cb0 (diff) | |
download | poky-1872ee316b77926d2b9ede27f9d428a3b2a8b3fe.tar.gz |
postinst-intercepts, qemu.bbclass: fix issue on 32 bit hosts
The intercept scripts fail to run on 32 bit hosts. Apparently, the
current approach worked on 64 bit hosts due to the larger virtual address
space (probably). On 32 bit hosts, however, calling the target binary like:
qemu-arm ld-linux.so --library-path /lib:/usr/lib arm_binary
fails with:
arm_binary: error while loading shared libraries: arm_binary: failed to
map segment from shared object: Operation not permitted
When run like this, qemu-arm fails to map the arm_binary executable in
memory because it's hitting the lower limit of
/proc/sys/vm/mmap_min_addr. That's because it loads the
ld-linux.so binary successfully, taking into account mmap_min_addr, runs
it, and then ld-linux.so will map the arm_binary at a fixed address but this
will fail because it is below mmap_min_addr. The qemu's guest base probing,
apparently, doesn't work fine when a program runs inside other.
One way around this would be to set mmap_min_addr to 0 (on recent
distributions is set to 65536 to avoid "kernel NULL pointer dereference"
defects) but this approach is not safe.
The other way is to call the binary directly but providing qemu with a
prefix (-L option) in order to find the elf interpreter correctly. This
way, both the target binary and dynamic loader are mapped into memory
under qemu's control and, only after, the dynamic loader is started.
[YOCTO #4179]
(From OE-Core rev: 78f91e08c8a7b0f0c831a087f7c89e2c76047e7a)
Signed-off-by: Laurentiu Palcu <laurentiu.palcu@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/postinst-intercepts')
-rw-r--r-- | scripts/postinst-intercepts/update_font_cache | 4 | ||||
-rw-r--r-- | scripts/postinst-intercepts/update_pixbuf_cache | 3 |
2 files changed, 2 insertions, 5 deletions
diff --git a/scripts/postinst-intercepts/update_font_cache b/scripts/postinst-intercepts/update_font_cache index 562b5b3cb9..ad1bab32be 100644 --- a/scripts/postinst-intercepts/update_font_cache +++ b/scripts/postinst-intercepts/update_font_cache | |||
@@ -1,7 +1,5 @@ | |||
1 | #!/bin/sh | 1 | #!/bin/sh |
2 | 2 | ||
3 | PSEUDO_UNLOAD=1 qemuwrapper $D$(readelf -l $D${bindir}/fc-cache| grep "Requesting program interpreter"|sed -e 's/^.*\[.*: \(.*\)\]/\1/') \ | 3 | PSEUDO_UNLOAD=1 qemuwrapper -L $D $D${bindir}/fc-cache --sysroot=$D >/dev/null 2>&1 |
4 | --library-path $D/lib:$D/usr/lib $D${bindir}/fc-cache \ | ||
5 | --sysroot=$D >/dev/null 2>&1 | ||
6 | 4 | ||
7 | 5 | ||
diff --git a/scripts/postinst-intercepts/update_pixbuf_cache b/scripts/postinst-intercepts/update_pixbuf_cache index 64033dc48a..9134529273 100644 --- a/scripts/postinst-intercepts/update_pixbuf_cache +++ b/scripts/postinst-intercepts/update_pixbuf_cache | |||
@@ -2,8 +2,7 @@ | |||
2 | 2 | ||
3 | export GDK_PIXBUF_MODULEDIR=$D${libdir}/gdk-pixbuf-2.0/2.10.0/loaders | 3 | export GDK_PIXBUF_MODULEDIR=$D${libdir}/gdk-pixbuf-2.0/2.10.0/loaders |
4 | 4 | ||
5 | PSEUDO_UNLOAD=1 qemuwrapper $D$(readelf -l $D${bindir}/gdk-pixbuf-query-loaders|grep "Requesting program interpreter"|sed -e 's/^.*\[.*: \(.*\)\]/\1/') \ | 5 | PSEUDO_UNLOAD=1 qemuwrapper -L $D $D${bindir}/gdk-pixbuf-query-loaders \ |
6 | --library-path $D/lib:$D/usr/lib $D${bindir}/gdk-pixbuf-query-loaders \ | ||
7 | >$GDK_PIXBUF_MODULEDIR/../loaders.cache 2>/dev/null && \ | 6 | >$GDK_PIXBUF_MODULEDIR/../loaders.cache 2>/dev/null && \ |
8 | sed -i -e "s:$D::g" $GDK_PIXBUF_MODULEDIR/../loaders.cache | 7 | sed -i -e "s:$D::g" $GDK_PIXBUF_MODULEDIR/../loaders.cache |
9 | 8 | ||