Message ID | 1470929064-4092-8-git-send-email-alex.bennee@linaro.org |
---|---|
State | Superseded |
Headers | show |
diff --git a/linux-user/elfload.c b/linux-user/elfload.c index f807baf..4b125b9 100644 --- a/linux-user/elfload.c +++ b/linux-user/elfload.c @@ -1838,6 +1838,8 @@ static void load_elf_image(const char *image_name, int image_fd, info->pt_dynamic_addr = 0; #endif + mmap_lock(); + /* Find the maximum size of the image and allocate an appropriate amount of memory to handle that. */ loaddr = -1, hiaddr = 0; @@ -1998,6 +2000,8 @@ static void load_elf_image(const char *image_name, int image_fd, load_symbols(ehdr, image_fd, load_bias); } + mmap_unlock(); + close(image_fd); return;
Future patches will enforce the holding of mmap_lock() when we are manipulating internal memory structures. Technically it doesn't matter in the case of elfload as we haven't started executing yet. However it is easier to grab the lock when required than special case the translate-all API. Signed-off-by: Alex Bennée <alex.bennee@linaro.org> --- v4 - split from assert patch --- linux-user/elfload.c | 4 ++++ 1 file changed, 4 insertions(+) -- 2.7.4