aboutsummaryrefslogtreecommitdiff
path: root/src/kernel/fs/elfloader.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/kernel/fs/elfloader.c')
-rw-r--r--src/kernel/fs/elfloader.c90
1 files changed, 45 insertions, 45 deletions
diff --git a/src/kernel/fs/elfloader.c b/src/kernel/fs/elfloader.c
index 5b81a5e..8b80553 100644
--- a/src/kernel/fs/elfloader.c
+++ b/src/kernel/fs/elfloader.c
@@ -7,58 +7,58 @@
elf_priv_data *elf_probe(uint8_t *buf)
{
- elf_header_t *header = (elf_header_t *) buf;
- /* The first four bytes are 0x7f and 'ELF' */
- if (header->e_ident[0] == 0x7f &&
- header->e_ident[1] == 'E' && header->e_ident[2] == 'L' && header->e_ident[3] == 'F') {
- /* Valid ELF! */
- serial_printf("Buffer is valid ELF file!");
- return (void *) 1;
- }
- return 0;
+ elf_header_t *header = (elf_header_t *)buf;
+ /* The first four bytes are 0x7f and 'ELF' */
+ if (header->e_ident[0] == 0x7f && header->e_ident[1] == 'E' && header->e_ident[2] == 'L' &&
+ header->e_ident[3] == 'F') {
+ /* Valid ELF! */
+ serial_printf("Buffer is valid ELF file!");
+ return (void *)1;
+ }
+ return 0;
}
uint8_t elf_start(uint8_t *buf)
{
- elf_header_t *header = (elf_header_t *) buf;
- serial_printf("Type: %s%s%s",
- header->e_ident[4] == 1 ? "32bit " : "64 bit",
- header->e_ident[5] == 1 ? "Little Endian " : "Big endian ",
- header->e_ident[6] == 1 ? "True ELF " : "buggy ELF ");
- if (header->e_type != 2) {
- serial_printf("File is not executable!");
- return 0;
- }
- /* Map the virtual space */
- uint32_t phys_loc = loader_get_unused_load_location();
- uint32_t cr3 = kmalloc(4096);
- /* Find first program header and loop through them */
- elf_program_header_t *ph = (elf_program_header_t *) (buf + header->e_phoff);
- for (int i = 0; i < header->e_phnum; i++, ph++) {
- switch (ph->p_type) {
- case 0: /* NULL */
- break;
- case 1: /* LOAD */
- serial_printf("LOAD: offset 0x%x vaddr 0x%x paddr 0x%x filesz 0x%x memsz 0x%x",
- ph->p_offset, ph->p_vaddr, ph->p_paddr, ph->p_filesz, ph->p_memsz);
- paging_map(phys_loc, ph->p_vaddr, PT_PRESENT | PT_RW | PT_USED);
- memcpy(ph->p_vaddr, buf + ph->p_offset, ph->p_filesz);
- break;
- default: /* @TODO add more */
- serial_printf("Unsupported p_type! Bail out!");
- return 0;
- }
- }
+ elf_header_t *header = (elf_header_t *)buf;
+ serial_printf("Type: %s%s%s", header->e_ident[4] == 1 ? "32bit " : "64 bit",
+ header->e_ident[5] == 1 ? "Little Endian " : "Big endian ",
+ header->e_ident[6] == 1 ? "True ELF " : "buggy ELF ");
+ if (header->e_type != 2) {
+ serial_printf("File is not executable!");
+ return 0;
+ }
+ /* Map the virtual space */
+ uint32_t phys_loc = loader_get_unused_load_location();
+ uint32_t cr3 = kmalloc(4096);
+ /* Find first program header and loop through them */
+ elf_program_header_t *ph = (elf_program_header_t *)(buf + header->e_phoff);
+ for (int i = 0; i < header->e_phnum; i++, ph++) {
+ switch (ph->p_type) {
+ case 0: /* NULL */
+ break;
+ case 1: /* LOAD */
+ serial_printf(
+ "LOAD: offset 0x%x vaddr 0x%x paddr 0x%x filesz 0x%x memsz 0x%x",
+ ph->p_offset, ph->p_vaddr, ph->p_paddr, ph->p_filesz, ph->p_memsz);
+ paging_map(phys_loc, ph->p_vaddr, PT_PRESENT | PT_RW | PT_USED);
+ memcpy(ph->p_vaddr, buf + ph->p_offset, ph->p_filesz);
+ break;
+ default: /* @TODO add more */
+ serial_printf("Unsupported p_type! Bail out!");
+ return 0;
+ }
+ }
- return 0;//START("elf32", header->e_entry);
+ return 0; //START("elf32", header->e_entry);
}
void elf_init()
{
- loader_t *elfloader = (loader_t *) kmalloc(sizeof(loader_t));
- elfloader->name = "ELF32";
- elfloader->probe = (void *) elf_probe;
- elfloader->start = (void *) elf_start;
- register_loader(elfloader);
- // _kill();
+ loader_t *elfloader = (loader_t *)kmalloc(sizeof(loader_t));
+ elfloader->name = "ELF32";
+ elfloader->probe = (void *)elf_probe;
+ elfloader->start = (void *)elf_start;
+ register_loader(elfloader);
+ // _kill();
} \ No newline at end of file